FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
|
|
- Title: Shaping the Future of IoT with Edge Intelligence
- Author(s) Rute C. Sofia, John Soldatos
- Publisher: River Publishers (January 8, 2024); eBook (Creative Commons Licensed)
- License(s): Creative Commons License (CC)
- Hardcover/Paperback: 413 pages
- eBook: PDF (351 pages) and Read Online
- Language: English
- ISBN-10/ASIN: 8770040273
- ISBN-13: 978-8770040273
- Share This:
This book presents the technologies that empower edge intelligence, along with their use in novel Internet of Things (IoT) solutions. Specifically, it presents how 5G/6G, Edge AI, and Blockchain solutions enable novel IoT-based decentralized intelligence use cases at the edge of the cloud/edge/IoT continuum.
About the Authors- N/A
- Internet of Things (IoT) and Wireless Sensor Networks (WSN)
- Wireless and Mobile Communications
- TCP/IP Networking and IPv6
- Embedded and Reatime Systems
- Microcontrollers, PLC, VLSI, etc.
-
Advancing Edge Artificial Intelligence: System Contexts
The intersection of AI, the Internet of Things (IoT) and Edge Computing has kindled the edge AI revolution that promises to redefine how we perceive and interact with the physical world through intelligent devices.
-
Mobile Edge Computing (Yan Zhang)
This open access book offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving intelligence in the next-generation wireless communications and computing networks.
-
Next Generation Internet of Things: Distributed Intelligence
This book provides an overview of the next generation Internet of Things (IoT), ranging from research, innovation, development priorities, to enabling technologies in a global context. Distributed Intelligence at the Edge and Human-Machine Interactions.
-
Building Blocks for IoT Analytics: Internet-of-Things Analytics
This book is devoted to the presentation the main technology building blocks that comprise advanced IoT analytics systems. It introduces IoT analytics as a special case of Big Data analytics and accordingly presents leading edge technologies.
-
Internet of Things (IoT) Use Cases and Technologies
This book introduces the IoT use cases and technologies. It uses practical examples to demonstrate the effect of IoT and its potential to change our world, and it discusses the existing wired and wireless communication technologies that have enabled IoT.
-
Internet of Things – The Call of the Edge: Intelligent Everywhere
This book provides an overview of the Internet of Things (IoT) – covering new ideas, concepts, research and innovation to enable the development of IoT technologies in a global context. It is intended as a standalone book covering the Internet of Things.
-
Internet of Things (IoT) in 5 Days (Antonio Linan Colina, et al)
This booklet is a quick but thoughtful guide to jump into the Internet of Things (IoT), covering important subjects as IPv6 networking, sensors, wireless protocols and technologies, as well as IoT cloud platforms and its most commonly used protocols, etc.
-
The Internet of Things (IoT) For Dummies, Special Editions
This book provides a comprehensive guide, including innovative case studies on IoT, what it is, how it can benefit organizations across the public and private sector as well as some ideas on the best way to implement it.
-
Rethinking the Internet of Things: A Scalable Approach
An introduction to design, complexity and issues surrounding future usage and deployment of the Internet of Things (IoT). It also provides interesting concepts on using edge gateways and streaming data from small set of devices.
-
A Reference Guide to the Internet of Things
This book will help you make educated decisions for your Internet of Things (IoT) project, whether building from scratch or assembling ready to deploy components. The goal is to help you navigate the many options available when constructing an IoT system.
-
Demystifying Internet of Things Security (Sunil Cheruvu, et al)
This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. It provides clarity to industry professionals and provides and overview of different security solutions.
:
|
|