Introduction to Predictive Computing

Chapter

Abstract

With the advancements in computing techniques, there is a significant shift in programming paradigm which is from procedural programming to agent-based programming. Modern computing techniques have more focus on interdisciplinary approaches to perform complex tasks and development to satisfy human needs. Integration of Internet of Things, cloud computing and wireless sensor networks has made it possible to make prediction in real time for different application areas including health care, transportation, smart home, etc. In this chapter, predictive computing has been introduced and six major pillars of predictive computing known as (a) Internet of Things, (b) Cloud computing, (c) Mobile computing, (d) Pervasive computing, (e) Wireless sensor networks (WSN) and (f) Big data are described. The role of information security techniques to maintain the data confidentiality, privacy and trust like major issues during the communication, storage and accessing of data is also provided.

Keywords

Computing Predictive analytics Predictive computing Predictive model Cloud computing Internet of Things Big data Pervasive computing Information security Data confidentiality Privacy Trust 

References

  1. 1.
    Ishida T, Sasaki Y, Fukuhara Y (1991) Use of procedural programming languages for controlling production systems. Paper presented at seventh conference on artificial intelligence applications, Miami Beach, FL, USAGoogle Scholar
  2. 2.
    Hagen W (2006) The style of sources: remarks on the theory and history of programming languages. In: Wendy H, Thomas K (eds) New media, old media. A history and theory reader. Taylor and Francis group, Routledge, pp 157–174Google Scholar
  3. 3.
    Rajaraman V (1998) Programming languages. Resonance 43–54Google Scholar
  4. 4.
    Naur P et al (1997) Revised report on the algorithmic language Algol 60. In: Proceedings of ALGOL-like languages, Birkhäuser, Boston, pp 19–49Google Scholar
  5. 5.
    van Wijngaarden A (1981) Revised report of the algorithmic language Algol 68. Proc ALGOL Bull (Sup 47):1–119Google Scholar
  6. 6.
    Backus J (1978) The history of Fortran I, II, and III. In: Proceedings of history of programming languages I, ACM, pp 25–74Google Scholar
  7. 7.
    Holtz NM, Rasdorf WJ (1988) An evaluation of programming languages and language features for engineering software development. Eng Comput 3(4):183–199CrossRefGoogle Scholar
  8. 8.
    Wirth N (1971) The programming language Pascal. Acta Informatica 1(1):35–63CrossRefMATHGoogle Scholar
  9. 9.
    Abelson H, Goodman N, Rudolph L (1971) Logo manual. Artificial Intelligence Lab, Available via DSpace@MIT. https://dspace.mit.edu/handle/1721.1/6226. Accessed 25 May 2017
  10. 10.
    Brusilovsky P, Calabrese E et al (1997) Mini-languages: a way to learn programming principles. Educ Inf Technol 2(1):65–83Google Scholar
  11. 11.
    Bonatti P, Calimeri F, Leone N, Ricca F (2010) Answer set programming. A 25-year perspective on logic programming, pp 159–182Google Scholar
  12. 12.
    Ousterhout JK (1998) Scripting: higher level programming for the 21st century. Computer 31(3):23–30Google Scholar
  13. 13.
    Burton B, Willis DA (2015) Gartner’s hype cycles for 2015: five megatrends shift the computing landscape. Recuperado de. https://www.gartner.com/doc/3111522/gartners-‐hype-‐cycles-‐megatrends-‐shift. Accessed 12 Feb 2017
  14. 14.
    Løvengreen HH (2004) Processes and threads. Course notes. Available via IMM. http://www2.compute.dtu.dk/courses/02158/proc.pdf. Accessed 15 Mar 2017
  15. 15.
    Burns A, Wellings A (1995) Concurrency in ADA. Cambridge University Press, CambridgeMATHGoogle Scholar
  16. 16.
    Armstrong J (2010) Erlang. Commun ACM 53(9):68–75CrossRefGoogle Scholar
  17. 17.
    Matsakis ND, Klock FS II (2014) The rust language. ACM SIGAda Ada Lett 34(3):103–104CrossRefGoogle Scholar
  18. 18.
    Hu C, Mao X, Li M, Zhu Z (2014) Organization-based agent-oriented programming: model, mechanisms, and language. Front Comput Sci 8(1):33–51MathSciNetCrossRefGoogle Scholar
  19. 19.
    Dennis LA, Fisher M, Webster MP, Bordini RH (2012) Model checking agent programming languages. Autom Softw Eng 19(1):5–63CrossRefGoogle Scholar
  20. 20.
    Rao A (1996) AgentSpeak(L): BDI agents speak out in a logical computable language. In: Proceedings of 7th European workshop on modelling autonomous agents in a multi-agent world (MAAMAW). 1038, pp 42–55Google Scholar
  21. 21.
    Bartels AH (2009) Smart computing drives the new era of IT growth. Forrester Inc., Cambridge, pp 1–44Google Scholar
  22. 22.
    Comer DE, Gries D, Mulder MC, Tucker A, Turner AJ, Young PR, Denning PJ (1989) Computing as a discipline. Commun ACM 32(1):9–23CrossRefGoogle Scholar
  23. 23.
    Denning PJ (2007) Computing is a natural science. Commun ACM 50(7):13–18CrossRefGoogle Scholar
  24. 24.
    Shackelford R, McGettrick A, Sloan R, Topi H, Davies G, Kamali R, Cross J, Impagliazzo J, LeBlanc R, Lunt B (2005) Computing curricula 2005: the overview report. ACM SIGCSE Bull 38(1):456–457CrossRefGoogle Scholar
  25. 25.
    Hawkins BL (2008) Accountability, demands for information, and the role of the campus IT organization. The tower and the cloud, pp 98–104Google Scholar
  26. 26.
    Matt D (2015) Analytics: meaning different things to different people. http://www.itproportal.com/2015/10/23/analytics-meaning-different-things-to-different-people/. Accessed 15 May 2017
  27. 27.
    Eckerson WW (2007) Predictive analytics. Extending the value of your data warehousing investment. TDWI Best Practices Report, Q1, pp 1–36Google Scholar
  28. 28.
    IBM (2010) Real world predictive analytics. Available via IBM Software. http://www.alemsistem.ba/media/1592/wp_real-world-predictive-analytics_ibm_spss.pdf. Accessed 10 Feb 2017
  29. 29.
    SPSS (2010) Predictive analytics: defined. http://www.spss.com.hk/corpinfo/predictive.htm. Accessed 10 Feb 2017
  30. 30.
    Nadin M (2016) Predictive and anticipatory computing. In: Phillip AL (ed) Encyclopaedia of computer science and technology, 2nd edn. CRC Press, pp 643–659Google Scholar
  31. 31.
    Frost & Sullivan (2017) Next evolution in IoT will be sentient tools and cognition or predictive computing. http://www.prnewswire.com/news-releases/next-evolution-in-iot-will-be-sentient-tools-and-cognition-or-predictive-computing-300450448.html. Accessed 10 Feb 2017
  32. 32.
    Frost & Sullivan (2016) IoT 2.0: predictive computing. https://ww2.frost.com/frost-perspectives/iot-20-predictive-computing. Accessed 10 Feb 2017
  33. 33.
    Stankovic JA (2014) Research directions for the internet of things. IEEE Internet Things J 1(1):3–9CrossRefGoogle Scholar
  34. 34.
    Baughman AK, Bogdany RJ, McAvoy C, Locke R, O’Connell B, Upton C (2015) Predictive cloud computing with big data: professional golf and tennis forecasting. IEEE Comput Intell Mag 10(3):62–76CrossRefGoogle Scholar
  35. 35.
    Liu GY, Maguire GQ (1995) A predictive mobility management algorithm for wireless mobile computing and communications. In: Proceedings of fourth international conference on universal personal communications, Tokyo, Japan, IEEE, pp 268–272Google Scholar
  36. 36.
    Rajkamal (2007) Mobile computing. Oxford University Press, OxfordGoogle Scholar
  37. 37.
    Thota C, Manogaran G, Lopez D, Vijayakumar V (2016) Big data security framework for distributed cloud data centers. Cybersecurity breaches and issues surrounding online threat protection, IGI global, pp 288–310Google Scholar
  38. 38.
    Song H, Liu H (2017) Predicting tourist demand using big data. In: Analytics in smart tourism design. Springer International Publishing, BerlinGoogle Scholar
  39. 39.
    Enz CC, El-Hoiydi A, Decotignie JD, Peiris V (2004) WiseNET: an ultralow-power wireless sensor network solution. Computer 37(8):62–70CrossRefGoogle Scholar
  40. 40.
    Lu G, Krishnamachari B, Raghavendra CS (2004) An adaptive energy-efficient and low-latency MAC for data gathering in wireless sensor networks. In: Proceedings of 18th international parallel and distributed processing symposium, Mexico, pp 62–70Google Scholar
  41. 41.
    Kranz M, Holleis P, Schmidt A (2010) Embedded interaction: interacting with the internet of things. IEEE Internet Comput 14(2):46–53CrossRefGoogle Scholar
  42. 42.
    Blaze M, Feigenbaum J, Lacy J (1996) Decentralized trust management. In: Proceedings of symposium on security and privacy, Oakland, CA, USA, pp 164–173Google Scholar
  43. 43.
    Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38–47CrossRefGoogle Scholar
  44. 44.
    Papadopoulos S, Yang Y, Papadias D (2007) CADS: continuous authentication on data streams. In: Proceedings of 33rd international conference on very large data bases, Vienna, Austria, pp 135–146Google Scholar
  45. 45.
    Ali M, ElTabakh M, Nita-Rotaru C (2005) FT-RC4: a robust security mechanism for data stream systems. Comput Sci Tech Rep Paper 1638:1–10Google Scholar
  46. 46.
    Nehme RV, Rundensteiner EA, Bertino E (2008) A security punctuation framework for enforcing access control on streaming data. In: Proceedings of 24th international conference on data engineering (ICDE 2008), Cancun, Mexico, pp 406–415Google Scholar
  47. 47.
    Hammad MA, Franklin MJ, Aref WG, Elmagarmid AK (2003) Scheduling for shared window joins over data streams. In: Proceedings of 29th international conference on very large data bases, vol 29. Berlin, Germany, pp 297–308Google Scholar
  48. 48.
    Hu L, Evans D (2003) Secure aggregation for wireless networks. In: Proceedings of symposium on applications and the internet workshops, Orlando, FL, USA, pp 384–391Google Scholar
  49. 49.
    Bagaa M, Lasla N, Ouadjaout A, Challal Y (2007) Sedan: secure and efficient protocol for data aggregation in wireless sensor networks. In: Proceedings of 32nd conference on local computer networks (LCN 2007), Dublin, Ireland, IEEE, pp 1053–1060Google Scholar
  50. 50.
    Van Lamsweerde A, Letier E (2000) Handling obstacles in goal-oriented requirements engineering. IEEE Trans Softw Eng 26(10):978–1005CrossRefGoogle Scholar
  51. 51.
    Liu L, Yu E, Mylopoulos J (2002) Analyzing security requirements as relationships among strategic actors. In: Proceedings of symposium on requirements engineering for information security (SREIS’02), Raleigh, North Carolina, pp 1–14Google Scholar
  52. 52.
    Mouratidis H, Giorgini P, Manson G, (2003) Integrating security and systems engineering: towards the modelling of secure information systems. In: International conference on advanced information systems engineering, Klagenfurt, Austria, pp 63–78Google Scholar
  53. 53.
    Kalloniatis C et al (2008) Addressing privacy requirements in system design: the PriS method. Requir Eng 13(3):241–255CrossRefGoogle Scholar
  54. 54.
    Coen-Porisini A, Colombo P, Sicari S (2010) Privacy aware systems: from models to patterns. IGI Global, pp 232–259Google Scholar
  55. 55.
    Ren K, Li T, Wan Z, Bao F, Deng RH, Kim K (2004) Highly reliable trust establishment scheme in ad hoc networks. Comput Netw 45(6):687–699CrossRefMATHGoogle Scholar
  56. 56.
    Liang Z, Shi W (2005) Enforcing cooperative resource sharing in untrusted P2P computing environments. Mob Netw Appl 10(6):971–983CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringJaypee University of Information TechnologySolan, Himachal PradeshIndia
  2. 2.Department of Computer Science and EngineeringJaypee University of Engineering and TechnologyGunaIndia
  3. 3.Department of Computer Science and EngineeringIndian Institute of Technology BHUVaranasiIndia

Personalised recommendations