Details

Convergence of Cloud with AI for Big Data Analytics


Convergence of Cloud with AI for Big Data Analytics

Foundations and Innovation
Advances in Learning Analytics for Intelligent Cloud-IoT Systems 1. Aufl.

von: Danda B. Rawat, Lalit K. Awasthi, Valentina Emilia Balas, Mohit Kumar, Jitendra Kumar Samriya

173,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 13.02.2023
ISBN/EAN: 9781119905219
Sprache: englisch
Anzahl Seiten: 448

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>CONVERGENCE <i>of</i> CLOUD <i>with</i> AI <i>for</i> BIG DATA ANALYTICS</b> <p><b>This book covers the foundations and applications of cloud computing, AI, and Big Data and analyses their convergence for improved development and services.</b> <p>The 17 chapters of the book masterfully and comprehensively cover the intertwining concepts of artificial intelligence, cloud computing, and big data, all of which have recently emerged as the next-generation paradigms. There has been rigorous growth in their applications and the hybrid blend of AI Cloud and IoT (Ambient-intelligence technology) also relies on input from wireless devices. Despite the multitude of applications and advancements, there are still some limitations and challenges to overcome, such as security, latency, energy consumption, service allocation, healthcare services, network lifetime, etc. <i>Convergence of Cloud with AI for Big Data Analytics: Foundations and Innovation</i> details all these technologies and how they are related to state-of-the-art applications, and provides a comprehensive overview for readers interested in advanced technologies, identifying the challenges, proposed solutions, as well as how to enhance the framework. <p><b>Audience</b> <p>Researchers and post-graduate students in computing as well as engineers and practitioners in software engineering, electrical engineers, data analysts, and cyber security professionals.
<p>Preface xv</p> <p><b>1 Integration of Artificial Intelligence, Big Data, and Cloud Computing with Internet of Things 1<br /> </b><i>Jaydip Kumar</i></p> <p>1.1 Introduction 2</p> <p>1.2 Roll of Artificial Intelligence, Big Data and Cloud Computing in IoT 3</p> <p>1.3 Integration of Artificial Intelligence with the Internet of Things Devices 4</p> <p>1.4 Integration of Big Data with the Internet of Things 6</p> <p>1.5 Integration of Cloud Computing with the Internet of Things 6</p> <p>1.6 Security of Internet of Things 8</p> <p>1.7 Conclusion 10</p> <p>References 10</p> <p><b>2 Cloud Computing and Virtualization 13<br /> </b><i>Sudheer Mangalampalli, Pokkuluri Kiran Sree, Sangram K. Swain and Ganesh Reddy Karri</i></p> <p>2.1 Introduction to Cloud Computing 14</p> <p>2.1.1 Need of Cloud Computing 14</p> <p>2.1.2 History of Cloud Computing 14</p> <p>2.1.3 Definition of Cloud Computing 15</p> <p>2.1.4 Different Architectures of Cloud Computing 16</p> <p>2.1.4.1 Generic Architecture of Cloud Computing 16</p> <p>2.1.4.2 Market Oriented Architecture of Cloud Computing 17</p> <p>2.1.5 Applications of Cloud Computing in Different Domains 18</p> <p>2.1.5.1 Cloud Computing in Healthcare 18</p> <p>2.5.1.2 Cloud Computing in Education 19</p> <p>2.5.1.3 Cloud Computing in Entertainment Services 19</p> <p>2.5.1.4 Cloud Computing in Government Services 19</p> <p>2.1.6 Service Models in Cloud Computing 19</p> <p>2.1.7 Deployment Models in Cloud Computing 21</p> <p>2.2 Virtualization 22</p> <p>2.2.1 Need of Virtualization in Cloud Computing 22</p> <p>2.2.2 Architecture of a Virtual Machine 23</p> <p>2.2.3 Advantages of Virtualization 24</p> <p>2.2.4 Different Implementation Levels of Virtualization 25</p> <p>2.2.4.1 Instruction Set Architecture Level 25</p> <p>2.2.4.2 Hardware Level 26</p> <p>2.2.4.3 Operating System Level 26</p> <p>2.2.4.4 Library Level 26</p> <p>2.2.4.5 Application Level 26</p> <p>2.2.5 Server Consolidation Using Virtualization 26</p> <p>2.2.6 Task Scheduling in Cloud Computing 27</p> <p>2.2.7 Proposed System Architecture 31</p> <p>2.2.8 Mathematical Modeling of Proposed Task Scheduling Algorithm 31</p> <p>2.2.9 Multi Objective Optimization 34</p> <p>2.2.10 Chaotic Social Spider Algorithm 34</p> <p>2.2.11 Proposed Task Scheduling Algorithm 35</p> <p>2.2.12 Simulation and Results 36</p> <p>2.2.12.1 Calculation of Makespan 36</p> <p>2.2.12.2 Calculation of Energy Consumption 37</p> <p>2.3 Conclusion 37</p> <p>References 38</p> <p><b>3 Time and Cost-Effective Multi-Objective Scheduling Technique for Cloud Computing Environment 41<br /> </b><i>Aida A. Nasr, Kalka Dubey, Nirmeen El-Bahnasawy, Gamal Attiya and Ayman El-Sayed</i></p> <p>3.1 Introduction 42</p> <p>3.2 Literature Survey 44</p> <p>3.3 Cloud Computing and Cloudlet Scheduling Problem 46</p> <p>3.4 Problem Formulation 47</p> <p>3.5 Cloudlet Scheduling Techniques 49</p> <p>3.5.1 Heuristic Methods 50</p> <p>3.5.2 Meta-Heuristic Methods 51</p> <p>3.6 Cloudlet Scheduling Approach (CSA) 52</p> <p>3.6.1 Proposed CSA 52</p> <p>3.6.2 Time Complexity 53</p> <p>3.6.3 Case Study 54</p> <p>3.7 Simulation Results 56</p> <p>3.7.1 Simulation Environment 56</p> <p>3.7.2 Evaluation Metrics 56</p> <p>3.7.2.1 Performance Evaluation with Small Number of Cloudlets 57</p> <p>3.7.2.2 Performance Evaluation with Large Number of Cloudlets 57</p> <p>3.8 Conclusion 64</p> <p>References 64</p> <p><b>4 Cloud-Based Architecture for Effective Surveillance and Diagnosis of COVID- 19 69<br /> </b><i>Shweta Singh, Aditya Bhardwaj, Ishan Budhiraja, Umesh Gupta and Indrajeet Gupta</i></p> <p>4.1 Introduction 70</p> <p>4.2 Related Work 71</p> <p>4.2.1 Proposed Cloud-Based Network for Management of COVID- 19 73</p> <p>4.3 Research Methodology 75</p> <p>4.3.1 Sample Size and Target 76</p> <p>4.3.1.1 Sampling Procedures 77</p> <p>4.3.1.2 Response Rate 77</p> <p>4.3.1.3 Instrument and Measures 77</p> <p>4.3.2 Reliability and Validity Test 78</p> <p>4.3.3 Exploratory Factor Analysis 78</p> <p>4.4 Survey Findings 80</p> <p>4.4.1 Outcomes of the Proposed Scenario 82</p> <p>4.4.1.1 Online Monitoring 82</p> <p>4.4.1.2 Location Tracking 82</p> <p>4.4.1.3 Alarm Linkage 82</p> <p>4.4.1.4 Command and Control 82</p> <p>4.4.1.5 Plan Management 82</p> <p>4.4.1.6 Security Privacy 83</p> <p>4.4.1.7 Remote Maintenance 83</p> <p>4.4.1.8 Online Upgrade 83</p> <p>4.4.1.9 Command Management 83</p> <p>4.4.1.10 Statistical Decision 83</p> <p>4.4.2 Experimental Setup 83</p> <p>4.5 Conclusion and Future Scope 85</p> <p>References 86</p> <p><b>5 Smart Agriculture Applications Using Cloud and IoT 89<br /> </b><i>Keshav Kaushik</i></p> <p>5.1 Role of IoT and Cloud in Smart Agriculture 89</p> <p>5.2 Applications of IoT and Cloud in Smart Agriculture 94</p> <p>5.3 Security Challenges in Smart Agriculture 97</p> <p>5.4 Open Research Challenges for IoT and Cloud in Smart Agriculture 100</p> <p>5.5 Conclusion 103</p> <p>References 103</p> <p><b>6 Applications of Federated Learning in Computing Technologies 107<br /> </b><i>Sambit Kumar Mishra, Kotipalli Sindhu, Mogaparthi Surya Teja, Vutukuri Akhil, Ravella Hari Krishna, Pakalapati Praveen and Tapas Kumar Mishra</i></p> <p>6.1 Introduction 108</p> <p>6.1.1 Federated Learning in Cloud Computing 108</p> <p>6.1.1.1 Cloud-Mobile Edge Computing 109</p> <p>6.1.1.2 Cloud Edge Computing 111</p> <p>6.1.2 Federated Learning in Edge Computing 112</p> <p>6.1.2.1 Vehicular Edge Computing 113</p> <p>6.1.2.2 Intelligent Recommendation 113</p> <p>6.1.3 Federated Learning in IoT (Internet of Things) 114</p> <p>6.1.3.1 Federated Learning for Wireless Edge Intelligence 114</p> <p>6.1.3.2 Federated Learning for Privacy Protected Information 115</p> <p>6.1.4 Federated Learning in Medical Computing Field 116</p> <p>6.1.4.1 Federated Learning in Medical Healthcare 117</p> <p>6.1.4.2 Data Privacy in Healthcare 117</p> <p>6.1.5 Federated Learning in Blockchain 118</p> <p>6.1.5.1 Blockchain-Based Federated Learning Against End-Point Adversarial Data 118</p> <p>6.2 Advantages of Federated Learning 119</p> <p>6.3 Conclusion 119</p> <p>References 119</p> <p><b>7 Analyzing the Application of Edge Computing in Smart Healthcare 121<br /> </b><i>Parul Verma and Umesh Kumar</i></p> <p>7.1 Internet of Things (IoT) 122</p> <p>7.1.1 IoT Communication Models 122</p> <p>7.1.2 IoT Architecture 124</p> <p>7.1.3 Protocols for IoT 125</p> <p>7.1.3.1 Physical/Data Link Layer Protocols 125</p> <p>7.1.3.2 Network Layer Protocols 127</p> <p>7.1.3.3 Transport Layer Protocols 128</p> <p>7.1.3.4 Application Layer Protocols 129</p> <p>7.1.4 IoT Applications 130</p> <p>7.1.5 IoT Challenges 132</p> <p>7.2 Edge Computing 133</p> <p>7.2.1 Cloud vs. Fog vs. Edge 134</p> <p>7.2.2 Existing Edge Computing Reference Architecture 135</p> <p>7.2.2.1 FAR-EDGE Reference Architecture 135</p> <p>7.2.2.2 Intel-SAP Joint Reference Architecture (RA) 135</p> <p>7.2.3 Integrated Architecture for IoT and Edge 136</p> <p>7.2.4 Benefits of Edge Computing Based IoT Architecture 138</p> <p>7.3 Edge Computing and Real Time Analytics in Healthcare 140</p> <p>7.4 Edge Computing Use Cases in Healthcare 148</p> <p>7.5 Future of Healthcare and Edge Computing 151</p> <p>7.6 Conclusion 151</p> <p>References 152</p> <p><b>8 Fog-IoT Assistance-Based Smart Agriculture Application 157<br /> </b><i>Pawan Whig, Arun Velu and Rahul Reddy Nadikattu</i></p> <p>8.1 Introduction 158</p> <p>8.1.1 Difference Between Fog and Edge Computing 159</p> <p>8.1.1.1 Bandwidth 163</p> <p>8.1.1.2 Confidence 164</p> <p>8.1.1.3 Agility 164</p> <p>8.1.2 Relation of Fog with IoT 165</p> <p>8.1.3 Fog Computing in Agriculture 167</p> <p>8.1.4 Fog Computing in Smart Cities 169</p> <p>8.1.5 Fog Computing in Education 170</p> <p>8.1.6 Case Study 171</p> <p>Conclusion and Future Scope 173</p> <p>References 173</p> <p><b>9 Internet of Things in the Global Impacts of COVID-19: A Systematic Study 177<br /> </b><i>Shalini Sharma Goel, Anubhav Goel, Mohit Kumar and Sachin Sharma</i></p> <p>9.1 Introduction 178</p> <p>9.2 COVID-19 – Misconceptions 181</p> <p>9.3 Global Impacts of COVID-19 and Significant Contributions of IoT in Respective Domains to Counter the Pandemic 183</p> <p>9.3.1 Impact on Healthcare and Major Contributions of IoT 183</p> <p>9.3.2 Social Impacts of COVID-19 and Role of IoT 187</p> <p>9.3.3 Financial and Economic Impact and How IoT Can Help to Shape Businesses 188</p> <p>9.3.4 Impact on Education and Part Played by IoT 191</p> <p>9.3.5 Impact on Climate and Environment and Indoor Air Quality Monitoring Using IoT 194</p> <p>9.3.6 Impact on Travel and Tourism and Aviation Industry and How IoT is Shaping its Future 197</p> <p>9.4 Conclusions 198</p> <p>References 198</p> <p><b>10 An Efficient Solar Energy Management Using IoT-Enabled Arduino-Based MPPT Techniques 205<br /> </b><i>Rita Banik and Ankur Biswas</i></p> <p>List of Symbols 206</p> <p>10.1 Introduction 206</p> <p>10.2 Impact of Irradiance on PV Efficiency 210</p> <p>10.2.1 PV Reliability and Irradiance Optimization 211</p> <p>10.2.1.1 PV System Level Reliability 211</p> <p>10.2.1.2 PV Output with Varying Irradiance 211</p> <p>10.2.1.3 PV Output with Varying Tilt 212</p> <p>10.3 Design and Implementation 212</p> <p>10.3.1 The DC to DC Buck Converter 215</p> <p>10.3.2 The Arduino Microcontroller 217</p> <p>10.3.3 Dynamic Response 219</p> <p>10.4 Result and Discussions 220</p> <p>10.5 Conclusions 223</p> <p>References 224</p> <p><b>11 Axiomatic Analysis of Pre-Processing Methodologies Using Machine Learning in Text Mining: A Social Media Perspective in Internet of Things 229<br /> </b><i>Tajinder Singh, Madhu Kumari, Daya Sagar Gupta and Nikolai Siniak</i></p> <p>11.1 Introduction 230</p> <p>11.2 Text Pre-Processing – Role and Characteristics 232</p> <p>11.3 Modern Pre-Processing Methodologies and Their Scope 234</p> <p>11.4 Text Stream and Role of Clustering in Social Text Stream 241</p> <p>11.5 Social Text Stream Event Analysis 242</p> <p>11.6 Embedding 244</p> <p>11.6.1 Type of Embeddings 244</p> <p>11.7 Description of Twitter Text Stream 250</p> <p>11.8 Experiment and Result 251</p> <p>11.9 Applications of Machine Learning in IoT (Internet of Things) 251</p> <p>11.10 Conclusion 252</p> <p>References 252</p> <p><b>12 APP-Based Agriculture Information System for Rural Farmers in India 257<br /> </b><i>Ashwini Kumar, Dilip Kumar Choubey, Manish Kumar and Santosh Kumar</i></p> <p>12.1 Introduction 258</p> <p>12.2 Motivation 259</p> <p>12.3 Related Work 260</p> <p>12.4 Proposed Methodology and Experimental Results Discussion 262</p> <p>12.4.1 Mobile Cloud Computing 266</p> <p>12.4.2 XML Parsing and Computation Offloading 266</p> <p>12.4.3 Energy Analysis for Computation Offloading 267</p> <p>12.4.4 Virtual Database 269</p> <p>12.4.5 App Engine 270</p> <p>12.4.6 User Interface 272</p> <p>12.4.7 Securing Data 273</p> <p>12.5 Conclusion and Future Work 274</p> <p>References 274</p> <p><b>13 SSAMH – A Systematic Survey on AI-Enabled Cyber Physical Systems in Healthcare 277<br /> </b><i>Kamalpreet Kaur, Renu Dhir and Mariya Ouaissa</i></p> <p>13.1 Introduction 278</p> <p>13.2 The Architecture of Medical Cyber-Physical Systems 278</p> <p>13.3 Artificial Intelligence-Driven Medical Devices 282</p> <p>13.3.1 Monitoring Devices 282</p> <p>13.3.2 Delivery Devices 283</p> <p>13.3.3 Network Medical Device Systems 283</p> <p>13.3.4 IT-Based Medical Device Systems 284</p> <p>13.3.5 Wireless Sensor Network-Based Medical Driven Systems 285</p> <p>13.4 Certification and Regulation Issues 285</p> <p>13.5 Big Data Platform for Medical Cyber-Physical Systems 286</p> <p>13.6 The Emergence of New Trends in Medical Cyber-Physical Systems 288</p> <p>13.7 Eminence Attributes and Challenges 289</p> <p>13.8 High-Confidence Expansion of a Medical Cyber-Physical Expansion 290</p> <p>13.9 Role of the Software Platform in the Interoperability of Medical Devices 291</p> <p>13.10 Clinical Acceptable Decision Support Systems 291</p> <p>13.11 Prevalent Attacks in the Medical Cyber-Physical Systems 292</p> <p>13.12 A Suggested Framework for Medical Cyber-Physical System 294</p> <p>13.13 Conclusion 295</p> <p>References 296</p> <p><b>14 ANN-Aware Methanol Detection Approach with CuO-Doped SnO 2 in Gas Sensor 299<br /> </b><i>Jitendra K. Srivastava, Deepak Kumar Verma, Bholey Nath Prasad and Chayan Kumar Mishra</i></p> <p>14.1 Introduction 300</p> <p>14.1.1 Basic ANN Model 300</p> <p>14.1.2 ANN Data Pre- and Post-Processing 303</p> <p>14.1.2.1 Activation Function 304</p> <p>14.2 Network Architectures 305</p> <p>14.2.1 Feed Forward ANNs 305</p> <p>14.2.2 Recurrent ANNs Topologies 307</p> <p>14.2.3 Learning Processes 308</p> <p>14.2.3.1 Supervised Learning 308</p> <p>14.2.3.2 Unsupervised Learning 308</p> <p>14.2.4 ANN Methodology 309</p> <p>14.2.5 1%CuO–Doped SnO 2 Sensor for Methanol 309</p> <p>14.2.6 Experimental Result 311</p> <p>References 327</p> <p><b>15 Detecting Heart Arrhythmias Using Deep Learning Algorithms 331<br /> </b><i>Dilip Kumar Choubey, Chandan Kumar Jha, Niraj Kumar, Neha Kumari and Vaibhav Soni</i></p> <p>15.1 Introduction 332</p> <p>15.1.1 Deep Learning 333</p> <p>15.2 Motivation 334</p> <p>15.3 Literature Review 334</p> <p>15.4 Proposed Approach 366</p> <p>15.4.1 Dataset Descriptions 367</p> <p>15.4.2 Algorithms Description 369</p> <p>15.4.2.1 Dense Neural Network 369</p> <p>15.4.2.2 Convolutional Neural Network 370</p> <p>15.4.2.3 Long Short-Term Memory 372</p> <p>15.5 Experimental Results of Proposed Approach 376</p> <p>15.6 Conclusion and Future Scope 379</p> <p>References 380</p> <p><b>16 Artificial Intelligence Approach for Signature Detection 387<br /> </b><i>Amar Shukla, Rajeev Tiwari, Saurav Raghuvanshi, Shivam Sharma and Shridhar Avinash</i></p> <p>16.1 Introduction 387</p> <p>16.2 Literature Review 390</p> <p>16.3 Problem Definition 392</p> <p>16.4 Methodology 392</p> <p>16.4.1 Data Flow Process 394</p> <p>16.4.2 Algorithm 395</p> <p>16.5 Result Analysis 397</p> <p>16.6 Conclusion 399</p> <p>References 399</p> <p><b>17 Comparison of Various Classification Models Using Machine Learning to Predict Mobile Phones Price Range 401<br /> </b><i>Chinu Singla and Chirag Jindal</i></p> <p>17.1 Introduction 402</p> <p>17.2 Materials and Methods 403</p> <p>17.2.1 Dataset 403</p> <p>17.2.2 Decision Tree 403</p> <p>17.2.2.1 Basic Algorithm 404</p> <p>17.2.3 Gaussian Naive Bayes (GNB) 404</p> <p>17.2.3.1 Basic Algorithm 405</p> <p>17.2.4 Support Vector Machine 405</p> <p>17.2.4.1 Basic Algorithm 406</p> <p>17.2.5 Logistic Regression (LR) 407</p> <p>17.2.5.1 Basic Algorithm 407</p> <p>17.2.6 K-Nearest Neighbor 408</p> <p>17.2.6.1 Basic Algorithm 409</p> <p>17.2.7 Evaluation Metrics 409</p> <p>17.3 Application of the Model 410</p> <p>17.3.1 Decision Tree (DT) 411</p> <p>17.3.2 Gaussian Naive Bayes 411</p> <p>17.3.3 Support Vector Machine 412</p> <p>17.3.4 Logistic Regression 412</p> <p>17.3.5 K Nearest Neighbor 413</p> <p>17.4 Results and Comparison 413</p> <p>17.5 Conclusion and Future Scope 418</p> <p>References 418</p> <p>Index 421</p>
<p><b>Danda B Rawat, PhD, </b>is a Full Professor in the Department of Electrical Engineering & Computer Science (EECS), Founder and Director of the Howard University Data Science and Cybersecurity Center, Director of DoD Center of Excellence in Artificial Intelligence & Machine Learning, Director of Cyber-security and Wireless Networking Innovations Research Lab, Graduate Program Director of Howard CS Graduate Programs, and Director of Graduate Cybersecurity Certificate Program at Howard University, Washington, DC, USA. Dr. Rawat has published more than 250 scientific/technical articles and 11 books. <p><b>Lalit K Awasthi, PhD, </b>is the Director of Dr. B. R. Ambedkar National Institute of Technology Jalandhar, India). He received his PhD degree from the Indian Institute of Technology Roorkee in computer science and engineering. He has published more than 150 research papers in various journals and conferences of international repute and guided many PhDs in these areas. <p><b>Valentina E Ballas, PhD, </b>is a<b> </b>Full Professor in the Department of Automatics and Applied Software at the Faculty of Engineering, “Aurel Vlaicu” University of Arad, Romania. Dr. Ballas is the author of more than 280 research papers in refereed journals and international conferences. She is the Editor-in-Chief <i>of International Journal of Advanced Intelligence Paradigms </i>and <i>International Journal of Computational Systems Engineering</i>. <p><b>Mohit Kumar, PhD, </b>is an assistant professor in the Department of Information Technology at Dr. B R Ambedkar National Institute of Technology, Jalandhar, India. He received his PhD degree from the Indian Institute of Technology Roorkee in the field of cloud computing in 2018. His research topics cover the areas of cloud computing, fog computing, edge computing, Internet of Things, soft computing, and blockchain. He has published more than 25 research articles in international journals and conferences. <p><b>Jitendra Kumar Samriya, PhD, </b>has a<b> </b>faculty position in the Department of Information Technology, Dr. B.R. Ambedkar National Institute of Technology, Jalandhar. His research interest is cloud computing, artificial intelligence, and multi-objective evolutionary optimization techniques. He has published 15 research articles in international journals and has published five Indian and international patents.
<p><b>This book covers the foundations and applications of cloud computing, AI, and Big Data and analyses their convergence for improved development and services.</b> <p>The 17 chapters of the book masterfully and comprehensively cover the intertwining concepts of artificial intelligence, cloud computing, and big data, all of which have recently emerged as the next-generation paradigms. There has been rigorous growth in their applications and the hybrid blend of AI Cloud and IoT (Ambient-intelligence technology) also relies on input from wireless devices. Despite the multitude of applications and advancements, there are still some limitations and challenges to overcome, such as security, latency, energy consumption, service allocation, healthcare services, network lifetime, etc. <i>Convergence of Cloud with AI for Big Data Analytics: Foundations and Innovation</i> details all these technologies and how they are related to state-of-the-art applications, and provides a comprehensive overview for readers interested in advanced technologies, identifying the challenges, proposed solutions, as well as how to enhance the framework. <p><b>Audience</b> <p>Researchers and post-graduate students in computing as well as engineers and practitioners in software engineering, electrical engineers, data analysts, and cyber security professionals.

Diese Produkte könnten Sie auch interessieren:

Visualize This
Visualize This
von: Nathan Yau
PDF ebook
28,99 €
Visualize This
Visualize This
von: Nathan Yau
EPUB ebook
28,99 €
AI for Humanity
AI for Humanity
von: Andeed Ma, James Ong, Siok Siok Tan
EPUB ebook
26,99 €