|
|
xiii | |
Preface |
|
xv | |
|
1 Optimization in the sensor cloud: Taxonomy, challenges, and survey |
|
|
1 | (22) |
|
|
|
|
1 | (3) |
|
1.2 Background and challenges in the sensor cloud |
|
|
4 | (2) |
|
|
4 | (1) |
|
|
5 | (1) |
|
1.3 Taxonomy for optimization in the sensor cloud |
|
|
6 | (10) |
|
|
7 | (3) |
|
1.3.2 Information classification |
|
|
10 | (1) |
|
1.3.3 Information transmission |
|
|
11 | (2) |
|
1.3.4 Information processing |
|
|
13 | (2) |
|
1.3.5 Limitations of existing work |
|
|
15 | (1) |
|
1.4 Discussion and future research |
|
|
16 | (3) |
|
|
16 | (2) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (4) |
|
2 Computational intelligence techniques for localization and clustering in wireless sensor networks |
|
|
23 | (18) |
|
|
Mahabaleshwar S. Kakkasageri |
|
|
|
|
23 | (1) |
|
2.2 Wireless sensor networks |
|
|
24 | (2) |
|
|
24 | (1) |
|
2.2.2 Research issues/challenges |
|
|
25 | (1) |
|
2.3 Localization and clustering in wireless sensor networks |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
2.4 Computational intelligence techniques |
|
|
27 | (10) |
|
2.4.1 Computational intelligence techniques for localization |
|
|
30 | (4) |
|
2.4.2 Computational intelligence techniques for clustering |
|
|
34 | (3) |
|
2.5 Future research directions |
|
|
37 | (1) |
|
|
38 | (3) |
|
3 Computational intelligent techniques for resource management schemes in wireless sensor networks |
|
|
41 | (20) |
|
|
Mahabaleshwar S. Kakkasageri |
|
|
|
|
41 | (1) |
|
3.2 Wireless sensor networks |
|
|
42 | (4) |
|
|
42 | (2) |
|
|
44 | (1) |
|
|
45 | (1) |
|
3.3 Resource management in wireless sensor networks |
|
|
46 | (9) |
|
3.3.1 Computational intelligence techniques |
|
|
47 | (1) |
|
|
47 | (8) |
|
3.4 Future research directions and conclusion |
|
|
55 | (1) |
|
|
56 | (5) |
|
4 Swarm intelligence based MSMOPSO for optimization of resource provisioning in Internet of Things |
|
|
61 | (22) |
|
|
|
|
61 | (3) |
|
|
62 | (2) |
|
|
64 | (1) |
|
|
64 | (6) |
|
4.2.1 Network environment |
|
|
64 | (6) |
|
|
70 | (3) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (8) |
|
|
73 | (1) |
|
4.4.2 Simulation procedure |
|
|
74 | (1) |
|
4.4.3 Performance measures |
|
|
74 | (2) |
|
|
76 | (5) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
81 | (2) |
|
5 DNA-based authentication to access internet of things-based healthcare data |
|
|
83 | (12) |
|
Sreeja Cherillath Sukumaran |
|
|
|
83 | (1) |
|
|
83 | (5) |
|
5.2.1 Internet of things generic architecture |
|
|
84 | (1) |
|
5.2.2 Challenges in the internet of things |
|
|
84 | (1) |
|
5.2.3 Security challenges in internet of things layers |
|
|
85 | (1) |
|
5.2.4 Authentication schemes in the internet of things |
|
|
86 | (2) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (4) |
|
5.4.1 Password file compromise attack |
|
|
88 | (3) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
92 | (3) |
|
6 Computational intelligence techniques for cancer diagnosis |
|
|
95 | (16) |
|
|
|
|
95 | (1) |
|
|
95 | (2) |
|
6.2.1 Cancer research data |
|
|
95 | (1) |
|
6.2.2 Genomic data for cancers |
|
|
96 | (1) |
|
6.2.3 Imaging data for cancers |
|
|
97 | (1) |
|
6.3 Approaches to computational intelligence |
|
|
97 | (2) |
|
6.3.1 Evolutionary computation |
|
|
98 | (1) |
|
|
98 | (1) |
|
6.3.3 Artificial neural networks |
|
|
98 | (1) |
|
6.3.4 Probabilistic methods |
|
|
99 | (1) |
|
6.4 Computational intelligence techniques for feature selection in cancer diagnosis |
|
|
99 | (8) |
|
6.4.1 Advantages of feature selection |
|
|
100 | (1) |
|
6.4.2 Rough sets for feature selection |
|
|
100 | (1) |
|
6.4.3 Genetic algorithms for feature selection |
|
|
101 | (1) |
|
6.4.4 Adaptive network fuzzy inference system |
|
|
102 | (1) |
|
6.4.5 Deep learning for cancer diagnosis |
|
|
103 | (2) |
|
6.4.6 Autoencoders for feature extraction |
|
|
105 | (1) |
|
6.4.7 Particle swarm optimization for feature selection |
|
|
105 | (2) |
|
6.5 Computational intelligence methods for cancer classification |
|
|
107 | (1) |
|
6.5.1 Classification methods |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
108 | (3) |
|
7 Security and privacy in the internet of things: computational intelligent techniques-based approaches |
|
|
111 | (18) |
|
|
Mahabaleshwar S. Kakkasageri |
|
|
|
|
111 | (1) |
|
|
112 | (2) |
|
|
112 | (2) |
|
|
114 | (1) |
|
7.4 Research issues/challenges |
|
|
115 | (1) |
|
|
116 | (2) |
|
7.6 Security and privacy in the internet of things |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
7.7 Computational intelligent techniques |
|
|
119 | (3) |
|
7.7.1 Artificial intelligence |
|
|
120 | (1) |
|
|
120 | (1) |
|
7.7.3 Evolutionary computation |
|
|
120 | (1) |
|
7.7.4 Artificial immune systems |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
7.7.7 Bio-inspired algorithm |
|
|
121 | (1) |
|
7.8 Computational intelligent techniques to provide security and privacy for the internet of things |
|
|
122 | (2) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
7.9 Future research direction |
|
|
124 | (1) |
|
|
124 | (5) |
|
8 Automatic enhancement of coronary arteries using convolutional gray-level templates and path-based metaheuristics |
|
|
129 | (26) |
|
|
|
Fernando Cervantes-Sanchez |
|
|
|
Juan-Manuel Lopez-Hernandez |
|
|
|
129 | (2) |
|
|
131 | (8) |
|
8.2.1 Iterated local search |
|
|
131 | (4) |
|
|
135 | (2) |
|
8.2.3 Simulated annealing |
|
|
137 | (1) |
|
8.2.4 Univariate marginal distribution algorithm |
|
|
138 | (1) |
|
|
139 | (3) |
|
8.3.1 Automatic generation of convolutional gray-level template |
|
|
139 | (2) |
|
8.3.2 Binary classification of the gray-level filter response |
|
|
141 | (1) |
|
8.3.3 Image postprocessing |
|
|
141 | (1) |
|
8.4 Computational experiments |
|
|
142 | (4) |
|
8.4.1 Results of vessel imaging enhancement |
|
|
142 | (1) |
|
8.4.2 Postprocessing procedure |
|
|
143 | (3) |
|
|
146 | (1) |
|
Appendix 1 Matlab code of the tabu search for the traveler salesman problem |
|
|
147 | (5) |
|
|
152 | (3) |
|
9 Smart city development: Theft handling of public vehicles using image analysis and cloud network |
|
|
155 | (16) |
|
|
|
|
|
|
155 | (1) |
|
|
155 | (1) |
|
9.3 Issues and challenges of image authentication through Internet of Things-based cloud framework |
|
|
156 | (10) |
|
|
156 | (4) |
|
|
160 | (3) |
|
|
163 | (1) |
|
9.3.4 Different cloud management services |
|
|
164 | (2) |
|
9.3.5 Cloud-enabled Internet of Things |
|
|
166 | (1) |
|
9.4 Proposed facial recognition system implementation for theft handling |
|
|
166 | (2) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (3) |
|
10 Novel detection of cancerous cells through an image segmentation approach using principal component analysis |
|
|
171 | (26) |
|
|
|
|
|
171 | (1) |
|
10.1.1 Principal component analysis |
|
|
172 | (1) |
|
10.1.2 Objective of the work |
|
|
172 | (1) |
|
10.2 Algorithm for analysis |
|
|
172 | (1) |
|
10.2.1 Binarized masked segmentation image |
|
|
172 | (1) |
|
|
172 | (1) |
|
10.2.3 Image assessment using PCA |
|
|
172 | (1) |
|
10.2.4 Selection of highest probability |
|
|
173 | (1) |
|
|
173 | (2) |
|
10.4 Results and discussions |
|
|
175 | (19) |
|
10.4.1 Detection of cancerous cell from brain MRI |
|
|
175 | (14) |
|
10.4.2 Detection of cancerous cells from a breast mammogram |
|
|
189 | (5) |
|
|
194 | (1) |
|
|
195 | (2) |
|
11 Classification of the operating spectrum for the RAMAN amplifier embedded optical communication system using soft computing techniques |
|
|
197 | (14) |
|
|
|
|
|
|
197 | (1) |
|
11.2 Soft computing approaches in the optimization procedure |
|
|
198 | (1) |
|
11.3 Objective of the present problem |
|
|
198 | (1) |
|
|
199 | (1) |
|
11.5 Practical implications |
|
|
199 | (9) |
|
|
208 | (1) |
|
11.7 Limitations of research |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
208 | (3) |
|
12 Random walk elephant swarm water search algorithm for identifying order-preserving submatrices in gene expression data: a new approach using elephant swarm water search algorithm |
|
|
211 | (22) |
|
|
|
|
211 | (2) |
|
|
213 | (1) |
|
12.2.1 Order-preserving submatrices |
|
|
213 | (1) |
|
12.2.2 Solution generation |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (3) |
|
12.3.1 Elephant swarm water search algorithm |
|
|
215 | (1) |
|
12.3.2 Random walk elephant swarm water search algorithm |
|
|
216 | (1) |
|
12.4 Numerical experiments |
|
|
217 | (13) |
|
12.4.1 Parameter settings |
|
|
218 | (1) |
|
12.4.2 Benchmark functions |
|
|
218 | (2) |
|
12.4.3 Convergence analysis |
|
|
220 | (1) |
|
12.4.4 Comparison with other metaheuristic algorithms |
|
|
221 | (1) |
|
12.4.5 Performance of random walk elephant swarm water search algorithm with the change in the objective function dimension |
|
|
221 | (1) |
|
12.4.6 Effectiveness of context switch probability |
|
|
221 | (4) |
|
12.4.7 Impact of random inertia weight strategy |
|
|
225 | (1) |
|
|
226 | (2) |
|
12.4.9 Statistical analysis |
|
|
228 | (1) |
|
12.4.10 Results on a real-life problem |
|
|
229 | (1) |
|
12.4.11 Biological relevance |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (3) |
|
13 Geopositioning of fog nodes based on user device location and framework for game theoretic applications in an fog to cloud network |
|
|
233 | (12) |
|
|
|
|
|
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (5) |
|
13.5.1 Geopositioning of fog nodes |
|
|
235 | (1) |
|
13.5.2 Applications of the proposed fog to cloud network |
|
|
236 | (1) |
|
13.5.3 Allocation of device requests to the processing resources |
|
|
236 | (1) |
|
13.5.4 User-to-user data transfer using fog nodes |
|
|
237 | (1) |
|
13.5.5 Determining the cost of edges |
|
|
238 | (1) |
|
13.5.6 Physical address of FNL2S |
|
|
239 | (1) |
|
13.5.7 Packet flow inside the network |
|
|
239 | (1) |
|
13.6 Simulation and discussion |
|
|
240 | (4) |
|
13.6.1 Geopositioning of fog nodes |
|
|
240 | (1) |
|
13.6.2 Request allocation to processing resources |
|
|
240 | (1) |
|
13.6.3 User-to-user data transfer |
|
|
241 | (3) |
|
13.7 Conclusions and future research |
|
|
244 | (1) |
|
|
244 | (1) |
|
14 A wavelet-based low frequency prior for single-image dehazing |
|
|
245 | (18) |
|
|
|
|
|
245 | (1) |
|
|
245 | (1) |
|
14.3 Motivation and contribution |
|
|
246 | (1) |
|
|
247 | (7) |
|
14.4.1 Low-frequency prior |
|
|
247 | (2) |
|
14.4.2 Noise removal in high frequency |
|
|
249 | (1) |
|
14.4.3 Dehazing in low frequency |
|
|
249 | (3) |
|
14.4.4 Fuzzy contrast enhancement |
|
|
252 | (2) |
|
14.5 Analysis of results and discussion |
|
|
254 | (7) |
|
14.5.1 Qualitative assessment |
|
|
254 | (2) |
|
14.5.2 Quantitative assessment |
|
|
256 | (2) |
|
14.5.3 Time complexity evaluation |
|
|
258 | (3) |
|
|
261 | (1) |
|
|
261 | (2) |
|
15 Segmentation of retinal blood vessel structure based on statistical distribution of the area of isolated objects |
|
|
263 | (16) |
|
|
|
|
|
263 | (2) |
|
|
265 | (3) |
|
15.2.1 Matched filter method |
|
|
265 | (1) |
|
15.2.2 Technique related to the region growing after the scale-space analysis |
|
|
265 | (1) |
|
15.2.3 Method related to the curvature estimation using mathematical morphology |
|
|
266 | (1) |
|
|
267 | (1) |
|
15.2.5 Supervised approach |
|
|
267 | (1) |
|
15.3 Basic morphological operations |
|
|
268 | (1) |
|
|
269 | (2) |
|
15.4.1 Preprocessing of the fundus image |
|
|
269 | (1) |
|
15.4.2 Initial vessel-like structure determination |
|
|
269 | (1) |
|
15.4.3 Locally adaptive line structuring element generation and blood vessel segmentation |
|
|
269 | (1) |
|
15.4.4 Enhancement of vessel structure using difference of Gaussians |
|
|
270 | (1) |
|
15.4.5 Binarization using local Otsu's threshold |
|
|
270 | (1) |
|
15.4.6 Elimination of noisy objects from a binary image |
|
|
270 | (1) |
|
|
271 | (4) |
|
|
271 | (1) |
|
15.5.2 Experimental results |
|
|
272 | (2) |
|
15.5.3 Performance measurement |
|
|
274 | (1) |
|
|
275 | (2) |
|
|
277 | (2) |
|
16 Energy-efficient rendezvous point-based routing in wireless sensor network with mobile sink |
|
|
279 | (16) |
|
|
|
|
|
279 | (1) |
|
|
280 | (1) |
|
|
280 | (3) |
|
16.3.1 Cluster-based routing protocol with static sink |
|
|
280 | (1) |
|
16.3.2 Cluster-based routing protocol with mobile sink |
|
|
281 | (2) |
|
|
283 | (2) |
|
|
283 | (1) |
|
|
284 | (1) |
|
16.5 General structure of a genetic algorithm |
|
|
285 | (1) |
|
|
285 | (1) |
|
16.5.2 Initial population |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
285 | (3) |
|
16.6.1 Cluster head selection |
|
|
286 | (1) |
|
16.6.2 Rendezvous point selection |
|
|
286 | (2) |
|
16.6.3 Tour formation for the mobile sink |
|
|
288 | (1) |
|
16.7 Simulation environment and results analysis |
|
|
288 | (3) |
|
16.7.1 Number of alive nodes |
|
|
288 | (2) |
|
16.7.2 Cumulative energy consumption |
|
|
290 | (1) |
|
16.7.3 Cumulative data packet received at base station |
|
|
290 | (1) |
|
16.7.4 Changing the base station location |
|
|
290 | (1) |
|
16.7.5 Packet drop ratio and packet delay |
|
|
290 | (1) |
|
16.8 Statistical analysis |
|
|
291 | (1) |
|
16.9 Conclusions and future work |
|
|
291 | (1) |
|
|
292 | (3) |
|
17 An integration of handcrafted features for violent event detection in videos |
|
|
295 | (12) |
|
|
|
|
|
295 | (1) |
|
|
296 | (3) |
|
17.2.1 Global histograms of oriented gradients feature descriptor |
|
|
296 | (1) |
|
17.2.2 Histogram of optical flow orientation feature descriptor |
|
|
297 | (1) |
|
17.2.3 GIST feature descriptor |
|
|
297 | (1) |
|
17.2.4 Fusion feature descriptors |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
17.3 Experimental results and discussion |
|
|
299 | (5) |
|
|
299 | (1) |
|
17.3.2 Experimental setting |
|
|
299 | (1) |
|
17.3.3 Evaluation parameter |
|
|
300 | (1) |
|
17.3.4 Results and analysis |
|
|
301 | (2) |
|
17.3.5 Space and time computation |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
304 | (3) |
|
18 Deep learning-based diabetic retinopathy detection for multiclass imbalanced data |
|
|
307 | (10) |
|
|
|
|
|
307 | (1) |
|
|
307 | (1) |
|
18.3 Data set and preprocessing |
|
|
308 | (1) |
|
|
308 | (3) |
|
18.4.1 Convolutional neural networks |
|
|
310 | (1) |
|
18.4.2 Training (transfer learning) |
|
|
311 | (1) |
|
18.4.3 Steps to train the proposed model |
|
|
311 | (1) |
|
18.5 Experimental results and discussion |
|
|
311 | (3) |
|
18.6 Conclusion and future work |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
316 | (1) |
|
19 Internet of Things e-health revolution: secured transmission of homeopathic e-medicines through chaotic key formation |
|
|
317 | (22) |
|
|
|
|
|
317 | (1) |
|
|
318 | (2) |
|
19.3 Complication statements |
|
|
320 | (1) |
|
19.4 Proposed frame of work |
|
|
320 | (1) |
|
19.5 Work flow diagram of the proposed technique |
|
|
321 | (1) |
|
19.6 Novelty of the proposed technique |
|
|
322 | (1) |
|
|
322 | (13) |
|
19.7.1 Statistical key strength |
|
|
322 | (1) |
|
19.7.2 Histogram and autocorrelation analysis |
|
|
323 | (2) |
|
19.7.3 Chi-square comparison |
|
|
325 | (1) |
|
19.7.4 Differential attacks |
|
|
325 | (1) |
|
|
326 | (7) |
|
19.7.6 Analysis of the session key space |
|
|
333 | (1) |
|
19.7.7 Analysis of the information entropy |
|
|
333 | (1) |
|
19.7.8 Encryption--decryption process time |
|
|
334 | (1) |
|
19.7.9 Time needed for an intrusion |
|
|
335 | (1) |
|
19.7.10 Comparative study with earlier works |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (3) |
|
20 Smart farming and water saving-based intelligent irrigation system implementation using the Internet of Things |
|
|
339 | (16) |
|
|
|
|
|
|
|
|
339 | (1) |
|
|
340 | (1) |
|
|
341 | (3) |
|
20.3.1 Hardware operation |
|
|
342 | (1) |
|
20.3.2 Software operation |
|
|
343 | (1) |
|
20.4 Application of machine learning model |
|
|
344 | (1) |
|
20.5 Step-by-step procedure of the proposed methodology |
|
|
345 | (2) |
|
20.6 Results and discussion |
|
|
347 | (5) |
|
20.7 Comparative study among various Internet of Things based smart agriculture systems |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
21 Intelligent and smart enabling technologies in advanced applications: recent trends |
|
|
355 | (12) |
|
|
|
|
355 | (1) |
|
21.2 Enabling intelligent technologies used in recent research problems |
|
|
355 | (7) |
|
21.2.1 Internet of Things |
|
|
355 | (1) |
|
|
355 | (2) |
|
|
357 | (1) |
|
|
357 | (1) |
|
21.2.5 Classification of various smart applications |
|
|
358 | (2) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
362 | (1) |
|
21.3 Issues and challenges |
|
|
362 | (1) |
|
|
363 | (1) |
|
21.5 Open research issues |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (3) |
|
22 Leveraging technology for healthcare and retaining access to personal health data to enhance personal health and well-being |
|
|
367 | (10) |
|
|
|
|
|
|
|
367 | (2) |
|
22.1.1 Blockchain technology: a brief overview |
|
|
368 | (1) |
|
|
368 | (1) |
|
22.2 Patient stories and identified challenges |
|
|
369 | (2) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
22.3 Electronic health record, its security, and portability |
|
|
371 | (1) |
|
22.3.1 Electronic health record |
|
|
371 | (1) |
|
22.3.2 Electronic health record data-sharing challenges and opportunities |
|
|
372 | (1) |
|
22.3.3 Blockchain and electronic health record |
|
|
372 | (1) |
|
|
372 | (2) |
|
22.4.1 Censorship resistance |
|
|
373 | (1) |
|
22.4.2 Enhanced integrity and security |
|
|
374 | (1) |
|
22.4.3 Data aggregation and identity basis |
|
|
374 | (1) |
|
22.4.4 Ownership and access control |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (1) |
|
|
374 | (3) |
|
23 Enhancement of foveolar architectural changes in gastric endoscopic biopsies |
|
|
377 | (12) |
|
|
|
|
|
377 | (2) |
|
23.1.1 Importance of gland and nuclei segmentation on clinical diagnosis |
|
|
378 | (1) |
|
23.1.2 Traditional gland segmentation computational models |
|
|
379 | (1) |
|
23.2 Current state of the art |
|
|
379 | (2) |
|
23.3 Source of images and image processing |
|
|
381 | (4) |
|
23.3.1 Description of the data set |
|
|
382 | (1) |
|
23.3.2 Segmentation approach |
|
|
382 | (1) |
|
23.3.3 Numerical definitions |
|
|
383 | (2) |
|
23.4 Outcomes and discussion |
|
|
385 | (1) |
|
23.5 Future possibilities and challenges |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
387 | (2) |
Index |
|
389 | |