You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book covers a domain that is significantly impacted by the growth of soft computing. Internet of Things (IoT)-related applications are gaining much attention with more and more devices which are getting connected, and they become the potential components of some smart applications. Thus, a global enthusiasm has sparked over various domains such as health, agriculture, energy, security, and retail. So, in this book, the main objective is to capture this multifaceted nature of IoT and machine learning in one single place. According to the contribution of each chapter, the book also provides a future direction for IoT and machine learning research. The objectives of this book are to identify different issues, suggest feasible solutions to those identified issues, and enable researchers and practitioners from both academia and industry to interact with each other regarding emerging technologies related to IoT and machine learning. In this book, we look for novel chapters that recommend new methodologies, recent advancement, system architectures, and other solutions to prevail over the limitations of IoT and machine learning.
Internet of Things (IoT) has become a valuable tool for connection and information exchange between devices. This book provides a brief introduction to this new field, focuses on wearable medical devices, and covers the basic concepts by providing the reader with enough information to solve various practical problems. This book provides the latest applications, experiments, fundamentals concepts, and cutting-edge topics for the ehealth and wearable devices field. The book also offers topics related to Security in IoT and Wearable Devices, Wearable Devices and Internet of Medical Devices (IoMT), IoT for Medical Applications, and Tools and study cases. The book brings new and valuable information to PhD researchers, students, professors, and professionals working in IoT and related fields.
In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference source for the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensive coverage on relevant areas such as kinetic knowledge, cognitive analytics, and parallel computing, this publication is an ideal resource for professionals, researchers, academicians, advanced-level students, and technology developers in the field of big data.
Handbook of Data Science Approaches for Biomedical Engineering covers the research issues and concepts of biomedical engineering progress and the ways they are aligning with the latest technologies in IoT and big data. In addition, the book includes various real-time/offline medical applications that directly or indirectly rely on medical and information technology. Case studies in the field of medical science, i.e., biomedical engineering, computer science, information security, and interdisciplinary tools, along with modern tools and the technologies used are also included to enhance understanding. Today, the role of Big Data and IoT proves that ninety percent of data currently available h...
This book addresses cutting-edge topics in robotics and related technologies for rehabilitation, covering basic concepts and providing the reader with the information they need to solve various practical problems. Intended as a reference guide to the application of robotics in rehabilitation, it covers e.g. musculoskeletal modelling, gait analysis, biomechanics, robotics modelling and simulation, sensors, wearable devices, and the Internet of Medical Things.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Industrial IoT Technologies and Applications, IoT 2020, held in December 2020. Due to Covid-19 pandemic the conference was held virtually. The widespread deployment of wireless sensor networks, clouds, industrial robot, embedded computing and inexpensive sensors has facilitated industrial Internet of Things (IndustrialIoT) technologies and fostered some emerging applications. The 14 carefully reviewed papers are a selection from 28 submissions and detail topics in the context of IoT for a smarter industry.
This book highlights recent advances in the area of machine learning and robotics-based soft computing applications. The book covers various artificial intelligence, machine learning, and mechanics, a mix of mechanical computational engineering work. The current computing era has a huge market/potential for machine learning, robotics, and soft computing techniques and their applications. With this in view, the book shares latest research and cutting-edge applications useful for professionals and researchers in these areas.
This book is composed of the Proceedings of the International Conference on Advanced Computing, Networking, and Informatics (ICACNI 2013), held at Central Institute of Technology, Raipur, Chhattisgarh, India during June 14–16, 2013. The book records current research articles in the domain of computing, networking, and informatics. The book presents original research articles, case-studies, as well as review articles in the said field of study with emphasis on their implementation and practical application. Researchers, academicians, practitioners, and industry policy makers around the globe have contributed towards formation of this book with their valuable research submissions.
This book examines the cyber risks associated with Internet of Things (IoT) and highlights the cyber security capabilities that IoT platforms must have in order to address those cyber risks effectively. The chapters fuse together deep cyber security expertise with artificial intelligence (AI), machine learning, and advanced analytics tools, which allows readers to evaluate, emulate, outpace, and eliminate threats in real time. The book’s chapters are written by experts of IoT and machine learning to help examine the computer-based crimes of the next decade. They highlight on automated processes for analyzing cyber frauds in the current systems and predict what is on the horizon. This book is applicable for researchers and professionals in cyber security, AI, and IoT.