This book provides the reader with an integrated understanding of the importance that intelligent computing has in the sustainable development of current societies. It discusses the emerging research exploring the theoretical and practical aspects of successfully implementing new and innovative intelligent techniques in a variety of sectors, including the IoT, manufacturing, optimization and healthcare. In general, the book is intended as a presentation of a wide range of publicly advanced achievements in the field of intelligent computing and optimization, which will be useful for a wide range of readers and will doubtless have a positive impact on a solution to the problem of sustainable development.
This book is a pivotal reference source for IT specialists, industry professionals, managers, executives, researchers, scientists, and engineers seeking current research on emerging perspectives in the field of artificial intelligence to improve their products or research. Therefore, it will be a great resource for both Master’s and research students of computing sciences, engineering, environmental sciences, medical sciences, mathematics, statistics, economics and agricultural sciences. Moreover, industry experts from telecommunications, the energy sector, manufacturing industry, health sector, and finance and planning sectors can use this book as a reference resource.
Based on double-blind review processes, the 41 chapters were accepted for publication according to their suitability for the five parts of the book. A brief description of each chapter is given below.
Part I: Intelligent Computing and Applications
Chapter 1 proposes a mental workload prediction model using a neural network and the Bernoulli Boltzmann machine. For measuring mental workload, eye movement metrics were considered. The eye metrics were computed from raw eye movement data, which were recorded using an eye tracking device while solving coding problems. The authors found that the Bernoulli Boltzmann machine provides better accuracy in predicting mental workload from eye metrics.
Chapter 2 discusses the development of an artificial neural network (ANN) using short DNA strands, i.e., oligonucleotides. The short sequences of DNA molecules can be used to code input and output signals and to build the basic architecture of the neuron. The authors also illustrate the design methodology of DNA logic gates and DNA logic circuits. Because of a few drawbacks, viz. immense energy consumption, vast memory requirement and heat dissipation, the traditional computation approaches the limitations of its processing power and design strategy. The aim of the authors is a paradigm shift in the computational world; from silicon to carbon. The design strategies discussed in this chapter are essential for effective development of a practical DNA computer.
Chapter 3 focuses on a novel framework for detection of garments of interest from the footage of a surveillance camera. The video frames are processed using the GMG background subtraction model to obtain relevant foreground information along with foreground masks. The Mask R-CNN object detection model is used to identify customers and multiple image processing techniques are used to obtain the active garments in these frames. The detected customers are tracked and the OpenPose human pose estimation framework is utilized on them to obtain useful landmarks. The garments of interest are then determined based on the filtration of confidence scores calculated for each active garment. The framework was tested on a CCTV video dataset and was found to be effective despite facing arduous obstacles such as background noise and occlusions.
Chapter 4 studies matrix algebra and elliptic curve arithmetic computing based on the integration of modular arithmetic and complex number arithmetic. It describes the intelligent computing of nonlinear transformations based on the residue matrices and the elliptic curve arithmetic over complex plane that can be applied in the computer science fields, which deal with cryptographic applications for more security. Their mathematical properties over complex plane are applied to create the cryptographic nonlinear transformation techniques in traditional ciphers, elliptic curve cryptography and quantum cryptography.
Chapter 5 highlights the trends in fifth generation (5G) wireless communication and beyond. Further discussed is the use of machine learning algorithms in future wireless networks (5G and B5G). ML-based signal processing algorithms have the potential to solve network issues with 5G networks, thereby paving the way to the development of future intelligent wireless networks (B5G). This chapter presents a unified application of data science for wireless communication and analyzes the physical layer challenges for automatic modulation classification (AMC), resource allocation, channel estimation and millimeter wave communication. Further case studies have been carried out on AMC and CSI feedback in massive multi-input and multi-output (MIMO) systems. The performance of the proposed deep learning methods has been presented through extensive simulation results.
Chapter 6 envisions how all present networks can be compiled into a single crowd associated network called a CrAN. This chapter contains a routing protocol for the proposed network. All applications for the proposed network are also discussed. The authors highlight the importance of creating this network and how it tackles transmission problems better than other networks. Some limitations of the proposed network are also mentioned.
Chapter 7 demonstrates the application of a neural network (NN)-based group method of data handling (GMDH) for prediction of permeate flux (%) in disc-shaped membrane. The permeate flux is predicted using three parameters for this study such as pore size, operating pressure, and feed velocity. Different statistical techniques, such as mean absolute error, root mean square error (RMSE), RMSE-observation standard deviation error, and Pearson’s correlation coefficient, are analyzed in order to show the precision of the GMDH-NN models. To demonstrate the performance of the GMDH-NN model, the total error values are compared with the developed artificial neural network model. The study illustrates that the GMDH model predicts permeate flux of disc membrane with high accuracy.
Chapter 8 introduces a new approach to identify nonfunctional needs by using nonfunctional requirements (NFR) catalogs via machine-learning methods, and proposes a process to acquire these catalogs by using a systemic mapping study of “lightweight.” The authors analysis provides a way of generating data sets used to classify non-functional specifications by NFR catalogs extracted from the mapping research in order to address the circumstance. They focus on the definition of the various NFR forms, with an emphasis on usability, security, performance and adaptability.
Chapter 9 proposes an efficient and simple image recognition classification system, which consists of components from both reinforcement learning and deep learning. More specifically, Q-Learning is used with an agent having 2 states, and 2 to 3 actions. This classifier is different from others, because the latter use features of convolutional neural networks and also uses past histories in addition to Q states. Since the novel technique proposed has only 2 Q states, it has the advantage of being simple and also having significantly less parameters to optimize. The classifier given in this work performs better than other classifiers on the various datasets used experimentally.
Chapter 10 zeroes in on minimizing human involvement in changing control program code whenever some nonlinear disturbance affects the industrial control process, viz. measurement and control of temperature and flow, etc., as used in real-time process control applications. The PID technique has certain control-related limitations, especially in the control of vital process parameters like temperature acting as nonlinear disturbances. The fuzzy control simulation results worldwide have proved their superiority over conventional controllers and this technique has emerged as a harbinger in the implementation of artificial techniques. In