
Intelligent Data Analytics, IoT, and Blockchain
- 344 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Intelligent Data Analytics, IoT, and Blockchain
About this book
This book focuses on data analytics with machine learning using IoT and blockchain technology. Integrating these three fields by examining their interconnections, Intelligent Data Analytics, IoT, and Blockchain examines the opportunities and challenges of developing systems and applications exploiting these technologies. Written primarily for researchers who are working in this multi-disciplinary field, the book also benefits industry experts and technology executives who want to develop their organizations' decision-making capabilities. Highlights of the book include:
- Using image processing with machine learning techniques
- A deep learning approach for facial recognition
- A scalable system architecture for smart cities based on cognitive IoT
- Source authentication of videos shared on social media
- Survey of blockchain in healthcare
- Accident prediction by vehicle tracking
- Big data analytics in disaster management
- Applicability, limitations, and opportunities of blockchain technology
The book presents novel ideas and insights on different aspects of data analytics, blockchain technology, and IoT. It views these technologies as interdisciplinary fields concerning processes and systems that extract knowledge and insights from data. Focusing on recent advances, the book offers a variety of solutions to real-life challenges with an emphasis on security.
Tools to learn more effectively

Saving Books

Keyword Search

Annotating Text

Listen to it instead
Information
Table of contents
- Cover Page
- Half Title page
- Title Page
- Copyright Page
- Contents
- About the Editors
- Contributors
- Chapter 1 Skin Cancer Classification Using Image Processing with Machine Learning Techniques
- Chapter 2 Trusted Location Information Verification Using Blockchain in Internet of Vehicles
- Chapter 3 Comparative Analysis of Word-Embedding Techniques Using LSTM Model
- Chapter 4 A Deep Learning Approach for Mask-Based Face Detection
- Chapter 5 A Scalable System Architecture for Smart Cities Based on Cognitive IoT
- Chapter 6 Bagging-Based Ensemble Learning for Imbalanced Data Classification Problem
- Chapter 7 Design and Implementation of a Network Security Model within a Local Area Network
- Chapter 8 Review of Modern Symmetric and Asymmetric Cryptographic Techniques
- Chapter 9 Quantum Computing-Based Image Representation with IBM QISKIT Libraries
- Chapter 10 Source Authentication of Videos Shared on Social Media
- Chapter 11 Task Scheduling Using MOIPSO Algorithm in Cloud Computing
- Chapter 12 Feature Selection-Based Comparative Analysis for Cardiovascular Disease Prediction Using a Machine Learning Model
- Chapter 13 Use of Cryptography in Networking to Preserve Secure Systems
- Chapter 14 Issues and Challenges of Blockchain in Healthcare
- Chapter 15 Accident Prediction by Vehicle Tracking
- Chapter 16 Blockchain-Based Cryptographic Model in the Cloud Environment
- Chapter 17 Big-Data Analytics in Disaster Management
- Chapter 18 Fuzzy Minimum Spanning Tree Calculation-Based Approach on Acceptability Index Method
- Chapter 19 Encoder/Decoder Transformer-Based Framework to Detect Hate Speech from Tweets
- Chapter 20 Understanding Dark Web Protection against Cyber Attacks
- Chapter 21 Various Elements of Analysis of Authentication Schemes for IoT devices: A Brief Overview
- Chapter 22 A Study of Carbon Emissions in the Transport Sector
- Chapter 23 An Exploration of Blockchain Technology: Applicability, Limitations, and Opportunities
- Chapter 24 A Survey of Security Challenges and Existing Prevention Methods in FANET
- Chapter 25 MENA Sukuk Price Prediction Modeling using Prophet Algorithm
- Chapter 26 Cancer Biomarkers Identification from Transcriptomic Data Using Supervised Machine Learning Approaches
- Chapter 27 Development of a Secured and Interoperable Multi-Tenant Software-as-a-Service Electronic Health Record System
- Chapter 28 Investigating Classification with Quantum Computing
- Chapter 29 A Comprehensive Analysis of Techniques Offering Dynamic Group Management in a Cloud Computing Environment
- Chapter 30 Improved YOLOv5 with Attention Mechanism for Real-Time Weed Detection in the Paddy Field: A Deep Learning Approach
- Index
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app