15.3 Cloud Computing and Big Data in Healthcare 15.4 Big Data Healthcare and IoT 15.5 Wearable Devices for Patient Health Monitoring 15.6 Big Data and Industry 4.0 15.7 Conclusion References 16 Computing Analysis of Yajna and Mantra Chanting as a Therapy: A Holistic Approach for All by Indian Continent Amidst Pandemic Threats 16.1 Introduction 16.2 Literature Survey 16.3 Experimental Setup Protocols With Results 16.4 Future Scope and Limitations 16.5 Novelty 16.6 Recommendations 16.7 Applications of Yajna Therapy 16.8 Conclusions Acknowledgement References Key Terms and Definitions 17 Extraction of Depression Symptoms From Social Networks 17.1 Introduction 17.2 Data Mining in Healthcare 17.3 Social Network Sites 17.4 Symptom Extraction Tool 17.5 Sentiment Analysis 17.6 Conclusion References
7 Part 3: CYBERSECURITY 18 Fog Computing Perspective: Technical Trends, Security Practices, and Recommendations 18.1 Introduction 18.2 Characteristics of Fog Computing 18.3 Reference Architecture of Fog Computing 18.4 CISCO IOx Framework 18.5 Security Practices in CISCO IOx 18.6 Security Issues in Fog Computing 18.7 Machine Learning for Secure Fog Computing 18.8 Existing Security Solution in Fog Computing 18.9 Recommendation and Future Enhancement 18.10 Conclusion References 19 Cybersecurity and Privacy Fundamentals 19.1 Introduction 19.2 Historical Background and Evolution of Cyber Crime 19.3 Introduction to Cybersecurity 19.4 Classification of Cyber Crimes 19.5 Reasons Behind Cyber Crime 19.6 Various Types of Cyber Crime 19.7 Various Types of Cyber Attacks in Information Security 19.8 Cybersecurity and Privacy Techniques 19.9 Essential Elements of Cybersecurity 19.10 Basic Security Concerns for Cybersecurity 19.11 Cybersecurity Layered Stack 19.12 Basic Security and Privacy Check List 19.13 Future Challenges of Cybersecurity References 20 Changing the Conventional Banking System through Blockchain 20.1 Introduction 20.2 Literature Survey 20.3 Methodology and Tools 20.4 Experiment 20.5 Results 20.6 Conclusion 20.7 Future Scope References 21 A Secured Online Voting System by Using Blockchain as the Medium 21.1 Blockchain-Based Online Voting System 21.2 Literature Review References 22 Artificial Intelligence and Cybersecurity: Current Trends and Future Prospects 22.1 Introduction 22.2 Literature Review 22.3 Different Variants of Cybersecurity in Action 22.4 Importance of Cybersecurity in Action 22.5 Methods for Establishing a Strategy for Cybersecurity 22.6 The Influence of Artificial Intelligence in the Domain of Cybersecurity 22.7