Читать книгу Integration of Cloud Computing with Internet of Things - Группа авторов - Страница 3
List of Figures
Оглавление1 Chapter 1Figure 1.1 Major areas of IoT platform.Figure 1.2 Policy-based IoT applications.Figure 1.3 Softwarebased IoT applications.Figure 1.4 The benefits of CC.Figure 1.5 The hierarchy of EC.Figure 1.6 The benefits of EC.Figure 1.7 The concept of cloud, edge, and FC.Figure 1.8 The benefits and limitations of the IoTGC.Figure 1.9 The steps of SIoT (SEG 3.0 methodology) [27].Figure 1.11 A generalized architecture of including semantics.Figure 1.10 Intersection of different IoT visions [2].Figure 1.12 Different layers of interoperability.
2 Chapter 2Figure 2.1 Types of data.Figure 2.2 IoT and its components.Figure 2.3 IoT access control.Figure 2.4 Concept of firewall.Figure 2.5 Privacy in IoT.Figure 2.6 Internal and external attacker on IoT Infrastructure.Figure 2.7 Different data sources of IoT.Figure 2.8 Firewall that allows remote user access to a firewall device.Figure 2.9 Where is security in IoT needed.
3 Chapter 3Figure 3.1 Cloud computing vs fog computing.Figure 3.2 Basic fog computing model.Figure 3.3 Communication in IoT devices.Figure 3.4 Attacks in IoT.Figure 3.5 Fog layered model.Figure 3.6 Time levels for IoT group establishment.Figure 3.7 Computational time levels for data processing.Figure 3.8 Malicious node detection rate.Figure 3.9 Fog computational security levels for data storage.
4 Chapter 4Figure 4.1 Expert model in the healthcare domain for capturing patient symptoms.Figure 4.2 Expert module interaction process.Figure 4.3 Use case diagram of patient and expert module.Figure 4.4 Expert module activity diagram for decision logic.Figure 4.5 Class collaboration diagram.Figure 4.6 Ontological knowledge base diagram.
5 Chapter 5Figure 5.1 Proposed system.Figure 5.2 Flow graph of over all process.Figure 5.3 Hardware in monitoring system.Figure 5.4 Product identification.Figure 5.5 Person identification.Figure 5.6 Comparison process in MATLAB.
6 Chapter 6Figure 6.1 System architecture as shown as functional block diagram.Figure 6.2 MQTT protocol: publish–subscribe model.Figure 6.3 MQTT protocol message exchanges.Figure 6.4 ESP 32 board.Figure 6.5 Flame sensor.Figure 6.6 MQ2 gas sensor.Figure 6.7 DHT11 sensor.Figure 6.8 Actuator valve.Figure 6.9 Initial window of Arduino IDE.Figure 6.10 Sample Arduino IDE toolbar.Figure 6.11 Sample compiling arduino IDE status window.Figure 6.12 Logs file messages on the serial monitor window.Figure 6.13 MQTT broker architecture built on cloud MQTT.Figure 6.14 Interfacing flame sensor with Arduino.Figure 6.15 IoT system data flow for PUBLISH/SUBSCRIBE in MQTT broker.Figure 6.16 Testing of fire detection.Figure 6.17 Flame placed within the range of flame sensor.Figure 6.18 Flame placing outside the range of flame sensor.Figure 6.19 Flame is placed within 60° range of flame sensor.Figure 6.20 Flame is placed outside the 60-degree range of flame sensor.
7 Chapter 7Figure 7.1 Transmodeler.Figure 7.2 API Gateway. Image Source-https://docs.microsoft.com/en-us/azure/arch...Figure 7.3 Application file structure.Figure 7.4 Road transplant simulation board with extra road patch.Figure 7.5 Workflow in application.Figure 7.6 Workflow of Google API in the application.Figure 7.7 Low traffic.Figure 7.8 Moderate traffic.Figure 7.9 High traffic.Figure 7.10 Speed status screen.Figure 7.11 Traffic simulator 1st view.Figure 7.12 Traffic simulator 2nd view.Figure 7.13 Traffic simulator 3rd view.
8 Chapter 8Figure 8.1 Machine learning techniques with commonly adopted algorithms.Figure 8.2 (a) Classification technique, (b) Regression technique.Figure 8.3 Clustering technique.Figure 8.4 Reinforcement learning.Figure 8.5 Decision tree.Figure 8.6 Structure of ANN.Figure 8.7 Classification using Support Vector Machine (SVM).Figure 8.8 IoT device used for field data collection. Reprinted with permission ...Figure 8.9 Pie chart showing the distribution of data. Reprinted with permission...Figure 8.10 Cassava disease detection model accuracy. Reprinted with permission ...
9 Chapter 9Figure 9.1 Block diagram of home security system using IoT.Figure 9.2 Schematic diagram of home security system.Figure 9.3 Block diagram of proposed system.
10 Chapter 10Figure 10.1 Architectural layers of industrial-IoT.Figure 10.2 Stages of industrial-IoT.Figure 10.3 RUL as a tool in industrial decision making.Figure 10.4 Schematic of RUL prediction.Figure 10.5 Layers of industrial-IoT platform showing the hardware level to the ...Figure 10.6 Sequence of steps in RUL computation.Figure 10.7 Plot of smoothened feature health indicator.Figure 10.8 Plot of estimated RUL with true RUL along with their confidence boun...
11 Chapter 11Figure 11.1 Data exchange in IoT.Figure 11.2 Providing advantages of IoT in roles such as SCM [5–8].Figure 11.3 IoT and service adaption.Figure 11.4 Success of IoT.Figure 11.5 IoT benefits. Source: CompTIA’s Internet of Things insights and Oppo...Figure 11.6 Disadvantages of IoT. Source: Cyfuture.com.Figure 11.7 Technology change benefits to work.Figure 11.8 IoT and increase in Productivity.
12 Chapter 12Figure 12.1 Generic scenario of IoT.Figure 12.2 Layer defied by generic architecture of IoT.Figure 12.3 Three layer architecture of IoT.Figure 12.4 Six-layer architecture of IoT.Figure 12.5 Deployment models for cloud computing.Figure 12.6 Basic service models.Figure 12.7 Architecture of cloud-based IoT.
13 Chapter 13Figure 13.1 Different IoT Cores.Figure 13.2 IoT architecture.Figure 13.3 Sensor layer architecture.Figure 13.4 Gateway and network layer architecture.Figure 13.5 Management service layer architecture.Figure 13.6 Application layer architecture.Figure 13.7 North America IoT market & industry.Figure 13.8 IoT unit installed base on consumer unit.Figure 13.9 IoT endpoint spending on product of IoT.Figure 13.10 IoT market & industry.Figure 13.11 Connected apps & process of IoT.Figure 13.12 Connected intelligence.Figure 13.13 Connected edge (connected & autonomous things).Figure 13.14 Architecture of android things.Figure 13.15 Products manufactured by Samsara company.Figure 13.16 M2M ecosystem.Figure 13.17 M2M ecosystem.Figure 13.18 Networking Technologies—IoT.Figure 13.19 3GPP & IoT.Figure 13.20 MCC over LTE networks.Figure 13.21 IoT & Mobile cloud technology.Figure 13.22 Fog computing architecture.Figure 13.23 IoT & Fog based smart healthcare system architecture.Figure 13.24 IoT and Fog based smart manufacturer factory baseline architecture.
14 Chapter 14Figure 14.1 Next generation convergence technologies.Figure 14.2 Four vs of Big data: Data scientist view.Figure 14.3 Big data classification.Figure 14.4 A big data view on smart city formation.Figure 14.5 Programmers challenges with big data analytics.Figure 14.6 Cloud convergence with Big data in its architecture.Figure 14.7 Application of Big data in cloud services.Figure 14.8 Utility model of cloud based computing.Figure 14.9 Three layered of cloud as a service model.Figure 14.10 Hadoop ecosystem modules.
15 Chapter 15Figure 15.1 Overview of Cloud Computing Service Models.Figure 15.2 Software as a service.Figure 15.3 Platform as a service.Figure 15.4 Infrastructure as a service.Figure 15.5 Desktop as a service.Figure 15.6 Analytics as a service.Figure 15.7 Artificial Intelligence as service.Figure 15.8 Classification of cloud deployment models.Figure 15.9 Virtualization architecture.Figure 15.10 Cloud application deployment.Figure 15.11 Data Center—Global Distribution [Source: Internet].Figure 15.12 Types of data analytics.Figure 15.13 Summary of Covid 19 cases (as of 05.06.2020).Figure 15.14 Gender wise Covid 19 cases (as of 05.06.2020).Figure 15.15 Clustering of Covid 19 cases based on gender (as of 05.06.2020).Figure 15.16 Microsoft Azure—Real-time analytics architecture [Sources: https://...Figure 15.17 Amazon Web Services—Real-time analytics architecture [Sources: http...Figure 15.18 Data analytics services in Cloud.Figure 15.19 Framework for data analytics in Cloud.Figure 15.20 Data analytics work flow using Cloud tools.Figure 15.21 Analyzing the text as word by word.Figure 15.22 Analyzing the text as line by line.Figure 15.23 Analyzing the forms in the text.Figure 15.24 Analyzing the tables in the text.
16 Chapter 16Figure 16.1 Essential components of a biological neuron (Source: Axo-axonic syna...Figure 16.2 Perceptron model (Source: Amended from Rosenblatt perceptron by Perc...Figure 16.3 Multi-layer perceptron (Source: Amended from neural network by Gloss...Figure 16.4 Step function (Source: Hard-limit-function by MartinThoma, licensed ...Figure 16.5 Identity function (Source: Amended from—Activation identity by Laugh...Figure 16.6 Sigmoid function (Source: Amended from Sigmoid-function-by Martin Th...Figure 16.7 tanh function (Source: Amended from tanh function by Geek3, licensed...Figure 16.8 ReLU function (Source: ReLU by Renanar2, licensed under CC BY-SA 4.0...Figure 16.9 Leaky ReLU function (Source: Amended from—Activation Functions by An...Figure 16.10 Input–output model for recurrent neural network (Source: Amended fr...Figure 16.11 Recurrent neural network (Source: Amended from—Recurrent neural net...Figure 16.12 LSTM neural network (Source: Long Short-Term Memory by fdeloche, li...Figure 16.13 Infosys stock price prediction using recurrent neural network (Sour...Figure 16.14 Actual stock price vs. forecasted stock price for infosys (Source: ...
17 Chapter 17Figure 17.1 A cloud provider selection from a federated cloud, a multi-criteria ...Figure 17.2 Flow diagram of TLBO algorithm [15].Figure 17.3 Working principle of TLBO algorithm.Figure 17.4 TLBO solution representation.Figure 17.5 Flow diagram of Jaya algorithm [16].Figure 17.6 Jaya Algorithm solution representation.Figure 17.7 Flow diagram of Bird Swarm algorithm [17].Figure 17.8 Bird Swarm algorithm population representation.Figure 17.9 The initial solution using the AHP method.Figure 17.10 Best possible solution of the three suggested algorithms.
18 Chapter 18Figure 18.1 Which depicts the system of cloud computing, its types and model [2]...Figure 18.2 The estimated cloud computing market report by the survey of by mark...
19 Chapter 19Figure 19.1 Block diagram of a blockchain.Figure 19.2 Flow of events in a blockchain.Figure 19.3 Number of fraudulent incidents (from 2012 to 2016).Figure 19.4 Screenshot of the login page.Figure 19.5 Search medicine’s interaction diagram.Figure 19.6 Screenshot of the admin account module.Figure 19.7 Admin’s interaction diagram.Figure 19.8 Screenshot of the chat module between admin and branch manager.Figure 19.9 Screenshot of the encrypting part of a decrypted received message.Figure 19.10 Screenshot of the decrypted received message.Figure 19.11 Circuit diagram for the RFID reader module.Figure 19.12 Branch manager’s interaction diagram.Figure 19.13 Number of cases per year (2012–2016).Figure 19.14 Estimated number of cases 2017–2021 basis the previous trends.