Artificial Intelligence and Natural Algorithms -  - E-Book

Artificial Intelligence and Natural Algorithms E-Book

0,0
81,54 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

This book informs the reader about applications of ArtificialIntelligence (AI) and nature-inspired algorithms in different situations. Eachchapter in this book is written by topic experts on AI, nature-inspired algorithmsand data science. Chapters are structured to provide an introduction to the topic, the computational methodology required for experimentation and analysis, and a discussion of results results The basic concepts relevant to these topics are explained, includingevolutionary computing (EC), artificial neural networks (ANN), swarmintelligence (SI), and fuzzy systems (FS). Additionally, the book also covers optimizationalgorithms for data analysis. The contents include algorithms that can be used in systems designedfor plant science research, environmental analysis, computer vision andhealthcare. There are a variety of use cases highlighted in the book that demonstrate how computer algorithms can be used to simulate and understand natural phenomena, such as moving object detection, COVID-19 detection, genetic diversity, physiology and much more. Additionally, the contributors provide useful tips specific to some algorithsm such as load balancing techniques and fuzzy PID controls. The goal of the book is to equip the reader – students and data analysts– with the information needed to apply basic AI algorithms to resolve actualproblems encountered in a professional environment.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 515

Veröffentlichungsjahr: 2003

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents
BENTHAM SCIENCE PUBLISHERS LTD.
End User License Agreement (for non-institutional, personal use)
Usage Rules:
Disclaimer:
Limitation of Liability:
General:
PREFACE
List of Contributors
Data Computation: Awareness, Architecture and Applications
Abstract
INTRODUCTION
SURVEY STRATEGIES
Big Data
Cloud Computing
Pervasive Computing
Reconfigurable Computing
Green Computing
EMBEDDED COMPUTING
Parallel Computing
Fog Computing
Internet of Things and Computing Technology
Blockchain
NGS-Throughput
Digital Image Processing
E-commerce
Healthcare Informatics and Clinical Research
SURVEY OUTCOMES
DATA COMPUTING CHALLENGES
RELIABLE INDUSTRY 4.0 BASED ON MACHINE LEARNING AND IOT FOR ANALYZING
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Different Techniques of Data Fusion in Internet of Things (IoT)
Abstract
INTRODUCTION
Accumulating and Sending Information
Receiving and Acting on Information
Doing Both
Key Challenges of IoT
DATA FUSION ARCHTECHTURE
Centralized Fusion Architecture
Distributed Fusion Architecture
Hybrid Fusion Architecture
LITERATURE REVIEW
MULTI-SENSOR DATA FUSION
Fuzzy Logic-Based Data Fusion
Bayesian-based Technique
Markov Process-based Technique
Demspter-Shafer Theory Based Technique
Thresholding Techniques and Others
APPLICATION OF IOT
Smart Environment
Health Care
IoT in Agriculture
Associated Industry
Smart Retail
Smart Energy and Smart Grid
Traffic Monitoring
Smart Parking
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Role of Artificial Intelligence in Medicine and Health Care
Abstract
INTRODUCTION
RECENT APPLICATIONS OF AI IN MEDICINE AND HEALTH CARE
Diagnosis of Disease and Prediction
In Reduction of Complications
Taking Care of Patients Under Treatment
In Assisting to Improve the Success Ratio of Treatment
Living Assistance
Biomedical Information Processing
AI in Biomedical Research
AI in Medical Imaging
LATEST AI TECHNIQUES IN MEDICAL SCIENCES
EFFECTS OF USAGE OF AI TECHNIQUES
Fast and Accurate Diagnostics Reduce the Mortality Rate
Reduce Errors Related to Human Fatigue
Decrease in Medical Cost
AREA OF CONCERNS
Care of Old Age People
Replacement of Humans with AI Techniques
Data Collection and its Security
RECENTLY USED AI-BASED MEDICAL TOOLS
CONCLUSION
CONSENT OF PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Threat Detection and Reporting System
Abstract
INTRODUCTION
RELATED WORK
PROPOSED METHOD
Weapon Detection
Violence Detection
Medical Emergency Detection
DATASET & PSEUDOCODE
PSEUDOCODE
CONCLUSION
Current & Future Developments
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Offbeat Load Balancing Machine Learning based Algorithm for Job Scheduling
Abstract
INTRODUCTION
RELATED WORK
PROPOSED WORK
HYBRID APPROACH
PRODUCE POPULATION (PP)
FITNESS FUNCTION (FF)
NATIVE PREEMINENT (NP)
CROSSWAY
UPDATE GLOBAL PREEMINENT
RANDOM FOREST TRAINING
PROPOSED TRAINING ALGORITHM
PROCEDURE
PROPOSED ALGORITHM
IMPROVED GENETIC ALGORITHM WITH HYBRID ALGORITHM (HA (GA, KMC and RF))
LOAD BALANCING UNDER CLOUD COMPUTING ENVIRONMENT
RELEVANT OPERATIONS OF GA
SIMULATION RESULT ANALYSIS
RESULT ANALYSIS
Conclusion and Future Work
FUTURE SCOPE
CONSENT OF PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
A Pattern Optimization for Novel Class in Multi-Class Miner for Stream Data Classification
Abstract
INTRODUCTION
RELATED WORK FOR STREAM CLASSIFICATION
PROPOSED ALGORITHM FOR PATTERN CLASSIFICATION IN MCM
RESULT ANALYSIS
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Artificial Intelligence in Healthcare: on the Verge of Major Shift with Opportunities and Challenges
Abstract
INTRODUCTION
Why AI in Healthcare
AI Techniques in Healthcare
Machine Learning
Support Vector Machine
Neural Network
Deep Learning
Natural Language Processing
Opportunity and its Impact
Diagnosis
Therapy
Drug Development and Research
Rehabilitation of Elderly
The Future
Challenges and Limitations
Digitization of Clinical Data
Privacy and Security
Role of Stakeholder
Facing the Causality
Black Box Issue
CONCLUSION
CONSENT OF PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
A Review on Automatic Plant Species Recognition System by Leaf Image Using Machine Learning in Indian Ecological System
Abstract
INTRODUCTION
IMAGE PROCESSING
A Typical Image-Based Plant Identification System (SATTI Et Al., 2013)
Image Acquisition
Pre-processing
Feature Extraction
Color Features
Shape Features
A). Geometric Features
B). Morphological Features
C). Tooth Features
INDIAN PLANTS IMAGE DATA SETS
MACHINE LEARNING TECHNIQUES FOR LEAF RECOGNITION
DEVELOPMENTS OF AUTOMATIC SYSTEMS/MOBILE APPS FOR LEAF RECOGNITION
Plantifier
Garden
PlantNet
iNaturalist
KEY ATTRIBUTES
FlowerChecker
Agrobase
LEAF RECOGNITION APP
Methodology
Integration of the Front-End with the Backend
Description
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Recognizing Rice Leaves Disorders by Applying Deep Learning
Abstract
INTRODUCTION
PADDY DISEASES
DEEP LEARNING (DL)
Pretrained Neural Network (PNN)
CONCLUDING REMARKS
CONSENT OF PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Shallow Cloud Classification using Deep Learning and Image Segmentation
Abstract
INTRODUCTION
What are Shallow Clouds?
Why is it Important to Study Shallow Clouds?
Motivation for an Automated System for Cloud Classification
Benefits
RELATED WORK
PROPOSED METHODOLOGY
Data Preprocessing
Data Analysis
Model Used
UNet
Idea Behind UNet
Architecture UNet
UNet on ResNet34 Backbone: Residual Network
Residual Blocks
Architecture
Cross Entropy
Dice Loss
RAdam Optima
Evaluation Metric
DATA SET
EXPERIMENTAL ANALYSIS
Exploratory Data Analysis
Data Augmentation
Visualization of Mask
Training
Results
Predicted Segments
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Artificial Intelligence Based Lung Disease Classification By Using Evolutionary Deep Learning Paradigm
Abstract
INTRODUCTION
RELATED WORK
METHODOLOGY
Collection of Datasets
Deep Learning Algorithm
Transfer Learning
Image Preprocessing and Features
Training of CNN Model
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Hybrid Deep Learning Model for Sleep Disorders Detection
Abstract
INTRODUCTION
RELATED WORK
PROPOSED WORK
CONVOLUTIONAL NEURAL NETWORK
DEEP BELIEF NETWORK
SYSTEM ARCHITECTURE
DATA-SET
Algorithm
RESULT ANALYSIS
CONCLUDING REMARKS
FUTURE SCOPE
CONSENT OF PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Identification of Covid-19 Positive Cases Using Deep Learning Model and CT Scan Images
Abstract
INTRODUCTION
MATERIALS AND METHODOLOGY
Dataset Preparation
Proposed Work
Preprocessing Section
Deep Learning Models
LeNet-5
MobileNet-V2
Non-Linear Activation Function
EXPERIMENT AND RESULTS
Experimental Setup
Results
CONCLUSION
CONSENT OF PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Application of Nature Inspired Algorithms to Test Data Generation/Selection/Minimization using Mutation Testing
Abstract
INTRODUCTION
Basics of Software Testing
TEST COVERAGE AND ADEQUACY PRELIMINARIES
Structural Testing
Program Based Testing
Specification-based Testing
Error Seeding
Mutation Testing
Perturbation Testing
Error-based (Infection Based) and Domain Analysis Testing
STUDY OF MUTATION TESTING
The Process of Mutation Testing
Mutant Operators
Applications of Mutation Testing
Program Mutation
Specification Mutation
Problems in Mutation Testing
Solutions to Problems in Mutation Testing
Cost Reduction Techniques
Mutant Reduction Techniques
Mutant Sampling
Mutant Clustering
Selective Mutation
Higher-order Mutants
Execution Cost Reduction Techniques
Mutation Type
Execution Type
Advanced Platform Support
Equivalent Mutant Handling Technique
Search-Based Mutation Testing
Application of Mutation Testing for Handling the Test Suite
Test Case Generation Techniques
Test Case Selection and Minimization Techniques
Test Case Prioritization Techniques
CONSENT OF PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Multimodal Genetic Optimized Feature Selection for Online Sequential Extreme Learning Machine
Abstract
INTRODUCTION
PROPOSED MG-OSELM APPROACH
Datasets
Preprocessing Subsystem
Feature Subset Selection Subsystem
Classification Subsystem
EXPERIMENTAL RESULTS
MG-ELM and ELM
MG-OSELM and OSELM
CONCLUSION
CONSENT OF PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
A New Non-Stigmergic-Ant Algorithm to Make Load Balancing Resilient in Big Data Processing for Enterprises
Abstract
INTRODUCTION
RELATED WORKS AND PROBLEM STATEMENT
Business Big Data Processing, Workload Management, and Load Balancing
Swarm Intelligence for Load Balancing
PROPOSED APPROACH
Key Concepts
Concept of Neighborhood and Meta-Clustering
Concepts of Inner and Outer Load Balancing
PB-DNA Algorithm
Formulation and Settings
Methodology and Simulation Settings
C. Methods and metrics extraction
EXPERIMENTATION AND RESULTS
Dataset Collection and Case Study
Data Visualization
Benchmarking n°1: PB-DNA Vs. Predictive and Reactive Methods (Robustness Challenge)
Benchmarking n°2: PB-DNA Vs. Predictive Methods (Scalability Challenge)
Benchmarking n°3: PB-DNA vs. other Reactive Methods (Resilience Challenge)
CONCLUSION AND FUTURE WORKS
CONSENT OF PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Computational Algorithms and Study of Elastic Artery and their Applications
Abstract
INTRODUCTION
Dynamical Study of Pulsatile Flow
Performance of Pulsatile Flow in Elastic Arteries
Performance of Wave Reflections Branching and Tethering
COMPUTATIONAL TECHNIQUES FOR BLOOD FLOW
Finite Difference Technique
Crank –Nicolson Scheme
BASIC EQUATION OF BLOOD FLOW
DESCRIPTION OF MATHEMATICAL MODEL
COMPUTATIONAL ALGORITHM
RESULTS AND DISCUSSION
CONCLUSION
APPLICATIONS
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Performance Analysis of CCS on Inclined Plane using Fuzzy-PID Controller
Abstract
INTRODUCTION
Mathematical Modelling and Controller Design
Mathematical Modelling
Controller Design
PID CONTROLLER
Procedure of PID tuning with Oscillation Z-N method
ADVANTAGES OF PID CONTROLLER
DISADVANTAGE OF PID CONTROLLER
FUZZY LOGIC CONTROLLER (FLC)
FUZZIFICATION
FUZZY RULE INTERFACE (FRI)
Ebrahim Mamdani Fuzzy Model (EMFM)
Sugeno Fuzzy Model (SFM)
Tsukamoto Fuzzy Model
DEFUZZIFICATION
MEMBERSHIP FUNCTION (MF)
Types of Membership Functions
ADVANTAGE OF FLC
FUZZY- PID (F-PID) CONTROLLER
RESULTS AND DISCUSSION
CONCLUSION
Future Developments
LIST OF ABBREVIATIONS
CONSENT OF PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENT
REFERENCES
Artificial Intelligence and Natural Algorithms
Edited by
Rijwan KhanDepartment of Computer Science and Engineering
ABES Institute of Technology,
Ghaziabad (U.P.), India
Pawan Kumar Sharma
Department of Applied Science
Dronacharya Group of Institutions,
Gr. Noida (U.P.), India
Sugam Sharma
Senior Systems Analyst
Center for Survey
Statistics & Methodology,
Iowa State University, USA
&
Santosh Kumar
Department of Mathematics,
College of Natural and Applied Sciences,
University of Dar es Salaam,
Tanzania

BENTHAM SCIENCE PUBLISHERS LTD.

End User License Agreement (for non-institutional, personal use)

This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the ebook/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.

Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].

Usage Rules:

All rights reserved: The Work is the subject of copyright and Bentham Science Publishers either owns the Work (and the copyright in it) or is licensed to distribute the Work. You shall not copy, reproduce, modify, remove, delete, augment, add to, publish, transmit, sell, resell, create derivative works from, or in any way exploit the Work or make the Work available for others to do any of the same, in any form or by any means, in whole or in part, in each case without the prior written permission of Bentham Science Publishers, unless stated otherwise in this License Agreement.You may download a copy of the Work on one occasion to one personal computer (including tablet, laptop, desktop, or other such devices). You may make one back-up copy of the Work to avoid losing it.The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.

Disclaimer:

Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.

Limitation of Liability:

In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.

General:

Any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims) will be governed by and construed in accordance with the laws of Singapore. Each party agrees that the courts of the state of Singapore shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims).Your rights under this License Agreement will automatically terminate without notice and without the need for a court order if at any point you breach any terms of this License Agreement. In no event will any delay or failure by Bentham Science Publishers in enforcing your compliance with this License Agreement constitute a waiver of any of its rights.You acknowledge that you have read this License Agreement, and agree to be bound by its terms and conditions. To the extent that any other terms and conditions presented on any website of Bentham Science Publishers conflict with, or are inconsistent with, the terms and conditions set out in this License Agreement, you acknowledge that the terms and conditions set out in this License Agreement shall prevail.

Bentham Science Publishers Pte. Ltd. 80 Robinson Road #02-00 Singapore 068898 Singapore Email: [email protected]

PREFACE

This book is based on Applications of Artificial Intelligence and Nature Inspired Algorithms in different areas of Computer Science. Artificial Intelligence (AI) encompasses by means of computers to do things that customarily need human intelligence. It also includes acting on data, learning from new data, and improving over time, just corresponding to a small human kid growing up into a smarter human adult. Nature-inspired algorithms are a set of original problem-solving practices and approaches and take enticing substantial consideration for their respectable act. Typical examples of nature-inspired algorithms contain evolutionary computing (EC), artificial neural networks (ANN), swarm intelligence (SI), and fuzzy systems (FS) and they have been useful to resolve several actual problems. Even with the fame of nature-inspired algorithms, several tests endure, which need extra research efforts. In this book, we focus on Artificial Intelligence (AI) and optimization algorithms for data analytical processes. Each chapter in this book is written by topic experts on applications of Artificial Intelligence (AI) and nature-inspired algorithms in data science.

Rijwan Khan Department of Computer Science and Engineering ABES Institute of Technology, Ghaziabad (U.P.), India

List of Contributors

Agnik GuhaDepartment of Computer Engineering, Faculty of Engineering and Technology, Jamia Millia Islamia, New Delhi-25, IndiaAjay Kumar YadavDepartment of Computer Engineering, Faculty of Engineering and Technology, Jamia Millia Islamia, New Delhi-25, IndiaAmit Kumar SinghDepartment of Instrumentation and Control Engineering, Dr. B. R. Ambedkar NIT Jalandhar, IndiaAmreen AhmadDepartment of Computer Engineering, Faculty of Engineering and Technology, Jamia Millia Islamia, New Delhi-25, IndiaAnand Singh RajawatDeptartment of CS Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, IndiaAnil KumarDepartment of Mathematics, Swami Vivekananda Subharti University, Meerut (UP), IndiaAnkita R. AngreDepartment of Computer Engineering, Modern Education Society’s College of Engineering, SPPU Pune, IndiaArchana P. KaleDepartment of Computer Engineering, Modern Education Society’s College of Engineering, SPPU Pune, IndiaArvinda KushwahaDepartment of Computer Science and Engineering, MIET Meerut, IndiaAsfia AzizSchool of Engineering Science and Technology, Jamia Hamdard, New Delhi, IndiaAshish Kumar ChakravertiDepartment of Computer Science and Engineering, School of Engineering and Technology, Sharda University, Gr. Noida, IndiaBharti SuriMSIT, USICT, New Delhi, IndiaBhaskar SinghEC, RITS, RGPV, Bhopal, IndiaChanchal KumarDepartment of Computer Engineering, Faculty of Engineering and Technology, Jamia Millia Islamia, New Delhi-25, IndiaDevika BihaniComputer Science Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, IndiaDhanashree V. ParanjapeDepartment of Computer Engineering, Modern Education Society’s College of Engineering, SPPU Pune, IndiaDivakar SinghCSE, BUIT, Bhopal, IndiaHarsh Pratap SinghCSE, SOE, SSSUTMS, Sehore, IndiaHarshit BhadwajDepartment of Computer Science and Engineering, MIET, Greater Noida, IndiaHarshit JainComputer Science Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, IndiaI.Graphic Era Hill University, Dehradun, IndiaJ. RawatGraphic Era Hill University, Dehradun, IndiaJyoti KumarDepartment of Design, Indian Institute of Technology, Delhi, IndiaKanishk BarhanpurkarDeptartment of CS Engineering, Sambhram Institute of Technology, Bengaluru, Karnataka, IndiaKrishna KumarDepartment of Computer Science and Engineering, MJPRU, Bareilly, IndiaN. MohdGraphic Era Hill University, Dehradun, IndiaNahid SamiSchool of Engineering Science and Technology, Jamia Hamdard, New Delhi, IndiaNishtha JatanaResearch Scholar, USICT and Assistant Professor, MSIT, USICT, New Delhi, IndiaPiyush Bhushan SinghDepartment of Information Technology, Pranveer Singh Institute of Technology, Kanpur UP, IndiaRakesh RanjanDepartment of Information Technology, Pranveer Singh Institute of Technology, Kanpur UP, IndiaRashmi SinghMIS Head Trident Group, Hosangabad, IndiaRomil RawatDeptartment of CS Engineering, Sambhram Institute of Technology, Bengaluru, Karnataka, IndiaS.P. SinghGraphic Era Deemed to be University, Dehradun, India DIT University, Dehradun, IndiaSamia Chehbi GamouraEM Strasbourg Business School, Strasbourg University, HuManiS (UR 7308), Strasbourg, FranceSaransh SharmaComputer Science Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, IndiaSaty Prakash YadavDepartment of Instrumentation and Control Engineering, Dr. B R Ambedkar NIT Jalandhar, IndiaShashwati P. KaleDepartment of Computer Engineering, Modern Education Society’s College of Engineering, SPPU Pune, IndiaShefali P. SonavaneDepartment of Computer Engineering, Modern Education Society’s College of Engineering, SPPU Pune, IndiaShivamGraphic Era Deemed to be Universituy, Dehradun, IndiaSugandha ChakravertiDepartment of Computer Science and Engineering, Greater Noida Institute of Technology, Gr. Noida, UP, IndiaSunil K. SinghDepartment of Computer Science & Engineering, CCET, Chandigarh, IndiaTaranjeet SinghDepartment of Computer Science and Engineering, IFTM University, Moradabad, IndiaUpasana PandeyDepartment of Computer Sciences & Engineering, (AI) ABES Institute of Technology, Ghaziabad, IndiaVani KansaDepartment of Computer Science & Engineering, Guru Kashi University, Bathinda, IndiaVaseem NaiyerMIS Head Trident Group, Hosangabad, IndiaVinay SinghCSE, SISTEC Gandhinagar, Bhopal, IndiaWade Aditi R.Department of Information Technology, Walchand College of Engineering Sangli, The Bishops Education Society, Pune, The Kaushalya Academy, Latur, India

Data Computation: Awareness, Architecture and Applications

Vani Kansal1,*,Sunil K. Singh2
1 Department of Computer Science & Engineering, Guru Kashi University, Bathinda, India
2 Department of Computer Science & Engineering, CCET, Chandigarh, India

Abstract

There has been a tremendous revolution in computing technologies to handle the vast amount of data in recent years. Big data is the large-scale complex data in which real-time data is available and mushrooms the development of almost every field. In recent years, the demand and requirement of big data produced an opportunity to replace traditional data techniques due to their low efficiency and low accuracy. It shows adequate responsiveness, absence of versatility, execution, and precision for meeting the convolution of Big Data challenges. As an outcome, this created different dispersions and innovations. Big data does not mean that the data is humongous but additionally excessive in range and speed. This factor makes them tough to deal with the usage of conventional gear and techniques. Decision-makers read the extension and expansion of big data to understand and extract valuable information from rapidly varying data using big data analytics. In this chapter, we can analyze big data tools and techniques useful for big data. This chapter presents a literature survey covering various applications and technologies that play an indispensable role in offering new solutions dealing with large-scale, high-dimensional data. By summarizing different available technologies in one place from 2011 to 2019, it covers highly ranked international publications. Further, it extends in the context of computing challenges faced by significant Data Healthcare, Clinical Research, E-Commerce, Cloud Computing, Fog computing, Parallel Computing, Pervasive Computing, Reconfigurable Computing, Green Computing, Embedded Computing, Blockchain, Digital Image Processing and IoT and Computing Technology. The survey summarizes the large-scale data computing solutions that help in directing future research in a proper direction. This chapter shows that the popularity of data computing technology has steeply risen in the year 2015, and before 2011, the core research was more popular.

Keywords: Big Data, Big Data Analytics Applications, Challenges, Data Computation, Decision Making.
*Corresponding author Vani Kansal: Department of Computer Science & Engineering, Guru Kashi University, Bathinda, India; E-mail: [email protected]

INTRODUCTION

Data refers to bits or chunks of information represented in a digital format in the computational world. This data is available in multiple forms, such as text, symbols, numbers, etc., that are formatted peculiarly (refer to Fig. 1). It is considered an element for modelling or representing real-world events, such as a line segment representing the location of a road. Data represents a binary format for interpreting the process and converting computer data into meaningful information during its transfer. According to Michener, the concept of meta-informatics describes the context, content, structure, accessibility, and quality aspects of the data [1]. Computing covers the activities that require a computer to perform any task, such as processing, managing, transferring, or communicating a piece of information. Here, the concept of hardware and software came into existence.

Fig. (1)) Data Elements.

With the emergence of the latest revolutionized tools and technologies, Darmont described the advancement of data-centric computing compared to earlier times [2]. Data analytics and large-scale data mining attracted the interest of various researchers, which led to the existence of a cost-effective solution for online and offline data storage and manipulation, as shown by Sandor et al., while addressing mobile clouds. They proposed “Multi-Authority-based Encryption” to solve the “Key Escrow Problem” in authority-based encryption [3]. From cloud technology and online computing solutions to data storage techniques, all these inherit the risk of threats and attacks. The necessity of data security and privacy has also grown on these grounds. In the last few decades, data has risen to many folds in each field, whether it is dealing with Online Social Media [4], E-Commerce [5], Internet-of-Things [6], Cloud, Healthcare, Bio-Research, or Clinical Data [7]. These big data analytics are characterized by proper data management strategies with supporting architecture to offer better visualization, user interaction, and the development of models. The present review provides a survey of the approaches to deal with the enormously growing demand for a higher level of data computing. Highly cited research articles and relevant research studies are accessed and mined during the process. The work covers the literature supporting applications and approaches based on various technologies to deal with vivid kinds of massive data.

The survey is divided into five sections, including an introduction. Section 2 discusses the survey strategies and provides the application-wise literature review about various approaches; Section 3 provides a descriptive analysis of the work, and Section 4 enumerates the data computing challenges. Finally, the paper summarizes and concludes in Section 5.

SURVEY STRATEGIES

The study design involves intensive data mining, which is related to research articles published from 2011 to date in journals and indexed in PubMed, Science Direct, IEEE, Google Scholar, Scopus, SCI with reputed publishers such as Springer, Elsevier, Taylor & Francis, etc. The keywords like “Data Computing”, “Big Data”, “Massive Data”, “Healthcare”, “E-Commerce”, “Cloud”, “Image Processing”, “Biomedical”, “IoT”, “Clinical” are useful with and without “applications”, “tools”, technologies”, “solution”, “approaches”, “analytics” and “server”. The section includes Social Networking, Biomedical Research, E-Commerce [8], Internet-of-Things [9], Online Media, NGS Technologies [10], and Education Sector [11], which is continuously adding up to the data volume and variety. This has irresistibly flooded the network with organized and unorganized data types. Here, the computing framework has revolutionized various data mining, analysis, and visualization strategies. It has also reduced manual efforts. Cloud environment strengthened by fog and parallel computing offers an interesting platform to deal with large-scale multifaceted computing challenges. The technology eradicates the necessity of maintaining the costly computing hardware required to perform various tasks. Moreover, it also effectively addresses software and space requirements. Recent time has seen a tremendous increase in the big data technologies touching the medical and informatics field. We can use data mining by selecting the most recent and relevant research papers in this area. The paper is selected based on variously defined approaches:

Published papers must be in the English language.The publication year should lie between 2011 and 2019.The paper should discuss the design, approach, or application to deal with extensive data.The paper should evaluate the performance of data computing applications.

Initially, 160 papers were mined between 2011 and 2019. Furthermore, while employing various inclusion and exclusion criteria, 90 papers were selected. Finally, 73 papers were selected by reading and analyzing the paper content for the study. This is followed by comparing the literary work that is further analyzed regarding data computing applications.

Big Data

The advent of data-based computing architectures has added pace to the research aspects and resulted in a large-scale data generation with extraordinarily high dimensions and pace. Here, the data is referred to as “Big Data” which is featured by the large volume, veracity, variety, velocity, and value representing larger data sets with complex, massive, and diverse data [12]. The big data revenue forecast published by Shanhong in Statistics 2019 (refer to Fig. 2) predicts that at the end of 2027, the size of the market will hike up to103 billion dollars, which is nearly double the market size of 49 billion dollars in 2019 [13].

A comprehensive survey conducted by Oussous et al. summarized the various aspects of big data computing technology to deal with enormously rising structured and unstructured data with high-tech designs. They also compared big data technology according to their distinct layers like “Data Storage Layer”, “Data Processing Layer”, “Data Querying Layer”, “Data Access Layer” and “Management Layer” [14]. Usha and Aps observed that in the last few decades, Apache Hadoop and Map-Reduce have emerged with the instrumental capability to run a query on terabyte sized data in a couple of seconds that traditional query technologies process in minutes [15]. In this regard, HBase was developed by George that is strengthened by Hadoop technology for high-speed queries from billions of records [16], while Hydra was developed by Lewis et al. as a search engine based on the distributed computing architecture of Hadoop [17].

Fig. (2)) Worldwide Big Data Market Revenue Prediction [13].

Cloud Computing

Cloud offers a robust computational environment and storage space for outsourcing data. The flooding of large-scale data on the network has led to the channelization of data to various cloud servers. These days, cloud storage has been popularly used by both individuals and enterprises. When an individual is sharing data in a public cloud environment, he or she should check for privacy and security aspects. Myrna was developed by Langmead et al. for large-scale cloud computing. Myrna is a tool based on a cloud computing environment used to determine genes in a large dataset of RNA-sequences [18]. Nellore et al. address the privacy protection of cloud data with “Rail-dbGap (Database of Genotypes and Phenotypes)” [19]. “CloVR (Cloud Virtual Machine)” was developed by Angiuoli et al. to address cloud computing environments from the desktop. It is used to manage the data transfer between the desktop and cloud servers. It also improves the performance for processing large datasets using cloud computing resources [20], and a high-performance query system, “Hadoop GIS” was developed using Map Reduce by Wang et al. [21].

Pervasive Computing

Pervasive computing, also considered ubiquitous computing, aims to create an environment packed with all kinds of built-in and portable computing devices that communicate with users’ wireless technologies as they move through this environment. As early as 2006, Shuxin had presented a trust model to deal with the pervasive computing environment [22]. Authors established pervasive computing for creating a revolution by providing services that satisfy user expectations and desires using the information of nearby physical sites. Furthermore, Youssef (2013) has summarized the practicability of pervasive computing regarding cloud services and their adjoining applications. It was found that the cloud environment presents effective communication through devices such as PDAs, mobile phones, and wireless sensors to offer vivid services and facilities [23]. One of the most important features of pervasive computing systems over traditional computing is that it hides out the complex computing functions from the users who are unaware of the computing environment.

Reconfigurable Computing

Reconfigurable computing is a structural design intended to fill the gap between hardware and software. Koren et al. (2018) offer potentially much higher performance than software while retaining a greater degree of flexibility of hardware components [24]. Earlier in 2002, the author had described Reconfigurable devices, including Field-Programmable Door Arrays (FPGAs). There are several computational elements that are defined by the programmable configuration bits. Campton et al. examined that these elements, often known as logic blocks, are linked by means of a collection of programmable routing resources [25].

Green Computing

Green Computing refers to the efficient use of computers and other technologies while respecting the environment through energy-efficient peripherals, environmental protection, and reducing electronic waste. Mishra et al. (2018) demonstrated that these goals not only make resources more effective but, at the same time, enhance the overall performance of the system [26]. Naji et al. (2017) summarised that green computing had been described in two ways [27]:

Software Technology: The main goal is to create techniques to improve software, storage, and energy efficiency.Hardware Technology: The goal is to reduce energy consumption without presenting expertise that can create economically efficient technology assisted with the concept of recycling.

EMBEDDED COMPUTING

“Embedded System” is an acronym representing “Embedded Computer System” that embodies the system product or electronic device in which a computer has been incorporated. Furuichi et al. (2014) presented “Internal system” as a general term for any electronic device that includes any system, product, and computer [28]. Jakoyljevis examined the “Embedded Systems” consisting of a series of software and hardware modules designed to support and sustain manageable and certifiable integration and hosting of various control and maintenance functions [29].

Parallel Computing

It is one of the advanced computing technologies that have recently been implemented to deal with enormous data volumes. CloudBurst is one of the parallelized computing models that facilitate the genome mapping process developed by Schatz, and for “Short-read mapping” process. It uses multiple nodes to parallelize the execution of processes using the “Hadoop Map Reduce” framework [30]. Keckler et al. (2011) detailed the salient features of implementing a high-throughput architecture that is based on GPU. They also considered the parallel computing challenge with its potential effects on the research community [31]. Zhang et al. (2019) postulated various parallel computing-based solutions to deal with the modelling of multidimensional statistical analysis of the Markov Chain Random Field model. In the methodology, Multicore Processor Parallel Computing, GPU-based Nearest Neighbour Searching (GNNS) Parallel Computing, and Multicore Processor-based GNNS were also used. Simulation analysis employed both CPU and GPU during the execution of computing solutions. The results demonstrated that the proposed parallel computing designs were 1.8 units faster [32].

Fog Computing

Many applications are available that are hybrid approaches involving various technologies together to improve the technology outcomes. Tortonesi et al. (2019) proposed a “new information-centric” and “Value-based service” model designed as “SPF Fog-as-a- Service Platform” which can be used to tackle the important challenges in a smart city i.e., to process a massive amount of raw data generated in a smart city. They established that fog computing is a wiser combination of WSN, IoT, mobile, and edge computing technology. The concept proved to be well suitable for smart city concepts. Various applications related to business and civil service can also be run on “Fog Computing” platform. The authors described how fog computing governs the location, time-sensitive, and context-based applications covering sensitive information of both consumers and producers to offer a reasonably cost-effective platform [33]. For instance, Fog computing architecture is an enhanced cloud computing platform combining designs for enhancing IoT based applications in the industry. This proposed work by Jang et al. (2019) summarized the design of smart factories for the future. The technology-driven intelligent, self-monitoring and self-organizing design proved to be nearly autonomous to adapt to the factory's manufacturing design. The system was successfully evaluated against a permission-based fog computing system that was inspired by decentralized technology [34]. Communication and computation are the essential aspects of Fog Computing. The rush of vehicles increases in downtown during working hours and most vehicles are parked in the parking areas and on the roadside for a long time. Thus, these movable and immovable transports can be used as resources for communication and computing. Ergo Hou et al. proposed a “Vehicular Fog Computing” in which they used vehicles as an infrastructure to forge the better usage of these automobiles’ conveyance and calculations [35]. Laun also considers Fog computing as the best solution for providing exemplary mobile services to users at any place with proper usage of resources and for better service of mobile traffic when they use location-based services of the mobile devices [36].

Internet of Things and Computing Technology

Internet-of-Things (IoT) has also shown wide data computing applications developed across wider domains, including Production, Occupation, Shipping, Health Protection, and Households. For instance, Breidenbacher et al. presented HADES-IoT in the year 2019 as a “Tamper-Proof” host-based anomaly detection design for IoT devices to protect them from malware devices. They offer the last line defence mechanism for installing a range of IoT devices advantaged with Linux platform. The design is 100% effective in detecting IoT, Reaper, and VPN Filters while utilizing nearly 5% of the memory [37]. Yun designed one M2M as a standardised IoT platform for assisting the sensing capabilities of one M2M-defined web-based application. The design successfully dealt with the heterogeneous hardware interfaces of IoT devices [38]. Dimitrov (2016) focussed their study on various MIoT “(Medical Internet of Things)” devices and big data for computing data related to healthcare facilities offered by hospitals and various government and private organizations. A new category of “Digital Health Advisors “will help their clients avoid illness related to their diet, improve their mental health, and achieve a better lifestyle. There are so many devices and mobile apps like “Myo”, “Zio patch”, “Glaxo”, “Novartis” that are used for smart healthcare. People have started using mobile apps and IoT devices to monitor their health, remember their appointments, calculate the calories they burnt while walking or running, and easily communicate with their doctors [39]. Bhattacharyya et al. (2018) designed an exciting and interactive gaming app in Visual Studio (IDE) using user’s “myoelectric signal” to aid in the rehabilitation of patients recovering from heart diseases, stroke, depression, surgery and design and control of orthotics, prosthetics, etc. It offers an “MYO armband” that needs to be tied to the recovering patient to recognize various gestures of hand movements and uses the in-built “EMG (Electromyography)” electrode for data retrieval [40]. Liu et al. (2018) dedicated their research to designing IoT based “patch-type ECG monitor “applications to offer real-time monitoring apps and used to measure the heartbeat of patients fighting with “cardiovascular disorders” [41]. The rising demand for encryption in every field has led to the emergence of novel ideas to deal with privacy and security aspects. Singh et al. (2019) proposed an IoT-based smart home design using decentralization technology of blockchain and cloud computing. To achieve confidentiality and integrity in block chain technology, they use encryption and hashing algorithms. Smart home security aspects were dealt with while monitoring the network traffic to establish a correlation between network traffic and traffic features so that they can use the “Multivariate Correlation Analysis (MCA)” identification technique to measure the flow of smart network traffic. This helps to categories the association between the features of traffic [42]. The blockchains offer the most efficient solution to IoT based design.

Blockchain

Blockchain offers a kind of one-time design and creation of databases that can only be read without any scope of removal or modification. It offers decentralized data accessible by the owner with the help of private keys. Kaye et al. (2015) designed a dynamic patient consent system that worked as a personalized communication interface. This interface helps user-centred decision making, where participants can securely share their data with third parties in an encrypted form and offers a single platform for intermingling their interests and concerns [43]. Blockchain inspired design offers encryption of sensitive data when the records and samples are shared. Globally, blockchain has shown potential applications in maintaining Electronic Medical Records to aid in the apt functioning of the Food and Drug Administration. Cyran (2018) had designed a blockchain-based solution that was inspired by the microservices framework [44].

The design offered an independently secured encapsulation of different services customizable to meet individual hospital needs. The core design covered interaction among nodes, cryptographic security, extensive data file sharing facilities, and integration of logical business sharing using smart contracts [45]. Dimitrov (2019) published his research focussing on the applications inspired by blockchain architecture. He was mainly concerned about offering solutions to data management issues faced by healthcare centres [46]. Field exhibiting tremendous data computing applications are shown in Fig. (3) and Table 1.

Fig. (3)) Data Computing Applications in Various Fields.
Table 1Some of the Data Computing Applications.ApplicationTechnology UsedReferenceBlueSNPA genome-wide study using R-package for statistical testing70CloudBurstParallel computing design for mapping genome30CloudwaveClinical data processing using Hadoop67CloVRThe virtual machine on cloud computing for automated analysis20DistMapConducts mapping based on short-read mapping on a Hadoop cluster71Electronic Medical Records (EMR)Microservices and blockchain-inspired service53HADES-IoTanaomaly detection of IoTs37HbaseHadoop based query platform16HydraSoftware package based on Hadoop-distributed computing17MedCloudHadoop with HIPAA to deal with security aspects of patients data66MYORehabilitation therapy app based on visual studio.40MyrnaCloud computing for large expression data18oneM2MIoT platform to assist sensing applications38Rail-dbGapPrivacy protection of cloud data19SeqPigEnhanced Apache Pig involving Hadoop-BAM73SparkSeqSoftware package taking advantage of Apache Spark and Hadoop-BAM library.72

NGS-Throughput

Schuster published an article in which he established that the rising interest in the new generation of “Non-Sanger-based Sequencing” technology, i.e., Next-Generation Sequencing, transformed the traditional design of genomic and expression analysis [47]. For instance, NGS technology could process billions of DNA sequence data in a day and gives maximum throughput than existing methods, as demonstrated by the study published by Knetsch et al. in 2019 [48]. Recently, in 2019, Seth et al. had also discussed the big data tools and technologies that majorly focussed on effectively addressing issues related to data storage, data retrieval, data analysis, data integration in the vivid platform, and detecting elements raising errors. Security has always been the main concern while storing data on the cloud. Hence, they proposed a mechanism for efficient storage of data using fog computing as an extended version of cloud computing [49]. Critical analysis of various achievements and hurdles for the transformation from Landscape Genetics” to “Landscape Genomics” was presented by Cushman et al. in his published study focussing on NGS data [50].

Digital Image Processing

The concept of Data Computation has an inevitable role in digital image processing applications in vivid fields like biometrics and medicine. For instance, in 2017, Ghazali et al. had addressed the problem of colour image processing with specific applications to weed classification [51]. In this work, they achieved higher classification accuracy by combining both colour and texture information of weed images. For preprocessing, a task colour filtering algorithm was used and the proposed technique and known as the extracted green colour. The two feature extraction algorithms, Gray level co-occurrence matrix (GLCM) and Fast Fourier Transform (FFT), were used for classification. Colour-based method is better than the gray scale for better classification results. Hassan et al. (2019) described novel methods used for detecting and classifying the external defects of olive fruits based on texture analysis and texture homogeneity [52]. The proposed technique distinguished the defected and healthy olive fruits and was further used to identify and recognize the real defected region. The outcomes were compared with image processing techniques such as Canny, Otsu, local binary pattern algorithm, K-means, and Fuzzy C-means algorithms, demonstrating the highest accuracy achieved by the proposed technique. Mia et al. (2018) proposed an efficient approach based on Linear Discriminant Analysis (LDA) for initial image segmentation by an unsupervised method [53]. The proposed method was capable of automatically separating and combining the clusters whenever required. The proposed method outperforms various cluster-based image segmentation methods, such as the k -means algorithm, the SOFM and LDA segmentation method, and the LDA and K-means based segmentation. The authors established that the performance of the proposed algorithm can be improved by using machine learning algorithms. These are important for the segmentation of natural images and medical images. In 2019, Trivedi et al. discussed image informatics as more related to the various aspects of medical image processing used in relation to “Digital Imaging and Communications in Medicine (DICOM)” format images, including tissue scans [54]. The concept for improvement of the quality of medical diagnosis has raised the interest in computer-based biomedical image processing and analysis. Radiology imaging provides depth visualization of various complex biological systems, tissues, and organs. In this area of research, Saba et al. had implemented Deep Learning (DL) Technology to analyse radiology data. With the proper use of technology, the value of the radiologist is enhanced with the dormant of DL in the conveyance of healthcare. It was conducted by upgrading the patient’s results with minimal cost. They also discussed three fundamental challenges viz. “Safety”, “Privacy”, “Legality” in the diagnosis of radiology data [55]. Image diagnostics are widely available in the form of MRI, CT and X-Ray scans performed to distinguish benign and diseased tissues visually. The process is governed by implementing various Artificial Intelligence approaches to create intelligent systems to mimic the human brain. To achieve this, various Machine Learning approaches powered by image optimization strategies are implemented. For instance, Higaki et al. used Deep Learning Architecture for improving the quality of images in different expertise as “noise and artifact reduction”, “super-resolution” and “image acquisition and reconstruction”. They developed a deep learning-based “denoising convolutional neural network” to remove noise from the image [56]. Gyftopoulos et al. used artificial intelligence [57] and DeSouza et al. used multimodality imaging techniques [58]. Here, another important aspect is intelligent data selection or region selection from the whole image scan.

Kagadis et al. (2013) discussed cloud computing as a practical solution that offers resource reconfiguration of platforms, applications, and virtual environments in a very cost-effective manner. The researchers and clinicians have been inspired by the vital role being played by cloud computing and cloud storage facilities. The authors have majorly focussed on biomedical imaging technology, taking advantage of computing platforms [59]. Ali et al. (2018) described innovative designs to offer technology-driven services to the healthcare sector. The work involved a rigorous evaluation of the cloud data computing environment to cover applications, issues and offered opportunities for the emergence of cloud computing in healthcare. The study showed that cloud computing enhanced the quality that led to decision-making, security, and privacy [60].

E-commerce

Various E-commerce websites are also constantly generating a large volume of business data. The enterprises also extend their services to customers by learning individuals' interests. To avoid wasteful data searching, opinion and sentimental mining had shown great prospects. Kansal and Kumar have proposed financial sentiment analysis on social network data from financial markets, Facebook, Twitter, and news using artificial intelligence and Cuckoo search [61]. Derindag et al. (2019) presented an analytical study covering the technologies to address e-governance and e-commerce. They also critically analysed the impact of the revolution on the economic sector with various growth indicators [62]. Kansal and Kumar have also developed a stock market forecasting system that demonstrated 94.44% accuracy for emotion-based text categorization. The designed stock price forecasting system has implemented a cuckoo search with neural networks to obtain instrumental prediction results [63].

Healthcare Informatics and Clinical Research

The recent revolution in technologies has added pace to the research aspects of healthcare informatics, biomedical data analysis and resulted in large-scale data generation related to biological research with extraordinarily high dimensions and pace. The current section moves around analytics, majorly covering biomedical research about clinical informatics, including diagnostics. Chandana et al. in 2018 defined that healthcare informatics addresses the tools and techniques that are used to estimate and offer solutions to the breakout of the most hazardous infectious diseases. The proposed combined model “Convolutional Neural Network” using “Naive Bayes”, “Random Forest” and “Linear Regression” on “Hadoop platform” to forecast lung diseases at the beginning stage of the health service group [64]. Tavazzi in 2019 stated that clinical informatics deals with clinical trials and intelligent decision making to benefit patients in the light of knowledge and evidence [65]. The rising trends of personalized medicine have produced massive data covering large data sets. Mass patient selection, designing protocols, mass evaluation, and conducting various levels of clinical trials has become feasible with computing technologies. Therefore, storing an amount of electronic medical records efficiently is itself a great challenge. Software solutions like MedCloud based on HIPAA [66] and Cloudwave [67] were developed by Sobhy et al. and Jaypndian et al. to manage clinical data. Online data management has resulted in easy channelization of information that needs to be shared with patients, volunteers, drug industry, pharmacists, doctors, and professionals. Nipp et al. figured out various facts to enlighten individuals with many misconceptions and thereby encouraging higher patient recruitment under various trials [68].

SURVEY OUTCOMES

The review has shown that data computing has not only explored informatics related fields like cloud, IoT, social networks, enterprise, and industrial networks. Further encouragement proceeds with potential computing solutions to answer large-scale data computing issues of the biological world dealing with big genomic data, practical aspects of medical research, disease prognosis, and diagnosis. The strategies like patient participation, enrolment, and clinical trials have also been positively changed with the help of online data management assays with the help of blockchain-based secure cloud storage. Fig. (4) summarizes the relationships among various computing technologies along with their applications in various fields. It has also been observed that the various data computing technologies cannot be isolated, and to harvest the best computing results, secure storage space and communication channels are an essential part of data computing approaches.

The year-wise distribution of the publications considered for conducting the present study is shown in Fig. (5). It is observed from the pie chart that very few instances for applications of data computing are seen from 2011 to 2017, which corresponds to 8% to 15%. It is also observed that 57% of the total publications used in the survey have been published between 2017 and 2019. This means that data computing has been a recent technology that has shown its impact in dealing with larger volumes of diverse data. Overall, it can also be summarized that 75% of the survey covers the data computing applications that were published not before 2013. Hence, it can be said that from the year 2017, a new era of revolutionized data computing technology has started.

Fig. (4)) Data Computing Architecture. Fig. (5)) Publications Referred in the Survey.

Application wise distribution of publications covered in the current survey is shown in Fig. (6). The data computing applications from 2011 to 2019 are plotted on the Y-axis with the number of publications used in surveys on the Y-axis. It is observed that maximum data computing applications deal with large-scale data applications, namely, IoT and Big Data analytics, followed by cloud computing, computational informatics, Digital Image Processing, healthcare and Clinical Research. The trend is further followed by the latest emerging technologies like blockchain, NGS, e-commerce, parallel computing, and fog computing that may surpass the popularity of the existing data computing applications in the coming years.

Fig. (6)) Data Computing Applications from 2011 to 2019.

DATA COMPUTING CHALLENGES

Revolutionizing data computing technologies is constantly raising challenges regarding the variety and volume of data and that too at a very fast pace. This has subsequently challenged various aspects such as data availability, scalability, quality, security, privacy aspects, regulatory policies, and governance.

Highly efficient large-scale data management strategies are required to deal with scalability concerns. In this regard, G-store was introduced by Das et al. offering key based structured data storage and retrieval with easy API [69].Data availability summarises the apt inputs, or the raw data should be constantly available as a resource for data computing technologies. Demand for a constant and high-quality resource needs to be addressed [70].Data integrity is another aspect of data resources that means that the data should remain unchanged or modified in any form during transfer, storage, or analysis. This aspect has been addressed with the standardisation of medical imaging in terms of DICOM and much more needs to be done in numerous fields [71].Large-scale computing usually results in unstructured or semistructured data. This data needs to be converted to structured data to aid further analysis. The challenge here lies in the data transformation strategies, as they should not alter data during the transformation process [72].Data security and privacy are indispensable needs of the current large-scale computing architectures. Data over the network or cloud environment is highly prone to theft and malicious attacks, exposing sensitive data fields to stealing, profiling, and loss of control. Vivid encryption strategies are available, including privacy preservation in the cloud, still, more customized security solutions are in high demand [73].Laws, rules, and regulations should safeguard sensitive data from unauthorised use. Adequate policies need to be developed to offer protection mechanisms and protect the enormously rising data volumes. Data governing policies, including monitoring, and monetizing information, should be developed to benefit the consumer and business sectors.

The nature of these challenges is constantly changing with the revolutionizing computing trends and technology advancements that need to be wisely addressed to harness the full advantage of the latest applications.

RELIABLE INDUSTRY 4.0 BASED ON MACHINE LEARNING AND IOT FOR ANALYZING

The authors provided a newly created intelligent approach for assessing the IoT smart system's dependability. A machine learning approach known as a decision tree is used to validate the data of the smart meter. The smart meter readings were regressed and classified using the decision tree approach into real and false types. In addition, the proposed system can identify data loss caused by erratic internet signals. The IoT platform's dashboard displays the system's online output, such as data loss, genuine and false data. Three scenarios have been used to assess the efficacy of the planned infrastructure. Scenario 1 demonstrates that the data is true and that there is no loss, and that the decision tree model is error-free. In scenario 2, it is demonstrated that the decision tree model can detect false data, allowing the user to secure and verify the smart meter. The traffic light has been changed to a red color to hint to the user about the abnormal case of fake data. The suggested infrastructure was tested in the final scenario to check for data loss and publish the findings on the IoT platform's dashboard, where it was determined that the network speed was insufficient for the smart system. In general, the suggested technique improves the dependability of smart IoT systems, which boosts industry 4.0 investment [74].

CONCLUSION

The survey showed that data volume is constantly rising with the revolutionized data computing technologies, data sensors, and mobile devices connected via the internet, offering diverse functionalities. Impossibility concludes to demarcate the big data from cloud computing and blockchain architecture. Additionally, further advanced data computing has been offered with the involvement of edge, fog, and parallel computing environments. Numerous applications have also been designed that use blockchain architecture to deal with the security and privacy aspects of cloud and IoT applications. In biomedical research, computing technology has revolutionized diagnostics and research protocols. Digital Imaging Processing has also been improved considerably, with data computing and data transfer of attributes related to the healthcare sector. In the education sector, data computing facilities have revolutionized the architecture of online classroom teaching and training based on Hadoop based online classes. Literature review from authenticated publication sources has shown that recent years from 2015 to 2019 have shown a tremendous rise in the development and deployment of computing solutions in every field. Hence, it can be summarized that data computing is a general term that has touched every aspect of life and is a popular area drawing the attention of the research community. However, there are rising instances of security attacks and privacy concerns that are being successfully addressed by computing technology. In light of the current computing survey, a highly revolutionized computing paradigm can be predicted in the near future.

CONSENT FOR PUBLICATION

Not applicable.

CONFLICT OF INTEREST

The authors declare no conflict of interest, financial or otherwise.

ACKNOWLEDGEMENT

The authors are thankful to the learned reviewers for their valuable comments.

REFERENCES

[1]Michener W.K.. Meta-information concepts for ecological data management.Ecol. Inform.2006113710.1016/j.ecoinf.2005.08.004[2]Darmont J.. Data-Centric Benchmarking.Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics.IGI Global2019342353[3]Sandor V.K.A., Lin Y., Li X., Lin F., Zhang S.. Efficient decentralized multi-authority attribute-based encryption for mobile cloud data storage.J. Netw. Comput. Appl.2019129253610.1016/j.jnca.2019.01.003[4]Reisman J., Olazabal V., Hoffman S.. Putting the “Impact” in Impact Investing: The Rising Demand for Data and Evidence of Social Outcomes.Am. J. Eval.201839338939510.1177/1098214018779141[5]Ansari S., Kohavi R., Mason L., Zheng Z.. Integrating e-commerce and data mining: Architecture and challengesProceedings 2001 IEEE International Conference on Data MiningIEEE2001273410.1109/ICDM.2001.989497[6]Aggarwal C.C., Ashish N., Sheth A.. The internet of things: A survey from the data-centric perspective.Managing and Mining Sensor Data.Boston, MASpringer201338342810.1007/978-1-4614-6309-2_12[7]Hassan M.K., El Desouky A.I., Elghamrawy S.M., Sarhan A.M.. Big Data Challenges and Opportunities in Healthcare Informatics and Smart Hospitals.Security in Smart Cities: Models, Applications, and Challenges.ChamSpringer201932610.1007/978-3-030-01560-2_1[8]Budiono F., Lau S., Tibben W.. Cloud Computing Adoption for E-Commerce in Developing Countries: Contributing Factors and Its Implication for Indonesia.PACIS2018[9]Zheng Z., Mao W., Wu F., Chen G.. Challenges and Opportunities in IoT Data MarketsProceedings of the Fourth International Workshop on Social SensingACM20191210.1145/3313294.3313378[10]Cushman S.A., Shirk A.J., Howe G.T., Murphy M.A., Dyer R.J., Joost S.. The least cost path from landscape genetics to landscape genomics: challenges and opportunities to explore NGS data in a spatially explicit context.Front. Genet.2018921510.3389/fgene.2018.0021529971091[11]Paul P.K., Ghose M.K.. A Novel Educational Proposal and Strategies Toward Promoting Cloud Computing, Big Data, and Human–Computer Interaction in Engineering Colleges and Universities.Advances in Smart Grid and Renewable Energy.SingaporeSpringer20189310210.1007/978-981-10-4286-7_10[12]Furht B., Villanustre F.. Introduction to big data.Big Data Technologies and Applications.ChamSpringer201631110.1007/978-3-319-44550-2_1[13]Big Data market revenue forecast worldwide 2011-2027.https://www.statista.com/statistics/254266/global-big-data-market-forecast/[14]Oussous A., Benjelloun F-Z., Lahcen A.A.. Big Data technologies: A survey.Journal of King Saud University-Computer and Information Sciences201730443144810.1016/j.jksuci.2017.06.001[15]Usha D., Aps A.J.. A survey of Big Data processing in perspective of Hadoop and MapReduce.International Journal of Current Engineering and Technology201442602606[16]George L.. HBase: the definitive guide: random access to your planet-size data.O'Reilly Media, Inc.2011[17]Lewis S., Csordas A., Killcoyne S., Hermjakob H., Hoopmann M.R., Moritz R.L., Deutsch E.W., Boyle J.. Hydra: a scalable proteomic search engine which utilizes the Hadoop distributed computing framework.BMC Bioinformatics201213132410.1186/1471-2105-13-32423216909[18]Langmead B., Hansen K.D., Leek J.T.. Cloud-scale RNA-sequencing differential expression analysis with Myrna.Genome Biol.2010118R8310.1186/gb-2010-11-8-r8320701754[19]Nellore A., Wilks C., Hansen K.D., Leek J.T., Langmead B.. Rail-dbGaP: analyzing dbGaP-protected data in the cloud with Amazon Elastic MapReduce.Bioinformatics201632162551255310.1093/bioinformatics/btw17727153614[20]Angiuoli S.V., Matalka M., Gussman A., Galens K., Vangala M., Riley D.R., Arze C., White J.R., White O., Fricke W.F.. CloVR: a virtual machine for automated and portable sequence analysis from the desktop using cloud computing.BMC Bioinformatics201112135610.1186/1471-2105-12-35621878105[21]Wang F., Aji A., Liu Q., Saltz J.. Hadoop-GIS: A high performance spatial query system for analytical medical imaging with MapReduce.Center for Comprehensive Informatics, Technical Report2011[22]Yin S., Ray I., Ray I.. A trust model for pervasive computing environmentsInt. Conference on Collaborative Computing: Networking, Applications and Worksharing200610.1109/COLCOM.2006.361880[23]Youssef A.. Towards pervasive computing environments with cloud services. International Journal of Ad Hoc.Sensor & Ubiquitous Computing2013431910.5121/ijasuc.2013.4301[24]Compton K., Hauck S.. Reconfigurable computing: a survey of systems and software.ACM Comput. Surv.2002342171210 [csuR].. 10.1145/508352.508353[25]Koren Y., Gu X., Guo W.. Reconfigurable manufacturing systems: Principles, design, and future trends.Front. Mech. Eng.201813212113610.1007/s11465-018-0483-0[26]Mishra S.K., Puthal D., Sahoo B., Jena S.K., Obaidat M.S.. An adaptive task allocation technique for green cloud computing.J. Supercomput.201874137038510.1007/s11227-017-2133-4[27]Naji H.Z., Zbakh M., Munir K.. A Review of Green Cloud Computing Techniques.International Conference of Cloud Computing Technologies and Applications.2017264283SpringerCham[28]Furuichi T., Yamada K.. Next generation of embedded system on cloud computing.Procedia Comput. Sci.2014351605161410.1016/j.procs.2014.08.244[29]Jakovljevic M., Insaurralde C.C., Ademaj A.. Embedded cloud computing for critical systems.IEEE/AIAA 33rd Digital Avionics Systems Conference (DASC)20144A5110.1109/DASC.2014.6979465[30]Schatz M.C.. CloudBurst: highly sensitive read mapping with MapReduce.Bioinformatics200925111363136910.1093/bioinformatics/btp23619357099[31]Keckler S.W., Dally W.J., Khailany B., Garland M., Glasco D.. GPUs and the future of parallel computing.IEEE Micro201131571710.1109/MM.2011.89[32]Zhang W., Li W., Zhang C., Zhao T.. Parallel computing solutions for Markov chain spatial sequential simulation of categorical fields.Int. J. Digit. Earth201912556658210.1080/17538947.2018.1464073[33]Tortonesi M., Govoni M., Morelli A., Riberto G., Stefanelli C., Suri N.. Taming the IoT data deluge: An innovative information-centric service model for fog computing applications.Future Gener. Comput. Syst.20199388890210.1016/j.future.2018.06.009[34]Jang S.H., Guejong J., Jeong J., Sangmin B.. Fog Computing Architecture Based Blockchain for Industrial IoTInternational Conference on Computational ScienceSpringerCham201959360610.1007/978-3-030-22744-9_46[35]Hou X., Li Y., Chen M., Wu D., Jin D., Chen S.. Vehicular fog computing: A viewpoint of vehicles as the infrastructures.IEEE Trans. Vehicular Technol.20166563860387310.1109/TVT.2016.2532863[36]Tom H. Luan, Gao Longxiang, Liz Zhi, Xiang Yang, Wey Guiyi, Sun Limin. Fog Computing: Focusing on Mobile Users at the Edge.arXiv:1502.01815v32016[37]Breitenbacher D., Homoliak I., Aung Y. L., Tippenhauer N. O., Elovici Y.. HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.201910.1145/3321705.3329847[38]Yun J., Ahn I.Y., Song J., Kim J.. Implementation of Sensing and Actuation Capabilities for IoT Devices Using oneM2M Platforms.Sensors (Basel)20191920456710.3390/s1920456731640134[39]Dimitrov D.V.. Medical internet of things and big data in healthcare.Healthc. Inform. Res.201622315616310.4258/hir.2016.22.3.15627525156[40]Bhattacharyya A., Mazumder O., Chakravarty K., Chatterjee D., Sinha A., Gavas R.. Development of an interactive gaming solution using MYO sensor for rehabilitation2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)IEEE20182127213010.1109/ICACCI.2018.8554686[41]Liu S.H., Wang J.J., Su C.H., Tan T.H.. Development of a patch-type electrocardiographic monitor for real time heartbeat detection and heart rate variability analysis.J. Med. Biol. Eng.201838341142310.1007/s40846-018-0369-y[42]Singh S., Ra I.H., Meng W., Kaur M., Cho G.H.. SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology.Int. J. Distrib. Sens. Netw.201915410.1177/1550147719844159[43]Kaye J., Whitley E.A., Lund D., Morrison M., Teare H., Melham K.. Dynamic consent: a patient interface for twenty-first century research networks.Eur. J. Hum. Genet.201523214114610.1038/ejhg.2014.7124801761[44]Cyran M.A.. Blockchain as a Foundation for Sharing Healthcare Data.Blockchain in Healthcare Today201810.30953/bhty.v1.13[45]Pussewalage H.S.G., Oleshchuk V.A.. Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions.Int. J. Inf. Manage.20163661161117310.1016/j.ijinfomgt.2016.07.006[46]Dimitrov D.V.. Blockchain Applications for Healthcare Data Management.Healthc. Inform. Res.2019251515610.4258/hir.2019.25.1.5130788182[47]Schuster S.C.. Next-generation sequencing transforms today’s biology.Nat. Methods200851161810.1038/nmeth115618165802[48]Knetsch C.W., van der Veer E.M., Henkel C., Taschner P.. DNA Sequencing.Molecular Diagnostics.SingaporeSpringer201933936010.1007/978-981-13-1604-3_8[49]Seth B., Dalal S., Kumar R.. Securing Bioinformatics Cloud for Big Data: Budding Buzzword or a Glance of the Future.Recent Advances in Computational Intelligence.ChamSpringer201912114710.1007/978-3-030-12500-4_8[50]Manel S., Holderegger R.. Ten years of landscape genetics.Trends Ecol. Evol.2013281061462110.1016/j.tree.2013.05.01223769416[51]Hawari Ghazali K, Mustafa M., Hussain A. Color image processing of weed classification: A comparison of Two feature extraction technique.Proceedings of the International Conference on Electrical Engineering and Informatics2007[52]Hassan N.M.H., Nashat A.A.. New effective techniques for automatic detection and classification of external olive fruits defects based on image processing techniques.Multidimens. Syst. Signal Process.201930257158910.1007/s11045-018-0573-5[53]Mia S., Rahman M.M.. An efficient image segmentation method based on linear discriminant analysis and K-means algorithm with automatically splitting and merging clusters.Int. J. Imaging Robot20181816272[54]Trivedi D.N., Shah N.D., Kothari A.M., Thanki R.M.. DICOM® Medical Image Standard.Dental Image Processing for Human Identification.ChamSpringer2019414910.1007/978-3-319-99471-0_4[55]Saba L., Biswas M., Kuppili V., Cuadrado Godia E., Suri H.S., Edla D.R., Omerzu T., Laird J.R., Khanna N.N., Mavrogeni S., Protogerou A., Sfikakis P.P., Viswanathan V., Kitas G.D., Nicolaides A., Gupta A., Suri J.S.. The present and future of deep learning in radiology.Eur. J. Radiol.2019114142410.1016/j.ejrad.2019.02.03831005165[56]Higaki T., Nakamura Y., Tatsugami F., Nakaura T., Awai K.. Improvement of image quality at CT and MRI using deep learning.Jpn. J. Radiol.2019371738010.1007/s11604-018-0796-230498876[57]