Vai al contenuto principale della pagina

Advances in computing, informatics, networking and cybersecurity : a book honoring Professor Mohammad S. Obaidat's significant scientific contributions / / edited by Sudip Misra, [and four others]



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Advances in computing, informatics, networking and cybersecurity : a book honoring Professor Mohammad S. Obaidat's significant scientific contributions / / edited by Sudip Misra, [and four others] Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (812 pages) : illustrations (chiefly color)
Disciplina: 004
Soggetto topico: Computer science
Persona (resp. second.): MisraSudip
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Preface -- About Professor Mohammad S. Obaidat -- Contents -- Computing -- Workload Scheduling in Fog and Cloud Environments: Emerging Concepts and Research Directions -- 1 Introduction -- 2 Cloud Computing -- 2.1 Characteristics -- 2.2 Service Models -- 2.3 Deployment Models -- 3 The Internet of Things and Fog Computing -- 3.1 Fog Computing -- 4 Workloads in Fog and Cloud Environments -- 4.1 Fine-Grained Parallel Applications -- 4.2 Coarse-Grained Parallel Applications -- 4.3 Embarrassingly Parallel Applications -- 5 Scheduling Problem -- 5.1 Definition -- 5.2 Objectives in Cloud and Fog Platforms -- 6 Established Scheduling Techniques -- 6.1 Gang Scheduling -- 6.2 Workflow Scheduling -- 6.3 Bag-of-Tasks Scheduling -- 7 Scheduling Trends and Challenges -- 7.1 Hybrid Clouds -- 7.2 Fog and Cloud Collaboration -- 7.3 Real-Time Constraints -- 7.4 Energy Efficiency -- 7.5 Dynamic Scaling -- 8 Conclusions -- References -- A Comprehensive Survey of Estimator Learning Automata and Their Recent Convergence Results -- 1 Introduction -- 1.1 Learning Automata -- 1.2 Contributions of This Paper -- 2 Estimator Algorithms -- 2.1 Rationale and Motivation -- 2.2 Continuous Estimator Algorithms -- 2.3 The TSE Algorithm -- 2.4 The Generalized Pursuit Algorithm -- 2.5 Discretized Estimator Algorithms -- 2.6 The Use of Bayesian Estimates in PAs -- 3 Previously-Reported Inaccurate ``Proofs'' -- 4 The Proofs for the Pursuit Learning Paradigm -- 5 Proofs of Convergence of the Pursuit-Paradigm-Based LA -- 5.1 The Previous Erroneous ``Proof'' -- 5.2 The New State-of-The-Art Proofs -- 6 Conclusions -- References -- Multimodal Data Fusion -- 1 Introduction -- 2 Incomplete Multimodal Data Fusion Algorithm Based on Deep Semantic Matching -- 2.1 Problem Description -- 2.2 Incomplete Multimodal Non-negative Matrix Factorization.
2.3 Local Invariant Graph Regularization -- 2.4 Incomplete Multimodal Deep Semantic Matching Algorithm -- 2.5 Model Optimization -- 2.6 Algorithm Complexity Analysis -- 3 Incremental Co-clustering Fusion Algorithm for Parameter-Free Multimodal Data -- 3.1 Problem Description -- 3.2 Multimodal Feature Similarity Measurement and Learning Strategy -- 3.3 Incremental Cluster Update -- 3.4 Adaptive Modal Weight Adjustment -- 3.5 Multimodal Incremental Co-clustering Fusion Algorithm -- 4 Deep Heterogeneous Transfer Learning Model -- 4.1 Problem Formulation -- 4.2 Deep Semantic Mapping Mechanism -- 4.3 Training the DHTL Model -- 4.4 Prediction by Deep Transfer Model -- 5 Unsupervised Multi-View Non-Negative Correlated Feature Learning -- 5.1 Problem Formulation -- 5.2 Correlated and Uncorrelated Feature Learning -- 5.3 Optimization -- 6 Conclusion -- References -- Efficient Parallel Implementation of Cellular Automata and Stencil Computations in Current Processors -- 1 Introduction -- 2 Related Works -- 3 Cellular Automata Model -- 4 Current CPU Architecture -- 4.1 Roofline Model -- 5 Optimization -- 5.1 Reducing Memory Size -- 5.2 Reusing CA Elements -- 5.3 Matrices to Hold the Neighbor Information and the CA Input and Output -- 5.4 Eliminating Conditional Structures -- 5.5 Loop Unrolling -- 5.6 Vectorization and Packet Coding -- 5.7 Data Pipelining -- 5.8 Spatial Blocking -- 5.9 Temporal Blocking -- 6 Conclusions and Future Work -- References -- A Comprehensive Review on Edge Computing: Focusing on Mobile Users -- 1 Introduction -- 1.1 The Road to the Edge Computing -- 1.2 Trends -- 1.3 Motivation and Contribution -- 2 Overview of Basic Concepts -- 2.1 Mobile and Pervasive Computing -- 2.2 Cloud Computing, VMs and Containers -- 2.3 Mobile Cloud Computing -- 2.4 Edge Computing -- 3 The State-of-the Art of Edge Computing Paradigms -- 3.1 Cloudlets.
3.2 Fog Computing -- 3.3 Multi-access Edge Computing -- 3.4 A High-Level Comparison -- 4 Applications Categories and MEC Relation to Crowdsourcing -- 4.1 Categories -- 4.2 MEC Key Elements to Crowdsourcing Architecture -- 5 Issues and Open Research Challenges -- 6 Conclusion -- References -- Informatics -- Smart Healthcare: Rough Set Theory in Predicting Heart Disease -- 1 Introduction -- 2 Background Literature -- 3 Methods -- 3.1 Classical Rough Set Approach (CRSA) -- 3.2 Mathematical Preliminaries of CRSA -- 3.3 Dominance-Based Rough Set Approach (DRSA) -- 4 Problem Dataset -- 4.1 Data Preprocessing and Discretization -- 4.2 Rule Induction from CRSA and VC DRSA -- 5 Brief Overview of Machine Learning Tools -- 5.1 Statistical Classifier C4.5 -- 5.2 Random Forest -- 5.3 Naïve Bayes -- 5.4 Support Vector Machines (SVM) -- 5.5 Logistic Regression -- 5.6 Multilayer Perceptron -- 6 Performance Evaluation Metrics -- 7 Results -- 8 Discussion -- 8.1 Applicability of Decision Rules in Detecting Heart Disease -- 9 Conclusions -- Appendix: Description of the Variables in the Information Table -- References -- Healthcare Patient Flow Modeling and Analysis with Timed Petri Nets -- 1 Introduction -- 2 Petri Nets -- 2.1 Definition -- 2.2 Transition Firing Rules -- 2.3 Modeling Power -- 2.4 System Analysis with Petri Net Models -- 2.5 Timed Petri Nets -- 3 Patient Flow and Modeling -- 3.1 Patient Flow -- 3.2 Initial Petri Net Model of the Patient Flow -- 3.3 Modeling Resource Requirements -- 3.4 Modeling Time -- 3.5 Identify Resource Usage and Task Durations -- 4 Patient Flow Evaluation -- 4.1 STPN Simulation -- 4.2 Performance Evaluation -- 4.3 Simulation Set Up and Results -- 5 Refinement of Patient Flow Model -- 6 Conclusion -- References.
Enabling and Enforcing Social Distancing Measures at Smart Parking Infrastructures Using Blockchain Technology in COVID-19 -- 1 Introduction -- 2 Related Work -- 2.1 COVID-19 Pandemic -- 2.2 Social Distancing -- 2.3 Smart Parking -- 2.4 Blockchain Technology -- 3 Blockchain-Based Framework with Social Distancing in Smart Parking -- 4 Features of Using Blockchain Technologies for Social Distancing in Smart Parking -- 5 Analysis of Proposed Model -- 5.1 Financial Analysis -- 5.2 Security Analysis -- 6 Conclusion -- References -- Using DEVS for Full Life Cycle Model-Based System Engineering in Complex Network Design -- 1 Introduction -- 2 Complex Network Design in Emergency Decision Making -- 2.1 Emergency Decision-Making and Requirements -- 2.2 Problems with Current MANET Modeling and Simulation -- 2.3 Towards DEVS-Based Methodology for Complex Network Modeling and Simulation -- 2.4 Summary -- 3 DEVS in Complex Network Design -- 4 Specification of Required Behaviors Using UML/SysML Metamodels that Map to Hierarchical DEVS Simulation Models -- 4.1 Enabling Implementation of Various Routing Infrastructures -- 5 High-Level Specification of Routing Mechanisms in DEVS -- 5.1 Routing Processes as Network Models -- 5.2 DEVS Modeling Levels -- 5.3 RDEVS as a Formalization of the Network Model -- 5.4 Computer Networks as a Domain-Specific Example -- 6 Co-simulation of Complex Networks -- 6.1 Co-simulation Principles -- 6.2 DEVS as Co-simulation Support -- 6.3 Network Co-simulation Example -- 6.4 Synthesis on Co-simulation -- 7 DEVS-Based Infrastructure to Design Complex Networks -- 7.1 DEVS-Based Architecture for MANET Simulation -- 7.2 OSI Model and Communication Stack -- 7.3 Virtual Communication Stack -- 7.4 Co-simulation Using the VCS and DEVS -- 7.5 Integrated Software-in-the-Loop and Hardware-in-the-Loop Paradigms -- 7.6 Summary.
8 Hybrid Modeling and Simulation of Complex Data Networks -- 8.1 Combining Packet and Fluid DEVS Network Models -- 8.2 Performance and Accuracy of Hybrid Topologies in PowerDEVS -- 8.3 Synthesis on Hybrid Simulation -- 9 Summary and Conclusions -- References -- Touchless Palmprint and Fingerprint Recognition -- 1 Introduction -- 2 Palmprint Recognition -- 2.1 Acquisition -- 2.2 Preprocessing -- 2.3 Feature Extraction and Matching -- 3 Fingerprint Recognition -- 3.1 Acquisition -- 3.2 Preprocessing -- 3.3 Feature Extraction and Matching -- 4 Conclusions -- References -- A Survey of IoT Software Platforms -- 1 Introduction -- 2 Research Methodology -- 2.1 IoT Platforms Selection -- 2.2 IoT Platforms Evaluation -- 3 Background and Evaluation Scheme -- 3.1 The Role of IoT Platforms -- 3.2 Evaluation Criteria -- 4 Survey of IoT Platforms -- 4.1 Research Sample -- 4.2 Comparative Analysis -- 4.3 Discussion -- 5 Challenges -- 6 Conclusions -- References -- Networking -- FLER: Fuzzy Logic-Based Energy Efficient Routing for Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 FLER Protocol -- 3.1 Network Model -- 3.2 Energy Consumption Model -- 3.3 Proposed Routing Mechanism -- 3.4 Fuzzy Logic System -- 4 Performance Evaluation -- 4.1 Simulation Environment -- 4.2 Simulation Results and Discussion -- 5 Conclusion -- References -- Application of Device-to-Device Communication in Video Streaming for 5G Wireless Networks -- 1 Introduction -- 2 Background -- 3 DABAST: The Architecture -- 3.1 DABAST -- 3.2 The CSVD and DISCS Algorithms -- 4 Modeling DABAST with DEVS -- 5 Simulation Scenarios and Results -- 6 Conclusion -- References -- 5G Green Network -- 1 Introduction -- 2 Energy Efficiency of Random Cellular Networks -- 2.1 Related Work -- 2.2 System Model -- 2.3 Hard-Core Point Process Cellular Networks -- 2.4 Spectrum and Energy Efficiency.
2.5 Simulation Results.
Sommario/riassunto: This book presents new research contributions in the above-mentioned fields. Information and communication technologies (ICT) have an integral role in todays society. Four major driving pillars in the field are computing, which nowadays enables data processing in unprecedented speeds, informatics, which derives information stemming for processed data to feed relevant applications, networking, which interconnects the various computing infrastructures and cybersecurity for addressing the growing concern for secure and lawful use of the ICT infrastructure and services. Its intended readership covers senior undergraduate and graduate students in Computer Science and Engineering and Electrical Engineering, as well as researchers, scientists, engineers, ICT managers, working in the relevant fields and industries.
Titolo autorizzato: Advances in computing, informatics, networking and cybersecurity  Visualizza cluster
ISBN: 3-030-87049-9
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910551832903321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems : ; 289.