GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Cloud computing-Congresses.  (1)
  • Singapore :Springer Singapore Pte. Limited,  (1)
  • 1
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Cloud computing-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (676 pages)
    Edition: 1st ed.
    ISBN: 9789811562020
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.153
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Internet of Things (IOT) -- An Energy-Efficient Data Routing in Weight-Balanced Tree-Based Fog Network -- 1 Introduction -- 1.1 Fog Computing -- 1.2 Tree-Based Architecture -- 1.3 Data Routing -- 1.4 Green Computing -- 2 Related Works -- 3 Proposed Architecture Towards Fog Networks -- 4 Discussions -- 5 Conclusions and Future Work -- References -- A Systematic Overview of Fault Tolerance in Cloud Computing -- 1 Introduction -- 2 Basic Components of Cloud Computing -- 3 Characteristics of Cloud Computing -- 4 Cloud Deployment Models -- 5 Cloud Service Models -- 6 Fault Tolerance -- 7 Fault Tolerance in Cloud Computing -- 7.1 Fault Tolerance Approaches -- 7.2 Fault Tolerance Parameters -- 8 Conclusion -- References -- An EPIC Mechanism for Advertising the Tourist Spots in Smart Cities -- 1 Introduction -- 2 Related Works -- 3 System Model and Problem Formulation -- 4 Tourist Spots Advertisement Problem: Posted Price Mechanism -- 4.1 Outline of PPM-TSAP -- 4.2 Detailing of PPM-TSAP -- 4.3 Illustrative Example -- 4.4 Running Time of PPM-TSAP -- 5 Conclusion and Future Work -- References -- Data Analysis and Prediction of Terror Component Using Web Services -- 1 Introduction -- 2 Background -- 2.1 Intrusion Detection System (IDS) -- 2.2 Vector Space Model -- 2.3 Receiver Operator Characteristic (ROC) Curve -- 3 Content-Based Detection of Terror-Related Activity -- 3.1 Detection Environment -- 4 Detection of Typical Terrorist Behavior -- 5 Experimental Settings -- 5.1 Evaluation Measure -- 6 Result Summarization -- 7 Deployment Issues -- 8 Conclusion -- References -- Facial Expression Recognition System (FERS): A Survey -- 1 Introduction -- 2 Related Work -- 3 Dataset Used -- 4 Discussion and Comparison of Results -- 5 Conclusion -- References. , Load Balancing of Tasks in Cloud Computing Using Fault-Tolerant Honey Bee Foraging Approach -- 1 Introduction -- 2 Literature Review -- 2.1 Load Balancing in Cloud Computing -- 2.2 Fault Tolerance in Cloud Computing -- 2.3 Honey Bee Behaviour Inspired Load Balancing -- 2.4 Motivation -- 3 Proposed Work and Implementation -- 4 Conclusion and Future Work -- References -- Flip Learning: A Novel IoT-Based Learning Initiative -- 1 Introduction -- 2 Related Works -- 3 Level-Based Approach -- 3.1 Collaborative Learning Within the Campus -- 3.2 Middle Product -- 3.3 Customized Learning Out of the Campus -- 4 Technical Aspects -- 4.1 Mix of IoT and Cloud -- 4.2 Information Management Framework -- 4.3 Content Delivery Network -- 4.4 Use of AI -- 4.5 Virtual and Augmented Reality -- 4.6 Data Security in Network -- 5 Conclusion -- References -- Improvement of Load Balancing in Shared-Memory Multiprocessor Systems -- 1 Introduction -- 2 Overview on Prior Algorithms and Techniques -- 2.1 Static Scheduling -- 2.2 Dynamic Scheduling -- 3 Result and Discussion -- 3.1 The Mandelbrot Set [3] -- 4 Conclusion -- References -- Building Amazon Web Services Infrastructure from the Scratch for an Organization -- 1 Introduction -- 2 Proposed Work and Implementation -- 3 Conclusion and Future Work -- References -- Fault Detection for VANET Using Vehicular Cloud -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Simulation Result and Discussion -- 5 Conclusion and Future Scope -- References -- An Approach to Cohort Selection in Cloud for Face Recognition -- 1 Introduction -- 2 Literature Survey -- 3 Architecture of the Proposed Approach -- 4 Cohort Selection Mechanism -- 4.1 Feature Extraction -- 4.2 Finding of Match Score -- 5 Database and Results -- 6 Conclusion -- References. , Internet of Things (IoT) Framework Deployment Template for Cloud-Based Harbor Surveillance and Ferry Monitoring System -- 1 Introduction -- 2 Proposed System -- 3 Model Building -- 3.1 Data Set and Test -- 4 Discussions -- 5 Conclusion -- References -- Art of Style Transfer Using Convolutional Neural Network: A Deep Learning Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset Used -- 2.2 Model for Image Classification -- 2.3 Convolutional Neural Network Training Process for Style Transfer -- 3 Experimental Results -- 3.1 Experimental Steps -- 4 Conclusion and Findings -- References -- Impact of Internet of Things (IoT) on 5G -- 1 Introduction -- 2 IoT Challenges -- 3 5G Challenges -- 4 5G Characteristics and Their Values/Applications -- 4.1 5G on IoT: A Single Network for Millions of Applications -- 4.2 The Importance of 5G on the IoT -- 4.3 Application of 5G Over IoT -- 5 The Impact of 5G on IoT -- 5.1 Establishing a 5G-IoT Ecosystem -- 5.2 Future of IoT -- 5.3 Aspects of IoT on Updated 5G Technologies -- 6 Conclusion -- References -- Prediction of Exchange Rate in a Cloud Computing Environment Using Machine Learning Tools -- 1 Introduction -- 2 Machine Learning Techniques Used for Prediction Modeling Data -- 2.1 Linear Regression -- 2.2 Regression Trees -- 2.3 Decision Tree Regression -- 2.4 Boosted Trees Regression -- 2.5 Random Forest Regression -- 2.6 Neural Network Regression -- 2.7 Cloud Computing Tools -- 3 Experimental Works -- 3.1 Data set Analysis -- 3.2 Result Analysis -- 4 Conclusion -- References -- Survey on Stock Price Forecasting Using Regression Analysis -- 1 Introduction -- 2 Literature Review -- 3 Regression -- 4 Regression Methodologies -- 4.1 Linear Regression -- 4.2 Polynomial Regression -- 4.3 Logistic Regression -- 4.4 Ridge Regression -- 4.5 Stepwise Regression -- 4.6 LASSO Regression. , 4.7 Elastic Net Regression -- 5 Conclusions -- References -- Intrusion Detection and Classification Using Decision Tree-Based Feature Selection Classifiers -- 1 Introduction -- 2 Intrusion Detection System -- 3 Data Mining-Based Approach -- 3.1 Decision Tree -- 3.2 Feature Selection -- 4 Dataset Used -- 5 Result Analysis -- 6 Conclusion -- References -- Role of Cloud Computing for Big Data: A Review -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Service Model -- 2.2 Cloud Deployment Model -- 2.3 Challenges and Issues of Cloud Computing -- 3 Big Data -- 3.1 Technologies Supported by Big Data -- 3.2 Challenges in Big Data -- 4 Conclusion -- References -- Role of Cloud Computing in Geotechnical Engineering -- 1 Introduction -- 2 Direct Role of Cloud Computing in Geotechnical Engineering -- 2.1 State-of-the-Art Cloud Computing -- 2.2 State of the Art Approaches for Geotechnical Cloud Computing -- 3 Cloud Computing and Parameter Identification Integrated in System Identification -- 3.1 System Identification -- 3.2 Component of SI -- 4 Inverse Analysis and Parameter Identification Supported by Cloud Computing -- 4.1 General Formulation of Parameter Identification Process -- 4.2 Inverse Analysis and Parameter Identification -- 5 Research Scope and Challenges -- 6 Conclusion -- References -- Energy-Efficient Clustering with Rotational Supporter in WSN -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Step 1-Clustering of Nodes -- 3.2 Step 2-Selection of CH -- 3.3 Step 3-Selection of NCH -- 3.4 Step 4-Selection of SCH -- 4 Simulation -- 5 Conclusion -- References -- A Review on Mobile Cloud Computing -- 1 Introduction -- 2 Need of MCC -- 3 Architecture -- 4 Background -- 4.1 Service Miniatures of MCC -- 4.2 Deployment Miniatures of MCC -- 5 Features of Mobile Cloud and Its Computing -- 5.1 Scalability -- 5.2 Mobility. , 5.3 Mobile Cyber Security with Privacy -- 5.4 Enhancing Reliability with Mobile Computing -- 5.5 Reduced Cost -- 5.6 Multiple Occupancy -- 5.7 Imbalance Web Transmission -- 6 Why Mobile Cloud Computing? -- 7 Issues in MCC -- 7.1 Scarcity of Mobile Appliances -- 7.2 Safety and Seclusion -- 7.3 Short Data Transferral Rate (Bandwidth) -- 7.4 Offloading -- 7.5 Quality of Communication and Broadcasting -- 8 Conclusion -- References -- Corroborating the Veracity of Body Fat Percentage and Classification of Sarcopenia Using Island Differential Evolution Algorithm -- 1 Introduction -- 2 Methodology -- 3 Optimization of the Formula and Techniques Used -- 4 Regression and Genetic Algorithm -- 5 Residuals and Goodness-of-Fit -- 6 Identification and Classification of Sarcopenia -- 7 Island Differential Evolution Algorithm -- 8 Results Obtained -- 9 Conclusion -- References -- Design of Compact Super-Wideband Monopole Antenna for Spectrum Sensing Applications -- 1 Introduction -- 2 Antenna Configuration -- 2.1 SWB QSCA -- 2.2 QSCA with Notch Bands -- 3 Results Discussion -- 4 Conclusion -- References -- Probabilistic and Distance-Aware Clustering Approach to Decrease the Effect of Hot Spot in WSN -- 1 Introduction -- 1.1 Wireless Sensor Network -- 1.2 WSN Challenges -- 1.3 Energy Efficiency -- 1.4 Clustering -- 1.5 LEACH -- 2 Distance Effect -- 2.1 Hot-Spot Effect -- 2.2 Residual-Energy-Based Clustering -- 3 Related Work -- 4 Proposed Protocol -- 5 Results -- 6 Conclusion -- References -- A Real-Time Sentiments Analysis System Using Twitter Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Tweepy Stream Listener -- 3.2 Preprocessing -- 3.3 Sentimental Analysis -- 3.4 Representation -- 3.5 Tweet Storage -- 4 Case Studies -- 4.1 Qualifying 3-Spanish Grand Prix 2019 -- 4.2 Indian Election Results-2019 -- 5 Conclusion and Future Scope. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...