Скачать книгу

Conclusions References

      13  9 Defense and Isolation in the Internet of Things 9.1 Introduction 9.2 IoT Security Overview 9.3 Security Frameworks for IoT 9.4 Privacy in IoT Networks 9.5 Summary and Conclusions References

      14  10 Realization of Business Intelligence using Machine Learning 10.1 Introduction 10.2 Business Intelligence and Machine Learning Technology 10.3 Literature Study 10.4 Business Analytics and Machine Learning 10.5 IoT in Machine Learning 10.6 Conclusion References

      15  11 Current Trends and Future Scope for the Internet of Things 11.1 Introduction 11.2 IoT in Healthcare 11.3 IoT in Agriculture 11.4 IoT in Industries 11.5 IoT-Based Smart Cities 11.6 IoT in Robotics 11.7 Conclusion and Future Scope References

      16  12 Challenges for Agile Autonomous Team in Business Organization 12.1 Introduction 12.2 Literature Review 12.3 Types of Autonomy 12.4 Challenges for Autonomous Team 12.5 Suggestions for Training 12.6 Conclusion References

      17  13 Role of Big Data Analytics in Business Transformation 13.1 Introduction to Technology-Enabled Business Transformation 13.2 Introduction to Big Data, Big Data Analytics & Business Intelligence 13.3 Big Data Analytics and its Role in Business Transformation 13.4 Successful Real World Cases Leveraging BDA for Business Transformation 13.5 BDA Capability Building Challenges 13.6 Conclusion References

      18  14 Internet of Thing Trends 14.1 Architecture of IoT 14.2 Dependency of Healthcare on IoT 14.3 High Demand of Smart Homes 14.4 Environmental Monitoring 14.5 Waste Management 14.6 Smart Parking 14.7 Routing System for Inner-City Bus Riders 14.8 Self-Ruling Driving References

      19  15 Internet of Things: Augmenting Business Growth 15.1 Introduction 15.2 Role of IoT in the Business Growth 15.3 Short Comes or Hurdles of IoT References

      20  Index

      21  End User License Agreement

       List of Tables

      1 Chapter 3Table 3.1 Simulation parameters.Table 3.2 Dragonfly Algorithm.

      2 Chapter 4Table 4.1 Various objectives of organizations for transformation given by 460 ex...

      3 Chapter 9Table 9.1 IoT world forum reference model.Table 9.2 Security mechanisms to mitigate the threats in the IoT networks.Table 9.3 Bluetooth smart device protocol stack.

      4 Chapter 10Table 10.1 Interdisciplinary domains associated with research in IoT.

      5 Chapter 13Table 13.1 Summary of Case Studies [16].

       List of Illustrations

      1 Chapter 1Figure 1.1 Pipeline mapping—US.Figure 1.2 Percentage break-up of reasons causing pipeline leaks.Figure 1.3 Vapor Sampling method of pipeline leak detection.Figure 1.4 Acoustic method of leak detection. Скачать книгу