Ebook890 pages4 hours
Mastering Disruptive Technologies- Applications of Cloud Computing, IoT, Blockchain, Artificial Intelligence & Machine Learning Techniques: 1, #1
Rating: 0 out of 5 stars
()
About this ebook
About the Book:
The book is divided into 4 modules which consist of 21 chapters, that narrates briefly about the top five recent emerging trends such as: Cloud Computing, Internet of Things (IoT), Blockchain, Artificial Intelligence, and Machine Learning. At the end of each module, authors have provided two Appendices. One is Job oriented short-type questions with answers, and the second one provide us different MCQs with their keys.
Salient Features of the Book:
1. Detailed Coverage on Topics like: Introduction to Cloud Computing, Cloud Architecture, Cloud Applications, Cloud Platforms, Open-Source Cloud Simulation Tools, and Mobile Cloud Computing.
2. Expanded Coverage on Topics like: Introduction to IoT, Architecture, Core Modules, Communication models and protocols, IoT Environment, IoT Testing, IoT and Cloud Computing.
3. Focused Coverage on Topics like: Introduction to Blockchain Technology, Security and Privacy component of Blockchain Technology, Consensus Algorithms, Blockchain Development Platform, and Various Applications.
4. Dedicated Coverage on Topics like: Introduction to Artificial Intelligence and Machine Learning Techniques, Types of Machine Learning, Clustering Algorithms, K-Nearest Neighbor Algorithm, Artificial Neural Network, Deep Learning, and Applications of Machine Learning.
5. Pictorial Two-Minute Drill to Summarize the Whole Concept.
6. Inclusion of 300 Job Oriented Short Type Questions with Answers for the aspirants to have the Thoroughness, Practice and Multiplicity.
7. Around 178 Job Oriented MCQs with their keys.
8. Catch Words and Questions on Self-Assessment at Chapter-wise Termination.
Author
S. R. Jena
Mr. Soumya Ranjan Jena is currently working as Faculty Associate in the Department of Computer Science and Engineering at the École Centrale School of Engineering, Mahindra University, Hyderabad, India. He received his M. Tech degree in Information Technology form Utkal University, Bhubaneswar, Odisha, India in the year 2013, B. Tech in Computer Science and Engineering degree from BPUT, Rourkela, Odisha, India in the year 2010 and also certified by CCNA and Diploma in Computer Hardware and Networking Management from CTTC, Bhubaneswar, Odisha, India in the year 2011. He has more than 8 years of teaching experience from various reputed Universities and Colleges in India. He is basically an Academician, an Author, a Researcher, a Trainer, a Reviewer of various International Journals and International Conferences and a Keynote Speaker. His publications have more than 300 citations, h index of 9, and i10 index of 8 (Google Scholar). He has published 19 international level books, around 27+ international level research articles in various international journals, conferences, and filed 20+ international patents. He has been awarded by Bharat Education Excellence Awards in the year 2022, Excellent Performance in Educational Domain & Outstanding Contributions in Teaching in the year 2022 and Best Researcher by Gurukul Academic Awards in 2022. His research interests include Cloud and Distributed Computing, Internet of Things, Green Computing, Sustainability, Renewable Energy Resources, Internet of Energy etc. He can be reached by Email: soumyajena1989@gmail.com.
Read more from S. R. Jena
Related to Mastering Disruptive Technologies- Applications of Cloud Computing, IoT, Blockchain, Artificial Intelligence & Machine Learning Techniques
Titles in the series (100)
Self-Care for Caregivers: 1, #1 Rating: 0 out of 5 stars0 ratings「複製人」技術應用於女性人種改良之構想藍圖: 1, #1 Rating: 0 out of 5 stars0 ratings生殖系統改良的複製狼、熊構想藍圖—應用複製羊技術: 1, #1 Rating: 0 out of 5 stars0 ratingsSmudge The Great Escape: 1, #1 Rating: 5 out of 5 stars5/5The Killing Circle: 1, #1 Rating: 0 out of 5 stars0 ratingsSmart Marketing For Tutors: A Step-by-Step Guide To Building Your Online Tutoring Business Using Free Marketing Tools: 1, #1 Rating: 0 out of 5 stars0 ratingsMassage Therapy: My Journey is My Life: 1, #1 Rating: 0 out of 5 stars0 ratings45 Affordable Retirement Towns: 1, #1 Rating: 0 out of 5 stars0 ratingsEasy Ways To Maintain Your Ideal Body Mass Index: 1, #1 Rating: 0 out of 5 stars0 ratingsHow You Can Make Money With The Government Even If Your Husband Or Wife Has A Criminal Record: 1, #1 Rating: 0 out of 5 stars0 ratingsSTREETMECHANIC: 1, #1 Rating: 0 out of 5 stars0 ratingsLiving the Purpose Inspired Life: 1, #1 Rating: 0 out of 5 stars0 ratingsA Bougainvillea Flower 1: 1, #1 Rating: 0 out of 5 stars0 ratings韃靼與瓦剌政治理論—「外國軍事儲備土地出租」政治制度: 1, #1 Rating: 0 out of 5 stars0 ratings「複製羊」技術應用於雌性猿和猩猩生殖系統改良之構想藍圖: 1, #1 Rating: 0 out of 5 stars0 ratingsCry of an Osprey: 1, #1 Rating: 0 out of 5 stars0 ratingsSuccess in Exam! How to Prepare For Exams Effectively?: 1, #1 Rating: 0 out of 5 stars0 ratingsTony's World Book 1 Indoctrination: 1, #1 Rating: 0 out of 5 stars0 ratings102 Cupcake Recipes: 1, #1 Rating: 0 out of 5 stars0 ratingsIT Security Concepts: 1, #1 Rating: 5 out of 5 stars5/5English Common Expressions - How To Say It In Chinese? Book One: 1, #1 Rating: 1 out of 5 stars1/5A Moment of Clarity: 1, #1 Rating: 0 out of 5 stars0 ratingsGladstone: 1, #1 Rating: 0 out of 5 stars0 ratingsLearning the Technical Game of Football: 1, #1 Rating: 0 out of 5 stars0 ratingsSHORT MORAL COLLECTION STORIES: 1, #1 Rating: 0 out of 5 stars0 ratingsSanta Claus Versus Evil Santa: 1, #1 Rating: 0 out of 5 stars0 ratings"Trail Dust": 1, #1 Rating: 5 out of 5 stars5/5Viaje De La Doncella: 1, #1 Rating: 0 out of 5 stars0 ratingsSally Su Su And Her Quest For Magic: 1, #1 Rating: 0 out of 5 stars0 ratings
Related ebooks
Navigating the Digital Landscape: Fundamentals, Cybersecurity, Emerging Technologies, and Applications Rating: 0 out of 5 stars0 ratingsThe Innovation Ultimatum: How six strategic technologies will reshape every business in the 2020s Rating: 0 out of 5 stars0 ratingsThe Internet of Things Explained Rating: 4 out of 5 stars4/5The Blockchain Technology: The Hidden Mystery Behind this Internet Tech Disruptor Rating: 0 out of 5 stars0 ratingsThe AI Book: The Artificial Intelligence Handbook for Investors, Entrepreneurs and FinTech Visionaries Rating: 0 out of 5 stars0 ratingsIoT Time: Evolving Trends in the Internet of Things Rating: 5 out of 5 stars5/5Big Data Analytics for Cyber-Physical Systems: Machine Learning for the Internet of Things Rating: 0 out of 5 stars0 ratingsCloud computing: Moving IT out of the office Rating: 0 out of 5 stars0 ratingsPlatform engineering The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsLeading with IT: Lessons from Singapore's First CIO Rating: 0 out of 5 stars0 ratingsAgile Architecture A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsBlockchain in Supply Chain Standard Requirements Rating: 0 out of 5 stars0 ratingsAI And IoT A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsThink Like a CTO Rating: 5 out of 5 stars5/5Blockchain And Supply Chain Management A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsBlockchain Network A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsBlockchain in Logistics and Transportation The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsChief Digital Officer A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsData Privacy Fintech A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsPredicting Malicious Behavior: Tools and Techniques for Ensuring Global Security Rating: 0 out of 5 stars0 ratingsCryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto Rating: 0 out of 5 stars0 ratingsCloud Computing… Commoditizing It: The Imperative Venture for Every Enterprise Rating: 0 out of 5 stars0 ratingsDigital Image Processing: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsAI, IoT and the Blockchain: Using the Power of Three to create Business, Legal and Technical Solutions Rating: 5 out of 5 stars5/5Think Blockchain: A Student's Guide to Blockchain's Evolution from Bitcoin, Ethereum, Hyperledger to Web3. Rating: 0 out of 5 stars0 ratingsDigital Fix - Fix Digital: How to renew the digital world from the ground up Rating: 0 out of 5 stars0 ratingsDeconstructing Cloud Rating: 0 out of 5 stars0 ratingsBlockchain Consortium The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratings
Computers For You
Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5Elon Musk Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsProcreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsAlan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsThe Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Childhood Unplugged: Practical Advice to Get Kids Off Screens and Find Balance Rating: 0 out of 5 stars0 ratingsThe Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5People Skills for Analytical Thinkers Rating: 5 out of 5 stars5/5Going Text: Mastering the Command Line Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5AP Computer Science Principles Premium, 2024: 6 Practice Tests + Comprehensive Review + Online Practice Rating: 0 out of 5 stars0 ratingsCreating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5
Reviews for Mastering Disruptive Technologies- Applications of Cloud Computing, IoT, Blockchain, Artificial Intelligence & Machine Learning Techniques
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Mastering Disruptive Technologies- Applications of Cloud Computing, IoT, Blockchain, Artificial Intelligence & Machine Learning Techniques - S. R. Jena
MASTERING DISRUPTIVE TECHNOLOGIES
––––––––
R. K. Dhanaraj
S. R. Jena
A. K. Yadav Vani Rajasekar
HP HAMILTON LTD
Building 3 Chiswik Park, Chiswick High Road, London W45YA, United Kingdom
HP Hamilton is the trademark of HP Hamilton Limited
HP Hamilton Limited is registered with the Companies House of England and Wales
Mastering Disruptive Technologies
By Dr. R. K. Dhanaraj, Prof. S. R. Jena, Prof. A. K. Yadav, Prof. Vani Rajasekar
First Edition 2021
Copyright© 2021 by HP HAMILTON LIMITED
Sold in India & Rest of Asia Pacific by
HP Hamilton India, India
Under License from, HP Hamilton Limited, England All Rights Reserved.
No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. You must not circulate this work in any other form and you must not impose this same condition on any other acquirer.
This publication is designed to provide accurate information in regard to the subject matter covered as of its publication date, and with the understanding that knowledge and best practice evolve constantly. To the fullest extent of the law, neither the Publisher nor the Editors assume any liability for any damage and/or injury and/or loss to persons to property arising out of or related to any use of material contained in this book.
Trademark Notice: Product or Corporate Names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.
ISBN: 978-1913936235
British Library Cataloguing in Publication data: Data Available
Printed in India by:
Kumar Offset Works, India
Cover Image: Licensed by Freepik Company SL, Spain
Links to Third-Party Websites are provided by HP Hamilton Limited in good faith and for information only. HP Hamilton Limited disclaims any responsibility for the materials contained in any third-party website referenced in this work.
In this 21st century, the need for the hour novel Corona Virus disease (Covid-19 pandemic) has strongly impacted our regular life, including slowing down the global economy. In this perspective importance of digitalization has greatly produced its importance in our country like India where the Indian government has already started the Digital India initiative where the primary objective is to transform India into a digitally empowered society and knowledge economy through three pillars known as Digital Infrastructure as the core utility to every citizen, on-demand Governance and services, and digital empowerment of citizens. Disruptive Emerging Technologies displaces an established technology and shakes up the industry or a groundbreaking product that creates a completely new industry came into the picture to make things digitalized. These technologies include- Cloud Computing, IoT, Blockchain, Artificial Intelligence, and Machine Learning arise as significant catalysts, as well as other recent trends, have successfully transformed and execute their digital transformation consistently. Then here, the question arises what is Disruptive Technology and who has invented it? Harvard Business School ex-professor Clayton Magleby Christensen invented disruptive technology in 1997 in his best-selling book, The Innovator's Dilemma
where he separates technology into two types: Sustaining Technology and Disruptive Technology. The former depends on incremental improvements to an already established technology, whereas the latter lacks refinement, often has performance problems because it is new, appeals to a limited audience, and may not yet have a proven practical application.
In 2020, the Covid-19 pandemic intensified Cloud adoption by several years. Indian companies of all sizes quickly monitored their moral choices to ignore the legacy infrastructure and move their operations to the Cloud powered by artificial intelligence (AI), machine learning (ML) piecemeal, or full. During the coronavirus pandemic, Cloud Computing, which underpinned the world economy, global supply chains, and remote workers, will continue to be an essential goal for organizations searching for. The year provided an excellent opportunity for Cloud operators to sell their flexible and stable Cloud-based applications while maintaining data inside the country's territories. Although most organizations in India have embraced Cloud at a particular stage, the IDC said, the current pandemic situation has enabled them to spend more on public Cloud infrastructure as a service (IaaS), platform-as-a-service (PaaS) solutions, and software-
as-a-service (Software-as-a-Service) solutions (SaaS). Initially, the IoT was most interesting for business and development, where its implementation is often referred to as machine-to-machine (M2M), but now the attention is on filling our homes and offices with smart devices, making them into something that applies to almost all. The Internet of Things refers to the billions of physical devices currently linked to the internet worldwide, all of which capture and exchange data. Connecting up all these different objects and adding sensors to them adds a digital intelligence level to devices that would be otherwise dumb, enabling them to communicate real-time data without involving a human being. The Internet of Things, integrating the digital and physical worlds, makes the fabric of the world around us smarter and more sensitive.
Blockchain emerged as peer-to-peer distributed ledger technology for recording transactions, maintained by peers without any central trusted regulatory through distributed ledger technology, public-key cryptography, and consensus mechanism. It has not only given birth to crypto-currencies but also resolved various security, privacy, and transparency issues of decentralized systems. Initially, the concept of blockchain was applied to implement crypto- currencies like Bitcoin, which are capable of capturing and checking a large number of digital transactions without any third-party involvement. But, nowadays, blockchain technology has gone far beyond its beginning in crypto-currencies and banking. Industries like insurance, gaming are looking towards blockchain applications. The banking sector, Law enforcement system, ride- hailing industry, and many other technical sectors seek a bright future in blockchain technology.
Artificial Intelligence (AI) is the integration within our everyday lives was still quite far ahead. Artificial Intelligence is meant to be an imitation of human intelligence with some extensions added on top of it to make it more useful – like a calculator that can give you solutions to your math problems without you having to spend time thinking about it for yourself. Thanks to the exponential growth of machine learning and computer programming power in the last decade. A quick example will be the filters you would have seen and perhaps even use daily on your social media applications such as Instagram or Snapchat. Another great example would be the voice assistant in your smartphone, probably Google's Google Assistant if you are an Android user or Apple's Siri if you are an iOS user. These assistants are nothing but AI software designed to make your everyday life more comfortable through voice recognition technology. The technologies like artificial intelligence are now changing the output of search engines quite a bit. IT engineers used to have to roll out big and minor algorithm changes manually. But now, artificial intelligence solutions enable the algorithm, known as Self-Updating Algorithms, to update itself.
Adoption of this Book:
This unique book gives detailed Coverage of Disruptive Technologies such as Cloud Computing, IoT, Blockchain, AI, and Machine Learning. Therefore, it can be used by students who are doing undergraduate, master's, and interdisciplinary research courses in Computer Science and
Engineering, Information Technology, and at different Universities, Colleges Worldwide. This book will fulfill readers' expectations and serve as an excellent textbook for such courses. Creative suggestions for the further enhancement of the book are highly welcome from our beloved readers through email.
––––––––
Dr. Rajesh Kumar Dhanaraj
Email: sangeraje@gmail.com
Soumya Ranjan Jena
Email: soumyajena1989@gmail.com
Ashok Kumar Yadav
Email: ashokyadav88.jnu@gmail.com
Vani Rajasekar
Email: vanikecit@gmail.com
Dr. Gheorghita Ghinea
Professor of Mulsemedia Computing Telephone: + 44 (1895) 266033
e-mail: George.Ghinea@brunel.ac.uk
––––––––
Department of Computer Science Uxbridge, Middlesex UB8 3PH United Kingdom
Departmental fax: + 44 (1895) 251686
––––––––
5th of January 2021
FOREWORD
Change is the only constant human has witnessed since the time s/he learned to make tools and discovered fire. It is the technological innovations of today that are driving us towards efficiency, invigorating society and the environment. However, what makes these technological advancements as disruptive? As the name suggests, they disrupt the status quo by entirely augmenting an existing technology or introducing a novel concept to the society.
This first edition of "Mastering Disruptive Technologies" written by Prof. (Dr.) Rajesh Kumar Dhanaraj, Prof. Soumya Ranjan Jena, Prof. Ashok Kumar Yadav and Prof. Vani Rajasekar is an excellent effort to produce a text book as well as reference book for undergraduate, masters and interdisciplinary research courses in the field of Computer Science/ Information Technology to achieve greater height of academic success. Moreover, it includes exceptional coverage on various theories and applications of five technological advancements like Cloud Computing, Internet of Things, Blockchain, Artificial Intelligence and Machine Learning; which are going to reshape the industry.
The book is well written looking at the current IT Job market worldwide. Apart from this, the book will definitely inspire learners to think creatively and through that enable them to acquire mastery over various latest technologies.
I hope the book will be a notable success worldwide. Wishing the venture of the authors to fulfill its desired goal in future; and many more success in future.
––––––––
Yours sincerely,
G. Ghinea
Cloud Computing Module
Initiation of Cloud Computing................................3
The Darwinism of Cloud Paradigm....................................4
Cloud Users and Benefits...........................................7
Challenges of Cloud Computing......................................9
Cloud Deployment Models.........................................10
Design of Cloud Computing........................................12
Cloud Computing Reference Model..................................14
Cloud Computing Platforms and Technologies.........................17
Amazon Web Services.........................................17
Google App Engine...........................................21
Microsoft Azure..............................................23
Apache Hadoop..............................................26
Salesforce.com...............................................30
Manjrasoft Aneka.............................................32
Open Nebula................................................34
Eucalyptus..................................................35
Vmware....................................................38
Hypervisor......................................................39
Virtualization Technology..........................................40
Two-Minute Drill..................................................41
Catch Words.....................................................43
Questions on Self-Assessment.......................................44
References.......................................................44
Cloud Computing Open-Source Simulation Tools................47
Introduction........................................................48
Cloudsim..........................................................49
Cloud Analyst......................................................51
Cloud Reports......................................................52
Federated Cloudsim.................................................55
CloudMIG Xpress....................................................55
EdgeCloudSim......................................................57
Green Cloud........................................................61
Two-Minute Drill....................................................62
Catch Words........................................................64
Questions on Self-Assessment.........................................64
References.........................................................64
Introduction To Mobile Cloud Computing.........................68
Mobile Computing...................................................69
What Is Mobile Cloud Computing (MCC )?..............................69
Architecture of MCC.................................................70
Advantages of MCC.................................................71
Applications of MCC.................................................72
Challenges of MCC..................................................74
Future Research Scope of MCC.......................................75
Two-Minute Drill....................................................76
Catch Words.......................................................77
Questions on Self-Assessment.........................................77
References.........................................................77
Appendix-1 Cloud Computing Job Oriented Short Type Questions With Answers 79
Appendix-2 Cloud Computing MCQs With Answers.......................99
Internet of Things(IoT) Module
Introduction to IoT................................................109
Evolution of IoT....................................................110
Aspects of IoT.....................................................111
Key Challenges In IoT..............................................111
Two Minutes Drill..................................................113
Catch Words......................................................113
Questions on Self-Assessment.......................................113
References........................................................114
IoT Architecture...................................................115
Three Layered Architecture.........................................116
Five Layered Architecture...........................................117
Fog Based Architecture.............................................118
Cloud Based Architecture...........................................119
Two-Minute Drill...................................................121
Catch Words......................................................122
Questions on Self-Assessment.......................................122
References........................................................123
Core Modules of IoT..............................................125
Transducer and Actuators...........................................126
Data Communication...............................................127
Data Storage and Management......................................128
Concerns for IoT Security and Privacy................................131
Two Minute Drill...................................................131
Catch Words......................................................132
Questions on Self-Assessment.......................................132
References........................................................132
Communication Models and Protocols..........................134
Request and Response Model.......................................135
Publisher - Subscriber (Pub/Sub) Model...............................136
M2M Communication...............................................137
MQTT (Message Queuing Telemetry Transport) Protocol.................137
Constrained Application Protocol (CoA P)..............................140
Other Communication Models and Protocols in IoT:.....................141
Two-Minute Drill...................................................142
Catch Words......................................................143
Questions On Self-Assessment.......................................143
References........................................................144
IoT Environment..................................................145
Introduction.......................................................146
Hardware Platforms of IoT..........................................147
Software Programming Languages...................................154
Two-Minute Drill...................................................157
Catch Words......................................................158
Questions on Self-Assessment.......................................158
References........................................................159
IoT Testing........................................................160
Introduction.......................................................161
Features of Testing................................................161
Types of Testing...................................................162
Key Research Challenges...........................................164
Two-Minute Drill...................................................165
Catch Words......................................................166
Questions on Self-Assessment.......................................166
References........................................................166
IoT and Cloud Computing.........................................168
Concepts of Cloud Computing and IoT.................................169
Role of Web Communication.........................................171
Popular Cloud Services..............................................172
Key Research Challenges............................................172
Two-Minute Drill....................................................173
Catch Words.......................................................174
Questions on Self-Assessment........................................174
References........................................................174
Applications of IoT.................................................176
Introduction........................................................177
Industry Automation................................................177
Healthcare Management............................................179
Two-Minute Drill....................................................182
Catch Words.......................................................182
Qusetions on Self-Assessment........................................182
References........................................................183
Appendix-3 IoT Job Oriented Short Type Questions With Answers.......184
Appendix-4 IoT MCQs With Answers....................................198
Blockchain Module
Introduction To Blockchain Technology..........................207
Centralized, Distributed and Decentralized Systems.....................208
What is Blockchain?.................................................210
Types of Blockchain.................................................210
Architecture of Blockchain...........................................212
How Does Blockchain Work?.........................................215
Blockchain Features................................................216
Two-Minute Drill....................................................217
Catch Words.......................................................218
Questions on Self-Assessment........................................218
References........................................................219
Blockchain Security and Privacy Tools...........................221
Cryptography......................................................222
Asymmetrìc Cryptography...........................................223
Hash Function......................................................223
Digital Signature...................................................225
Elliptic Curve Cryptography (ECC )....................................226
Merkle Tree........................................................227
Consensus Algorithm................................................230
Two-Minute Drill....................................................234
Catch Words.......................................................236
Review Questions...................................................237
References........................................................237
Blockchain Development Platform...............................240
Introduction to Bitcoin...............................................241
Introduction of Ethereum............................................243
Introduction to Hyperledger..........................................247
Applications of Blockchain...........................................249
Two-Minute Drill....................................................255
Catch Words.......................................................256
Questions on Self-Assessment........................................257
References........................................................257
Appendix-5 Blockchain Job Oriented Short Type Questions With Answers259
Appendix-6 Blockchain MCQs With Answers............................268
AI and Machine Learning Module
15 Introduction To AI and Machine Learning.....................277
15.1 Introduction....................................................278
15.2 Learning Problems..............................................278
15.3 Key Elements of Machine Learning................................279
15.3.1 Data Model..............................................279
15.3.2 Algorithm...............................................279
15.3.2 Datasets...............................................279
15.3.4 Feature Extraction.......................................279
15.3.5 Advance Threats.........................................280
15.4 Intelligent Agents...............................................280
15.4.1 Agent Terminology.......................................280
15.4.2 Structure of Intelligent Agents.............................281
15.4.3 Types of Agents.........................................281
15.5 Two-Minute Drill................................................282
15.6 Catch Words...................................................282
15.7 Questions on Self-Assessment....................................282
15.8 References....................................................282
16 Types of Machine Learning....................................283
16.1 Introduction...................................................284
16.2 Supervised Learning............................................284
16.2.1 Training the System......................................285
16.2.2 Types of Supervised Learning.............................285
16.3.3 Examples of Supervised Learning..........................285
16.3.4 Advantages.............................................285
16.3.5 Disadvantages..........................................286
16.4 Unsupervised Learning..........................................286
16.4.1 Types of Unsupervised Learning...........................286
16.4.2 Examples of Unsupervised Learning........................287
16.4.3 Advantages.............................................287
16.4.4 Disadvantages..........................................288
16.5 Reinforcement Learning.........................................288
16.5.1 Types of Reinforcement Learning..........................289
16.5.2 Practical Applications of Reinforcement Learning.............289
16.5.3 Imitation Learning.......................................289
16.5.4 Deep Reinforcement Learning.............................290
16.6 Two-Minute Drill................................................290
16.7 Catch Words...................................................290
16.8 Questions on Self-Assessment....................................290
16.9 References....................................................291
17 Clustering Algorithms..........................................292
17.1 Introduction...................................................293
17.2 Density Based Methods.........................................293
17.2.1 Need of DBSCAN.........................................293
17.2.2 Algorithm Steps of DBSCAN...............................294
17.2.3 Disadvantage of DBSCAN.................................294
17.3 Hierarchical Based Methods......................................295
17.3.1 Agglomerative Hierarchical Clustering......................295
17.3.2 Divisive Hierarchical Clustering............................296
17.4 Partition Methods...............................................297
17.4.1 K-Mean Partition.........................................297
17.4.2 Properties of K-Mean Algorithm............................298
17.4.3 Algorithm Steps in K-Mean:................................298
17.4.4 K-Means++ Algorithm....................................298
17.5 Two-Minute Drill................................................298
17.6 Catch Words...................................................299
17.7 Questions on Self-Assessment....................................299
17.8 References....................................................299
18 K-Nearest Neighbor Algorithm................................300
18.1 Introduction...................................................301
18.2 Properties of KNN...............................................302
18.2.1 Selection of K in KNN.....................................302
18.2.2 Metric Learning in KNN...................................303
18.3 Feature Selection of KNN........................................303
18.3.1 Dimensionality Reduction.................................303
18.3.2 Reduction of Data........................................303
18.3.3 Condensed Nearest Neighbor for Data Reduction.............304
18.3.4 Knn Regression..........................................304
18.3.5 Advantages of KNN......................................304
18.3.6 Disadvantages of KNN....................................305
18.4 Validation And Results of KNN Algorithm...........................305
18.4.1 Cross Validation.........................................305
18.4.2 Confusion Matrix.........................................305
18.4.3 Likelihood-Ratio Test.....................................306
18.4.4 Limitations of KNN.......................................306
18.4.5 Potential Applications of KNN..............................307
18.6 Two-Minute Drill................................................307
18.7 Catch Words...................................................307
18.8 Questions on Self-Assessment....................................307
18.9 References....................................................308
19 Artificial Neural Network (ANN )..............................309
19.1 Introduction...................................................310
19.2 Components of ANN............................................310
19.3 Types of ANN..................................................311
19.3.1 Perceptron..............................................311
19.3.2 Convolutional Neural Networks (CNN )......................311
19.3.3 Recurrent Neural Networks (RNN ).........................312
19.3.4 Long Short-Term Memory (LST M) Network..................312
19.3.5 Feedforward Neural Network..............................313
19.3.6 Auto Encoders...........................................313
19.3.7 Modular Neural Networks.................................314
19.4 Applications of ANN.............................................314
19.4.1 System Control..........................................314
19.4. Pattern Recognition...........................................315
19.4.3 Medical Diagnosis.......................................315
19.4. Sequence Prediction..........................................315
19.4.5 Data Mining.............................................315
19.4.6 Text Classification.......................................315
19.4.7 Named Entity Extraction..................................316
19.4.8 Language Generation....................................316
19.5 Two-Minute Drill................................................316
19.6 Catch Words...................................................316
19.7 Questions on Self-Assessment....................................317
19.8 References....................................................317
20 AI and Machine Learning......................................318
20.1 Introcution.....................................................319
20.2 Learning From Examples........................................319
20.2.1 Supervised Learning.....................................320
20.2.2 Reinforcement Learning..................................321
20.2.3 Unsupervised Learning...................................322
20.2.4 Unsupervised Learning:...................................322
20.3 Deep Learning.................................................323
20.3.1 Challenges..............................................323
20.3.2 Applications of Deep Learning.............................324
20.4 Two-Minute Drill................................................324
20.5 Catch Words...................................................324
20.6 Questions on Self-Assessment....................................325
20.7 References....................................................325
21 Applications of Machine Learning.............................326
21.1 Introduction...................................................327
21.2 Cancer Prediction...............................................327
21.3 Plant Disease Prediction.........................................329
21.4 Drug Discovery and Development................................330
21.5 Two-Minute Drill................................................332
21.6 Catch Words...................................................332
21.7 Questions On Self-Assessment...................................332
21.8 References....................................................332
Appendix-7 AI & ML Job Oriented Short Type Questions With Answers..334
Appendix-8 AI & ML MCQs With Answers...............................341
Index...................................................347–352
About the Authors.......................................353–354
CHAPTER STRUCTURE
1.1 The Darwinism of Cloud Paradigm
1.2 Cloud Users and Benefits
1.3 Challenges of Cloud Computing
1.4 Cloud Deployment Models
1.5 Design of Cloud Computing
1.6 Cloud Computing Reference Model
1.7 Cloud Computing Platforms and Technologies
1.7.1 Amazon Web Services
1.7.2 Google AppEngine
1.7.3 Microsoft Azure
1.7.4 Apache Hadoop
1.7.5 Salesforce.com
1.7.6 Manjrasoft Aneka
1.7.7 Open Nebula
1.7.8 Eucalyptus
1.7.9 VMware
1.8 Hypervisor
1.9 Virtualization Technology
1.10 Two-Minute Drill
1.11 Catch Words
1.12 Questions On Self-Assessment
1.13 References
1.1 THE DARWINISM OF CLOUD PARADIGM
The initiation of Cloud Computing dates back to the 1960’s to make the users access their applications anywhere at any time with the help of connected devices. It is link to the concept of distributed Computing. The congruity of Cloud in the sky and Cloud Computing technique though remains same the users use the same in their planetary frame in a particular period till their objectives are fulfilled. For the most element a natural Cloud may be an unmistakable mass of fluid beads or solidified gem stones that made up of water or one of a kind chemical compounds suspended inside the climate over the floor of a planetary frame. Those suspended particles are too referred to as mist concentrates and are taken into consideration inside the Cloud material science branch of meteorology. But the Cloud that we making plans to think about is definitely extraordinary from it in the discipline of Computer Science.
The concept of Computer Network
became supplied inside the 1960 through J.C.R. Licklider who was conscious for empowering the development of ARPANET (Advanced Research Projects Agency Network) in 1969 of the United States Department of Defence. His vision was for anybody at the globe to be interconnected and getting the applications and facts at any region, from everywhere. It could be a vision that leads to the innovation of Cloud Computing. After that within the year 1994, Tim Berners-Lee created HTML for internet based totally improvement different experts’ property the Cloud idea to computer researcher John McCarthy who proposed the idea of computation being conveyed as an open application, comparative to the gain bureaus which date back to the 1960s. Since the 1960s, Cloud Computing has created alongside some of innovations with Web 2.0 being the foremost later development. Be that as it is able to, because the internet has been begun to provide noteworthy transfer speed within the 1990, Cloud Computing for the masses has been something of an overdue engineer.
Fig. 1.1 The Evolution of Cloud Computing
One of the primary turning points in Cloud Computing history was the entry of Salesforce.com in the year 1999, which spearheaded the concept of conveying endeavor applications through a basic site. This data centers cleared the way for both pro and standard server firms to convey applications over the internet. Amazon Web Services (AWS) was begun within the year 2002, which given a suite of Cloud-based administrations counting capacity, computation and indeed human insights through AWS.
Then in 2006, Amazon propelled its Elastic Compute Cloud (EC2) as a commercial web benefit mechanism that permits small IT sectors and people to lease computers on which to run them possess computer applications. Amazon EC2/Simple Storage Service (S3) was the primary broadly open Cloud Computing foundation benefit, said Jeremy Allaire, CEO of Brightcove, which gives its SaaS online video stage to UK TV stations and newspapers.
Another huge breakthrough came in 2009, as Web 2.0 hit its walk, and Google and others begun to offer browser-based undertaking applications such as Google Apps. The most vital commitment to Cloud Computing has been the rise of executioner apps
from driving innovation mammoths such as Microsoft and Google. When these companies provide administrations in a way that’s dependable and simple to expend, the knock-on impact to the industry as a whole could be a more extensive common acknowledgment of online administrations, said Dan Germain, Chief Information Officer, Various companies, Washington DC.
The buzz word Cloud Computing may be a divine blast and one of the developing Computing worldview that innovates to send cost-effective arrangements over the internet. According to NIST (National Institute of Standards and Innovation) Cloud Computing could be a show for empowering omnipresent, helpful, on-demand arrangement gets to a shared pool of configurable Computing assets (e.g., systems, servers, capacity, applications and administrations) that can be quickly provisioned and discharged with negligible administration exertion or benefit supplier interaction.
Cloud Computing on a very basic level changes the way that IT administrations is conveyed to organizations. Rather than both owning and overseeing IT administrations for themselves, or utilizing an outsourcing approach built around committed equipment, program, and back administrations, organizations can utilize Cloud Computing to meet their IT prerequisites employing an adaptable, on-demand, and quickly versatile demonstrate that requires possession on their portion, nor arrangement of committed assets. Let’s to begin with see from a chronicled point of view where Cloud Computing fits in and whether it’s truly diverse or fair.
Fig. 1.2 illustrates six diverse levels which appear the advancement of the Computing worldview. In Level 1, individuals utilized terminals to put through to capable centralized computers shared by numerous clients. Back at that point, terminals were essentially small, more than consoles and screens. In Level 2, standalone individual computers (PCs) got to be effective sufficient to satisfy users’ day by day work you didn’t have to be share a centralized server with anybody else. Level 3 gave us the concept behind the normal computer arrangement like LAN where different computers can be associated with each other. Level 4 saw the appearance of nearby systems that might interface to other neighborhood systems to set up a more worldwide network—users might presently interface to the Web to utilize farther applications and assets. Level 5 brought us the concept of an electronic network to encourage shared Computing control and capacity assets. Individuals utilized PCs to get to a network of computers in a straightforward way.
Fig.1.2 The Development Towards Cloud Computing Paradigm
Fig.1.2 appears, a conceptual layer- a Cloud on the Web- stows away all accessible assets (either equipment or computer program) and administrations, but it distributes a standard interface. As long as clients can interface to the Web, they have the complete Web as their control PC. Cloud Computing hence alludes to the procedures that empower and encourage this situation. When compared to the interminably effective Web Cloud, PCs appear like lightweight terminals permitting clients to utilize the Cloud. From this point of view, Cloud Computing seems like a return
to the initial centralized computer worldview. Of course, the Cloud Computing paradigm isn’t this simple. Unlike a centralized server, which may be a physical machine that gives limited Computing control, a Cloud speaks to all conceivable assets on the Web, recommending interminable control and capacity. In the meantime, not at all like a straightforward terminal acting as a client interface to a centralized computer, a PC within the Cloud Computing paradigm possesses critical control to supply a certain degree of neighborhood Computing and caching back. The Cloud Computing has the taking after seven basic characteristics:
On request self-service: A buyer can essentially arrange Computing capabilities, such as server time and arrange capacity, as required without the ought to inform the Cloud benefit provider.
Broad network access: Capabilities are accessible over the arrange and it has openness through standard instruments which advance utilize by heterogeneous lean or thick client platforms like mobile phones, portable workstations, and PDAs.
Self-organizing: Since assets can be distributed or de-allocated on-demand, benefit suppliers are enabled to oversee their asset utilization agreeing to them possess needs. Moreover, the mechanized asset management feature yields tall nimbleness that empowers benefit suppliers to reply rapidly to fast changes in benefit request such as the streak swarm impact.
Resource pooling and multi-tenancy: In Cloud Computing distinctive assets i.e., storage, processors, memory, transmission capacity, and virtual machines (VMs) are shared between different occupants, and relegated only at run time to one buyer at a time. Allotting assets is done powerfully based on the shopper needs. Sharing assets can offer assistance increment utilization and consequently essentially diminish the operation taken a toll. Diverse planning calculations can be utilized to powerfully allot assets to multiple-tenants based on the sort of workload, reasonableness, region, and numerous other factors.
Rapid elasticity: Versatility is the capacity to scale in and out by provisioning assets and discharging them individually. Cloud Computing ought to give components to permit speedy and programmed versatility. The huge pool of assets in Cloud datacenters gives the dream of boundless assets to the buyers, and flexibility gives the adaptability to arrangement these recourses on-demand.
Multi-tenancy: In a Cloud environment, administrations possessed by numerous suppliers are co-located in a single information center. The execution and administration issues of these administrations are shared among benefit suppliers and the framework supplier. The layered design of Cloud Computing gives a common division of duties: the proprietor of each layer as it were having to center on the particular destinations related with this layer. Be that as it may, multi-tenancy moreover presents challenges in understanding and overseeing the intelligent among different stakeholders.
Utility estimating: Cloud Computing is some of the time related with utility estimating (moreover called pay-peruse), which is at the essential charging approach utilized by open Cloud suppliers. Metering at a level of deliberation fitting to the sort of benefit (e.g., capacity, CPU utilization, transmission capacity) may help to be more far reaching over time as organizations learn the sorts of information that are most useful—whether or not the data is utilized for charging or fair for instructive purposes.
1.2 CLOUD USERS AND BENEFITS
Cloud Computing alludes back to the applications presented as administrations over the internet notwithstanding the genuine Cloud foundation explicitly the hardware and structures programming in data habitats that offer the ones services. The key utilizing powers in the returned of distributed Computing is the pervasiveness of broadband and remote systems administration, falling capacity costs, and reformist upgrades in web registering programming application. Cloud Computing has the following segments where every segment is an entity (an individual or an enterprise) that takes an interest in an exchange or technique as well as performs responsibilities in Cloud Computing. The wonderful duties of each component can be portrayed as follows:
Standardization bodies: These are corporations and industry consortiums that create the Cloud requirements.
Cloud customer: An individual or organization that acquires, uses, and manages a Cloud
Service this is supplied through a Cloud provider issuer at once or via a provider. A Cloud
Client may be a system administrator, a developer, or a prevent consumer (i.e., business
technique manager) counting on the service level. Some Cloud clients are providers.
Cloud provider: Individual or employer that makes one or extra Cloud offerings available to customers primarily based totally on a service level agreement (SLA). In several situations, a Cloud provider additionally can be a client of offerings supplied via another provider, or creator for his or her personal services.
Cloud creator: Groups or people who construct Cloud services; a Cloud creator isn’t always a Cloud provider.
Cloud service: An middleman that gives connectivity and delivery of Cloud offerings from
Cloud vendors to Cloud clients.
Cloud auditor: It is an authority which can conduct impartial involvement of Cloud services, statistics device operations, general overall performance and protection of the Cloud implementation.
Cloud dealer: An entity that manages the use, overall performance and transport of Cloud
services and negotiates relationships between Cloud vendors and Cloud clients.
Cloud regulator: A regulation frame and an enforcement corporation that is responsible for enacting legal guidelines and growing policies for Cloud Computing.
Cloud auditor: It is a third party (generally governmental) that conducts an unbiased assessment of the Cloud implementation to ensure that it is in adherence to policies and necessities.
Cloud educator: These are institutions and individuals who provide training materials and educate others about Cloud Computing.
Cloud learner: These categories include students, developers, or every person who’s interested
in learning about Cloud Computing.
Cloud Computing provides following benefits to the purchasers.
❑ Reduced value: Cost is a clear gain of Cloud Computing. Cloud make use of a Cloud issuer or adopting Cloud paradigms internally, agencies can store operational and maintenance budgets.
❑ Adaptability: Adaptability benefits infer from fast provisioning of modern capacity and fast movement or relocation of workloads. In open segment settings, Cloud Computing gives deftness in terms of obtainment and procurement prepare and timelines.
❑ Improved computerization: Cloud Computing is based on the technique that administrations cannot as it were being provisioned, but too de-provisioned in a profoundly computerized mold and which offers critical efficiencies to enterprises.
❑ Focus on center competency: Government offices can procure the benefits of Cloud Computing in arrange to center on its center mission and center goals and use IT assets as an implies to supply administrations to citizens.
❑ Sustainability: The destitute vitality proficiency of most existing information centers, due to destitute plan or destitute resource utilization, is presently caught on to be ecologically
and financially unsustainable. Through leveraging economies of scale and the capacity to oversee resources more proficiently, Cloud Computing devours distant less vitality and other assets than a conventional IT information center.
1.3 CHALLENGES OF CLOUD COMPUTING
Life itself is the fusion of light and shadow. Like every uprising technology Cloud Computing has still got obstacles on its path that have to be overcome. This is especially true for enterprise applications. Subsequently we show some major obstacles of current Cloud Computing from a business perspective and present corresponding solution opportunities.
Availability of service: Especially for enterprises, availability of certain applications is business critical. Therefore, they still shrink from trusting Cloud providers with hosting critical software. A possible solution would be to use multiple Cloud providers to provide business continuity and utilize Cloud-elasticity to defend against DDOS attacks.
Data lock-in: Many businesses fear that choosing a certain Cloud provider also means losing a certain degree of freedom as their data gets locked in. If APIs of different providers where built on an industry standard, entry threshold would definitely be lower.
Data confidentiality and auditability: Another important issue is confidentiality in the Cloud. Even if the provider is trustworthy it is still unclear on which server data is located and which legislation is applied. A possible work-around would be to deploy encryption, VLANs and firewalls. A really clean solution would store data geographically according to legal requirements.
Data transfer bottlenecks: Only because high-speed broadband Internet is available in some regions, this does not necessarily mean that each branch can fall back on the same infrastructure quality. In the era of Cloud Computing enterprises have to balance which data to move entirely into the Cloud and where other solutions
Enjoying the preview?
Page 1 of 1