Advances in distributed computing and machine learning : proceedings of ICADCML 2022 / / Rashmi Ranjan Rout [and five others] editors
| Advances in distributed computing and machine learning : proceedings of ICADCML 2022 / / Rashmi Ranjan Rout [and five others] editors |
| Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
| Descrizione fisica | 1 online resource (712 pages) |
| Disciplina | 004.36 |
| Collana | Lecture notes in networks and systems |
| Soggetto topico | Electronic data processing - Distributed processing |
| ISBN | 981-19-1018-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Organizing Committee -- Keynotes -- Preface -- Contents -- Editors and Contributors -- Fog Computing Paradigm for Internet of Things: Architectures, Issues, Challenges, and Applications -- 1 Introduction -- 2 Challenges in Cloud-IoT Computing Paradigm -- 3 Fog Computing Architecture for IoT -- 4 Related Work -- 5 Fog Computing Challenges -- 6 Fog-Supported IoT Applications -- 7 Conclusions -- References -- Security and Challenges for Blockchain Integrated Fog-Enabled IoT Applications -- 1 Introduction -- 2 Literature Review -- 3 Analyses of the Area of Fog-IoT Applications -- 3.1 Industrial IoT (IIoT) -- 3.2 Surveillance in the Smart Cities -- 3.3 Smart Power Grid -- 3.4 Intelligent Transport System -- 3.5 Intelligent Health Services -- 4 Blockchain Integrated Fog-IoT Architecture -- 4.1 IoT Device with Blockchain Layer -- 4.2 Edge with Blockchain Layer -- 4.3 Cloud with Blockchain Layer -- 5 Challenges in the Blockchain Integrated Fog-IoT Applications -- 5.1 Adaptability -- 5.2 Complexity -- 5.3 Dynamicity -- 5.4 Latency -- 5.5 Safety -- 6 Discussion and Future Scope -- 7 Conclusions -- References -- MLP Deep Learning-based DDoS Attack Detection Framework for Fog Computing -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Network Model -- 3.2 Attack Model -- 3.3 Attack Detection Framework -- 4 Overview of Dataset -- 5 Results and Discussion -- 5.1 Simulation Setup -- 5.2 Results -- 6 Conclusion -- References -- Active VM Placement Approach Based on Energy Efficiency in Cloud Environment -- 1 Introduction and Motivation -- 1.1 Contribution -- 2 Problem Statement -- 3 Proposed Algorithm for Multi-objective VM Placement -- 4 Performance Evaluation -- 5 Conclusion and Future Scope -- References -- Security Enhancement in Cloud Environment Using Modified Key-based Crypto Method -- 1 Introduction -- 2 Related Work.
3 Proposed Method -- 3.1 Block Diagram of MKBCM -- 4 Experimental Evaluation and Results -- 4.1 Analysis of Computation Time of MKBCM -- 4.2 Analysis of Throughput of MKBCM -- 5 Comparative Analysis -- 5.1 Comparative Study of Execution Times -- 5.2 Comparative Study of Throughput -- 6 Conclusion and Future Work -- References -- RFID-Based Authentication Scheme for Secure Access of Medical Data in IoT-Enabled Health Environments -- 1 Introduction -- 2 System Architecture -- 3 Proposed Scheme -- 3.1 System Initialization -- 3.2 User Registration -- 3.3 Login and Authentication Phase -- 4 Informal Security Analysis -- 5 Performance Comparison -- 6 Conclusion -- References -- FML Framework: Function-Triggered ML-as-a-Service for IoT Cloud Applications -- 1 Introduction -- 2 Related Work -- 3 FML Framework -- 4 ML-as-a-Service-Hosted Services and Processes -- 4.1 ML-Algorithms -- 4.2 Processing Stages -- 4.3 Hosting ML-as-a-Service -- 5 Experimental Results -- 5.1 Experimental Setup -- 5.2 FML-Time Efficiency -- 5.3 FML-Cost Efficiency -- 6 Conclusion and Outlooks -- References -- A New Approach for Processing Raster Geospatial Big Data in Distributed Environment -- 1 Introduction -- 1.1 Issues and Challenges -- 2 Related Works -- 3 Proposed Architecture -- 3.1 Experimental Analysis -- 3.2 A New Approach for Processing Raster Geospatial Data in Distributed Environment -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- An Efficient Service Selection Algorithm for Cloud Computing -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed Algorithm and Illustration -- 4.1 Proposed Algorithm -- 4.2 Illustration -- 5 Datasets, Performance Metrics, Comparison Results, and Analysis -- 6 Conclusion -- References. Transaction and QoS-Driven Composition of Web Services Using Modified Grey Wolf Optimization with TOPSIS and AHP -- 1 Introduction -- 2 Background -- 2.1 Transactional Properties of Composite Service -- 2.2 QoS Computation of Composite Service -- 2.3 Weight Calculation of QoS Attributes Using AHP -- 2.4 Technique of Order Preference by Similarity to Ideal Solution (TOPSIS) -- 2.5 Grey Wolf Optimization -- 3 Related Work -- 4 Web Services Composition Using Modified Grey Wolf Optimization -- 5 Performance Evaluation -- 6 Conclusion -- References -- Wireless Sensor Network Based Miner Localization in Underground Coal Mines -- 1 Introduction -- 1.1 Background -- 1.2 Motivation -- 2 Related Work -- 2.1 Localization in Traditional WSN -- 2.2 Localization in Underground Coal Mine WSN -- 3 Preliminaries -- 3.1 System Model -- 3.2 Problem Statement -- 4 Proposed Method -- 4.1 Localization Error -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- Bacterial Forging Optimization-Based Clustering Protocol for Wireless Sensor Networks -- 1 Introduction -- 2 Review of Related Literature -- 2.1 Brute Force Approaches -- 2.2 Nature-Inspired Approaches -- 3 Proposed Approach -- 3.1 Bacteria Foraging Optimization (BFO) -- 3.2 Energy Model -- 3.3 Network Model -- 4 Performance Evaluation -- 4.1 Simulation Environment -- 4.2 Simulation Result -- 5 Conclusion -- References -- Deer Hunting Optimization-Enabled Multi-objective Range-Free Anchor-Based Localization in WSN -- 1 Introduction -- 2 Literature Survey -- 2.1 Related Works -- 2.2 Review -- 3 Range-Free Anchor-Based Node Localization Strategy in WSN -- 3.1 3D DV-Hop Localization Model -- 3.2 DHOA -- 4 DHOA-DV-HOP Range-Free Anchor-Based Localization -- 4.1 Multi-objective Model -- 5 Results and Discussions -- 5.1 Convergence Analysis -- 5.2 Average Localization Error Analysis. 5.3 Localization Error Variance Analysis -- 6 Conclusion -- References -- A Fuzzy Logic-Based Trust Management Scheme for Wireless Sensor Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Trust Evaluation Model -- 3.1 Trust Factors -- 3.2 Algorithm for Proposed FLTM Scheme -- 3.3 Proposed Fuzzy Inference System -- 4 Results of Simulation -- 4.1 Simulation Domain -- 4.2 Simulation Results and Analysis -- 4.3 Performance Metrics -- 4.4 Comparison Between FLTM and GTMS -- 5 Conclusion -- References -- A Fuzzy Logic-Based Congestion Detection Technique for Vehicular Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Fuzzy Logic-Based Congestion Detection and IoT-Based Emergency Routing -- 3.1 "Fuzzy Logic-Based Inference System for Congestion Detection" -- 4 Simulation Results -- 5 Conclusion -- References -- Reinforcement Learning Based Routing in Software Defined Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Data Plane -- 3.2 Control Plane -- 3.3 Knowledge Plane -- 3.4 Management Plane -- 4 Implementation -- 4.1 Training Phase -- 4.2 Testing Phase -- 5 Result Analysis -- 6 Conclusion -- References -- Load Balancing for Network Resource Management in Software-Defined Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Load Balancing Algorithms -- 3.2 To Collect the Data from the Log Files -- 3.3 ANN Load Balancing Between Multiple Servers -- 3.4 Comparison of Algorithms -- 3.5 To Perform a Health Check on the Servers -- 3.6 RL Based Load Balancing Between Multiple Paths -- 4 Results and Discussions -- 5 Conclusion -- References -- A Survey on Layer 2 Solutions to Achieve Scalability in Blockchain -- 1 Introduction -- 2 Blockchain: The Challenge Involved -- 3 The Scalability Trilemma -- 4 Layer 2 Solutions -- 4.1 Payment Channels -- 4.2 Sidechains -- 4.3 Cross-Chain Techniques. 4.4 Off-Chain Computations -- 5 Discussion and Conclusion -- References -- Swift and Secure Medical Data Transaction -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Experimental Results and Analysis -- 5 Conclusion -- References -- Things-Aware Business Process Model -- 1 Introduction -- 2 Related Work -- 3 Integration of BPMN with IoT -- 4 Decomposition of Business Processes -- 4.1 A Case Study -- 5 Comparative Analysis of PMS -- 6 Conclusion -- References -- An Uncertainty-Aware Cloud Service Selection Model Using CRITIC and MAUT -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Case Study -- 4.1 Calculation of Criteria Weight Using CRITIC -- 4.2 Calculation of Alternative Rank Using MAUT -- 4.3 Analysis of Results -- 5 Conclusion -- References -- A Graphical User Interface (GUI) Based Speech Recognition System Using Deep Learning Models -- 1 Introduction -- 2 Literature Survey -- 3 Method -- 4 Result and Discussion -- 4.1 Test Sample/Segment -- 4.2 Experiments -- 4.3 Implementation -- 5 Conclusion -- References -- Deep Learning Based Document Layout Analysis on Historical Documents -- 1 Introduction -- 2 Related Work -- 3 Document Layout Analysis Using YOLOv3 -- 3.1 YOLOv3 -- 3.2 Visual Document Layout Analysis -- 4 Datasets -- 4.1 OHG -- 4.2 BOZEN -- 5 Experimental Setup and Results -- 5.1 Implementation -- 5.2 Results -- 6 Conclusion -- References -- Comparative Study of Deep Learning Approaches for Classification of Flares in Images -- 1 Introduction -- 2 Related Work -- 2.1 AlexNet -- 2.2 MobileNetv2 -- 2.3 ResNet18 -- 2.4 VGGNet -- 2.5 SqueezeNet -- 3 Datasets -- 4 Experimental Setup -- 5 Result Discussion and Analysis -- 6 Conclusion -- References -- Exploring SVM for Federated Machine Learning Applications -- 1 Introduction -- 2 Literature Review -- 3 The Proposed Federated SVM Model -- 4 Validation -- 4.1 Dataset. 4.2 Experiments and Results. |
| Record Nr. | UNINA-9910585789203321 |
| Singapore : , : Springer, , [2022] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computing, Communication and Learning : Third International Conference, CoCoLe 2024, Warangal, India, September 13–15, 2024, Revised Selected Papers / / edited by Sanjaya Kumar Panda, Rajkumar Buyya, Rashmi Ranjan Rout, Manjubala Bisi, Sangharatna Godboley, Kuan-Ching Li, Ashish Ghosh
| Computing, Communication and Learning : Third International Conference, CoCoLe 2024, Warangal, India, September 13–15, 2024, Revised Selected Papers / / edited by Sanjaya Kumar Panda, Rajkumar Buyya, Rashmi Ranjan Rout, Manjubala Bisi, Sangharatna Godboley, Kuan-Ching Li, Ashish Ghosh |
| Autore | Panda Sanjaya Kumar |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (576 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
BuyyaRajkumar
RoutRashmi Ranjan BisiManjubala GodboleySangharatna LiKuan-Ching GhoshAshish |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Artificial intelligence
Computer engineering Computer networks Application software Computers Artificial Intelligence Computer Engineering and Networks Computer and Information Systems Applications Computing Milieux |
| ISBN |
9783031790416
3031790413 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Advancements in AI for Predictive Modeling, Quality Enhancement, and Real-Time Detection Across Various Domains. -- Crude Oil Price Forecasting using Hybridization of Optimized Deep Learning and Shallow Machine Learning Models. -- Adam Lyrebird Optimization-based DLSTM for Solar Irradiance Prediction using Time Series Data. -- Code Smell Detection using Deep Learning Models to Enhance the Software Quality. -- Unveiling the Future of Agriculture: Transformative Impact of Advanced Deep Learning with Mobile App Technology for Plant Leaf Disease Detection. -- Air Quality Prediction using Ensemble Learning. -- Real-Time Highway Accident Detection and Response with Deep Learning and Edge Caching. -- Detection of Yoga Poses Using CNN and LSTM Models. -- Enhancing Rhetorical Role Identification in Legal Documents using Large Language Models and IN_place Data Augmentation. -- Persona-Driven Dialog Generation: Enhancing User Engagement Through Linguistic Proficiency and Personalization. -- Design and Development of a Working Tool for Visual Speech and Speaker Recognition for Marathi and Gujarati Languages. -- Analysis of Tracking Algorithms for Multi-Person Tracking. -- Personalized Human Activity Recognition Using Smartphone Technology. -- Machine Learning Advances in Medical Imaging, Agricultural Monitoring, and Multimedia Processing. -- A Comprehensive Comparative Study of Breast Cancer Detection Using Machine Learning Techniques to Improve Diagnosis. -- Performance Improvement of Machine Learning Algorithms Through Information-Theoretic Class Based Feature Multicorrelation Enabled Feature Selection for Cervical Cancer Prediction. -- Towards Robust Skin Cancer Diagnosis: Deep Fusion of VGG16 and MobileNet Features. -- Deep Transfer Model Based Accurate Brain Tumor Classification in Magnetic Resonance Images. -- Pneumonia Detection from X-ray Images using Deep Transfer Learning. -- Crop Identification by using Machine Learning Classification Algorithm. -- Biotic Stress Classification of Pear Leaves Diseases using Stacking Ensemble Approaches. -- Unveiling Emotions from Audio: A Multi-Model Exploration Leveraging Diverse Datasets. -- A Contrastive Meta-Learning Approach with Isotropic Sparse Decomposition for Scalable Audio-Visual Learning. -- Audio-Based Video Segmentation for Long Duration Videos using Triplet-Loss Based Sentence Transformers and Acoustic Characteristics. -- Video Content Moderation in Instagram. -- An Effective Deep Learning Model for Air-Scripted Alphabet Recognition System. -- Advancements in Privacy-Preservation and Intelligent Detection Systems for Federated Learning and Edge Computing. -- Privacy-Preservation for Federated Learning: Survey and Future Directions. -- Decentralized Health: Federated Deep Learning for Cervical Cytology Image Segmentation. -- Malicious URL Detection using Artificial Intelligence Techniques. -- Deep Forest-based Intrusion Detection System for Edge Intelligence Assisted Smart Homes. -- Statistical Modeling of Temperature Prediction Using Residual Network. -- Investigating Salient Object Detection Methods Tailored for Edge Computing Infrastructure. -- A Novel and Scalable Framework for Analyzing Building Energy Efficiency. -- Assessment on Significant SVM and MLP-Based Optimized Resource Allocation for Load Balancing. -- An Improved and More Effective FSPC-Based Cloud Consumer Legality Process for Protected Data. -- A Review on QoS Aware Approaches in Edge-Fog Computing Environment. |
| Record Nr. | UNINA-9910983033503321 |
Panda Sanjaya Kumar
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||