Smart Technologies -

Smart Technologies (eBook)

Scope and Applications
eBook Download: PDF
2019 | 1. Auflage
XVII, 407 Seiten
Springer Singapore (Verlag)
978-981-13-7139-4 (ISBN)
Systemvoraussetzungen
149,79 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

The book introduces the concept of 'smart technologies', especially 'Internet of Things' (IoT), and elaborates upon various constituent technologies, their evolution and their applications to various challenging problems in society. It then presents research papers and case studies based upon inception, application and implementation of IoT-based smart technologies for various application areas from some of the most technologically conservative domains like agriculture and farming to the most advanced areas such as automobiles, financial transactions and industrial applications. The book contents is thus applicable not only to academic researcher, but also to interested readers from industries and corporates, and those involved in policy making.      

Excerpt from the Foreword (read the complete text on Springerlink)

'This book contains besides the two introductory chapters, written by the project leaders from Indian Institute of Science (IISc) Bangalore, and TU Clausthal (TUC), Germany, the different areas of research work done within the INGPAR (Indo-German Partnership in Advanced Research, founded by DAAD in Germany and UGC in India) project so far by the Indian and German young researchers. It offers new perspectives and documents important progress in smart technologies. I can say without reservation that this book and, more specifically, the method it espouses will change fundamental ideas for cutting-edge innovation and disruption in the smart technology area.'        - Prof. Dr. Thomas Hanschke, President, TU Clausthal, Clausthal-Zellerfeld, Germany



Professor K. B. Akhilesh is a Senior Professor at the Department of Management Studies, Indian Institute of Science, Bangalore, India; President of Rajiv Gandhi Institute of Petroleum Technology, Amethi, India;  former member of the Board of Governors at the Indian Institute of Management, Rohtak,  and coordinator (IISc) for the M.Tech. program for Technology Management at  the Defense Institute` of Advanced Technology, Pune, India. He is currently involved in establishing a national level institute for energy studies in Bangalore, India. He is a Fellow of National Institute of Personnel Management, India,   Member of Academy of Management, USA, and President of International Society for Organization Design and Analytics.Professor Akhilesh has published over 140 papers in Indian and international journals. He has authored 18 books, the latest of which is 'Co-Creation & Learning' published by Springer, and guided over 30 PhD students. His research interests include collective intelligence at the team level, family business performance, expertise transfer, team design for virtual work and product development, vocational skill development, organizational development and change Management. As a consultant and a trainer he has interacted with corporates such as Daimler Chrysler, Airbus Industries, Pratt and Whitney USA, Siemens, Lapp India; government organizations such as 5th Central Pay Commission, Bharat Sanchar Nigam Limited (BSNL), Karnataka Power Corporation to name a few; and agencies such as International Labor Organization (ILO), World Bank, Azim Premji Foundation etc.

Dr. Dietmar Möller is a Professor in the Institute of Applied Stochastics and Operations Research at Clausthal University of Technology (TUC), Germany; a Member of the Simulations Science Center (SWZ) Clausthal-Göttingen, Germany; an Adjunct Professor in the Department of Electrical and Computer Engineering at the University of Nebraska-Lincoln (UNL), USA; and an Adjunct Professor in the Department of Electrical and Computer Engineering at the University of Alabama in Huntsville (UAH), USA. His research has been funded by international agencies such as National Science Foundation (NSF), USA, German Research Foundation (DFG), Germany, Federal Ministry of Education and Research (BMBF), Germany, German Academic Exchange Program (DAAD), Germany, Lower Saxonian Ministry for Science and Culture (MWK), Germany. His previous publications with Springer include Guide to Automotive Connectivity and Cybersecurity - Trends, Technologies, Innovations, and Applications (2018; co-authored with R. E. Haas), Guide to Computing Fundamentals in Cyber-Physical Systems - Concepts, Design Methods, and Applications (2016; Chinese translation of the book was published in 2018), and Introduction to Transportation Analysis, Modeling, and Simulation - Computational Foundations and Multimodal Applications (2014).


The book introduces the concept of 'smart technologies', especially 'Internet of Things' (IoT), and elaborates upon various constituent technologies, their evolution and their applications to various challenging problems in society. It then presents research papers and case studies based upon inception, application and implementation of IoT-based smart technologies for various application areas from some of the most technologically conservative domains like agriculture and farming to the most advanced areas such as automobiles, financial transactions and industrial applications. The book contents is thus applicable not only to academic researcher, but also to interested readers from industries and corporates, and those involved in policy making.      Excerpt from the Foreword (read the complete text on Springerlink): This book contains besides the two introductory chapters, written by the project leaders from Indian Institute of Science (IISc) Bangalore, and TU Clausthal (TUC), Germany, the different areas of research work done within the INGPAR (Indo-German Partnership in Advanced Research, founded by DAAD in Germany and UGC in India) project so far by the Indian and German young researchers. It offers new perspectives and documents important progress in smart technologies. I can say without reservation that this book and, more specifically, the method it espouses will change fundamental ideas for cutting-edge innovation and disruption in the smart technology area.         - Prof. Dr. Thomas Hanschke, President, TU Clausthal, Clausthal-Zellerfeld, Germany

Foreword 5
Acknowledgements 7
Contents 10
Editors and Contributors 13
1 Smart Technologies—Scope and Applications 16
1.1 Introduction 16
1.2 Internet of Things (IoT) 17
1.3 Artificial Intelligence (AI) 20
1.4 Robotics 23
1.5 Cloud Computing 25
1.5.1 Implementing Cloud Computing 26
1.6 Machine Learning 27
1.7 Big Data Analytics 30
1.8 Conclusion 31
2 Cutting-Edge Digitization Challenges in Vehicle Cyber-Physical Systems and Cybersecurity 32
2.1 Introduction 32
2.2 Connected Vehicles 34
2.3 Vehicle Cybersecurity 36
2.4 Enemy Attack Models and Scenarios 44
2.5 Conclusion 49
References 49
3 Implementing IoT in India—A Look at Macro Issues and a Framework for Recommendations 50
3.1 Introduction 50
3.2 Classification for the Stakeholders 52
3.2.1 Academia—Fundamental and Applied Research and Development for Humanity’s Progress 52
3.2.2 Startups—Breathing Life into Great Ideas in Niche Areas 53
3.2.3 Large Manufacturers—Improving Profitability with No Dent on Reputation 53
3.2.4 Governments—Improving Quality of Life 54
3.3 Case Study 1—Academic Research 54
3.4 Case Study 2—The Startups 55
3.5 Case Study 3—The Large Manufacturers 58
3.6 Case Study 4—The Government 61
3.7 Common Macroissues—The Interaction Genesis Theory 63
3.8 Model to Recommendations—An Example 64
3.9 Conclusion 66
3.10 Limitations and Further Research 66
References 66
4 Big Data Analytics as an Enabler in Smart Governance for the Future Smart Cities 68
4.1 Introduction 68
4.1.1 Need for Smart Cities in India 69
4.2 Smart City and Smart Governance 69
4.2.1 Major Components and the Key Stakeholders of Smart Cities 70
4.2.2 Models for Assessing the Performance of Smart Cities 70
4.2.3 Smart Governance for Smart Cities 72
4.2.4 Smart Governance-Models 73
4.3 Big Data Analytics for Smart Governance in a Smart City 73
4.3.1 Big Data Analytics 74
4.3.2 Sources of Big Data in Smart Cities 74
4.3.3 How Big Data Analytics Enables Smart Governance 75
4.4 Use Cases of Big Data Analytics from Different Cities in the World 77
4.4.1 Owl Bus, Seoul, South Korea 77
4.4.2 Centro De Operacoes Prefeitura Do Rio, Rio, Brazil 77
4.4.3 Use Cases from the Indian Cities 77
4.5 Conclusion 79
4.6 Limitations and Further Research 79
References 80
5 Role of Cyber Security in Public Services 81
5.1 Introduction 81
5.1.1 Importance of Cyber Security in India 82
5.1.2 Digital India 82
5.1.3 Aadhaar 83
5.1.4 Smart Grid 83
5.1.5 Smart City 84
5.2 How Cyber Security Can Be Achieved 84
5.2.1 Notions of Cyber Security, a Technical Note: There Are Four Major Areas that Are Covered Under Cyber Security 84
5.3 What Is Being Done to Achieve It in India: Initiatives and Policies? 85
5.3.1 Indian Computer Emergency Response Team (CERT-in) 85
5.3.2 Cyber Security R& D
5.3.3 Controller of Certifying Authorities 86
5.4 Shortcomings with Respect to Cyber Security in India 86
5.5 Case Studies from the Indian Context 87
5.5.1 Ransomware Attacks Disrupting Public Services 87
5.5.2 Case of Cyber-Attack on Indian Defense 88
5.5.3 Global Case Studies 88
5.6 Conclusion 89
5.7 Limitations and Further Research 90
References 90
6 Role of Government in Tackling Cyber Security Threat 92
6.1 Introduction 92
6.1.1 Introduction to Sector 94
6.1.2 Cyber Security Landscape 94
6.1.3 Cyber Security Scenario in India 95
6.1.4 Investment Required 100
6.1.5 Future Threats and Trends 101
6.1.6 Government Initiatives on Cyber Security 102
6.1.7 NCS 2013-National Cyber Security Policy 2013 102
6.1.8 CERT-in (Indian Computer Emergency Response Team) 103
6.1.9 Cyber Swachhta Kendra-Botnet Cleaning and Malware Analysis Centre 103
6.1.10 National Informatics Centre (NIC) 105
6.1.11 NISAP—National Information Security Assurance Program 105
6.1.12 Indo-US Cyber Security Forum (IUSCSF) 105
6.1.13 International Partnerships and Agreements 105
6.1.14 Recommendations 105
References 108
7 Digital Masters: Blueprinting Digital Transformation 110
7.1 Introduction 111
7.2 The Need for Digital Transformation 112
7.2.1 Industrial Revolution 112
7.2.2 Industrie 4.0 112
7.2.3 Key Components of Industrie 4.0 113
7.2.4 Digital transformation and Digital Masters 114
7.3 Case Analysis 116
7.4 Blueprinting Digital Transformation—A conceptual Framework 118
7.5 Conclusion 121
References 122
8 Conceptualizing the Potential Role of IoT-Enabled Monitoring System in Deterring Counterproductive Work Behavior 124
8.1 Introduction 124
8.2 Concepts of Counterproductive Behaviors 125
8.2.1 Antecedents of CWB 126
8.2.2 Consequences of CWB 128
8.2.3 Emotion-Centered Model of CWB 128
8.3 Internet of Things 128
8.3.1 IoT-Enabled Monitoring Tools 129
8.4 Using IoT in Deterring CWB 129
8.5 Challenges with IoT 131
8.6 Conclusion 132
References 132
9 Millennials at Industry 4.0—Opportunities and Challenges 134
9.1 Transformation of Workplace and Structure—Energy to Smart 135
9.1.1 What Is Industry 4.0? 136
9.1.2 What Is CPS? 137
9.1.3 What Is the Internet of Things? 137
9.2 Millennials in Transforming Workplace 139
9.2.1 Identity Theoretical Framework and Proposition Toward Digital Identity 141
9.2.2 Digital Identity @ Industry 4.0 143
9.2.3 Opportunities for Millennials at Industry 4.0 145
9.2.4 Challenges for Millennials at Industry 4.0 145
9.3 Conclusion 146
References 147
10 Operations Management of Cyber-Physical Production Systems 150
10.1 Introduction 150
10.2 Evolution of Manufacturing Industry 151
10.2.1 Industry 1.0 151
10.2.2 Industry 2.0 151
10.2.3 Industry 3.0 152
10.2.4 Industry 4.0 152
10.3 Cyber-Physical Production Systems (CPPS) 152
10.3.1 Understanding CPPS 152
10.3.2 Characteristics of CPPS 153
10.3.3 Digitally Integrated and Intelligent Value Chain—Limitless Possibilities 153
10.3.4 Digitally Integrated and Intelligent Value Chain—Challenges 155
10.4 Overcoming Challenges 156
10.5 Conclusion 158
10.6 Future Trends in CPPS 158
References 158
11 Understanding the Need for Cybersecurity in Manufacturing Environment 159
11.1 Introduction 159
11.2 Understanding Architecture of CPS for Manufacturing 160
11.2.1 Smart Connections 160
11.2.2 Extracting Insights from Data 161
11.2.3 Cyber 161
11.2.4 Cognition 161
11.2.5 Configuration 161
11.3 Manufacturing Industry Scenario 161
11.4 Assessing the Risks 163
11.4.1 Cyber 163
11.4.2 Physical 163
11.4.3 Cyber-Physical 163
11.4.4 Human 163
11.5 Impact Assessment of Cyber-Physical Vulnerability 164
11.5.1 Loss of Information 164
11.5.2 Inconsistency 164
11.5.3 Relative Frequency 164
11.5.4 Lack of Maturity 164
11.5.5 Time Until Detection 165
11.6 Challenges Faced by the Manufacturing Environment 165
11.7 Consequences of Using Connected Products 165
11.8 Hackers Use End Points to Target the Manufacturers 166
11.9 The Business Impact of Implementing Cybersecurity Infrastructure 166
11.10 Recommendations on Cybersecurity 167
11.10.1 Public–Private Partnership Focused on Manufacturing Supply Chain Cybersecurity 167
11.10.2 Setting up a Federal Research Initiative to Address Issues Related to Cybersecurity in Manufacturing 168
11.11 Conclusion 168
References 169
12 UAVs/Drones-Based IoT Services 170
12.1 Introduction 171
12.2 Navigable Airspace and Drone Classifications 172
12.3 Existing Regulations and Standards 173
12.3.1 India 173
12.3.2 Canada 174
12.3.3 The USA 174
12.3.4 The UK 174
12.3.5 Australia 174
12.4 Drone—IoT Architecture 174
12.5 Major Challenges in Integrating Drones to Airspace 176
12.6 Upcoming Research Areas 177
12.7 Conclusion 177
References 178
13 Role of Cyber Security in Drone Technology 179
13.1 Introduction 180
13.2 CPS Drones Are Key Enablers in Net-Centric Warfare 180
13.3 Navigable Air Space and Drone Classifications 182
13.4 Cyber-Attack and Security Threats to Drones 183
13.5 Drone Communication Network Architecture 184
13.6 Cyber Security and Protective Risk Assessment Scheme 186
13.7 Conclusion 186
References 188
14 Bitcoins as an Implementation of Blockchain and Its Convergence with Internet of Things 189
14.1 Introduction 189
14.2 Methodology of Operation of Digital Signatures 190
14.3 Electronic Cash System 192
14.4 The Solutions from Blockchain Technology 194
14.5 Introducing the Use of Blockchains in Machine-to-Machine Autonomous Transactions 197
14.6 Conclusion 198
References 199
15 Tomorrow’s AI-Enabled Banking 200
15.1 Introduction 200
15.2 Consumer Finance 201
15.2.1 Credit Cards 201
15.2.2 Consumer Loans 202
15.2.3 Mortgages 203
15.3 Personal Wealth Management 204
15.4 Commercial Banking and SME Lending 206
15.5 Risk Analytics 207
15.6 Anti-money Laundering 208
15.7 Customer Support Services 208
15.8 Conclusion 208
References 208
16 The Insurance Industry—Cyber Security in the Hyper-Connected Age 210
16.1 Introduction 210
16.1.1 How Insurance Works 211
16.1.2 Modern Insurance Process 212
16.1.3 The Indian Insurance Market 213
16.1.4 The Economic Impact of Insurance 213
16.1.5 Peculiarities of the Insurance Sector, in Comparison with Other Financial Services Sectors 213
16.2 The Present Tense: Insurance, Technology and Such 214
16.2.1 Data 214
16.2.2 New Insurance Products, Especially Cyber Insurance 215
16.2.3 Digital Platforms 215
16.2.4 RegTech 216
16.3 The Future Tense: Trends in Technology, Originating in Other Sectors, Which Are Set to Impact the Insurance Sector 216
16.3.1 Smart Homes 217
16.3.2 Cyber-Physical Systems 217
16.3.3 Intelligent Health Care 217
16.3.4 Autonomous and Connected Cars 218
16.3.5 Blockchain 219
16.3.6 Artificial Intelligence 220
16.4 Insurance Sector in the New Age, Technology Savvy India 220
16.5 Cyber Threats: New Age and Some Old 221
16.5.1 Recent Cyber Security Incidents 221
16.5.2 Victim Profile 222
16.5.3 Attacker Profile 222
16.5.4 Soft Spots 223
16.5.5 Types of Threats 223
16.5.6 Impact 223
16.6 Recommendations 224
16.6.1 Regulatory Framework 224
16.6.2 Collaboration 224
16.6.3 Organizational Development 225
16.6.4 Artificial Intelligence and Machine Learning 225
16.6.5 Cyber-Physical Systems 226
16.7 Limitations and Further Research 227
16.8 Conclusion 227
References 228
17 IoT in Retail 229
17.1 Introduction 229
17.2 Primary IoT Application Areas for Retail 230
17.2.1 Store Optimization 230
17.2.2 Inventory Accuracy and Management 231
17.2.3 Shrinkage Reduction 231
17.2.4 Fleet Management 233
17.3 Experienced-Based Retailing 233
17.3.1 Engagement Channels 234
17.3.2 Designing an Experience-Based Retailer 234
17.3.3 Concerns and Challenges for Experienced-Based Retailing 235
17.4 Challenges for IoT Adoption 235
17.4.1 Infrastructure and Networking Elements 235
17.4.2 Security Solutions 236
17.4.3 Data Analytics 236
17.4.4 Sensors and Devices 236
17.4.5 Value Chain Collaboration 237
17.4.6 Dashboards and Monitoring Consoles 237
17.4.7 Consulting Services 237
17.5 Case Studies 237
17.5.1 Costa Coffee 237
17.5.2 Levi Strauss 239
17.6 Conclusion and Recommendation 240
References 240
18 Role of Cyber Security in Retail 241
18.1 Introduction 241
18.1.1 Cyber Security 241
18.1.2 Introduction to Retail Sector 242
18.1.3 Cyber Security for Retail Sector 243
18.2 Gaps in Retail Cyber Security 244
18.2.1 Point-of-Sale Security Gaps 244
18.2.2 Innovative Technologies Can also Introduce Risks 245
18.2.3 Evolving PCI Compliance Regulations 245
18.3 Analysis of Cyber Threats in Retail Sector 246
18.3.1 The Possibilities 246
18.3.2 Top Threats 247
18.3.3 The Preparators 247
18.3.4 Tools 247
18.3.5 Landscape of Retail Cyber Threat 248
18.4 Indian Retail Cyber Security Scenario 252
18.5 Recommendation for Individuals 253
18.6 Recommendation for Retailers 254
18.7 Conclusion 255
References 255
19 Role of Cyber-security in Higher Education 256
19.1 Introduction 256
19.1.1 Cyber-Physical System 256
19.1.2 Information, ICT and Cyber-security 257
19.2 Cyber-security in Higher Education 260
19.2.1 Awareness of Cyber-security 260
19.2.2 Role of Cyber-security 261
19.3 Security Breaches and Threats in Higher Education 262
19.3.1 Issues of Serious Security Breaches 262
19.3.2 Major Types of Security Threats 263
19.4 Management of Cyber-security in Higher Education 265
19.4.1 Planning of Cyber-security 265
19.4.2 Steps for Smarter Security 265
19.4.3 A Sophisticated Security Strategy for Digital Transformation 267
19.4.4 A Security Management Model for Learning Systems 268
19.5 A Case Study 269
19.6 Summary and Recommendations 270
References 271
20 How Energy and Utility Companies Are Leveraging Industrial IoT in a Highly Competitive Business Environment? 272
20.1 Introduction 273
20.2 Energy Industry Scenario 273
20.2.1 Application of IoT in Oil and Gas 274
20.3 Utilities Industry Scenario 277
20.3.1 Application of IoT in Utilities 277
20.4 Case Studies 279
20.4.1 Case Study 1—Structural Health Monitoring (SHM) and Condition Monitoring in Offshore Locations 279
20.4.2 Case Study 2—the Smart IoT Based Anti-theft System for Crude Oil [3] 279
20.5 Conclusion 280
References 281
21 Smart Technologies as a Thread for Critical Infrastructures 282
21.1 Critical Infrastructures Within a Smart Environment 282
21.2 Airports as a Cyber-Physical System 283
21.3 Two-Layered Simulation Model 285
21.3.1 Dynamic Power-Flow Model 285
21.3.2 ICT Network Flow Model 287
21.3.3 Model Output 289
21.4 Digital Emergency Planning and Automated Emergency Management 291
21.5 Discussion and Outlook 293
References 294
22 Cybercare—Role of Cyber Security in Healthcare Industry 297
22.1 Introduction 297
22.2 Healthcare Ecosystem—Ecosystem of ‘Care’ 298
22.3 Healthcare Industry—Indian Scenario 300
22.3.1 Market Size 300
22.3.2 Investment 301
22.3.3 Government Campaigns and Initiatives 301
22.3.4 Chronic Diseases Service 302
22.4 Health Care—IoT Synergy 302
22.4.1 Applications 302
22.4.2 IoT Technologies in Health Care 303
22.5 Health Care—Cyber Security Synergy 304
22.5.1 Security or Privacy Requirements 304
22.6 Challenges in Security 305
22.7 Cyber Threats in Health Care 306
22.8 Cybercare for Health Care 306
22.8.1 Regulations on Data Access 307
22.8.2 Maintaining Security Standards 307
22.8.3 IT Security Expert Consultations 307
22.8.4 Continuous Monitoring 307
22.8.5 Proactive Measures 308
22.8.6 Data Backup 308
22.8.7 Have Plans for Situations of Cyberattacks 308
22.8.8 Test Plans 308
22.8.9 Knowhow on Cybercare 308
22.9 Conclusion 309
References 309
23 Exploring Connected Cars 311
23.1 Introduction 311
23.2 Technological Innovation in Connected Cars 312
23.2.1 Global Positioning System 312
23.2.2 On-Board Diagnostics 313
23.2.3 Smartphone-Based Solutions 314
23.2.4 Insurance 314
23.2.5 Collision Detection and Alerts 315
23.3 Mobility Trends in Cities and the Role of Governments 316
23.4 Future of Automobiles 318
23.4.1 Electric Cars 318
23.4.2 Self-driven Cars 319
23.5 Conclusion and Future Scope 320
References 321
24 Preventing External Connected Devices from Compromising Vehicle Systems and Sending Fault Signals Domains Intrusion Detection in Connected Cars 322
24.1 Introduction 322
24.2 Project Idea and Problem Analysis 323
24.3 Functionality of the Proposed System 323
24.4 Algorithms 326
24.4.1 Key Generation 327
24.4.2 Elliptic Curve Diffie–Hellman 327
24.4.3 Digital Certificate 328
24.5 Performance and Evaluation 328
24.6 Risk and Future Vision 328
24.7 Conclusion 329
References 329
25 Vehicular Cybersecurity Through Intrusion Detection and Prevention Architecture 330
25.1 Introduction 330
25.2 Cyber Threats in the Vehicular Domain 331
25.3 Intrusion Detection and Prevention Architecture 331
25.3.1 Intrusion Detection 332
25.3.2 Intrusion Prevention 336
25.4 Specific Challenges for an IDPS in Vehicular Systems 338
25.5 Conclusion 338
References 339
26 Mechanism Protecting Vehicle-to-Vehicle Communication 340
26.1 Introduction 340
26.2 Dedicated Short-Range Communication (DSRC) 341
26.3 Cars as Road Side Unit 342
26.3.1 Decision-Making 344
26.4 Performance Analyses 345
26.5 Potential of Information-Centric Networking and Name Data Networking in V2V 346
26.5.1 How to Use ICN and NDN in V2V 347
26.6 Conclusion 347
References 348
27 Advanced Driver Assistance Systems 349
27.1 Introduction 350
27.2 Driver Assistance and Advanced Driver Assistance Systems 351
27.2.1 The ADAS Market 351
27.2.2 Passive and Active Safety 352
27.2.3 ADAS Applications 352
27.2.4 Design Issues 353
27.2.5 Classification of ADAS 354
27.3 Parking Assistance Systems 354
27.4 Sensors 356
27.4.1 Sensor Fusion 356
27.4.2 Role of Image Processing in ADAS 357
27.4.3 Object Detection 359
27.5 E/E Architectures for ADAS 360
27.5.1 Connectivity 360
27.5.2 E/E Topology and Architectures 361
27.5.3 Middleware 361
27.6 Autonomous Driving 362
27.7 Cybersecurity Aspects of ADAS 364
27.8 ADAS in India 366
27.9 Summary, Outlook, and Further Reading 371
27.9.1 Further Reading 371
References 373
28 A Study on Impact of Technology Intervention in the Field of Agriculture in India 376
28.1 Introduction 376
28.2 Statistics 377
28.2.1 Major Constraints Leading to Yield Gap Are 377
28.3 Understanding Crop 378
28.4 Application of Technology—Case Studies 379
28.4.1 Case Study 1 379
28.4.2 Case Study 2 383
28.4.3 Case Study 3 385
28.4.4 Case Study 4 386
28.5 Challenges 386
28.6 Future Trends 386
28.7 Conclusion 387
References 387
29 Smart Agriculture: A Tango Between Modern IoT-Based Technologies and Traditional Agriculture Techniques 389
29.1 Introduction 389
29.2 Smart Farming 390
29.3 Smart Farming: Merits 391
29.4 Smart Farming: Disadvantages 391
29.5 Smart Farming: Opportunities 392
29.6 Smart Farming: Challenges in India 393
29.7 Smart Farming: The Way Ahead 394
29.8 Conclusion 394
References 395
30 Importance of Being ‘NICE’ While Developing IoT-Based Smart Farming Solutions: A Case Study About ‘NICE’ Labs 397
30.1 Introduction 397
30.2 Naturalism 399
30.3 Naturalist-Inspired Chemical Ecology: ‘NICE’ Approach 400
30.4 NICE Projects: Leveraging the Next-Generation Technologies 401
30.4.1 NICE Project: Super Flowers 401
30.4.2 NICE Project: Coffee 402
30.4.3 NICE Project: Insect VR (Virtual Reality) 404
30.5 NICE: Farming Solutions—Simple, Smart and Sustainable 404
30.6 NICE Practices for Managing Research 405
30.7 Conclusion 406
References 407

Erscheint lt. Verlag 27.8.2019
Zusatzinfo XVII, 405 p. 83 illus., 54 illus. in color.
Sprache englisch
Themenwelt Wirtschaft Betriebswirtschaft / Management Marketing / Vertrieb
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
Schlagworte implementation • Innovation Management • internet of things • Smart Technologies • Technology Management
ISBN-10 981-13-7139-3 / 9811371393
ISBN-13 978-981-13-7139-4 / 9789811371394
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 8,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Professionelle Mittelbeschaffung für gemeinwohlorientierte …

von Michael Urselmann

eBook Download (2023)
Springer Gabler (Verlag)
62,99
Neueste Konzepte, Strategien und Technologien sowie praxiserprobte …

von Uwe Seebacher

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
86,99