close menu
Bookswagon-24x7 online bookstore
close menu
My Account
10%
AI-Based Advanced Optimization Techniques for Edge Computing

AI-Based Advanced Optimization Techniques for Edge Computing

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

The book offers cutting-edge insights into AI-driven optimization algorithms and their crucial role in enhancing real-time applications within fog and Edge IoT networks and addresses current challenges and future opportunities in this rapidly evolving field.

This book focuses on artificial intelligence-induced adaptive optimization algorithms in fog and Edge IoT networks. Artificial intelligence, fog, and edge computing, together with IoT, are the next generation of paradigms offering services to people to improve existing services for real-time applications. Over the past few years, there has been rigorous growth in AI-based optimization algorithms and Edge and IoT paradigms. However, despite several applications and advancements, there are still some limitations and challenges to address including security, adaptive, complex, and heterogeneous IoT networks, protocols, intelligent offloading decisions, latency, energy consumption, service allocation, and network lifetime.

This volume aims to encourage industry professionals to initiate a set of architectural strategies to solve open research computation challenges. The authors achieve this by defining and exploring emerging trends in advanced optimization algorithms, AI techniques, and fog and Edge technologies for IoT applications. Solutions are also proposed to reduce the latency of real-time applications and improve other quality of service parameters using adaptive optimization algorithms in fog and Edge paradigms.

The book provides information on the full potential of IoT-based intelligent computing paradigms for the development of suitable conceptual and technological solutions using adaptive optimization techniques when faced with challenges. Additionally, it presents in-depth discussions in emerging interdisciplinary themes and applications reflecting the advancements in optimization algorithms and their usage in computing paradigms.

Audience

Researchers, industrial engineers, and graduate/post-graduate students in software engineering, computer science, electronic and electrical engineering, data analysts, and security professionals working in the fields of intelligent computing paradigms and similar areas.



Table of Contents:

Preface xv

Acknowledgement xvii

1 Navigating Next-Generation Network Architecture: Unleashing the Power of SDN, NFV, NS, and AI Convergence 1
Monika Dubey, Snehlata, Ashutosh Kumar Singh, Richa Mishra and Mohit Kumar

1.1 Introduction 2

1.2 Revolutionizing Infrastructure with SDN, NFV, and NS 4

1.2.1 SDN: Definition and Architecture 6

1.2.2 NFV: Definition and Architecture 9

1.2.3 NS: Conceptual Abstractions 11

1.3 Realizing NS Potential with SDN and NFV 13

1.4 Artificial Intelligence: Pivotal Role in Networking Transformation 15

1.4.1 Supervised Learning 16

1.4.2 Unsupervised Learning 18

1.4.3 Reinforcement Learning 18

1.4.4 Deep Learning 21

1.5 Navigating Challenges and Solutions 23

1.5.1 Performance Issues in Network Structure 23

1.5.2 Management and Orchestration Issues 24

1.5.3 Security and Privacy 24

1.5.4 New Business Models 25

1.6 Conclusion 26

Disclosure Statement 26

References 26

2 OctoEdge: An Octopus-Inspired Adaptive Edge Computing Architecture 35
Sashi Tarun

2.1 Introduction 36

2.1.1 Edge Computing as Resource Manager 36

2.1.2 Edge Computing Hurdles 37

2.1.3 Edge Computing and the Need for Adaptability 38

2.2 Problem Statement 39

2.3 Motivations 40

2.4 Related Work 41

2.5 OctoEdge Proposed Architecture 45

2.5.1 OctoEdge Working Principles 48

2.5.2 Benefits of OctoEdge 49

2.6 OctoEdge Architecture Functional Components 53

2.7 Results and Discussion 59

2.8 OctoEdge Architecture: Scope and Scientific Merits 60

2.9 Use Cases and Applications 64

2.10 Challenges and Future Directions 68

2.11 Conclusion 68

References 69

3 Development of Optimized Machine Learning Oriented Models 71
Ratnesh Kumar Dubey, Dilip Kumar Choubey and Shubha Mishra

3.1 Introduction 72

3.1.1 NSL-KDD Dataset 75

3.2 Literature Review 76

3.3 Problem Definition 78

3.4 Proposed Work 80

3.4.1 Machine Learning 82

3.5 Experimental Analysis 86

3.6 Conclusion 90

3.7 Future Scope 91

References 91

4 Leveraging Multimodal Data and Deep Learning for Enhanced Stock Market Prediction 93
Pinky Gangwani and Vikas Panthi

4.1 Introduction 94

4.1.1 Motivation and Contribution 96

4.1.2 Rationale for Selecting the Methods 98

4.2 Literature Review 100

4.3 Proposed Design of an Efficient Model that Leverages Multimodal Data and Deep Learning for Enhanced Stock Market Prediction 107

4.3.1 Discussion on Selection Criteria 114

4.4 Statistical Analysis and Comparison 116

4.5 Acknowledging Limitations and Potential Challenges 122

4.6 Mitigation Strategies and Future Directions 123

4.7 Conclusion 124

4.8 Future Scope 125

References 125

5 Context Dependent Sentiments Analysis Using Machine Learning 129
Mahima Shanker Pandey, Bihari Nandan Pandey, Abhishek Singh, Ashish Kumar Mishra and Brijesh Pandey

5.1 Introduction 130

5.1.1 Motivation 131

5.2 Literature Review 131

5.2.1 Text Sentiment 132

5.2.2 Audio Sentiment 132

5.2.3 Video Sentiment 133

5.3 Methodology 135

5.3.1 System Architecture 135

5.4 Proposed Model 137

5.4.1 Proposed Algorithm 137

5.4.2 Data Set Sources 138

5.4.3 Text Sentiment 140

5.4.4 Audio Sentiment 141

5.4.5 Video Sentiment 142

5.5 Implementations and Results 142

5.5.1 Results 142

5.5.2 Text Sentiment 143

5.5.3 Audio Sentiment 144

5.5.4 Video Sentiment 146

5.5.5 Applications 149

5.6 Conclusion 149

References 150

6 Thyroid Cancer Prediction Using Optimizations 153
Swati Sharma, Vijay Kumar Sharma, Punit Mittal, Pradeep Pant and Nitin Rakesh

6.1 Introduction 154

6.2 Background and Related Work 155

6.3 Proposed Methodology 160

6.4 Architecture 165

6.5 Materials and Methods 169

6.6 Results and Discussion 171

6.7 Conclusion 175

References 177

7 An LSTM-Oriented Approach for Next Word Prediction Using Deep Learning 181
Nidhi Shukla, Ashutosh Kumar Singh, Vijay Kumar Dwivedi, Pallavi Shukla, Jeetesh Srivastava and Vivek Srivastava

7.1 Introduction 182

7.2 Related Work 184

7.3 Design and Implementation 186

7.3.1 Background 186

7.4 Proposed Model Architecture 190

7.4.1 Experimental Setup 192

7.4.2 Dataset Specification 192

7.5 Results and Discussions 193

7.6 Conclusion 198

References 199

8 Churn Prediction in Social Networks Using Modified BiLSTM-CNN Model 203
Himanshu Rai and Jyoti Kesarwani

8.1 Introduction 204

8.2 Customer Behavior in Social Networks 209

8.3 Proposed Methodology 218

8.3.1 Churn Dataset Acquisition 218

8.3.2 Data Preprocessing 220

8.3.3 Proposed Model 220

8.4 Result 221

8.5 Conclusion 225

References 226

9 Fog Computing Security Concerns in Healthcare Using IoT and Blockchain 231
Ruchi Mittal, Shikha Gupta and Shefali Arora

9.1 Introduction 232

9.1.1 Types of Security Concerns in Healthcare 236

9.2 Related Work 239

9.3 Open Questions and Research Challenges 241

9.4 Problem Definition 242

9.5 Objectives 242

9.6 Research Methodology 243

9.6.1 The Three-Tier Blockchain Design 243

9.6.2 System Architecture 243

9.6.3 Workflow in Different Scenarios 245

9.7 Conclusion and Future Work 249

References 249

10 Smart Agriculture Revolution: Cloud and IoT-Based Solutions for Sustainable Crop Management and Precision Farming 253
Shrawan Kumar Sharma

10.1 Introduction 255

10.1.1 IoT in Agriculture 257

10.1.2 Cloud Computing in Agriculture 259

10.1.3 Precision Farming 263

10.1.4 Sustainable Agricultural and Remote Sensing 265

10.2 Data Analytics and Decision Support 267

10.2.1 Remote Monitoring 269

10.3 Challenges and Solutions Smart Agriculture 270

10.3.1 (AI) Approach in Agriculture and Needs 270

10.3.2 Needs of AI Farm 273

10.3.3 Role of AI in Agriculture 274

10.4 AI for Soybean (Glycine max) Crop 275

10.4.1 Soybean Disease Image Acquisition and Pretreatment 276

10.5 Result Discussion 281

10.5.1 Emerging Trends and Technologies in Smart Agriculture 281

10.6 Conclusion 283

References 285

11 Greedy Particle Swarm Optimization Approach Using Leaky ReLU Function for Minimum Spanning Tree Problem 289
Ashish Kumar Singh and Anoj Kumar

11.1 Introduction 290

11.1.1 Goal 291

11.1.2 Research Contribution are Below Listed 292

11.2 Background 292

11.2.1 Minimum Spanning Tree 294

11.2.2 Particle Swarm Optimization 296

11.2.3 Firefly Algorithm 297

11.2.4 Leaky ReLU Activation Function 298

11.3 Population-Based Proposed Optimization Approach 298

11.3.1 Motivation 299

11.3.2 Greedy Particle Swarm Optimization Using Leaky ReLU (LR-GPSO) 300

11.4 Experimental Setup and Result Analysis of Proposed Work (LR-GPSO) 307

11.4.1 Complexity 307

11.4.2 Simulation Experiments 308

11.4.3 Convergence Curve 311

11.5 Conclusion and Future Work 313

References 314

12 SDN Deployed Secure Application Design Framework for IoT Using Game Theory 317
Madhukrishna Priyadarsini and Padmalochan Bera

12.1 Introduction 318

12.1.1 IoT Overview 318

12.1.2 SDN Overview 319

12.1.3 Game Theory Overview 321

12.2 Background Study 322

12.2.1 IoT Security Using SDN 322

12.2.2 IoT Security Using Game Theory 323

12.3 SDN-Deployed Design Framework for IoT Using Game-Theoretic Solutions 324

12.3.1 Trust Verification 324

12.4 Case Study: SDN Deployed Design Framework in Robot Manufacturing Industry 334

12.4.1 Working Procedure of a Robot Manufacturing Industry 334

12.4.2 Integration of SDN-Deployed Design Framework in Robot Manufacturing Industry 335

12.4.3 Experimental Results 336

12.5 Discussion 338

12.6 Conclusion 339

References 339

13 Framework for PLM in Industry 4.0 Based on Industrial Blockchain 341
Ali Zaheer Agha, Rajesh Kumar Shukla, Ratnesh Mishra and Ravi Shankar Shukla

13.1 Introduction 342

13.1.1 What is Blockchain? 343

13.1.2 Blockchain Technology’s Integration with Industry 4.0 343

13.1.3 Blockchain Applications in Industry 4.0 343

13.1.4 A Consensus Algorithm 344

13.1.5 Product Lifecycle Management 345

13.1.6 Benefits of Smart Contracts in Addressing PLM Challenges 347

13.2 Related Work 348

13.2.1 Product Lifecycle Management 349

13.2.2 Industrial Blockchain 351

13.2.3 The On-Chain vs. Off-Chain Principle 353

13.3 The Recommended Architecture’s Methodology 354

13.3.1 The Suggested Platform’s Architecture 354

13.3.2 The Suggested Platform’s Technological Solution 358

13.4 Key Services That are Suggested 360

13.4.1 A Co-Creation Service Enabled by Blockchain 360

13.4.2 Blockchain-Enabled QAT2 Service 363

13.4.3 Proactive Upkeep Service Facilitated by Blockchain 364

13.4.4 Smart Recycling Program Driven by Blockchain 365

13.5 Modelling and Assessment 366

13.5.1 Overview of the Investigation 366

13.5.2 Experimental Evaluation and Comparison 368

13.5.3 Discussion 372

13.6 Conclusion and Future Work 373

A Statement of Competing Interests 374

References 375

14 Machine Learning Enabled Smart Agriculture Classification Technique for Edge Devices Using Remote Sensing Platform 381
Priyanka Gupta, Suraj Kumar Singh, Neetish Kumar and Bhavna Thakur

List of Abbreviations 382

14.1 Introduction 382

14.2 Related Works 384

14.3 Methods and Dataset 386

14.3.1 Research Area and Dataset 386

14.3.2 Pre-Processing and Image Dataset 387

14.3.3 Classifiers 390

14.4 Proposed Algorithm 391

14.5 Results and Discussions 392

14.5.1 Classified Crop Map 394

14.6 Conclusion 395

References 396

15 A Lightweight Intelligent Detection Approach for Interest Flooding Attack 401
Naveen Kumar, Brijendra Pratap Singh and Rohit

15.1 Introduction 402

15.2 NDN Background 405

15.2.1 NDN Architecture 405

15.2.2 NDN Security 408

15.3 Related Work 409

15.4 IFA Feature Selection and Detection 411

15.4.1 IFA Modelling 412

15.4.2 Data Collection 413

15.4.3 Balancing the Dataset 414

15.4.4 Feature Selection 415

15.4.5 Dimensionality Reduction 421

15.4.6 Classification 424

15.5 Conclusion 428

References 429

16 An Internet of Vehicles Model Architecture with Seven Layers 433
Sujata Negi Thakur, Manisha Koranga, Sandeep Abhishek, Richa Pandey and Mayurika Joshi

16.1 Introduction 434

16.2 Literature Review 435

16.3 Proposed Architecture of Internet of Vehicles 439

16.4 Applications, Characteristics, and Challenges of the Internet of Vehicles (IoV) 451

Conclusion 455

References 455

Index 457


Best Seller

| | See All

Product Details
  • ISBN-13: 9781394287031
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-Scrivener
  • Language: English
  • Returnable: N
  • Weight: 871 gr
  • ISBN-10: 1394287038
  • Publisher Date: 21 Jul 2025
  • Binding: Hardback
  • No of Pages: 480
  • Returnable: Y


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Be The First to Review
AI-Based Advanced Optimization Techniques for Edge Computing
John Wiley & Sons Inc -
AI-Based Advanced Optimization Techniques for Edge Computing
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

AI-Based Advanced Optimization Techniques for Edge Computing

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    | | See All


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA