000928969 000__ 04229cam\a2200517Ii\4500 000928969 001__ 928969 000928969 005__ 20230306151326.0 000928969 006__ m\\\\\o\\d\\\\\\\\ 000928969 007__ cr\nn\nnnunnun 000928969 008__ 200227s2020\\\\sz\a\\\\o\\\\\000\0\eng\d 000928969 019__ $$a1141136566 000928969 020__ $$a9783030390471$$q(electronic book) 000928969 020__ $$a3030390470$$q(electronic book) 000928969 020__ $$z9783030390464 000928969 020__ $$z3030390462 000928969 0248_ $$a10.1007/978-3-030-39 000928969 035__ $$aSP(OCoLC)on1142360465 000928969 035__ $$aSP(OCoLC)1142360465$$z(OCoLC)1141136566 000928969 040__ $$aLQU$$beng$$cLQU$$dGW5XE$$dYDX 000928969 049__ $$aISEA 000928969 050_4 $$aQ325.5 000928969 08204 $$a629.8 000928969 24500 $$aInternet of Things, smart computing and technology :$$ba roadmap ahead /$$cNilanjan Dey, Parikshit. N. Mahalle, Pathan Mohd Shafi, Vinod V. Kimabahune, Aboul Ella Hassanien, editors. 000928969 264_1 $$aCham :$$bSpringer,$$c2020. 000928969 300__ $$a1 online resource (xvi, 403 pages) :$$billustrations. 000928969 336__ $$atext$$btxt$$2rdacontent 000928969 337__ $$acomputer$$bc$$2rdamedia 000928969 338__ $$aonline resource$$bcr$$2rdacarrier 000928969 4901_ $$aStudies in systems, decision and control ;$$vv. 266 000928969 5050_ $$aEfficacy of a classical and a few modified machine learning algorithms in forecasting financial time series -- Analysis of facial expression recognition of visible, thermal and fused imaginary in indoor and outdoor environment -- AI -- Assisted Chatbot for E-Commerce to Address Selection of Products from Multiple Products -- A Novel Approach to detect microcalcification for Accurate Detection for Diagnosis of Breast Cancer -- Rethinking Decentralised Identifiers and Verifiable Credentials for the Internet of Things -- The Invisible Eye -- A Security Architecture to Protect Motorways. 000928969 506__ $$aAccess limited to authorized users. 000928969 520__ $$aThis book addresses a broad range of topics concerning machine learning, big data, the Internet of things (IoT), and security in the IoT. Its goal is to bring together several innovative studies on these areas, in order to help researchers, engineers, and designers in several interdisciplinary domains pursue related applications. It presents an overview of the various algorithms used, focusing on the advantages and disadvantages of each in the fields of machine learning and big data. It also covers next-generation computing paradigms that are expected to support wireless networking with high data transfer rates and autonomous decision-making capabilities. In turn, the book discusses IoT applications (e.g. healthcare applications) that generate a huge amount of sensor data and imaging data that must be handled correctly for further processing. In the traditional IoT ecosystem, cloud computing offers a solution for the efficient management of huge amounts of data, thanks to its ability to access shared resources and provide a common infrastructure in a ubiquitous manner. Though these new technologies are invaluable, they also reveal serious IoT security challenges. IoT applications are vulnerable to various types of attack such as eavesdropping, spoofing and false data injection, the man-in-the-middle attack, replay attack, denial-of-service attack, jamming attack, flooding attack, etc. These and other security issues in the Internet of things are explored in detail. In addition to highlighting outstanding research and recent advances from around the globe, the book reports on current challenges and future directions in the IoT. Accordingly, it offers engineers, professionals, researchers, and designers an applied-oriented resource to support them in a broad range of interdisciplinary areas. 000928969 650_0 $$aMachine learning. 000928969 650_0 $$aInternet of things. 000928969 650_0 $$aBig data. 000928969 7001_ $$aDey, Nilanjan,$$d1984- 000928969 7001_ $$aMahalle, Parikshit N. 000928969 7001_ $$aShafi, Pathan Mohd. 000928969 7001_ $$aKimabahune, Vinod V. 000928969 7001_ $$aHassanien, Aboul Ella. 000928969 77608 $$iPrint version: $$z3030390462$$z9783030390464$$w(OCoLC)1130899522 000928969 830_0 $$aStudies in systems, decision and control ;$$vv. 266. 000928969 852__ $$bebk 000928969 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-39047-1$$zOnline Access$$91397441.1 000928969 909CO $$ooai:library.usi.edu:928969$$pGLOBAL_SET 000928969 980__ $$aEBOOK 000928969 980__ $$aBIB 000928969 982__ $$aEbook 000928969 983__ $$aOnline 000928969 994__ $$a92$$bISE