Intelligent Computing on IoT 2.0, Big Data Analytics, and Block Chain Technology (eBook, PDF)
Redaktion: Obaidat, Mohammad S.; Ray, Niranjan K.; Nayak, Padmalaya
52,95 €
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
52,95 €
Als Download kaufen
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
26 °P sammeln
Intelligent Computing on IoT 2.0, Big Data Analytics, and Block Chain Technology (eBook, PDF)
Redaktion: Obaidat, Mohammad S.; Ray, Niranjan K.; Nayak, Padmalaya
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The book is designed as a reference text and explores the concepts and techniques of IoT, AI, and blockchain.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 95.08MB
The book is designed as a reference text and explores the concepts and techniques of IoT, AI, and blockchain.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 418
- Erscheinungstermin: 23. Mai 2024
- Englisch
- ISBN-13: 9781040019634
- Artikelnr.: 70412658
- Verlag: Taylor & Francis
- Seitenzahl: 418
- Erscheinungstermin: 23. Mai 2024
- Englisch
- ISBN-13: 9781040019634
- Artikelnr.: 70412658
Professor Mohammad S. Obaidat is an internationally known academic/researcher/scientist/ scholar. He received his Ph.D. degree in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, USA. He has received extensive research funding and published To Date (2023) over One Thousand (1,200) refereed technical articles-About half of them are journal articles, over 100 books, and over 70 Book Chapters. He is Editor-in-Chief of 3 scholarly journals and an editor of many other international journals. He is the founding Editor-in Chief of Wiley Security and Privacy Journal. Moreover, he is founder or co-founder of 5 IEEE International Conferences. Among his previous positions are Advisor to the President of Philadelphia University for Research, Development and Information Technology, President and Chair of Board of Directors of the Society for Molding and Simulation International(SCS), Senior Vice President of SCS, SCS VP for Membership and SCS VP for Conferences, Dean of the College of Engineering at Prince Sultan University, Founding Dean of the College of Computing and Informatics at The University of Sharjah, Chair and tenured Professor at the Department of Computer and Information Science and Director of the MS Graduate Program in Data Analytics at Fordham university, Chair and tenured Professor of the Department of Computer Science and Director of the Graduate Program at Monmouth University, Chair and Professor of Computer Science Department at University of Texas-Permian Basin, Distinguished Professor at IIT-Dhanbad, Tenured Full Professor at King Abdullah II School of Information Technology (KASIT), University of Jordan, The PR of China Ministry of Education Distinguished Overseas Professor at the University of Science and Technology Beijing, China and an Honorary Distinguished Professor at the Amity University- A Global University. He is now a Distinguished Professor at KASIT, University of Jordan. He has chaired numerous (Over 185) international conferences and has given numerous (Over 185) keynote speeches worldwide. He has served as ABET/CSAB evaluator and on IEEE CS Fellow Evaluation Committee. He has served as IEEE CS Distinguished Speaker/Lecturer and an ACM Distinguished Lecturer. Since 2004 has been serving as an SCS Distinguished Lecturer. He received many best paper awards for his papers including ones from IEEE ICC, IEEE Globecom, AICSA, CITS, SPECTS, DCNET, IEEE ICCCA, International conferences. He also received Best Paper awards from IEEE Systems Journal in 2018 and in 2019 (2 Best Paper Awards). In 2020, he received 4 best paper awards from IEEE Systems Journal and also in 2021 received the best paper award from IEEE Systems Journal. During his tenure as Founding Dean of College of computing and Informatics at University of Sharjah, the Computer Sciences program has been ranked by Times for Higher Education (THE) as NUMBER 1 in UAE and for the first time in the history of the University. He also received many other worldwide awards for his technical contributions including: The 2018 IEEE ComSoc-Technical Committee on Communications Software 2018 Technical Achievement Award for contribution to Cybersecurity, Wireless Networks Computer Networks and Modeling and Simulation, SCS prestigious McLeod Founder's Award , Presidential Service Award, SCS Hall of Fame -Lifetime Achievement Award for his technical contribution to modeling and simulation and for his outstanding visionary leadership and dedication to increasing the effectiveness and broadening the applications of modeling and simulation worldwide. He also received the SCS Outstanding Service Award. He was awarded the IEEE CITS Hall of Fame Distinguished and Eminent Award. He also received the Nokia Distinguished Fellowship Award and Fulbright Distinguished Scholar Award, among others. He was ranked recently by research.com agency as number ONE Computer Scientist and number ONE Scholar in Electronics and Electrical Engineering in Jordan. In recognition of his significant scientific contribution, Springer published in 2022 a book honoring his contributions in Computing, Informatics, Networking and Cybersecurity. It is entitled: Advances in Computing, Informatics, Networking and Cybersecurity - A Book Honoring Professor Mohammad S. Obaidat's Significant Scientific Contributions. Dr. Padmalaya Nayak, a faculty from GLWEC, Hyderabad, India, a noted pioneer, and scholar in the field of Computer Science Engineering/ Information Technology has fully realized that much importance of research would be needed in the potential field of the Internet of Things (IoT), improved versions of IoT, IoT data can be analyzed by applying Artificial intelligence techniques and security can be ensured through Block Chain Technology. As such, she laid a platform for this journey by bringing her two decades of experience in the field of Information Technology by joining hands with other two experts. Dr. Niranjan K Ray is an Associate Professor in School of Computer Engineering at KIIT University Bhubaneswar, India. He received his PhD from National Institute of Technology (NIT) Rourkela, India. He has received the IEEE Outstanding Service Award for 2022 from IEEE Computer Society, Bio-inspired Computing STC. His current research interests include Mobile Ad Hoc and Sensor networks, Distributed computing (Fog/Edge Computing), and Internet of Things. He has more than 60 peer reviewed research publications including IEEE Magazine and Transactions. He has edited three books by international publisher and published four patents to his credit. He has served as Editorial Board of IEEE Consumer Electronics Magazine (CEM), Section Editor "Dependable Cyber-Physical Systems and Cyber Security" of Springer Nature Computer Science (SNCS) and as a guest editor for special issues in other journals. He has served PC Chair / Track Chair of several International IEEE and other Conferences. At present he is serving as: Secretary of Odisha IT Society, Vice-Chair of Steering committee (OCIT International Conference) and Member, Executive Council of IEEE Bhubaneswar Subsection. He is a Senior member of IEEE and IEEE Consumer Electronics Society.
1. Introduction to Intelligent Computing on IoT 2.0, Big Data, and
BlockChain Technology. 2. A comprehensive survey of blockchain in IoT:
Technological Solutions, Systems, Techniques 3. Realtime Cloud Applications
4. The Role of BlockChain in IoT 5. AI and Blockchain-enabled Onion
Routing: Protocol to Secure IoT communication 6. Blockchain Development in
the Banking and Financial Industry 7. Blockchain-based eCommerce warranty
system using NFTs 8. Analysis of a Queueing System with Batch Poisson
Arrivals and Batch Services in Blockchain Applications 9. Emerging Trends
in Sensors, IoT and Smart Systems 10. Blockchain Development in Industries:
A Systematic Review 11. Smart Agricultural system Using IoT 2.0. 12. Smart
Health monitoring and management system 13. Networking Technologies for IoT
19. Vulnerability Assessment of Industrial and Agricultural Control Systems
within the IoT Framework 20. Intrusion Detection in Internet of Things with
Machine Learning and Deep Learning: A Review 21. An Enhanced Effective
Methodology To Detect Intrusions Using Machine Learning
BlockChain Technology. 2. A comprehensive survey of blockchain in IoT:
Technological Solutions, Systems, Techniques 3. Realtime Cloud Applications
4. The Role of BlockChain in IoT 5. AI and Blockchain-enabled Onion
Routing: Protocol to Secure IoT communication 6. Blockchain Development in
the Banking and Financial Industry 7. Blockchain-based eCommerce warranty
system using NFTs 8. Analysis of a Queueing System with Batch Poisson
Arrivals and Batch Services in Blockchain Applications 9. Emerging Trends
in Sensors, IoT and Smart Systems 10. Blockchain Development in Industries:
A Systematic Review 11. Smart Agricultural system Using IoT 2.0. 12. Smart
Health monitoring and management system 13. Networking Technologies for IoT
19. Vulnerability Assessment of Industrial and Agricultural Control Systems
within the IoT Framework 20. Intrusion Detection in Internet of Things with
Machine Learning and Deep Learning: A Review 21. An Enhanced Effective
Methodology To Detect Intrusions Using Machine Learning
1. Introduction to Intelligent Computing on IoT 2.0, Big Data, and
BlockChain Technology. 2. A comprehensive survey of blockchain in IoT:
Technological Solutions, Systems, Techniques 3. Realtime Cloud Applications
4. The Role of BlockChain in IoT 5. AI and Blockchain-enabled Onion
Routing: Protocol to Secure IoT communication 6. Blockchain Development in
the Banking and Financial Industry 7. Blockchain-based eCommerce warranty
system using NFTs 8. Analysis of a Queueing System with Batch Poisson
Arrivals and Batch Services in Blockchain Applications 9. Emerging Trends
in Sensors, IoT and Smart Systems 10. Blockchain Development in Industries:
A Systematic Review 11. Smart Agricultural system Using IoT 2.0. 12. Smart
Health monitoring and management system 13. Networking Technologies for IoT
19. Vulnerability Assessment of Industrial and Agricultural Control Systems
within the IoT Framework 20. Intrusion Detection in Internet of Things with
Machine Learning and Deep Learning: A Review 21. An Enhanced Effective
Methodology To Detect Intrusions Using Machine Learning
BlockChain Technology. 2. A comprehensive survey of blockchain in IoT:
Technological Solutions, Systems, Techniques 3. Realtime Cloud Applications
4. The Role of BlockChain in IoT 5. AI and Blockchain-enabled Onion
Routing: Protocol to Secure IoT communication 6. Blockchain Development in
the Banking and Financial Industry 7. Blockchain-based eCommerce warranty
system using NFTs 8. Analysis of a Queueing System with Batch Poisson
Arrivals and Batch Services in Blockchain Applications 9. Emerging Trends
in Sensors, IoT and Smart Systems 10. Blockchain Development in Industries:
A Systematic Review 11. Smart Agricultural system Using IoT 2.0. 12. Smart
Health monitoring and management system 13. Networking Technologies for IoT
19. Vulnerability Assessment of Industrial and Agricultural Control Systems
within the IoT Framework 20. Intrusion Detection in Internet of Things with
Machine Learning and Deep Learning: A Review 21. An Enhanced Effective
Methodology To Detect Intrusions Using Machine Learning