top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in distributed computing and machine learning : proceedings of ICADCML 2022 / / Rashmi Ranjan Rout [and five others] editors
Advances in distributed computing and machine learning : proceedings of ICADCML 2022 / / Rashmi Ranjan Rout [and five others] editors
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (712 pages)
Disciplina 004.36
Collana Lecture notes in networks and systems
Soggetto topico Electronic data processing - Distributed processing
ISBN 981-19-1018-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Organizing Committee -- Keynotes -- Preface -- Contents -- Editors and Contributors -- Fog Computing Paradigm for Internet of Things: Architectures, Issues, Challenges, and Applications -- 1 Introduction -- 2 Challenges in Cloud-IoT Computing Paradigm -- 3 Fog Computing Architecture for IoT -- 4 Related Work -- 5 Fog Computing Challenges -- 6 Fog-Supported IoT Applications -- 7 Conclusions -- References -- Security and Challenges for Blockchain Integrated Fog-Enabled IoT Applications -- 1 Introduction -- 2 Literature Review -- 3 Analyses of the Area of Fog-IoT Applications -- 3.1 Industrial IoT (IIoT) -- 3.2 Surveillance in the Smart Cities -- 3.3 Smart Power Grid -- 3.4 Intelligent Transport System -- 3.5 Intelligent Health Services -- 4 Blockchain Integrated Fog-IoT Architecture -- 4.1 IoT Device with Blockchain Layer -- 4.2 Edge with Blockchain Layer -- 4.3 Cloud with Blockchain Layer -- 5 Challenges in the Blockchain Integrated Fog-IoT Applications -- 5.1 Adaptability -- 5.2 Complexity -- 5.3 Dynamicity -- 5.4 Latency -- 5.5 Safety -- 6 Discussion and Future Scope -- 7 Conclusions -- References -- MLP Deep Learning-based DDoS Attack Detection Framework for Fog Computing -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Network Model -- 3.2 Attack Model -- 3.3 Attack Detection Framework -- 4 Overview of Dataset -- 5 Results and Discussion -- 5.1 Simulation Setup -- 5.2 Results -- 6 Conclusion -- References -- Active VM Placement Approach Based on Energy Efficiency in Cloud Environment -- 1 Introduction and Motivation -- 1.1 Contribution -- 2 Problem Statement -- 3 Proposed Algorithm for Multi-objective VM Placement -- 4 Performance Evaluation -- 5 Conclusion and Future Scope -- References -- Security Enhancement in Cloud Environment Using Modified Key-based Crypto Method -- 1 Introduction -- 2 Related Work.
3 Proposed Method -- 3.1 Block Diagram of MKBCM -- 4 Experimental Evaluation and Results -- 4.1 Analysis of Computation Time of MKBCM -- 4.2 Analysis of Throughput of MKBCM -- 5 Comparative Analysis -- 5.1 Comparative Study of Execution Times -- 5.2 Comparative Study of Throughput -- 6 Conclusion and Future Work -- References -- RFID-Based Authentication Scheme for Secure Access of Medical Data in IoT-Enabled Health Environments -- 1 Introduction -- 2 System Architecture -- 3 Proposed Scheme -- 3.1 System Initialization -- 3.2 User Registration -- 3.3 Login and Authentication Phase -- 4 Informal Security Analysis -- 5 Performance Comparison -- 6 Conclusion -- References -- FML Framework: Function-Triggered ML-as-a-Service for IoT Cloud Applications -- 1 Introduction -- 2 Related Work -- 3 FML Framework -- 4 ML-as-a-Service-Hosted Services and Processes -- 4.1 ML-Algorithms -- 4.2 Processing Stages -- 4.3 Hosting ML-as-a-Service -- 5 Experimental Results -- 5.1 Experimental Setup -- 5.2 FML-Time Efficiency -- 5.3 FML-Cost Efficiency -- 6 Conclusion and Outlooks -- References -- A New Approach for Processing Raster Geospatial Big Data in Distributed Environment -- 1 Introduction -- 1.1 Issues and Challenges -- 2 Related Works -- 3 Proposed Architecture -- 3.1 Experimental Analysis -- 3.2 A New Approach for Processing Raster Geospatial Data in Distributed Environment -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- An Efficient Service Selection Algorithm for Cloud Computing -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed Algorithm and Illustration -- 4.1 Proposed Algorithm -- 4.2 Illustration -- 5 Datasets, Performance Metrics, Comparison Results, and Analysis -- 6 Conclusion -- References.
Transaction and QoS-Driven Composition of Web Services Using Modified Grey Wolf Optimization with TOPSIS and AHP -- 1 Introduction -- 2 Background -- 2.1 Transactional Properties of Composite Service -- 2.2 QoS Computation of Composite Service -- 2.3 Weight Calculation of QoS Attributes Using AHP -- 2.4 Technique of Order Preference by Similarity to Ideal Solution (TOPSIS) -- 2.5 Grey Wolf Optimization -- 3 Related Work -- 4 Web Services Composition Using Modified Grey Wolf Optimization -- 5 Performance Evaluation -- 6 Conclusion -- References -- Wireless Sensor Network Based Miner Localization in Underground Coal Mines -- 1 Introduction -- 1.1 Background -- 1.2 Motivation -- 2 Related Work -- 2.1 Localization in Traditional WSN -- 2.2 Localization in Underground Coal Mine WSN -- 3 Preliminaries -- 3.1 System Model -- 3.2 Problem Statement -- 4 Proposed Method -- 4.1 Localization Error -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- Bacterial Forging Optimization-Based Clustering Protocol for Wireless Sensor Networks -- 1 Introduction -- 2 Review of Related Literature -- 2.1 Brute Force Approaches -- 2.2 Nature-Inspired Approaches -- 3 Proposed Approach -- 3.1 Bacteria Foraging Optimization (BFO) -- 3.2 Energy Model -- 3.3 Network Model -- 4 Performance Evaluation -- 4.1 Simulation Environment -- 4.2 Simulation Result -- 5 Conclusion -- References -- Deer Hunting Optimization-Enabled Multi-objective Range-Free Anchor-Based Localization in WSN -- 1 Introduction -- 2 Literature Survey -- 2.1 Related Works -- 2.2 Review -- 3 Range-Free Anchor-Based Node Localization Strategy in WSN -- 3.1 3D DV-Hop Localization Model -- 3.2 DHOA -- 4 DHOA-DV-HOP Range-Free Anchor-Based Localization -- 4.1 Multi-objective Model -- 5 Results and Discussions -- 5.1 Convergence Analysis -- 5.2 Average Localization Error Analysis.
5.3 Localization Error Variance Analysis -- 6 Conclusion -- References -- A Fuzzy Logic-Based Trust Management Scheme for Wireless Sensor Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Trust Evaluation Model -- 3.1 Trust Factors -- 3.2 Algorithm for Proposed FLTM Scheme -- 3.3 Proposed Fuzzy Inference System -- 4 Results of Simulation -- 4.1 Simulation Domain -- 4.2 Simulation Results and Analysis -- 4.3 Performance Metrics -- 4.4 Comparison Between FLTM and GTMS -- 5 Conclusion -- References -- A Fuzzy Logic-Based Congestion Detection Technique for Vehicular Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Fuzzy Logic-Based Congestion Detection and IoT-Based Emergency Routing -- 3.1 "Fuzzy Logic-Based Inference System for Congestion Detection" -- 4 Simulation Results -- 5 Conclusion -- References -- Reinforcement Learning Based Routing in Software Defined Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Data Plane -- 3.2 Control Plane -- 3.3 Knowledge Plane -- 3.4 Management Plane -- 4 Implementation -- 4.1 Training Phase -- 4.2 Testing Phase -- 5 Result Analysis -- 6 Conclusion -- References -- Load Balancing for Network Resource Management in Software-Defined Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Load Balancing Algorithms -- 3.2 To Collect the Data from the Log Files -- 3.3 ANN Load Balancing Between Multiple Servers -- 3.4 Comparison of Algorithms -- 3.5 To Perform a Health Check on the Servers -- 3.6 RL Based Load Balancing Between Multiple Paths -- 4 Results and Discussions -- 5 Conclusion -- References -- A Survey on Layer 2 Solutions to Achieve Scalability in Blockchain -- 1 Introduction -- 2 Blockchain: The Challenge Involved -- 3 The Scalability Trilemma -- 4 Layer 2 Solutions -- 4.1 Payment Channels -- 4.2 Sidechains -- 4.3 Cross-Chain Techniques.
4.4 Off-Chain Computations -- 5 Discussion and Conclusion -- References -- Swift and Secure Medical Data Transaction -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Experimental Results and Analysis -- 5 Conclusion -- References -- Things-Aware Business Process Model -- 1 Introduction -- 2 Related Work -- 3 Integration of BPMN with IoT -- 4 Decomposition of Business Processes -- 4.1 A Case Study -- 5 Comparative Analysis of PMS -- 6 Conclusion -- References -- An Uncertainty-Aware Cloud Service Selection Model Using CRITIC and MAUT -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Case Study -- 4.1 Calculation of Criteria Weight Using CRITIC -- 4.2 Calculation of Alternative Rank Using MAUT -- 4.3 Analysis of Results -- 5 Conclusion -- References -- A Graphical User Interface (GUI) Based Speech Recognition System Using Deep Learning Models -- 1 Introduction -- 2 Literature Survey -- 3 Method -- 4 Result and Discussion -- 4.1 Test Sample/Segment -- 4.2 Experiments -- 4.3 Implementation -- 5 Conclusion -- References -- Deep Learning Based Document Layout Analysis on Historical Documents -- 1 Introduction -- 2 Related Work -- 3 Document Layout Analysis Using YOLOv3 -- 3.1 YOLOv3 -- 3.2 Visual Document Layout Analysis -- 4 Datasets -- 4.1 OHG -- 4.2 BOZEN -- 5 Experimental Setup and Results -- 5.1 Implementation -- 5.2 Results -- 6 Conclusion -- References -- Comparative Study of Deep Learning Approaches for Classification of Flares in Images -- 1 Introduction -- 2 Related Work -- 2.1 AlexNet -- 2.2 MobileNetv2 -- 2.3 ResNet18 -- 2.4 VGGNet -- 2.5 SqueezeNet -- 3 Datasets -- 4 Experimental Setup -- 5 Result Discussion and Analysis -- 6 Conclusion -- References -- Exploring SVM for Federated Machine Learning Applications -- 1 Introduction -- 2 Literature Review -- 3 The Proposed Federated SVM Model -- 4 Validation -- 4.1 Dataset.
4.2 Experiments and Results.
Record Nr. UNINA-9910585789203321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computing, Communication and Learning : Third International Conference, CoCoLe 2024, Warangal, India, September 13–15, 2024, Revised Selected Papers / / edited by Sanjaya Kumar Panda, Rajkumar Buyya, Rashmi Ranjan Rout, Manjubala Bisi, Sangharatna Godboley, Kuan-Ching Li, Ashish Ghosh
Computing, Communication and Learning : Third International Conference, CoCoLe 2024, Warangal, India, September 13–15, 2024, Revised Selected Papers / / edited by Sanjaya Kumar Panda, Rajkumar Buyya, Rashmi Ranjan Rout, Manjubala Bisi, Sangharatna Godboley, Kuan-Ching Li, Ashish Ghosh
Autore Panda Sanjaya Kumar
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (576 pages)
Disciplina 006.3
Altri autori (Persone) BuyyaRajkumar
RoutRashmi Ranjan
BisiManjubala
GodboleySangharatna
LiKuan-Ching
GhoshAshish
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computer engineering
Computer networks
Application software
Computers
Artificial Intelligence
Computer Engineering and Networks
Computer and Information Systems Applications
Computing Milieux
ISBN 9783031790416
3031790413
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Advancements in AI for Predictive Modeling, Quality Enhancement, and Real-Time Detection Across Various Domains. -- Crude Oil Price Forecasting using Hybridization of Optimized Deep Learning and Shallow Machine Learning Models. -- Adam Lyrebird Optimization-based DLSTM for Solar Irradiance Prediction using Time Series Data. -- Code Smell Detection using Deep Learning Models to Enhance the Software Quality. -- Unveiling the Future of Agriculture: Transformative Impact of Advanced Deep Learning with Mobile App Technology for Plant Leaf Disease Detection. -- Air Quality Prediction using Ensemble Learning. -- Real-Time Highway Accident Detection and Response with Deep Learning and Edge Caching. -- Detection of Yoga Poses Using CNN and LSTM Models. -- Enhancing Rhetorical Role Identification in Legal Documents using Large Language Models and IN_place Data Augmentation. -- Persona-Driven Dialog Generation: Enhancing User Engagement Through Linguistic Proficiency and Personalization. -- Design and Development of a Working Tool for Visual Speech and Speaker Recognition for Marathi and Gujarati Languages. -- Analysis of Tracking Algorithms for Multi-Person Tracking. -- Personalized Human Activity Recognition Using Smartphone Technology. -- Machine Learning Advances in Medical Imaging, Agricultural Monitoring, and Multimedia Processing. -- A Comprehensive Comparative Study of Breast Cancer Detection Using Machine Learning Techniques to Improve Diagnosis. -- Performance Improvement of Machine Learning Algorithms Through Information-Theoretic Class Based Feature Multicorrelation Enabled Feature Selection for Cervical Cancer Prediction. -- Towards Robust Skin Cancer Diagnosis: Deep Fusion of VGG16 and MobileNet Features. -- Deep Transfer Model Based Accurate Brain Tumor Classification in Magnetic Resonance Images. -- Pneumonia Detection from X-ray Images using Deep Transfer Learning. -- Crop Identification by using Machine Learning Classification Algorithm. -- Biotic Stress Classification of Pear Leaves Diseases using Stacking Ensemble Approaches. -- Unveiling Emotions from Audio: A Multi-Model Exploration Leveraging Diverse Datasets. -- A Contrastive Meta-Learning Approach with Isotropic Sparse Decomposition for Scalable Audio-Visual Learning. -- Audio-Based Video Segmentation for Long Duration Videos using Triplet-Loss Based Sentence Transformers and Acoustic Characteristics. -- Video Content Moderation in Instagram. -- An Effective Deep Learning Model for Air-Scripted Alphabet Recognition System. -- Advancements in Privacy-Preservation and Intelligent Detection Systems for Federated Learning and Edge Computing. -- Privacy-Preservation for Federated Learning: Survey and Future Directions. -- Decentralized Health: Federated Deep Learning for Cervical Cytology Image Segmentation. -- Malicious URL Detection using Artificial Intelligence Techniques. -- Deep Forest-based Intrusion Detection System for Edge Intelligence Assisted Smart Homes. -- Statistical Modeling of Temperature Prediction Using Residual Network. -- Investigating Salient Object Detection Methods Tailored for Edge Computing Infrastructure. -- A Novel and Scalable Framework for Analyzing Building Energy Efficiency. -- Assessment on Significant SVM and MLP-Based Optimized Resource Allocation for Load Balancing. -- An Improved and More Effective FSPC-Based Cloud Consumer Legality Process for Protected Data. -- A Review on QoS Aware Approaches in Edge-Fog Computing Environment.
Record Nr. UNINA-9910983033503321
Panda Sanjaya Kumar  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui