Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Mastering Disruptive Technologies- Applications of Cloud Computing, IoT, Blockchain, Artificial Intelligence & Machine Learning Techniques: 1, #1
Mastering Disruptive Technologies- Applications of Cloud Computing, IoT, Blockchain, Artificial Intelligence & Machine Learning Techniques: 1, #1
Mastering Disruptive Technologies- Applications of Cloud Computing, IoT, Blockchain, Artificial Intelligence & Machine Learning Techniques: 1, #1
Ebook890 pages4 hours

Mastering Disruptive Technologies- Applications of Cloud Computing, IoT, Blockchain, Artificial Intelligence & Machine Learning Techniques: 1, #1

Rating: 0 out of 5 stars

()

Read preview

About this ebook

About the Book:

The book is divided into 4 modules which consist of 21 chapters, that narrates briefly about the top five recent emerging trends such as: Cloud Computing, Internet of Things (IoT), Blockchain, Artificial Intelligence, and Machine Learning. At the end of each module, authors have provided two Appendices. One is Job oriented short-type questions with answers, and the second one provide us different MCQs with their keys.

 

Salient Features of the Book:

1. Detailed Coverage on Topics like: Introduction to Cloud Computing, Cloud Architecture, Cloud Applications, Cloud Platforms, Open-Source Cloud Simulation Tools, and Mobile Cloud Computing.

2. Expanded Coverage on Topics like: Introduction to IoT, Architecture, Core Modules, Communication models and protocols, IoT Environment, IoT Testing, IoT and Cloud Computing.

3. Focused Coverage on Topics like: Introduction to Blockchain Technology, Security and Privacy component of Blockchain Technology, Consensus Algorithms, Blockchain Development Platform, and Various Applications.

4. Dedicated Coverage on Topics like: Introduction to Artificial Intelligence and Machine Learning Techniques, Types of Machine Learning, Clustering Algorithms, K-Nearest Neighbor Algorithm, Artificial Neural Network, Deep Learning, and Applications of Machine Learning.

5. Pictorial Two-Minute Drill to Summarize the Whole Concept.

6. Inclusion of 300 Job Oriented Short Type Questions with Answers for the aspirants to have the Thoroughness, Practice and Multiplicity.

7. Around 178 Job Oriented MCQs with their keys.

8. Catch Words and Questions on Self-Assessment at Chapter-wise Termination.

 

LanguageEnglish
Release dateJun 27, 2022
ISBN9781913936235
Mastering Disruptive Technologies- Applications of Cloud Computing, IoT, Blockchain, Artificial Intelligence & Machine Learning Techniques: 1, #1
Author

S. R. Jena

Mr. Soumya Ranjan Jena is currently working as Faculty Associate in the Department of Computer Science and Engineering at the École Centrale School of Engineering, Mahindra University, Hyderabad, India. He received his M. Tech degree in Information Technology form Utkal University, Bhubaneswar, Odisha, India in the year 2013, B. Tech in Computer Science and Engineering degree from BPUT, Rourkela, Odisha, India in the year 2010 and also certified by CCNA and Diploma in Computer Hardware and Networking Management from CTTC, Bhubaneswar, Odisha, India in the year 2011. He has more than 8 years of teaching experience from various reputed Universities and Colleges in India. He is basically an Academician, an Author, a Researcher, a Trainer, a Reviewer of various International Journals and International Conferences and a Keynote Speaker. His publications have more than 300 citations, h index of 9, and i10 index of 8 (Google Scholar). He has published 19 international level books, around 27+ international level research articles in various international journals, conferences, and filed 20+ international patents. He has been awarded by Bharat Education Excellence Awards in the year 2022, Excellent Performance in Educational Domain & Outstanding Contributions in Teaching in the year 2022 and Best Researcher by Gurukul Academic Awards in 2022. His research interests include Cloud and Distributed Computing, Internet of Things, Green Computing, Sustainability, Renewable Energy Resources, Internet of Energy etc. He can be reached by Email: soumyajena1989@gmail.com.

Read more from S. R. Jena

Related to Mastering Disruptive Technologies- Applications of Cloud Computing, IoT, Blockchain, Artificial Intelligence & Machine Learning Techniques

Titles in the series (100)

View More

Related ebooks

Computers For You

View More

Related articles

Reviews for Mastering Disruptive Technologies- Applications of Cloud Computing, IoT, Blockchain, Artificial Intelligence & Machine Learning Techniques

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Mastering Disruptive Technologies- Applications of Cloud Computing, IoT, Blockchain, Artificial Intelligence & Machine Learning Techniques - S. R. Jena

    MASTERING DISRUPTIVE TECHNOLOGIES

    ––––––––

    R. K. Dhanaraj

    S. R. Jena

    A. K. Yadav Vani Rajasekar

    HP HAMILTON LTD

    Building 3 Chiswik Park, Chiswick High Road, London W45YA, United Kingdom

    HP Hamilton is the trademark of HP Hamilton Limited

    HP Hamilton Limited is registered with the Companies House of England and Wales

    Mastering Disruptive Technologies

    By Dr. R. K. Dhanaraj, Prof. S. R. Jena, Prof. A. K. Yadav, Prof. Vani Rajasekar

    First Edition 2021

    Copyright© 2021 by HP HAMILTON LIMITED

    Sold in India & Rest of Asia Pacific by

    HP Hamilton India, India

    Under License from, HP Hamilton Limited, England All Rights Reserved.

    No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. You must not circulate this work in any other form and you must not impose this same condition on any other acquirer.

    This publication is designed to provide accurate information in regard to the subject matter covered as of its publication date, and with the understanding that knowledge and best practice evolve constantly. To the fullest extent of the law, neither the Publisher nor the Editors assume any liability for any damage and/or injury and/or loss to persons to property arising out of or related to any use of material contained in this book.

    Trademark Notice: Product or Corporate Names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.

    ISBN: 978-1913936235

    British Library Cataloguing in Publication data: Data Available

    Printed in India by:

    Kumar Offset Works, India

    Cover Image: Licensed by Freepik Company SL, Spain

    Links to Third-Party Websites are provided by HP Hamilton Limited in good faith and for information only. HP Hamilton Limited disclaims any responsibility for the materials contained in any third-party website referenced in this work.

    In this 21st century, the need for the hour novel Corona Virus disease (Covid-19 pandemic) has strongly impacted our regular life, including slowing down the global economy. In this perspective importance of digitalization has greatly produced its importance in our country like India where the Indian government has already started the Digital India initiative where the primary objective is to transform India into a digitally empowered society and knowledge economy through three pillars known as Digital Infrastructure as the core utility to every citizen, on-demand Governance and services, and digital empowerment of citizens. Disruptive Emerging Technologies displaces an established technology and shakes up the industry or a groundbreaking product that creates a completely new industry came into the picture to make things digitalized. These technologies include- Cloud Computing, IoT, Blockchain, Artificial Intelligence, and Machine Learning arise as significant catalysts, as well as other recent trends, have successfully transformed and execute their digital transformation consistently. Then here, the question arises what is Disruptive Technology and who has invented it? Harvard Business School ex-professor Clayton Magleby Christensen invented disruptive technology in 1997 in his best-selling book, The Innovator's Dilemma where he separates technology into two types: Sustaining Technology and Disruptive Technology. The former depends on incremental improvements to an already established technology, whereas the latter lacks refinement, often has performance problems because it is new, appeals to a limited audience, and may not yet have a proven practical application.

    In 2020, the Covid-19 pandemic intensified Cloud adoption by several years. Indian companies of all sizes quickly monitored their moral choices to ignore the legacy infrastructure and move their operations to the Cloud powered by artificial intelligence (AI), machine learning (ML) piecemeal, or full. During the coronavirus pandemic, Cloud Computing, which underpinned the world economy, global supply chains, and remote workers, will continue to be an essential goal for organizations searching for. The year provided an excellent opportunity for Cloud operators to sell their flexible and stable Cloud-based applications while maintaining data inside the country's territories. Although most organizations in India have embraced Cloud at a particular stage, the IDC said, the current pandemic situation has enabled them to spend more on public Cloud infrastructure as a service (IaaS), platform-as-a-service (PaaS) solutions, and software-

    as-a-service (Software-as-a-Service) solutions (SaaS). Initially, the IoT was most interesting for business and development, where its implementation is often referred to as machine-to-machine (M2M), but now the attention is on filling our homes and offices with smart devices, making them into something that applies to almost all. The Internet of Things refers to the billions of physical devices currently linked to the internet worldwide, all of which capture and exchange data. Connecting up all these different objects and adding sensors to them adds a digital intelligence level to devices that would be otherwise dumb, enabling them to communicate real-time data without involving a human being. The Internet of Things, integrating the digital and physical worlds, makes the fabric of the world around us smarter and more sensitive.

    Blockchain emerged as peer-to-peer distributed ledger technology for recording transactions, maintained by peers without any central trusted regulatory through distributed ledger technology, public-key cryptography, and consensus mechanism. It has not only given birth to crypto-currencies but also resolved various security, privacy, and transparency issues of decentralized systems. Initially, the concept of blockchain was applied to implement crypto- currencies like Bitcoin, which are capable of capturing and checking a large number of digital transactions without any third-party involvement. But, nowadays, blockchain technology has gone far beyond its beginning in crypto-currencies and banking. Industries like insurance, gaming are looking towards blockchain applications. The banking sector, Law enforcement system, ride- hailing industry, and many other technical sectors seek a bright future in blockchain technology.

    Artificial Intelligence (AI) is the integration within our everyday lives was still quite far ahead. Artificial Intelligence is meant to be an imitation of human intelligence with some extensions added on top of it to make it more useful – like a calculator that can give you solutions to your math problems without you having to spend time thinking about it for yourself. Thanks to the exponential growth of machine learning and computer programming power in the last decade. A quick example will be the filters you would have seen and perhaps even use daily on your social media applications such as Instagram or Snapchat. Another great example would be the voice assistant in your smartphone, probably Google's Google Assistant if you are an Android user or Apple's Siri if you are an iOS user. These assistants are nothing but AI software designed to make your everyday life more comfortable through voice recognition technology. The technologies like artificial intelligence are now changing the output of search engines quite a bit. IT engineers used to have to roll out big and minor algorithm changes manually. But now, artificial intelligence solutions enable the algorithm, known as Self-Updating Algorithms, to update itself.

    Adoption of this Book:

    This unique book gives detailed Coverage of Disruptive Technologies such as Cloud Computing, IoT, Blockchain, AI, and Machine Learning. Therefore, it can be used by students who are doing undergraduate, master's, and interdisciplinary research courses in Computer Science and

    Engineering, Information Technology, and at different Universities, Colleges Worldwide. This book will fulfill readers' expectations and serve as an excellent textbook for such courses. Creative suggestions for the further enhancement of the book are highly welcome from our beloved readers through email.

    ––––––––

    Dr. Rajesh Kumar Dhanaraj

    Email: sangeraje@gmail.com

    Soumya Ranjan Jena

    Email: soumyajena1989@gmail.com

    Ashok Kumar Yadav

    Email: ashokyadav88.jnu@gmail.com

    Vani Rajasekar

    Email: vanikecit@gmail.com

    Dr. Gheorghita Ghinea

    Professor of Mulsemedia Computing Telephone: + 44 (1895) 266033

    e-mail: George.Ghinea@brunel.ac.uk

    ––––––––

    Department of Computer Science Uxbridge, Middlesex UB8 3PH United Kingdom

    Departmental fax: + 44 (1895) 251686

    ––––––––

    5th of January 2021

    FOREWORD

    Change is the only constant human has witnessed since the time s/he learned to make tools and discovered fire. It is the technological innovations of today that are driving us towards efficiency, invigorating society and the environment. However, what makes these technological advancements as disruptive? As the name suggests, they disrupt the status quo by entirely augmenting an existing technology or introducing a novel concept to the society.

    This first edition of "Mastering Disruptive Technologies" written by Prof. (Dr.) Rajesh Kumar Dhanaraj, Prof. Soumya Ranjan Jena, Prof. Ashok Kumar Yadav and Prof. Vani Rajasekar is an excellent effort to produce a text book as well as reference book for undergraduate, masters and interdisciplinary research courses in the field of Computer Science/ Information Technology to achieve greater height of academic success. Moreover, it includes exceptional coverage on various theories and applications of five technological advancements like Cloud Computing, Internet of Things, Blockchain, Artificial Intelligence and Machine Learning; which are going to reshape the industry.

    The book is well written looking at the current IT Job market worldwide. Apart from this, the book will definitely inspire learners to think creatively and through that enable them to acquire mastery over various latest technologies.

    I hope the book will be a notable success worldwide. Wishing the venture of the authors to fulfill its desired goal in future; and many more success in future.

    ––––––––

    Yours sincerely,

    G. Ghinea

    Cloud Computing Module 

    Initiation of Cloud Computing................................3

    The Darwinism of Cloud Paradigm....................................4

    Cloud Users and Benefits...........................................7

    Challenges of Cloud Computing......................................9

    Cloud Deployment Models.........................................10

    Design of Cloud Computing........................................12

    Cloud Computing Reference Model..................................14

    Cloud Computing Platforms and Technologies.........................17

    Amazon Web Services.........................................17

    Google App Engine...........................................21

    Microsoft Azure..............................................23

    Apache Hadoop..............................................26

    Salesforce.com...............................................30

    Manjrasoft Aneka.............................................32

    Open Nebula................................................34

    Eucalyptus..................................................35

    Vmware....................................................38

    Hypervisor......................................................39

    Virtualization Technology..........................................40

    Two-Minute Drill..................................................41

    Catch Words.....................................................43

    Questions on Self-Assessment.......................................44

    References.......................................................44

    Cloud Computing Open-Source Simulation Tools................47

    Introduction........................................................48

    Cloudsim..........................................................49

    Cloud Analyst......................................................51

    Cloud Reports......................................................52

    Federated Cloudsim.................................................55

    CloudMIG Xpress....................................................55

    EdgeCloudSim......................................................57

    Green Cloud........................................................61

    Two-Minute Drill....................................................62

    Catch Words........................................................64

    Questions on Self-Assessment.........................................64

    References.........................................................64

    Introduction To Mobile Cloud Computing.........................68

    Mobile Computing...................................................69

    What Is Mobile Cloud Computing (MCC )?..............................69

    Architecture of MCC.................................................70

    Advantages of MCC.................................................71

    Applications of MCC.................................................72

    Challenges of MCC..................................................74

    Future Research Scope of MCC.......................................75

    Two-Minute Drill....................................................76

    Catch Words.......................................................77

    Questions on Self-Assessment.........................................77

    References.........................................................77

    Appendix-1 Cloud Computing Job Oriented Short Type Questions With Answers 79

    Appendix-2 Cloud Computing MCQs With Answers.......................99

    Internet of Things(IoT) Module 

    Introduction to IoT................................................109

    Evolution of IoT....................................................110

    Aspects of IoT.....................................................111

    Key Challenges In IoT..............................................111

    Two Minutes Drill..................................................113

    Catch Words......................................................113

    Questions on Self-Assessment.......................................113

    References........................................................114

    IoT Architecture...................................................115

    Three Layered Architecture.........................................116

    Five Layered Architecture...........................................117

    Fog Based Architecture.............................................118

    Cloud Based Architecture...........................................119

    Two-Minute Drill...................................................121

    Catch Words......................................................122

    Questions on Self-Assessment.......................................122

    References........................................................123

    Core Modules of IoT..............................................125

    Transducer and Actuators...........................................126

    Data Communication...............................................127

    Data Storage and Management......................................128

    Concerns for IoT Security and Privacy................................131

    Two Minute Drill...................................................131

    Catch Words......................................................132

    Questions on Self-Assessment.......................................132

    References........................................................132

    Communication Models and Protocols..........................134

    Request and Response Model.......................................135

    Publisher - Subscriber (Pub/Sub) Model...............................136

    M2M Communication...............................................137

    MQTT (Message Queuing Telemetry Transport) Protocol.................137

    Constrained Application Protocol (CoA P)..............................140

    Other Communication Models and Protocols in IoT:.....................141

    Two-Minute Drill...................................................142

    Catch Words......................................................143

    Questions On Self-Assessment.......................................143

    References........................................................144

    IoT Environment..................................................145

    Introduction.......................................................146

    Hardware Platforms of IoT..........................................147

    Software Programming Languages...................................154

    Two-Minute Drill...................................................157

    Catch Words......................................................158

    Questions on Self-Assessment.......................................158

    References........................................................159

    IoT Testing........................................................160

    Introduction.......................................................161

    Features of Testing................................................161

    Types of Testing...................................................162

    Key Research Challenges...........................................164

    Two-Minute Drill...................................................165

    Catch Words......................................................166

    Questions on Self-Assessment.......................................166

    References........................................................166

    IoT and Cloud Computing.........................................168

    Concepts of Cloud Computing and IoT.................................169

    Role of Web Communication.........................................171

    Popular Cloud Services..............................................172

    Key Research Challenges............................................172

    Two-Minute Drill....................................................173

    Catch Words.......................................................174

    Questions on Self-Assessment........................................174

    References........................................................174

    Applications of IoT.................................................176

    Introduction........................................................177

    Industry Automation................................................177

    Healthcare Management............................................179

    Two-Minute Drill....................................................182

    Catch Words.......................................................182

    Qusetions on Self-Assessment........................................182

    References........................................................183

    Appendix-3 IoT Job Oriented Short Type Questions With Answers.......184

    Appendix-4 IoT MCQs With Answers....................................198

    Blockchain Module 

    Introduction To Blockchain Technology..........................207

    Centralized, Distributed and Decentralized Systems.....................208

    What is Blockchain?.................................................210

    Types of Blockchain.................................................210

    Architecture of Blockchain...........................................212

    How Does Blockchain Work?.........................................215

    Blockchain Features................................................216

    Two-Minute Drill....................................................217

    Catch Words.......................................................218

    Questions on Self-Assessment........................................218

    References........................................................219

    Blockchain Security and Privacy Tools...........................221

    Cryptography......................................................222

    Asymmetrìc Cryptography...........................................223

    Hash Function......................................................223

    Digital Signature...................................................225

    Elliptic Curve Cryptography (ECC )....................................226

    Merkle Tree........................................................227

    Consensus Algorithm................................................230

    Two-Minute Drill....................................................234

    Catch Words.......................................................236

    Review Questions...................................................237

    References........................................................237

    Blockchain Development Platform...............................240

    Introduction to Bitcoin...............................................241

    Introduction of Ethereum............................................243

    Introduction to Hyperledger..........................................247

    Applications of Blockchain...........................................249

    Two-Minute Drill....................................................255

    Catch Words.......................................................256

    Questions on Self-Assessment........................................257

    References........................................................257

    Appendix-5 Blockchain Job Oriented Short Type Questions With Answers259

    Appendix-6 Blockchain MCQs With Answers............................268

    AI and Machine Learning Module 

    15  Introduction To AI and Machine Learning.....................277

    15.1  Introduction....................................................278

    15.2  Learning Problems..............................................278

    15.3  Key Elements of Machine Learning................................279

    15.3.1  Data Model..............................................279

    15.3.2  Algorithm...............................................279

    15.3.2 Datasets...............................................279

    15.3.4  Feature Extraction.......................................279

    15.3.5  Advance Threats.........................................280

    15.4  Intelligent Agents...............................................280

    15.4.1  Agent Terminology.......................................280

    15.4.2  Structure of Intelligent Agents.............................281

    15.4.3  Types of Agents.........................................281

    15.5  Two-Minute Drill................................................282

    15.6  Catch Words...................................................282

    15.7  Questions on Self-Assessment....................................282

    15.8  References....................................................282

    16  Types of Machine Learning....................................283

    16.1  Introduction...................................................284

    16.2  Supervised Learning............................................284

    16.2.1  Training the System......................................285

    16.2.2  Types of Supervised Learning.............................285

    16.3.3  Examples of Supervised Learning..........................285

    16.3.4  Advantages.............................................285

    16.3.5  Disadvantages..........................................286

    16.4  Unsupervised Learning..........................................286

    16.4.1  Types of Unsupervised Learning...........................286

    16.4.2  Examples of Unsupervised Learning........................287

    16.4.3  Advantages.............................................287

    16.4.4  Disadvantages..........................................288

    16.5  Reinforcement Learning.........................................288

    16.5.1  Types of Reinforcement Learning..........................289

    16.5.2  Practical Applications of Reinforcement Learning.............289

    16.5.3  Imitation Learning.......................................289

    16.5.4  Deep Reinforcement Learning.............................290

    16.6  Two-Minute Drill................................................290

    16.7  Catch Words...................................................290

    16.8  Questions on Self-Assessment....................................290

    16.9  References....................................................291

    17  Clustering Algorithms..........................................292

    17.1  Introduction...................................................293

    17.2  Density Based Methods.........................................293

    17.2.1  Need of DBSCAN.........................................293

    17.2.2  Algorithm Steps of DBSCAN...............................294

    17.2.3  Disadvantage of DBSCAN.................................294

    17.3  Hierarchical Based Methods......................................295

    17.3.1  Agglomerative Hierarchical Clustering......................295

    17.3.2  Divisive Hierarchical Clustering............................296

    17.4  Partition Methods...............................................297

    17.4.1  K-Mean Partition.........................................297

    17.4.2  Properties of K-Mean Algorithm............................298

    17.4.3  Algorithm Steps in K-Mean:................................298

    17.4.4  K-Means++ Algorithm....................................298

    17.5  Two-Minute Drill................................................298

    17.6  Catch Words...................................................299

    17.7  Questions on Self-Assessment....................................299

    17.8  References....................................................299

    18  K-Nearest Neighbor Algorithm................................300

    18.1  Introduction...................................................301

    18.2  Properties of KNN...............................................302

    18.2.1  Selection of K in KNN.....................................302

    18.2.2  Metric Learning in KNN...................................303

    18.3  Feature Selection of KNN........................................303

    18.3.1  Dimensionality Reduction.................................303

    18.3.2  Reduction of Data........................................303

    18.3.3  Condensed Nearest Neighbor for Data Reduction.............304

    18.3.4  Knn Regression..........................................304

    18.3.5  Advantages of KNN......................................304

    18.3.6  Disadvantages of KNN....................................305

    18.4  Validation And Results of KNN Algorithm...........................305

    18.4.1  Cross Validation.........................................305

    18.4.2  Confusion Matrix.........................................305

    18.4.3  Likelihood-Ratio Test.....................................306

    18.4.4  Limitations of KNN.......................................306

    18.4.5  Potential Applications of KNN..............................307

    18.6  Two-Minute Drill................................................307

    18.7  Catch Words...................................................307

    18.8  Questions on Self-Assessment....................................307

    18.9  References....................................................308

    19  Artificial Neural Network (ANN )..............................309

    19.1  Introduction...................................................310

    19.2  Components of ANN............................................310

    19.3  Types of ANN..................................................311

    19.3.1  Perceptron..............................................311

    19.3.2  Convolutional Neural Networks (CNN )......................311

    19.3.3  Recurrent Neural Networks (RNN ).........................312

    19.3.4  Long Short-Term Memory (LST M) Network..................312

    19.3.5  Feedforward Neural Network..............................313

    19.3.6  Auto Encoders...........................................313

    19.3.7  Modular Neural Networks.................................314

    19.4  Applications of ANN.............................................314

    19.4.1  System Control..........................................314

    19.4.   Pattern Recognition...........................................315

    19.4.3 Medical Diagnosis.......................................315

    19.4.   Sequence Prediction..........................................315

    19.4.5  Data Mining.............................................315

    19.4.6  Text Classification.......................................315

    19.4.7  Named Entity Extraction..................................316

    19.4.8  Language Generation....................................316

    19.5  Two-Minute Drill................................................316

    19.6  Catch Words...................................................316

    19.7  Questions on Self-Assessment....................................317

    19.8  References....................................................317

    20  AI and Machine Learning......................................318

    20.1  Introcution.....................................................319

    20.2  Learning From Examples........................................319

    20.2.1  Supervised Learning.....................................320

    20.2.2  Reinforcement Learning..................................321

    20.2.3  Unsupervised Learning...................................322

    20.2.4  Unsupervised Learning:...................................322

    20.3  Deep Learning.................................................323

    20.3.1  Challenges..............................................323

    20.3.2  Applications of Deep Learning.............................324

    20.4  Two-Minute Drill................................................324

    20.5  Catch Words...................................................324

    20.6  Questions on Self-Assessment....................................325

    20.7  References....................................................325

    21  Applications of Machine Learning.............................326

    21.1  Introduction...................................................327

    21.2  Cancer Prediction...............................................327

    21.3  Plant Disease Prediction.........................................329

    21.4  Drug Discovery and Development................................330

    21.5  Two-Minute Drill................................................332

    21.6  Catch Words...................................................332

    21.7  Questions On Self-Assessment...................................332

    21.8  References....................................................332

    Appendix-7 AI & ML Job Oriented Short Type Questions With Answers..334

    Appendix-8 AI & ML MCQs With Answers...............................341

    Index...................................................347–352
    About the Authors.......................................353–354

    CHAPTER STRUCTURE

    1.1  The Darwinism of Cloud Paradigm

    1.2  Cloud Users and Benefits

    1.3  Challenges of Cloud Computing

    1.4  Cloud Deployment Models

    1.5  Design of Cloud Computing

    1.6  Cloud Computing Reference Model

    1.7  Cloud Computing Platforms and Technologies

    1.7.1  Amazon Web Services

    1.7.2  Google AppEngine

    1.7.3  Microsoft Azure

    1.7.4  Apache Hadoop

    1.7.5  Salesforce.com

    1.7.6  Manjrasoft Aneka

    1.7.7  Open Nebula

    1.7.8  Eucalyptus

    1.7.9  VMware

    1.8  Hypervisor

    1.9  Virtualization Technology

    1.10  Two-Minute Drill

    1.11  Catch Words

    1.12  Questions On Self-Assessment

    1.13  References

    1.1  THE DARWINISM OF CLOUD PARADIGM

    The initiation of Cloud Computing dates back to the 1960’s to make the users access their applications anywhere at any time with the help of connected devices. It is link to the concept of distributed Computing. The congruity of Cloud in the sky and Cloud Computing technique though remains same the users use the same in their planetary frame in a particular period till their objectives are fulfilled. For the most element a natural Cloud may be an unmistakable mass of fluid beads or solidified gem stones that made up of water or one of a kind chemical compounds suspended inside the climate over the floor of a planetary frame. Those suspended particles are too referred to as mist concentrates and are taken into consideration inside the Cloud material science branch of meteorology. But the Cloud that we making plans to think about is definitely extraordinary from it in the discipline of Computer Science.

    The concept of Computer Network became supplied inside the 1960 through J.C.R. Licklider who was conscious for empowering the development of ARPANET (Advanced Research Projects Agency Network) in 1969 of the United States Department of Defence. His vision was for anybody at the globe to be interconnected and getting the applications and facts at any region, from everywhere. It could be a vision that leads to the innovation of Cloud Computing. After that within the year 1994, Tim Berners-Lee created HTML for internet based totally improvement different experts’ property the Cloud idea to computer researcher John McCarthy who proposed the idea of computation being conveyed as an open application, comparative to the gain bureaus which date back to the 1960s. Since the 1960s, Cloud Computing has created alongside some of innovations with Web 2.0 being the foremost later development. Be that as it is able to, because the internet has been begun to provide noteworthy transfer speed within the 1990, Cloud Computing for the masses has been something of an overdue engineer.

    Fig. 1.1 The Evolution of Cloud Computing

    One of the primary turning points in Cloud Computing history was the entry of Salesforce.com in the year 1999, which spearheaded the concept of conveying endeavor applications through a basic site. This data centers cleared the way for both pro and standard server firms to convey applications over the internet. Amazon Web Services (AWS) was begun within the year 2002, which given a suite of Cloud-based administrations counting capacity, computation and indeed human insights through AWS.

    Then in 2006, Amazon propelled its Elastic Compute Cloud (EC2) as a commercial web benefit mechanism that permits small IT sectors and people to lease computers on which to run them possess computer applications. Amazon EC2/Simple Storage Service (S3) was the primary broadly open Cloud Computing foundation benefit, said Jeremy Allaire, CEO of Brightcove, which gives its SaaS online video stage to UK TV stations and newspapers.

    Another huge breakthrough came in 2009, as Web 2.0 hit its walk, and Google and others begun to offer browser-based undertaking applications such as Google Apps. The most vital commitment to Cloud Computing has been the rise of executioner apps from driving innovation mammoths such as Microsoft and Google. When these companies provide administrations in a way that’s dependable and simple to expend, the knock-on impact to the industry as a whole could be a more extensive common acknowledgment of online administrations, said Dan Germain, Chief Information Officer, Various companies, Washington DC.

    The buzz word Cloud Computing may be a divine blast and one of the developing Computing worldview that innovates to send cost-effective arrangements over the internet. According to NIST (National Institute of Standards and Innovation) Cloud Computing could be a show for empowering omnipresent, helpful, on-demand arrangement gets to a shared pool of configurable Computing assets (e.g., systems, servers, capacity, applications and administrations) that can be quickly provisioned and discharged with negligible administration exertion or benefit supplier interaction.

    Cloud Computing on a very basic level changes the way that IT administrations is conveyed to organizations. Rather than both owning and overseeing IT administrations for themselves, or utilizing an outsourcing approach built around committed equipment, program, and back administrations, organizations can utilize Cloud Computing to meet their IT prerequisites employing an adaptable, on-demand, and quickly versatile demonstrate that requires possession on their portion, nor arrangement of committed assets. Let’s to begin with see from a chronicled point of view where Cloud Computing fits in and whether it’s truly diverse or fair.

    Fig. 1.2 illustrates six diverse levels which appear the advancement of the Computing worldview. In Level 1, individuals utilized terminals to put through to capable centralized computers shared by numerous clients. Back at that point, terminals were essentially small, more than consoles and screens. In Level 2, standalone individual computers (PCs) got to be effective sufficient to satisfy users’ day by day work you didn’t have to be share a centralized server with anybody else. Level 3 gave us the concept behind the normal computer arrangement like LAN where different computers can be associated with each other. Level 4 saw the appearance of nearby systems that might interface to other neighborhood systems to set up a more worldwide network—users might presently interface to the Web to utilize farther applications and assets. Level 5 brought us the concept of an electronic network to encourage shared Computing control and capacity assets. Individuals utilized PCs to get to a network of computers in a straightforward way.

    Fig.1.2 The Development Towards Cloud Computing Paradigm

    Fig.1.2 appears, a conceptual layer- a Cloud on the Web- stows away all accessible assets (either equipment or computer program) and administrations, but it distributes a standard interface. As long as clients can interface to the Web, they have the complete Web as their control PC. Cloud Computing hence alludes to the procedures that empower and encourage this situation. When compared to the interminably effective Web Cloud, PCs appear like lightweight terminals permitting clients to utilize the Cloud. From this point of view, Cloud Computing seems like a return to the initial centralized computer worldview. Of course, the Cloud Computing paradigm isn’t this simple. Unlike a centralized server, which may be a physical machine that gives limited Computing control, a Cloud speaks to all conceivable assets on the Web, recommending interminable control and capacity. In the meantime, not at all like a straightforward terminal acting as a client interface to a centralized computer, a PC within the Cloud Computing paradigm possesses critical control to supply a certain degree of neighborhood Computing and caching back. The Cloud Computing has the taking after seven basic characteristics:

    On request self-service: A buyer can essentially arrange Computing capabilities, such as server time and arrange capacity, as required without the ought to inform the Cloud benefit provider.

    Broad network access: Capabilities are accessible over the arrange and it has openness through standard instruments which advance utilize by heterogeneous lean or thick client platforms like mobile phones, portable workstations, and PDAs.

    Self-organizing: Since assets can be distributed or de-allocated on-demand, benefit suppliers are enabled to oversee their asset utilization agreeing to them possess needs. Moreover, the mechanized asset management feature yields tall nimbleness that empowers benefit suppliers to reply rapidly to fast changes in benefit request such as the streak swarm impact.

    Resource pooling and multi-tenancy: In Cloud Computing distinctive assets i.e., storage, processors, memory, transmission capacity, and virtual machines (VMs) are shared between different occupants, and relegated only at run time to one buyer at a time. Allotting assets is done powerfully based on the shopper needs. Sharing assets can offer assistance increment utilization and consequently essentially diminish the operation taken a toll. Diverse planning calculations can be utilized to powerfully allot assets to multiple-tenants based on the sort of workload, reasonableness, region, and numerous other factors.

    Rapid elasticity: Versatility is the capacity to scale in and out by provisioning assets and discharging them individually. Cloud Computing ought to give components to permit speedy and programmed versatility. The huge pool of assets in Cloud datacenters gives the dream of boundless assets to the buyers, and flexibility gives the adaptability to arrangement these recourses on-demand.

    Multi-tenancy: In a Cloud environment, administrations possessed by numerous suppliers are co-located in a single information center. The execution and administration issues of these administrations are shared among benefit suppliers and the framework supplier. The layered design of Cloud Computing gives a common division of duties: the proprietor of each layer as it were having to center on the particular destinations related with this layer. Be that as it may, multi-tenancy moreover presents challenges in understanding and overseeing the intelligent among different stakeholders.

    Utility estimating: Cloud Computing is some of the time related with utility estimating (moreover called pay-peruse), which is at the essential charging approach utilized by open Cloud suppliers. Metering at a level of deliberation fitting to the sort of benefit (e.g., capacity, CPU utilization, transmission capacity) may help to be more far reaching over time as organizations learn the sorts of information that are most useful—whether or not the data is utilized for charging or fair for instructive purposes.

    1.2  CLOUD USERS AND BENEFITS

    Cloud Computing alludes back to the applications presented as administrations over the internet notwithstanding the genuine Cloud foundation explicitly the hardware and structures programming in data habitats that offer the ones services. The key utilizing powers in the returned of distributed Computing is the pervasiveness of broadband and remote systems administration, falling capacity costs, and reformist upgrades in web registering programming application. Cloud Computing has the following segments where every segment is an entity (an individual or an enterprise) that takes an interest in an exchange or technique as well as performs responsibilities in Cloud Computing. The wonderful duties of each component can be portrayed as follows:

    Standardization bodies: These are corporations and industry consortiums that create the Cloud requirements.

    Cloud customer: An individual or organization that acquires, uses, and manages a Cloud

    Service this is supplied through a Cloud provider issuer at once or via a provider. A Cloud

    Client may be a system administrator, a developer, or a prevent consumer (i.e., business

    technique manager) counting on the service level. Some Cloud clients are providers.

    Cloud provider: Individual or employer that makes one or extra Cloud offerings available to customers primarily based totally on a service level agreement (SLA). In several situations, a Cloud provider additionally can be a client of offerings supplied via another provider, or creator for his or her personal services.

    Cloud creator: Groups or people who construct Cloud services; a Cloud creator isn’t always a Cloud provider.

    Cloud service: An middleman that gives connectivity and delivery of Cloud offerings from

    Cloud vendors to Cloud clients.

    Cloud auditor: It is an authority which can conduct impartial involvement of Cloud services, statistics device operations, general overall performance and protection of the Cloud implementation.

    Cloud dealer: An entity that manages the use, overall performance and transport of Cloud

    services and negotiates relationships between Cloud vendors and Cloud clients.

    Cloud regulator: A regulation frame and an enforcement corporation that is responsible for enacting legal guidelines and growing policies for Cloud Computing.

    Cloud auditor: It is a third party (generally governmental) that conducts an unbiased assessment of the Cloud implementation to ensure that it is in adherence to policies and necessities.

    Cloud educator: These are institutions and individuals who provide training materials and educate others about Cloud Computing.

    Cloud learner: These categories include students, developers, or every person who’s interested

    in learning about Cloud Computing.

    Cloud Computing provides following benefits to the purchasers.

    ❑  Reduced value: Cost is a clear gain of Cloud Computing. Cloud make use of a Cloud issuer or adopting Cloud paradigms internally, agencies can store operational and maintenance budgets.

    ❑  Adaptability: Adaptability benefits infer from fast provisioning of modern capacity and fast movement or relocation of workloads. In open segment settings, Cloud Computing gives deftness in terms of obtainment and procurement prepare and timelines.

    ❑  Improved computerization: Cloud Computing is based on the technique that administrations cannot as it were being provisioned, but too de-provisioned in a profoundly computerized   mold and which offers critical efficiencies to enterprises.

    ❑  Focus on center competency: Government offices can procure the benefits of Cloud Computing in arrange to center on its center mission and center goals and use IT assets as an implies to supply administrations to citizens.

    ❑  Sustainability: The destitute vitality proficiency of most existing information centers, due to destitute plan or destitute resource utilization, is presently caught on to be ecologically

    and financially unsustainable. Through leveraging economies of scale and the capacity to oversee resources more proficiently, Cloud Computing devours distant less vitality and other assets than a conventional IT information center.

    1.3  CHALLENGES OF CLOUD COMPUTING

    Life itself is the fusion of light and shadow. Like every uprising technology Cloud Computing has still got obstacles on its path that have to be overcome. This is especially true for enterprise applications. Subsequently we show some major obstacles of current Cloud Computing from a business perspective and present corresponding solution opportunities.

    Availability of service: Especially for enterprises, availability of certain applications is business critical. Therefore, they still shrink from trusting Cloud providers with hosting critical software. A possible solution would be to use multiple Cloud providers to provide business continuity and utilize Cloud-elasticity to defend against DDOS attacks.

    Data lock-in: Many businesses fear that choosing a certain Cloud provider also means losing a certain degree of freedom as their data gets locked in. If APIs of different providers where built on an industry standard, entry threshold would definitely be lower.

    Data confidentiality and auditability: Another important issue is confidentiality in the Cloud. Even if the provider is trustworthy it is still unclear on which server data is located and which legislation is applied. A possible work-around would be to deploy encryption, VLANs and firewalls. A really clean solution would store data geographically according to legal requirements.

    Data transfer bottlenecks: Only because high-speed broadband Internet is available in some regions, this does not necessarily mean that each branch can fall back on the same infrastructure quality. In the era of Cloud Computing enterprises have to balance which data to move entirely into the Cloud and where other solutions

    Enjoying the preview?
    Page 1 of 1