Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Previewpdf

Download as pdf or txt
Download as pdf or txt
You are on page 1of 61

Emerging Technologies in

Computing
Emerging Technologies in
Computing
Theory, Practice, and Advances

Edited by
Pramod Kumar, Anuradha Tomar, and
R. Sharmila
MATLAB ® is a trademark of The MathWorks, Inc. and is used with permission. The MathWorks
does not warrant the accuracy of the text or exercises in this book. This book’s use or discussion of
MATLAB ® software or related products does not constitute endorsement or sponsorship by The
MathWorks of a particular pedagogical approach or particular use of the MATLAB ® software

First edition published 2022


by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742

and by CRC Press


2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN

© 2022 selection and editorial matter, Pramod Kumar, Anuradha Tomar, R. Sharmila; individual
chapters, the contributors

CRC Press is an imprint of Taylor & Francis Group, LLC

Reasonable efforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences of
their use. The authors and publishers have attempted to trace the copyright holders of all m
­ aterial
reproduced in this publication and apologize to copyright holders if permission to ­publish in this
form has not been obtained. If any copyright material has not been acknowledged, please write
and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, r­ eproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any ­information
storage or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, access www.­copyright.
com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA
01923, 978-750-8400. For works that are not available on CCC please contact ­mpkbookspermissions
@tandf.co.uk

Trademark notice: Product or corporate names may be trademarks or registered trademarks and
are used only for identification and explanation without intent to infringe.

Library of Congress Cataloging‑in‑Publication Data


Names: Kumar, Pramod, editor. | Sharmila, R., editor. | Tomar, Anuradha,
editor. Title: Emerging technologies in computing : theory, practice and
advances / edited by Pramod Kumar, Anuradha Tomar, R. Sharmila.
Description: First edition. | Boca Raton : CRC Press, 2021. | Includes
bibliographical references and index. Identifiers: LCCN 2021027695 |
ISBN 9780367633646 (hbk) | ISBN 9780367639501 (pbk) | ISBN 9781003121466 (ebk)
Subjects: LCSH: Computer science—Technological innovations.
Classification: LCC QA76.24 .E44 2021 | DDC 004—dc23
LC record available at https://lccn.loc.gov/2021027695

ISBN: 978-0-367-63364-6 (hbk)


ISBN: 978-0-367-63950-1 (pbk)
ISBN: 978-1-003-12146-6 (ebk)

DOI: 10.1201/9781003121466

Typeset in Minion
by codeMantra
Contents

Editors, ix
Contributors, xi

Chapter 1   ◾   Introduction to Emerging Technologies in


Computer Science and Its Applications 1
Umang K ant and Vinod Kumar

Chapter 2   ◾   Artificial Intelligence Innovations:


Infrastructure and Application for Advances
in Computational Supremacy 33
Shruti Gupta, Ashish Kumar, Pramod Kumar,
and Pastor Arguelles

Chapter 3   ◾   Essentials of Internet of Things: Design


Principles and Architectures for Its
Application in Various Domains 59
Hariprasath Manoharan, Abirami Manoharan,
Shankar T., Yuvaraja T., and Dinesh Kumar

Chapter 4   ◾   Theories of Blockchain: Its Evolution and


Application for Security, Privacy and Trust
Management 79
Navneet Arora

v
vi   ◾    Contents

Chapter 5   ◾   Advances in Robotic Systems: Design,


Modeling, Development and Control
Principles 103
Priyanka Dhuliya, Sunil Semwal, Piyush Dhuliya,
and Diwaker Pant

Chapter 6   ◾   Data Science Practices: Running the Data


Experiments Effectively for Statistical and
Predictive Analytics on Data 117
A atif Jamshed, Asmita Dixit, Amit Sinha, K anika Gupta,
and Manish Kumar

Chapter 7   ◾   The Actuality of Augmented Reality:


Understanding the Realm of the
Theoretical Framework for Embracing
Its Potential Facilities 135
Ruchi Goel, Pavi Saraswat, Prashant Naresh, Anuradha
Tomar, and Yogesh Kumar Sharma

Chapter 8   ◾   Emerging Technologies and Cyber Security:


New Horizons of Cyber Security Solutions 153
Neha Tyagi, Hoor Fatima, and Nitin R akesh

Chapter 9   ◾   3D Printing Procedures: Explore the


Endless Possibilities of 3D Object Design,
Modeling and Manufacturing 171
R ajesh Pant, Pankaj Negi, Jasmeet K alra, and Sandeep Tiwari

Chapter 10   ◾   Multimedia Big Data: The Multimedia


Big Data Impact on Data Storage,
Management and Security Strategies for
Data Analytics 191
Fatima Ziya, Meenu Shukla, R. Sharmila, Umang K ant,
and Jawwad Z aidi
Contents   ◾    vii

Chapter 11   ◾   Voice Assistants and Chatbots Hands


on Essentials of UI and Feature Design
Development and Testing 217
Pavi Saraswat, Bharat Bhardwaj, Prashant Naresh,
Alaknanda Ashok, R aja Kumar, and Manish Kumar

Chapter 12   ◾   Future Communication Networks:


Architectures, Protocols, and Mechanisms
for the Next-Generation Internet 241
Dhananjay Kumar, Sangram R ay, and Sharmistha Adhikari

INDEX, 269
Editors

Pramod Kumar is Professor, Head & Dean of Research at Krishna


Engineering College, India. He previously served as Director of the Tula’s
Institute, Dehradun, Uttarakhand. With over 20 years of experience in
Computer Science, he is a Senior Member of IEEE (SMIEEE), has pub‑
lished research papers in various International Journals and Conferences
and authored numerous book chapters, and has organized more than 10
IEEE International Conferences.

Anuradha Tomar is a Postdoctoral Researcher in the EES Group at


Eindhoven University, the Netherlands. She is a member of the European
Commission’s Horizon 2020, UNITED GRID project. She is also an
Associate Professor with the Electrical Engineering Department at JSS
Academy of Technical Education, India. She is a Senior Member of IEEE,
Life Member of ISTE, IETE, IEI, and IAENG. She has published over 70
research/review papers in IEEE Journals and has registered seven patents.

R. Sharmila is an Assistant Professor in the Department of Computer


Science Engineering at Krishna Engineering College, India. Her research
is highly interdisciplinary, spanning a wide range of topics, including
Wireless Sensor Networks, Digital image Processing, Cryptography and
Information Security, and Blockchain.

ix
Contributors

Sharmistha Adhikari Piyush Dhuliya


Department of Computer Science Department of Electronics and
and Engineering Communication Engineering
National Institute of Technology Tula’s Institute
Sikkim, India Dehradun, India

Pastor Arguelles Priyanka Dhuliya


College of Computer Studies Department of Electronics
University of Perpetual Help Engineering
System DALTA Graphic Era Hill University
Calabarzon, Philippines Dehradun, India

Navneet Arora Asmita Dixit


Department of Computer Department of IT
Science ABES Engineering College
University of Liverpool Ghaziabad, India
Liverpool, England
Hoor Fatima
Alaknanda Ashok Department of Computer Science
Department of Electrical and Engineering
Engineering SET, Sharda University
GBPUAT Greater Noida, India
Uttarakhand, India
Ruchi Goel
Bharat Bhardwaj Department of Computer Science
Department of IT and Engineering
AKTU AKTU
Lucknow, India Lucknow, India

xi
xii   ◾    Contributors

Kanika Gupta Dhananjay Kumar


Department of IT Department of Computer Science
ABES Engineering College and Engineering
Ghaziabad, India National Institute of Technology
Sikkim, India
Shruti Gupta
Department of CSE Dinesh Kumar
National Institute of Technology OSI Soft Australia Pvt. Ltd.
Delhi, India Perth, WA, Australia

Aatif Jamshed
Department of IT Manish Kumar
ABES Engineering College Department of CSE
Ghaziabad, India Krishna Engineering College
Ghaziabad, India
Jasmeet Kalra
Department of Mechanical Pramod Kumar
Engineering Department of CSE
Graphic Era Hill University Krishna Engineering College
Dehradun, India Ghaziabad, India

Umang Kant
Department of Computer Science Raja Kumar
and Engineering School of Computer Science &
Delhi Technological University Engineering
Delhi, India Head of Research - Faculty of
and Innovation and Technology
Department of Computer Science Taylor’s University
and Engineering Malaysia
Krishna Engineering College
Ghaziabad, India Vinod Kumar
Department of Computer Science
Ashish Kumar and Engineering
Department of CSE Delhi Technological University
Krishna Engineering College Delhi, India
Ghaziabad, India
Contributors   ◾    xiii

Abirami Manoharan Nitin Rakesh


Department of Electrical and Department of Computer Science
Electronics Engineering and Engineering
Government College of SET, Sharda University,
Engineering Greater Noida, India
Srirangam, India
Sangram Ray
Hariprasath Manoharan Department of Computer Science
Department of Electronics and and Engineering
Communication Engineering National Institute of Technology
Panimalar Institute of Technology, Sikkim, India
Chennai, India
Pavi Saraswat
Prashant Naresh Department of Computer Science
Department of Computer Science and Engineering
and Engineering AKTU
AKTU Lucknow, India
Lucknow, India
Sunil Semwal
Pankaj Negi Department of Electronics and
Department of Mechanical Communication Engineering
Engineering Tula’s Institute
Graphic Era Hill University Dehradun, India
Dehradun, India
Shankar T.
Diwaker Pant Department of Electronics and
Department of Electronics and Communication Engineering
Communication Engineering Government College of
Tula’s Institute Engineering
Dehradun, India Srirangam, India

Rajesh Pant Yogesh Kumar Sharma


Department of Mechanical Department of Computer Science
Engineering and Engineering
Graphic Era Hill University AKTU
Dehradun, India Lucknow, India
xiv   ◾    Contributors

R. Sharmila Neha Tyagi


Department of Computer Science Department of Computer Science
and Engineering and Engineering
Krishna Engineering College SET, Sharda University
Ghaziabad, India Greater Noida, India

Meenu Shukla Yuvaraja T.


Department of Computer Science MOBI‑Mobility, Logistics and
and Engineering Automotive Technology
Krishna Engineering College Research Centre
Ghaziabad, India Vrije Universiteit Brussel
Ixelles, Brussels, Belgium
Amit Sinha
Department of IT
ABES Engineering College Jawwad Zaidi
Ghaziabad, India Dr. Akhilesh Das Gupta Institute
of Technology & Management
Sandeep Tiwari Delhi, India
Department of Mechanical
Engineering Fatima Ziya
Krishna Engineering College Department of Computer Science
Ghaziabad, India and Engineering
Krishna Engineering College
Anuradha Tomar Ghaziabad, India
Department of Instrumentation &
Control Engineering
Netaji Subhas University of
Technology, Govt. of NCT of
Delhi
Delhi, India
Chapter 1

Introduction to
Emerging Technologies
in Computer Science
and Its Applications
Umang Kant and Vinod Kumar
Delhi Technological University

CONTENTS
1.1 Introduction 2
1.1.1 Computer Vision 2
1.1.2 Deep Learning 6
1.1.3 Internet of Things (IoT) 9
1.1.4 Quantum Computing 11
1.1.5 Edge Computing 14
1.1.6 Fog Computing 16
1.1.7 Serverless Computing 17
1.1.8 Implanted Technology 19
1.1.9 Virtual, Augmented, and Mixed Reality 23
1.1.10 Digital Twin 25
1.2 Conclusions 28
References 29

DOI: 10.1201/9781003121466-1 1
2   ◾    Emerging Technologies in Computing

1.1 INTRODUCTION
The extensive and exhaustive research carried out in the field of Artificial
Intelligence (AI) is a confirmation that it finds its applications in every
field of life now-a-days. Researchers and scientists are making every pos‑
sible effort to help the world by using AI, in turn making machines which
think and maybe act like humans. We are aware that AI is like an umbrella
that shelters numerous technologies under it and hence it is perceived as
an interdisciplinary field with s­ everal approaches. AI is an eclectic branch
of Computer Science that aims to respond to Turing’s question in assent‑
ing and is responsible for developing smart machines capable of executing
tasks that require human intelligence and is responsible for a visible para‑
digm shift in every sector of the technological world and thereby giving
birth to new concepts and technologies on the way. Machine Learning is
an application of AI, which aims at offering the machines or systems the
capability to learn on its own and improve its experiences at every turn
without human intervention. In order to make the machines learn, we
need to provide them with ample amount of data so that machines can
analyze some pattern in the data (if any) and make better decisions based
on observing the data, working on the patterns of the data and then train‑
ing the algorithms using that data [1,2]. Learning process is initiated by
observing the data as mentioned above, and learning techniques can be as
follows: supervised, unsupervised, semi-supervised, or reinforced based
on the data to be trained and the application to be addressed. Hence, the
main aim of Machine Learning is to allow the machines to learn on their
own in the absence of human assistance and adjust their output or actions
accordingly [3]. AI has given birth to many new technologies and Machine
Learning is one of the ways to achieve AI. We will now be discussing
some recent technologies which have been researched the most these days
and are finding their way in every aspect of business, education, health,
­commercial, and other fields of life.

1.1.1 Computer Vision
Computer vision is such a type of AI which we all have naturally experi‑
enced in our lives in multiple ways without even realizing it. Such is the
power of human brain and senses. Computer vision aims to replicate this
power of human brain and senses using machines. Humans can (i) describe
the content of the image or video they have seen, (ii) summarize an image
Introduction to Emerging Technologies   ◾    3

or video they have seen, and (iii) recognize a face or an object that they
have seen [4]. Hence, a machine can take advantage of human’s capa‑
bility of remembering things and people they have seen and make their
machines learn the same capability using algorithms dedicated for this
process. We all are aware that taking and uploading a picture or video on
internet has become extremely easy; all we need is a smartphone and some
social media platform. According to recent articles, around hundreds of
videos are uploaded per minute on YouTube social platform; and the same
is the case with other social platforms such as Facebook, Instagram, and
Twitter. Around 3 billion images alone are shared online each day, maybe
more. These images and videos can be easily recognized and summarized
by humans but to train the machine for the same capability, we first need
the machine to be able to index the content and then be able to search the
content in that video or photograph. The Machine Learning algorithms
will need to (i) find what the image or video contains and (ii) utilize the
metadata descriptions provided by the person who has uploaded that
image or video.
In simple terms, computer vision can be defined as a field of study
focused on the problem of helping computers to see [5]. The goal of com‑
puter vision is to use the observed image data to infer something about
the world [6]. Computer vision is an interdisciplinary technological field
which deals with replicating and observing the human vision and brain
processing system and facilitating the machines to identify and process
items in images and videos in a similar manner as humans are capable
of. Due to the advancements in AI, Neural Networks (NNs), and Deep
Learning, computer vision has taken great leaps in recent years and is still
a hot field among researchers [7]. Computer vision is also clearly a sub‑
field of AI, Machine Learning, and Deep Learning, as it deals with overly
complex data identification and interpretation. Due to recent advance‑
ments, computer vision has been able to successfully outdo humans in
tasks of identifying, indexing, and labeling objects in the images or vid‑
eos. This must have been experienced by many users while tagging people
in images using social media platforms such as Facebook. The algorithms
are trained in such an extensive manner that now they can perform bet‑
ter than humans in identifying and tagging items or people [8]. Another
factor which is responsible for the better working of machines to achieve
computer vision is that over the past few years, ample amount of data is
being generated these days. Large amount of data generated is being used
4   ◾    Emerging Technologies in Computing

for training of Machine Learning algorithms which, in turn, leads to bet‑


ter results. The concept and aim of computer vision can be understood by
referring to Figure 1.1.
Research and experiments on computer vision can be traced back to
1950s. But it was used commercially in 1970s to distinguish between hand‑
written text and typed text. Back then, there was not as much abundance
of data as is the case now. Today, the applications have also increased as
there is a huge amount of data, better trained algorithms and hardware.
The data is so huge that these days data scientists are being hired to just
analyze and work upon the data. It is the job of the data scientists to filter
the data and select the data sets to be used for training of the algorithms.
The computer vision market is expected to reach $48.6 billion by early
2022 [5].
Another topic of discussion is how does computer vision work? This
question is not simple to answer as computer vision is inspired by the
human brain. Since it is still not clear how human brain and eyes work
to interpret the objects, it is difficult to approximate the same concept in
algorithms. All we can say is that computer vision mimics the way human
brain works. However, it is difficult to comment on how well the devel‑
oped algorithms will be able to copy the human brain and implement it

FIGURE 1.1 Object detection and classification. (From Jarvis, R.A., IEEE
Transactions on Pattern Analysis and Machine Intelligence, 122–139, 1983. With
permission.) [5].
Introduction to Emerging Technologies   ◾    5

on machines. Current algorithms are heavily using Pattern Recognition


approach to achieve computer vision. Hence, to make the computer
understand and to train the algorithm, the approach used is to feed the
system with a lot of data (i.e. images of the objects to be identified). Larger
the data set, better labeling would be achieved. Then, these labeled images
or objects would be subjected to various algorithms or software to iden‑
tify the patterns with the objects and thereby in classification (Figure 1.1).
When a large data set of images is fed to the machine, the algorithms
analyze the angles, shapes, colors, and borders of the objects and the dis‑
tance between various objects. After this analysis, the machine would
match these unlabeled images with the labeled images and put them in
the respective image set of objects (single object image or multiple object
image). The basic working of computer vision algorithm is divided into (i)
classification, (ii) localization, (iii) object detection, and (iv) instance seg‑
mentation. Algorithms train better when the input image data set is big,
even though large image data set means larger memory requirements, but
in the end, we get a better trained algorithm.
In recent years, Machine Learning and Deep Learning technology pro‑
duce better results as compared to previous efforts where the working of
machines was extremely limited. Earlier, a set manual approach was used
where first a database was created in which all captured images were stored
that needed analysis. Second, all images had to be annotated, i.e. many key
points were added to the images for labeling them, and manually rules
were coded for each object in the image. Third, new images were cap‑
tured, and the entire process had to be repeated. When Machine Learning
came into the picture, the manual rule coding was eliminated and feature
extraction using various Machine Learning algorithms such as Support
Vector Machine (SVM) and linear regression were used to identify pat‑
terns and classify further. However, in recent years, Deep Learning has
given a new approach to apply Machine Learning to the data set by using
NNs. The detailed working of Deep Learning for computer vision is out of
the scope of this chapter.
Computer vision finds many applications today and users are making
use of computer vision knowingly or unknowingly. The applications of
computer vision include (i) computer vision in facial recognition, (ii) com‑
puter vision in self-driving cars, (iii) computer vision in healthcare, and
(iv) computer vision in augmented reality (AR).
6   ◾    Emerging Technologies in Computing

1.1.2 Deep Learning
Deep Learning is a subset of Machine Learning that aims to further auto‑
mate the functions of a human being.
It is a branch based on the building algorithms that learn and re-learn
by mimicking the functions of a human brain.
Just like the NN helps humans learn from their experiences, artificial
neural networks (ANNs) help an algorithm learn and execute the task.
ANNs, also generally called NNs, are computing systems vaguely
inspired by the biological NNs that constitute animal brains.
An ANN comprises multiple artificial neurons (or nodes) arranged in a
network of multiple layers, which loosely models the NN of the biological
brain (Figure 1.2).
Each connection, like the synapses in a biological brain, can transmit a
signal to other neurons.
The “signal” comprises input data (in real numbers) and then processes
it before sending it further down the chain. Every neuron processes the
data before transmitting it further.
Different layers of the neurons perform different transformations on
their inputs. Signals travel from the first layer (the input layer) to the last
layer (the output layer), possibly after traversing the layers multiple times.

FIGURE 1.2 Artificial neural network layers.


Introduction to Emerging Technologies   ◾    7

There are a few different types of ANNs designed to execute different


tasks. The major ones are listed below.

• Multilayer Perceptron Networks.


• Convolutional NNs.
• Long Short-Term Memory or Recurrent NNs.

Once the data is prepared for processing, it is fed to the NN in the first
layer, also known as the input layer.
Now the neurons process this data and send it further down to the next
layer. Each layer is designed to perform a specific task. The middle layers
are also called the hidden layers.
Once the data is sequentially processed by each hidden layer, the model
transmits the processed data to the output layer (the last layer).
In the output layer, the data is further processed finally as designed and
gives out the final model. This one pass of the data through the network is
called an epoch.
This output is then tested for accuracy; most often than not, the output
of the first epoch is far from being correct. Therefore, this information is
passed back to the network in reverse order so that the network can learn
from its mistakes. This is called back-propagation.
The network then tweaks its parameters further and processes the data
in a similar fashion. This process is continued for several epochs until the
model starts producing acceptably accurate results.
The theory, model, and the data existed earlier as well, though it is only the
advancements in the technology that have empowered this vision into reality.
Today we have access to sophisticated data management architectures
and the computational power to process this massive data. This has made
the access to these technologies fairly simple.
The most prominent technologies on this front are TensorFlow, Keras,
and Pytorch that have enabled everyone to access the state-of-art technol‑
ogy of Deep Learning.
There are not many differences between Machine Learning and Deep
Learning. Here are a few.
While Machine Learning is based on pre-defined models or algorithms,
Deep Learning is built on NN architecture. It further removes the need for
human intervention for feature selection in the data.
8   ◾    Emerging Technologies in Computing

Since Deep Learning is state-of-the-art, it requires high computational


power to be processed, which is now possible with the advanced GPUs.
Deep Learning finds its applications in several industries. Some of the
major applications of Deep Learning are as follows:

• Self-driving cars
• News aggregation and fraud news detection
• Natural language processing
• Virtual assistants
• Recommender systems
• Visual recognition
• Credit fraud detection
• Healthcare and diagnostics

There are many more. The possibilities are endless (Figure 1.3).

Artificial
Intelligence

Machine Learning

Deep Learning

FIGURE 1.3 Relationship between artificial intelligence, machine learning, and


deep learning.
Introduction to Emerging Technologies   ◾    9

1.1.3 Internet of Things (IoT)


Researchers describe Internet of Things (IoT) as a wide network of physi‑
cal devices or objects connected with each other over the internet for
the purpose of exchanging data and communication with each other, as
depicted in Figure 1.4. These devices can also be called as smart devices
as they require minimum or no human intervention for their process‑
ing. These physical devices are embedded with sensors and technologies
for establishing connection with other devices. Today such devices range
from basic household devices to much sophisticated engineering devices.
As predicted by experts, the number of connected IoT devices is expected
to increase from current 8 billion to 45 billion by 2025 or maybe more [9].
Examples of such devices range from a smart coffee maker, smart light‑
bulb, smart toy, baby monitor, and driverless vehicle to a smart city. A
device being controlled by a smartphone or a controlled environment fall
under the category of IoT or smart devices. IoT has become one of the
most sought after technologies of recent times to provide effortless and
continuous communication between people and things (devices) [10]. This
has made every possible device connect to other devices over the internet
via embedded devices. These devices cooperate by making the physical
world meet the digital world [11].

FIGURE 1.4 Device connectivity over the internet.


10   ◾    Emerging Technologies in Computing

The connection of a large number of embedded devices over the internet


has been possible due to the availability of mobile technologies, low-power
sensor technologies, low-cost computing capabilities, cloud connectivity,
Machine Learning and big data analytics, and AI. These devices commu‑
nicate, share, and collect data with other embedded devices with mini‑
mum human intervention; hence, the demand of IoT devices is increasing
gradually. IoT has large business scope due to its benefits in marketplace.
Benefits include: (i) new IoT-based business models, (ii) increased produc‑
tivity due to smart connectivity, (iii) efficient business operations, (iv) bet‑
ter revenue modes, and (v) smooth connection between physical business
world and digital world [12]. Due to these benefits, IoT has become wide‑
spread in the industrial world and there is a new classification of IoT:
Industrial Internet of Things (IIoT). IIoT refers to the merging of the IoT
technology in industrial environments. To integrate IoT in industrial
settings, industries have used cloud, analytics, Machine Learning and
machine-to-machine (M2M) communication for wireless automation and
control among connected devices.
This integration of IoT in industries has led to a large number of
­application areas such as smart homes, smart cities, smart logistics, smart
manufacturing, smart power grids, smart digital supply chains, and pre‑
dictive logistics and maintenance, among others.
Devices have been able to connect digitally over the internet low-power
chips and cloud technologies, and the device connectivity will keep on
increasing as discussed above. However, this device connectivity is highly
vulnerable to security threats as these devices collect and communicate
almost all of the user’s sensitive data over the internet. Until now, security
has been the biggest area of concern and the most researched area of IoT.
Researchers are continuously working on to make the devices self-capable
in order to find the patches of the detected faults in security. These soft‑
ware faults are regularly discovered and hence their patches are of utmost
requirement, but many devices lack the capability to remove the risk factors
of these faults, thereby keeping the devices and users at permanent risk,
ultimately making the user vulnerable to hackers. Hackers can hack the
sensors of the device and control the entire environment by manipulating
the sensors without the user’s knowledge, and this threat can be minor or
catastrophic. One example of such security vulnerability in users wearing
a smartwatch is hackers being able to eavesdrop the user’s conversations
even when the microphone is switched off or track the user’s location all
Introduction to Emerging Technologies   ◾    11

the time even when internet is disabled. And such security threats put all
users at risks in using small household devices and business or industrial
devices. As discussed above, IoT connects physical devices with digital
devices; hence, the real world between the two is always at risk. Hence, the
current area of research in IoT these days revolves mostly around security
concerns.
As security is a major concern in IoT, so is privacy. By always being con‑
nected over the internet using embedded devices, privacy takes a back seat
in the entire process and hence the security lapse. IoT models have user’s
data which can be manipulated to achieve some cause or worse it can be
sold to companies or can be made available over the dark web. Hence, it
becomes equally important for the users to be aware about the bargain
they make while using these smart devices. Apart from security and pri‑
vacy, other IoT concerns can be cost, connectivity, user’s acceptance, and
device standards.
IoT has given rise to big data analytics as IoT generates vast amount
of data on a daily basis and hence has given companies vast data sets to
analyze and work upon. This data can be in many different forms such as
images, videos, audios, pressure or temperature readings or heartbeat, or
other sensor readings. This vast amount of data has given rise to metadata,
which contains data about data. This huge data cannot be stored in the
company’s data warehouse or other resources, but on the cloud. Hence, IoT,
in turn, has given rise to the need for cloud services with every company
aiming to achieve the IoT business model. These days, from small orga‑
nizations and institutes to large multinational companies, all are making
use of cloud services to better manage the data. With better connectivity
(3G, 4G, 5G, CDMA, GSM, and LTE networks) and new technologies, the
IoT market will continue to evolve even with security and privacy issues.

1.1.4 Quantum Computing
Current generation computers are based on classical physics and therefore
on classical computing. In theory, i.e. Turing machines and in practice,
i.e. PCs, laptops, smartphones, tablets all are current generation comput‑
ers and work on the principle of classical computing and are called clas‑
sical computers. These classical computers can only be in one state at a
particular time and their operations can only have local effects, i.e. they
are limited by locality [13]. As we are aware, the fundamental principle
behind the computer systems is the ability to store, fetch, and manipulate
12   ◾    Emerging Technologies in Computing

information. This information is stored in the form of bits, i.e. binary 0


and 1 states, and all the manipulation is carried out by using these binary
0 and 1 states only [14]. These two bits are used in all classical computers.
However, we have shifted from classical physics to quantum physics, as
the real world behaves quite randomly and this behavior is not fixed; and
to capture this random behavior of world using the machines, we cannot
always use classical computers, or computers using classical computing as
they remain in a single state at a particular time as discussed above, hence
the shift from classical computers to quantum computers. A quantum
computer can be in different states at the same time and the different states
can be superimposed upon each other, and hence interference among dif‑
ferent states can be achieved during processing. This superimposition of
states can be achieved by using quantum bits, also called as qubits [14].
Hence, quantum computers manipulate the information stored by apply‑
ing quantum mechanical principle using qubits instead of bits. A cluster
of these quantum computers [15] can be either locally placed or spatially
distributed but, in any case, they can achieve the non-local effects due to
state superimposition.
As discussed above, quantum computing uses the principles of quan‑
tum mechanics and examines the processing power and related properties
of computers. The main aim of quantum computing is to develop quan‑
tum algorithms to be used in quantum computers which would be faster
and better than classical algorithms being used in classical computers [15].
Quantum computing is aimed to speed up the computation and to solve
computationally hard problems which are not only difficult but next to
impossible to solve using classical computers.
The field of quantum computing started with the use of analog quan‑
tum computers in the early 1980s by Yuri Manin [16], Richard Feynman
[17,18], and Paul Benioff [19]. Although the work in this field has not been
progressing at an extremely fast pace, the first noted algorithms in this
field were developed later by Deutsch [20] and Simon [21]. The work on
quantum complexity theory was initiated by Bernstein and Vazirani [14].
The work pace and interest in the field caught up fast in 1994 when Peter
Shor discovered the efficient quantum algorithms for integer factorization
and discrete logarithms problems [20].
Quantum mechanical phenomena use three basic quantum proper‑
ties: (i) superposition: it is a condition where two or more independent
states are combined to yield a new state. An example of such superposition
Introduction to Emerging Technologies   ◾    13

would be the combination of two or more music notes, and the final music
that we hear would be the super positioned note; (ii) Entanglement: it is
a counter-intuitive quantum behavior which is not visible in the classical
environment. Here, the object particles are entangled with each other and
form a new model or environment. This new model behaves in entirely
new ways which is not possible in the classical world and also cannot be
explained using classical computing logic; and (iii) Interference: inter‑
ference of quantum states occurs due to the logic of phase. Due to the
phenomenon of phase, the states undergo interference. This logic of state
interference is similar to the logic of wave interference. In wave interfer‑
ence, the wave amplitudes add when they are in phase, else their ampli‑
tudes cancel each other. To develop a fault-tolerant quantum system and to
enhance the computational capabilities of a quantum computer, research‑
ers are working toward improving the (i) qubit count: the aim to create
more qubit states; more the qubit states, more the options of manipulation
and processing of states; and (ii) low error rates: the aim is to eliminate the
possible noise and errors encountered while working on multiple qubit
states. Low error rates are required to manage qubit states in an efficient
manner and to perform all sequential or parallel operations. Volume is
considered to be a useful metric for analyzing quantum computer capabil‑
ity [14]. Volume measures the correlation between the quality and number
of qubits, the error rates of qubit processing, and the quantum computer
circuit connectivity. Hence, the aim is to develop quantum computers with
large quantum volume for solving computational hard problems [22,23].
The basic motivation to research in the field of quantum comput‑
ing is that the classical computers themselves have become so powerful
and cheap due to miniaturization that they have almost already reached
micro levels where quantum processing and effects are said to occur.
The chip makers have led to such a level of miniaturization that instead
of suppressing the quantum effects in classical computers, researchers
might try to work with them, leading to further miniaturization and
hence more quantum effects. It is too soon to comment on the pressing
question “to what extent will quantum computers be built?” The first
2-qubit quantum computer was developed in 1997, and then a 5-qubit
quantum computer was built in 2001 to find the factor of number 15 [21].
The largest quantum computer up until now has only few dozen qubits.
Hence, the work on quantum computers has been rather slow but at a
steady pace.
14   ◾    Emerging Technologies in Computing

1.1.5 Edge Computing
With the rise in IoT-connected devices, edge computing has also come
into the picture and is transmuting the manner in which data is being
­processed, managed, stored, and distributed to the users by millions
and millions of connected devices around the globe. As discussed in
Section 1.1.3, in IoT, the connected devices generate tremendous amount
of data which is stored and retrieved from either a centralized storage
location or cloud-based storage location. And this data is expected to con‑
tinue to grow at an unprecedented growth. Hence, more time is being
spent in storing and retrieving the generated data. IoT, real-time comput‑
ing power, and faster networking medium and technologies like 5G (wire‑
less) have aided edge computing with a large number of opportunities in
business industries.
As per the definition given by celebrated researcher Gartner, edge
computing is a part of a distributed computing topology in which
information processing is located closer to the edge, also called as
edge nodes (Figure 1.5), where things and people produce or consume
that information [24]. It is understood that edge computing gets the
data storage and its processing closer to where the data is being gen‑
erated. Hence, edge computing is a decentralized distributed comput‑
ing framework bringing the enterprise data closer to data sources [25].

FIGURE 1.5 Edge nodes and edge devices.


Introduction to Emerging Technologies   ◾    15

This, in turn, helps improve bandwidth availability, data control, bet‑


ter insights, swift and appropriate actions, reduce costs, comprehensive
data analysis, and continuous processing. Another advantage of edge
computing has come in the form that the maximum amount of data
generated can be optimized for processing and manipulation, whereas
currently even though a large amount of data is being generated and
stored, majority of it is not being used for processing due to latency and
network issues. Due to edge computing, since the maximum data is to
be utilized for processing, i.e. maximum data potential is extracted, bet‑
ter insights and better analysis (predictive) are achieved which, in turn,
improves the overall quality [25]. This contrasts with the current com‑
puting where the data must be stored at a central location which can be
far away from where the data is being generated. Hence, here the need
for centralized storage location or cloud-based storage location is elimi‑
nated. This concept of storing and processing data closer to the source is
introduced to reduce the problem of (i) bandwidth issues, (ii) real-time
data latency which affects the overall performance of the software or
application, as in edge computing, the data does not travel over a net‑
work to a central storage location or cloud for further processing, and
(iii) this processing environment helps organizations save overall cost.
As per the current studies, almost 75% industry data will be processed
at the edge by 2025 [26]. Currently, only around 8%–10% data is being
processed at the edge. At the moment and also in the past, extraordi‑
nary volumes of data generated by IoT-connected devices have led to the
outperformance of the current infrastructure and network capabilities.
Hence, with the promise of upcoming, faster networking technologies
such as 5G, edge computing gives a solution. The advent of edge com‑
puting has facilitated the work of real-time applications such as smart
homes, self-driving cars, robotics, animation, and video processing,
among many others.
The technology of edge computing also brings a few challenges along
with its advantages. Issues which must be addressed are (i) bandwidth
limitations, (ii) latency issues, (iii) data complexity management, and (iv)
network security and risks, among others. An effective edge computing
model must also be able to (i) seamlessly deploy applications to edge loca‑
tions, (ii) manage data workloads across centralized storage and cloud
locations, (iii) address all security concerns, and (iv) sustain flexibility to
evolve according to the environment.
16   ◾    Emerging Technologies in Computing

Edge computing though different from fog computing finds many sim‑
ilarities with it. This concept is discussed in the following section.

1.1.6 Fog Computing
Fog computing as defined by researchers is a decentralized, distributed
computing technology where the data, storage resources, computation
technology, and respective applications are located at someplace between
the data source (IoT-connected devices) and the cloud [27]. Fog comput‑
ing finds many similarities with edge computing as both bring the data
source and computing near to the location where the data is being created
(see Section 1.1.5). Fog computing also finds similar advantages to edge
computing such as it also reduces data latency and provides better effi‑
ciency among other advantages. Hence, many scholars interchangeably
use both terms, as the basic aim of both technologies is same. Although
the main motive and working are similar in both, there still exists minor
differences between the two. While edge computing implies to getting the
data storage and processing closer to data sources, i.e. edge nodes, fog
computing refers to getting the data storage and processing in-between
the data source and the cloud, i.e. fog nodes [28]. As can be understood by
the name, in nature, fog concentrates between the ground and the cloud,
to be precise it stays in-between but still closer to the cloud. Hence, the
term fog computing has been coined by Cisco in 2015 by the company’s
product line manager, Ginny Nichols [29]. Fog and edge computing can
be viewed as two sides of a coin, as both complement each other and both
have similar advantages and limitations. The same can be understood by
referring to Figure 1.6.
Fog computing along with edge computing is viewed as an alternative
to cloud computing. Both retain few properties of cloud computing, at
the same time maintaining few distinctions [30]. Smart electrical grid,
smart transportation networks, and smart cities are all applications of fog
computing.
The implementation of fog computing requires bringing IoT applica‑
tions at the fog nodes at network edge using fog computing models and
tools. Here, the fog nodes, which are closest to the edge nodes, receive
the data from other edge devices (modems, routers, sensors etc.). After
receiving the data, it is then forwarded to the optimum location for fur‑
ther analysis. In fog computing, the data analysis is based upon the type
of data. The data can be divided into different categories based on the
Introduction to Emerging Technologies   ◾    17

FIGURE 1.6 Representation of cloud, fog, and edge computing. (From Gupta,
B.B., & Agrawal, D.P. (Eds.), Handbook of Research on Cloud Computing and Big
Data Applications in IoT. IGI Global, 2019. With permission.) [31].

time sensitivity. The data which needs immediate analysis and processing
can be put into most time-sensitive category, i.e. the user needs this type
of data immediately, and the categories can hence vary from most time-­
sensitive to medium time-sensitive to least time-sensitive data. Among the
collected data set, the most time-sensitive data is selected and is analyzed
as near to its source as possible to avoid latency issues. The data which is
not time sensitive is sent to aggregation nodes for analysis, which can be
carried out at the approximate time as the user does not require it imme‑
diately. The benefits of fog computing, which are similar to edge comput‑
ing, are (i) reduced latency, (ii) better network bandwidth, (iii) improved
reliability, (iv) reduced costs, and (v) better insights, among others. The
differences are listed in Table 1.1.

1.1.7 Serverless Computing
Serverless computing is an auto-scaling computing because here the com‑
pany or the organization gets backend services from a serverless vendor
[32]. In serverless computing, the backend services are provided based on
user’s requirements (event-driven), and hence the users do not need to
worry about the underlying architecture and infrastructure and just need
to implement the codes and further processing without any conundrum.
An organization taking services from a serverless retailer is only charged
for the extent of the processing carried out by them and they need not pay
18   ◾    Emerging Technologies in Computing

TABLE 1.1 Difference between Fog Computing and Edge Computing


S.
No. Fog Computing Edge Computing

1. In fog computing, the fog nodes are responsible In edge computing, each edge node
for deciding whether the data generated from manages, stores, and processes the
various smart IoT devices is to be processed data right at the edge of the
using its own resources or has to be sent to source, i.e. locally instead of
the cloud for storing and computing. transferring it to the cloud.
2. Fog computing distributes the storage, Edge computing locates the storage
communication, and further processing of and other processing close to the
data close to the cloud keeping it in control of source of data. Here also, the
end user, rather than exactly close to the control is in the hands of end
source of data. users.
3. Fog computing manages the intelligence down Edge computing manages the
to the level of local area network of the intelligence of the edge gateways
network architecture. into the devices generating the
data, thereby keeping the entire
computing close to the devices.
4. In fog computing, fog nodes work with the In edge computing, the cloud
cloud. involvement is eliminated.
5. Fog computing forms a hierarchical-layered Edge computing is limited to
network. individual edge nodes which do
not form a network.

a fixed fee for the server architecture, number of servers, and the band‑
width [33]. The price to be paid scales based on the services provided by
the serverless retailer to the organization; hence, serverless computing is
also called as auto-scaling computing. Serverless retailers provide storage
and database services to the users [34].
As discussed, the users are not aware about the server architecture
and the number of servers used. This does not mean that the environ‑
ment is free from servers; physical servers are present and are used but
the users are not aware about their existence. Since the underlying archi‑
tecture is not considered by the user, this serverless environment becomes
cost-effective and more user-friendly. The cost-effectiveness of this com‑
puting can be referred to in Figure 1.7. Apart from being cost-effective,
serverless computing has other benefits as well: (i) fully managed service,
(ii) dynamic scalability and flexibility, (iii) only pay for the resources or
services used (as discussed above), (iv) enhanced productivity, (v) flawless
connections, (vi) better turnaround time, (vii) no infrastructure manage‑
ment, and (viii) ­efficient use of resources, and others.
Introduction to Emerging Technologies   ◾    19

FIGURE 1.7 Cost-effectiveness of serverless computing.

Although having many advantages, serverless suffers from few disad‑


vantages too. One of the major limitations of serverless is cold start. Cold
start is a condition when the latency increases significantly. When a cer‑
tain serverless function has not been used or called by any user for some
time, the serverless provider closes down that function to save space and
energy, making that function go dormant. Whenever any user calls for
that closed-down function, the serverless vendor will have to again start
and host the function from the scratch, and this entire process takes sig‑
nificant amount of time, which adds to the latency. This condition is called
as cold start. As opposed to cold starts, the functions which are being fre‑
quently used by the users correspond to warm starts.

1.1.8 Implanted Technology
The implanted technology is a type of AI through which we can enhance
the capability of the human body organs with the help of computer vision
[35]. As discussed in Section 1.1.1, computer vision is a technology that
will replicate the power of human brain and senses in a machine, and with
the help of that machine we can enhance the power of our own senses. The
main question arises why the need of implantation technology. In order to
find the answer to this question, we need to look at the uses of implantation
technology first. The need of implantation technology can be better ana‑
lyzed by understanding a few examples where it can be used: (i) humans do
not have a memory that will store that data forever, similar to what a com‑
puter hard disk does, so here we can use brain implantation technology that
will make our memory permanent and we will remember each and every
20   ◾    Emerging Technologies in Computing

moment and experiences of our life from birth until death, (ii) in today’s
environment we see that we are surrounded by many diseases and some
diseases such as cancer that are not easily recognized and hence become
fatal if not recognized earlier. Here, implantation technology can help us
in this way that we can recognize the disease at the beginning so that it can
be cured soon; and (iii) in the future, we can use implantation technology
in our day-to-day life by making use of our organs as smart devices, which,
in turn, will remove the requirement of physical electronic devices such as
smartphones and laptops. because we can use AR and computer vision to
achieve it. Implantation technology uses brain computer interface (BCI)
technology which, in turn, is also a heavily researched interdisciplinary
area. The layout of the BCI is shown in Figure 1.8.
BCI is a technology with which we can provide instructions to the
machine through the input signals of the brain. We all know that our
brain is made up of neurons, as shown in Figure 1.9, and these neurons
have electrical signals (impulses) in them which are generated when a per‑
son thinks or feels anything. The BCI technology will sense those signals
and convert them to computer readable format (binary format). There is
a subset of AI known as Machine Learning that focuses on training the
machine by feeding the data to produce some useful productions and there
is a subset of Machine Learning known as Deep Learning that mainly
focuses on replication of neurons to machine through a NN, as shown in
Figure 1.10 (both Machine Learning and Deep Learning are discussed in
Sections 1.1 and 1.1.2 of this chapter). A NN is a mathematical modeling of
a neuron of our brain and with the help of this network, we try to replicate
the functionality of the brain into our machine.

FIGURE 1.8 Basic BCI diagram.


Introduction to Emerging Technologies   ◾    21

FIGURE 1.9 A neuron.

FIGURE 1.10 A neural network. (From Abdi, H., Journal of Biological Systems,
2(03), 247–281, 1994. With permission.) [36].
22   ◾    Emerging Technologies in Computing

Our neurons work on action potential, and the propagation (Figure 1.11)
of this action potential makes us realize that with implantation technol‑
ogy, we try to sense this action potential and generate a machine level code
from it through which the machine will be able to understand the action
that is needed to be performed. Notwithstanding the shortcomings and
hurdles, with the activity potential component effectively surely known,
further advances in microelectronic advances empowered improvement
of the neural probe, as shown in Figure 1.12. Recent studies have revealed
improvements and progressed the possibility of a neural test by present‑
ing the idea of “neural dust,” an enormous number of remote cathodes
that can be appended straightforwardly to various nerves consequently
­making numerous remote detecting hubs inside the body.
Anticipating what technology is to come in future is an assignment that
engineers generally leave to futurists and sci-fi authors and movie makers.
Nevertheless, as scientists and researchers, the whole science community
takes motivation from such futurists and work towards a common goal
by trying to benefit from these ideas, which invigorates scholarly discus‑
sions and research so that all potential situations may unfurl later on. At the

FIGURE 1.11 Action potential and its flow. (From Sobot, R., IEEE Technology
and Society Magazine, 37, 35–45, 2018. With permission.) [37].
Introduction to Emerging Technologies   ◾    23

FIGURE 1.12 A neural probe. (From Sobot, R., IEEE Technology and Society
Magazine, 37, 35–45, 2018. With permission.) [37].

moment, we observe this technology mostly in theory either in readings or


watching these possibilities in science fiction works. However, as time pro‑
gresses, advances in Machine Learning that mimic living processes, coupled
with the developments in self-healing materials and development of bionic
skin, further deepen the prospect of arriving at a fully bionic post-human.

1.1.9 Virtual, Augmented, and Mixed Reality


The term virtual means proximity and the term reality refers to experi‑
ences as a human being. If we put these two terms together, it becomes vir‑
tual reality (VR) and the meaning becomes an experience which is close
or near to reality. VR is simulation of the real-world phenomenon [38].
This VR is presented to human beings by bringing their sensory organs
in the presence of such a version of reality which does not exist. But our
sensory mechanism and brain perceive it as something real. Our sensory
mechanism and brain are projected to such amusing collections of made
up information that our brain perceives it as real, even though the percep‑
tion is not actually present. In a more technical form, VR is a representa‑
tion of a 3D system-created environment which interacts with a user in
such a way that the user becomes a part of it and is completely immersed
in it. It becomes difficult for the user to distinguish the virtual world from
24   ◾    Emerging Technologies in Computing

the real world and hence take decisions or actions based on the virtual
information being presented. The VR environment can manipulate the
user with the virtual information. Although it sounds simple, our brain
is so complex and evolved that even though confused for some time can
ultimately tell the difference between the virtual world and the real world.
However, during that moment of illusion, the user can be manipulated
by the system. To achieve this VR, the environment has a set of systems
and devices which are used by the users to experience the virtual world.
These devices can be gloves, headsets, glasses, etc. These devices emulate
our sensory organs, i.e. our senses and generate an impression of reality
[39]. The need of VR is simply to engage and attract users and custom‑
ers to a particular field. Also, VR is used whenever there is a scope of
large expenses, danger, or impracticality. VR changes the perception of
the users just by presenting a particular object in the 3D format. VR is
currently being used in various applications, including (i) entertainment,
(ii) sports, (iii) medicine, (iv) architecture, and (v) the arts [40]. Figure 1.13
depicts few examples of VR environments.

FIGURE 1.13 (a) VR in gaming (from European Space Agency), (b) VR in


­ edicine [41], (c) VR in automation [42], and (d) VR in education [43].
m
Introduction to Emerging Technologies   ◾    25

One of the latest and biggest technology trends is AR, which is a varia‑
tion of virtual environments (VE) or VR [44]. Although the concept is old,
the usage has been quite recent. As discussed above, the VE technologies
immerse the users completely inside this virtual environment, where the
user becomes so engrossed that he/she becomes a part of that virtual envi‑
ronment and starts interpreting this virtual world as the real world. The
vehicle testing simulation environments can be classic examples of VR or
VE technologies. The variation comes in the form of AR [45,46], where the
user can make the difference between the virtual world and the real world,
i.e. the virtual objects are superimposed on the real-world objects. Hence,
AR complements reality, rather than entirely replacing it. An example of
AR can be a game named Pokémon Go, where the players can locate, cap‑
ture, and play with Pokémon characters that turn up in the real world and
real objects, such as parks, subways, bathrooms, lawns, and roofs. This
game had become a rage and had to be controlled and banned in many
parts of the world. Apart from games, AR is being used in many other fields
as well: (i) news broadcasting, where the news presenters or anchors can
draw lines and other shapes on the screen; (ii) navigation systems, where
the routes are superimposed on the actual roads; (iii) defense, where the
military ­personnel can view their status and positionings on their helmets;
(iv) medicine, sometimes neurosurgeons use AR projections of a 3D brain
to help them in surgeries; (v) airports, where the ground crew wears AR
glasses to help aircrafts in smooth navigation as well as in landing and take-
offs; (vi) historical sites, making AR projections on historical sites, bringing
them to life and make the tourists re-live the past era; and (vii) robot path
planning; and (viii) IKEA, a furniture company uses an AR application
called as IKEA Place which makes the customers see how the furniture and
other household items would fit in their houses or offices. Figure 1.14 will
help the readers understand the concept of AR in a better way.
Another variation of VR is mixed reality, where the virtual environ‑
ment is combined with the real world [47]; hence in mixed reality, the user
has an interaction with both the real world and virtual world. Although
similar, AR and mixed reality are different from each other. Mixed reality
is an extension of AR. It brings the best of both real and virtual worlds.

1.1.10 Digital Twin
A digital twin is a replica or virtual representation of physical assets or
products. The term digital twin was introduced by Dr. Michael Grieves
26   ◾    Emerging Technologies in Computing

FIGURE 1.14 (a) AR in Pokémon Go Game. (With permission from Marc Bruxelle/
Shutterstock.com.) (b) AR being used in furniture app. (From https://techcrunch.
com/.) [See Ref. 48]. (c) AR being used in phones for suggestions and games. (From
https://www.diva-portal.org/.) [See Ref. 49]. (d) AR used by GMaps. (From https://
www.techannouncement.in/.)

in 2002. Before introducing a digital product in the market, its digital


twin is introduced to study all the dynamics of the product (from an
electron to the whole device). It helps in studying a product’s age, prod-
uct’s reaction in different environments and different types of weather
conditions (they work with the help of IoT sensors). Feedback from the
digital twin of a product influences how the design is built; operation of
a device is created to derive the correct output for the product you are
making [50,51]. Some examples for digital twins in real-life practices are
listed: (i) monitoring wind forms using the digital twin: previously, the
Introduction to Emerging Technologies in Computer Science and Its
Applications
Minsky, M. (1961). Steps toward artificial intelligence. Proceedings of the IRE, 49(1), 8–30.
Mitchell, T. (1997). Introduction to machine learning. Machine Learning, 7, 2–5.
Smola, A. , & Vishwanathan, S. V. N. (2008). Introduction to machine learning. Cambridge
University, UK, 32(34), 2008.
Prince, S. J. (2012). Computer Vision: Models, Learning, and Inference. New York:
Cambridge University Press.
Jarvis, R. A. (1983). A perspective on range finding techniques for computer vision. IEEE
Transactions on Pattern Analysis and Machine Intelligence, 5(2), 122–139.
Jähne, B. , & Haußecker, H. (2000). Computer Vision and Applications. San Diego, CA:
Elsevier Inc.
Russell, S. , & Norvig, P. (2002). Artificial Intelligence: A Modern Approach. Hoboken, NJ:
Prentice Hall
Newman, G. , Wiggins, A. , Crall, A. , Graham, E. , Newman, S. , & Crowston, K. (2012). The
future of citizen science: Emerging technologies and shifting paradigms. Frontiers in Ecology
and the Environment, 10(6), 298–304.
Khan, M. A. , & Salah, K. (2018). IoT security: Review, blockchain solutions, and open
challenges. Future Generation Computer Systems, 82, 395–411.
Biswas, A. R. , & Giaffreda, R. (2014, March). IoT and cloud convergence: Opportunities and
challenges. In 2014 IEEE World Forum on Internet of Things (WF-IoT) (pp. 375–376). IEEE,
Seoul, Korea (South).
Lee, I. , & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and
challenges for enterprises. Business Horizons, 58(4), 431–440.
Ziegler, J. F. (Ed.). (1992). Handbook of Ion Implantation Technology (pp. 92–93).
Amsterdam: North-Holland.
Gubbi, J. , Buyya, R. , Marusic, S. , & Palaniswami, M. (2013). Internet of Things (IoT): A
vision, architectural elements, and future directions. Future Generation Computer Systems,
29(7), 1645–1660.
Bernstein, E. , & Vazirani, U. (1997). Quantum complexity theory. SIAM Journal on
Computing, 26(5), 1411–1473.
Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms
on a quantum computer. SIAM Review, 41(2), 303–332.
Manin, Y. I. (1980). Vychislimoe i nevychislimoe (Computable and Noncomputable), Moscow:
Sov.
Feynman, R. P. (1982). Simulating physics with computers. International Journal of
Theoretical Physics, 21(6/7), 133–154.
Feynman, R. P. (1985). Quantum mechanical computers. Optics News, 11(2), 11–20.
Benioff, P. (1982). Quantum mechanical Hamiltonian models of Turing machines. Journal of
Statistical Physics, 29(3), 515–546.
Deutsch, D. (1991). Rapid solution of problems by quantum computation. Proceedings of the
Royal Society A, 435, 563–574.
Simon, D. R. (1997). On the power of quantum computation. SIAM Journal on Computing,
26(5), 1474–1483.
Vandersypen, L. M. , Steffen, M. , Breyta, G. , Yannoni, C. S. , Cleve, R. , & Chuang, I. L.
(2000). Experimental realization of an order-finding algorithm with an NMR quantum
computer. Physical Review Letters, 85(25), 5452.
Steffen, M. , DiVincenzo, D. P. , Chow, J. M. , Theis, T. N. , & Ketchen, M. B. (2011).
Quantum computing: An IBM perspective. IBM Journal of Research and Development, 55(5),
13–21.
Zhou, Z. , Chen, X. , Li, E. , Zeng, L. , Luo, K. , & Zhang, J. (2019). Edge intelligence: Paving
the last mile of artificial intelligence with edge computing. Proceedings of the IEEE, 107(8),
1738–1762.
Satyanarayanan, M. (2017). The emergence of edge computing. Computer, 50(1), 30–39.
Ahmed, E. , Ahmed, A. , Yaqoob, I. , Shuja, J. , Gani, A. , Imran, M. , & Shoaib, M. (2017).
Bringing computation closer toward the user network: Is edge computing the solution. IEEE
Communications Magazine, 55(11), 138–144.
Vaquero, L. M. , & Rodero-Merino, L. (2014). Finding your way in the fog: Towards a
comprehensive definition of fog computing. ACM SIGCOMM Computer Communication
Review, 44(5), 27–32.
Bonomi, F. , Milito, R. , Zhu, J. , & Addepalli, S. (2012, August). Fog computing and its role in
the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud
computing (pp. 13–16), Helsinki, Finland.
Yi, S. , Hao, Z. , Qin, Z. , & Li, Q. (2015, November). Fog computing: Platform and
applications. In 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies
(HotWeb) (pp. 73–78). IEEE, Washington, DC.
Yi, S. , Li, C. , & Li, Q. (2015, June). A survey of fog computing: Concepts, applications and
issues. In Proceedings of the 2015 workshop on mobile big data (pp. 37–42).
Gupta, B. B. , & Agrawal, D. P. (Eds.). (2019). Handbook of Research on Cloud Computing
and Big Data Applications in IoT. IGI Global.
Baldini, I. , Castro, P. , Chang, K. , Cheng, P. , Fink, S. , Ishakian, V. , … Suter, P. (2017).
Serverless computing: Current trends and open problems. In Sanjay Chaudhary , Gaurav
Somani , Rajkumar Buyya (eds.), Research Advances in Cloud Computing (pp. 1–20).
Springer, Singapore.
McGrath, G. , & Brenner, P. R. (2017, June). Serverless computing: Design, implementation,
and performance. In 2017 IEEE 37th International Conference on Distributed Computing
Systems Workshops (ICDCSW) (pp. 405–410). IEEE, Atlanta, GA.
Jonas, E. , Schleier-Smith, J. , Sreekanti, V. , Tsai, C. C. , Khandelwal, A. , Pu, Q. , …
Gonzalez, J. E. (2019). Cloud programming simplified: A Berkeley view on serverless
computing. arXiv preprint arXiv:1902.03383.
Li, H. , Ota, K. , & Dong, M. (2018). Learning IoT in edge: Deep learning for the Internet of
Things with edge computing. IEEE Network, 32(1), 96–101.
Abdi, H. (1994). A neural network primer. Journal of Biological Systems, 2(3), 247–281.
Sobot, R. (2018). Implantable technology: History, controversies, and social implications
[commentary]. IEEE Technology and Society Magazine, 37(4), 35–45.
Ryan, M. L. (2001). Narrative as virtual reality. Immersion and Interactivity in Literature,
357–359.
Burdea, G. C. , & Coiffet, P. (2003). Virtual Reality Technology. John Wiley & Sons.
Zheng, J. M. , Chan, K. W. , & Gibson, I. (1998). Virtual reality. IEEE Potentials, 17(2), 20–23.
Riener, R. , & Harders, M. (2012). Virtual Reality in Medicine. Springer Science & Business
Media.
Banerjee, P. P. (2009). Virtual reality and automation. In Springer Handbook of Automation
(pp. 269–278). Berlin, Heidelberg: Springer.
Gupta, J. (2018). “How to transform classroom learning with virtual reality in education”,
October 12, 2018 . [Online]. Available: https://elearningindustry.com/transform-classroom-
learning-virtual-reality-education
Azuma, R. T. (1997). A survey of augmented reality. Presence: Teleoperators & Virtual
Environments, 6(4), 355–385.
Furht, B. (Ed.). (2011). Handbook of Augmented Reality. New York: Springer Science &
Business Media.
Carmigniani, J. , Furht, B. , Anisetti, M. , Ceravolo, P. , Damiani, E. , & Ivkovic, M. (2011).
Augmented reality technologies, systems and applications. Multimedia Tools and
Applications, 51(1), 341–377.
Cohen, R. (2009). U.S. Patent No. 7,564,469. Washington, DC: U.S. Patent and Trademark
Office.
Perez, S. (2018). “Wayfair’s Android app now lets you shop for furniture using augmented
reality”, March 20, 2018 . [Online]. Available: https://techcrunch.com/2018/03/20/wayfairs-
android-app-now-lets-you-shop-for-furniture-using-augmented-reality/
Henrysson, A. (2007). Bringing augmented reality to mobile phones(Doctoral dissertation,
ACM).
Tao, F. , Zhang, M. , Cheng, J. , & Qi, Q. (2017). Digital twin workshop: A new paradigm for
future workshop. Computer Integrated Manufacturing Systems, 23(1), 1–9.
Zheng, Y. , Yang, S. , & Cheng, H. (2019). An application framework of digital twin and its
case study. Journal of Ambient Intelligence and Humanized Computing, 10(3), 1141–1153.
Haag, S. , & Anderl, R. (2018). Digital twin–Proof of concept. Manufacturing Letters, 15,
64–66.
Cision, “The Future of the Digital Twins Industry to 2025 in Manufacturing, Smart Cities,
Automotive, Healthcare and Transport”, March 24, 2020 . [Online]. Available:
https://www.prnewswire.com/news-releases/the-future-of-the-digital-twins-industry-to-2025-
in-manufacturing-smart-cities-automotive-healthcare-and-transport-301028858.html.

Artificial Intelligence Innovations


Abduljabbar, R. , Dia, H. , Liyanage, S. , et al. 2019. Applications of artificial intelligence in
transport: An overview. Sustainability 11: 189.
Alhassan, T. Q. , Omar, S. S. and Elrefaei, L. A. 2019. Game of Bloxorz solving agent using
informed and uninformed search strategies. Procedia Computer Science 163: 391–399.
Antonopoulos, I. , Robu, V. , Couraud, B. , et al. 2020. Artificial intelligence and machine
learning approaches to energy demand-side response: A systematic review. Renewable and
Sustainable Energy Reviews 130: 109899.
Bělohlávek, R. , Dauben, J. W. and Klir, G. J. 2017. Fuzzy Logic and Mathematics: A
Historical Perspective. Oxford University Press, USA.
Blooshi, L. A. and Nobanee, H. 2020. Applications of artificial intelligence in financial
management decisions: A mini-review. SSRN Electronic Journal.
Bogue, R. 2014. The role of artificial intelligence in robotics. Industrial Robot 41: 119–123.
Boukerche, A. , Tao, Y. and Sun, P. 2020. Artificial intelligence-based vehicular traffic flow
prediction methods for supporting intelligent transportation systems. Computer Networks 182:
107484.
Chassignol, M. , Khoroshavin, A. , Klimova, A. , et al. 2018. Artificial intelligence trends in
education: A narrative overview. Procedia Computer Science 136: 16–24.
Chouard, T. and Venema, L. 2015. Machine intelligence. Nature 521: 435.
Chukwu, N. E. 2019. Applications of artificial intelligence in agriculture: A review.
Engineering, Technology & Applied Science Research 9: 4377–4383.
Duda, R. O. , Hart, P. E. and Stork D. G. 2008. Unsupervised learning and clustering. In
Machine Learning Techniques for Multimedia (pp. 51–90). Springer, Berlin, Heidelberg.
Foote, K. D. 2019. A Brief History of Machine Learning. Data University.
https://www.dataversity.net/a-brief-history-of-machine-learning/ (accessed September 21,
2020 ).
Hardy, Q. History of Machine Learning. Build with Google cloud.
https://cloud.withgoogle.com/build/data-analytics/explore-history-machine-learning/
(accessed September 20, 2020 ).
Jiang, F. , Jiang, Y. , Zhi, H. , et al. 2017. Artificial intelligence in healthcare: Past, present
and future. Stroke and Vascular Neurology 2:e000101.
Jiawei, H. , Pei, J. and Kamber, M. 2012. Data Mining: Concepts and Techniques (Third
edition). Morgan Kaufmann Publishers, USA.
John, M and Ea, F. 1990. Arthur Samuel: Pioneer in machine learning. AI Magazine 11(3):
10.
Kaelbling, L.P. , Littman, M. L. and Moore, A. W. 1996. Reinforcement learning: A survey.
Journal of Artificial Intelligence Research 4: 237–285.
Lary, D. J. , et al. 2016. Machine learning in geosciences and remote sensing. Geoscience
Frontiers 7: 3–10.
Lucian, B. , Babuska, R. , Schutter B. D. , et al. 2010. Reinforcement Learning and Dynamic
Programming using Function Approximators. Taylor & Francis CRC Press, Boca Raton, FL.
Lund, H. 2007. Renewable energy strategies for sustainable development. Energy 32(6):
912–919.
MLK. 2019. Brief History of Deep Learning from 1943–2019 [Timeline]. MLK: Making AI
Simple. https://machinelearningknowledge.ai/brief-history-of-deep-learning/ (accessed
September 20, 2020 ).
Mohri, M. , Rostamizadeh, A. and Talwalkar, A. 2018. Foundations of Machine Learning
(Second edition). The MIT Press, London.
Moravec, H. P. 1983. The Stanford cart and the CMU rover. Proceedings of the IEEE 71:
872–884.
Mosavi A. , et al. 2019. State of the art of machine learning models in energy systems, a
systematic review. Energies 12: 1301.
Perc, M. , Ozer, M. and Hojnik, J. 2019. Social and juristic challenges of artificial intelligence.
Palgrave Communications 5: 61.
Perera, K.S. , Aung Z. and Woon W.L. 2014. Machine learning techniques for supporting
renewable energy generation and integration: A survey. In: Woon, W. , Aung, Z. , Madnick, S.
(eds) Data Analytics for Renewable Energy Integration, vol. 8817. Springer, Cham.
Rokach, L. and Maimon, O. 2005. Clustering methods. In: Maimon, O. , Rokach, L. (eds)
Data Mining and Knowledge Discovery Handbook. Springer, Boston, MA.
Sara Devis, S. and Bekar, J. 2017. Top 12 AI Tools, Libraries, and Platforms. Dzone: A
Devada Media Property. https://dzone.com/articles/ai-tools-and-libraries (accessed
September 20, 2020 ).
Saygin, A. P. , Cicekli, I. and Akman, V. 2000. Turing test: 50 years later. Minds and
Machines 10: 463–518.
Schulz, K. , Hänsch, R. and Sörgel, U. Machine learning methods for remote sensing
applications: An overview. In Proceedings of SPIE 10790, Earth Resources and
Environmental Remote Sensing/GIS Applications IX, Berlin, Germany, 1079002, September
2018.
Sharifzadeh, M. , Sikinioti-Lock, A. and Shah, N. 2019. Machine-learning methods for
integrated renewable power generation: A comparative study of artificial neural networks,
support vector regression, and Gaussian Process Regression. Renewable and Sustainable
Energy Reviews 108: 513–538.
Shi, F. , Wang, J. , Si, J. , et al. 2020. Review of artificial intelligence techniques in imaging
data acquisition, segmentation and diagnosis for COVID-19. In IEEE Reviews in Biomedical
Engineering (Early Access).
Smith, M. J. 2018. Getting value from artificial intelligence in agriculture. Animal Production
Science 60: 46–54.
Stetco, A. , Dinmohammadi, F. , Zhao, X. , et al. 2019. Machine learning methods for wind
turbine condition monitoring: A review. Renewable Energy 133: 620–635.
Touretzky, D. S. Building the Pascaline: Digital computing like it’s 1642’. In SIGCSE ‘15:
Proceedings of the 46th ACM Technical Symposium on Computer Science Education,
Kansas City, Missouri, USA, February 2015, pp. 688.
Voyant, C. , Notton, G. , Kalogirou, S. , et al. 2017. Machine learning methods for solar
radiation forecasting: A review. Renewable Energy 105: 569–582.
Wang, W. and Siau, K. 2019. Artificial intelligence, machine learning, automation, robotics,
future of work and future of humanity: A review and research agenda. Journal of Database
Management 30(1): 61–79.
Warren, M and Pitts, W. 1943. A logical calculus of ideas immanent in nervous activity.
Bulletin of Mathematical Biophysics 5: 115–133.
Widrow, B. and Lehr, M.A. 1990. 30 years of adaptive neural networks: Perceptron, madaline
and backpropagation. Proceedings of IEEE 78(9): 1415–1442.
Wirkuttis, N. and Hadas Klein, H. 2017. Artificial intelligence in cybersecurity. Cyber,
Intelligence, and Security 1: 103–119.
Yannakakis, G. N. and Togelius, J. 2018. Artificial Intelligence and Games. Springer
Publishing Company, Switzerland.
Young, T. , Hazarika, D. , Poria, S. , et al. 2017. Recent trends in deep learning based natural
language processing. IEEE Computational Intelligence Magazine. 13: 55–75.
Yu, K. , Beam, A.L. and Kohane, I.S. 2018. Artificial intelligence in healthcare. Nature
Biomedical Engineering 2: 719–731.
Essentials of Internet of Things
Javed, Farhana , Muhamamd Khalil Afzal , Muhammad Sharif , and Byung Seo Kim . 2018.
“Internet of Things (IoT) Operating Systems Support, Networking Technologies, Applications,
and Challenges: A Comparative Review.” IEEE Communications Surveys and Tutorials 20
(3): 2062–2100. doi:10.1109/COMST.2018.2817685.
Patra, Manoj Kumar. 2017. “An Architecture Model for Smart City Using Cognitive Internet of
Things(CIoT).” Proceedings of the 2017 2nd IEEE International Conference on Electrical,
Computer and Communication Technologies, ICECCT 2017, 492–96.
doi:10.1109/ICECCT.2017.8117893.
Zhang, Zhi Kai , Michael Cheng Yi Cho , Chia Wei Wang , Chia Wei Hsu , Chong Kuan Chen
, and Shiuhpyng Shieh . 2014. “IoT Security: Ongoing Challenges and Research
Opportunities.” Proceedings - IEEE 7th International Conference on Service-Oriented
Computing and Applications, SOCA 2014, 230–234. doi:10.1109/SOCA.2014.58.
Ayad, Soheyb , Labib Sadek Terrissa , and Noureddine Zerhouni . 2018. “An IoT Approach
for a Smart Maintenance.” 2018 International Conference on Advanced Systems and Electric
Technologies, IC_ASET 2018, 210–214. doi:10.1109/ASET.2018.8379861.
Chettri, Lalit , and Rabindranath Bera . 2020. “A Comprehensive Survey on Internet of Things
(IoT) Toward 5G Wireless Systems.” IEEE Internet of Things Journal 7 (1): 16–32.
doi:10.1109/JIOT.2019.2948888.
Köksal, Omer , and Bedir Tekinerdogan . 2019. “Architecture Design Approach for IoT-Based
Farm Management Information Systems.” Precision Agriculture 20 (5): 926–958.
doi:10.1007/s11119-018-09624-8.
Min, Byung Won. 2012. “Design and Implementation of an Integrated Management System
for Smart Libraries.” Communications in Computer and Information Science 310 CCIS:
186–194. doi:10.1007/978-3-642-32692-9_25.
Manoharan, Hariprasath , Adam Raja Basha , Yuvaraja Teekaraman , and Abirami
Manoharan . 2020. “Smart Home Autonomous Water Management System for Agricultural
Applications.” World Journal of Engineering 17 (3): 445–455. doi:10.1108/WJE-07-2019-
0194.
Boton, Conrad. 2016. “Challenges of Big Data in the Age of BIM: A High-Level Conceptual
Pipeline.” Cooperative Design, Visualization, and Engineering 9929 (November): 313–321.
doi:10.1007/978-3-319-46771-9.
Budida, Durga Amarnath M. , and Ram S. Mangrulkar . 2018. “Design and Implementation of
Smart HealthCare System Using IoT.” Proceedings of 2017 International Conference on
Innovations in Information, Embedded and Communication Systems, ICIIECS 2017 2018-
January: 1–7. doi:10.1109/ICIIECS.2017.8275903.
Sarkar, Sayan , and Renata Saha . 2017. “A Futuristic IOT Based Approach for Providing
Healthcare Support through E-Diagnostic System in India.” Proceedings of the 2017 2nd
IEEE International Conference on Electrical, Computer and Communication Technologies,
ICECCT 2017. doi:10.1109/ICECCT.2017.8117810.
Zhou, Hong , Bingwu Liu , and Donghan Wang . 2012. “Design and Research of Urban
Intelligent Transportation System Based on the Internet of Things.” Communications in
Computer and Information Science 312 CCIS (70031010): 572–580. doi:10.1007/978-3-642-
32427-7_82.
Hakim, Inaki M. , and Aldeina Putriandita . 2018. “Designing Implementation Strategy for
Internet of Things (IoT) on Logistic Transportation Sector in Indonesia.” ACM International
Conference Proceeding Series, 23–28. doi:10.1145/3288155.3288165.
Sun, Jianli. 2012. “Design and Implementation of IOT-Based Logistics Management System.”
Proceedings -2012 IEEE Symposium on Electrical and Electronics Engineering, EEESYM
2012, 603–606. doi:10.1109/EEESym.2012.6258730.
Saleem, Yasir , Noel Crespi , Mubashir Husain Rehmani , and Rebecca Copeland . 2019.
“Internet of Things-Aided Smart Grid: Technologies, Architectures, Applications, Prototypes,
and Future Research Directions.” IEEE Access 7: 62962–62963.
doi:10.1109/ACCESS.2019.2913984.
Ghasempour, Alireza. 2019. “Internet of Things in Smart Grid: Architecture, Applications,
Services, Key Technologies, and Challenges.” Inventions 4 (1).
doi:10.3390/inventions4010022.
Shahinzadeh, Hossein , Jalal Moradi, Gevork B. Gharehpetian, Hamed Nafisi , and Mehrdad
Abedi . 2019. “IoT Architecture for Smart Grids.” International Conference on Protection and
Automation of Power System, IPAPS 2019, 22–30. doi:10.1109/IPAPS.2019.8641944.
Acar, Ugur , Frank Kane , Panagiotis Vlacheas , Vassilis Foteinos , Panagiotis Demestichas ,
Guven Yuceturk , Ioanna Drigkopoulou , and Aycan Vargun . 2019. “Designing an IoT Cloud
Solution for Aquaculture.” Global IoT Summit, GIoTS 2019- Proceedings.
doi:10.1109/GIOTS.2019.8766428.
Balakrishnan, S , S Sheeba Rani , and K C Ramya . 2019. “Design and Development of IoT
Based Smart Aquaculture System in a Cloud Environment.” International Journal of Oceans
and Oceanography 13 (1): 121–127. http://www.ripublication.com.
Manoharan, Hariprasath , Yuvaraja Teekaraman, Pravin R. Kshirsagar, Shanmugam
Sundaramurthy , and Abirami Manoharan . 2020. “Examining the Effect of Aquaculture Using
Sensor-Based Technology with Machine Learning Algorithm.” Aquaculture Research, no.
May: 1–11. doi:10.1111/are.14821.

Theories of Blockchain
Accenture (2017) Banking on Blockchain. A Value Analysis for Investment Banks,
https://www.accenture.com/_acnmedia/Accenture/Conversion-
Assets/DotCom/Documents/Global/PDF/Consulting/Accenture-Banking-on-Blockchain.pdf.
Angraal, S. , Krumholz, H. , Schulz, W. (2017) Blockchain technology applications in
healthcare. https://www.ahajournals.org/doi/10.1161/CIRCOUTCOMES.117.003800.
Azaria, A. , Ekblaw, A. , Vieira, T. , Lippman, A. (2016) MedRec: Using blockchain for medical
data access and permission management. International Conference on Open and Big Data
(OBD), August 22–24, 2016 , Piscataway.
Banafa, A. (2017) IoT and blockchain convergence: Benefits and challenges.
https://iot.ieee.org/newsletter/january-2017/iot-andblockchain-convergence-benefits-and-
challenges.html.
Barron, L. (2018) CryptoKitties is going mobile. Can ethereum handle the traffic?
https://fortune.com/2018/02/13/cryptokitties-ethereum-ios-launch-china-ether/.
Bhardwaj, S. , Kaushik, M. (2018) Blockchain technology to drive the future. In: Satapathy,
S.C. , Bhateja, V. , Das, S. (eds.) Smart Computing and Informatics. Springer: SIST.
Brito, J. , Castillo, A. (2013) Bitcoin: A Primer for Policymakers. Fairfax County, Virginia:
Geroge Mason University.
Casey, M. , Crane, J. , Gensler, G. , Johnson, S. , Narula, N. (2018) The Impact of
Blockchain Technology on Finance: A catalyst for Change Geneva Reports on the World
Economy 21. ISBN: 978-1-912179-15-2.
Chen, G. , Xu, B. , Lu, M , Chen, N. (2018) Exploring blockchain technology and its potential
applications for education. Smart Learning Environments. 5(1). doi:10.1186/s40561-017-
0050-x.
Danzi, P. , Ellersgaard Kalør, A. , Stefanovic, C. , Popovski, P. (2017) Analysis of the
communication traffic for blockchain synchronization of IoT devices, ArXiv e-prints, Nov.
2017.
Dobson, D. (2018). The 4 types of blockchain. https://iltanet.org/blogs/deborah-
dobson/2018/02/13/the-4-types-of-blockchain-networks-explained
Dorri, A. , Kanhere, S. , Jurdak, R. , Gauravaram, P. (2017) LSB: A lightweight scalable
blockchain for IoT security and privacy, ArXiv e-prints, Dec. 2017
Felin, T. , Lakhani, K. (2018). What Problems Will You Solve with Blockchain? MIT Sloan
Management Review.
Ganne, E. (2018) Can Blockchain Revolutionize International Trade? World Trade
Organization. ISBN 978-92-870-4761-8.
Gartner Reports | Artificial Lawyer (2018) Hype killer – only 1% of companies are using
blockchain. https://www.artificiallawyer.com/2018/05/04/hype-killer-only-1-of-companies-are-
using-blockchain-gartner-reports/
Guegan, D. (2017) Public blockchain versus private blockchain. https://halshs.archives-
ouvertes.fr/halshs-01524440/file/17020.pdf
Holotiuk, F. , Pisani, F. , Moormann, J. (2017) The Impact of Blockchain Technology on
Business Models in the Payments Industry, Proceedings of the 13th International Conference
on Wirtschafts information, 912–926.
Huh, S. , Cho, S. , Kim, S. (2017) Managing IoT devices using blockchain platform. 2017 19th
International Conference on Advanced Communication Technology (ICACT), Bongpyeong,
pp. 464–467. doi: 10.23919/ICACT.2017.7890132.
Iansiti, M. , Lakhani, K. R. (2017) The Truth about Blockchain. Harvard Business Review.
Janssen, M. , Weerakkody, V. , Ismagilova, E. , Sivarajah, U. , Irani, Z. (2020) A framework
for analyzing blockchain technology adoption: Integrating institutional, market and technical
factors. International Journal of Information Management. 50: 302–309.
Kumar, N. M. , Mallick, P. K. (2018) Blockchain technology for security issues and challenges
in IoT. Procedia Computer Science 132: 1815–1823. ISSN 1877-0509,
doi:10.1016/j.procs.2018.05.140.
Mettler, M. (2016) Blockchain technology in healthcare: the revolution starts here. IEEE 18th
International Conference on e-Health Networking, September 14–16, 2016 , Piscataway
Micheler, E. , von der Heyde, L. , (2016) Holding, clearing and settling securities through
blockchain/distributed ledger technology: creating an efficient system by empowering
investors. Journal of International Banking & Financial Law, 31(11): 11 JIBFL 631. ISSN
1742-6812.
Morabito, V. (2017) Business Innovation Through Blockchain. doi:10.1007/978-3-319-48478-
5.
Nakamoto, S. (2008) Bitcoin: A Peer-to-Peer Electronic Cash System. The Academic Press.
https://Bitcoin.org/Bitcoin.pdf
Narayanan, A. , Bonneau, J. , Felten, E. , Miller, A. , Goldfeder, S. (2016) Bitcoin and
Cryptocurrency Technologies: A Comprehensive Introduction. Princeton, NJ: Princeton
University Press.
Nguyen, G. -T. , Kim, K. (2018) A survey about consensus algorithms used in blockchain.
Journal of Information Processing Systems, 14(1): 101–128.
Nian, L. P. , Chuen, D. L. K. (2015) “A light touch of regulation for virtual currencies”. In:
Chuen, David LEE Kuo (ed.), Handbook of Digital Currency: Bitcoin, Innovation, Financial
Instruments, and Big Data. Waltham, MA: Academic Press. p. 319. ISBN 978-0-12-802351-8.
Raconteur (2016) The future of blockchain in 8 Charts. https://www.raconteur.net/the-future-
of-blockchain-in-8-charts/.
Ramachandran, G. , Krishnamachari, B. (2018) Blockchain for the IoT: Opportunities and
challenges. https://arxiv.org/abs/1805.02818.
Scott, B. (2016) How can cryptocurrency and blockchain technology play a role in building
social and solidarity finance?, UNRISD Working Paper, No. 2016-1, United Nations Research
Institute for Social Development (UNRISD), Geneva.
Sharples, M. , Domingue, J. (2016) The blockchain and kudos: A distributed system for
educational record. In: Reputation and Reward. Adaptive and adaptable learning. Cham:
Springer, pp. 490–496. doi:10.1007/978-3-319-45153-4_48.
Sherman, A. T. , Javani, F. , Zhang, H. , Golaszewski, E. (2019) On the origins and variations
of blockchain technologies. IEEE Security & Privacy, 17(1): 72–77.
Skiba, D. J. (2017) The potential of blockchain in education and health care. Nursing
Education Perspective 38(4): 220–221. doi:10.1097/01.NEP.0000000000000190.
Statista (2021) Worldwide Bitcoin Blockchain Size.
https://www.statista.com/statistics/647523/worldwide-bitcoin-blockchain-size/
Tapscott, D. , Tapscott, A. (2016) Here’s why blockchain will change the world.
https://fortune.com/2016/05/08/why-blockchains-will-change-the-world/
Voorhees (2015) It’s all about the blockchain, money and state. http://moneyandstate.com/its-
all-about-the-blockchain/.
Advances in Robotic Systems
Corke, Peter. Robotics, Vision and Control: Fundamental Algorithms in MATLAB® Second,
Completely Revised. Vol. 118. Springer, Cham, 2017.
McKerrow, Phillip John , and Phillip McKerrow . Introduction to Robotics. Sydney: Addison-
Wesley, 1991.
Rossi, Dino , Zoltán Nagy , and Arno Schlueter . “Soft robotics for architects: Integrating soft
robotics education in an architectural context.” Soft Robotics 1.2 (2014): 147–153.
Kanda, Takayuki , and Hiroshi Ishiguro . Human-Robot Interaction in Social Robotics. CRC
Press, Boca Raton, 2017.
Craig, John J. Introduction to Robotics: Mechanics and Control, 3/E. Pearson Education,
India, 2009.
Brooks, Alex , et al. “Towards component-based robotics.” 2005 IEEE/RSJ International
Conference on Intelligent Robots and Systems. Albert. Canada, IEEE, 2005.
Bicho, Estela. Dynamic Approach to Behavior-Based Robotics: Design, Specification,
Analysis, Simulation and Implementation. Shaker Verlag, Germany, 2000.
Bischoff, Rainer , et al. “Brics-best practice in robotics.” ISR 2010 (41st International
Symposium on Robotics) and ROBOTIK 2010 (6th German Conference on Robotics). VDE,
Berlin, Germany, 2010.
Carsten, Joseph , Dave Ferguson , and Anthony Stentz . “3d field d: Improved path planning
and replanning in three dimensions.” 2006 IEEE/RSJ International Conference on Intelligent
Robots and Systems. IEEE, Beijing, China, 2006.
Hoy, Michael , Alexey S. Matveev , and Andrey V. Savkin . “Algorithms for collision-free
navigation of mobile robots in complex cluttered environments: A survey.” Robotica 33.3
(2015): 463–497.
Haddad, Moussa , Wisama Khalil , and H. E. Lehtihet . “Trajectory planning of unicycle
mobile robots with a trapezoidal-velocity constraint.” IEEE Transactions on Robotics 26.5
(2010): 954–962.
Lu, Jianbo , et al. “System and method for dynamically determining vehicle loading and
vertical loading distance for use in a vehicle dynamic control system.” U.S. Patent No.
7,668,645. 23 Feb. 2010 .
Dayoub, Feras , Grzegorz Cielniak , and Tom Duckett . “A sparse hybrid map for vision-
guided mobile robots.” (2011): 213–218.
Chen, S.Y. “Kalman filter for robot vision: A survey.” IEEE Transactions on Industrial
Electronics 59.11 (2011): 4409–4420.
Hamrita, Takoi K. , Walter D. Potter , and Benjamin Bishop . “Robotics, microcontroller and
embedded systems education initiatives: An interdisciplinary approach.” International Journal
of Engineering Education 21.4 (2005): 730.
Klančar, Gregor , and Igor Škrjanc . “Tracking-error model-based predictive control for mobile
robots in real time.” Robotics and Autonomous Systems 55.6 (2007): 460–469.
Rubio, Fernando , et al. “Comparison between Bayesian network classifiers and SVMs for
semantic localization.” Expert Systems with Applications 64 (2016): 434–443.
Kim, T. W. , and J. Yuh . “Development of a real-time control architecture for a semi-
autonomous underwater vehicle for intervention missions.” Control Engineering Practice
12.12 (2004): 1521–1530.
Malu, Sandeep Kumar , and Jharna Majumdar . “Kinematics, localization and control of
differential drive mobile robot.” Global Journal of Research in Engineering Vol 14, No 1-H,
ISSN 2249–4596 (2014).
Omrane, Hajer , Mohamed Slim Masmoudi , and Mohamed Masmoudi . “Fuzzy logic based
control for autonomous mobile robot navigation.” Computational Intelligence and
Neuroscience 2016 (2016): 1–10.
Kharola, Ashwani , Dhuliya Piyush , and Sharma Priyanka . “Anti swing and Position control
of single wheeled inverted pendulum Robot (SWIPR),” International Journal of Applied
Evolutionary Computation (IJAEC) 9.4 (Oct-Dec–2018): 37–47.
Mohammed A. Hussein , Ahmed S. Ali , F.A. Elmisery , and R. Mostafa . “Motion control of
robot by using Kinect sensor,” Research Journal of Applied Sciences, Engineering and
Technology 8 (2014): 1384–1388.
Sasaki, M. , Suhaimi, M. S. A. B. , Matsushita, K. , Ito, S. , and Rusydi, M. I. Robot control
system based on electrooculography and electromyogram. Journal of Computer and
Communications 3.11 (2015): 113–128.
Pierson, H. A. , and Gashler, M. S. “Deep learning in robotics: A review of recent research,”
Advanced Robotics 31.16 (2017): 821–835.
El-Seoud, Samir Abou , Nadine Farag , and Gerard McKee . “A review on non-supervised
approaches for cyberbullying detection.” International Journal of Engineering Pedagogy 10.4
(2020).
Jha, Dipendra , et al. “Irnet: A general purpose deep residual regression framework for
materials discovery.” Proceedings of the 25th ACM SIGKDD International Conference on
Knowledge Discovery & Data Mining, Anchorage, AK, USA. 2019.
Wang, Peng , et al. “Deep learning-based human motion recognition for predictive context-
aware human-robot collaboration.” CIRP Annals 67.1 (2018): 17–20.

Data Science Practices


Zhuang, Fuzhen , Zhiyuan Qi , Keyu Duan , Dongbo Xi , Yongchun Zhu , Hengshu Zhu , Hui
Xiong , and Qing He . “A comprehensive survey on transfer learning.” In Proceedings of the
IEEE Beijing 100190, China, 2020.
Liang, Gaobo , and Lixin Zheng . “A transfer learning method with deep residual network for
pediatric pneumonia diagnosis.” Computer Methods and Programs in Biomedicine 187
(2020): 104964.
Wang, Jindong , Yiqiang Chen , Wenjie Feng , Han Yu , Meiyu Huang , and Qiang Yang .
“Transfer learning with dynamic distribution adaptation.” ACM Transactions on Intelligent
Systems and Technology (TIST) 11, no. 1 (2020): 1–25.
Cai, Chenjing , Shiwei Wang , Youjun Xu , Weilin Zhang , Ke Tang , Qi Ouyang , Luhua Lai ,
and Jianfeng Pei . “Transfer learning for drug discovery.” Journal of Medicinal Chemistry 63,
no. 16 (2020): 8683–8694.
Torrey, Lisa , and Jude Shavlik . “Transfer learning.” In Handbook of Research on Machine
Learning Applications and Trends: Algorithms, Methods, and Techniques, edited by E. Soria ,
J. Martin , R. Magdalena , M. Martinez , and A. Serrano , pp. 242–264. IGI global, 2009.
Pan, Sinno Jialin , and Qiang Yang . “A survey on transfer learning.” IEEE Transactions on
Knowledge and Data Engineering 22, no. 10 (2009): 1345–1359.
Taylor, Matthew E. , and Peter Stone . “Transfer learning for reinforcement learning domains:
A survey.” Journal of Machine Learning Research 10, no. 7 (2009): 1633–1685.
Apostolopoulos, Ioannis D. , and Tzani A. Mpesiana . “Covid-19: Automatic detection from x-
ray images utilizing transfer learning with convolutional neural networks.” Physical and
Engineering Sciences in Medicine 43, no. 2 (2020): 635–640.
Wu, Zhenghong , Hongkai Jiang , Ke Zhao , and Xingqiu Li . “An adaptive deep transfer
learning method for bearing fault diagnosis.” Measurement 151 (2020): 107227.
Naseer, Amina , Monail Rani , Saeeda Naz , Muhammad Imran Razzak , Muhammad Imran ,
and Guandong Xu . “Refining Parkinson’s neurological disorder identification through deep
transfer learning.” Neural Computing and Applications 32, no. 3 (2020): 839–854.
Celik, Yusuf , Muhammed Talo , Ozal Yildirim , Murat Karabatak , and U. Rajendra Acharya .
“Automated invasive ductal carcinoma detection based using deep transfer learning with
whole-slide images.” Pattern Recognition Letters (2020).
Chen, Yiqiang , Xin Qin , Jindong Wang , Chaohui Yu , and Wen Gao . “Fedhealth: A
federated transfer learning framework for wearable healthcare.” IEEE Intelligent Systems 35,
no. 4 (2020): 83–93.
Raghu, Shivarudhrappa , Natarajan Sriraam , Yasin Temel , Shyam Vasudeva Rao , and
Pieter L. Kubben . “EEG based multi-class seizure type classification using convolutional
neural network and transfer learning.” Neural Networks 124 (2020): 202–212.
Jamshed, Aatif , Bhawna Mallick , and Pramod Kumar . “Deep learning-based sequential
pattern mining for progressive database.” Soft Computing 24(2020): 17233–17246.
Kumar, Arvind , Pawan Singh Mehra , Gagan Gupta , and Aatif Jamshed . “Modified block
playfair cipher using random shift key generation.” International Journal of Computer
Applications 58, no. 5 (2012): 10–13.
Jamshed, Aatif , Surbhi Chandhok , and Romil Anand . “Analysis of sequential mining
algorithms.” International Journal of Computer Applications 165 (2017): 12–2017.
Jamshed, Aatif , and Garima Verma . “Mobile devices integration with grid by using efficient
scheduling for local resource.” Journal of Advanced Computing and Communication
Technologies 1, no. 2 (2013): 1–6. ISSN: 2347-2804.
Aggarwal, Hari Shankar , Avishi Kansal , and Aatif Jamshed . “Noisy information and
progressive data-mining giving rise to privacy preservation.” In 2017 3rd International
Conference on Advances in Computing, Communication & Automation (ICACCA) (Fall),
Dehradun, India, pp. 1–5. IEEE, 2017.
The Deep Learning with Keras Workshop: An Interactive Approach to Understanding Deep
Learning with Keras, 2nd Edition.
Raghu, M. , Zhang, C. , Kleinberg, J. , & Bengio, S. (2019). Transfusion: Understanding
transfer learning for medical imaging. In Advances in Neural Information Processing
Systems, pp. 3347–3357.
Raffel, C. , Shazeer, N. , Roberts, A. , Lee, K. , Narang, S. , Matena, M. , … Liu, P. J. (2019).
Exploring the limits of transfer learning with a unified text-to-text transformer. arXiv preprint
arXiv:1910.10683.
Ruder, S. , Peters, M. E. , Swayamdipta, S. , & Wolf, T. Transfer learning in natural language
processing. In Proceedings of the 2019 Conference of the North American Chapter of the
Association for Computational Linguistics: Tutorials, Minneapolis, Minnesota, pp. 15–18,
2019, June.
Tan, C. , Sun, F. , Kong, T. , Zhang, W. , Yang, C. , & Liu, C. . A survey on deep transfer
learning. In International Conference on Artificial Neural Networks Rhodes, Greece, pp.
270–279. Springer, Cham, 2018, October.

The Actuality of Augmented Reality


Azuma, Ronald T. “A survey of augmented reality.” Presence: Teleoperators & Virtual
Environments 6, no. 4 (1997): 355–385.
Billinghurst, Mark. “Augmented reality in education.” New Horizons for Learning 12, no. 5
(2002): 1–5.
Bauer, Martin , Bernd Bruegge , Gudrun Klinker , Asa MacWilliams , Thomas Reicher ,
Stefan Riss , Christian Sandor , and Martin Wagner . “Design of a component-based
augmented reality framework.” In Proceedings IEEE and ACM International Symposium on
Augmented Reality, pp. 45–54. IEEE, 2001.
Lorenz, Mario , Sebastian Knopp , and Philipp Klimant . “Industrial augmented reality:
Requirements for an augmented reality maintenance worker support system.” In 2018 IEEE
International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct), pp.
151–153. IEEE, 2018.
Zhang, Zhenliang , Dongdong Weng , Haiyan Jiang , Yue Liu , and Yongtian Wang . “Inverse
augmented reality: A virtual agent’s perspective.” In 2018 IEEE International Symposium on
Mixed and Augmented Reality Adjunct (ISMAR-Adjunct), pp. 154–157. IEEE, 2018.
Raju, K. Chalapathi , et al . “3D based modern education system using augmented reality.” In
2018 IEEE 6th International Conference on MOOCs, Innovation and Technology in Education
(MITE), pp. 37–42. IEEE, 2018.
Karkera, Akshay , Sushil Dhadse , Vinayak Gawde , and Kavita Jain . “Pokémon fight
augmented reality game.” In 2018 Second International Conference on Inventive
Communication and Computational Technologies (ICICCT), pp. 1762–1764. IEEE, 2018.
Shibata, Yoshitaka , and Katsumi Sasaki . “Tourist information system based on beacon and
augmented reality technologies.” In 2016 19th International Conference on Network-Based
Information Systems (NBiS), pp. 410–413. IEEE, 2016.
Sato, Goshi , Go Hirakawa , and Yoshitaka Shibata . “Push typed tourist information system
based on beacon and augmented reality technologies.” In 2017 IEEE 31st International
Conference on Advanced Information Networking and Applications (AINA), pp. 298–303.
IEEE, 2017.
Pucihar, Klen Čopič , and Paul Coulton . “Exploring the evolution of mobile augmented reality
for future entertainment systems.” Computers in Entertainment (CIE) 11, no. 2 (2015): 1–16.
Agarwal, Charvi , and Narina Thakur . “The evolution and future scope of augmented reality.”
International Journal of Computer Science Issues (IJCSI) 11, no. 6 (2014): 59.
Arth, Clemens , Raphael Grasset , Lukas Gruber , Tobias Langlotz , Alessandro Mulloni , and
Daniel Wagner . “The history of mobile augmented reality.” arXiv preprint arXiv:1505.01319
(2015).
Mekni, Mehdi , and Andre Lemieux . “Augmented reality: Applications, challenges and future
trends.” Applied Computational Science (2014): 205–214.
Barsom, Esther Z. , Maurits Graafland , and Marlies P. Schijven . “Systematic review on the
effectiveness of augmented reality applications in medical training.” Surgical Endoscopy 30,
no. 10 (2016): 4174–4183.
Zhu, Wei , Charles B. Owen , Hairong Li , and Joo-Hyun Lee . “Personalized in-store e-
commerce with the promopad: an augmented reality shopping assistant.” Electronic Journal
for E-commerce Tools and Applications 1, no. 3 (2004): 1–19.
Vlahakis, Vassilios , M. Ioannidis , John Karigiannis , Manolis Tsotros , Michael Gounaris ,
Didier Stricker , Tim Gleue , Patrick Daehne , and Luís Almeida . “Archeoguide: an
augmented reality guide for archaeological sites.” IEEE Computer Graphics and Applications
22, no. 5 (2002): 52–60.
Huang, Zhanpeng , Weikai Li , Pan Hui , and Christoph Peylo . “CloudRidAR: A cloud-based
architecture for mobile augmented reality.” In Proceedings of the 2014 Workshop on Mobile
Augmented Reality and Robotic Technology-Based Systems, pp. 29–34. 2014.
Hsiao, Kuei-Fang. “Using augmented reality for students health-case of combining
educational learning with standard fitness.” Multimedia Tools and Applications 64, no. 2
(2013): 407–421.
Hughes, Charles E. , Christopher B. Stapleton , Darin E. Hughes , and Eileen M. Smith .
“Mixed reality in education, entertainment, and training.” IEEE Computer Graphics and
Applications 25, no. 6 (2005): 24–30.
Hwang, Gwo-Jen , Po-Han Wu , Chi-Chang Chen , and Nien-Ting Tu . “Effects of an
augmented reality-based educational game on students’ learning achievements and attitudes
in real-world observations.” Interactive Learning Environments 24, no. 8 (2016): 1895–1906.
Wu, Hsin-Kai , Silvia Wen-Yu Lee , Hsin-Yi Chang , and Jyh-Chong Liang . “Current status,
opportunities and challenges of augmented reality in education.” Computers & Education 62
(2013): 41–49.
Masood, Tariq , and Johannes Egger . “Augmented reality in support of Industry
4.0—Implementation challenges and success factors.” Robotics and Computer-Integrated
Manufacturing 58 (2019): 181–195.
Hayhurst, Jason. “How augmented reality and virtual reality is being used to support people
living with dementia—Design challenges and future directions.” In Timothy Jung and M.
Claudia tom Dieck (eds.) Augmented Reality and Virtual Reality, pp. 295–305. Springer,
Cham, 2018.
Pyae, Aung , and Leigh Ellen Potter . “A player engagement model for an augmented reality
game: A case of Pokémon go.” In Proceedings of the 28th Australian Conference on
Computer-Human Interaction, pp. 11–15. 2016.
Roesner, Franziska , Tadayoshi Kohno , and David Molnar . “Security and privacy for
augmented reality systems.” Communications of the ACM 57, no. 4 (2014): 88–96.
Ban, Yuki , Takuji Narumi , Tatsuya Fujii , Sho Sakurai , Jun Imura , Tomohiro Tanikawa ,
and Michitaka Hirose . “Augmented endurance: controlling fatigue while handling objects by
affecting weight perception using augmented reality.” In Proceedings of the SIGCHI
Conference on Human Factors in Computing Systems, pp. 69–78. 2013.
Liao, Tony. “Future directions for mobile augmented reality research: Understanding
relationships between augmented reality users, nonusers, content, devices, and industry.”
Mobile Media & Communication 7, no. 1 (2019): 131–149.
Parekh, Pranav , Shireen Patel , Nivedita Patel , and Manan Shah . “Systematic review and
meta-analysis of augmented reality in medicine, retail, and games.” Visual Computing for
Industry, Biomedicine, and Art 3, no. 1 (2020): 1–20.
Vyas, Daiwat Amit , and Dvijesh Bhatt . “Augmented Reality (AR) applications: A survey on
current trends, challenges, & future scope.” International Journal of Advanced Research in
Computer Science 8, no. 5 (2017): 2724–2730.
Studen, Laura , and Victor Tiberius . “Social media, Quo Vadis? Prospective development
and implications.” Future Internet 12, no. 9 (2020): 146.

Emerging Technologies and Cyber Security


A. Alnasser , H. Sun , and J. Jiang , “Cybersecurity challenges and solutions for V2X
communications: A survey,” Comput. Networks, vol. 151, pp. 52–67, 2019, doi:
10.1016/j.comnet.2018.12.018.
Robinson et al, “City research online city, university of London institutional repository,” City
Res. Online, vol. 37, no. 9, pp. 1591–1601, 2008.
M. Omar , “A world of cyber attacks (a survey),” 2019.
S. N. Hussain , “A survey on cyber security threats and their solutions,” Int. J. Res. Appl. Sci.
Eng. Technol., vol. 8, no. 7, pp. 1141–1146, 2020, doi: 10.22214/ijraset.2020.30449.
A. Handa , A. Sharma , and S. K. Shukla , “Machine learning in cybersecurity: A review,”
Wiley Interdiscip. Rev. Data Min. Knowl. Discov., vol. 9, no. 4, pp. 1–7, 2019, doi:
10.1002/widm.1306.
I. H. Sarker , A. S. M. Kayes , S. Badsha , H. Alqahtani , P. Watters , and A. Ng ,
“Cybersecurity data science: An overview from a machine learning perspective,” J. Big Data,
vol. 7, no. 1, 2020, doi: 10.1186/s40537-020-00318–5.
C. Y. Jeong , S. Y. T. Lee , and J. H. Lim , “Information security breaches and IT security
investments: Impacts on competitors,” Inf. Manag., vol. 56, no. 5, pp. 681–695, 2019, doi:
10.1016/j.im.2018.11.003.
A. K. Dalai and S. K. Jena , “Evaluation of web application security risks and secure design
patterns,” ACM Int. Conf. Proc. Ser., no. January, pp. 565–568, 2011, doi:
10.1145/1947940.1948057.
M. T. Dlamini , J. H. P. Eloff , and M. M. Eloff , “Information security: The moving target,”
Comput. Secur., vol. 28, no. 3–4, pp. 189–198, 2009, doi: 10.1016/j.cose.2008.11.007.
A. Salam , Internet of things for sustainability: Perspectives in privacy, cybersecurity, and
future trends. 2020.
M. E. Thomson and R. Von Solms , “Information security awareness: Educating your users
effectively,” Inf. Manag. Comput. Secur., vol. 6, no. 4, pp. 167–173, 1998, doi:
10.1108/09685229810227649.
B. Hamid , N. Jhanjhi , M. Humayun , A. Khan , and A. Alsayat , “Cyber security issues and
challenges for smart cities: A survey,” MACS 2019-13th Int. Conf. Math. Actuar. Sci. Comput.
Sci. Stat. Proc., pp. 1–7, 2019, doi: 10.1109/MACS48846.2019.9024768.
F. Jameel , U. Javaid , W. U. Khan , M. N. Aman , H. Pervaiz , and R. Jäntti , “Reinforcement
learning in blockchain-enabled IIoT networks: A survey of recent advances and open
challenges,” Sustainability, vol. 12, no. 12, pp. 1–22, 2020, doi: 10.3390/su12125161.
V. Hassija , V. Chamola , V. Saxena , D. Jain , P. Goyal , and B. Sikdar , “A survey on IoT
security: Application areas, security threats, and solution architectures,” IEEE Access, vol. 7,
pp. 82721–82743, 2019, doi: 10.1109/ACCESS.2019.2924045.
Y. Cherdantseva et al., “A review of cybersecurity risk assessment methods for SCADA
systems,” Comput. Secur., vol. 56, pp. 1–27, 2016, doi: 10.1016/j.cose.2015.09.009.
R. Mitchell and I. R. Chen , “A survey of intrusion detection techniques for cyber-physical
systems,” ACM Comput. Surv., vol. 46, no. 4, 2014, doi: 10.1145/2542049.
N. Lu , S. Mabu , T. Wang , and K. Hirasawa , “An efficient class association rule-pruning
method for unified intrusion detection system using genetic algorithm,” IEEJ Trans. Electr.
Electron. Eng., vol. 8, no. 2, pp. 164–172, 2013, doi: 10.1002/tee.21836.
P. S. Saini , S. Behal , and S. Bhatia , “Detection of DDoS attacks using machine learning
algorithms,” Proc. 7th Int. Conf. Comput. Sustain. Glob. Dev. INDIACom 2020, no. March, pp.
16–21, 2020, doi: 10.23919/INDIACom49435.2020.9083716.
H. Sedjelmaci and M. Feham , “Novel hybrid intrusion detection system for clustered wireless
sensor network,” Int. J. Netw. Secur. Its Appl., vol. 3, no. 4, pp. 1–14, 2011, doi:
10.5121/ijnsa.2011.3401.
Labbé, A. (2018). PRIMER: Banks and cyber security (part 1). International Financial Law
Review, Retrieved from https://www.proquest.com/scholarly-journals/primer-banks-cyber-
security-part-1/docview/2012825779/se-2?accountid=133553
O. H. Alhazmi , Y. K. Malaiya , and I. Ray , “Measuring, analyzing and predicting security
vulnerabilities in software systems,” Comput. Secur., vol. 26, no. 3, pp. 219–228, 2007, doi:
10.1016/j.cose.2006.10.002.
F. Camilo , A. Meneely , and M. Nagappan , “Do bugs foreshadow vulnerabilities? A study of
the chromium project,” IEEE Int. Work. Conf. Min. Softw. Repos., vol. 2015-Augus, pp.
269–279, 2015, doi: 10.1109/MSR.2015.32.
S. Abu-nimeh, D. Nappa , X. Wang , and S. Nair , “P60-Abu-Nimeh.Pdf,” pp. 60–69, 2007.
W. Zhuang , Y. Ye , Y. Chen , and T. Li , “Ensemble clustering for internet security
applications,” IEEE Trans. Syst. Man Cybern. Part C Appl. Rev., vol. 42, no. 6, pp.
1784–1796, 2012, doi: 10.1109/TSMCC.2012.2222025.
Y. Lu and L. Da Xu , “Internet of things (IoT) cybersecurity research: A review of current
research topics,” IEEE Internet Things J., vol. 6, no. 2, pp. 2103–2115, 2019, doi:
10.1109/JIOT.2018.2869847.
Ú. Erlingsson , V. Pihur , and A. Korolova , “Rappor,” pp. 1054–1067, 2014, doi:
10.1145/2660267.2660348.
M. Abadi et al., “Deep learning with differential privacy,” Proc. ACM Conf. Comput. Commun.
Secur., vol. 24–28-Octo, no. Ccs, pp. 308–318, 2016, doi: 10.1145/2976749.2978318.
M. J. Kusner , J. R. Gardner , R. Garnett , and K. Q. Weinberger , “Differentially private
Bayesian optimization,” 32nd Int. Conf. Mach. Learn. ICML 2015, vol. 2, pp. 918–927, 2015.
W. Hu and Y. Tan , “Generating adversarial malware examples for black-box attacks based
on GAN,” 2017, [Online]. Available: http://arxiv.org/abs/1702.05983.
O. A. Alimi et al., “Applications of machine learning in cybersecurity,” Comput. Secur., vol. 8,
no. 1, pp. 1–7, 2019, doi: 10.22214/ijraset.2020.30449.
I. Damgård , V. Pastro , N. Smart , and S. Zakarias , “Multiparty computation from somewhat
homomorphic encryption,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif.
Intell. Lect. Notes Bioinformatics), vol. 7417 LNCS, pp. 643–662, 2012, doi: 10.1007/978-3-
642-32009-5_38.
L. J. M. Aslett , P. M. Esperança , and C. C. Holmes , “Encrypted statistical machine learning:
New privacy-preserving methods,” pp. 1–39, 2015, [Online]. Available:
http://arxiv.org/abs/1508.06845.
N. Dowlin et al., “CryptoNets: Applying neural networks to encrypted data with high
throughput and accuracy - Microsoft research,” Microsoft Res. TechReport, vol. 48, pp. 1–12,
2016, [Online]. Available: http://proceedings.mlr.press/v48/gilad-
bachrach16.pdf%0Ahttp://research.microsoft.com/apps/pubs/?id=260989.
3D Printing Procedures
A. Ambrosi & M. Pumera , “3D-printing technologies for electrochemical applications,
Chemical Society Reviews, Vol. 45, No. 10, pp. 2740–2755, 2016.
A. M. T. Syed , P. K. Elias , B. Amit , B. Susmita , O. Lisa , & C. Charitidis , “Additive
manufacturing: Scientific and technological challenges, market uptake and opportunities,”
Materials Today, Vol. 1, pp. 1–16, 2017.
C. Silbernagel , “Additive Manufacturing 101–4: What is material jetting?” Canada Makers,
2018. [Online]. Available: http://canadamakes.ca/what-is-material-jetting/. [Accessed 2019].
J. Balli , S. Kumpaty , V. Anewenter , ASME. Continuous liquid interface production of 3D
Objects: An unconventional technology and its challenges & opportunities, in: ASME 2017
International Mechanical Engineering Congress and Exposition, American Society of
Mechanical Engineers, 2017. V005T06A038-V005T06A038.
G. Liu , Y. Zhao , G. Wu , & J. Lu , “Origami and 4D printing of elastomer-derived ceramic
structures,” Science Advances, Vol. 4, No. 8, p. eaat0641, 2018.
L. Ze-Xian , T.C. Yen , M. R. Ray , D. Mattia , I.S. Metcalfe , & D. A. Patterson , “Perspective
on 3D printing of separation membranes and comparison to related unconventional
fabrication techniques,” Journal of Membrane Science, Vol. 523, No. 1, pp. 596–613, 2016.
M. A. Caminero , J. M. Chacon , I. Garcia-Moreno , & G. P. Rodriguez , “Impact damage
resistance of 3D printed continues fibre reinforced thermoplastic composites using fused
deposition modelling,” Composite Part B: Engineering, Vol. 148, pp. 93–103, 2018.
W. Xin , J. Man , Z. Zuowan , G. Jihua , & H. David , “3D printing of polymer matrix
composites: A review and prospective,” Composites Part B, Vol. 110, pp. 442–458, 2017.
J. H. Martin , B. D. Yahata , J. M. Hundley , J. A. Mayer , T. A. Schaedler , & T. M. Pollock ,
“3D Printing of high-strength aluminium alloys,” Nature, Vol. 549, No. 7672, pp. 356–369,
2017.
L. Hitzler , F. Alifui-Segbaya , P. William , B. Heine , M. Heitzmann , W. Hall , M. Merkel , & A.
Ochner , “Additive manufacturing of cobalt based dental alloys: Analysis of microstructure
and physicomechanical properties,” Advances in Materials Science and Engineering, Vol. 8,
pp. 1–12, 2018.
T. DebRoy , H. L. Wei , J. S. Zuback , T. Mukherjee , J. W. Elmer , J. O. Milewski , A. M.
Beese , A. Wilson-Heid , A. De , & W. Zhang , “Additive manufacturing of metallic
components-Process, structure and properties,” Progress in Materials Science, Vol. 92, pp.
112–224, 2018.
F. Trevisan , F. Calignano , A. Aversa , G. Marchese , M. Lombardi , S. Biamino , D. Ugues ,
& D. Manfredi , “Additive manufacturing of titanium alloys in the biomedical field: Processes,
properties and applications,” Journals Indexing & Metrics, Vol. 16, No. 2, pp. 57–67, 2018.
D.J. Horst , C.A. Duvoisin , & R.A. Viera , “Additive manufacturing at Industry 4.0: A review,”
International Journal of Engineering and Technical Research, Vol. 8, No. 8, pp. 1–8, 2018.
W. Haoa , Y. Liua , H. Zhouc , H. Chenb , & D. Fangb , “Preparation and characterization of
3D printed continuous carbon fiber reinforced thermosetting composite.”, Polymer Testing,
Vol. 65, pp. 29–34, 2018.
F. Baldassarre , & F. Ricciardi , “The additive manufacturing in the Industry 4.0 era: The case
of an Italian FabLab,” Journal of Emerging Trends in Marketing and Management, Vol. 1, No.
1, pp. 1–11, 2017.
D. Owen , J. Hickey , A. Cusson , O. I. Ayeni , J. Rhoades , D. Yifan , W. Limmin , P. Hye-
Yeong , H. Nishant , P. P. Raikar, Yeon-Gil , & Z. Jing , “3D printing of ceramic components
using a customized 3D ceramic printer,” Progress in Additive Manufacturing, Vol. 1, pp. 1–7,
2018
A. Zocca , P. Lima , & J. Günster , “LSD-based 3D printing of alumina ceramics,” Journal of
Ceramic Science and Technology, Vol. 8, No. 1, pp. 141–148, 2017.
T. Lanko , S. Panov , O. Sushchyns’ky , M. Pylypenko , & O. Dmytrenko , “Zirconium alloy
powders for manufacture of 3D printed particles used in nuclear power industry,” Problems of
Atomic Science and Technology, Vol. 1, No. 113, pp. 148–153, 2018.
T. Xueyuan , & Y. Yuxi , “Electrospinning preparation and characterization of alumina
nanofibers with high aspect ratio,” Ceramics International, Vol. 41, No. 8, pp. 9232–9238,
2017.
L. Jian-Yuan , A. Jia , & K. C. Chee , “Fundamentals and applications of 3D printing for novel
materials,” Applied Materials Today, Vol. 7, pp. 120–133, 2017.
P. Singh , & A. Raghav , “3D food printing: A revolution in food technology,” Acta Scientific
Nutritional Health, Vol. 2, No. 2, pp. 1–2, 2018.
V. Sreehitha , “Impact of 3D printing in automotive industry,” International Journal of
Mechanical and Production Engineering, Vol. 5, No. 2, pp. 91–94, 2017.
M. Petch , “Audi gives update on use of SLM metal 3D printing for the automotive industry,”
3D Printing Industry, 2018. [Online]. Available: https://3dprintingindustry.com/news/audi-
gives-update-use-slm-metal-3d-printing-automotive-industry-129376/. [Accessed 2019].
Z. Liu , M. Zhang , B. Bhandari , & Y. Wang , “3D printing: Printing precision and application
in food sector,” Trends in Food Science & Technology, Vol. 2, No. 1, pp. 1–36, 2017.
L. Lili , M. Yuanyuan , C. Ke , & Z. Yang , “3D printing complex egg white protein objects:
Properties and Optimization,” Food and Bioprocess Technology, Vol. 1, pp. 1–11, 2018.
J. Norman , R.D. Madurawe , C. M. V. Moore , M. A. Khan , & A. Khairuzzaman , “A new
chapter in pharmaceutical manufacturing: 3D-printed drug products,” Advance Drug Delivery
Review, Vol. 108, pp. 39–50, 2018.
A. D. Mori , M. P. Fernández , G. Blunn , G. Tozzi , & M. Roldo , “3D printing and
electrospinning of composite hydrogels for cartilage and bone tissue engineering,” Polymers,
Vol. 10, No. 285, pp. 1–26, 2018.
M. Sakin , & Y. C. Kiroglu , “3D printing of buildings: Construction of the sustainable houses
of the future by BIM,” Energy Procedia, Vol. 134, pp. 702–711, 2017.
L. Gaget , “3D printed clothes: Top 7 of the best projects,” Sculpteo. 2018. [Online]. Available:
https://www.sculpteo.com/blog/2018/05/23/3d-printed-clothes-top-7-of-the-best-projects/.
[Accessed 2019].
S. Horaczek , “Nike hacked a 3D printer to make its new shoe for elite marathon runners,”
Popular Sciences, 2018. [Online]. Available: https://www.popsci.com/nike-3d-printed-
sneakers. [Accessed 2019].
Y. F. Chuan , N. L. Hong , M. A. Mahdi , M. H. Wahid , & M. H. Nay , “Three-dimensional
printed electrode and its novel applications in electronic devices,” Scientific Report. Vol. 1,
pp. 1–11, 2018.

Multimedia Big Data


Siddiqa, A. , I. A. T. Hashem , I. Yaqoob , M. Marjani , S. Shamshirband , A. Gani , F.
Nasaruddin . (2016 April). “A survey of big data management: Taxonomy.” Journal of
Network and Computer Applications, 71: 151–156.
Kumari, A. , S. Tanwar , S. Tyagi , N. Kumar , M. Maasberg , K.-K.R. Choo . (2018 July).
“Multimedia big data computing and internet of things applications: A taxonomy and process
model.” Journal of Network and Computer Applications, 124: 169–195.
Sharmila, D. K. , P. Kumar , and A. Ashok . 2020. Introduction to Multimedia Big Data
Computing for IoT, e Library, Volume 163, doi:10.1007/978-981-13-8759-3_1.
John, R. et al., Riding the multimedia big data wave. Proceedings of the 36th International
ACM SIGIR Conference on Research and Development in Information Retrieval, 2013, ACM,
Dublin, Ireland, pp. 1–2.
Schneier, B. , et al. (1999). The Two Fish Encryption Algorithm: A 128-Bit Block Cipher, John
Wiley & Sons, Inc., USA.
Kumari, S. , Tanwar, S. Tyagi, N. Kumar . (2018). “Fog computing for healthcare 4.0
environment: Opportunities and challenges.” Computers & Electrical Engineering 72: 1–13.
Thakur, J. , N. Kumar (2011). “DES, AES and Blowfish: Symmetric key cryptography
algorithms simulation based performance analysis.” International Journal of Emerging
Technology and Advanced Engineering 1(2): 6–12.
Inukollu, V. N. , S. Arsi , S. R. Ravuri . (May 2014). “Security issues associated with big data
in cloud computing.” International Journal of Network Security & Its Applications (IJNSA) 6(3):
45.
Barnes, T. J. (2013). “Big data, little history.” Dialogues in Human Geography 3(3):297–302.
Terzi, D. S. , R. Terzi , S. Sagiroglu . A survey on security and privacy issues in big data. The
10th International Conference for Internet Technology and Secured Transactions (ICITST-
2015), 2015.
Sudeep, T. , Sudhanshu, T. , Neeraj, K. (Editors). Multimedia Big Data Computing for IoT
Applications, Volume 163 ISBN 978-981-13-8759-3 (eBook). doi:10.1007/978-981-13-8759-
3, India.
Sena, D. , Ozturkb, M. , Vayvayc, O. (2016). “An overview of big data for growth in SMEs.”
Procedia-Social and Behavioral Sciences, Turkey 235: 159–167.
Yun-Peng, Z. , et al. Digital image encryption algorithm based on chaos and improved DES.
IEEE International Conference on, Systems, Man and Cybernetics, India, 2009. SMC 2009.
Lv, Z. , X. Li , H. Lv , W. Xiu . (2019). “BIM big data storage in WebVRGIS.” IEEE
Transactions on Industrial Informatics 16(4): 2566–2573.
Zhao, W. , et al. Parallel k-means clustering based on mapreduce. IEEE international
conference on Cloud Computing, 2009, Springer, Berlin, Heidelberg, pp. 674–679.
Zhu, W. , P. Cui , Z. Wang , G. Hua . (2015). “Multimedia big data computing”, IEEE
Multimedia, 22(3): 96–c3.
Zhang, M. Strict integrity policy of Biba model with dynamic characteristics and its
correctness. International Conference on Computational Intelligence and Security, China,
2009. CIS’09.
Michael, K. , K. W. Miller (2013). “Big data: New opportunities and new challenges.” Editorial:
IEEE Computer 46(6): 22–24.
Agrawal, D. , et al. “Data management challenges in cloud computing infrastructures.”
International Workshop on Databases in Networked Information Systems, 2010, Springer,
Berlin, Heidelberg: pp. 1–10.
Squicciarini, A. , et al. Preventing Information Leakage from Indexing in the Cloud. IEEE 3rd
International Conference on Cloud Computing (CLOUD), Miami, FL, USA, 2010.
Fluhrer, S. , et al. Weaknesses in the key scheduling algorithm of RC4. International
Workshop on Selected Areas in Cryptography, 2020, Springer, Berlin, Heidelberg.
Benjelloun, F. Z. , A. A. Lahcen , S. Belfkih . An overview of big data opportunities,
applications and tools. Intelligent Systems and Computer Vision (ISCV), 2015.
Zhang, X. , C. Liu , S. Nepal , S. Pandey , J. Chen (2013). “A privacy leakage upper bound
constraint-based approach for cost-effective privacy preserving of intermediate data sets in
cloud.” IEEE Transactions on Parallel and Distributed Systems 24(6): 1192–1202. doi:
10.1109/TPDS.2012.238.
Selimović, A. , B. Meden , P. Peer , A. Hladnik . Analysis of content-aware image
compression with VGG16. IEEE International Work Conference on Bioinspired Intelligence
(IWOBI), San Carlos, Costa Rica, 2018.
Buza, K. , et al. (2011). A distributed genetic algorithm for graph-based clustering. Man-
Machine Interactions 2, Springer, Germany: pp. 323–331.
Sebé, F. , et al. (2008). “Efficient remote data possession checking in critical information
infrastructures.” IEEE Transactions on Knowledge and Data Engineering 20(8): 1034–1038.
Hu, J. , A. V. Vasilakos . (September 2016). “Energy big data analytics and security:
Challenges and opportunities.” IEEE Transactions on Smart Grid 7(5): 2423–2436.
Chen, D. , H. Zhao . Data security and privacy protection issues in cloud computing. doi:
10.1109/ICCSEE.2012.193.
Wang, M. , et al. (2013). “High volumes of event stream indexing and efficient multi-keyword
searching for cloud monitoring.” Future Generation Computer Systems 29(8): 1943–1962.
Zhao, Z. , W. Ng . A model-based approach for RFID data stream cleansing. Proceedings of
the 21st ACM International Conference on Information and Knowledge Management, China,
2012, ACM.
Zografos, K. G. , K. N. Androutsopoulos (2004). “A heuristic algorithm for solving hazardous
materials distribution problems.” European Journal of Operational Research 152(2): 507–519.
Agrawal, D. , C. C. Aggarwal . On the design and quantification of privacy preserving data
mining algorithms. Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART
Symposium on Principles of Database Systems, 2001, Santa Barbara, California, USA, pp.
247–255.
Bertino, E. , Ferrar, E. (2018). Big Data Security and Privacy, Springer International
Publishing AG.
Zhang, D. Big data security and privacy protection. 8th International Conference on
Management and Computer Science (ICMCS 2018), China 2018.
Seref, S. , S. Duygu . Big data: A review. International Conference on Collaboration
Technologies and Systems (CTS), 2013.
Ibrahim, A. , et al. (2015). “The rise of “big data” on cloud computing: Review and open
research issues.” Information Systems 47: 98–115.

Voice Assistants and Chatbots Hands on Essentials of UI and Feature


Design Development and Testing
Bii, Patrick. “Chatbot technology: A possible means of unlocking student potential to learn
how to learn.” Educational Research 4, no. 2 (2013): 218–221.
McTear, Michael , Zoraida Callejas , and David Griol . “Creating a conversational interface
using chatbot technology.”In The Conversational Interface, pp. 125–159. Springer, Cham,
2016.
Bradeško, Luka , and Dunja Mladenić . “A survey of chatbot systems through a Loebner prize
competition.” In Proceedings of Slovenian Language Technologies Society Eighth
Conference of Language Technologies, pp. 34–37. 2012. Ljubljana, Slovenia: Institut Jožef
Stefan.
Nasirian, Farzaneh , Mohsen Ahmadian , and One-Ki Daniel Lee . “AI-based voice assistant
systems: Evaluating from the interaction and trust perspectives.” (2017).
Bellegarda, Jerome R. “Large-scale personal assistant technology deployment: The siri
experience.” In INTERSPEECH, pp. 2029–2033. 2013.
Plant, Robert. “An introduction to artificial intelligence.” In 32nd Aerospace Sciences Meeting
and Exhibit, p. 294. 2011.
Charniak, Eugene. Introduction to Artificial Intelligence. Pearson Education India, 1985.
Wenger, Etienne. Artificial intelligence and tutoring systems: Computational and cognitive
approaches to the communication of knowledge. Morgan Kaufmann, 2014.
Glover, Fred , and Harvey J. Greenberg . “New approaches for heuristic search: A bilateral
linkage with artificial intelligence.” European Journal of Operational Research 39, no. 2
(1989): 119–130.
Goodfellow, Ian , Y. Bengio , and A. Courville . “Machine learning basics.” Deep Learning 1
(2016): 98–164.
Ayodele, Taiwo Oladipupo. “Types of machine learning algorithms.” New Advances in
Machine Learning 3 (2010): 19–48.
Caruana, Rich , and Alexandru Niculescu-Mizil . “An empirical comparison of supervised
learning algorithms.” In Proceedings of the 23rd International Conference on Machine
Learning, pp. 161–168. 2006.
Zhu, Xiaojin , and Andrew B. Goldberg . “Introduction to semi-supervised learning.” Synthesis
Lectures on Artificial Intelligence and Machine Learning 3, no. 1 (2009): 1–130.
Barlow, Horace B. “Unsupervised learning.” Neural Computation 1, no. 3 (1989): 295–311.
Hastie, Trevor , Robert Tibshirani , and Jerome Friedman . “Unsupervised learning.” In The
Elements of Statistical Learning, pp. 485–585. Springer, New York, NY, 2009.
Dayan, Peter , Maneesh Sahani , and Grégoire Deback . “Unsupervised learning.” The MIT
encyclopedia of the cognitive sciences (1999): 857–859.
Sutton, Richard S. , and Andrew G. Barto . Reinforcement Learning: An Introduction. MIT
Press, Cambridge, MA, 2018.
Wiering, Marco , and Martijn Van Otterlo . Reinforcement Learning. Vol. 12. Springer, Cham,
2012.
Sutton, Richard S. , and Andrew G. Barto . Introduction to Reinforcement Learning. Vol.
135.MIT Press, Cambridge, MA, 1998.
Dale, Robert. “The return of the chatbots.” Natural Language Engineering 22, no. 5 (2016):
811–817.
Sezgin, Emre , Lisa K. Militello , Yungui Huang , and Simon Lin . “A scoping review of patient-
facing, behavioral health interventions with voice assistant technology targeting self-
management and healthy lifestyle behaviors.” Translational Behavioral Medicine 10, no. 3
(2020): 606–628.
Zamora, Jennifer. “Rise of the chatbots: Finding a place for artificial intelligence in India and
US.” In Proceedings of the 22nd International Conference on Intelligent User Interfaces
Companion, pp. 109–112. 2017.
Garg, Shivank , Noelle L. Williams , Andrew Ip , and Adam P. Dicker . “Clinical integration of
digital solutions in health care: An overview of the current landscape of digital technologies in
cancer care.” JCO Clinical Cancer Informatics 2 (2018): 1–9.
Dibitonto, Massimiliano , Katarzyna Leszczynska , Federica Tazzi , and Carlo M. Medaglia .
“Chatbot in a campus environment: Design of LiSA, a virtual assistant to help students in their
university life.” In International Conference on Human-Computer Interaction, pp. 103–116.
Springer, Cham, 2018.
Fernandes, Teresa , and Elisabete Oliveira . “Understanding consumers’ acceptance of
automated technologies in service encounters: Drivers of digital voice assistants adoption.”
Journal of Business Research 122 (2020): 180–191.
Zamora, Jennifer. “I’m sorry, dave, i’m afraid i can’t do that: Chatbot perception and
expectations.” In Proceedings of the 5th International Conference on Human Agent
Interaction, pp. 253–260. 2017.
Ask, Julie A. , Michael Facemire , Andrew Hogan , and H. B. Conversations . “The state of
chatbots.” Forrester. com report 20 (2016).
Boiano, Stefania , Ann Borda , Guiliano Gaia , Stefania Rossi , and Pietro Cuomo . “Chatbots
and new audience opportunities for museums and heritage organisations.” Electronic
Visualisation and the Arts (2018): 164–171.
Adamopoulou, Eleni , and Lefteris Moussiades . “Chatbots: History, technology, and
applications.” Machine Learning with Applications 2 (2020): 100006.

Future Communication Networks


Alberti, Antonio Marcos , Marco Aurelio Favoreto Casaroli , Dhananjay Singh , and Rodrigo
da Rosa Righi . “Naming and name resolution in the future internet: Introducing the
NovaGenesis approach.” Future Generation Computer Systems 67 (2017): 163–179.
Forecast, G. M. D. T. “Cisco visual networking index: Global mobile data traffic forecast
update, 2017–2022.” Update 2017 (2019): 2022.
Fazea, Yousef. “Numerical simulation of helical structure mode-division multiplexing with
nonconcentric ring vortices.” Optics Communications 437 (2019): 303–311.
Fazea, Yousef. “Mode division multiplexing and dense WDM-PON for Fiber-to-the-Home.”
Optik 183 (2019): 994–998.
Fazea, Yousef , Mustafa Muwafak Alobaedy , and Zeyid T. Ibraheem . “Performance of a
direct-detection spot mode division multiplexing in multimode fiber.” Journal of Optical
Communications 40, no. 2 (2019): 161–166.
Fazea, Yousef , and Angela Amphawan . “5× 5 25 Gbit/s WDM-MDM.” Journal of Optical
Communications 36, no. 4 (2015): 327–333.
Fazea, Yousef , and Vitaliy Mezhuyev . “Selective mode excitation techniques for mode-
division multiplexing: A critical review.” Optical Fiber Technology 45 (2018): 280–288.
Fazea, Yousef , and Angela Amphawan . “32 channel DQPSK DWDM-PON for local area
network using dispersion compensation fiber.” In EPJ Web of Conferences, vol. 162, p.
01016. EDP Sciences, InCAPE2017, 2017.
Hassan, Suhaidi , Yousef Fazea , Adib Habbal , and Huda Ibrahim . “Twisted Laguerre-
Gaussian mode division multiplexing to support blockchain applications.” In TENCON 2017-
2017 IEEE Region 10 Conference, pp. 2421–2450. IEEE, Penang, Malaysia, 2017.
Naeem, Muhammad Ali , Shahrudin Awang Nor , Suhaidi Hassan , and Byung-Seo Kim .
“Performances of probabilistic caching strategies in content centric networking.” IEEE Access
6 (2018): 58807–58825.
Naeem, Muhammad Ali , Shahrudin Awang Nor , and Suhaidi Hassan . “Future Internet
Architectures.” In International Conference of Reliable Information and Communication
Technology, pp. 520–532. Springer, Cham, 2019.
Naeem, Muhammad Ali , Rashid Ali , Byung-Seo Kim , Shahrudin Awang Nor , and Suhaidi
Hassan . “A periodic caching strategy solution for the smart city in information-centric Internet
of Things.” Sustainability 10, no. 7 (2018): 2576.
CV Networking. CiscoGlobal Cloud Index: Forecast and methodology, 2015–2020. White
paper by Cisco (2017).
Dräxler, Martin , and Holger Karl . “Efficiency of on-path and off-path caching strategies in
information centric networks.” In 2012 IEEE International Conference on Green Computing
and Communications, pp. 581–587. IEEE, Nov. 20 2012 to Nov. 23 2012 Besancon, France,
2012.
Ahlgren, Bengt , Christian Dannewitz , Claudio Imbrenda , Dirk Kutscher , and Borje Ohlman .
“A survey of information-centric networking.” IEEE Communications Magazine 50, no. 7
(2012): 26–36.
Singhal, Rahul , Eric K. Geyer , Henning Makholm , and Christian Worm Mortensen . “Marker
based reporting system for hybrid content delivery network and peer to peer network.” U.S.
Patent 10,887,385, issued January 5, 2021 .
Lu, Zhihui , Ye Wang , and Yang Richard Yang . “An analysis and comparison of CDN-P2P-
hybrid content delivery system and model.” JCM 7, no. 3 (2012): 232–245.
Montpetit, Marie-Jose , Serge Fdida , and Jianping Wang . “Future internet: Architectures and
protocols.” IEEE Communications Magazine 57, no. 7 (2019): 12–12.
Gavras, Anastasius , Arto Karila , Serge Fdida , Martin May , and Martin Potts . “Future
internet research and experimentation: The FIRE initiative.” ACM SIGCOMM Computer
Communication Review 37, no. 3 (2007): 89–92.
Yan, Huan , Deyun Gao , Wei Su , Chuan Heng Foh , Hongke Zhang , and Athanasios V.
Vasilakos . “Caching strategy based on hierarchical cluster for named data networking.” IEEE
Access 5 (2017): 8433–8443.
Pan, Jianli , Subharthi Paul , and Raj Jain . “A survey of the research on future internet
architectures.” IEEE Communications Magazine 49, no. 7 (2011): 26–36.
Fisher, Darleen. “A look behind the future internet architectures efforts.” ACM SIGCOMM
Computer Communication Review 44, no. 3 (2014): 45–49.
De Meer, Hermann , Karin Anna Hummel , and Robert Basmadjian . “Future Internet services
and architectures: Trends and visions.” Telecommunication Systems 51, no. 4 (2012):
219–220.
Paschos, Georgios S. , George Iosifidis , Meixia Tao , Don Towsley , and Giuseppe Caire .
“The role of caching in future communication systems and networks.” IEEE Journal on
Selected Areas in Communications 36, no. 6 (2018): 1111–1125.
Fang, Chao , Haipeng Yao , Zhuwei Wang , Wenjun Wu , Xiaoning Jin , and F. Richard Yu .
“A survey of mobile information-centric networking: Research issues and challenges.” IEEE
Communications Surveys & Tutorials 20, no. 3 (2018): 2353–2371.
Arianfar, Somaya , Pekka Nikander , and Jörg Ott . “On content-centric router design and
implications.” In Proceedings of the Re-architecting the Internet Workshop, pp. 1–6. 2010.
ReArch’10 was held in conjunction with 6th ACM International Conference - Co-NEXT ‘10:
Conference on emerging Networking Experiments and Technologies, Philadelphia, PA, 30
November 2010 .
Chai, Wei Koong , Diliang He , Ioannis Psaras , and George Pavlou . “Cache “less for more”
in information-centric networks (extended version).” Computer Communications 36, no. 7
(2013): 758–770.
Cui, Xian-dong , Tao Huang , L. I. U. Jiang , L. I. Li , Jian-ya Chen , and Yun-jie Liu . “Design
of in-network caching scheme in CCN based on grey relational analysis.” The Journal of
China Universities of Posts and Telecommunications 21, no. 2 (2014): 1–8.
Naeem, Muhammad Ali , Shahrudin Awang Nor , Suhaidi Hassan , and Byung-Seo Kim .
“Compound popular content caching strategy in named data networking.” Electronics 8, no. 7
(2019): 771.
Naeem, Muhammad Ali , and Suhaidi Hassan . “IP-Internet data dissemination challenges
and future research directions.” Journal of Advanced Research in Dynamical and Control
Systems 10, no. 10 (2018): 1596–1606.
Bechtold, Stefan , and Adrian Perrig . “Accountability in future internet architectures.”
Communications of the ACM 57, no. 9 (2014): 21–23.
Peng, Chen , Qing-Long Han , and Dong Yue . “Communication-delay-distribution-dependent
decentralized control for large-scale systems with IP-based communication networks.” IEEE
Transactions on Control Systems Technology 21, no. 3 (2012): 820–830.
Azgin, Aytac , Ravishankar Ravindran , and Guoqiang Wang . “Hash-based overlay routing
architecture for information centric networks.” In 2016 25th International Conference on
Computer Communication and Networks (ICCCN), pp. 1–9. IEEE, Waikoloa, HI, 2016.
Saha, Sumanta , Andrey Lukyanenko , and Antti Ylä-Jääski . “Cooperative caching through
routing control in information-centric networks.” In 2013 Proceedings IEEE INFOCOM, pp.
100–104. IEEE Computer and Communications Societies, Turin, Italy, 2013.
Xylomenos, George , Christopher N. Ververidis , Vasilios A. Siris , Nikos Fotiou , Christos
Tsilopoulos , Xenofon Vasilakos , Konstantinos V. Katsaros , and George C. Polyzos . “A
survey of information-centric networking research.” IEEE Communications Surveys &
Tutorials 16, no. 2 (2013): 1024–1049.
Barakabitze, Alcardo Alex , Tan Xiaoheng , and Guo Tan . “A survey on naming, name
resolution and data routing in information centric networking (ICN).” International Journal of
Advanced Research in Computer and Communication Engineering 3, no. 10 (2014):
8322–8330.
Fu, Xiaoming , Dirk Kutscher , Satyajayant Misra , and Ruidong Li . “Information-centric
networking security.” IEEE Communications Magazine 56, no. 11 (2018): 60–61.
Ambrosin, Moreno , Alberto Compagno , Mauro Conti , Cesar Ghali , and Gene Tsudik .
“Security and privacy analysis of national science foundation future internet architectures.”
IEEE Communications Surveys & Tutorials 20, no. 2 (2018): 1418–1442.
Adhatarao, Sripriya , Mayutan Arumaithurai , Dirk Kutscher , and Xiaoming Fu . “NeMoI:
Network mobility in ICN.” In International Conference on Communication Systems and
Networks, pp. 220–244. Springer, Cham, 2018.
Kitagawa, Taku , Shingo Ala , Suyong Eum , and Masayuki Murata . “Mobility-controlled flying
routers for information-centric networking.” In 2018 15th IEEE Annual Consumer
Communications & Networking Conference (CCNC), pp. 1–2. IEEE, 12–15 January 2018 ,
Las Vegas, 2018.
Adhikari, Sharmistha , Sangram Ray , Gosta P. Biswas , and Mohammad S. Obaidat .
“Efficient and secure business model for content centric network using elliptic curve
cryptography.” International Journal of Communication Systems 32, no. 1 (2019): e3839.
Adhikari, Sharmistha , and Sangram Ray . “A Lightweight and secure IoT communication
framework in content-centric network using elliptic curve cryptography.” In Recent Trends in
Communication, Computing, and Electronics, pp. 207–216. Springer, Singapore, 2019.
Adhikari, Sharmistha , Sangram Ray, Mohammad S. Obaidat , and G. P. Biswas . “Efficient
and secure content dissemination architecture for content centric network using ECC-based
public key infrastructure.” Computer Communications 157(2020): 187–203.
Adhikari, Sharmistha , and Sangram Ray . “A secure anonymous mobile handover
authentication protocol for content centric network.” In International Conference on
Computational Intelligence, Communications, and Business Analytics, pp. 360–373. Springer,
Singapore, 2018.
Vasilakos, Athanasios V. , Zhe Li , Gwendal Simon , and Wei You . “Information centric
network: Research challenges and opportunities.” Journal of Network and Computer
Applications 52 (2015): 1–10.
Kutscher, Dirk , Suyong Eum , Kostas Pentikousis , Ioannis Psaras , Daniel Corujo , Damien
Saucez, Thomas C. Schmidt , and Matthias Waehlisch . “Information-centric networking (ICN)
research challenges.” Internet Research Task Force (IRTF) (2016):1–38.
Qazi, Faiza , Osman Khalid , Rao Naveed Bin Rais , and Imran Ali Khan . “Optimal content
caching in content-centric networks.” Wireless Communications and Mobile Computing 2019
(2019).

You might also like