|
1 Introduction to Predictive Computing |
|
|
1 | (16) |
|
|
1 | (2) |
|
|
3 | (1) |
|
1.3 Pillars of Predictive Computing |
|
|
4 | (3) |
|
1.4 Horizons of Predictive Computing |
|
|
7 | (1) |
|
1.5 Role of Information Security and Techniques |
|
|
7 | (3) |
|
|
10 | (7) |
|
|
13 | (4) |
|
2 Predictive Computing and Information Security: A Technical Review |
|
|
17 | (38) |
|
|
17 | (1) |
|
2.2 Google Trend Analysis |
|
|
18 | (2) |
|
2.3 Predictive Computing Techniques |
|
|
20 | (7) |
|
2.3.1 Data Handling Techniques |
|
|
20 | (1) |
|
2.3.2 Sustainable Techniques |
|
|
20 | (3) |
|
2.3.3 Navigation Techniques |
|
|
23 | (1) |
|
|
24 | (2) |
|
2.3.5 Smart Objects Based Computing |
|
|
26 | (1) |
|
2.4 Predictive Computing Frameworks |
|
|
27 | (6) |
|
2.4.1 Healthcare Frameworks |
|
|
27 | (3) |
|
2.4.2 Smart Home Frameworks |
|
|
30 | (1) |
|
2.4.3 Navigation Framework |
|
|
31 | (1) |
|
2.4.4 e-Commerce Framework |
|
|
32 | (1) |
|
2.5 Information Security Techniques |
|
|
33 | (3) |
|
2.5.1 Security Techniques for Cloud Computing |
|
|
34 | (1) |
|
2.5.2 Security Techniques for Internet-of-Things |
|
|
35 | (1) |
|
2.6 Information Security-Based Frameworks |
|
|
36 | (7) |
|
2.6.1 Cloud Computing-Based Security Frameworks |
|
|
36 | (5) |
|
2.6.2 IoT-Based Security Frameworks |
|
|
41 | (2) |
|
2.7 Challenges and Discussions |
|
|
43 | (3) |
|
|
46 | (9) |
|
|
47 | (8) |
|
3 Predictive Computing: A Technical Insight |
|
|
55 | (18) |
|
|
55 | (2) |
|
3.2 Design Architecture of Predictive Computing |
|
|
57 | (1) |
|
3.2.1 Predictive Analytics Process |
|
|
57 | (1) |
|
|
58 | (6) |
|
3.3.1 Predictive Model for e-Transportation |
|
|
58 | (5) |
|
3.3.2 Predictive Model for Banking |
|
|
63 | (1) |
|
3.4 Algorithms for Predictive Computing |
|
|
64 | (2) |
|
3.4.1 Local Learning and Model Fusion for Multiple Information Sources |
|
|
64 | (1) |
|
3.4.2 Mining from Sparse, Uncertain and Incomplete Data Representation |
|
|
65 | (1) |
|
3.5 Mathematical Modelling and Algorithms |
|
|
66 | (1) |
|
3.5.1 Probabilistic Learning Model and Statistical Analysis |
|
|
66 | (1) |
|
3.5.2 Fuzzy Rule-Based Expert Systems |
|
|
66 | (1) |
|
3.5.3 Rule Base Reduction Techniques |
|
|
67 | (1) |
|
3.5.4 Recommendation Mining |
|
|
67 | (1) |
|
3.6 Clustering Algorithms |
|
|
67 | (2) |
|
|
68 | (1) |
|
3.6.2 Centroid Generation Using Canopy Clustering |
|
|
68 | (1) |
|
3.6.3 Fuzzy k-Means Clustering Technique |
|
|
68 | (1) |
|
3.7 Classification Algorithms |
|
|
69 | (1) |
|
|
69 | (4) |
|
|
70 | (3) |
|
4 Cloud-Based Predictive Computing |
|
|
73 | (18) |
|
|
73 | (1) |
|
|
74 | (3) |
|
4.2.1 Cloud-Based Healthcare Frameworks |
|
|
74 | (3) |
|
4.2.2 Predictive Healthcare Applications |
|
|
77 | (1) |
|
4.3 IoT-Based Cloud-Centric Design Architecture |
|
|
77 | (6) |
|
4.3.1 Application Architecture |
|
|
80 | (1) |
|
4.3.2 Predictive Framework for User Activity |
|
|
81 | (2) |
|
4.4 Cloud-Based Predictive Computing Design |
|
|
83 | (4) |
|
4.4.1 Predictive Analysis of Physical Activities |
|
|
84 | (2) |
|
4.4.2 Predictive Efficiency of Framework |
|
|
86 | (1) |
|
|
87 | (4) |
|
|
87 | (4) |
|
5 Internet of Things Based Predictive Computing |
|
|
91 | (16) |
|
|
91 | (1) |
|
|
92 | (4) |
|
5.2.1 Personal and Home Services |
|
|
93 | (1) |
|
5.2.2 Industries and Enterprises |
|
|
94 | (1) |
|
5.2.3 IoT-Based Utility Services |
|
|
94 | (1) |
|
5.2.4 Internet of Things in Healthcare |
|
|
95 | (1) |
|
5.3 Major Issues and Challenges |
|
|
96 | (3) |
|
5.3.1 Technical Challenges |
|
|
96 | (1) |
|
5.3.2 Device Lifetime and Energy Challenge |
|
|
97 | (1) |
|
5.3.3 Representation of Massive Dataand Information Challenge |
|
|
97 | (1) |
|
5.3.4 Incomplete Data Representation |
|
|
98 | (1) |
|
5.4 IoT-Based Predictive Modelling |
|
|
99 | (1) |
|
|
99 | (1) |
|
5.4.2 Descriptive Modelling |
|
|
100 | (1) |
|
5.5 IoT-Based Predictive Techniques |
|
|
100 | (3) |
|
5.5.1 Probabilistic Learning Model and Statistical Analysis |
|
|
100 | (1) |
|
5.5.2 Predictive Analytics and Data Mining Algorithms |
|
|
101 | (1) |
|
5.5.3 Data Fusion Approach |
|
|
101 | (1) |
|
5.5.4 Failure Prediction Using a Tree Ensemble Classifier |
|
|
102 | (1) |
|
|
103 | (4) |
|
|
103 | (4) |
|
6 Cloud-Based Information Security |
|
|
107 | (30) |
|
|
107 | (1) |
|
|
108 | (16) |
|
|
110 | (1) |
|
|
111 | (2) |
|
|
113 | (1) |
|
6.2.4 Issues with Cloud Service Models |
|
|
114 | (3) |
|
6.2.5 Threats in Cloud Computing |
|
|
117 | (2) |
|
|
119 | (2) |
|
6.2.7 Cloud-Based Information Security Models |
|
|
121 | (3) |
|
6.3 Framework to Maintain Data Integrity |
|
|
124 | (9) |
|
6.3.1 Data Integrity Algorithms |
|
|
126 | (1) |
|
6.3.2 Performance Analysis of Security Techniques |
|
|
127 | (6) |
|
|
133 | (4) |
|
|
134 | (3) |
|
7 Applications of Predictive Computing |
|
|
137 | (20) |
|
|
137 | (1) |
|
7.2 Applications Based Features of Predictive Computing |
|
|
138 | (14) |
|
|
138 | (3) |
|
|
141 | (6) |
|
|
147 | (5) |
|
|
152 | (5) |
|
|
152 | (5) |
Appendix: Datasets |
|
157 | |