Foreword |
|
xv | |
Preface |
|
xvii | |
|
1 Biometric Identification Using Deep Learning for Advance Cloud Security |
|
|
1 | (14) |
|
|
|
|
2 | (1) |
|
1.2 Techniques of Biometric Identification |
|
|
3 | (3) |
|
1.2.1 Fingerprint Identification |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (3) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
1.3.4 Nearest Neighbor Approach |
|
|
8 | (1) |
|
1.4 Related Work, A Review |
|
|
9 | (1) |
|
|
10 | (2) |
|
|
12 | (1) |
|
|
12 | (3) |
|
|
12 | (3) |
|
2 Privacy in Multi-Tenancy Cloud Using Deep Learning |
|
|
15 | (12) |
|
|
|
|
15 | (1) |
|
|
16 | (5) |
|
2.2.1 Basic Structure of Cloud Computing |
|
|
17 | (1) |
|
2.2.2 Concept of Multi-Tenancy |
|
|
18 | (1) |
|
2.2.3 Concept of Multi-Tenancy with Cloud Computing |
|
|
19 | (2) |
|
2.3 Privacy in Cloud Environment Using Deep Learning |
|
|
21 | (1) |
|
2.4 Privacy in Multi-Tenancy with Deep Learning Concept |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (3) |
|
|
25 | (2) |
|
3 Emotional Classification Using EEG Signals and Facial Expression: A Survey |
|
|
27 | (16) |
|
|
|
|
|
27 | (2) |
|
|
29 | (3) |
|
|
32 | (2) |
|
3.3.1 EEG Signal Pre-Processing |
|
|
32 | (1) |
|
3.3.1.1 Discrete Fourier Transform (DFT) |
|
|
32 | (1) |
|
3.3.1.2 Least Mean Square (LMS) Algorithm |
|
|
32 | (1) |
|
3.3.1.3 Discrete Cosine Transform (DCT) |
|
|
33 | (1) |
|
3.3.2 Feature Extraction Techniques |
|
|
33 | (1) |
|
3.3.3 Classification Techniques |
|
|
33 | (1) |
|
|
34 | (4) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
3.4.4 Environment Control |
|
|
37 | (1) |
|
|
38 | (1) |
|
3.5 Cloud-Based EEG Overview |
|
|
38 | (2) |
|
3.5.1 Data Backup and Restoration |
|
|
39 | (1) |
|
|
40 | (3) |
|
|
40 | (3) |
|
4 Effective and Efficient Wind Power Generation Using Bifarious Solar PV System |
|
|
43 | (20) |
|
R. Amirtha Katesa Sai Raj |
|
|
|
|
|
|
|
44 | (1) |
|
4.2 Study of Bi-Facial Solar Panel |
|
|
45 | (1) |
|
|
46 | (7) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
4.3.4 System Management Using IoT |
|
|
48 | (2) |
|
4.3.5 Structure of Proposed System |
|
|
50 | (1) |
|
|
51 | (1) |
|
4.3.7 Working Principle of Proposed System |
|
|
52 | (1) |
|
4.3.8 Design and Analysis |
|
|
53 | (1) |
|
4.4 Applications of IoT in Renewable Energy Resources |
|
|
53 | (6) |
|
4.4.1 Wind Turbine Reliability Using IoT |
|
|
54 | (1) |
|
4.4.2 Siting of Wind Resource Using IoT |
|
|
55 | (1) |
|
4.4.3 Application of Renewable Energy in Medical Industries |
|
|
56 | (1) |
|
4.4.4 Data Analysis Using Deep Learning |
|
|
57 | (2) |
|
|
59 | (4) |
|
|
59 | (4) |
|
5 Background Mosaicing Model for Wide Area Surveillance System |
|
|
63 | (12) |
|
|
|
64 | (1) |
|
|
64 | (1) |
|
|
65 | (5) |
|
|
66 | (1) |
|
5.3.2 Background Deep Learning Model Based on Mosaic |
|
|
67 | (3) |
|
5.3.3 Foreground Segmentation |
|
|
70 | (1) |
|
5.4 Results and Discussion |
|
|
70 | (2) |
|
|
72 | (3) |
|
|
72 | (3) |
|
6 Prediction of CKD Stage 1 Using Three Different Classifiers |
|
|
75 | (18) |
|
|
|
|
|
|
75 | (3) |
|
6.2 Materials and Methods |
|
|
78 | (6) |
|
6.3 Results and Discussion |
|
|
84 | (5) |
|
6.4 Conclusions and Future Scope |
|
|
89 | (4) |
|
|
89 | (4) |
|
7 Classification of MRI Images to Aid in Diagnosis of Neurological Disorder Using SVM |
|
|
93 | (16) |
|
|
|
|
|
|
93 | (2) |
|
|
95 | (5) |
|
|
95 | (1) |
|
7.2.2 Image Preprocessing |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
7.3 Results and Discussions |
|
|
100 | (6) |
|
|
100 | (3) |
|
|
103 | (1) |
|
|
104 | (2) |
|
|
106 | (3) |
|
|
106 | (3) |
|
|
109 | (14) |
|
|
|
|
110 | (1) |
|
8.2 Convolution Operation |
|
|
110 | (1) |
|
|
110 | (2) |
|
8.4 Practical Applications |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
8.5 Challenges of Profound Models |
|
|
113 | (1) |
|
8.6 Deep Learning In Object Detection |
|
|
114 | (1) |
|
|
114 | (4) |
|
8.8 Challenges of Item Location |
|
|
118 | (5) |
|
8.8.1 Scale Variation Problem |
|
|
118 | (1) |
|
|
119 | (1) |
|
8.8.3 Deformation Problem |
|
|
120 | (1) |
|
|
121 | (2) |
|
9 Categorization of Cloud Computing & Deep Learning |
|
|
123 | (22) |
|
|
9.1 Introduction to Cloud Computing |
|
|
123 | (10) |
|
|
123 | (1) |
|
9.1.2 Cloud Computing: History and Evolution |
|
|
124 | (1) |
|
|
125 | (2) |
|
9.1.4 Characteristics of Cloud Computing |
|
|
127 | (1) |
|
9.1.5 Different Types of Cloud Computing Service Models |
|
|
128 | (1) |
|
9.1.5.1 Infrastructure as A Service (IAAS) |
|
|
128 | (1) |
|
9.1.5.2 Platform as a Service (PAAS) |
|
|
129 | (1) |
|
9.1.5.3 Software as a Service (SAAS) |
|
|
129 | (1) |
|
9.1.6 Cloud Computing Advantages and Disadvantages |
|
|
130 | (1) |
|
9.1.6.1 Advantages of Cloud Computing |
|
|
130 | (2) |
|
9.1.6.2 Disadvantages of Cloud Computing |
|
|
132 | (1) |
|
9.2 Introduction to Deep Learning |
|
|
133 | (9) |
|
9.2.1 History and Revolution of Deep Learning |
|
|
134 | (1) |
|
9.2.1.1 Development of Deep Learning Algorithms |
|
|
134 | (1) |
|
9.2.1.2 The FORTRAN Code for Back Propagation |
|
|
135 | (1) |
|
9.2.1.3 Deep Learning from the 2000s and Beyond |
|
|
135 | (1) |
|
9.2.1.4 The Cat Experiment |
|
|
136 | (1) |
|
|
137 | (1) |
|
9.2.2.1 Artificial Neural Networks |
|
|
137 | (1) |
|
9.2.2.2 Deep Neural Networks |
|
|
138 | (1) |
|
9.2.3 Applications of Deep Learning |
|
|
138 | (1) |
|
9.2.3.1 Automatic Speech Recognition |
|
|
138 | (1) |
|
9.2.3.2 Electromyography (EMG) Recognition |
|
|
139 | (1) |
|
9.2.3.3 Image Recognition |
|
|
139 | (1) |
|
9.2.3.4 Visual Art Processing |
|
|
140 | (1) |
|
9.2.3.5 Natural Language Processing |
|
|
140 | (1) |
|
9.2.3.6 Drug Discovery and Toxicology |
|
|
140 | (1) |
|
9.2.3.7 Customer Relationship Management |
|
|
141 | (1) |
|
9.2.3.8 Recommendation Systems |
|
|
141 | (1) |
|
|
141 | (1) |
|
9.2.3.10 Medical Image Analysis |
|
|
141 | (1) |
|
9.2.3.11 Mobile Advertising |
|
|
141 | (1) |
|
9.2.3.12 Image Restoration |
|
|
142 | (1) |
|
9.2.3.13 Financial Fraud Detection |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
142 | (3) |
|
|
143 | (2) |
|
10 Smart Load Balancing in Cloud Using Deep Learning |
|
|
145 | (22) |
|
|
|
|
146 | (1) |
|
|
147 | (2) |
|
|
148 | (1) |
|
10.2.2 Dynamic (Run-Time) Algorithms |
|
|
148 | (1) |
|
10.3 Load Adjusting in Distributing Computing |
|
|
149 | (3) |
|
10.3.1 Working of Load Balancing |
|
|
151 | (1) |
|
10.4 Cloud Load Balancing Criteria (Measures) |
|
|
152 | (1) |
|
10.5 Load Balancing Proposed for Cloud Computing |
|
|
153 | (2) |
|
10.5.1 Calculation of Load Balancing in the Whole System |
|
|
154 | (1) |
|
10.6 Load Balancing in Next Generation Cloud Computing |
|
|
155 | (2) |
|
10.7 Dispersed AI Load Adjusting Methodology in Distributed Computing Administrations |
|
|
157 | (4) |
|
10.7.1 Quantum Isochronous Parallel |
|
|
158 | (1) |
|
10.7.2 Phase Isochronous Parallel |
|
|
159 | (2) |
|
10.7.3 Dynamic Isochronous Coordinate Strategy |
|
|
161 | (1) |
|
10.8 Adaptive-Dynamic Synchronous Coordinate Strategy |
|
|
161 | (3) |
|
10.8.1 Adaptive Quick Reassignment (AdaptQR) |
|
|
162 | (1) |
|
10.8.2 A-DIC (Adaptive-Dynamic Synchronous Parallel) |
|
|
163 | (1) |
|
|
164 | (3) |
|
|
165 | (2) |
|
11 Biometric Identification for Advanced Cloud Security |
|
|
167 | (22) |
|
|
|
|
168 | (4) |
|
11.1.1 Biometric Identification |
|
|
168 | (1) |
|
11.1.2 Biometric Characteristic |
|
|
169 | (1) |
|
11.1.3 Types of Biometric Data |
|
|
169 | (1) |
|
11.1.3.1 Face Recognition |
|
|
169 | (1) |
|
|
170 | (1) |
|
11.1.3.3 Signature Verification |
|
|
170 | (1) |
|
11.1.3.4 Iris Recognition |
|
|
170 | (1) |
|
11.1.3.5 Voice Recognition |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (2) |
|
11.3 Biometric Identification in Cloud Computing |
|
|
174 | (3) |
|
11.3.1 How Biometric Authentication is Being Used on the Cloud Platform |
|
|
176 | (1) |
|
11.4 Models and Design Goals |
|
|
177 | (2) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
11.5 Face Recognition Method as a Biometric Authentication |
|
|
179 | (1) |
|
11.6 Deep Learning Techniques for Big Data in Biometrics |
|
|
180 | (5) |
|
11.6.1 Issues and Challenges |
|
|
181 | (1) |
|
11.6.2 Deep Learning Strategies For Biometric Identification |
|
|
182 | (3) |
|
|
185 | (4) |
|
|
185 | (4) |
|
12 Application of Deep Learning in Cloud Security |
|
|
189 | (18) |
|
|
|
190 | (1) |
|
|
191 | (1) |
|
|
192 | (3) |
|
12.4 The Uses of Fields in Deep Learning |
|
|
195 | (7) |
|
|
202 | (5) |
|
|
203 | (4) |
|
13 Real Time Cloud Based Intrusion Detection |
|
|
207 | (18) |
|
|
|
207 | (2) |
|
|
209 | (2) |
|
|
211 | (2) |
|
13.3.1 Denial of Service (DoS) Attack |
|
|
212 | (1) |
|
|
212 | (1) |
|
13.3.3 User To Root (U2R) Attack |
|
|
213 | (1) |
|
|
213 | (1) |
|
13.4 Intrusion Detection System |
|
|
213 | (3) |
|
13.4.1 Signature-Based Intrusion Detection System (SIDS) |
|
|
213 | (1) |
|
13.4.2 Anomaly-Based Intrusion Detection System (AIDS) |
|
|
214 | (1) |
|
13.4.3 Intrusion Detection System Using Deep Learning |
|
|
215 | (1) |
|
13.5 Types of IDS in Cloud |
|
|
216 | (2) |
|
13.5.1 Host Intrusion Detection System |
|
|
216 | (1) |
|
13.5.2 Network Based Intrusion Detection System |
|
|
217 | (1) |
|
13.5.3 Distributed Based Intrusion Detection System |
|
|
217 | (1) |
|
13.6 Model of Deep Learning |
|
|
218 | (3) |
|
|
218 | (1) |
|
13.6.2 Recurrent Neural Network |
|
|
219 | (1) |
|
13.6.3 Multi-Layer Perception Model |
|
|
219 | (2) |
|
|
221 | (1) |
|
|
221 | (2) |
|
|
223 | (2) |
|
|
223 | (2) |
|
14 Applications of Deep Learning in Cloud Security |
|
|
225 | (32) |
|
|
|
|
226 | (4) |
|
|
226 | (1) |
|
14.1.2 Accounts Hijacking |
|
|
227 | (1) |
|
|
227 | (1) |
|
14.1.3.1 Malware Injection |
|
|
227 | (1) |
|
14.1.3.2 Abuse of Cloud Services |
|
|
228 | (1) |
|
|
228 | (1) |
|
14.1.3.4 Denial of Service Attacks |
|
|
228 | (1) |
|
14.1.3.5 Insufficient Due Diligence |
|
|
229 | (1) |
|
14.1.3.6 Shared Vulnerabilities |
|
|
229 | (1) |
|
|
229 | (1) |
|
14.2 Deep Learning Methods for Cloud Cyber Security |
|
|
230 | (10) |
|
14.2.1 Deep Belief Networks |
|
|
230 | (1) |
|
14.2.1.1 Deep Autoencoders |
|
|
230 | (2) |
|
14.2.1.2 Restricted Boltzmann Machines |
|
|
232 | (1) |
|
14.2.1.3 DBNs, RBMs, or Deep Autoencoders Coupled with Classification Layers |
|
|
233 | (1) |
|
14.2.1.4 Recurrent Neural Networks |
|
|
233 | (1) |
|
14.2.1.5 Convolutional Neural Networks |
|
|
234 | (1) |
|
14.2.1.6 Generative Adversarial Networks |
|
|
235 | (1) |
|
14.2.1.7 Recursive Neural Networks |
|
|
236 | (1) |
|
14.2.2 Applications of Deep Learning in Cyber Security |
|
|
237 | (1) |
|
14.2.2.1 Intrusion Detection and Prevention Systems (IDS/IPS) |
|
|
237 | (1) |
|
14.2.2.2 Dealing with Malware |
|
|
237 | (1) |
|
14.2.2.3 Spam and Social Engineering Detection |
|
|
238 | (1) |
|
14.2.2.4 Network Traffic Analysis |
|
|
238 | (1) |
|
14.2.2.5 User Behaviour Analytics |
|
|
238 | (1) |
|
14.2.2.6 Insider Threat Detection |
|
|
239 | (1) |
|
14.2.2.7 Border Gateway Protocol Anomaly Detection |
|
|
239 | (1) |
|
14.2.2.8 Verification if Keystrokes were Typed by a Human |
|
|
240 | (1) |
|
14.3 Framework to Improve Security in Cloud Computing |
|
|
240 | (11) |
|
14.3.1 Introduction to Firewalls |
|
|
241 | (1) |
|
14.3.2 Importance of Firewalls |
|
|
242 | (1) |
|
14.3.2.1 Prevents the Passage of Unwanted Content |
|
|
242 | (1) |
|
14.3.2.2 Prevents Unauthorized Remote Access |
|
|
243 | (1) |
|
14.3.2.3 Restrict Indecent Content |
|
|
243 | (1) |
|
14.3.2.4 Guarantees Security Based on Protocol and IP Address |
|
|
244 | (1) |
|
14.3.2.5 Protects Seamless Operations in Enterprises |
|
|
244 | (1) |
|
14.3.2.6 Protects Conversations and Coordination Contents |
|
|
244 | (1) |
|
14.3.2.7 Restricts Online Videos and Games from Displaying Destructive Content |
|
|
245 | (1) |
|
14.3.3 Types of Firewalls |
|
|
245 | (1) |
|
14.3.3.1 Proxy-Based Firewalls |
|
|
245 | (1) |
|
14.3.3.2 Stateful Firewalls |
|
|
246 | (1) |
|
14.3.3.3 Next-Generation Firewalls (NGF) |
|
|
247 | (1) |
|
14.3.3.4 Web Application Firewalls (WAF) |
|
|
247 | (1) |
|
|
248 | (1) |
|
14.3.3.6 How Web Application Firewalls (WAF) Work |
|
|
248 | (2) |
|
14.3.3.7 Attacks that Web Application Firewalls Prevent |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (3) |
|
14.4.1 Web Application Firewall (WAF) Security Models |
|
|
252 | (1) |
|
14.4.2 Firewall-as-a-Service (FWaaS) |
|
|
252 | (1) |
|
14.4.3 Basic Difference Between a Cloud Firewall and a Next-Generation Firewall (NGFW) |
|
|
253 | (1) |
|
14.4.4 Introduction and Effects of Firewall Network Parameters on Cloud Computing |
|
|
253 | (1) |
|
|
254 | (3) |
|
|
254 | (3) |
About the Editors |
|
257 | (6) |
Index |
|
263 | |