Internet of Things in Business Transformation
Реклама. ООО «ЛитРес», ИНН: 7719571260.
Оглавление
Группа авторов. Internet of Things in Business Transformation
CONTENTS
List of Tables
List of Illustrations
Guide
Pages
Internet of Things in Business Transformation. Developing an Engineering and Business Strategy for Industry 5.0
Preface
1. Applications of IIoT-Based Systems in Detection Leakage in Pipeline Custody Transfer of Hydrocarbon Products
1.1 Introduction
1.2 Industrial Internet of Things
1.3 Pipeline Leaks
1.3.1 Various Techniques used to Detect Pipeline Leak
1.3.2 Use of IIoT to Detect Pipeline Leak
1.3.3 Use of Machine Learning Algorithms to Detect Pipeline Leak
1.3.4 Design and Analysis of Ensemble Learning-Based Approach for Pipeline Leak Detection
1.4 Conclusion
References
2. Heart Rate Monitoring System
2.1 Introduction
2.2 Project Objectives
2.3 System Architecture
2.4 Conclusion
References
3. An Efficient Clustering Technique for Wireless Body Area Networks Based on Dragonfly Optimization
3.1 Introduction
3.2 Literature Review
3.3 Clustering Technique
3.3.1 Evolutionary Algorithms
3.4 Implementation Steps
3.4.1 Dragonfly Algorithm
3.5 Result and Simulations
3.6 Conclusion
References
4. Transformational Technology for Business Transformation in the New Era
4.1 Introduction
4.1.1 Business Transformation
4.2 Digital Transformation and its Big Trend. 4.2.1 Digital Transformation
4.2.2 How Important is Digital Transformation?
4.2.3 Digital Transformation Examples
4.2.4 Importance of Digital Transformation
4.2.5 Digital Transformation vs Business Transformation
4.2.6 What Does Digital Transformation Look Like?
4.3 Transformational Technology
4.3.1 Internet of Things
4.3.2 Robotic Process Automation
4.3.3 Automation and Artificial Intelligence
4.3.4 Blockchain
4.3.5 Cloud Computing
4.3.6 Smartphones and Mobile Apps
4.3.7 4G and 5G
4.3.8 Data Analytics
4.3.9 Social Media
4.4 How to Get “Digital Transformation” in a Right Way for Any Business
4.4.1 Look Beyond the Traditional Enterprise Firewall
4.4.2 Bring New Ideas From the Edge to the Core
4.4.3 Define the Role of the CIO in the Innovation Process
4.5 Relevance of IoT in Digital Transformation
4.6 Conclusion
References
5. Future of Artificial Intelligence: Will People be at More of an Advantage Than They Are Today?
5.1 Introduction
5.2 The State of Artificial Intelligence (AI)
5.3 How Do Customers Interact with AI Nowadays?
5.4 AI as Digital Assistants
5.5 AI and Privacy, Data Security
5.5.1 Artificial Intelligence and its Effect on Humans
5.5.2 Conclusion
References
6. Classifier for DDoS Attack Detection in Software Defined Networks
6.1 Introduction
6.2 Related Work
6.3 DDoS Attacks Overview
6.4 Types of DDoS Attacks
6.5 DDoS Detection Techniques in SDN
6.6 Detection Using ML Techniques
6.7 Proposed Work Using SVM Classifier
6.8 Data Set Used
6.9 Proposed Methodology
6.10 Existing & Proposed Results
6.11 Conclusion & Future Work
References
7. IoT-Based Optimized and Secured Ecosystem for Energy Internet: The State-of-the-Art
7.1 Introduction
7.2 Distinguishing Features Between Home Automation and Smart Home
7.3 Energy Generation Shift Towards Renewable Sources
7.4 Robust Energy Management with IoT Technology
7.5 Solution from IoT Technology for Secured Transactions
7.5.1 Category I: Centralized Approach
7.5.2 Category II: Decentralized Approach
7.5.2.1 Blockchain Technology
7.5.2.2 Software Defined Networking (SDN)
7.6 Role of IoT in Smart Grid
7.6.1 Power Generation
7.6.2 Power Transmission
7.6.3 Power Distribution
7.6.4 Consumer Consumption
7.7 Bottleneck Areas of Existing System
7.8 Fusion of Energy Internet with IoT and Blockchain
7.9 Challenges for Safe and Secured Ecosystem in Energy Internet
7.9.1 The Case of Smart Grids
7.9.2 The Case of Smart Cities
References
8. A Novel Framework for Intelligent Spaces
8.1 Introduction
8.2 Intelligent Space
8.2.1 Sensing
8.2.2 Multimodal Perception
8.2.3 Context-Based Data Interpretation
8.2.4 Narrative Engines
8.3 Product Identification
8.4 Position Measurements
8.5 Proposed Framework
8.6 Conclusions
References
9. Defense and Isolation in the Internet of Things
9.1 Introduction
9.1.1 IoT Reference Model
9.1.2 IoT Security Threats
9.1.3 IoT Security Requirements
9.1.3.1 Scale
9.1.3.2 IP Protocol-Based IoT
9.1.3.3 Heterogeneous IoT
9.1.3.4 Lightweight Security
9.2 IoT Security Overview
9.2.1 IoT Protocols
9.2.2 Network and Transport Layer Challenges
9.2.3 IoT Gateways and Security
9.2.4 IoT Routing Attacks
9.2.5 Bootstrapping and Authentication
9.2.6 Authorization Mechanisms
9.2.6.1 Resource Owner
9.2.6.2 Resource Server (Service Provider, SP)
9.2.6.3 Client (Service Consumer, SC)
9.2.6.4 Authorization Server
9.2.7 IoT OAS
9.3 Security Frameworks for IoT
9.3.1 Light Weight Cryptography
9.3.1.1 Symmetric-Key LWC Algorithms
9.3.1.2 Asymmetric LWC Algorithms
9.3.1.3 Key Agreement, Distribution, and Bootstrapping
9.3.1.4 Security Bootstrapping
9.4 Privacy in IoT Networks
9.4.1 Secure Data Aggregation
9.4.2 Enigma
9.4.3 Zero Knowledge Protocols
9.4.4 Privacy in Beacons
9.5 Summary and Conclusions
References
10. Realization of Business Intelligence using Machine Learning
10.1 Introduction
10.2 Business Intelligence and Machine Learning Technology
10.3 Literature Study
10.4 Business Analytics and Machine Learning
10.5 IoT in Machine Learning
10.6 Conclusion
References
11. Current Trends and Future Scope for the Internet of Things
11.1 Introduction
11.2 IoT in Healthcare
11.3 IoT in Agriculture
11.4 IoT in Industries
11.5 IoT-Based Smart Cities
11.6 IoT in Robotics
11.7 Conclusion and Future Scope
References
12. Challenges for Agile Autonomous Team in Business Organization
12.1 Introduction
12.2 Literature Review
12.3 Types of Autonomy
12.3.1 Outside/External Autonomy
12.3.2 Interior/Internal Autonomy
12.3.3 Singular Autonomy
12.3.4 Consistent Learning and Improvement Ensures Individual and Internal Autonomy
12.4 Challenges for Autonomous Team. 12.4.1 Planning
12.4.1.1 Planning Associate Teams
12.4.1.2 Closed-Loop Communication
12.4.2 Conflict. 12.4.2.1 Inter-Personal Conflict
12.4.2.2 Intra-Group Struggle
12.4.2.3 Heightened Inter-Personal Conflict
12.4.3 Trust
12.4.4 Standards/Norms
12.4.5 One to One/Injunctive Norms
12.4.6 Descriptive Norms
12.4.7 Concurrent Norms
12.4.8 Mental Safety
12.4.9 Changing Norms
12.5 Suggestions for Training
12.5.1 Locate the Correct Kind of Space
12.5.2 Adjust the Administration Limits Constantly
12.5.3 Execute API Forming and the Executives
12.6 Conclusion
References
13. Role of Big Data Analytics in Business Transformation
13.1 Introduction to Technology-Enabled Business Transformation. 13.1.1 21st Century Business Challenges and Problems
13.1.2 Needs for Business Transformation
13.1.3 Digital Transformation
13.2 Introduction to Big Data, Big Data Analytics & Business Intelligence
13.2.1 What is Big Data?
13.2.1.1 Dimensions of Big Data
13.2.2 Big Data Analytics. 13.2.2.1 What is Big Data Analytics (BDA)?
13.2.2.2 Why is Big Data Analytics Important?
13.2.3 Business Intelligence (BI)
13.3 Big Data Analytics and its Role in Business Transformation
13.3.1 Big Data Analytics and Value Proposition
13.3.2 Strategic Business Value of BDA
13.3.3 BDA Framework for Creating Business Value
13.3.3.1 Building Big Data Analytics Capabilities
13.3.3.2 Realization of Big Data Analytics Capabilities
13.4 Successful Real World Cases Leveraging BDA for Business Transformation. 13.4.1 BDA in Retail: Walmart
13.4.2 BDA in Online Retail: Amazon
13.4.3 BDA in Social Media: Facebook
13.4.4 BDA in Manufacturing: Rolls-Royce
13.4.5 BDA in Healthcare: Apixio
13.5 BDA Capability Building Challenges
13.5.1 Data Quality
13.5.2 Management Challenges
13.5.3 BDA Value Assessment
13.6 Conclusion
References
14. Internet of Thing Trends
14.1 Architecture of IoT
14.1.1 Covering Big Information Issue Using IoT
14.1.2 Tools and Analytics of Big Data
14.2 Dependency of Healthcare on IoT
14.2.1 Improved Disease Management
14.2.2 Remote Monitoring of Health
14.2.3 Connected Healthcare and Virtual Infrastructure
14.2.4 Accurate Data Collection and its Availability
14.2.5 Drug Management
14.2.6 Emergency
14.3 High Demand of Smart Homes
14.3.1 Advantages of Home Automation System
14.3.2 Smart City Implementation using IoT
14.3.3 IoT Applications for Smart Cities
14.3.4 Fitness of Buildings
14.4 Environmental Monitoring
14.5 Waste Management
14.6 Smart Parking
14.7 Routing System for Inner-City Bus Riders
14.8 Self-Ruling Driving
References
15. Internet of Things: Augmenting Business Growth
15.1 Introduction
15.2 Role of IoT in the Business Growth
15.2.1 Architecture of IoT
15.2.1.1 3-Layer Architecture
15.2.1.2 4-Layer Architecture
15.2.1.3 5-Layer Architecture
15.2.2 Business Process
15.2.3 Business Models
15.3 Short Comes or Hurdles of IoT
15.3.1 Security Issues
15.3.2 Size Miniaturization
15.3.3 Ethical Challenges
15.3.4 Legal Concerns
15.3.5 Interoperability Issues
References
Index
WILEY END USER LICENSE AGREEMENT
Отрывок из книги
Scrivener Publishing
.....
Figure 1.6 Industrial Internet of Things-based architecture for pipeline leak detection.
.....