Machine Learning Techniques and Cloud Computing to Estimate River Water Quality—Survey

Author(s):  
M. Ranjithkumar ◽  
L. Robert
Author(s):  
Sakshi Khullar ◽  
Nanhey Singh

Abstract Water is a prime necessity for the survival and sustenance of all living beings. Over the past few years, the water quality of rivers has been adversely affected due to harmful wastes and pollutants. This ever-increasing water pollution is a matter of great concern as it is deteriorating the water quality, making it unfit for any type of use. Contaminated water resources can cause serious effects on humans as well as aquatic life. Hence, water quality monitoring of reservoirs is essential. Recently, water quality modeling using AI techniques has generated a lot of interest and it can be very beneficial in ecological and water resources management. This paper presents the state-of-the-art application of machine learning techniques in forecasting river water quality. It highlights the different key techniques, advantages, disadvantages, and applications with respect to monitoring the river water quality. The review also intends to find the existing challenges and opportunities for future research.


Author(s):  
Himanshu Sahu ◽  
Gaytri

IoT requires data processing, which is provided by the cloud and fog computing. Fog computing shifts centralized data processing from the cloud data center to the edge, thereby supporting faster response due to reduced communication latencies. Its distributed architecture raises security and privacy issues; some are inherited from the cloud, IoT, and network whereas others are unique. Securing fog computing is equally important as securing cloud computing and IoT infrastructure. Security solutions used for cloud computing and IoT are similar but are not directly applicable in fog scenarios. Machine learning techniques are useful in security such as anomaly detection, intrusion detection, etc. So, to provide a systematic study, the chapter will cover fog computing architecture, parallel technologies, security requirements attacks, and security solutions with a special focus on machine learning techniques.


Sign in / Sign up

Export Citation Format

Share Document