Limit search to available items
Book Cover
E-book
Author Sharma, Lavanya

Title Computer Vision and Internet of Things : Technologies and Applications
Published Milton : CRC Press LLC, 2022

Copies

Description 1 online resource (319 pages)
Contents Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Editors -- List of Contributors -- Acknowledgement -- Part 1 Introduction to Computer Vision and Internet of Things -- 1. Rise of Computer Vision and Internet of Things -- 1.1 Introduction -- 1.2 Evolution of CV and IoT -- 1.3 Evolving Toward CV and IoT -- 1.4 Enhancement of IoT Using CV and 5G Technology -- 1.5 Challenging Issue -- 1.6 CV and IoT in Real-Time Applications -- 1.6.1 Autonomous Vehicles -- 1.6.2 Healthcare System -- 1.6.2.1 Precise Diagnosis
1.6.2.2 Timely Detection of Illness -- 1.6.2.3 Facial Recognition -- 1.6.3 CV-Based Agriculture -- 1.6.3.1 Drone-Based Monitoring and Smarter Farming -- 1.6.3.2 Yield Analysis -- 1.6.3.3 Crop Grading and Sorting -- 1.6.3.4 Automated Pesticide Spraying and Phenotyping -- 1.6.3.5 Forest Information -- 1.6.4 Less Traffic Congestion -- 1.6.5 Smart Parking -- 1.6.6 Object Detection and Tracking -- 1.7 Conclusion -- References -- 2. IoE: An Innovative Technology for Future Enhancement -- 2.1 Introduction -- 2.2 IoT and Its Present Perspectives -- 2.3 IoE-Its Role and Responsibility
2.4 Interplay between IoE and IoT -- 2.5 Security in IoE -- 2.6 Role and Importance of IoE -- 2.7 France: IoE Smart City Pilot -- 2.8 Conclusion -- References -- 3. An Overview of Security Issues of Internet of Things -- 3.1 Introduction -- 3.2 Literature Review -- 3.3 Smart IoT Devices -- 3.4 Major Security Issues of IoT Devices -- 3.5 Threats to Security -- 3.5.1 Vulnerabilities -- 3.5.2 Attack -- 3.6 Purpose of IoT Attacks -- 3.7 Classification of Intruders -- 3.8 Conclusion -- References -- 4. Use of Robotics in Real-Time Applications -- 4.1 Introduction -- 4.2 Related Work
4.3 Current Challenging Issues -- 4.4 Different Areas of Robotics in Real-Time Applications -- 4.5 Conclusion -- References -- Part 2 Tools and Technologies of IoT with Computer Vision -- 5. Preventing Security Breach in Social Media: Threats and Prevention Techniques -- 5.1 Introduction -- 5.2 Related Research Work -- 5.3 Importance of Social Media -- 5.4 Privacy and Network Threats in Social Media -- 5.4.1 Classic Threats -- 5.4.2 Modern Threats -- 5.4.3 Combination Threats -- 5.4.4 Threats Targeting Children -- 5.5 Prevention Techniques and Strategies
5.5.1 Never Connect to Open Wi-Fi Networks -- 5.5.2 Check Before You Post -- 5.5.3 Limit the Number of People -- 5.5.4 Avoid Rumors -- 5.5.5 Use New Authentication Techniques -- 5.5.6 Use of Antivirus -- 5.5.7 Make Password Strong -- 5.5.8 Keep Software Update -- 5.5.9 Analyze the Setting -- 5.5.10 Observe Your Children -- 5.6 Future Scope -- 5.7 Conclusion -- References -- 6. Role of Image Processing in Artificial Intelligence and Internet of Things -- 6.1 Introduction -- 6.2 Image Processing -- 6.3 AI Solutions for Image Processing -- 6.3.1 OpenCV -- 6.3.2 TensorFlow -- 6.3.3 Keras -- 6.3.4 VXL
Notes 6.3.5 AForge.NET
Print version record
Form Electronic book
Author Carpenter, Mukesh
ISBN 9781000570557
100057055X