Читать книгу Digital Forensics and Internet of Things - Группа авторов - Страница 4

List of Illustrations

Оглавление

1 Chapter 1Figure 1.1 Fundamental steps of image processing in face recognition.Figure 1.2 Layers of the model.Figure 1.3 Structure of face recognition system.Figure 1.4 Block diagram of face recognition system.Figure 1.5 Components of the system.Figure 1.6 Welcome to the Raspberry Pi desktop.Figure 1.7 Setup.Figure 1.8 Options on display.Figure 1.9 Image of registration.Figure 1.10 LCD displaying door lock system.Figure 1.11 Unknown face recognized.

2 Chapter 2Figure 2.1 WSNs connection to the internet.Figure 2.2 IoT-cloud-based remote health monitoring.Figure 2.3 Health monitoring using IoT-based Raspberry Pi.Figure 2.4 Healthcare monitoring model using RFID.Figure 2.5 Arduino-based health monitoring system.Figure 2.6 Healthcare system via IOT.Figure 2.7 Systemic model of health monitoring using ECG signal.

3 Chapter 3Figure 3.1. Block diagram of gesture-based hand gloves using Arduino UNO.Figure 3.2. Circuit diagram of gesture-based hand gloves using Arduino UNO.

4 Chapter 4Figure 4.1 Chimeras designed through gene targeting (source: https://en.wikipedi...Figure 4.2 Plasmid method in a bacterial cell.Figure 4.3 Cloning DNA of interest using the vector method.Figure 4.4 Biolistic gene gun.Figure 4.5 BtCotton.Figure 4.6 Flavr-Savr.Figure 4.7 Global adoption rates for biotech crops (million hectares).Figure 4.8 Global adoption rates for biotech crops (million hectares).Figure 4.9 Recent trends in gene therapy research and clinical trials. (a) Diffe...Figure 4.10 CRISPR technology mechanism.

5 Chapter 5Figure 5.1 Describes the subdomains of AI forensics [S].Figure 5.2 AI in GPS navigation.Figure 5.3 Challenges on implication of AI.

6 Chapter 6Figure 6.1 Model explaining the interrelation of mobility forensics with mobile ...Figure 6.2 Diagrammatic representation of internal structure of smart devices.Figure 6.3 (a) The email says “referring email id that Rs. 5,000,000 loan amount...Figure 6.4 Common model explaining the process of forensic investigation for IoT...Figure 6.5 Factors related to the IoT mobility forensics.Figure 6.6 Model explaining drawback of internet of things in forensics.

7 Chapter 7Figure 7.1 IoT architecture to understand data flow.Figure 7.2 The loopholes of the IoT ecosystem.Figure 7.3 Mixture of three digital scientific schemes which helps in understand...Figure 7.4 IoT Forensics requires a multi-faceted approach where demonstration c...

8 Chapter 8Figure 8.1 IoT sensors over business objectives.Figure 8.2 Encryption and decryption process.Figure 8.3 Symmetric encryption.Figure 8.4 Asymmetric encryption.

9 Chapter 9Figure 9.1 Xilinx counter IP core.Figure 9.2 Binary counter IP core.Figure 9.3 RTL schematic of 8-bit down counter IP core.Figure 9.4 Binary counter IP core.Figure 9.5 RTL schematic of 16-bit up/down counter IP core.Figure 9.6 IP core generation wizard.Figure 9.7 Xilinx square root IP core.Figure 9.8 Square root IP core.Figure 9.9 Square root IP core.Figure 9.10 RTL view of 8-bit square root.Figure 9.11 RTL view of 8-bit square root.Figure 9.12 RTL view of 16-bit square root using IP core.Figure 9.13 RTL view of 8-bit multiplier.Figure 9.14 Simulation view of 8-bit multiplier.Figure 9.15 Xilinx multiplier IP core.Figure 9.16 Multiplier IP core.Figure 9.17 RTL schematic of 8-bit multiplier IP core.Figure 9.18 Eight-bit multiplier simulation using IP core.Figure 9.19 RTL view of 8-bit down counter.Figure 9.20 RTL schematic of 8-bit down counter IP core.Figure 9.21 Eight-bit down the counter simulation.Figure 9.22 Eight- bit down counter simulation using IP core.Figure 9.23 Sixteen- bit down counter simulation using IP core.Figure 9.24 Sixteen-bit up a counter simulation using IP core.Figure 9.25 Sixteen-bit down counter simulation using IP core.Figure 9.26 Eight-bit square root simulation.Figure 9.27 Eight-bit square root simulation using IP core.Figure 9.28 Square root simulation for a non-perfect square number using IP core...Figure 9.29 Sixteen-bit square root simulation using IP core.Figure 9.30 Graph of Spartan-3E synthesis report.Figure 9.31 Graph of Spartan-6 synthesis report.Figure 9.32 Sixteen-bit binary up/down counter-power report.

10 Chapter 10Figure 10.1 The Vinci’s knight [6].Figure 10.2 Shakey the robot [9].Figure 10.3 The sensory network.Figure 10.4 3T architecture.Figure 10.5 Types of the cognitive architectures.Figure 10.6 Kismet’s facial expressions [28].Figure 10.7 The TIAGo-based robot [40].Figure 10.8 TOMMY—the nurse [42].Figure 10.9 A four-legged robot spot in Singapore to comply to the rules of soci...

11 Chapter 11Figure 11.1 Clustering in VANET.Figure 11.2 Internet of vehicles.Figure 11.3 Components of the IoT forensics.

12 Chapter 12Figure 12.1 Cognitive radio network.Figure 12.2 Cognitive radio cellular network (full duplex).Figure 12.3 Secondary base station with full duplex antenna.

13 Chapter 13Figure 13.1 Block diagram.Figure 13.2 Fingerprint pattern recognition.Figure 13.3 Working of the circuit.Figure 13.4 Finger print do not matched.

Digital Forensics and Internet of Things

Подняться наверх