Sign up
Forgot password?
FAQ: Login

Thakkar H.K., Dehury C.K., Sahoo P.K., Veeravalli B. (Eds.) Predictive Analytics in Cloud, Fog, and Edge Computing: Perspectives and Practices of Blockchain, IoT, and 5G

  • pdf file
  • size 6,14 MB
Thakkar H.K., Dehury C.K., Sahoo P.K., Veeravalli B. (Eds.) Predictive Analytics in Cloud, Fog, and Edge Computing: Perspectives and Practices of Blockchain, IoT, and 5G
Springer, 2023. — 252 p. — ISBN: 978-3-031-18033-0.
This book covers the relationship of recent technologies (such as Blockchain, IoT, and 5G) with cloud computing as well as fog computing, and mobile edge computing. The relationship will not be limited to only architecture proposals, trends, and technical advancements. However, the book also explores the possibility of predictive analytics in cloud computing concerning Blockchain, IoT, and 5G. The recent advancements in internet-supported distributed computing i.e. cloud computing have made it possible to process the bulk amount of data in parallel and distributed. This has made it a lucrative technology to process the data generated from technologies such as Blockchain, IoT, and 5G. However, there are several issues a Cloud Service Provider (CSP) encounters, such as Blockchain security in the cloud, IoT elasticity, and scalability management in the cloud, Service Level Agreement (SLA) compliances for 5G, Resource Management, Load balancing, and Fault-tolerance. This edited book will discuss the aforementioned issues in connection with Blockchain, IoT, and 5G.
In the recent past, the number of connected devices has grown exponentially, leading to an enormous amount of raw data generation. However, an abundant amount of raw data is meaningless unless analyzed to mine the informative patterns. In this regard, raw data need to be processed and analyzed at the device level (edge computing), network level (fog computing), and in the data center (Cloud computing). Designing an efficient predictive algorithm is a challenging task at the device level as well as the network level considering the limitations of computation power. On the contrary, cloud computing supports massive computation capacity to design an efficient predictive algorithm, but it suffers due to the high latency. Additionally, attempts are made to integrate the cross-technologies such as blockchain, IoT, and 5G with cloud computing for better application design and support. This book attempts to provide a comprehensive review of edge, fog, and cloud computing with a detailed description of their applicability, limitations, and how each technology complements the other. Moreover, the book focuses on predictive analytics in the cloud, fog, and edge computing as well as on perspectives and practices of blockchain, IoT, and 5G. It covers the domains such as healthcare security in cloud computing, watermarked medical image transmission over the cloud, the role of blockchain in cloud computing, cloud-based smart controlled environment designing, serverless data pipelines for IoT data analytics, the impact of 5G technologies on cloud analytics, and 5G-enabled smart city using a cloud environment.
Collaboration of IoT and Cloud Computing Towards Healthcare Security.
Robust, Reversible Medical Image Watermarking for Transmission of Medical Images over the Cloud in Smart IoT Healthcare.
The Role of Blockchain in Cloud Computing.
Analysis and Prediction of Plant Growth in a Cloud-Based Smart Sensor-Controlled Environment.
Cloud-Based IoT Controlled System Model for Plant Disease Monitoring.
Design and Usage of a Digital E-Pharmacy Application Framework.
Serverless Data Pipelines for IoT Data Analytics: A Cloud Vendors Perspective and Solutions.
Integration of Predictive Analytics and Cloud Computing for Mental Health Prediction.
Impact of 5G Technologies on Cloud Analytics.
IoT-Based ECG-SCG Big Data Analysis Framework for Continuous Cardiac Health Monitoring in Cloud Data Centers.
A Workload-Aware Data Placement Scheme for Hadoop-Enabled MapReduce Cloud Data Centers.
5G Enabled Smart City Using Cloud Environment.
Hardware Implementation for Spiking Neural Networks on Edge Devices.
  • Sign up or login using form at top of the page to download this file.
  • Sign up
Up