Preface |
|
xv | |
|
|
xxi | |
|
|
xxv | |
|
|
xxix | |
|
|
xxxi | |
|
1 Pattern Analysis of COVID-19 Death and Recovery Cases Data of Countries Using Greedy Biclustering Algorithm |
|
|
1 | (22) |
|
|
|
|
2 | (1) |
|
|
3 | (4) |
|
1.2.1 Greedy Approach: Bicluster Size Maximization Based Fitness Function |
|
|
4 | (1) |
|
|
5 | (2) |
|
1.3 Proposed Work: COVID 19 Pattern Identification Using Greedy Biclustering |
|
|
7 | (1) |
|
1.4 Results and Discussions |
|
|
8 | (10) |
|
|
18 | (1) |
|
|
18 | (5) |
|
|
18 | (5) |
|
2 Artificial Fish Swarm Optimization Algorithm with Hill Climbing Based Clustering Technique for Throughput Maximization in Wireless Multimedia Sensor Network |
|
|
23 | (20) |
|
|
|
|
|
|
24 | (3) |
|
2.2 The Proposed AFSA-HC Technique |
|
|
27 | (7) |
|
2.2.1 AFSA-HC Based Clustering Phase |
|
|
28 | (5) |
|
2.2.2 Deflate-Based Data Aggregation Phase |
|
|
33 | (1) |
|
2.2.3 Hybrid Data Transmission Phase |
|
|
34 | (1) |
|
2.3 Performance Validation |
|
|
34 | (6) |
|
|
40 | (3) |
|
|
40 | (3) |
|
3 Analysis of Machine Learning Techniques for Spam Detection |
|
|
43 | (20) |
|
|
|
|
44 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
3.4 Some Prevention Methods From User End |
|
|
46 | (2) |
|
3.4.1 Protect Email Addresses |
|
|
46 | (1) |
|
3.4.2 Preventing Spam from Being Sent |
|
|
47 | (1) |
|
3.4.3 Block Spam to be Delivered |
|
|
48 | (1) |
|
3.4.4 Identify and Separate Spam After Delivery |
|
|
48 | (1) |
|
3.4.4.1 Targeted Link Analysis |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
3.5 Machine Learning Algorithms |
|
|
48 | (3) |
|
|
48 | (1) |
|
3.5.2 Random Forests (RF) |
|
|
49 | (1) |
|
3.5.3 Support Vector Machine (SVM) |
|
|
49 | (1) |
|
3.5.4 Logistic Regression (LR) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (7) |
|
|
52 | (1) |
|
3.7.2 Experimental Results |
|
|
52 | (2) |
|
3.7.2.1 Cleaning Data by Removing Punctuations, White Spaces, and Stop Words |
|
|
54 | (1) |
|
3.7.2.2 Stemming the Messages |
|
|
55 | (1) |
|
3.7.2.3 Analyzing the Common Words from the Spam and Ham Messages |
|
|
55 | (1) |
|
3.7.3 Analyses of Machine Learning Algorithms |
|
|
55 | (1) |
|
3.7.3.1 Accuracy Score Before Stemming |
|
|
55 | (1) |
|
3.7.3.2 Accuracy Score After Stemming |
|
|
55 | (1) |
|
3.7.3.3 Splitting Dataset into Train and Test Data |
|
|
56 | (2) |
|
3.7.3.4 Mapping Confusion Matrix |
|
|
58 | (1) |
|
|
58 | (1) |
|
3.8 Conclusion and Future Work |
|
|
59 | (4) |
|
|
59 | (4) |
|
4 Smart Sensor Based Prognostication of Cardiac Disease Prediction Using Machine Learning Techniques |
|
|
63 | (18) |
|
|
|
|
64 | (1) |
|
|
65 | (2) |
|
|
67 | (1) |
|
4.4 Data Collection in IoT |
|
|
67 | (5) |
|
4.4.1 Fetching Data from Sensors |
|
|
68 | (1) |
|
4.4.2 K-Nearest Neighbor Classifier |
|
|
69 | (1) |
|
4.4.3 Random Forest Classifier |
|
|
70 | (1) |
|
4.4.4 Decision Tree Classifier |
|
|
70 | (1) |
|
4.4.5 Extreme Gradient Boost Classifier |
|
|
71 | (1) |
|
4.5 Results and Discussions |
|
|
72 | (6) |
|
|
78 | (1) |
|
|
78 | (3) |
|
|
78 | (3) |
|
5 Assimilate Machine Learning Algorithms in Big Data Analytics: Review |
|
|
81 | (34) |
|
|
|
|
|
82 | (4) |
|
|
86 | (3) |
|
|
89 | (3) |
|
|
92 | (3) |
|
|
95 | (1) |
|
|
95 | (1) |
|
5.7 The Device Learning Anatomy |
|
|
96 | (1) |
|
5.8 Machine Learning Technology Methods in Big Data Analytics |
|
|
97 | (1) |
|
|
97 | (1) |
|
5.10 Associated Investigations |
|
|
98 | (1) |
|
5.11 Multivariate Data Coterie in Machine Learning |
|
|
99 | (1) |
|
5.12 Machine Learning Algorithm |
|
|
99 | (7) |
|
5.12.1 Machine Learning Framework |
|
|
99 | (1) |
|
5.12.2 Parametric and Non-Parametric Techniques in Machine Learning |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
5.12.3 Parametric Techniques |
|
|
101 | (1) |
|
5.12.3.1 Linear Regression |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
5.12.3.4 Support Vector Machine |
|
|
102 | (1) |
|
|
102 | (1) |
|
5.12.3.6 K-Nearest Neighbor |
|
|
103 | (1) |
|
|
104 | (1) |
|
5.12.3.8 Linear Vector Quantization (LVQ) |
|
|
104 | (1) |
|
5.12.3.9 Transfer Learning |
|
|
104 | (1) |
|
5.12.4 Non-Parametric Techniques |
|
|
105 | (1) |
|
5.12.4.1 ff-Means Clustering |
|
|
105 | (1) |
|
5.12.4.2 Principal Component Analysis |
|
|
105 | (1) |
|
5.12.4.3 A Priori Algorithm |
|
|
105 | (1) |
|
5.12.4.4 Reinforcement Learning (RL) |
|
|
105 | (1) |
|
5.12.4.5 Semi-Supervised Learning |
|
|
106 | (1) |
|
5.13 Machine Learning Technology Assessment Parameters |
|
|
106 | (3) |
|
5.13.1 Ranking Performance |
|
|
106 | (1) |
|
5.13.2 Loss in Logarithmic Form |
|
|
106 | (1) |
|
5.13.3 Assessment Measures |
|
|
107 | (1) |
|
|
107 | (1) |
|
5.13.3.2 Precision/Specificity |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
5.13.4 Mean Definite Error (MAE) |
|
|
108 | (1) |
|
5.13.5 Mean Quadruple Error (MSE) |
|
|
108 | (1) |
|
5.14 Correlation of Outcomes of ML Algorithms |
|
|
109 | (1) |
|
|
109 | (3) |
|
5.15.1 Economical Facilities |
|
|
109 | (1) |
|
5.15.2 Business and Endorsement |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
5.15.8 Perception of the Device |
|
|
111 | (1) |
|
|
111 | (1) |
|
5.15.10 Mechanization or Realigning |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
112 | (3) |
|
|
113 | (2) |
|
6 Resource Allocation Methodologies in Cloud Computing: A Review and Analysis |
|
|
115 | (24) |
|
|
|
|
|
116 | (5) |
|
6.1.1 Cloud Services Models |
|
|
116 | (1) |
|
6.1.1.1 Infrastructure as a Service |
|
|
117 | (1) |
|
6.1.1.2 Platform as a Service |
|
|
118 | (1) |
|
6.1.1.3 Software as a Service |
|
|
118 | (1) |
|
6.1.2 Types of Cloud Computing |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
6.2 Resource Allocations in Cloud Computing |
|
|
121 | (2) |
|
|
122 | (1) |
|
|
122 | (1) |
|
6.3 Dynamic Resource Allocation Models in Cloud Computing |
|
|
123 | (7) |
|
6.3.1 Service-Level Agreement Based Dynamic Resource Allocation Models |
|
|
124 | (1) |
|
6.3.2 Market-Based Dynamic Resource Allocation Models |
|
|
125 | (1) |
|
6.3.3 Utilization-Based Dynamic Resource Allocation Models |
|
|
126 | (1) |
|
6.3.4 Task Scheduling in Cloud Computing |
|
|
127 | (3) |
|
|
130 | (1) |
|
6.5 Future Research Paths |
|
|
131 | (1) |
|
6.6 Advantages and Disadvantages |
|
|
131 | (4) |
|
|
135 | (4) |
|
|
135 | (4) |
|
7 Role of Machine Learning in Big Data |
|
|
139 | (26) |
|
|
|
Bhabani Shankar Prasad Mishra |
|
|
|
140 | (1) |
|
|
141 | (1) |
|
|
142 | (3) |
|
7.3.1 Batch Analysis Big Data Tools |
|
|
142 | (1) |
|
7.3.2 Stream Analysis Big Data Tools |
|
|
143 | (1) |
|
7.3.3 Interactive Analysis Big Data Tools |
|
|
144 | (1) |
|
7.4 Machine Learning Algorithms in Big Data |
|
|
145 | (6) |
|
7.5 Applications of Machine Learning in Big Data |
|
|
151 | (3) |
|
7.6 Challenges of Machine Learning in Big Data |
|
|
154 | (6) |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
160 | (5) |
|
|
161 | (4) |
|
8 Healthcare System for COVID-19: Challenges and Developments |
|
|
165 | (18) |
|
|
|
|
166 | (1) |
|
|
167 | (2) |
|
8.3 IoT with Architecture |
|
|
169 | (1) |
|
8.4 IoHT Security Requirements and Challenges |
|
|
170 | (2) |
|
8.5 COVID-19 (Coronavirus Disease 2019) |
|
|
172 | (1) |
|
8.6 The Potential of IoHT in COVID-19 Like Disease Control |
|
|
173 | (2) |
|
8.7 The Current Applications of IoHT During COVID-19 |
|
|
175 | (2) |
|
8.7.1 Using IoHT to Dissect an Outbreak |
|
|
175 | (1) |
|
8.7.2 Using IoHT to Ensure Compliance to Quarantine |
|
|
176 | (1) |
|
8.7.3 Using IoHT to Manage Patient Care |
|
|
176 | (1) |
|
8.8 IoHT Development for COVID-19 |
|
|
177 | (2) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (4) |
|
|
179 | (4) |
|
9 An Integrated Approach of Blockchain & Big Data in Health Care Sector |
|
|
183 | (24) |
|
|
|
|
|
|
|
184 | (1) |
|
9.2 Blockchain for Health care |
|
|
185 | (6) |
|
9.2.1 Healthcare data sharing through gem Network |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
9.2.4 PSN (Pervasive Social Network) System |
|
|
189 | (1) |
|
9.2.5 Healthcare Data Gateway |
|
|
190 | (1) |
|
9.2.6 Resources that are virtual |
|
|
190 | (1) |
|
9.3 Overview of Blockchain & Big data in health care |
|
|
191 | (3) |
|
9.3.1 Big Data in Healthcare |
|
|
191 | (1) |
|
9.3.2 Blockchain in Health Care |
|
|
192 | (1) |
|
9.3.3 Benefits of Blockchain in Healthcare |
|
|
193 | (1) |
|
9.3.3.1 Master patient indices |
|
|
193 | (1) |
|
9.3.3.2 Supply chain management |
|
|
193 | (1) |
|
9.3.3.3 Claims adjudication |
|
|
193 | (1) |
|
|
194 | (1) |
|
9.3.3.5 Single, longitudinal patient records |
|
|
194 | (1) |
|
9.4 Application of Big Data for Blockchain |
|
|
194 | (3) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
9.4.5 Online Accessing of Patient's Data |
|
|
196 | (1) |
|
9.4.6 Research as well as Development |
|
|
196 | (1) |
|
|
196 | (1) |
|
9.4.8 Due to privacy storing of off-chain data |
|
|
196 | (1) |
|
9.4.9 Collaboration of patient data |
|
|
197 | (1) |
|
9.5 Solutions of Blockchain For Big Data in Health Care |
|
|
197 | (1) |
|
9.6 Conclusion and Future Scope |
|
|
198 | (9) |
|
|
199 | (8) |
|
10 Cloud Resource Management for Network Cameras |
|
|
207 | (24) |
|
|
|
|
207 | (3) |
|
|
210 | (4) |
|
|
210 | (1) |
|
10.2.2 Resource Management on Cloud Environment |
|
|
210 | (3) |
|
10.2.3 Image and Video Analysis |
|
|
213 | (1) |
|
10.3 Cloud Resource Management Problems |
|
|
214 | (2) |
|
10.4 Cloud Resource Manager |
|
|
216 | (2) |
|
10.4.1 Evaluation of Performance |
|
|
217 | (1) |
|
10.4.2 View of Resource Requirements |
|
|
217 | (1) |
|
|
218 | (4) |
|
10.5.1 Analysis of Dynamic Bin Packing |
|
|
219 | (1) |
|
10.5.2 MinTotal DBP Problem |
|
|
220 | (2) |
|
10.6 Resource Monitoring and Scaling |
|
|
222 | (2) |
|
|
224 | (7) |
|
|
225 | (6) |
|
11 Software-Defined Networking for Healthcare Internet of Things |
|
|
231 | (18) |
|
|
|
231 | (2) |
|
11.2 Healthcare Internet of Things |
|
|
233 | (6) |
|
11.2.1 Challenges in H-IoT |
|
|
238 | (1) |
|
11.3 Software-Defined Networking |
|
|
239 | (4) |
|
11.4 Opportunities, challenges, and possible solutions |
|
|
243 | (2) |
|
|
245 | (4) |
|
|
246 | (3) |
|
12 Cloud Computing in the Public Sector: A Study |
|
|
249 | (22) |
|
|
|
|
250 | (1) |
|
12.2 History and Evolution of Cloud Computing |
|
|
251 | (1) |
|
12.3 Application of Cloud Computing |
|
|
252 | (6) |
|
12.4 Advantages of Cloud Computing |
|
|
258 | (5) |
|
|
263 | (6) |
|
|
269 | (2) |
|
13 Big Data Analytics: An overview |
|
|
271 | (18) |
|
|
|
|
271 | (1) |
|
|
272 | (6) |
|
13.2.1 Big Data: What Is It? |
|
|
275 | (1) |
|
13.2.1.1 Characteristics of Big Data |
|
|
276 | (1) |
|
13.2.2 Big Data Analytics: What Is It? |
|
|
277 | (1) |
|
|
278 | (1) |
|
13.4 Big Data Analytics Framework |
|
|
279 | (1) |
|
13.5 Big Data Analytics Techniques |
|
|
280 | (1) |
|
13.5.1 Partitioning on Big Data |
|
|
280 | (1) |
|
13.5.2 Sampling on Big Data |
|
|
281 | (1) |
|
13.5.3 Sampling-Based Approximation |
|
|
281 | (1) |
|
13.6 Big Social Data Analytics |
|
|
281 | (1) |
|
|
282 | (2) |
|
13.7.1 Manufacturing Production |
|
|
282 | (1) |
|
|
283 | (1) |
|
13.7.3 Outbreak of Flu Prediction from Social Site |
|
|
283 | (1) |
|
13.7.4 Sentiment Analysis of Twitter Data |
|
|
283 | (1) |
|
13.8 Electricity Price Forecasting |
|
|
284 | (1) |
|
13.9 Security Situational Analysis for Smart Grid |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
286 | (3) |
|
|
286 | (3) |
|
14 Video Usefulness Detection in Big Surveillance Systems |
|
|
289 | (20) |
|
|
|
|
290 | (2) |
|
14.1.1 Challenges of Video Usefulness Detection |
|
|
291 | (1) |
|
14.1.2 Video Usefulness Model |
|
|
292 | (1) |
|
|
292 | (3) |
|
14.2.1 (a) Quality of Video Services (QoS) |
|
|
292 | (2) |
|
|
294 | (1) |
|
14.3 Failure of Video Data in Video Surveillance Systems |
|
|
295 | (2) |
|
14.4 Approaches of Video Failure Detection |
|
|
297 | (1) |
|
14.5 Failure Detection and Scheduling |
|
|
298 | (3) |
|
14.5.1 Failure Detection Approaches in Domains |
|
|
298 | (1) |
|
14.5.1.1 Failure Detection in Fedge Domain |
|
|
298 | (2) |
|
14.5.1.2 Failure Detection in the Fuser Domain |
|
|
300 | (1) |
|
14.5.1.3 Failure Detection in the Fcloud Domain |
|
|
300 | (1) |
|
14.6 Methodological Analysis |
|
|
301 | (1) |
|
14.6.1 Test of Video Usefulness Model |
|
|
301 | (1) |
|
|
302 | (7) |
|
|
303 | (6) |
Index |
|
309 | (2) |
About the Editors |
|
311 | |