GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Blockchains (Databases).  (1)
  • Cloud computing-Congresses.  (1)
  • Singapore :Springer Singapore Pte. Limited,  (2)
Document type
Publisher
  • Singapore :Springer Singapore Pte. Limited,  (2)
Language
Years
  • 1
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Cloud computing-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (676 pages)
    Edition: 1st ed.
    ISBN: 9789811562020
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.153
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Internet of Things (IOT) -- An Energy-Efficient Data Routing in Weight-Balanced Tree-Based Fog Network -- 1 Introduction -- 1.1 Fog Computing -- 1.2 Tree-Based Architecture -- 1.3 Data Routing -- 1.4 Green Computing -- 2 Related Works -- 3 Proposed Architecture Towards Fog Networks -- 4 Discussions -- 5 Conclusions and Future Work -- References -- A Systematic Overview of Fault Tolerance in Cloud Computing -- 1 Introduction -- 2 Basic Components of Cloud Computing -- 3 Characteristics of Cloud Computing -- 4 Cloud Deployment Models -- 5 Cloud Service Models -- 6 Fault Tolerance -- 7 Fault Tolerance in Cloud Computing -- 7.1 Fault Tolerance Approaches -- 7.2 Fault Tolerance Parameters -- 8 Conclusion -- References -- An EPIC Mechanism for Advertising the Tourist Spots in Smart Cities -- 1 Introduction -- 2 Related Works -- 3 System Model and Problem Formulation -- 4 Tourist Spots Advertisement Problem: Posted Price Mechanism -- 4.1 Outline of PPM-TSAP -- 4.2 Detailing of PPM-TSAP -- 4.3 Illustrative Example -- 4.4 Running Time of PPM-TSAP -- 5 Conclusion and Future Work -- References -- Data Analysis and Prediction of Terror Component Using Web Services -- 1 Introduction -- 2 Background -- 2.1 Intrusion Detection System (IDS) -- 2.2 Vector Space Model -- 2.3 Receiver Operator Characteristic (ROC) Curve -- 3 Content-Based Detection of Terror-Related Activity -- 3.1 Detection Environment -- 4 Detection of Typical Terrorist Behavior -- 5 Experimental Settings -- 5.1 Evaluation Measure -- 6 Result Summarization -- 7 Deployment Issues -- 8 Conclusion -- References -- Facial Expression Recognition System (FERS): A Survey -- 1 Introduction -- 2 Related Work -- 3 Dataset Used -- 4 Discussion and Comparison of Results -- 5 Conclusion -- References. , Load Balancing of Tasks in Cloud Computing Using Fault-Tolerant Honey Bee Foraging Approach -- 1 Introduction -- 2 Literature Review -- 2.1 Load Balancing in Cloud Computing -- 2.2 Fault Tolerance in Cloud Computing -- 2.3 Honey Bee Behaviour Inspired Load Balancing -- 2.4 Motivation -- 3 Proposed Work and Implementation -- 4 Conclusion and Future Work -- References -- Flip Learning: A Novel IoT-Based Learning Initiative -- 1 Introduction -- 2 Related Works -- 3 Level-Based Approach -- 3.1 Collaborative Learning Within the Campus -- 3.2 Middle Product -- 3.3 Customized Learning Out of the Campus -- 4 Technical Aspects -- 4.1 Mix of IoT and Cloud -- 4.2 Information Management Framework -- 4.3 Content Delivery Network -- 4.4 Use of AI -- 4.5 Virtual and Augmented Reality -- 4.6 Data Security in Network -- 5 Conclusion -- References -- Improvement of Load Balancing in Shared-Memory Multiprocessor Systems -- 1 Introduction -- 2 Overview on Prior Algorithms and Techniques -- 2.1 Static Scheduling -- 2.2 Dynamic Scheduling -- 3 Result and Discussion -- 3.1 The Mandelbrot Set [3] -- 4 Conclusion -- References -- Building Amazon Web Services Infrastructure from the Scratch for an Organization -- 1 Introduction -- 2 Proposed Work and Implementation -- 3 Conclusion and Future Work -- References -- Fault Detection for VANET Using Vehicular Cloud -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Simulation Result and Discussion -- 5 Conclusion and Future Scope -- References -- An Approach to Cohort Selection in Cloud for Face Recognition -- 1 Introduction -- 2 Literature Survey -- 3 Architecture of the Proposed Approach -- 4 Cohort Selection Mechanism -- 4.1 Feature Extraction -- 4.2 Finding of Match Score -- 5 Database and Results -- 6 Conclusion -- References. , Internet of Things (IoT) Framework Deployment Template for Cloud-Based Harbor Surveillance and Ferry Monitoring System -- 1 Introduction -- 2 Proposed System -- 3 Model Building -- 3.1 Data Set and Test -- 4 Discussions -- 5 Conclusion -- References -- Art of Style Transfer Using Convolutional Neural Network: A Deep Learning Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset Used -- 2.2 Model for Image Classification -- 2.3 Convolutional Neural Network Training Process for Style Transfer -- 3 Experimental Results -- 3.1 Experimental Steps -- 4 Conclusion and Findings -- References -- Impact of Internet of Things (IoT) on 5G -- 1 Introduction -- 2 IoT Challenges -- 3 5G Challenges -- 4 5G Characteristics and Their Values/Applications -- 4.1 5G on IoT: A Single Network for Millions of Applications -- 4.2 The Importance of 5G on the IoT -- 4.3 Application of 5G Over IoT -- 5 The Impact of 5G on IoT -- 5.1 Establishing a 5G-IoT Ecosystem -- 5.2 Future of IoT -- 5.3 Aspects of IoT on Updated 5G Technologies -- 6 Conclusion -- References -- Prediction of Exchange Rate in a Cloud Computing Environment Using Machine Learning Tools -- 1 Introduction -- 2 Machine Learning Techniques Used for Prediction Modeling Data -- 2.1 Linear Regression -- 2.2 Regression Trees -- 2.3 Decision Tree Regression -- 2.4 Boosted Trees Regression -- 2.5 Random Forest Regression -- 2.6 Neural Network Regression -- 2.7 Cloud Computing Tools -- 3 Experimental Works -- 3.1 Data set Analysis -- 3.2 Result Analysis -- 4 Conclusion -- References -- Survey on Stock Price Forecasting Using Regression Analysis -- 1 Introduction -- 2 Literature Review -- 3 Regression -- 4 Regression Methodologies -- 4.1 Linear Regression -- 4.2 Polynomial Regression -- 4.3 Logistic Regression -- 4.4 Ridge Regression -- 4.5 Stepwise Regression -- 4.6 LASSO Regression. , 4.7 Elastic Net Regression -- 5 Conclusions -- References -- Intrusion Detection and Classification Using Decision Tree-Based Feature Selection Classifiers -- 1 Introduction -- 2 Intrusion Detection System -- 3 Data Mining-Based Approach -- 3.1 Decision Tree -- 3.2 Feature Selection -- 4 Dataset Used -- 5 Result Analysis -- 6 Conclusion -- References -- Role of Cloud Computing for Big Data: A Review -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Service Model -- 2.2 Cloud Deployment Model -- 2.3 Challenges and Issues of Cloud Computing -- 3 Big Data -- 3.1 Technologies Supported by Big Data -- 3.2 Challenges in Big Data -- 4 Conclusion -- References -- Role of Cloud Computing in Geotechnical Engineering -- 1 Introduction -- 2 Direct Role of Cloud Computing in Geotechnical Engineering -- 2.1 State-of-the-Art Cloud Computing -- 2.2 State of the Art Approaches for Geotechnical Cloud Computing -- 3 Cloud Computing and Parameter Identification Integrated in System Identification -- 3.1 System Identification -- 3.2 Component of SI -- 4 Inverse Analysis and Parameter Identification Supported by Cloud Computing -- 4.1 General Formulation of Parameter Identification Process -- 4.2 Inverse Analysis and Parameter Identification -- 5 Research Scope and Challenges -- 6 Conclusion -- References -- Energy-Efficient Clustering with Rotational Supporter in WSN -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Step 1-Clustering of Nodes -- 3.2 Step 2-Selection of CH -- 3.3 Step 3-Selection of NCH -- 3.4 Step 4-Selection of SCH -- 4 Simulation -- 5 Conclusion -- References -- A Review on Mobile Cloud Computing -- 1 Introduction -- 2 Need of MCC -- 3 Architecture -- 4 Background -- 4.1 Service Miniatures of MCC -- 4.2 Deployment Miniatures of MCC -- 5 Features of Mobile Cloud and Its Computing -- 5.1 Scalability -- 5.2 Mobility. , 5.3 Mobile Cyber Security with Privacy -- 5.4 Enhancing Reliability with Mobile Computing -- 5.5 Reduced Cost -- 5.6 Multiple Occupancy -- 5.7 Imbalance Web Transmission -- 6 Why Mobile Cloud Computing? -- 7 Issues in MCC -- 7.1 Scarcity of Mobile Appliances -- 7.2 Safety and Seclusion -- 7.3 Short Data Transferral Rate (Bandwidth) -- 7.4 Offloading -- 7.5 Quality of Communication and Broadcasting -- 8 Conclusion -- References -- Corroborating the Veracity of Body Fat Percentage and Classification of Sarcopenia Using Island Differential Evolution Algorithm -- 1 Introduction -- 2 Methodology -- 3 Optimization of the Formula and Techniques Used -- 4 Regression and Genetic Algorithm -- 5 Residuals and Goodness-of-Fit -- 6 Identification and Classification of Sarcopenia -- 7 Island Differential Evolution Algorithm -- 8 Results Obtained -- 9 Conclusion -- References -- Design of Compact Super-Wideband Monopole Antenna for Spectrum Sensing Applications -- 1 Introduction -- 2 Antenna Configuration -- 2.1 SWB QSCA -- 2.2 QSCA with Notch Bands -- 3 Results Discussion -- 4 Conclusion -- References -- Probabilistic and Distance-Aware Clustering Approach to Decrease the Effect of Hot Spot in WSN -- 1 Introduction -- 1.1 Wireless Sensor Network -- 1.2 WSN Challenges -- 1.3 Energy Efficiency -- 1.4 Clustering -- 1.5 LEACH -- 2 Distance Effect -- 2.1 Hot-Spot Effect -- 2.2 Residual-Energy-Based Clustering -- 3 Related Work -- 4 Proposed Protocol -- 5 Results -- 6 Conclusion -- References -- A Real-Time Sentiments Analysis System Using Twitter Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Tweepy Stream Listener -- 3.2 Preprocessing -- 3.3 Sentimental Analysis -- 3.4 Representation -- 3.5 Tweet Storage -- 4 Case Studies -- 4.1 Qualifying 3-Spanish Grand Prix 2019 -- 4.2 Indian Election Results-2019 -- 5 Conclusion and Future Scope. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Blockchains (Databases). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (244 pages)
    Edition: 1st ed.
    ISBN: 9789813364707
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.219
    DDC: 658.05574
    Language: English
    Note: Intro -- Preface -- Editorial -- Contents -- About the Editors -- 1 Introduction to Blockchain Evolution, Architecture and Application with Use Cases -- 1.1 Layman's Introduction to Blockchain -- 1.2 The Blockchain Technology -- 1.3 Types of Blockchain -- 1.4 Evolution of Blockchain -- 1.4.1 Blockchain 1.0: Programmable Money and Cryptocurrencies -- 1.4.2 Blockchain 2.0: Smart Contracts -- 1.4.3 Blockchain 3.0: Decentralised Web -- 1.5 Ledger System for Blockchain -- 1.5.1 Centralized Ledger Systems -- 1.5.2 Distributed Ledger Systems -- 1.6 Layers of Blockchain -- 1.6.1 Hardware or Infrastructure Layer -- 1.6.2 Data Layer -- 1.6.3 Network Layer -- 1.6.4 Consensus Layer -- 1.6.5 Application Layer -- 1.7 Use Cases and Applications of Blockchain -- 1.8 Development Tools for Blockchain -- 1.9 Summary -- References -- 2 Blockchain: A Technology in Search of Legitimacy -- 2.1 Introduction -- 2.2 Theoretical Background -- 2.3 Research Design and Methodology -- 2.4 Results -- 2.5 Discussion and Conclusion -- References -- 3 Using Blockchain in Intermittently Connected Network Environments -- 3.1 Introduction -- 3.2 Overview of Delay Tolerant Networks -- 3.2.1 Features -- 3.2.2 Architecture -- 3.2.3 Routing -- 3.2.4 Applications -- 3.3 Rudimentary Elements of Blockchain -- 3.3.1 Blocks -- 3.3.2 Transaction -- 3.3.3 Mining -- 3.3.4 Ethereum and Smart Contracts -- 3.4 Integration of Blockchain Technology with DTNs -- 3.4.1 System Components -- 3.4.2 Generation and Transmission of Shelter Needs -- 3.4.3 Need Validation and Creation of Local Blockchain -- 3.4.4 Block Conversion Through API -- 3.4.5 Mining Blocks and Deploying to Global Blockchain -- 3.5 Open Research Areas -- 3.6 Conclusion -- References -- 4 Slaying the Crypto Dragons: Towards a CryptoSure Trust Model for Crypto-economics -- 4.1 Introduction: Blockchain and the Right to Be Forgotten. , 4.2 The New 'Crypto-economy'-A Fraudsters' Playground? -- 4.3 Blockchain: Sceptical ICT Professionalism and Legal Due Diligence -- 4.4 The Need for Trusted Third Parties and for Probative Electronic Evidence -- 4.5 Towards a CryptoSure Trust Model for Crypto-economics -- 4.6 Conclusions: Blockchain Versus Trust-The Expert Issues in Disputes Over Crypto Assets -- 5 Decentralized Governance for Smart Contract Platform Enabling Mobile Lite Wallets Using a Proof-of-Stake Consensus Algorithm -- 5.1 Introduction -- 5.2 Preliminaries for Qtum Decentralized Blockchain Governance -- 5.3 Qtum Basic Requirement Sets for Decentralized Governance -- 5.3.1 UTXO Versus Account Model -- 5.3.2 Consensus Management -- 5.3.3 Mutualized Proof-of-Stake -- 5.3.4 AAL and EVM Integration -- 5.4 Scalability Extension of the Virtual Machine Through Decentralized Governance -- 5.4.1 Qtum Transaction Processing Using Virtual Machine -- 5.4.2 Decentralised Governance Protocol -- 5.5 Qtum Account Abstraction Layer -- 5.6 Discussion of the Technical Governance Realization -- 5.6.1 Hard fork Update -- 5.6.2 Qtum X86 Virtual Machine -- 5.7 Conclusions -- References -- 6 Blockchain Technology: Security and Privacy Issues -- 6.1 Introduction -- 6.2 Distributed Ledger Technology -- 6.2.1 Blockchain Benefits -- 6.2.2 How Blockchain Works -- 6.2.3 Consensus Algorithms -- 6.3 Blockchain Pros and Cons -- 6.4 Applications of Blockchain -- 6.4.1 Blockchain 1.0 -- 6.4.2 Blockchain 2.0 -- 6.5 Blockchain Security Issues -- 6.5.1 Cryptojacking Attacks -- 6.5.2 51% Attack -- 6.5.3 Smart Contract Attacks -- 6.6 Discussion -- 6.6.1 Voting and Blockchain -- 6.6.2 Energy and Blockchain -- 6.6.3 Web 3.0 and Blockchain -- 6.7 Conclusions -- References -- 7 Personal Data Protection in Blockchain with Zero-Knowledge Proof -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Background About Blockchain. , 7.4 Personal Data Protection and Blockchain -- 7.5 Zero-Knowledge Proof on Blockchain -- 7.5.1 Zerocoin Protocol -- 7.5.2 Zerocash Protocol -- 7.5.3 Zcash and Zk-SNARK -- 7.6 Conclusion -- References -- 8 Design and Verification of Privacy Patterns for Business Process Models -- 8.1 Introduction -- 8.2 A Privacy-Aware System Using Blockchain -- 8.2.1 Scenario: A Cloud-Based Order System -- 8.3 GDPR Verification -- 8.3.1 Design Time Verification -- 8.3.2 Runtime Verification -- 8.4 Experimental Results -- 8.4.1 Evaluation of Design Time Verification -- 8.4.2 Evaluation of Runtime Verification -- 8.5 Conclusion -- References -- 9 Blockchain Technology in Energy Field: Opportunities and Challenges -- 9.1 Introduction -- 9.2 Blockchain Solutions for Energy Internet -- 9.3 Application Scenarios of Blockchain Technology in the Energy Industry -- 9.4 Challenges -- 9.5 Conclusions -- References -- 10 BlockChainTechnology for Energy Transition -- 10.1 Introduction -- 10.2 What Is the "Energy Transition"? -- 10.2.1 Business Models in the Energy Sector -- 10.2.2 New Business Models for Energy Transition -- 10.3 BlockChain and Smart Contracts in the Energy Sector -- 10.3.1 Types of Applications of BlockChain and Smart Contracts in the Energy Sector -- 10.3.2 New Business Models Enabled by BlockChain in the Energy Market -- 10.3.3 Risks and Issues Related to BlockChain and Smart Contracts -- 10.4 The Framework -- 10.4.1 The Business Model Canvas -- 10.4.2 The Use Case Selection -- 10.4.3 Impact Analysis of the Two Selected Use Cases -- 10.4.4 The Business Models for the Use Cases -- 10.4.5 Microgrid Business Model (Elaborated After the Workshop) -- 10.4.6 Discussion of the Results -- 10.5 Current Trends and Future Scenarios -- 10.5.1 P2P Distributed Energy Trading for Residential Microgrids. , 10.5.2 Bridging Industrial and Residential Microgrids Through Electric Vehicles -- 10.6 Conclusions -- References -- 11 The Feasibility and Significance of Employing Blockchain-Based Identity Solutions in Health Care -- 11.1 Introduction -- 11.2 A Brief History of Identities in the Digital Age -- 11.2.1 Fully Centralized Identity Management -- 11.2.2 Federated Identity Management -- 11.2.3 User-Centric Identity Management -- 11.3 The Main Ideas Behind Decentralized Identity Management -- 11.3.1 Decentralized Identifier Based on Blockchain -- 11.3.2 Zero-Knowledge Proof -- 11.3.3 Decentralized Blockchains and the Internet -- 11.4 The Technical Architecture of Decentralized Identity Management -- 11.4.1 Architecture Overview -- 11.4.2 Blockchain-Based DID Service -- 11.4.3 Standardization of DIDs -- 11.4.4 Examples of DID Frameworks -- 11.5 The Potential of Applying Blockchain-Based DID Solutions in Health Care -- 11.5.1 Addressing the Patient Mismatching Problem -- 11.5.2 Facilitating Patient Recruitment in Clinical Research Using DID -- 11.5.3 The Safer Use of Medical Devices -- 11.5.4 Limitations Facing Current Blockchain-Based DID Solutions -- 11.6 Conclusion -- References -- 12 Toward eHealth with Blockchain: Success Factors for Crowdfunding with ICOs -- 12.1 Introduction -- 12.2 Theoretical Background -- 12.2.1 eHealth -- 12.2.2 Initial Coin Offerings (ICOs) and Blockchain -- 12.2.3 Signaling Theory -- 12.3 Research Method -- 12.3.1 Related Work -- 12.4 Research Hypotheses -- 12.4.1 Data and Variables -- 12.5 Results and Discussion -- 12.5.1 Descriptive Statistics of the ICO Data -- 12.5.2 Multivariate Analysis of the Factors Influencing the Success -- 12.6 Discussion -- 12.7 Conclusion -- References -- 13 Blockchain Track and Trace System (BTTS) for Pharmaceutical Supply Chain -- 13.1 Introduction -- 13.2 Related Works. , 13.3 Overview of Bitcoin, Blockchain Platforms and Smart Contracts -- 13.4 The Proposal Model -- 13.4.1 Structure of Blockchain Track and Trace System (BTTS) -- 13.4.2 The Proposed Smart Contracts -- 13.5 Conclusion and Future Works -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...