Internet of things in business transformation : developing an engineering and business strategy for industry 5.0 / edited by Parul Gandhi [and four others].

Contributor(s): Gandhi, Parul [editor.]
Language: English Publisher: Hoboken, NJ : John Wiley & Sons, 2021Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9781119711131; 9781119711148; 9781119711155Subject(s): Internet of things -- Industrial applicationsGenre/Form: Electronic books.DDC classification: 658.4/0602854678 LOC classification: TK5105.8857Online resources: Full text available at Wiley Online Library Click here to view
Contents:
TABLE OF CONTENTS Preface xiii 1 Applications of IIoT-Based Systems in Detection Leakage in Pipeline Custody Transfer of Hydrocarbon Products 1 Pragyadiya Das 1.1 Introduction 1 1.2 Industrial Internet of Things 3 1.3 Pipeline Leaks 3 1.3.1 Various Techniques used to Detect Pipeline Leak 4 1.3.2 Use of IIoT to Detect Pipeline Leak 7 1.3.3 Use of Machine Learning Algorithms to Detect Pipeline Leak 9 1.3.4 Design and Analysis of Ensemble Learning-Based Approach for Pipeline Leak Detection 10 1.4 Conclusion 11 References 11 2 Heart Rate Monitoring System 15 Ramapriya Ranganath, Parag Jain, Akarash Kolekar, Sneha Baliga, A. Srinivas and M. Rajasekar 2.1 Introduction 16 2.2 Project Objectives 17 2.3 System Architecture 18 2.4 Conclusion 25 References 25 3 An Efficient Clustering Technique for Wireless Body Area Networks Based on Dragonfly Optimization 27 Bilal Mehmood and Farhan Aadil 3.1 Introduction 28 3.2 Literature Review 29 3.3 Clustering Technique 31 3.3.1 Evolutionary Algorithms 32 3.4 Implementation Steps 34 3.4.1 Dragonfly Algorithm 35 3.5 Result and Simulations 37 3.6 Conclusion 41 References 41 4 Transformational Technology for Business Transformation in the New Era 43 Md Shamsul Haque Ansari and Monica Mehrotra 4.1 Introduction 43 4.1.1 Business Transformation 45 4.2 Digital Transformation and its Big Trend 46 4.2.1 Digital Transformation 46 4.2.2 How Important is Digital Transformation? 46 4.2.3 Digital Transformation Examples 48 4.2.4 Importance of Digital Transformation 50 4.2.5 Digital Transformation vs Business Transformation 50 4.2.6 What Does Digital Transformation Look Like? 50 4.3 Transformational Technology 51 4.3.1 Internet of Things 51 4.3.2 Robotic Process Automation 52 4.3.3 Automation and Artificial Intelligence 52 4.3.4 Blockchain 53 4.3.5 Cloud Computing 54 4.3.6 Smartphones and Mobile Apps 54 4.3.7 4G and 5G 55 4.3.8 Data Analytics 55 4.3.9 Social Media 55 4.4 How to Get “Digital Transformation” in a Right Way for Any Business 56 4.4.1 Look Beyond the Traditional Enterprise Firewall 56 4.4.2 Bring New Ideas From the Edge to the Core 57 4.4.3 Define the Role of the CIO in the Innovation Process 57 4.5 Relevance of IoT in Digital Transformation 58 4.6 Conclusion 59 References 59 5 Future of Artificial Intelligence: Will People be at More of an Advantage Than They Are Today? 61 Priyadarsini Patnaik and Ravi Prakash 5.1 Introduction 61 5.2 The State of Artificial Intelligence (AI) 63 5.3 How Do Customers Interact with AI Nowadays? 63 5.4 AI as Digital Assistants 63 5.5 AI and Privacy, Data Security 64 5.5.1 Artificial Intelligence and its Effect on Humans 64 5.5.2 Conclusion 67 References 67 6 Classifier for DDoS Attack Detection in Software Defined Networks 71 Gaganjot Kaur and Prinima Gupta 6.1 Introduction 72 6.2 Related Work 75 6.3 DDoS Attacks Overview 79 6.4 Types of DDoS Attacks 81 6.5 DDoS Detection Techniques in SDN 83 6.6 Detection Using ML Techniques 83 6.7 Proposed Work Using SVM Classifier 84 6.8 Data Set Used 85 6.9 Proposed Methodology 85 6.10 Existing & Proposed Results 86 6.11 Conclusion & Future Work 86 References 87 7 IoT-Based Optimized and Secured Ecosystem for Energy Internet: The State-of-the-Art 91 Shilpa Sambhi, Shikhar Sambhi and Vikas Singh Bhadoria 7.1 Introduction 92 7.2 Distinguishing Features Between Home Automation and Smart Home 95 7.3 Energy Generation Shift Towards Renewable Sources 99 7.4 Robust Energy Management with IoT Technology 100 7.5 Solution from IoT Technology for Secured Transactions 103 7.5.1 Category I: Centralized Approach 103 7.5.2 Category II: Decentralized Approach 103 7.5.2.1 Blockchain Technology 104 7.5.2.2 Software Defined Networking (SDN) 107 7.6 Role of IoT in Smart Grid 109 7.6.1 Power Generation 109 7.6.2 Power Transmission 111 7.6.3 Power Distribution 111 7.6.4 Consumer Consumption 112 7.7 Bottleneck Areas of Existing System 112 7.8 Fusion of Energy Internet with IoT and Blockchain 113 7.9 Challenges for Safe and Secured Ecosystem in Energy Internet 116 7.9.1 The Case of Smart Grids 117 7.9.2 The Case of Smart Cities 119 References 121 8 A Novel Framework for Intelligent Spaces 127 Deepali Kamthania 8.1 Introduction 127 8.2 Intelligent Space 128 8.2.1 Sensing 128 8.2.2 Multimodal Perception 129 8.2.3 Context-Based Data Interpretation 129 8.2.4 Narrative Engines 129 8.3 Product Identification 130 8.4 Position Measurements 131 8.5 Proposed Framework 134 8.6 Conclusions 136 References 136 9 Defense and Isolation in the Internet of Things 141 Ravi Kumar Sharma, Tejinder Pal Singh Brar and Parul Gandhi 9.1 Introduction 142 9.1.1 IoT Reference Model 143 9.1.2 IoT Security Threats 144 9.1.3 IoT Security Requirements 145 9.1.3.1 Scale 146 9.1.3.2 IP Protocol-Based IoT 146 9.1.3.3 Heterogeneous IoT 147 9.1.3.4 Lightweight Security 147 9.2 IoT Security Overview 149 9.2.1 IoT Protocols 149 9.2.2 Network and Transport Layer Challenges 152 9.2.3 IoT Gateways and Security 152 9.2.4 IoT Routing Attacks 153 9.2.5 Bootstrapping and Authentication 155 9.2.6 Authorization Mechanisms 156 9.2.6.1 Resource Owner 156 9.2.6.2 Resource Server (Service Provider, SP) 156 9.2.6.3 Client (Service Consumer, SC) 156 9.2.6.4 Authorization Server 157 9.2.7 IoT OAS 157 9.3 Security Frameworks for IoT 158 9.3.1 Light Weight Cryptography 158 9.3.1.1 Symmetric-Key LWC Algorithms 159 9.3.1.2 Asymmetric LWC Algorithms 160 9.3.1.3 Key Agreement, Distribution, and Bootstrapping 160 9.3.1.4 Security Bootstrapping 161 9.4 Privacy in IoT Networks 161 9.4.1 Secure Data Aggregation 162 9.4.2 Enigma 163 9.4.3 Zero-Knowledge Protocols 164 9.4.4 Privacy in Beacons 164 9.5 Summary and Conclusions 166 References 166 10 Realization of Business Intelligence using Machine Learning 169 Mamata Rath 10.1 Introduction 170 10.2 Business Intelligence and Machine Learning Technology 170 10.3 Literature Study 173 10.4 Business Analytics and Machine Learning 174 10.5 IoT in Machine Learning 177 10.6 Conclusion 180 References 181 11 Current Trends and Future Scope for the Internet of Things 185 Iram Abrar, Zahrah Ayub and Faheem Masoodi 11.1 Introduction 185 11.2 IoT in Healthcare 188 11.3 IoT in Agriculture 191 11.4 IoT in Industries 195 11.5 IoT-Based Smart Cities 198 11.6 IoT in Robotics 201 11.7 Conclusion and Future Scope 203 References 204 12 Challenges for Agile Autonomous Team in Business Organization 211 Gurmeet Kaur, Jyoti Pruthi and Rachna Soni 12.1 Introduction 212 12.2 Literature Review 212 12.3 Types of Autonomy 214 12.3.1 Outside/External Autonomy 214 12.3.2 Interior/Internal Autonomy 215 12.3.3 Singular Autonomy 215 12.3.4 Consistent Learning and Improvement Ensures Individual and Internal Autonomy 215 12.4 Challenges for Autonomous Team 216 12.4.1 Planning 216 12.4.1.1 Planning Associate Teams 216 12.4.1.2 Closed-Loop Communication 217 12.4.2 Conflict 217 12.4.2.1 Inter-Personal Conflict 217 12.4.2.2 Intra-Group Struggle 218 12.4.2.3 Heightened Inter-Personal Conflict 218 12.4.3 Trust 219 12.4.4 Standards/Norms 220 12.4.5 One to One/Injunctive Norms 221 12.4.6 Descriptive Norms 222 12.4.7 Concurrent Norms 222 12.4.8 Mental Safety 223 12.4.9 Changing Norms 223 12.5 Suggestions for Training 224 12.5.1 Locate the Correct Kind of Space 224 12.5.2 Adjust the Administration Limits Constantly 225 12.5.3 Execute API Forming and the Executives 225 12.6 Conclusion 225 References 226 13 Role of Big Data Analytics in Business Transformation 231 Riyaz Abdullah Sheikh and Nitin S. Goje 13.1 Introduction to Technology-Enabled Business Transformation 232 13.1.1 21st Century Business Challenges and Problems 232 13.1.2 Needs for Business Transformation 232 13.1.3 Digital Transformation 233 13.2 Introduction to Big Data, Big Data Analytics & Business Intelligence 234 13.2.1 What is Big Data? 234 13.2.1.1 Dimensions of Big Data 235 13.2.2 Big Data Analytics 237 13.2.2.1 What is Big Data Analytics (BDA)? 237 13.2.2.2 Why is Big Data Analytics Important? 238 13.2.3 Business Intelligence (BI) 238 13.3 Big Data Analytics and its Role in Business Transformation 239 13.3.1 Big Data Analytics and Value Proposition 240 13.3.2 Strategic Business Value of BDA 241 13.3.3 BDA Framework for Creating Business Value 242 13.3.3.1 Building Big Data Analytics Capabilities 244 13.3.3.2 Realization of Big Data Analytics Capabilities 244 13.4 Successful Real World Cases Leveraging BDA for Business Transformation 245 13.4.1 BDA in Retail: Walmart 245 13.4.2 BDA in Online Retail: Amazon 247 13.4.3 BDA in Social Media: Facebook 248 13.4.4 BDA in Manufacturing: Rolls-Royce 249 13.4.5 BDA in Healthcare: Apixio 249 13.5 BDA Capability Building Challenges 253 13.5.1 Data Quality 253 13.5.2 Management Challenges 254 13.5.3 BDA Value Assessment 254 13.6 Conclusion 255 References 256 14 Internet of Thing Trends 261 Sunny Preety and lbanga Kpereobong 14.1 Architecture of IoT 261 14.1.1 Covering Big Information Issue Using IoT 264 14.1.2 Tools and Analytics of Big Data 264 14.2 Dependency of Healthcare on IoT 267 14.2.1 Improved Disease Management 268 14.2.2 Remote Monitoring of Health 268 14.2.3 Connected Healthcare and Virtual Infrastructure 269 14.2.4 Accurate Data Collection and its Availability 270 14.2.5 Drug Management 270 14.2.6 Emergency 270 14.3 High Demand of Smart Homes 270 14.3.1 Advantages of Home Automation System 272 14.3.2 Smart City Implementation using IoT 273 14.3.3 IoT Applications for Smart Cities 273 14.3.4 Fitness of Buildings 273 14.4 Environmental Monitoring 274 14.5 Waste Management 274 14.6 Smart Parking 274 14.7 Routing System for Inner-City Bus Riders 275 14.8 Self-Ruling Driving 275 References 276 15 Internet of Things: Augmenting Business Growth 279 Trapty Agarwal, Gurjot Singh, Shubham Pradhan and Vikash Verma 15.1 Introduction 279 15.2 Role of IoT in the Business Growth 281 15.2.1 Architecture of IoT 281 15.2.1.1 3-Layer Architecture 281 15.2.1.2 4-Layer Architecture 282 15.2.1.3 5-Layer Architecture 283 15.2.2 Business Process 284 15.2.3 Business Models 285 15.3 Short Comes or Hurdles of IoT 286 15.3.1 Security Issues 286 15.3.2 Size Miniaturization 288 15.3.3 Ethical Challenges 289 15.3.4 Legal Concerns 290 15.3.5 Interoperability Issues 291 References 291 Index 293
Summary: "IoT is to provide better services to the users, thereby, improving the quality of life, and the idea of integrating IoT with other emerging technologies like AI, blockchains and cloud computing can lead to the development of systems that are more robust, intelligent, secure and powerful. IoT and its applications in the fields of healthcare, smart homes, agriculture, robotics, and industries. Technological advancements continue to grow at an incredible speed so that Industry 5.0 which will be increased collaboration between humans and smart systems with the highspeed accuracy of industrial automation. The benefits will be extended to utilities and grid operators in secured ecosystem as they will be able to balance supply and demand in real-time as it also supports renewable energy integration into the grid in a fruitful way"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)

ABOUT THE AUTHOR
Parul Gandhi obtained her PhD in Computer Science and Software Engineering from Guru Jambheshwar University, Hisar, India. She is an associate professor at the Manav Rachna International Institute of Research and Studies (MRIIRS), Faridabad where she also handles the PhD program. She has published more than 30 research papers in reputed journals and conferences. Her research interests include software quality, soft computing, software metrics and component-based software development, data mining, IOT.

Surbhi Bhatia obtained her PhD in Computer Science and Engineering from Banasthali Vidypaith, India. She is an assistant professor in the Department of Information Systems, College of Computer Sciences and Information Technology, King Faisal University, Saudi Arabia. She has published seven patents with the Government of India and more than 25 papers in reputed journals and conferences in high indexing databases. She is an active researcher in the field of data mining, machine learning, deep learning and information retrieval.

Abhishek Kumar obtained his PhD in Computer Science from the University of Madras. He is an assistant professor in the Department of Computer Science & Engineering, Chitkara University Institute of Engineering and Technology, India. He has more than 60 publications in peer-reviewed journals and has edited more than 15 books. His research areas include AI, image processing, computer vision, data mining, machine learning.

Mohammad Alojail obtained his PhD in Information systems from RMIT University, Australia. He is the Chairman of Information System Department, College of Computer Sciences and Information Technology, King Faisal University, Saudi Arabia. He has considerable experience in the field of information systems and has delivered many presentations on leadership and management as well as successfully leading and managing teams to deliver large scale industrial projects. Dr. Alojail has written many scholarly papers in the field of IS and IT outsourcing.

Pramod Singh Rathore is pursuing his Doctorate in Computer Science & Engineering from Bundelkhand University, India. He has been working as an assistant professor at the Computer Science & Engineering Department at Aryabhatt Engineering College and Research Centre, Rajasthan. He has more than 45 publications in peer-reviewed journals.

Includes bibliographical references and index.

TABLE OF CONTENTS
Preface xiii

1 Applications of IIoT-Based Systems in Detection Leakage in Pipeline Custody Transfer of Hydrocarbon Products 1
Pragyadiya Das

1.1 Introduction 1

1.2 Industrial Internet of Things 3

1.3 Pipeline Leaks 3

1.3.1 Various Techniques used to Detect Pipeline Leak 4

1.3.2 Use of IIoT to Detect Pipeline Leak 7

1.3.3 Use of Machine Learning Algorithms to Detect Pipeline Leak 9

1.3.4 Design and Analysis of Ensemble Learning-Based Approach for Pipeline Leak Detection 10

1.4 Conclusion 11

References 11

2 Heart Rate Monitoring System 15
Ramapriya Ranganath, Parag Jain, Akarash Kolekar, Sneha Baliga, A. Srinivas and M. Rajasekar

2.1 Introduction 16

2.2 Project Objectives 17

2.3 System Architecture 18

2.4 Conclusion 25

References 25

3 An Efficient Clustering Technique for Wireless Body Area Networks Based on Dragonfly Optimization 27
Bilal Mehmood and Farhan Aadil

3.1 Introduction 28

3.2 Literature Review 29

3.3 Clustering Technique 31

3.3.1 Evolutionary Algorithms 32

3.4 Implementation Steps 34

3.4.1 Dragonfly Algorithm 35

3.5 Result and Simulations 37

3.6 Conclusion 41

References 41

4 Transformational Technology for Business Transformation in the New Era 43
Md Shamsul Haque Ansari and Monica Mehrotra

4.1 Introduction 43

4.1.1 Business Transformation 45

4.2 Digital Transformation and its Big Trend 46

4.2.1 Digital Transformation 46

4.2.2 How Important is Digital Transformation? 46

4.2.3 Digital Transformation Examples 48

4.2.4 Importance of Digital Transformation 50

4.2.5 Digital Transformation vs Business Transformation 50

4.2.6 What Does Digital Transformation Look Like? 50

4.3 Transformational Technology 51

4.3.1 Internet of Things 51

4.3.2 Robotic Process Automation 52

4.3.3 Automation and Artificial Intelligence 52

4.3.4 Blockchain 53

4.3.5 Cloud Computing 54

4.3.6 Smartphones and Mobile Apps 54

4.3.7 4G and 5G 55

4.3.8 Data Analytics 55

4.3.9 Social Media 55

4.4 How to Get “Digital Transformation” in a Right Way for Any Business 56

4.4.1 Look Beyond the Traditional Enterprise Firewall 56

4.4.2 Bring New Ideas From the Edge to the Core 57

4.4.3 Define the Role of the CIO in the Innovation Process 57

4.5 Relevance of IoT in Digital Transformation 58

4.6 Conclusion 59

References 59

5 Future of Artificial Intelligence: Will People be at More of an Advantage Than They Are Today? 61
Priyadarsini Patnaik and Ravi Prakash

5.1 Introduction 61

5.2 The State of Artificial Intelligence (AI) 63

5.3 How Do Customers Interact with AI Nowadays? 63

5.4 AI as Digital Assistants 63

5.5 AI and Privacy, Data Security 64

5.5.1 Artificial Intelligence and its Effect on Humans 64

5.5.2 Conclusion 67

References 67

6 Classifier for DDoS Attack Detection in Software Defined Networks 71
Gaganjot Kaur and Prinima Gupta

6.1 Introduction 72

6.2 Related Work 75

6.3 DDoS Attacks Overview 79

6.4 Types of DDoS Attacks 81

6.5 DDoS Detection Techniques in SDN 83

6.6 Detection Using ML Techniques 83

6.7 Proposed Work Using SVM Classifier 84

6.8 Data Set Used 85

6.9 Proposed Methodology 85

6.10 Existing & Proposed Results 86

6.11 Conclusion & Future Work 86

References 87

7 IoT-Based Optimized and Secured Ecosystem for Energy Internet: The State-of-the-Art 91
Shilpa Sambhi, Shikhar Sambhi and Vikas Singh Bhadoria

7.1 Introduction 92

7.2 Distinguishing Features Between Home Automation and Smart Home 95

7.3 Energy Generation Shift Towards Renewable Sources 99

7.4 Robust Energy Management with IoT Technology 100

7.5 Solution from IoT Technology for Secured Transactions 103

7.5.1 Category I: Centralized Approach 103

7.5.2 Category II: Decentralized Approach 103

7.5.2.1 Blockchain Technology 104

7.5.2.2 Software Defined Networking (SDN) 107

7.6 Role of IoT in Smart Grid 109

7.6.1 Power Generation 109

7.6.2 Power Transmission 111

7.6.3 Power Distribution 111

7.6.4 Consumer Consumption 112

7.7 Bottleneck Areas of Existing System 112

7.8 Fusion of Energy Internet with IoT and Blockchain 113

7.9 Challenges for Safe and Secured Ecosystem in Energy Internet 116

7.9.1 The Case of Smart Grids 117

7.9.2 The Case of Smart Cities 119

References 121

8 A Novel Framework for Intelligent Spaces 127
Deepali Kamthania

8.1 Introduction 127

8.2 Intelligent Space 128

8.2.1 Sensing 128

8.2.2 Multimodal Perception 129

8.2.3 Context-Based Data Interpretation 129

8.2.4 Narrative Engines 129

8.3 Product Identification 130

8.4 Position Measurements 131

8.5 Proposed Framework 134

8.6 Conclusions 136

References 136

9 Defense and Isolation in the Internet of Things 141
Ravi Kumar Sharma, Tejinder Pal Singh Brar and Parul Gandhi

9.1 Introduction 142

9.1.1 IoT Reference Model 143

9.1.2 IoT Security Threats 144

9.1.3 IoT Security Requirements 145

9.1.3.1 Scale 146

9.1.3.2 IP Protocol-Based IoT 146

9.1.3.3 Heterogeneous IoT 147

9.1.3.4 Lightweight Security 147

9.2 IoT Security Overview 149

9.2.1 IoT Protocols 149

9.2.2 Network and Transport Layer Challenges 152

9.2.3 IoT Gateways and Security 152

9.2.4 IoT Routing Attacks 153

9.2.5 Bootstrapping and Authentication 155

9.2.6 Authorization Mechanisms 156

9.2.6.1 Resource Owner 156

9.2.6.2 Resource Server (Service Provider, SP) 156

9.2.6.3 Client (Service Consumer, SC) 156

9.2.6.4 Authorization Server 157

9.2.7 IoT OAS 157

9.3 Security Frameworks for IoT 158

9.3.1 Light Weight Cryptography 158

9.3.1.1 Symmetric-Key LWC Algorithms 159

9.3.1.2 Asymmetric LWC Algorithms 160

9.3.1.3 Key Agreement, Distribution, and Bootstrapping 160

9.3.1.4 Security Bootstrapping 161

9.4 Privacy in IoT Networks 161

9.4.1 Secure Data Aggregation 162

9.4.2 Enigma 163

9.4.3 Zero-Knowledge Protocols 164

9.4.4 Privacy in Beacons 164

9.5 Summary and Conclusions 166

References 166

10 Realization of Business Intelligence using Machine Learning 169
Mamata Rath

10.1 Introduction 170

10.2 Business Intelligence and Machine Learning Technology 170

10.3 Literature Study 173

10.4 Business Analytics and Machine Learning 174

10.5 IoT in Machine Learning 177

10.6 Conclusion 180

References 181

11 Current Trends and Future Scope for the Internet of Things 185
Iram Abrar, Zahrah Ayub and Faheem Masoodi

11.1 Introduction 185

11.2 IoT in Healthcare 188

11.3 IoT in Agriculture 191

11.4 IoT in Industries 195

11.5 IoT-Based Smart Cities 198

11.6 IoT in Robotics 201

11.7 Conclusion and Future Scope 203

References 204

12 Challenges for Agile Autonomous Team in Business Organization 211
Gurmeet Kaur, Jyoti Pruthi and Rachna Soni

12.1 Introduction 212

12.2 Literature Review 212

12.3 Types of Autonomy 214

12.3.1 Outside/External Autonomy 214

12.3.2 Interior/Internal Autonomy 215

12.3.3 Singular Autonomy 215

12.3.4 Consistent Learning and Improvement Ensures Individual and Internal Autonomy 215

12.4 Challenges for Autonomous Team 216

12.4.1 Planning 216

12.4.1.1 Planning Associate Teams 216

12.4.1.2 Closed-Loop Communication 217

12.4.2 Conflict 217

12.4.2.1 Inter-Personal Conflict 217

12.4.2.2 Intra-Group Struggle 218

12.4.2.3 Heightened Inter-Personal Conflict 218

12.4.3 Trust 219

12.4.4 Standards/Norms 220

12.4.5 One to One/Injunctive Norms 221

12.4.6 Descriptive Norms 222

12.4.7 Concurrent Norms 222

12.4.8 Mental Safety 223

12.4.9 Changing Norms 223

12.5 Suggestions for Training 224

12.5.1 Locate the Correct Kind of Space 224

12.5.2 Adjust the Administration Limits Constantly 225

12.5.3 Execute API Forming and the Executives 225

12.6 Conclusion 225

References 226

13 Role of Big Data Analytics in Business Transformation 231
Riyaz Abdullah Sheikh and Nitin S. Goje

13.1 Introduction to Technology-Enabled Business Transformation 232

13.1.1 21st Century Business Challenges and Problems 232

13.1.2 Needs for Business Transformation 232

13.1.3 Digital Transformation 233

13.2 Introduction to Big Data, Big Data Analytics & Business Intelligence 234

13.2.1 What is Big Data? 234

13.2.1.1 Dimensions of Big Data 235

13.2.2 Big Data Analytics 237

13.2.2.1 What is Big Data Analytics (BDA)? 237

13.2.2.2 Why is Big Data Analytics Important? 238

13.2.3 Business Intelligence (BI) 238

13.3 Big Data Analytics and its Role in Business Transformation 239

13.3.1 Big Data Analytics and Value Proposition 240

13.3.2 Strategic Business Value of BDA 241

13.3.3 BDA Framework for Creating Business Value 242

13.3.3.1 Building Big Data Analytics Capabilities 244

13.3.3.2 Realization of Big Data Analytics Capabilities 244

13.4 Successful Real World Cases Leveraging BDA for Business Transformation 245

13.4.1 BDA in Retail: Walmart 245

13.4.2 BDA in Online Retail: Amazon 247

13.4.3 BDA in Social Media: Facebook 248

13.4.4 BDA in Manufacturing: Rolls-Royce 249

13.4.5 BDA in Healthcare: Apixio 249

13.5 BDA Capability Building Challenges 253

13.5.1 Data Quality 253

13.5.2 Management Challenges 254

13.5.3 BDA Value Assessment 254

13.6 Conclusion 255

References 256

14 Internet of Thing Trends 261
Sunny Preety and lbanga Kpereobong

14.1 Architecture of IoT 261

14.1.1 Covering Big Information Issue Using IoT 264

14.1.2 Tools and Analytics of Big Data 264

14.2 Dependency of Healthcare on IoT 267

14.2.1 Improved Disease Management 268

14.2.2 Remote Monitoring of Health 268

14.2.3 Connected Healthcare and Virtual Infrastructure 269

14.2.4 Accurate Data Collection and its Availability 270

14.2.5 Drug Management 270

14.2.6 Emergency 270

14.3 High Demand of Smart Homes 270

14.3.1 Advantages of Home Automation System 272

14.3.2 Smart City Implementation using IoT 273

14.3.3 IoT Applications for Smart Cities 273

14.3.4 Fitness of Buildings 273

14.4 Environmental Monitoring 274

14.5 Waste Management 274

14.6 Smart Parking 274

14.7 Routing System for Inner-City Bus Riders 275

14.8 Self-Ruling Driving 275

References 276

15 Internet of Things: Augmenting Business Growth 279
Trapty Agarwal, Gurjot Singh, Shubham Pradhan and Vikash Verma

15.1 Introduction 279

15.2 Role of IoT in the Business Growth 281

15.2.1 Architecture of IoT 281

15.2.1.1 3-Layer Architecture 281

15.2.1.2 4-Layer Architecture 282

15.2.1.3 5-Layer Architecture 283

15.2.2 Business Process 284

15.2.3 Business Models 285

15.3 Short Comes or Hurdles of IoT 286

15.3.1 Security Issues 286

15.3.2 Size Miniaturization 288

15.3.3 Ethical Challenges 289

15.3.4 Legal Concerns 290

15.3.5 Interoperability Issues 291

References 291

Index 293

"IoT is to provide better services to the users, thereby, improving the quality of life, and the idea of integrating IoT with other emerging technologies like AI, blockchains and cloud computing can lead to the development of systems that are more robust, intelligent, secure and powerful. IoT and its applications in the fields of healthcare, smart homes, agriculture, robotics, and industries. Technological advancements continue to grow at an incredible speed so that Industry 5.0 which will be increased collaboration between humans and smart systems with the highspeed accuracy of industrial automation. The benefits will be extended to utilities and grid operators in secured ecosystem as they will be able to balance supply and demand in real-time as it also supports renewable energy integration into the grid in a fruitful way"-- Provided by publisher.

Description based on print version record and CIP data provided by publisher; resource not viewed.

There are no comments for this item.

to post a comment.