Internet of Things in Business Transformation

Internet of Things in Business Transformation
Автор книги: id книги: 1899067     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 18830,4 руб.     (187,89$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Программы Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119711131 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

The objective of this book is to teach what IoT is, how it works, and how it can be successfully utilized in business. This book helps to develop and implement a powerful IoT strategy for business transformation as well as project execution. Digital change, business creation/change and upgrades in the ways and manners in which we work, live, and engage with our clients and customers, are all enveloped by the Internet of Things which is now named “Industry 5.0” or “Industrial Internet of Things. The sheer number of IoT(a billion+), demonstrates the advent of an advanced business society led by sustainable robotics and business intelligence. This book will be an indispensable asset in helping businesses to understand the new technology and thrive.

Оглавление

Группа авторов. Internet of Things in Business Transformation

CONTENTS

List of Tables

List of Illustrations

Guide

Pages

Internet of Things in Business Transformation. Developing an Engineering and Business Strategy for Industry 5.0

Preface

1. Applications of IIoT-Based Systems in Detection Leakage in Pipeline Custody Transfer of Hydrocarbon Products

1.1 Introduction

1.2 Industrial Internet of Things

1.3 Pipeline Leaks

1.3.1 Various Techniques used to Detect Pipeline Leak

1.3.2 Use of IIoT to Detect Pipeline Leak

1.3.3 Use of Machine Learning Algorithms to Detect Pipeline Leak

1.3.4 Design and Analysis of Ensemble Learning-Based Approach for Pipeline Leak Detection

1.4 Conclusion

References

2. Heart Rate Monitoring System

2.1 Introduction

2.2 Project Objectives

2.3 System Architecture

2.4 Conclusion

References

3. An Efficient Clustering Technique for Wireless Body Area Networks Based on Dragonfly Optimization

3.1 Introduction

3.2 Literature Review

3.3 Clustering Technique

3.3.1 Evolutionary Algorithms

3.4 Implementation Steps

3.4.1 Dragonfly Algorithm

3.5 Result and Simulations

3.6 Conclusion

References

4. Transformational Technology for Business Transformation in the New Era

4.1 Introduction

4.1.1 Business Transformation

4.2 Digital Transformation and its Big Trend. 4.2.1 Digital Transformation

4.2.2 How Important is Digital Transformation?

4.2.3 Digital Transformation Examples

4.2.4 Importance of Digital Transformation

4.2.5 Digital Transformation vs Business Transformation

4.2.6 What Does Digital Transformation Look Like?

4.3 Transformational Technology

4.3.1 Internet of Things

4.3.2 Robotic Process Automation

4.3.3 Automation and Artificial Intelligence

4.3.4 Blockchain

4.3.5 Cloud Computing

4.3.6 Smartphones and Mobile Apps

4.3.7 4G and 5G

4.3.8 Data Analytics

4.3.9 Social Media

4.4 How to Get “Digital Transformation” in a Right Way for Any Business

4.4.1 Look Beyond the Traditional Enterprise Firewall

4.4.2 Bring New Ideas From the Edge to the Core

4.4.3 Define the Role of the CIO in the Innovation Process

4.5 Relevance of IoT in Digital Transformation

4.6 Conclusion

References

5. Future of Artificial Intelligence: Will People be at More of an Advantage Than They Are Today?

5.1 Introduction

5.2 The State of Artificial Intelligence (AI)

5.3 How Do Customers Interact with AI Nowadays?

5.4 AI as Digital Assistants

5.5 AI and Privacy, Data Security

5.5.1 Artificial Intelligence and its Effect on Humans

5.5.2 Conclusion

References

6. Classifier for DDoS Attack Detection in Software Defined Networks

6.1 Introduction

6.2 Related Work

6.3 DDoS Attacks Overview

6.4 Types of DDoS Attacks

6.5 DDoS Detection Techniques in SDN

6.6 Detection Using ML Techniques

6.7 Proposed Work Using SVM Classifier

6.8 Data Set Used

6.9 Proposed Methodology

6.10 Existing & Proposed Results

6.11 Conclusion & Future Work

References

7. IoT-Based Optimized and Secured Ecosystem for Energy Internet: The State-of-the-Art

7.1 Introduction

7.2 Distinguishing Features Between Home Automation and Smart Home

7.3 Energy Generation Shift Towards Renewable Sources

7.4 Robust Energy Management with IoT Technology

7.5 Solution from IoT Technology for Secured Transactions

7.5.1 Category I: Centralized Approach

7.5.2 Category II: Decentralized Approach

7.5.2.1 Blockchain Technology

7.5.2.2 Software Defined Networking (SDN)

7.6 Role of IoT in Smart Grid

7.6.1 Power Generation

7.6.2 Power Transmission

7.6.3 Power Distribution

7.6.4 Consumer Consumption

7.7 Bottleneck Areas of Existing System

7.8 Fusion of Energy Internet with IoT and Blockchain

7.9 Challenges for Safe and Secured Ecosystem in Energy Internet

7.9.1 The Case of Smart Grids

7.9.2 The Case of Smart Cities

References

8. A Novel Framework for Intelligent Spaces

8.1 Introduction

8.2 Intelligent Space

8.2.1 Sensing

8.2.2 Multimodal Perception

8.2.3 Context-Based Data Interpretation

8.2.4 Narrative Engines

8.3 Product Identification

8.4 Position Measurements

8.5 Proposed Framework

8.6 Conclusions

References

9. Defense and Isolation in the Internet of Things

9.1 Introduction

9.1.1 IoT Reference Model

9.1.2 IoT Security Threats

9.1.3 IoT Security Requirements

9.1.3.1 Scale

9.1.3.2 IP Protocol-Based IoT

9.1.3.3 Heterogeneous IoT

9.1.3.4 Lightweight Security

9.2 IoT Security Overview

9.2.1 IoT Protocols

9.2.2 Network and Transport Layer Challenges

9.2.3 IoT Gateways and Security

9.2.4 IoT Routing Attacks

9.2.5 Bootstrapping and Authentication

9.2.6 Authorization Mechanisms

9.2.6.1 Resource Owner

9.2.6.2 Resource Server (Service Provider, SP)

9.2.6.3 Client (Service Consumer, SC)

9.2.6.4 Authorization Server

9.2.7 IoT OAS

9.3 Security Frameworks for IoT

9.3.1 Light Weight Cryptography

9.3.1.1 Symmetric-Key LWC Algorithms

9.3.1.2 Asymmetric LWC Algorithms

9.3.1.3 Key Agreement, Distribution, and Bootstrapping

9.3.1.4 Security Bootstrapping

9.4 Privacy in IoT Networks

9.4.1 Secure Data Aggregation

9.4.2 Enigma

9.4.3 Zero Knowledge Protocols

9.4.4 Privacy in Beacons

9.5 Summary and Conclusions

References

10. Realization of Business Intelligence using Machine Learning

10.1 Introduction

10.2 Business Intelligence and Machine Learning Technology

10.3 Literature Study

10.4 Business Analytics and Machine Learning

10.5 IoT in Machine Learning

10.6 Conclusion

References

11. Current Trends and Future Scope for the Internet of Things

11.1 Introduction

11.2 IoT in Healthcare

11.3 IoT in Agriculture

11.4 IoT in Industries

11.5 IoT-Based Smart Cities

11.6 IoT in Robotics

11.7 Conclusion and Future Scope

References

12. Challenges for Agile Autonomous Team in Business Organization

12.1 Introduction

12.2 Literature Review

12.3 Types of Autonomy

12.3.1 Outside/External Autonomy

12.3.2 Interior/Internal Autonomy

12.3.3 Singular Autonomy

12.3.4 Consistent Learning and Improvement Ensures Individual and Internal Autonomy

12.4 Challenges for Autonomous Team. 12.4.1 Planning

12.4.1.1 Planning Associate Teams

12.4.1.2 Closed-Loop Communication

12.4.2 Conflict. 12.4.2.1 Inter-Personal Conflict

12.4.2.2 Intra-Group Struggle

12.4.2.3 Heightened Inter-Personal Conflict

12.4.3 Trust

12.4.4 Standards/Norms

12.4.5 One to One/Injunctive Norms

12.4.6 Descriptive Norms

12.4.7 Concurrent Norms

12.4.8 Mental Safety

12.4.9 Changing Norms

12.5 Suggestions for Training

12.5.1 Locate the Correct Kind of Space

12.5.2 Adjust the Administration Limits Constantly

12.5.3 Execute API Forming and the Executives

12.6 Conclusion

References

13. Role of Big Data Analytics in Business Transformation

13.1 Introduction to Technology-Enabled Business Transformation. 13.1.1 21st Century Business Challenges and Problems

13.1.2 Needs for Business Transformation

13.1.3 Digital Transformation

13.2 Introduction to Big Data, Big Data Analytics & Business Intelligence

13.2.1 What is Big Data?

13.2.1.1 Dimensions of Big Data

13.2.2 Big Data Analytics. 13.2.2.1 What is Big Data Analytics (BDA)?

13.2.2.2 Why is Big Data Analytics Important?

13.2.3 Business Intelligence (BI)

13.3 Big Data Analytics and its Role in Business Transformation

13.3.1 Big Data Analytics and Value Proposition

13.3.2 Strategic Business Value of BDA

13.3.3 BDA Framework for Creating Business Value

13.3.3.1 Building Big Data Analytics Capabilities

13.3.3.2 Realization of Big Data Analytics Capabilities

13.4 Successful Real World Cases Leveraging BDA for Business Transformation. 13.4.1 BDA in Retail: Walmart

13.4.2 BDA in Online Retail: Amazon

13.4.3 BDA in Social Media: Facebook

13.4.4 BDA in Manufacturing: Rolls-Royce

13.4.5 BDA in Healthcare: Apixio

13.5 BDA Capability Building Challenges

13.5.1 Data Quality

13.5.2 Management Challenges

13.5.3 BDA Value Assessment

13.6 Conclusion

References

14. Internet of Thing Trends

14.1 Architecture of IoT

14.1.1 Covering Big Information Issue Using IoT

14.1.2 Tools and Analytics of Big Data

14.2 Dependency of Healthcare on IoT

14.2.1 Improved Disease Management

14.2.2 Remote Monitoring of Health

14.2.3 Connected Healthcare and Virtual Infrastructure

14.2.4 Accurate Data Collection and its Availability

14.2.5 Drug Management

14.2.6 Emergency

14.3 High Demand of Smart Homes

14.3.1 Advantages of Home Automation System

14.3.2 Smart City Implementation using IoT

14.3.3 IoT Applications for Smart Cities

14.3.4 Fitness of Buildings

14.4 Environmental Monitoring

14.5 Waste Management

14.6 Smart Parking

14.7 Routing System for Inner-City Bus Riders

14.8 Self-Ruling Driving

References

15. Internet of Things: Augmenting Business Growth

15.1 Introduction

15.2 Role of IoT in the Business Growth

15.2.1 Architecture of IoT

15.2.1.1 3-Layer Architecture

15.2.1.2 4-Layer Architecture

15.2.1.3 5-Layer Architecture

15.2.2 Business Process

15.2.3 Business Models

15.3 Short Comes or Hurdles of IoT

15.3.1 Security Issues

15.3.2 Size Miniaturization

15.3.3 Ethical Challenges

15.3.4 Legal Concerns

15.3.5 Interoperability Issues

References

Index

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Scrivener Publishing

.....

Figure 1.6 Industrial Internet of Things-based architecture for pipeline leak detection.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Internet of Things in Business Transformation
Подняться наверх