Integration of Cloud Computing with Internet of Things. Группа авторов
Чтение книги онлайн.
Читать онлайн книгу Integration of Cloud Computing with Internet of Things - Группа авторов страница 4
14 Chapter 14Figure 14.1 Next generation convergence technologies.Figure 14.2 Four vs of Big data: Data scientist view.Figure 14.3 Big data classification.Figure 14.4 A big data view on smart city formation.Figure 14.5 Programmers challenges with big data analytics.Figure 14.6 Cloud convergence with Big data in its architecture.Figure 14.7 Application of Big data in cloud services.Figure 14.8 Utility model of cloud based computing.Figure 14.9 Three layered of cloud as a service model.Figure 14.10 Hadoop ecosystem modules.
15 Chapter 15Figure 15.1 Overview of Cloud Computing Service Models.Figure 15.2 Software as a service.Figure 15.3 Platform as a service.Figure 15.4 Infrastructure as a service.Figure 15.5 Desktop as a service.Figure 15.6 Analytics as a service.Figure 15.7 Artificial Intelligence as service.Figure 15.8 Classification of cloud deployment models.Figure 15.9 Virtualization architecture.Figure 15.10 Cloud application deployment.Figure 15.11 Data Center—Global Distribution [Source: Internet].Figure 15.12 Types of data analytics.Figure 15.13 Summary of Covid 19 cases (as of 05.06.2020).Figure 15.14 Gender wise Covid 19 cases (as of 05.06.2020).Figure 15.15 Clustering of Covid 19 cases based on gender (as of 05.06.2020).Figure 15.16 Microsoft Azure—Real-time analytics architecture [Sources: https://...Figure 15.17 Amazon Web Services—Real-time analytics architecture [Sources: http...Figure 15.18 Data analytics services in Cloud.Figure 15.19 Framework for data analytics in Cloud.Figure 15.20 Data analytics work flow using Cloud tools.Figure 15.21 Analyzing the text as word by word.Figure 15.22 Analyzing the text as line by line.Figure 15.23 Analyzing the forms in the text.Figure 15.24 Analyzing the tables in the text.
16 Chapter 16Figure 16.1 Essential components of a biological neuron (Source: Axo-axonic syna...Figure 16.2 Perceptron model (Source: Amended from Rosenblatt perceptron by Perc...Figure 16.3 Multi-layer perceptron (Source: Amended from neural network by Gloss...Figure 16.4 Step function (Source: Hard-limit-function by MartinThoma, licensed ...Figure 16.5 Identity function (Source: Amended from—Activation identity by Laugh...Figure 16.6 Sigmoid function (Source: Amended from Sigmoid-function-by Martin Th...Figure 16.7 tanh function (Source: Amended from tanh function by Geek3, licensed...Figure 16.8 ReLU function (Source: ReLU by Renanar2, licensed under CC BY-SA 4.0...Figure 16.9 Leaky ReLU function (Source: Amended from—Activation Functions by An...Figure 16.10 Input–output model for recurrent neural network (Source: Amended fr...Figure 16.11 Recurrent neural network (Source: Amended from—Recurrent neural net...Figure 16.12 LSTM neural network (Source: Long Short-Term Memory by fdeloche, li...Figure 16.13 Infosys stock price prediction using recurrent neural network (Sour...Figure 16.14 Actual stock price vs. forecasted stock price for infosys (Source: ...
17 Chapter 17Figure 17.1 A cloud provider selection from a federated cloud, a multi-criteria ...Figure 17.2 Flow diagram of TLBO algorithm [15].Figure 17.3 Working principle of TLBO algorithm.Figure 17.4 TLBO solution representation.Figure 17.5 Flow diagram of Jaya algorithm [16].Figure 17.6 Jaya Algorithm solution representation.Figure 17.7 Flow diagram of Bird Swarm algorithm [17].Figure 17.8 Bird Swarm algorithm population representation.Figure 17.9 The initial solution using the AHP method.Figure 17.10 Best possible solution of the three suggested algorithms.
18 Chapter 18Figure 18.1 Which depicts the system of cloud computing, its types and model [2]...Figure 18.2 The estimated cloud computing market report by the survey of by mark...
19 Chapter 19Figure 19.1 Block diagram of a blockchain.Figure 19.2 Flow of events in a blockchain.Figure 19.3 Number of fraudulent incidents (from 2012 to 2016).Figure 19.4 Screenshot of the login page.Figure 19.5 Search medicine’s interaction diagram.Figure 19.6 Screenshot of the admin account module.Figure 19.7 Admin’s interaction diagram.Figure 19.8 Screenshot of the chat module between admin and branch manager.Figure 19.9 Screenshot of the encrypting part of a decrypted received message.Figure 19.10 Screenshot of the decrypted received message.Figure 19.11 Circuit diagram for the RFID reader module.Figure 19.12 Branch manager’s interaction diagram.Figure 19.13 Number of cases per year (2012–2016).Figure 19.14 Estimated number of cases 2017–2021 basis the previous trends.
List of Tables
1 Chapter 1Table 1.1 The limitations of EC.Table 1.2 Taxonomy of interoperability: major perspectives.
2 Chapter 6Table 6.1 Topic descriptions.Table 6.2 Toolbar options.
3 Chapter 8Table 8.1 Other researches where SVM used for soil classification.Table 8.2 Other research where ML techniques used in Water Management.Table 8.3 Other researches where ML techniques used in disease detection.Table 8.4 Other researches where ML techniques used in weed detection.Table 8.5 Other researches where ML techniques used for yield prediction.
4 Chapter 10Table 10.1 Advanced techniques towards industrial maintenance and their measures...Table 10.2 Three data-driven modeling techniques for finding RUL.Table 10.3 Prognostic accuracy results.
5 Chapter 13Table 13.1 IoT technologies.Table 13.2 Comparing previous security solution with Zingbox.Table 13.3 Bluetooth protocol types data rates.Table 13.4 Wi-Fi data rates are based on protocol type.Table 13.5 Cloud companies and the services the provide.Table 13.6 Comparing MCC & Edge computing.
6 Chapter 14Table 14.1 Distributed file system: On cloud services.Table 14.2 Differences between cloud services.
7 Chapter 15Table 15.1 Location of data centers owned by popular CSPs and their performance ...
8 Chapter 17Table 17.1 Notations used in the proposed algorithm.Table 17.2 Experimental results of 3 algorithms.
9 Chapter 19Table 19.1 Example of corresponding hash values of random texts.Table 19.2 Illustrating the change in hash value just by changing the case of th...Table 19.3 Number of cases vs the percentage increase in cases (2012–2016).
Guide
1 Cover
5 Preface
8 Index
Pages
1 v