LEADER 01595nas 2200361 n 450 001 990008895620403321 005 20240229084619.0 011 $a0365-4273 035 $a000889562 035 $aFED01000889562 035 $a(Aleph)000889562FED01 035 $a000889562 091 $2CNR$aP 00000867 100 $a20161109b18521942km-y0itaa50------ba 101 0 $afre 110 $aauu-------- 200 1 $aAnnales des mines. Partie administrative 207 1$a1852-1942 210 $aParis$cCarilian, Goery et Dalmont 530 0 $aAnnales des mines. Partie administrative 675 $a613.2 676 $a622 801 0$aIT$bACNP$c20090723 859 4 $uhttp://acnp.cib.unibo.it/cgi-ser/start/it/cnr/dc-p1.tcl?catno=445&person=false&language=ITALIANO&libr=&libr_th=unina1$zBiblioteche che possiedono il periodico 901 $aSE 912 $a990008895620403321 958 $aBiblioteca Centrale "F. Gasparini". Facoltą di Ingegneria. Universitą degli Studi di Napoli "Federico II"$b1862-1932;1934;1937-1941;$edXIXb1-d1$fFINBC FINAG 959 $aFINBC 959 $aFINAG 996 $aAnnales des mines. Partie administrative$9801364 997 $aUNINA AP1 8 $6866-01$aNA104 Biblioteca Centrale "F. Gasparini". Facoltą di Ingegneria. Universitą degli Studi di Napoli "Federico II"$bdXIXb1-d1$ep.le Tecchio,80, 80125 Napoli (NA)$m0817682190;0817682195$m0817682188$nit AP2 40$aacnp.cib.unibo.it$nACNP Italian Union Catalogue of Serials$uhttp://acnp.cib.unibo.it/cgi-ser/start/it/cnr/df-p.tcl?catno=445&language=ITALIANO&libr=&person=&B=1&libr_th=unina&proposto=NO LEADER 11332nam 22006133 450 001 9911004828103321 005 20231110221744.0 010 $a1-83724-485-5 010 $a1-5231-5346-6 010 $a1-83953-534-2 035 $a(MiAaPQ)EBC30084091 035 $a(Au-PeEL)EBL30084091 035 $a(CKB)24846060300041 035 $a(NjHacI)9924846060300041 035 $a(BIP)084502323 035 $a(OCoLC)1345584915 035 $a(EXLCZ)9924846060300041 100 $a20220920d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIntelligent Network Design Driven by Big Data Analytics, IoT, AI and Cloud Computing 205 $a1st ed. 210 1$aStevenage :$cInstitution of Engineering & Technology,$d2022. 210 4$d©2022. 215 $a1 online resource (372 pages) 225 1 $aComputing and Networks 311 08$a1-83953-533-4 320 $aIncludes bibliographical references and index. 327 $aIntro -- Halftitle Page -- Series Page -- Title Page -- Copyright -- Contents -- About the Editors -- 1 Introduction to intelligent network design driven by big data analytics, IoT, AI and cloud computing -- Preface -- Chapter 2: Role of automation, Big Data, AI, ML IBN, and cloud computing in intelligent networks -- Chapter 3: An intelligent verification management approach for efficient VLSI computing system -- Chapter 4: Evaluation of machine learning algorithms on academic big dataset by using feature selection techniques -- Chapter 5: Accurate management and progression of Big Data analysis -- Chapter 6: Cram on data recovery and backup cloud computing techniques -- Chapter 7: An adaptive software defined networking (SDN) for load balancing in cloud computing -- Chapter 8: Emerging security challenges in cloud computing: An insight -- Chapter 9: Factors responsible and phases of speaker recognition system -- Chapter 10: IoT-based water quality assessment using fuzzy logic controller -- Chapter 11: Design and analysis of wireless sensor network for intelligent transportation and industry automation -- Chapter 12: A review of edge computing in healthcare Internet of Things: theories, practices, and challenges -- Chapter 13: Image processing for medical images on the basis of intelligence and bio computing -- Chapter 14: IoT-based architecture for smart health-care systems -- Chapter 15: IoT-based heart disease prediction system -- Chapter 16: DIAIF: detection of interest flooding using artificial intelligence-based framework in NDN android -- Chapter 17: Intelligent and cost-effective mechanism for monitoring road quality using machine learning -- References -- 2 Role of automation, Big Data, AI, ML IBN, and cloud computing in intelligent networks -- 2.1 Evolution of networks: everything is connected -- 2.1.1 Intelligent devices. 327 $a2.1.2 Intelligent devices connection with networks -- 2.2 Huge volume of data generation by intelligent devices -- 2.2.1 Issues and challenges of Big Data Analytics -- 2.2.2 Storage of Big Data -- 2.3 Need of data analysis by business -- 2.3.1 Sources of information -- 2.3.2 Data visualization -- 2.3.3 Analyzing Big Data for effective use of business -- 2.3.4 Intelligent devices thinking intelligently -- 2.4 Artificial intelligence and machine learning in networking -- 2.4.1 Role of ML in networks -- 2.5 Intent-based networking -- 2.6 Role of programming -- 2.6.1 Basic programming using Blockly -- 2.6.2 Blockly games -- 2.7 Role of technology to design a model -- 2.7.1 Electronic toolkits -- 2.7.2 Programming resources -- 2.8 Relation of AI, ML, and IBN -- 2.9 Business challenges and opportunities -- 2.9.1 The evolving job market -- 2.10 Security -- 2.10.1 Challenges to secure device and networks -- 2.11 Summary -- References -- 3 An intelligent verification management approach for efficient VLSI computing system -- 3.1 Introduction -- 3.2 Literature study -- 3.3 Verification management approach: Case Study 1 -- 3.3.1 The pseudo random number generator in a verification environment -- 3.3.2 Implementation of PRNG in higher abstraction language and usage of DPI -- 3.4 Verification management approach: Case Study 2 -- 3.5 Challenges and research direction -- 3.5.1 Challenges in intelligent systems -- 3.6 Conclusion -- References -- 4 Evaluation of machine learning algorithms on academic big dataset by using feature selection techniques -- 4.1 Introduction -- 4.1.1 EDM -- 4.1.2 EDM process -- 4.1.3 Methods and techniques -- 4.1.4 Application areas of data mining -- 4.2 Literature survey -- 4.3 Materials and methods -- 4.3.1 Dataset description -- 4.3.2 Classification algorithms -- 4.3.3 FS algorithms -- 4.3.4 Data preprocessing phase. 327 $a4.4 Implementation of the proposed algorithms -- 4.4.1 Model construction for the standard classifier -- 4.4.2 Implementation after attribute selection using ranker method -- 4.5 Result analysis and discussion -- 4.6 Conclusion -- References -- 5 Accurate management and progression of Big Data Analysis -- 5.1 Introduction -- 5.1.1 Examples of Big Data -- 5.2 Big Data Analysis -- 5.2.1 Life cycle of Big Data -- 5.2.2 Classification of the Big Data -- 5.2.3 Working of Big Data Analysis -- 5.2.4 Common flaws that undermine Big Data Analysis -- 5.2.5 Advantages of Big Data Analysis -- 5.3 Processing techniques -- 5.3.1 Traditional method -- 5.3.2 MapReduce -- 5.3.3 Advantages of MapReduce -- 5.4 Cyber crime -- 5.4.1 Different strategies in Big Data to help in various circumstances -- 5.4.2 Big Data Analytics and cybercrime -- 5.4.3 Security issues associated with Big Data -- 5.4.4 Big Data Analytics in digital forensics -- 5.5 Real-time edge analytics for Big Data in IoT -- 5.6 Conclusion -- References -- 6 Cram on data recovery and backup cloud computing techniques -- 6.1 Introduction -- 6.1.1 Origin of cloud -- 6.1.2 Sole features of cloud computing -- 6.1.3 Advantages of cloud computing -- 6.1.4 Disadvantages of cloud computing -- 6.2 Classification of data recovery and backup -- 6.2.1 Recovery -- 6.2.2 Backup -- 6.3 Study on data recovery and backup cloud computing techniques -- 6.3.1 Backup of real-time data and recovery using cloud computing -- 6.3.2 Data recovery and security in cloud -- 6.3.3 Amoeba: An autonomous backup and recovery solid-state drives for ransomware attack defense -- 6.3.4 A cloud-based automatic recovery and backup system for video compression -- 6.3.5 Efficient and reliable data recovery techniques in cloud computing -- 6.3.6 Cost-efficient remote backup services for enterprise cloud. 327 $a6.3.7 DR-cloud: Multi-cloud-based disaster recovery service -- 6.4 Conclusion -- References -- 7 An adaptive software-defined networking (SDN) for load balancing in cloud computing -- 7.1 Introduction -- 7.2 Related works -- 7.3 Architecture overview of SDN -- 7.4 Load-balancing framework in SDN -- 7.4.1 Classification of SDN controller architectures -- 7.5 Problem statement -- 7.5.1 Selection strategy of controller head -- 7.5.2 Network setup -- 7.6 Illustration -- 7.7 Results and discussion -- 7.7.1 Comparison of throughput -- 7.7.2 Comparison of PTR -- 7.7.3 Comparison of number of packet loss -- 7.8 Conclusion -- References -- 8 Emerging security challenges in cloud computing: an insight -- 8.1 Introduction -- 8.1.1 An introduction to cloud computing and its security -- 8.2 The security issues in different cloud models and threat management techniques -- 8.2.1 Five most indispensable characteristics -- 8.2.2 The security issues in cloud service model -- 8.2.3 Security issues in cloud deployment models -- 8.2.4 Security challenges in the cloud environment -- 8.2.5 The threat management techniques -- 8.3 Review on existing proposed models -- 8.3.1 SeDaSC -- 8.3.2 The 'SecCloud' protocol -- 8.3.3 Data accountability and auditing for secure cloud data storage -- 8.4 Conclusion and future prospectives -- References -- 9 Factors responsible and phases of speaker recognition system -- 9.1 Study of related research -- 9.2 Phases of speaker recognition system -- 9.2.1 Speaker database collection -- 9.2.2 Feature extraction -- 9.2.3 Feature mapping -- 9.3 Basics of speech signals -- 9.3.1 Speech production system -- 9.3.2 Speech perception -- 9.3.3 Speech signals -- 9.3.4 Properties of the sinusoids -- 9.3.5 Windowing signals -- 9.3.6 Zero-crossing rate -- 9.3.7 Autocorrelation -- 9.4 Features of speech signals -- 9.4.1 Physical features. 327 $a9.4.2 Perceptual features -- 9.4.3 Signal features -- 9.5 Localization of speaker -- 9.6 Conclusion -- References -- 10 IoT-based water quality assessment using fuzzy logic controller -- 10.1 Introduction -- 10.2 Experimental procedures -- 10.3 Working -- 10.4 Results and discussions -- 10.5 Conclusion -- References -- 11 Design and analysis of wireless sensor network for intelligent transportation and industry automation -- 11.1 Introduction -- 11.2 Wireless sensor network -- 11.3 WSN application -- 11.4 Limitations of WSN -- 11.5 Literature survey -- 11.6 Related work -- 11.7 Methodology -- 11.7.1 Throughput -- 11.7.2 Delay -- 11.7.3 Packet delivery ratio -- 11.7.4 Design of WiMAX-based WSN system -- 11.8 Related results -- 11.9 Conclusion -- 11.10 Future scope -- References -- 12 A review of edge computing in healthcare Internet of things: theories, practices and challenges -- 12.1 Introduction -- 12.2 Cloud computing in healthcare and its limitations -- 12.2.1 Public cloud -- 12.2.2 Private cloud -- 12.2.3 Hybrid cloud -- 12.2.4 Community cloud -- 12.3 Edge computing and its advantages over cloud computing -- 12.3.1 Advantages of edge/fog computing -- 12.3.2 Disadvantages of edge/fog computing -- 12.4 IoT in healthcare -- 12.5 Edge computing in healthcare -- 12.6 Machine learning in healthcare -- 12.7 Integrated role of IOT, ML and edge computing in healthcare -- 12.7.1 Patient care during surgical procedure -- 12.7.2 Patient care at home -- 12.7.3 Patient care in ambulance -- 12.8 Modelling and simulation tools for edge/fog computing -- 12.9 Edge computing in Covid-19 pandemic era -- 12.10 Challenges of edge computing -- 12.11 Conclusion -- References -- 13 Image Processing for medical images on the basis of intelligence and biocomputing -- 13.1 Introduction -- 13.1.1 What is an image? -- 13.2 Image processing. 327 $a13.2.1 Equivalent image processing. 330 $aThis book shows how innovations in network analytics, IoTs and cloud computing platforms are being used to ingest, analyse and correlate a myriad of big data across the entire network stack in order to increase quality of service and quality of experience (QoS/QoE) and to improve network performance. 410 0$aComputing and Networks 606 $aInternet of things 606 $aCloud computing 615 0$aInternet of things. 615 0$aCloud computing. 676 $a004.6782 700 $aKumar$b Sunil$0868762 701 $aMapp$b Glenford$01823790 701 $aCengiz$b Korhan$01359531 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911004828103321 996 $aIntelligent Network Design Driven by Big Data Analytics, IoT, AI and Cloud Computing$94390740 997 $aUNINA