Atjaunināt sīkdatņu piekrišanu

E-grāmata: Blockchain Technology and Applications

Edited by (Nitte Meenakshi Institute of Technology, India), Edited by (NIT Karnataka, India), Edited by (PESIT M, Shivamogga, India), Edited by (NIT, Karnataka, India), Edited by (BMS Institute of Technology and Management, India)
  • Formāts - EPUB+DRM
  • Cena: 62,60 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Bibliotēkām

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Blockchain is an emerging platform for developing decentralized applications and data storage, over and beyond its role as a platform for cryptocurrencies. This reference text provides a comprehensive discussion on blockchain technology from research and application perspective.











Discusses different approaches for building distributed applications (DAPPS).







Provides detailed listing and discussion of blockchain technology applications in solving real life problems.





Covers proof of work (PoW) based blockchain consensus, and proof of stake (PoS) based blockchain consensus.





Discusses blockchain algorithms including practical byzantine fault tolerance (PBFT) and simplified byzantine fault tolerance (SBFT).

It comprehensively covers important topics including blockchain consensus algorithms, Ethereum, Hyperledger, blockchain scalability, smart contracts with solidity, ERC20 standards, building DApp with Golang, building DApp using Hyperledger, building PoCs with Hyperledger fabric, blockchain as a server, blockchain security and privacy.

The text will serve as a useful text for senior undergraduate and graduate students in interdisciplinary areas including electronics and communications engineering, electrical engineering, computer science, and information technology.
Foreword xvii
Preface xix
Editor Biographies xxi
Contributors xxv
Chapter 1 Blockchain Foundations and Methods
1(24)
1.0.1 Technologies Behind Blockchain
1(1)
1.1 Need for Blockchain Technology
2(1)
1.1.1 Blockchain Technology as an Infrastructure for the Modern Business
3(1)
1.1.2 Blockchain as a Service
3(1)
1.2 Blockchain Layered Architecture
3(5)
1.3 Blockchain Principles
8(1)
1.3.1 Immutability, Transparency, and Digital Freedom
8(1)
1.3.2 Excellence of use through Truly Decentralised Services
8(1)
1.4 Blockchain Core Components
9(6)
1.4.1 Distributed Ledger Technology
9(1)
1.4.2 Smart Contracts
10(1)
1.4.2.1 Working of the Smart contracts
10(1)
1.4.2.2 Smart Contracts and Blockchain
11(1)
1.4.2.3 Smart Contract Platforms
11(1)
1.4.3 Blockchain Consensus Mechanisms
12(3)
1.5 Building a Blockchain
15(2)
1.6 Record-Keeping with Blockchain
17(1)
1.7 Types of Blockchain
18(1)
1.7.1 Public Blockchain
18(1)
1.7.2 Private Blockchain
18(1)
1.8 Limitations of Blockchain Technology
19(1)
1.9 Future Directions
19(1)
1.10 Conclusion
20(5)
Chapter 2 Unraveling the Blockchain: A Study on Blockchain and Its Potential Applications
25(24)
2.1 Background
27(5)
2.1.1 Structure of Blockchain
28(2)
2.1.2 Blockchain Types
30(1)
2.1.3 Related Works
30(1)
2.1.3.1 Current Research on Blockchain Technology
30(1)
2.1.3.2 Technology in Healthcare
31(1)
2.1.3.3 Securing Smart Cities Using Blockchain Technology
31(1)
2.1.3.4 Blockchain Technology in the Chemical Industry
31(1)
2.1.3.5 Blockchain Technology in the Insurance
32(1)
2.2 Consensus Algorithm
32(1)
2.3 Distributed Ledger
33(1)
2.3.1 Ethereum
33(1)
2.3.2 Hyperledger
34(1)
2.4 Recent Developments in Blockchain Technology
34(1)
2.4.1 Companies Actively Involved in Blockchain Research
34(1)
2.5 Blockchain Platforms
35(3)
2.5.1 Common Blockchain Tools
35(1)
2.5.2 Layers of Blockchain Technology
36(2)
2.6 Challenges
38(2)
2.6.1 Scalability
38(1)
2.6.2 Redesigning Blockchain
38(1)
2.6.3 Privacy Leakage
38(1)
2.6.3.1 Mixing
39(1)
2.6.3.2 Anonymous
39(1)
2.6.4 Selfish Mining
39(1)
2.7 Applications of Blockchain Technology and Future Directions
40(3)
2.8 Conclusion
43(6)
Chapter 3 Interoperability Across Blockchains
49(26)
3.0.1 Advantages and Disadvantages of using Blockchain
50(2)
3.1 Diversified Implementation of Blockchains
52(4)
3.1.1 Transactions
54(1)
3.1.2 Ether and Gas
54(1)
3.1.3 Ethereum Accounts
54(1)
3.1.4 Smart Contracts
55(1)
3.1.5 Fees and Contract Execution
55(1)
3.2 Big Chain DB
56(4)
3.2.1 R3Corda
57(1)
3.2.1.1 Architecture
58(1)
3.2.1.2 Key Features
58(1)
3.2.1.3 PBFT Consensus
58(1)
3.2.2 Literature Review
58(1)
3.2.2.1 Public Connectors
58(1)
3.2.3 Chain of Blockchains
59(1)
3.3 High Level Design of Router
60(3)
3.3.1 Basic Goals
60(3)
3.4 Detailed Design of the Router
63(3)
3.4.1 Various Components
63(1)
3.4.1.1 Adapter
63(1)
3.4.2 Atomic Swaps
63(1)
3.4.3 Sockets
64(1)
3.4.4 Communication Mechanism
64(1)
3.4.5 Communication Protocol
64(2)
3.4.6 Tactics for Availability
66(1)
3.5 Prototype and Experiments
66(4)
3.6 Conclusion
70(5)
Chapter 4 HBasechainDB 3.0 Scalable Implementation of Blockchain on HBase with Capability for Smart Contract
75(24)
4.1 Background and Related Work
76(5)
4.1.1 Ethereum
77(1)
4.1.2 World of Bigdata
78(1)
4.1.2.1 Apache HBase
78(1)
4.1.2.2 BigchainDB
79(1)
4.1.2.3 HBasechainDB
79(2)
4.2 Performance of HBasechainDB through Forking
81(4)
4.2.1 Forking Problem in Hyperledger Fabric
82(1)
4.2.2 Proposed Model
83(2)
4.2.3 Forking Problem in HBasechainDB 3.0
85(1)
4.3 HBasechainDB 3.0
85(5)
4.3.1 Design Features
85(1)
4.3.2 Structural Design
86(1)
4.3.3 Structural Design
87(1)
4.3.3.1 Block Creation Algorithm
87(2)
4.3.3.2 Transaction Validation Algorithm
89(1)
4.3.3.3 Block Validation Algorithm
89(1)
4.3.3.4 Voting Algorithm
89(1)
4.3.3.5 HBasechainDB 3.0 Life Cycle
89(1)
4.4 Performance Analysis
90(6)
4.4.1 Experimentation on Homogeneous HBase Cluster
90(1)
4.4.1.1 Experimental Setup - I
90(2)
4.4.1.2 Experimentation Setup - II
92(1)
4.4.1.3 Experimentation Setup - III
93(3)
4.5 Conclusion
96(1)
4.6 Acknowledgements
96(3)
Chapter 5 An Analysis of Blockchain Technology: A Security and Privacy Perspective
99(20)
5.1 Overview of Blockchain Technology
99(4)
5.1.1 Architecture of Blockchain Technology
100(1)
5.1.1.1 Data Layer
100(1)
5.1.1.2 Network Layer
100(1)
5.1.1.3 Consensus Layer
100(1)
5.1.1.4 Incentive Layer
100(1)
5.1.1.5 Contract Layer
101(1)
5.1.1.6 Application Layer
101(1)
5.1.2 Types of Blockchain
101(1)
5.1.2.1 Public Blockchain
101(1)
5.1.2.2 Private Blockchain
102(1)
5.1.2.3 Consortium Blockchain
102(1)
5.2 Characteristics of the blockchain
103(2)
5.2.1 Multiple writers
103(1)
5.2.2 Shared databases
103(1)
5.2.3 Distributed trust
103(1)
5.2.4 No Intermediaries
104(1)
5.2.5 Transaction dependency
104(1)
5.2.6 Time stamping
104(1)
5.2.7 Transaction rules
104(1)
5.3 Consensus Algorithms
105(2)
5.3.1 Proof of Work (PoW)
105(1)
5.3.2 Proof of Stake (PoS)
106(1)
5.3.3 Proof of Authority (PoA)
106(1)
5.3.4 Byzantine fault tolerance consensus algorithm (BFT)
106(1)
5.3.5 Proof of Elapsed Time (PoET)
106(1)
5.3.6 Comparision of consensus algorithms
106(1)
5.4 Types of attacks on Blockchains
107(2)
5.4.1 Liveness attack
107(1)
5.4.2 Double spending attack
107(1)
5.4.3 51% attack
108(1)
5.4.4 Private key security attack
108(1)
5.4.5 Privacy leakage
108(1)
5.4.6 Selfish mining attack
108(1)
5.4.7 Eclipse attack
109(1)
5.4.8 DAO attack
109(1)
5.5 Security Issues in Blockchain
109(1)
5.5.1 Network Security
109(1)
5.5.2 Malleability
109(1)
5.5.3 Privacy
110(1)
5.5.4 Redundancy
110(1)
5.5.5 Vulnerabilities in smart contract
110(1)
5.6 Existing Solutions to Security Attacks
110(2)
5.6.1 Liveness attack
110(1)
5.6.2 51% Attack
111(1)
5.6.3 Double Spending Attacks
111(1)
5.6.4 Private Key Security Attack
111(1)
5.6.5 Transaction Privacy Leakage
111(1)
5.6.6 Selfish Mining Attack
112(1)
5.7 Existing Techniques to Security Issues
112(1)
5.7.1 Mixing
112(1)
5.7.2 Attribute based encyption
112(1)
5.7.3 Anonymous Signatures
112(1)
5.7.4 Non-Interactive Zero Knowledge Proofs
113(1)
5.8 Open Issues
113(2)
5.8.1 Proper framework against the combined attacks
113(1)
5.8.2 Zero-day attack policies
114(1)
5.8.3 Exchange of security keys
114(1)
5.8.4 Infrastructure
114(1)
5.8.5 Utilisation of available resources
114(1)
5.8.6 Trade-off's in performance
114(1)
5.8.7 Insider threat management
114(1)
5.9 Conclusion
115(4)
Chapter 6 Blockchain Technology and Its Potential Applications
119(32)
6.0.1 Blockchain's Core Characteristics
119(1)
6.0.2 Architecture of Blockchain
119(2)
6.1 Globalisation as a trend and challenge to adopt the trend
121(1)
6.1.1 The growing prominence of decentralised ledger
121(1)
6.1.2 Decentralised ledgers and blockchain are not the same
122(1)
6.2 Blockchain consensus algorithm
122(2)
6.3 Types of blockchain
124(1)
6.4 Blockchain Transactional Flow
125(1)
6.5 Blockchain scalability
125(2)
6.6 Security and Privacy in Blockchain
127(1)
6.7 Blockchain as a Service (BaaS)
128(1)
6.8 Hyperledger Fabric
129(2)
6.8.1 Shared Ledger
130(1)
6.8.2 Smart Contracts
130(1)
6.8.3 Privacy
130(1)
6.8.4 Consensus
130(1)
6.8.5 Benefits of Hyperledger Fabric
131(1)
6.9 Ethereum
131(2)
6.9.1 Is Ethereum Better Than Bitcoin?
132(1)
6.9.2 How Long Does It Take to Mine One Ethereum?
132(1)
6.9.3 Benefits of building on Ethereum
132(1)
6.10 The competition that blockchain faces
133(2)
6.10.1 Hedera Hashgraph
133(1)
6.10.1.1 Hashgraph Consensus Service
133(1)
6.10.1.2 Hedera Governance
133(1)
6.10.2 Cosmos
134(1)
6.10.3 Polkadot Network
134(1)
6.10.4 Circle
134(1)
6.10.5 Coinbase
135(1)
6.11 Applications with Illustrations
135(9)
6.11.1 E-commerce
135(1)
6.11.2 Government
136(1)
6.11.3 Healthcare
137(1)
6.11.4 Entertainment
138(1)
6.11.5 Real Estate
139(1)
6.11.6 Corporate Management
139(1)
6.11.7 Cross-border payments
140(1)
6.11.8 Assets Management
140(1)
6.11.9 Share markets
141(1)
6.11.10 Banking
142(1)
6.11.11 Identity Management
143(1)
6.11.12 Transportation
143(1)
6.12 Benefits of blockchain, current situation and what can be anticipated
144(7)
Chapter 7 Cryptoassets Inheritance: Needs, Challenges, and Solutions
151(28)
7.0.1 Representing cryptoasset - Is it a Fantasy?
153(1)
7.0.1.1 Cryptoassets are Inherently Secure
154(1)
7.0.1.2 Cryptoassets are Certifiable
154(2)
7.0.2 Risk in cryptoasset
156(2)
7.1 Wallet Safeguard Mechanism
158(4)
7.1.1 Wallet Design and recovery of Private key
160(1)
7.1.1.1 Non-deterministic and Randomised Wallet
160(1)
7.1.1.2 Deterministic Seeded Wallet
160(1)
7.1.1.3 Hierarchical Deterministic Wallets
161(1)
7.1.1.4 Multi-Signature Wallet
162(1)
7.2 Cryptocurrencies Jurisdictions and Regulations
162(3)
7.3 Some Practical Implementation of Private Key Custodian
165(2)
7.4 Cryptoasset Will
167(1)
7.4.1 How to "Will" the Cryptoasset
168(1)
7.5 Bitcoin Script and Smart Contract for Cryptoasset Inheritance
168(8)
7.5.1 Bitcoin and Cryptographic "Will"
169(4)
7.5.2 Smart Contract and Cryptographic "Will"
173(2)
7.5.3 ERC20 and ERC721 Tokens
175(1)
7.6 Conclusion
176(3)
Chapter 8 Blockchain in Healthcare
179(14)
8.1 Healthcare Industry 4.0
179(1)
8.2 Blockchain
180(3)
8.2.1 Consesnus
182(1)
8.2.2 Smart Contract
182(1)
8.3 Healthcare Record Management
183(2)
8.4 Medical Insurance
185(1)
8.5 Health Status Monitoring by BAN and IoT
186(2)
8.6 Clinical Research
188(1)
8.7 Contact Tracing
189(1)
8.8 Medical Emergency
189(1)
8.9 Conclusion
190(3)
Chapter 9 Blockchain Privacy and Its Security Challenges
193(22)
9.1 Overview
194(7)
9.1.1 The Concept of Blockchain
194(2)
9.1.2 How Blockchain Works
196(1)
9.1.3 The Blockchain's Structure
197(1)
9.1.4 How to get Consensus
197(1)
9.1.5 Proof of Work (PoW)
198(2)
9.1.6 Proof of Stake (PoS)
200(1)
9.1.7 Types of Blockchain
200(1)
9.1.7.1 Public Blockchain
200(1)
9.1.7.2 Consortium blockchain
200(1)
9.1.7.3 Private blockchain
200(1)
9.2 Application of Blockchain
201(4)
9.2.1 Healthcare
201(1)
9.2.2 Banking and Finance
202(1)
9.2.3 Internet of Things
203(1)
9.2.4 Voting
203(2)
9.2.5 Supply Chain
205(1)
9.2.6 Other uses of Blockchain
205(1)
9.3 Security Challenges of Blockchain
205(4)
9.3.1 Attacks based on Smart contract
206(1)
9.3.1.1 The Decentralised Autonomous Organisation(DAO) Hack
206(1)
9.3.2 Attack based on Consensus and Ledger Mechanism
206(1)
9.3.2.1 Selfish mining attack
206(1)
9.3.2.2 Finney attack
207(1)
9.3.2.3 Timejack attack
207(1)
9.3.2.4 Majority (51 %) attack
207(2)
9.3.3 Attack based on P2P(Peer-to-Peer) Network
209(1)
9.3.3.1 Eclipse attack
209(1)
9.3.3.2 Sybil attack
209(1)
9.3.4 Attack based on Wallet
209(1)
9.3.4.1 Parity Multisig Wallet Attack
209(1)
9.4 Conclusion
209(6)
Chapter 10 Protocol for E-Voting Using Blockchain
215(32)
10.0.1 Pros Pros and Cons of Blockchain
215(1)
10.0.1.1 Ros
215(1)
10.0.1.2 Cons
216(1)
10.1 Literature Review
216(3)
10.1.1 Normal-Voting Schemes
217(1)
10.1.2 Electronic-Voting Schemes
217(1)
10.1.3 Blockchain-Based Schemes
218(1)
10.1.4 Outcome of Literature Survey
218(1)
10.2 Blockchain Implementations
219(6)
10.2.1 Bitcoin
219(1)
10.2.2 Ethereum
220(2)
10.2.3 BigchainDB
222(1)
10.2.4 Hyperledger Fabric
222(2)
10.2.5 Comparison Table for the blockchain Implementations
224(1)
10.3 Contribution Work
225(8)
10.3.1 Zero-Knowledge Proof (ZKF)
225(1)
10.3.2 Some Protocols based on Zero-Knowledge Proofs (ZKF)
226(1)
10.3.2.1 Schnorr Identification Protocol
226(2)
10.3.2.2 Fiat-Shamir Protocol
228(1)
10.3.3 Protocol Design
228(1)
10.3.3.1 Voter Anonymity
228(3)
10.3.3.2 Registration of Voters and Candidates/proposed query
231(1)
10.3.3.3 Votes Privacy and Votes Counting
231(1)
10.3.4 Security Consideration
232(1)
10.3.4.1 Voters Device Coercion
232(1)
10.3.4.2 Denial-of-Service (DoS)
232(1)
10.3.4.3 Sybil Attack
232(1)
10.3.4.4 Insider Attack
232(1)
10.3.4.5 Trojan Horse Spywares
232(1)
10.4 Implementation Details
233(4)
10.4.0.1 On Ethereum
234(2)
10.4.0.2 On HBasechainDB
236(1)
10.5 Analysis and Result
237(4)
10.5.1 On Ethereum
237(3)
10.5.1.1 On HBasechainDB
240(1)
10.6 Comparison between HBasechainDB and Ethereum
241(3)
10.7 Conclusion
244(1)
10.8 Future Work
244(3)
Chapter 11 Secure Permission-based Medical Blockchain Framework for the Exchange of Electronic Health Records
247(22)
11.0.1 Blockchain Network
247(1)
11.0.1.1 Types of Blockchain
248(1)
11.0.1.2 Fundamental elements in blockchain
249(1)
11.0.2 Inter-Planetary File Systems (IPFS)
249(1)
11.0.3 Chaotic image encryption
250(1)
11.1 Blockchain technology in healthcare
250(3)
11.1.1 Research challenges for adopting blockchain technology in healthcare
252(1)
11.2 Novel Permission based secure medical blockchain for Electronic Health Record
253(14)
11.2.1 Related works
254(3)
11.2.2 Conventional healthcare approach
257(1)
11.2.3 Proposed approach
258(2)
11.2.3.1 Symmetric encryption using chaos
260(1)
11.2.3.2 Secure storage - IPFS
261(1)
11.2.3.3 Medical Blockchain Framework
261(3)
11.2.4 Performance metrics for evaluation
264(1)
11.2.4.1 Performance evaluation for blockchain - Hyperledger Caliper
264(1)
11.2.4.2 Performance evaluation for secure medical image records
264(3)
11.3 Conclusion
267(2)
Chapter 12 The Use of Blockchain in Taxing Digital Products and Services: A Conceptual Model Proposal
269(24)
12.1 Digital Services
270(2)
12.2 Electronic Payment Systems
272(1)
12.3 Blockchain Technology
273(3)
12.3.1 Smart Contracts
275(1)
12.4 Digital Service Tax Regulations in Countries
276(3)
12.5 Smart Contracts and Taxation Process Based on Blockchain Technology
279(14)
Appendix A A Partial Smart Contract Example Created for Asset Transfer 293(2)
Index 295
Dr. Manoj Kumar M V is currently an Associate Professor, in the department of Information Science and Engineering, Nitte Meenakshi Institute of Technology, Bengaluru. He obtained Ph.D. in Computer Science and Engineering from National Institute of Technology Karnataka (NITK), Surathkal (through MHRD fellowship). He holds Bachelor and Masters degree in Computer Science and Engineering from VTU Belgaum. He has 11 years of teaching and research experience. He is a senior member of IEEE, Life Member of IEI, Life Member of ISTE, also he is an active member of IEEE task force on Process Mining. He has authored 40+ research articles in various reputed international journals/conferences/book chapters. He has been granted 2 Indian copyrights for the noteworthy works. He is an associate editor and handling editor for Frontiers special issue journals. He has successfully executed 03 international consultancy projects worth 12 Lakhs and one is under the development phase. He is currently executing the funded project worth 5 Lakh for, TEQIP VTU and VGST- Karnataka Govt.He has edited 2 books on topics related to computer science. He has received best paper awards at reputed conferences for noteworthy research findings. His teaching interests include courses like Machine Learning, Statistics, Programming in R, Data Mining, Exploratory Data Analysis, Computer Organization etc. His primary areas of research include Process Mining and Data Science. He has delivered 40+ national/international talks/ hands-on workshops of varying duration (from 1 days to 15 days) on topics such as Data Science, Statistics for data analysis, Mobile application development, and Hybrid application development. He has visited more than 6 countries for research interaction, research lab visit, and paper presentation.

Prof. Annappa B is currently serving as a Professor at the Department of Computer Science and Engineering, National Institute of Technology Karnataka, Surathkal, Mangalore, INDIA. He has more than 30 years of experience in teaching and research. He holds Ph.D. and M.Tech. in Computer Science and Engineering from National Institute of Technology Karnataka Surathkal and B.E. in Computer Science and Engineering from Govt. B.D.T. College of Engineering, Davangere affiliated Mysore University, Karnataka. He is a Fellow of Institution of Engineers (INDIA) and Senior member of IEEE and ACM. He is a Life member of Computer Society of India, Indian Society of Technical Education, Cloud Computing Innovation Council of India and Advanced Computing and Communications Society. His research interests include Cloud computing, Big Data Analytics, Distributed Computing, Software Engineering and Process Mining. He has published more than 150 research papers in international conferences and Journals. He volunteered as the organizing chair of international conference ADCONS-2013 and DISCOVER-2020, general chair of DISCOVER-2019, TPC chair of DISCOVER18, finance chair of DISCOVER16 and he is on the Advisory or Technical program committee of many international conferences and reviewer of Journals. He was the Chair of IEEE Computer Society Chapter India Council (2017- 2018), and IEEE Mangalore subsection (2018). Six research scholars completed their Ph.D. under his supervision and eight scholars are currently pursuing their research work in Computer Science and Engineering.

Likewin Thomas is currently heading the department of Artificial Intelligence and Machine Learning, PESITM Shivamogga. He received his Ph.D. and Master from the National Institute of Technology Karnataka, Surathkal, India. He graduated from Vishweshwaraiah Technology University, Belgaum in the year 2004. His research interest is in the field of machine learning and its application in the clinical area, and process mining.His research experience is in the field of Artificial Intelligence and Machine Learning and has received a grant from VGST, DST, AICTE, and VTU. He holds more than 15 years of teaching and research experience. He has been a resource person and a keynote speaker at many workshops and conferences. He organized a workshop on machine learning and its application at an IEEE international conference, EmergiTech, held in Mauritius. He is actively involved in starting an IEEE student branch at PESITM, Incubation Centre in collaboration with ResoluteAI.in an AI-based company, starting a skill lab, organizing National Conference, many students Development Activities, and IEEE MSS flagship event I2Connect.He is an IEEE Senior Member and has served as secretary of the IEEE Mangalore Sub-Section (MSS) for the year 2020-21

Sourav Kanti Addya working as an Assistant professor in the Department of Computer Science & Engineering at the National Institute of Technology Karnataka, Surathkal, India. He received his Ph.D. in the Department of Computer Science & Engineering from the National Institute of Technology (NIT), Rourkela, India. He was a PostDoctoral fellow in the Department of Computer Science & Engineering, Indian Institute of Technology Kharagpur, India. He was a visiting scholar at San Diego State University, CA, USA. He obtained his M.Tech. degree with a national level GATE scholarship, from NIT Rourkela, India, and B. Tech from the West Bengal University of Technology. The primary research interests of Dr. Addya are on various aspects of Cloud systems development, Serverless, Fog-Edge applications for societal well-being, and the design of distributed, pervasive, and ubiquitous technologies over Internet of Things (IoT) paradigm, Blockchain.

Dr. Addya is leading the Cloud & Smart System Services Research Lab at NIT Karnataka, focusing on various aspects of Distributed and Cloud systems along with the design and development of Smart services. He is leading multiple high-valued projects, sponsored by various industries like TCS, TataCom, and Robosoft. He has a strong research collaboration with various industries. Apart from the top journals, Dr. Addya has publications in several top reputed conferences such as IEEE INFOCOM, IEEE/IFIF IM, IEEE CLOUD, IEEE SCC, IEEE ICC, IEEE GLOBECOM etc..Dr. Addya has been actively involved in organizing various conferences including IEEE/ACM COMSNETS, 24th ICDCN, 7th IEEE ICRAIE, IEEE DISCOVER etc., to name a few. Dr. Addya is a Senior Member of IEEE and a member of ACM. Further details about his works and publications can be obtained from https://souravkaddya.in/.

Niranjanamurthy M is currently working as an Assistant Professor, the Department of Artificial Intelligence and Machine Learning, BMS Institute of Technology and Management, Bangalore, India. He has more than 13 years of teaching experience and 2 years of industry experience as a Software Engineer. He has published 90* Research articles in national/international conferences/international journals. Published a total of 20 Books including Authored and edited.Published national and international patents. Series editor at Taylor and Francis USA. He is working as a reviewer in 22 International Journals. He is a member of IEEE, a Life Member of "The International Association of Engineers" (IAENG), Member of "The Computer Science Teachers Association" (CSTA). His areas of interest are Data Science, ML, E-Commerce, and M-Commerce related to Industry Internal tool enhancement, Software Testing, Software Engineering, Web Services, Web-Technologies, Cloud Computing, Big data analytics, and Networking.