دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Hiren Kumar Thakkar, Chinmaya Kumar Dehury, Prasan Kumar Sahoo, Bharadwaj Veeravalli سری: ISBN (شابک) : 303118033X, 9783031180330 ناشر: Springer سال نشر: 2023 تعداد صفحات: 251 [252] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 6 Mb
در صورت تبدیل فایل کتاب Predictive Analytics in Cloud, Fog, and Edge Computing: Perspectives and Practices of Blockchain, IoT, and 5G به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تجزیه و تحلیل پیش بینی در رایانش ابری، مه، و لبه: دیدگاه ها و عملکردهای بلاک چین، اینترنت اشیا و 5G نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب ارتباط فناوریهای اخیر (مانند بلاک چین، اینترنت اشیا، و 5G) را با محاسبات ابری و همچنین محاسبات مه، و محاسبات لبه تلفن همراه را پوشش میدهد. این رابطه تنها به پیشنهاد معماری، روندها و پیشرفت های فنی محدود نخواهد شد. با این حال، این کتاب همچنین امکان تجزیه و تحلیل پیشبینیکننده در رایانش ابری با توجه به بلاک چین، اینترنت اشیا و 5G را بررسی میکند. پیشرفتهای اخیر در محاسبات توزیعشده با پشتیبانی از اینترنت، یعنی محاسبات ابری، پردازش حجم عمده دادهها را به صورت موازی و توزیع شده ممکن کرده است. این باعث شده است که پردازش داده های تولید شده از فناوری هایی مانند بلاک چین، اینترنت اشیا و 5G به یک فناوری پرسود تبدیل شود. با این حال، چندین مشکل وجود دارد که ارائهدهنده خدمات ابری (CSP) با آن مواجه میشود، مانند امنیت بلاک چین در ابر، انعطاف پذیری اینترنت اشیاء و مدیریت مقیاسپذیری در ابر، انطباق با توافقنامه سطح سرویس (SLA) برای 5G، مدیریت منابع، تعادل بار و تحمل خطا. . این کتاب ویرایش شده در مورد مسائل ذکر شده در ارتباط با بلاک چین، اینترنت اشیا و 5G بحث خواهد کرد.
علاوه بر این، این کتاب به این موضوع میپردازد که چگونه رایانش ابری کافی نیست و نیاز به استفاده از مه است. محاسبات و محاسبات لبه برای پردازش موثر داده های تولید شده از اینترنت اشیا و 5G. علاوه بر این، این کتاب نشان میدهد که چگونه شهر هوشمند، سیستم مراقبت بهداشتی هوشمند و جوامع هوشمند تعداد کمی از مرتبطترین برنامههای IoT هستند که محاسبات مه نقش مهمی را ایفا میکند. این کتاب در مورد محدودیت محاسبات مه و نیاز به محاسبات لبه برای کاهش بیشتر تأخیر شبکه برای پردازش دادههای جریان از دستگاههای IoT بحث میکند.
این کتاب همچنین قدرت تجزیه و تحلیل پیشبینیکننده بلاک چین را بررسی میکند. داده های اینترنت اشیا و 5G در رایانش ابری با فناوری های خواهر خود. از آنجایی که میزان منابع روز به روز افزایش مییابد، ابزارهای هوش مصنوعی (AI) به دلیل قابلیتهایی که دارند، محبوبتر میشوند و میتوانند در حل مسائل مختلف مانند به حداقل رساندن مصرف انرژی سرورهای فیزیکی، بهینهسازی سرویس مورد استفاده قرار گیرند. هزینه، بهبود کیفیت تجربه، افزایش در دسترس بودن خدمات، مدیریت کارآمد جریان عظیم داده، مدیریت تعداد زیادی از دستگاه های اینترنت اشیا و غیره.This book covers the relationship of recent technologies (such as Blockchain, IoT, and 5G) with the cloud computing as well as fog computing, and mobile edge computing. The relationship will not be limited to only architecture proposal, trends, and technical advancements. However, the book also explores the possibility of predictive analytics in cloud computing with respect to Blockchain, IoT, and 5G. The recent advancements in the internet-supported distributed computing i.e. cloud computing, has made it possible to process the bulk amount of data in a parallel and distributed. This has made it a lucrative technology to process the data generated from technologies such as Blockchain, IoT, and 5G. However, there are several issues a Cloud Service Provider (CSP) encounters, such as Blockchain security in cloud, IoT elasticity and scalability management in cloud, Service Level Agreement (SLA) compliances for 5G, Resource management, Load balancing, and Fault-tolerance. This edited book will discuss the aforementioned issues in connection with Blockchain, IoT, and 5G.
Moreover, the book discusses how the cloud computing is not sufficient and one needs to use fog computing, and edge computing to efficiently process the data generated from IoT, and 5G. Moreover, the book shows how smart city, smart healthcare system, and smart communities are few of the most relevant IoT applications where fog computing plays a significant role. The book discusses the limitation of fog computing and the need for the edge computing to further reduce the network latency to process streaming data from IoT devices.
The book also explores power of predictive analytics of Blockchain, IoT, and 5G data in cloud computing with its sister technologies. Since, the amount of resources increases day-by day, artificial intelligence (AI) tools are becoming more popular due to their capability which can be used in solving wide variety of issues, such as minimize the energy consumption of physical servers, optimize the service cost, improve the quality of experience, increase the service availability, efficiently handle the huge data flow, manages the large number of IoT devices, etc.Preface Acknowledgement Contents Collaboration of IoT and Cloud Computing Towards HealthcareSecurity 1 Introduction 2 Inspiration 3 Related Work and Background 4 Cloud Computing Deployment Models 4.1 Public Internet 4.2 Corporate Cloud 4.3 Cloud Hybrid 4.4 Cloud Provider 5 Utility Computing Service Models 5.1 Software as a Service (SaaS) 5.2 Infrastructure as a Service (IaaS) 5.3 Platform as a Service (PaaS) 6 Security Issues 7 Threats in Cloud Computing 7.1 Compromised Identities and Broken Security 7.2 Data Infringement 7.3 Hacked Frontier and APIs 7.4 Manipulated System Vulnerabilities 7.5 Permanent Data Loss 7.6 Inadequate Assiduity 7.7 Cloud Service Inattention 7.8 DoS Attacks 7.9 Security Challenges in Cloud Infrastructure 7.9.1 Security Challenges 7.9.2 Challenges of Deployed Models 7.9.3 Resource Pooling 7.9.4 Unencrypted Data 7.9.5 Identity Management and Authentication 7.9.6 Network Issues 7.10 Point at Issue in the IoT Health Care Framework 7.10.1 Reliability 7.10.2 Discretion 7.10.3 Solitude 7.10.4 Unintended Efforts 7.11 Challenges 7.11.1 Security 7.11.2 Confidentiality 7.11.3 Assimilation 7.11.4 Business Illustration 7.12 Dispensing Refined Patient Supervision 7.13 Character of IoT in Healthcare 7.14 Conclusion 7.15 Future Work References Robust, Reversible Medical Image Watermarking for Transmission of Medical Images over Cloud in Smart IoT Healthcare 1 Introduction 2 Related Work 3 Proposed Work 3.1 EHR Insertion (Embedding) and Retrieval (Extraction) 3.2 EHR Encryption and Decryption 4 Experimental Results and Discussion 5 Conclusions References The Role of Blockchain in Cloud Computing 1 Blockchain 1.1 Introduction 1.2 Characteristics 1.2.1 Immutability 1.2.2 Distributed 1.2.3 Enhanced Security 1.2.4 Distributed Ledgers 1.2.5 Faster Settlement 1.2.6 Working of Blockchain 1.3 Major Implementations 1.3.1 Cryptocurrencies 1.3.2 Smart Contracts 1.3.3 Monetary Services 1.3.4 Games 1.4 Blockchain Types 1.5 There Are Mainly 4 Types of Blockchain as Shown in Table 1 1.5.1 Public Blockchain Networks 1.5.2 Exclusive Blockchain Networks 1.5.3 Hybrid Blockchain Networks 1.5.4 Consortium Networks 1.6 Advantages 1.6.1 Secure 1.6.2 There Will Be No Intervention from Third Parties 1.6.3 Safe Transactions 1.6.4 Automation 1.7 Disadvantages 1.7.1 High Implementation Cost 1.7.2 Incompetency 1.7.3 Private Keys 1.7.4 Storage Capacity 2 Cloud Computing 2.1 What Is Cloud Computing? 2.2 Deployment Models in Cloud 2.2.1 Public Cloud 2.2.2 Private Cloud 2.2.3 Hybrid Cloud 2.2.4 Community Cloud 2.3 Implementations of Cloud Computing 2.3.1 Web Based Services 2.3.2 Software as a Service 2.3.3 Infrastructure as a Service 2.3.4 Platform as a Service 2.4 Comparison of Cloud Computing Model with Traditional Model 2.4.1 Persistency 2.4.2 Automation 2.4.3 Cost 2.4.4 Security 2.5 Advantages of Cloud Computing 2.5.1 Cost Efficiency 2.5.2 Backup and Recovery 2.5.3 Integration of Software 2.5.4 Information Availability 2.5.5 Deployment 2.5.6 Easier Scale for Services and Delivery of New Services 2.6 Challenges of Cloud Computing 2.6.1 Technical Problems 2.6.2 Certainty 2.6.3 Vulnerable Attacks 2.6.4 Suspension 2.6.5 Inflexibility 2.6.6 Lack of Assistance 2.7 Integration of Cloud Computing with Block Chain 2.7.1 The Advantages of Combining Cloud and Blockchain Technology 2.7.2 Blockchain Support for Cloud Computing 2.7.3 Deduplication of Data in the Cloud with Blockchain 2.7.4 Access Control Based on Blockchain in Cloud References Analysis and Prediction of Plant Growth in a Cloud-Based Smart Sensor Controlled Environment 1 Introduction 2 Literature Survey 3 IoT in Greenhouse 3.1 Architecture 3.2 Cloud Implementation 3.3 Hardware Components (Fig. 2) 4 System Overview 4.1 Dataset 4.2 Data Preprocessing 4.3 LightGBM 4.4 Training and Building the Model 5 Results and Explanation 6 Conclusion References Cloud-Based IoT Controlled System Model for Plant DiseaseMonitoring 1 Introduction 2 Literature Survey 3 IoT Controlled Device 4 Cloud Architecture 5 Methodology 5.1 HOG Filter 6 Experimental Analysis 6.1 Analysis Using Artificial Neural Network 6.2 Analysis Using Convolutional Neural Network 7 Conclusion References Design and Usage of a Digital E-Pharmacy Application Framework 1 Introduction 2 Literature Survey 3 Utilization of Cloud in Health Care 4 Redefining E-Pharmacy Domain 5 Impact of Cloud Computing in Pharmacy 6 Model Design and Implementation 7 Basic Structure of the Cloud Based E-Pharmacy Application 8 Security Provided by the Application 8.1 XSS Security (Cross Site Scripting) 8.2 CSRF Token (Cross Site Request Forgery) 8.3 SQL Injection Security 8.4 User Upload Security 9 Results and Discussion 10 Important Features of the Application 11 Critical Goals of the Application 12 Benefits of the Model 13 Summary/Conclusion References Serverless Data Pipelines for IoT Data Analytics: A Cloud Vendors Perspective and Solutions 1 Introduction 1.1 Motivation 1.2 Contributions 2 Background 2.1 Internet of Things 2.2 Serverless Data Pipelines for IoT Data Processing 3 Literature Survey 4 Cloud Service Providers (CSP) and IoT Solutions 4.1 Edge Tier 4.1.1 Comparison of AWS IoT Greengrass and Azure IoT Edge 4.2 Cloud Tier 5 Real-Time IoT Application: Predictive Maintenance of Industrial Motor 6 Building SDP for Predictive Maintenance Application 6.1 Proposed Serverless Data Pipelines 6.1.1 Building an Anomaly Detection Model 6.2 SDP Using AWS and Microsoft Azure 7 Experiments and Results 7.1 Performance Metrics 7.2 Experimental Setup 7.3 Results and Discussions 8 Conclusions References Integration of Predictive Analytics and Cloud Computing for Mental Health Prediction 1 Introduction 2 Method of Approach 2.1 Overview of the Subject 2.1.1 Supervised Learning 2.1.2 Unsupervised Learning 2.2 Selection of Papers 2.3 Literature Search Strategy 2.4 Study Selection 2.5 Data Extraction and Analysis 3 Introduction to Mental Health Research 3.1 Machine Learning in Big Data 3.2 Deep Learning in Healthcare 3.3 Natural Language Processing 4 The Pipeline of Data Flows from the Sensors to the Algorithmic Approach 4.1 Sensor Data 4.2 Extraction of Features 4.3 Designing the Behavioural Markers 4.4 Clinical Target 5 Cloud Computing 5.1 Architecture of Cloud Computing 5.2 Benefits of Cloud Computing in the Healthcare Industry 5.3 Cloud Computing as a Solution to Mental Health Issues 6 Review of Personal Sensing Research 7 Result of the Research 7.1 Limitations of the Study Done on the Algorithms to Detect Mental Health 7.2 Results Based on iCBT Test 8 Discussion 9 Conclusion References Impact of 5G Technologies on Cloud Analytics 1 Introduction 2 Self-Organizing Next Generation Network Data Analytics in the Cloud 2.1 What Is Network Data Analytics? 2.2 Benefits of Network Data Analytics 2.3 The Best Uses of Network Data Analytics 2.4 The Near Future 2.5 The Opportunities 3 Intelligent 5G Network Estimation Techniques in the Cloud 3.1 Network Estimation Technique 3.2 Literature Review 4 5G-cloud Integration: Intelligent Security Protocol and Analytics 4.1 Scope 4.2 5G Cloud Threat 4.3 5G-Cloud Integration 4.4 Advantages of Security Capabilities 5 5G, Fog and Edge Based Approaches for Predictive Analytics 5.1 Introduction 5.2 Literature Review 6 5G and Beyond in Cloud, Edge, and Fog Computing 6.1 Edge Computing 6.2 Cloud Computing 6.3 5G and Beyond 7 AI-Enabled Next Generation 6G Wireless Communication 7.1 Computation Efficiency and Accuracy 7.2 Hardware Development 7.3 Types 6 G Wireless Communication 7.4 6G Wireless Access Use Case References IoT Based ECG-SCG Big Data Analysis Framework for Continuous Cardiac Health Monitoring in Cloud Data Centers 1 Introduction 2 Related Work 3 Proposed Cardiac Big Data Analysis Framework 3.1 ECG/SCG Data Collection Framework 3.2 Data Processing and Analysis Framework 3.3 MapReduce Based Cardiac Big Data Processing Model 4 Evaluation Results 5 Conclusion and Future Works References A Workload-Aware Data Placement Scheme for Hadoop-Enabled MapReduce Cloud Data Centers 1 Introduction 2 Related Works 3 Problem Description 4 Proposed Protocol 4.1 System Model 5 Problem Formulation 5.1 Network Model 5.2 Task Processing Model 5.3 Workload Distribution 6 Data Locality Problem 7 Conclusion and Future Works References 5G Enabled Smart City Using Cloud Environment 1 Introduction 2 Technologies Used to Build the Smart City 2.1 Edge and Fog Computing 2.2 What Price Does 5G Provide for Fog Computing? 2.3 Cloud Computing 2.4 Internet of Things 3 SmartCity Architecture 4 Smart City Service Cases 4.1 Smart Grid 4.2 Smart Healthcare 4.3 Smart Transport 4.4 Smart Governance 4.5 Remote Monitoring 4.6 Event Detection 4.7 Emergency Response 4.8 Emotional Monitoring 4.9 Crowd Management 4.10 Flexible Building Materials 4.11 Environmental Monitoring 4.12 Smart Electrical Power Distribution 4.13 Smart Precision Agriculture 4.14 Animal Health Monitoring System 5 Case Study of Smart City 5.1 Barcelona 5.2 Smart Dubai Happiness Meter – Dubai, United Arab Emirates (UAE) 5.3 #SmartME 5.4 Urban Area Quality Index – Russian Federation 6 Challenges and Problems 6.1 Business Challenges 6.1.1 Planning 6.1.2 Stability 6.1.3 Market Source and Customer 6.1.4 Smart City Acquisition Costs 6.1.5 Cloud Computing Integration 6.2 Technical Challenges 6.2.1 Privacy 6.2.2 Data Analysis 6.2.3 Data Integration 6.2.4 Visualization based on GIS 6.2.5 Quality of Service 6.2.6 Computational Intelligence Algorithms for Smart City Big Data Analytics 7 Conclusion References Hardware Implementation for Spiking Neural Networkson Edge Devices 1 Introduction 2 The Spiking Neural Network (SNN) 2.1 The Leaky Integrate-and-Fire (LIF) Neuron Model 2.2 The Learning Algorithms 3 Hardware Accelerators for SNNs on the Edge 3.1 Optimizations that Exploit the Temporal Sparsity of SNN 3.2 Data and Memory-Centric Architectures 3.3 Flexible Hardware Architectures for SNN on the Edge 4 Algorithm Design 4.1 Synapse Pruning 4.2 Hybrid On/Off Chip Training 4.3 Quantization and Binarization 4.4 Time Step Reduction 5 SNN versus ANN for Edge Computing 5.1 Memory Consumption 5.2 Energy Consumption 6 Conclusions References