Home > Computing and Information Technology > Computer science > Artificial intelligence > AI-Based Advanced Optimization Techniques for Edge Computing
14%
AI-Based Advanced Optimization Techniques for Edge Computing

AI-Based Advanced Optimization Techniques for Edge Computing

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

The book offers cutting-edge insights into AI-driven optimization algorithms and their crucial role in enhancing real-time applications within fog and Edge IoT networks and addresses current challenges and future opportunities in this rapidly evolving field. This book focuses on artificial intelligence-induced adaptive optimization algorithms in fog and Edge IoT networks. Artificial intelligence, fog, and edge computing, together with IoT, are the next generation of paradigms offering services to people to improve existing services for real-time applications. Over the past few years, there has been rigorous growth in AI-based optimization algorithms and Edge and IoT paradigms. However, despite several applications and advancements, there are still some limitations and challenges to address including security, adaptive, complex, and heterogeneous IoT networks, protocols, intelligent offloading decisions, latency, energy consumption, service allocation, and network lifetime. This volume aims to encourage industry professionals to initiate a set of architectural strategies to solve open research computation challenges. The authors achieve this by defining and exploring emerging trends in advanced optimization algorithms, AI techniques, and fog and Edge technologies for IoT applications. Solutions are also proposed to reduce the latency of real-time applications and improve other quality of service parameters using adaptive optimization algorithms in fog and Edge paradigms. The book provides information on the full potential of IoT-based intelligent computing paradigms for the development of suitable conceptual and technological solutions using adaptive optimization techniques when faced with challenges. Additionally, it presents in-depth discussions in emerging interdisciplinary themes and applications reflecting the advancements in optimization algorithms and their usage in computing paradigms. Audience Researchers, industrial engineers, and graduate/post-graduate students in software engineering, computer science, electronic and electrical engineering, data analysts, and security professionals working in the fields of intelligent computing paradigms and similar areas.

Table of Contents:
Preface xv Acknowledgement xvii 1 Navigating Next-Generation Network Architecture: Unleashing the Power of SDN, NFV, NS, and AI Convergence 1 Monika Dubey, Snehlata, Ashutosh Kumar Singh, Richa Mishra and Mohit Kumar 1.1 Introduction 2 1.2 Revolutionizing Infrastructure with SDN, NFV, and NS 4 1.2.1 SDN: Definition and Architecture 6 1.2.2 NFV: Definition and Architecture 9 1.2.3 NS: Conceptual Abstractions 11 1.3 Realizing NS Potential with SDN and NFV 13 1.4 Artificial Intelligence: Pivotal Role in Networking Transformation 15 1.4.1 Supervised Learning 16 1.4.2 Unsupervised Learning 18 1.4.3 Reinforcement Learning 18 1.4.4 Deep Learning 21 1.5 Navigating Challenges and Solutions 23 1.5.1 Performance Issues in Network Structure 23 1.5.2 Management and Orchestration Issues 24 1.5.3 Security and Privacy 24 1.5.4 New Business Models 25 1.6 Conclusion 26 Disclosure Statement 26 References 26 2 OctoEdge: An Octopus-Inspired Adaptive Edge Computing Architecture 35 Sashi Tarun 2.1 Introduction 36 2.1.1 Edge Computing as Resource Manager 36 2.1.2 Edge Computing Hurdles 37 2.1.3 Edge Computing and the Need for Adaptability 38 2.2 Problem Statement 39 2.3 Motivations 40 2.4 Related Work 41 2.5 OctoEdge Proposed Architecture 45 2.5.1 OctoEdge Working Principles 48 2.5.2 Benefits of OctoEdge 49 2.6 OctoEdge Architecture Functional Components 53 2.7 Results and Discussion 59 2.8 OctoEdge Architecture: Scope and Scientific Merits 60 2.9 Use Cases and Applications 64 2.10 Challenges and Future Directions 68 2.11 Conclusion 68 References 69 3 Development of Optimized Machine Learning Oriented Models 71 Ratnesh Kumar Dubey, Dilip Kumar Choubey and Shubha Mishra 3.1 Introduction 72 3.1.1 NSL-KDD Dataset 75 3.2 Literature Review 76 3.3 Problem Definition 78 3.4 Proposed Work 80 3.4.1 Machine Learning 82 3.5 Experimental Analysis 86 3.6 Conclusion 90 3.7 Future Scope 91 References 91 4 Leveraging Multimodal Data and Deep Learning for Enhanced Stock Market Prediction 93 Pinky Gangwani and Vikas Panthi 4.1 Introduction 94 4.1.1 Motivation and Contribution 96 4.1.2 Rationale for Selecting the Methods 98 4.2 Literature Review 100 4.3 Proposed Design of an Efficient Model that Leverages Multimodal Data and Deep Learning for Enhanced Stock Market Prediction 107 4.3.1 Discussion on Selection Criteria 114 4.4 Statistical Analysis and Comparison 116 4.5 Acknowledging Limitations and Potential Challenges 122 4.6 Mitigation Strategies and Future Directions 123 4.7 Conclusion 124 4.8 Future Scope 125 References 125 5 Context Dependent Sentiments Analysis Using Machine Learning 129 Mahima Shanker Pandey, Bihari Nandan Pandey, Abhishek Singh, Ashish Kumar Mishra and Brijesh Pandey 5.1 Introduction 130 5.1.1 Motivation 131 5.2 Literature Review 131 5.2.1 Text Sentiment 132 5.2.2 Audio Sentiment 132 5.2.3 Video Sentiment 133 5.3 Methodology 135 5.3.1 System Architecture 135 5.4 Proposed Model 137 5.4.1 Proposed Algorithm 137 5.4.2 Data Set Sources 138 5.4.3 Text Sentiment 140 5.4.4 Audio Sentiment 141 5.4.5 Video Sentiment 142 5.5 Implementations and Results 142 5.5.1 Results 142 5.5.2 Text Sentiment 143 5.5.3 Audio Sentiment 144 5.5.4 Video Sentiment 146 5.5.5 Applications 149 5.6 Conclusion 149 References 150 6 Thyroid Cancer Prediction Using Optimizations 153 Swati Sharma, Vijay Kumar Sharma, Punit Mittal, Pradeep Pant and Nitin Rakesh 6.1 Introduction 154 6.2 Background and Related Work 155 6.3 Proposed Methodology 160 6.4 Architecture 165 6.5 Materials and Methods 169 6.6 Results and Discussion 171 6.7 Conclusion 175 References 177 7 An LSTM-Oriented Approach for Next Word Prediction Using Deep Learning 181 Nidhi Shukla, Ashutosh Kumar Singh, Vijay Kumar Dwivedi, Pallavi Shukla, Jeetesh Srivastava and Vivek Srivastava 7.1 Introduction 182 7.2 Related Work 184 7.3 Design and Implementation 186 7.3.1 Background 186 7.4 Proposed Model Architecture 190 7.4.1 Experimental Setup 192 7.4.2 Dataset Specification 192 7.5 Results and Discussions 193 7.6 Conclusion 198 References 199 8 Churn Prediction in Social Networks Using Modified BiLSTM-CNN Model 203 Himanshu Rai and Jyoti Kesarwani 8.1 Introduction 204 8.2 Customer Behavior in Social Networks 209 8.3 Proposed Methodology 218 8.3.1 Churn Dataset Acquisition 218 8.3.2 Data Preprocessing 220 8.3.3 Proposed Model 220 8.4 Result 221 8.5 Conclusion 225 References 226 9 Fog Computing Security Concerns in Healthcare Using IoT and Blockchain 231 Ruchi Mittal, Shikha Gupta and Shefali Arora 9.1 Introduction 232 9.1.1 Types of Security Concerns in Healthcare 236 9.2 Related Work 239 9.3 Open Questions and Research Challenges 241 9.4 Problem Definition 242 9.5 Objectives 242 9.6 Research Methodology 243 9.6.1 The Three-Tier Blockchain Design 243 9.6.2 System Architecture 243 9.6.3 Workflow in Different Scenarios 245 9.7 Conclusion and Future Work 249 References 249 10 Smart Agriculture Revolution: Cloud and IoT-Based Solutions for Sustainable Crop Management and Precision Farming 253 Shrawan Kumar Sharma 10.1 Introduction 255 10.1.1 IoT in Agriculture 257 10.1.2 Cloud Computing in Agriculture 259 10.1.3 Precision Farming 263 10.1.4 Sustainable Agricultural and Remote Sensing 265 10.2 Data Analytics and Decision Support 267 10.2.1 Remote Monitoring 269 10.3 Challenges and Solutions Smart Agriculture 270 10.3.1 (AI) Approach in Agriculture and Needs 270 10.3.2 Needs of AI Farm 273 10.3.3 Role of AI in Agriculture 274 10.4 AI for Soybean (Glycine max) Crop 275 10.4.1 Soybean Disease Image Acquisition and Pretreatment 276 10.5 Result Discussion 281 10.5.1 Emerging Trends and Technologies in Smart Agriculture 281 10.6 Conclusion 283 References 285 11 Greedy Particle Swarm Optimization Approach Using Leaky ReLU Function for Minimum Spanning Tree Problem 289 Ashish Kumar Singh and Anoj Kumar 11.1 Introduction 290 11.1.1 Goal 291 11.1.2 Research Contribution are Below Listed 292 11.2 Background 292 11.2.1 Minimum Spanning Tree 294 11.2.2 Particle Swarm Optimization 296 11.2.3 Firefly Algorithm 297 11.2.4 Leaky ReLU Activation Function 298 11.3 Population-Based Proposed Optimization Approach 298 11.3.1 Motivation 299 11.3.2 Greedy Particle Swarm Optimization Using Leaky ReLU (LR-GPSO) 300 11.4 Experimental Setup and Result Analysis of Proposed Work (LR-GPSO) 307 11.4.1 Complexity 307 11.4.2 Simulation Experiments 308 11.4.3 Convergence Curve 311 11.5 Conclusion and Future Work 313 References 314 12 SDN Deployed Secure Application Design Framework for IoT Using Game Theory 317 Madhukrishna Priyadarsini and Padmalochan Bera 12.1 Introduction 318 12.1.1 IoT Overview 318 12.1.2 SDN Overview 319 12.1.3 Game Theory Overview 321 12.2 Background Study 322 12.2.1 IoT Security Using SDN 322 12.2.2 IoT Security Using Game Theory 323 12.3 SDN-Deployed Design Framework for IoT Using Game-Theoretic Solutions 324 12.3.1 Trust Verification 324 12.4 Case Study: SDN Deployed Design Framework in Robot Manufacturing Industry 334 12.4.1 Working Procedure of a Robot Manufacturing Industry 334 12.4.2 Integration of SDN-Deployed Design Framework in Robot Manufacturing Industry 335 12.4.3 Experimental Results 336 12.5 Discussion 338 12.6 Conclusion 339 References 339 13 Framework for PLM in Industry 4.0 Based on Industrial Blockchain 341 Ali Zaheer Agha, Rajesh Kumar Shukla, Ratnesh Mishra and Ravi Shankar Shukla 13.1 Introduction 342 13.1.1 What is Blockchain? 343 13.1.2 Blockchain Technology’s Integration with Industry 4.0 343 13.1.3 Blockchain Applications in Industry 4.0 343 13.1.4 A Consensus Algorithm 344 13.1.5 Product Lifecycle Management 345 13.1.6 Benefits of Smart Contracts in Addressing PLM Challenges 347 13.2 Related Work 348 13.2.1 Product Lifecycle Management 349 13.2.2 Industrial Blockchain 351 13.2.3 The On-Chain vs. Off-Chain Principle 353 13.3 The Recommended Architecture’s Methodology 354 13.3.1 The Suggested Platform’s Architecture 354 13.3.2 The Suggested Platform’s Technological Solution 358 13.4 Key Services That are Suggested 360 13.4.1 A Co-Creation Service Enabled by Blockchain 360 13.4.2 Blockchain-Enabled QAT2 Service 363 13.4.3 Proactive Upkeep Service Facilitated by Blockchain 364 13.4.4 Smart Recycling Program Driven by Blockchain 365 13.5 Modelling and Assessment 366 13.5.1 Overview of the Investigation 366 13.5.2 Experimental Evaluation and Comparison 368 13.5.3 Discussion 372 13.6 Conclusion and Future Work 373 A Statement of Competing Interests 374 References 375 14 Machine Learning Enabled Smart Agriculture Classification Technique for Edge Devices Using Remote Sensing Platform 381 Priyanka Gupta, Suraj Kumar Singh, Neetish Kumar and Bhavna Thakur List of Abbreviations 382 14.1 Introduction 382 14.2 Related Works 384 14.3 Methods and Dataset 386 14.3.1 Research Area and Dataset 386 14.3.2 Pre-Processing and Image Dataset 387 14.3.3 Classifiers 390 14.4 Proposed Algorithm 391 14.5 Results and Discussions 392 14.5.1 Classified Crop Map 394 14.6 Conclusion 395 References 396 15 A Lightweight Intelligent Detection Approach for Interest Flooding Attack 401 Naveen Kumar, Brijendra Pratap Singh and Rohit 15.1 Introduction 402 15.2 NDN Background 405 15.2.1 NDN Architecture 405 15.2.2 NDN Security 408 15.3 Related Work 409 15.4 IFA Feature Selection and Detection 411 15.4.1 IFA Modelling 412 15.4.2 Data Collection 413 15.4.3 Balancing the Dataset 414 15.4.4 Feature Selection 415 15.4.5 Dimensionality Reduction 421 15.4.6 Classification 424 15.5 Conclusion 428 References 429 16 An Internet of Vehicles Model Architecture with Seven Layers 433 Sujata Negi Thakur, Manisha Koranga, Sandeep Abhishek, Richa Pandey and Mayurika Joshi 16.1 Introduction 434 16.2 Literature Review 435 16.3 Proposed Architecture of Internet of Vehicles 439 16.4 Applications, Characteristics, and Challenges of the Internet of Vehicles (IoV) 451 Conclusion 455 References 455 Index 457


Best Sellers


Product Details
  • ISBN-13: 9781394287031
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-Scrivener
  • Language: English
  • Returnable: N
  • Weight: 871 gr
  • ISBN-10: 1394287038
  • Publisher Date: 21 Jul 2025
  • Binding: Hardback
  • No of Pages: 480
  • Returnable: Y


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
AI-Based Advanced Optimization Techniques for Edge Computing
John Wiley & Sons Inc -
AI-Based Advanced Optimization Techniques for Edge Computing
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

AI-Based Advanced Optimization Techniques for Edge Computing

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA