𝔖 Scriptorium
✦   LIBER   ✦

📁

Big Data and Cloud Computing: Select Proceedings of ICBCC 2022

✍ Scribed by Neelanarayanan Venkataraman, Lipo Wang, Xavier Fernando, Ahmed F. Zobaa


Publisher
Springer
Year
2023
Tongue
English
Leaves
383
Series
Lecture Notes in Electrical Engineering, 1021
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The book presents papers from the 7th International Conference on Big Data and Cloud Computing Challenges (ICBCC 2022). The book includes high-quality, original research on various aspects of big data and cloud computing, offering perspectives from the industrial and research communities on addressing the current challenges in the field. This book discusses key issues and highlights recent advances in a single broad topic applicable to different sub-fields by exploring various multidisciplinary technologies. This book supports the transfer of vital knowledge to next-generation researchers, students, and practitioners in academia and industry.

✦ Table of Contents


Contents
About the Editors
Data Security
An Integrated Approach for Big Data Classification and Security Using Optimized Random Forest and DSSE Algorithm
1 Introduction
2 Related Works
3 Proposed Work
4 Results and Discussion
5 Conclusion
References
Secure Web Gateway on Website in Cloud
1 Introduction
2 Related Work
3 Methodology
3.1 Data Collection
3.2 Data Analysis
3.3 Testing
4 Implementation and Results
4.1 Difference Between Wix WordPress and Shopify
4.2 Bitdefender Software
4.3 Survey
4.4 Problems
4.5 Solution
4.6 Discussion
5 Conclusion
5.1 Future Work
References
Design a Quantum Cryptography Algorithm and Evaluate the Risks of Quantum-Based Nano Computing
1 Introduction
1.1 Nanotechnology
1.2 Quantum
1.3 Qubit
1.4 Quantum Computing
1.5 Quantum Cryptography or Key Distribution
2 Related Work
3 Proposed Work
3.1 Quantum Cryptography Protocol Implementation
3.2 Random Bits’ Generation
3.3 Encoding Bits into String
3.4 Measurement of Qubits
3.5 Symmetrically Share the Qubits
3.6 Symmetrically Share the Keys
4 Implementation of Without Interception
4.1 Random Bits’ Generation
4.2 Encoding Bits into String
4.3 Measurement of Qubits
4.4 Encoded Qubits
4.5 Comparison of Selection Bits
5 Implementation of with Interception
5.1 Random Bits’ Generation
5.2 Encoding Bits
5.3 Measurement of Qubits
5.4 Qubits’ Noise Removals
5.5 Comparison of Selection Bits
6 Result Discussion of Risk Analysis
7 Conclusion
References
Machine Learning
Human Odor Security Using E-nose
1 Introduction
2 Related Work
3 Proposed Work
3.1 Artificial Olfactory Sense and Recognition System
3.2 Artificial Olfactory Sense and Recognition System
3.3 Implicit Data from Signals to Binary
3.4 Encoding of Data Using ASCII
3.5 Concatenation of Character to Form String
3.6 Encryption of Data Using Caesar Cipher
3.7 Recognition and Authentication of user with Database
3.8 Passwords for Authentication
3.9 Proxy Authentication and Authorization
4 Result and Analysis
5 Conclusions
References
Automated Road Surveillance System Using Machine Learning
1 Introduction
2 Literature Survey
3 Proposed System
4 Methodology
4.1 Data Cleaning
4.2 Image Annotation
4.3 Data Ingestion Layer
4.4 Data Processing Layer
4.5 Model Training
5 Result
6 Ease of Use
7 Scope of Future Direction
8 Conclusion
References
An Artificial Intelligence-Based Technique to Optimize Hybrid Vehicle Using Renewable Energy Sources
1 Introduction
2 Related Work
3 Contribution of Work
4 Proposed System
4.1 Refilling Raw Materials and Electrolysis
4.2 Electrolysis of Water
4.3 Role of Artificial Intelligence
4.4 Hydrogen Storage
4.5 Power Management System
4.6 Modified Hybrid Vehicle Driving Apparatus
5 Discussion
6 Conclusions
References
Stock Market Prediction Using Machine Learning Techniques: A Comparative Study
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset
3.2 Machine Learning Models
4 Results and Discussions
4.1 Performance Metrics
5 Conclusion
6 Limitations
7 Future Enhancements
References
Comparative Study on Different Intrusion Detection Datasets Using Machine Learning and Deep Learning Algorithms
1 Introduction
2 Related Works
3 Intrusion Detection Dataset Details
3.1 IoT-23 Dataset
3.2 BoT-IoT Dataset
3.3 UNSW-NB15 Dataset
3.4 CSE-CIC-IDS2018 Dataset
3.5 MQTT-IOT-IDS2020 Dataset
4 Cyber Attack Details
4.1 Denial of Service (DoS)
4.2 Distributed Denial of Service (DDoS)
4.3 Botnet (BoT)
4.4 Theft
4.5 Reconnaissance
5 Comparative Analysis
6 Conclusion and Future Enhancement
References
Big Data Analytics
Mitigating Postnatal Depression: A Big Data Self-help Therapy
1 Introduction
2 Literature Analysis
2.1 Talking Therapies
2.2 Audio/Visual Therapies
2.3 Expressive Art Therapies
2.4 Clinical Procedures
2.5 Computerised Psychotherapy
3 Methodology
4 Implementation and Discussion
4.1 Postpartum Mobile Applications Meta-Analysis
4.2 Implementation of Algorithm
5 Results
6 Conclusion and Future Work
References
Improving Learning Effectiveness by Leveraging Spaced Repetition (SR)
1 Introduction
2 Related Work
3 Methodology
4 Implementation and Results
4.1 Assumptions
4.2 The Different Stages of Implementation
5 Conclusion
5.1 Future Work
References
Snooping for Fake News: A Cascaded Approach Using Stance Detection and Entailment Classification
1 Introduction
2 Related Work
3 Our Approach
4 System Architecture
4.1 Stance Detection
4.2 Entailment Classification
5 Results
6 Conclusion
References
Early Planning of Virtual Machines to Servers in Cloud Server Farms is an Approach for Energy-Efficient Resource Allocation
1 Introduction
2 Related Work
3 Proposed Work
3.1 Early Planning
3.2 Algorithm
4 Results and Discussion
5 Conclusion and Future Work
References
Performance Analysis of Distributed Algorithms for Big Data Classification
1 Introduction
2 Literature Review
3 Distributed Classification Algorithms for Big Data
4 Experimental Setup
5 Performance Evaluation and Discussion
6 Conclusion
References
IoT
Achieving Sustainability by Rectifying Challenges in IoT-Based Smart Cities
1 Introduction
2 Literature Analysis
3 Methodology
4 Implementation of IoT-Based Smart City
4.1 IoT Layer (Layer 1)
4.2 Transport Layer (Layer 2)
4.3 Processing Layer (Layer 3)
4.4 Application Layer (Layer 4)
4.5 Business Layer (Layer 5)
5 Challenges of Smart Cities and Their Solutions
5.1 Making People Aware of Smart City Services
5.2 Cloud, Edge, and Fog Computing Attacks and Their Prevention Techniques
5.3 Providing Privacy and Security in the Smart City Network
5.4 Sensor Performance
5.5 Development of Novel Data Analytics
6 Results
7 Conclusion and Future Directions
References
Framework for Implementation of Smart Driver Assistance System Using Augmented Reality
1 Introduction
1.1 Background
1.2 Motivation
2 Literature Review
2.1 Comparative Study
3 Design and Implementation
3.1 POSIT Algorithm
3.2 Details of Input/Data Used
4 Experimental Results and Analysis
5 Results and Future Scope
5.1 Data Set Used Dataset
5.2 Conclusion
References
IoT-Based Mental Health Monitoring System Using Machine Learning Stress Prediction Algorithm in Real-Time Application
1 Introduction
2 Literature Review
2.1 Problem Statement
3 Proposed Stress Prediction Model Architecture
3.1 Arduino-ESP8266
3.2 GSR Sensor
3.3 ECG Sensor
3.4 Temperature Sensor—LM35
3.5 GSM Module
3.6 Web Interface
4 Experimental Results
4.1 Dataset
4.2 Our Approach and Results
5 Conclusion and Future Work
5.1 Declarations
References
Fish Feeder System Using Internet of Things
1 Introduction
2 Literature Survey
3 Proposed Model
3.1 Fish Feeder System Module Overview
3.2 Design and Development of Feeder System
3.3 Feeder System Flow
4 Experiments and Results
4.1 Dispatching Fish Feed Experimentation
4.2 Oxygen Pump and Water Pump Experimentation
4.3 User Interaction with the Mobile Application
5 Conclusion and Future Directions
References
An Efficient and Recoverable Symmetric Data Aggregation Approach for Ensuring the Content Privacy of Internet of Things
1 Introduction
2 Related Work
3 Preliminaries
3.1 Content-Oriented Privacy and Data Aggregation
3.2 System Model
4 Privacy-Protecting Symmetric Data Aggregation Method
4.1 Initialization and Data Generation
4.2 Data Aggregation
4.3 Data Extraction
5 Performance Analysis
5.1 The Storage Cost
5.2 The Communication Cost
5.3 The Computation Complexity
6 Conclusion
References
Wireless Networks
Implementation and Comparative Analysis of Various Energy-Efficient Clustering Schemes in AODV
1 Introduction
1.1 WSN Applications
1.2 Parameters of a WSN Network
1.3 Topologies in WSN
1.4 Energy Consumption in WSN
1.5 Routing Algorithms
2 Literature Review
2.1 Traditional Routing Protocol in WAN Network
2.2 Optimized Link State Routing (OLSR)
2.3 Destination Sequenced Distance Vector (DSDV)
2.4 Ad hoc Demand Distance Vector
3 Proposed Work
3.1 Environment of Attack Analysis with Wormhole and Without Wormhole
3.2 Parameters Used for Comparison
4 Conclusion
References
Adaptive End-To-End Network Slicing on 5G Networks
1 Introduction
2 Related Work
3 QoS Architecture
4 Implementation Details
5 Conclusion and Future Work
References
Zero Trust Framework in Integrated Cloud Edge IoT Environment
1 Introduction
2 Literature Survey
3 Zero Trust Framework in Integrated Environment
3.1 Integrated Environment
3.2 IOT Gateway Management
4 Implementation
5 Conclusion and Future Work
References
Ph.D. Track Paper
O2Q: Deteriorating Inventory Model with Stock-Dependent Demand Under Trade Credit Policy
1 Introduction
2 Literature Review
3 Assumptions
4 Notations
5 Mathematical Formulations
6 Numerical Example
7 Sensitive Analysis
8 Conclusion
References
Embedding ( K9 - C9 )2n 2 into Certain Necklace Graphs
1 Introduction
2 Preliminaries
3 Main Results
3.1 Wirelength of ( K9 - C9 )n in Star Necklace Graph
3.2 Wirelength of (K9-C9)n in Path Necklace Graph
3.3 Wirelength of (K9-C9)n in Cycle Necklace Graph
3.4 Wirelength of ( K9 - C9 )2n in Circular Necklace Graph
4 Conclusion
References
Lyrics Generation Using LSTM and RNN
1 Introduction
2 Literature Review
3 Background
3.1 Recurrent Neural Network
3.2 Long Short-Term Memory (LSTM)
3.3 CuDNN LSTMs
3.4 Model Building
4 Results and Inferences
4.1 Generated Lyrics
4.2 Inclusion/Exclusion of the Dropout Layers
5 Discussions
6 Conclusion and Future Work
References


📜 SIMILAR VOLUMES


Big Data and Cloud Computing: Select Pro
✍ Neelanarayanan Venkataraman; Lipo Wang; Xavier Fernando; Ahmed F. Zobaa 📂 Library 📅 2023 🏛 Springer Nature 🌐 English

The book presents papers from the 7th International Conference on Big Data and Cloud Computing Challenges (ICBCC 2022). The book includes high-quality, original research on various aspects of big data and cloud computing, offering perspectives from the industrial and research communities on addressi

Advances in Big Data and Cloud Computing
✍ J. Dinesh Peter, Amir H. Alavi, Bahman Javadi 📂 Library 📅 2019 🏛 Springer Singapore 🌐 English

<p><p>This book is a compendium of the proceedings of the International Conference on Big Data and Cloud Computing. It includes recent advances in the areas of big data analytics, cloud computing, internet of nano things, cloud security, data analytics in the cloud, smart cities and grids, etc. This

Disruptive Technologies for Big Data and
✍ J. Dinesh Peter (editor), Steven Lawrence Fernandes (editor), Amir H. Alavi (edi 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book provides a written record of the synergy that already exists among the research communities and represents a solid framework in the advancement of big data and cloud computing disciplines from which new interaction will result in the future. This book is a compendium of the Intern

Disruptive Technologies for Big Data and
✍ J. Dinesh Peter (editor), Steven Lawrence Fernandes (editor), Amir H. Alavi (edi 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book provides a written record of the synergy that already exists among the research communities and represents a solid framework in the advancement of big data and cloud computing disciplines from which new interaction will result in the future. This book is a compendium of the Intern

Proceedings of the 3rd International Sym
✍ V. Vijayakumar, V. Neelanarayanan (eds.) 📂 Library 📅 2016 🏛 Springer International Publishing 🌐 English

<p><p>This proceedings volume contains selected papers that were presented in the 3rd International Symposium on Big data and Cloud Computing Challenges, 2016 held at VIT University, India on March 10 and 11. New research issues, challenges and opportunities shaping the future agenda in the field of

Proceedings of 6th International Confere
✍ V. Vijayakumar, V. Neelanarayanan, Praveen Rao, Janet Light 📂 Library 📅 2020 🏛 Springer Singapore 🌐 English

<p><p>The book presents papers from the 6th International Conference on Big Data and Cloud Computing Challenges (ICBCC 2019), held at the University of Missouri, Kansas City, USA, on September 9 and 10, 2019 and organized in collaboration with VIT Chennai. The book includes high-quality, original re