Contributors |
|
xiii | |
Foreword |
|
xvii | |
Preface |
|
xix | |
Chapter 1 A Cloud-Based Big Data System to Support Visually Impaired People |
|
1 | (22) |
|
|
|
|
|
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (5) |
|
1.3.1 Internet of Things (IoT) |
|
|
3 | (1) |
|
|
4 | (3) |
|
1.3.3 Face Detection and Recognition |
|
|
7 | (1) |
|
1.3.4 Optical Character Recognition (OCR) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (2) |
|
1.5.1 Top-Level Architecture |
|
|
8 | (2) |
|
|
10 | (3) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (2) |
|
|
15 | (4) |
|
|
19 | (1) |
|
|
20 | (3) |
Chapter 2 Computational Intelligence in Smart Grid Environment |
|
23 | (38) |
|
|
|
|
|
|
|
|
23 | (4) |
|
2.1.1 Power Load Forecasting |
|
|
25 | (1) |
|
2.1.2 Electricity Price Forecasting |
|
|
25 | (1) |
|
2.1.3 Smart Grid Optimization |
|
|
26 | (1) |
|
2.2 Related Work and Open Issues |
|
|
27 | (6) |
|
2.2.1 Power Load Forecasting |
|
|
27 | (2) |
|
2.2.2 Prediction of Electricity Spot Prices in Smart Grid |
|
|
29 | (2) |
|
2.2.3 Optimization and Metaheuristics in Big Data and Microgrids |
|
|
31 | (2) |
|
2.3 Overview of Methods Used in Smart Grid Problems |
|
|
33 | (9) |
|
2.3.1 Forecasting Methods |
|
|
33 | (6) |
|
2.3.2 Optimization Methods |
|
|
39 | (3) |
|
|
42 | (10) |
|
2.4.1 Electricity Price Forecasting |
|
|
43 | (1) |
|
2.4.2 Power Load Forecasting |
|
|
43 | (9) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (8) |
Chapter 3 Patient Facial Emotion Recognition and Sentiment Analysis Using Secure Cloud With Hardware Acceleration |
|
61 | (30) |
|
|
|
|
|
|
|
|
61 | (1) |
|
|
62 | (2) |
|
|
64 | (4) |
|
3.3.1 Facial Emotion Recognition |
|
|
64 | (1) |
|
3.3.2 Big Data Analytics on the Cloud |
|
|
65 | (1) |
|
3.3.3 Deep Learning Using Convolutional Neural Networks (CNNs) |
|
|
66 | (2) |
|
|
68 | (6) |
|
3.4.1 Face Detection in Images |
|
|
69 | (1) |
|
3.4.2 Facial Emotion Recognition Using CNNs |
|
|
70 | (4) |
|
3.4.3 The CNN Model Training |
|
|
74 | (1) |
|
3.5 System Implementation |
|
|
74 | (2) |
|
3.5.1 A Secure, Multi-tenant Cloud Storage System |
|
|
76 | (1) |
|
|
76 | (7) |
|
|
76 | (1) |
|
3.6.2 GPU Benchmarking and Comparison |
|
|
77 | (3) |
|
3.6.3 Facial Emotion Recognition Accuracy |
|
|
80 | (2) |
|
3.6.4 Model Performance and Power With Hardware Acceleration |
|
|
82 | (1) |
|
3.7 DeepPain: Mapping Patient Emotions to Pain Intensity Levels |
|
|
83 | (2) |
|
3.8 Conclusions and Future Work |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (5) |
Chapter 4 Novel Computational Intelligence Techniques for Automatic Pain Detection and Pain Intensity Level Estimation From Facial Expressions Using Distributed Computing for Big Data |
|
91 | (32) |
|
|
|
|
91 | (1) |
|
4.2 Background and History of Computational Techniques |
|
|
92 | (3) |
|
4.2.1 Feature Extraction Techniques |
|
|
93 | (1) |
|
4.2.2 Dimension Reduction Techniques |
|
|
94 | (1) |
|
4.2.3 Machine Learning Techniques for Classification |
|
|
95 | (1) |
|
4.2.4 Distributed Computing for Heavy Computations |
|
|
95 | (1) |
|
4.3 System Architecture for Distributed Computing |
|
|
95 | (2) |
|
4.4 Design of the Novel System for Pain Detection and Pain Intensity Estimation |
|
|
97 | (11) |
|
|
97 | (1) |
|
|
97 | (7) |
|
4.4.3 Universal Kernel-Based Dimension Reduction System (UKDRS) |
|
|
104 | (3) |
|
4.4.4 Classification Using ELM-RBF |
|
|
107 | (1) |
|
4.5 Experiments and Results |
|
|
108 | (10) |
|
|
108 | (1) |
|
4.5.2 Evaluation of Classification Results While Detecting Pain |
|
|
108 | (4) |
|
4.5.3 Evaluation of Classification Results in Pain Intensity Level Estimation |
|
|
112 | (2) |
|
4.5.4 Evaluation of Computational Time for Pain Detection and Pain Intensity Level Estimation |
|
|
114 | (2) |
|
|
116 | (2) |
|
4.6 Conclusion and Future Outlook |
|
|
118 | (1) |
|
|
118 | (5) |
Chapter 5 Computational Intelligence Enabling the Development of Efficient Clinical Decision Support Systems: Case Study of Heart Failure |
|
123 | (12) |
|
Oluwarotimi Williams Samuel |
|
|
|
|
|
|
123 | (1) |
|
5.2 Core Components of Diagnoses Based CDSS |
|
|
124 | (1) |
|
5.3 CI Predictor Based on Fuzzy Reasoning Technique |
|
|
125 | (3) |
|
5.4 CI Predictor Based on Multi Layer Perceptron Network |
|
|
128 | (2) |
|
5.5 CI Based CDSS Evaluation Methods |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (3) |
Chapter 6 Aspect Oriented Modeling of Missing Data Imputation for Internet of Things (loT) Based Healthcare Infrastructure |
|
135 | (12) |
|
Senthil Murugan Balakrishnan |
|
|
|
|
135 | (1) |
|
|
136 | (3) |
|
|
139 | (1) |
|
6.4 Proposed Missing Data Imputation Service |
|
|
140 | (1) |
|
6.5 Experimentation and Results |
|
|
141 | (3) |
|
|
144 | (3) |
Chapter 7 A Hybrid Computational Intelligence Decision Making Model for Multimedia Cloud Based Applications |
|
147 | (12) |
|
|
|
|
|
|
147 | (1) |
|
|
148 | (1) |
|
|
149 | (2) |
|
|
149 | (1) |
|
7.3.2 Fuzzy Delphi Method |
|
|
150 | (1) |
|
7.3.3 Fuzzy Analytic Hierarchy Process (FAHP) |
|
|
151 | (1) |
|
7.4 The Proposed Hybrid MCDM Model |
|
|
151 | (3) |
|
7.5 A Numeric Application of the Proposed Hybrid Approach |
|
|
154 | (2) |
|
7.6 Conclusion and Future Study |
|
|
156 | (1) |
|
|
156 | (3) |
Chapter 8 Energy-Constrained Workflow Scheduling in Cloud Using E-DSOS Algorithm |
|
159 | (12) |
|
|
|
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (3) |
|
8.4 The Application Model |
|
|
164 | (1) |
|
8.5 Experimental Results and Discussion |
|
|
165 | (1) |
|
8.6 Conclusion and Future Work |
|
|
166 | (2) |
|
|
168 | (3) |
Chapter 9 Producing Better Disaster Management Plan in Post-Disaster Situation Using Social Media Mining |
|
171 | (14) |
|
|
|
|
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (2) |
|
|
173 | (1) |
|
|
173 | (1) |
|
9.3.3 Disaster Tweet Ontology |
|
|
174 | (1) |
|
9.3.4 Quantitative Assessment |
|
|
175 | (1) |
|
9.4 Tweet Classification Process |
|
|
175 | (3) |
|
9.4.1 Preprocessing of Tweets |
|
|
176 | (1) |
|
9.4.2 Feature Vector Representation |
|
|
177 | (1) |
|
9.4.3 Learning Algorithms |
|
|
177 | (1) |
|
9.4.4 Performance Evaluation |
|
|
177 | (1) |
|
9.5 Tweet Classification Algorithms |
|
|
178 | (3) |
|
|
179 | (2) |
|
9.6 Information Extraction |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (2) |
Chapter 10 Metaheuristic Algorithms: A Comprehensive Review |
|
185 | (48) |
|
|
|
|
|
185 | (1) |
|
10.2 Metaheuristics Taxonomies |
|
|
186 | (2) |
|
10.3 Metaphor Based Metaheuristics |
|
|
188 | (19) |
|
10.3.1 Biology Based Metaheuristics |
|
|
188 | (6) |
|
10.3.2 Chemistry Based Metaheuristics |
|
|
194 | (4) |
|
10.3.3 Music Based Metaheuristics |
|
|
198 | (3) |
|
10.3.4 Math Based Metaheuristics |
|
|
201 | (3) |
|
10.3.5 Physics Based Metaheuristics |
|
|
204 | (1) |
|
10.3.6 Social and Sport Based Metaheuristics |
|
|
205 | (2) |
|
10.4 Non-Metaphor Based Metaheuristics |
|
|
207 | (2) |
|
|
207 | (1) |
|
10.4.2 Variable Neighborhood Search (VNS) |
|
|
208 | (1) |
|
10.4.3 Partial Optimization Metaheuristic Under Special Intensification Conditions (POPMUSIC) |
|
|
208 | (1) |
|
10.5 Variants of Metaheuristics |
|
|
209 | (6) |
|
10.5.1 Upgrading of Metaheuristics |
|
|
209 | (2) |
|
10.5.2 Metaheuristics Acclimatization |
|
|
211 | (2) |
|
10.5.3 Hybridization of Metaheuristics |
|
|
213 | (2) |
|
10.6 A Case Study: Weld Beam Design Problem |
|
|
215 | (3) |
|
10.6.1 Weld Beam Design Problem |
|
|
215 | (2) |
|
10.6.2 Experimental Results |
|
|
217 | (1) |
|
10.7 Limitation and New Trends |
|
|
218 | (1) |
|
|
218 | (7) |
|
|
225 | (8) |
Chapter 11 Unsupervised Anomaly Detection for High Dimensional Data-an Exploratory Analysis |
|
233 | (20) |
|
|
|
|
233 | (2) |
|
|
233 | (1) |
|
11.1.2 Research Contribution |
|
|
234 | (1) |
|
|
234 | (1) |
|
11.2 Preliminary Discussion |
|
|
235 | (2) |
|
|
235 | (2) |
|
|
237 | (2) |
|
11.4 Algorithm Which Do not Consider Subspaces |
|
|
239 | (3) |
|
|
239 | (1) |
|
11.4.2 Approximate Nearest Neighbor Based |
|
|
239 | (1) |
|
|
240 | (1) |
|
11.4.4 Dimension Reduction Based |
|
|
240 | (1) |
|
11.4.5 Feature Selection Based |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
11.6 Tools and Evaluation |
|
|
242 | (1) |
|
|
243 | (2) |
|
11.8 Proposed Framework DBN-K Means |
|
|
245 | (4) |
|
11.8.1 Experiment and Result |
|
|
247 | (2) |
|
11.9 Conclusion and Future Work |
|
|
249 | (1) |
|
|
250 | (3) |
Chapter 12 Fog - Driven Healthcare Framework for Security Analysis |
|
253 | (18) |
|
|
|
|
253 | (1) |
|
|
254 | (3) |
|
|
254 | (1) |
|
12.2.2 Cloud Service Models |
|
|
254 | (3) |
|
|
257 | (1) |
|
12.3.1 Secret Key Cryptography (Symmetric Key) |
|
|
258 | (1) |
|
12.3.2 Public Key Cryptography (Asymmetric Key) |
|
|
258 | (1) |
|
12.4 RSA and ECC in Cloud |
|
|
258 | (1) |
|
12.4.1 Performance Comparison of RSA and ECC |
|
|
258 | (1) |
|
|
259 | (4) |
|
12.5.1 Characteristics of Fog Computing |
|
|
260 | (1) |
|
12.5.2 Data Security Issues in Fog Computing (Literature Review) |
|
|
261 | (2) |
|
12.6 Fog Computing Revotilising in Healthcare IoT |
|
|
263 | (1) |
|
|
263 | (4) |
|
12.7.1 RSA Comparison in Cloud and Fog |
|
|
264 | (1) |
|
12.7.2 ECC Comparison in Cloud and Fog |
|
|
265 | (2) |
|
12.8 Performance Comparison of RSA and ECC in Fog |
|
|
267 | (1) |
|
12.8.1 Security Comparison of Cloud and Fog |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
12.10 Conclusion and Future Work |
|
|
267 | (2) |
|
|
269 | (2) |
Chapter 13 Medical Quality of Service Optimization Over Internet of Multimedia Things |
|
271 | (26) |
|
|
|
|
|
|
|
|
|
|
271 | (2) |
|
|
273 | (2) |
|
13.3 Convergence and Interoperability Between Telemedicine and IoT |
|
|
275 | (3) |
|
13.3.1 Convergence Between Telemedicine and IoT |
|
|
276 | (1) |
|
13.3.2 Interoperability Between Telemedicine and IoT |
|
|
276 | (2) |
|
13.4 Proposed Algorithms for Medical QoS Optimization Over IoT |
|
|
278 | (9) |
|
13.4.1 Modified Lazy Video Transmission Algorithm for Pre-recorded Video Transmission |
|
|
278 | (2) |
|
13.4.2 Online Video Transmission Algorithm for Live Video Transmission |
|
|
280 | (4) |
|
13.4.3 Rate Control Video Transmission Algorithm for High Definition Video Transmission |
|
|
284 | (3) |
|
13.5 Medical Quality of Service Mapping Over Joint Telemedicine and IoT |
|
|
287 | (1) |
|
13.6 Experimental Results and Discussion |
|
|
288 | (4) |
|
|
292 | (1) |
|
|
293 | (4) |
Chapter 14 Energy-Efficiency of Tools and Applications on Internet |
|
297 | (22) |
|
|
|
|
|
|
|
|
297 | (1) |
|
|
298 | (4) |
|
14.2.1 Energy Consumption of Software |
|
|
299 | (1) |
|
14.2.2 Energy Consumption of Web-Browsers |
|
|
299 | (1) |
|
14.2.3 Energy Consumption of Media Players |
|
|
300 | (1) |
|
14.2.4 Energy Consumption of File Transfer Protocols |
|
|
300 | (1) |
|
14.2.5 Energy Consumption of Wired Secure Protocols |
|
|
301 | (1) |
|
14.2.6 Energy Consumption of Wireless Secure Protocols |
|
|
301 | (1) |
|
14.3 Performance Indicators and Tools for Energy Consumption Measurement |
|
|
302 | (1) |
|
14.3.1 Performance Indicators |
|
|
302 | (1) |
|
14.3.2 Tools for Energy Consumption Measurement |
|
|
302 | (1) |
|
|
303 | (1) |
|
14.5 Experimental Results and Discussion |
|
|
304 | (6) |
|
|
305 | (1) |
|
14.5.2 Experimental Procedures for Windows 7 |
|
|
305 | (2) |
|
14.5.3 Experimental Procedures for Linux (Ubuntu 16.04) |
|
|
307 | (3) |
|
14.6 Results and Discussion |
|
|
310 | (7) |
|
14.6.1 Web-Browser Applications for Windows 7 and Ubuntu 16.04 |
|
|
310 | (2) |
|
14.6.2 Media Players for Ubuntu 16.04 |
|
|
312 | (1) |
|
14.6.3 Media Players for Windows 7 |
|
|
312 | |
|
14.6.4 File Transfer Protocols for Windows 7 and Ubuntu 16.04 |
|
|
115 | (200) |
|
14.6.5 Wired (SSL/TLS) and Security Protocols for Windows 7 and Ubuntu 16.04 |
|
|
315 | (1) |
|
14.6.6 Wireless (WPA2) Security Protocols for Windows 7 and Ubuntu 16.04 |
|
|
316 | (1) |
|
14.7 Conclusions and Future Research |
|
|
317 | (1) |
|
|
317 | (2) |
Chapter 15 Transforming Healthcare Via Big Data Analytics |
|
319 | (16) |
|
S.S. Blessy Trencia Lincy |
|
|
|
|
319 | (2) |
|
15.1.1 Data-Driven Decision Making |
|
|
319 | (1) |
|
15.1.2 Healthcare Population |
|
|
320 | (1) |
|
15.1.3 The Experience of Patients |
|
|
320 | (1) |
|
15.1.4 Proper Clinical Care |
|
|
320 | (1) |
|
|
320 | (1) |
|
15.2 Data Analytics in Healthcare |
|
|
321 | (8) |
|
15.2.1 Lifecycle of Data Analytics in Healthcare |
|
|
322 | (1) |
|
15.2.2 Role of Data Analyst |
|
|
323 | (1) |
|
15.2.3 Healthcare Analytics |
|
|
323 | (1) |
|
15.2.4 Types of Analytics |
|
|
324 | (5) |
|
15.3 Big Data for Healthcare: Challenges in Deployment |
|
|
329 | (1) |
|
15.3.1 Generate New Knowledge Using Predictive Analytics |
|
|
329 | (1) |
|
15.3.2 Analyze Patient Data in Real-Time Using Big Data Platform Hadoop |
|
|
329 | (1) |
|
15.3.3 Predict Where Emergency Services Are Most Likely to Be Needed |
|
|
329 | (1) |
|
15.3.4 Optimize Care for Patient Populations |
|
|
329 | (1) |
|
15.3.5 Reduce the Cost of Care |
|
|
330 | (1) |
|
|
330 | (2) |
|
15.4.1 Scalable Big Data Analytics |
|
|
330 | (1) |
|
15.4.2 Flattering Management Server-less Insight |
|
|
330 | (1) |
|
15.4.3 Hasty Queries and Scaling Datasets |
|
|
331 | (1) |
|
15.4.4 Unified Cohesive Stream and Batch Processing |
|
|
331 | (1) |
|
15.4.5 Hadoop and Spark in the Cloud Environment |
|
|
331 | (1) |
|
15.4.6 Controlled Databases, Storage of the Object and Its Archival |
|
|
331 | (1) |
|
15.4.7 The Next Arena 'The Machine Intelligence' |
|
|
331 | (1) |
|
15.5 Healthcare Essentials: Big Data |
|
|
332 | (1) |
|
15.5.1 Granular Management of Metadata |
|
|
332 | (1) |
|
15.5.2 Management of Privacy |
|
|
332 | (1) |
|
15.5.3 Transformation of Data |
|
|
332 | (1) |
|
15.5.4 Plays Well With Erstwhile |
|
|
332 | (1) |
|
15.5.5 Condense Data Slump |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
333 | (2) |
Index |
|
335 | |