Emerging Trends in Computer Science and Its Application
Emerging Trends in Computer Science and Its Application
Edited by
Anurag Tiwari
Manuj Darbari
© 2024 selection and editorial matter, Anurag Tiwari and Manuj Darbari; individual chapters, the
contributors
The right of Anurag Tiwari and Manuj Darbari to be identified as the authors of the editorial
material, and of the authors for their individual chapters, has been asserted in accordance with
sections 77 and 78 of the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form
or by any electronic, mechanical, or other means, now known or hereafter invented, including
photocopying and recording, or in any information storage or retrieval system, without permission in
writing from the publishers.
For permission to photocopy or use material electronically from this work, access
www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive,
Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please contact
[email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
DOI: 10.1201/9781003606635
Chapter 4 Revolutionizing object recognition beyond CNN and YOLO with deep learning
breakthrough31
G. S. S. S. S. V. Krishna Mohan, Mahammad Firose Shaik, G. Usandra Babu,
R. G. V Prasanna, Pinagadi Venkateswara Rao, and Inakoti Ramesh Raja
Chapter 5 Investigating efficacy of emerging ICTs for the Indian construction sector 40
Sanjay Pandey and G. T. Thampi
Chapter 9 Comparative analysis of wireless routing protocols for security threat—A review 74
Bhupal Arya, Amrita Kumari, and Jogender Kumar
Chapter 11 Wireless network with machine learning and deep learning techniques 88
Bhupal Arya, Amrita Kumari, and Jogendra Kumar
Chapter 17 A comprehensive exploration of aircraft detection in synthetic and satellite images 135
M. Madhu Bala, G. Ramesh Chandra, G. Pavan Teja, M. Sai Sudha, Sk. Sabeeha Kouser,
and M. Ajay Kumar
Chapter 19 A comprehensive multi-modal sentiment analysis approach for social media content
integration153
Sheela S., Suresh Balakrishnan T., Uttham Sing K., Sujitha E., Soundarrajan R., and Veena M.
Chapter 22 Securing the secrets of 5G: Mitigating eavesdropping threats and enhancing network
integrity175
Mamidisetti Sai
Chapter 24 Malaria detection using convolutional neural networks: A deep learning approach 192
Navin Kumar Agrawal
Contents vii
Chapter 25 An optimal emergency vehicle path finding mechanism using routing algorithms 197
Hina Naaz, Roshan Jahan, and Faiyaz Ahamad
Chapter 26 Smart city solutions: Enhancing infrastructure with LoRa multi-hop networks 203
Faraz Ahmad, Saleha Mariyam, and Faiyaz Ahamad
Chapter 31 A review on deep learning frameworks for pose estimation during exercise for
rehabilitation240
Banupriya N., Haris Dominic Savier, Jeeva V., and Uma R.
Chapter 37 Guarding your home: A seamless Iot-driven security system with high security 285
Murala Divyasree, Alapati Naresh, Tammisetty Jyothi, Perumalla Sahithi, and Vinukonda
Ankitha
Chapter 39 A exhaustive review on advancements and challenges in low power wireless sensor
networks297
Manuj Darbari, Naresh Chandrab, Diwakar Yagyasenc,
Anurag Tiwarid, and Sandeep Kumar Mishrae
Chapter 41 Redefining human activity recognition with LSTM and GRU networks 308
Vasumathi Devi M., Sai Sreeja S., Anusha P., Mounika Bindu B., and Sirisha M.
Chapter 42 Cybersaferoutes: Protecting IoT networks from hybrid attack with security
measures315
Ganga Bhavani P, Lakshmi Tirapathamma S, Reshma SK, Swetha B, and Himaja N
Chapter 43 Harmful content classification in social media using gated recurrent units and
bidirectional encoder representations from transformer 321
Sujatha V., Tejaswi Y., Pravalika V., Pavani P., and Ch Sravani
Chapter 46 Detection of melanoma using DenseNet-based adaptive weighted loss function 341
Rishi Agrawal
Chapter 47 Advanced reconfigured solar arrays to attenuate shading loss under partial shading
conditions: experimental validation 346
Vijay Laxmi Mishra, Yogesh K. Chauhan, and Kripa S. Verma
Chapter 48 Understanding the relationship of quantum mechanics and machine learning 352
Sushamana Sharma
Chapter 53 Potato leaf disease classification and prediction using CNN 386
UdayPratap Singh, Sandeep Kumar Mishra, ShubhamVishwakarma, Suraj Kumar,
and Vinayak Pandey
Chapter 57 An efficient CNN-based approach for automated animal intrusion detection 412
Ramamani Tripathy, S V Achuta Rao, Maheswari. P, Mallikharjuna Rao K,
B. Santhosh Kumar, and Balajee Maram
Chapter 58 Next-generation smart cities: Integrating blockchain, IoT, deep learning, and
Dingo optimization 419
K. Sankar, Ramamani Tripathy, S. Nandhini, Aleem Ali, B. Santhosh Kumar,
and Balajee Maram
Chapter 60 Digital dwelling hub: Revolutionizing real estate with AR and smart home
integration431
Tanya Omar, Rajeev Srivastava, Tanya Singh, Vaibhav Srivastava, Suraj Chhetri, and
Shaurya Kumar
Chapter 61 Mobilenet-v3: A comprehensive survey of object detection algorithms using CNN 438
Rasheeq Zehra, Omkar Sharma, Vinayak, and Rudrendra Bahadur Singh
Chapter 63 Advancements in assistive technologies for web accessibility: A systematic review 451
Ayushi, Padmini Mishra, Anusha Ansari, and Drishti Maurya
Chapter 64 Predicting bitcoin prices: A machine learning approach for accurate forecasting 457
Rishabh Jain, Shekhar Srivastava, and Prakhar Shukla
x Contents
Chapter 65 A comprehensive review on multi disease prediction web app: QuadraDiag 464
Khushi Saxenaa, Keerti Saxenab, Vishesh Guptac, Swatid, and Kamlesh Kumare
Chapter 68 CollegeGo: leveraging alumni data for improved college placements 487
Avneesh Agrahari, Subha Mishra, Rudrendra Bahadur Singh, Kumar Ronit,
and Pahun Ratna
Chapter 70 Data analysis for revenue optimization in the hospitality sector 499
Pankaj Kunekar, Parul Patle, and Anagha Gajaralwar
Chapter 74 Fake social media profile detection using machine learning 527
Anurag Shukla, Shreya Chaurasia, Tanushri Asthana, Tej Narayan Prajapati, and
Vivek Kushwaha
Chapter 75 Prompted LLMs as chatbot modules for long open-domain conversation 534
Yash Kumar Singh, Deepak Pant, Syed Mohd Askari, and Shivam Kumar Pandey
Chapter 78 Optimizing patient outcomes through integrated health analysis and management
strategies 554
Anurag Shukla, Sambhav Pathak, Rahul, Rishikant Yadav, and Raj Gupta
Chapter 83 Agriculture: Soil analysis for suitable crop and fertilizer prediction 589
Shreya Singh, Saurabh Kumar Jain, and Stuti Rastogi
Chapter 87 Enhancing electoral processes: The role of “Smart Voting Systems” 616
Madhulika Sharma, Anuj Singh, and Gulshan Varshney
Chapter 92 Securing MANETs against black hole attacks: A novel approach using secure
knowledge algorithm 648
Mohammed Abdul Bari, Arshad Ahmad Khan Mohammad, Arif Mohammad, and Abdul
xii Contents
Chapter 95 Olympic odyssey: Tracing 120 years of athletes sports, and global influence 673
Shreya Verma, Shreya Mishra, Prakriti Singh, Sneha Seth, and Sanjay Kumar Gupta
Chapter 101 Enhancing fault tolerance in distributed systems through machine learning
techniques711
Mohd Haroon, Manish Madhav Tripathi, Jameel Ahmad, Shish Ahmad, and Mohd Husain
Chapter 102 Predicting breast cancer risk: A machine learning approach 717
Navin kumar Agrawal
Chapter 103 A multi-objective optimization algorithm for fog computing with trust and energy
awareness 723
Ruchi Agarwal, Saurabh Singhal, and Ashish Sharma
Chapter 104 Pediatric brain tumor detection in MRI: A machine learning perspective 729
Sandeep Kumar Mishra and Sheeba Praveen
Chapter 105 Enhancing trust in the social internet of things (SIoT): A comprehensive review 736
Gyanendra Kumar and Anuradha Misra
Contents xiii
Chapter 106 Fostering plant health: Utilizing YOLOv7 framework to identify leaf diseases 743
Rajya Lakshmi R, Sasikala V, Divya Likhitha D, Rishita Reddy Ch, and VenkataSai Vidyasri
Abhishainy A
Chapter 107 A review on-malignancy detection in lung nodules using CNN 751
Krish Yadav, Vinayak, Pratibha Yadav, Lakshmi Pandey, Himanshu Sharma, and Smita Yadav
Chapter 112 Ideas to boost fitness activities and assist in keeping fit 777
Neha Chauhan, Vasu Gupta, Harshita Bajpai, and Kim Gupta
Chapter 113 Using existing CCTV network for crowd management, crime prevention and work
monitoring: A novel approach for object detection 783
Manvi Agrawal
List of figures
Figure 1.1 Automatic control flow of aeration tank DO content by the improved IPI control
algorithm6
Figure 1.2 shows the process scheme of the WWTP to which MPC is applied 7
Figure 1.3 Workflow of the proposed deep learning-driven forecasting procedure 9
Figure 1.4 Benchmark Simulation Model 1(BSM 1) 10
Figure 2.1 Green IT components 15
Figure 2.2 Greener cloud placement in cloud computing technology 15
Figure 2.3 Green cloud service model of software as a service 19
Figure 4.1 YOLO architecture 34
Figure 4.2 Feature extracting process by RCNN methodology 35
Figure 4.3 Block diagram for text to speech conversion 36
Figure 4.4 Detection of object by camera module 37
Figure 4.5 List of detected objects 38
Figure 5.1 Types of construction companies contributed to the study 43
Figure 5.2 Cadre-based classification of respondents 43
Figure 5.3 Harnessing ICTs for construction industry tasks 45
Figure 5.4 Perceived benefits of using ICTs for construction companies 46
Figure 5.5 Hindering factors for ICT adaptation in the Indian construction sector 47
Figure 5.6 Overall performance of construction companies after ICT adaptation 48
Figure 6.1 Soil testing lab locations 52
Figure 6.2 Heatmap for crop recommendation 52
Figure 6.3 Crop recommendation 52
Figure 6.4 Plant disease prediction 52
Figure 6.5 Blockchain-based marketplace 52
Figure 6.6 Crop price prediction 53
Figure 6.7 Real-time weather monitoring 53
Figure 6.8 Gamified plant growth 54
Figure 6.9 Confusion matrix 54
Figure 6.10 Accuracy chart 54
Figure 6.11 Crop recommendation flow diagram 54
Figure 6.12 Visualizing plant growth using image processing 55
Figure 7.1 Subject distribution according to the ages 60
Figure 7.2 Subject distribution according to the gender 60
Figure 7.3 Subject distribution according to education qualification 60
Figure 7.4 Feedback– Distribution of Agreement and disagreement on above issues 62
Figure 8.1 Comparison of proposed method with existing with respect to PDR 71
Figure 8.2 Comparison of proposed method with existing with respect to delay 72
Figure 8.3 Comparison of proposed method with existing with respect to overhead 72
Figure 9.1 76
Figure 10.1 Communication between the ToRs using LoS and NLoS links 82
Figure 10.2 LoS communication between the cascaded racks (BUS topology) 82
Figure 10.3 LoS communication between the racks (16 Racks topology) 83
Figure 10.4 LoS communication between the racks is 3 meters (a) FOV=70° (b) FOV=10° 84
List of figures xv
Figure 10.5 LoS communication between the racks is 3√2 meters (a) FOV=70° (b) FOV=10° 84
Figure 10.6 LoS communication between the racks is 6 meters (a) FOV=70° (b) FOV=10° 85
Figure 10.7 LoS communication between the racks is 6√2 meters (a) FOV=70° (b) FOV=10° 85
Figure 10.8 LoS communication between the racks is 9 meters (a) FOV=70° (b) FOV=10° 85
Figure 10.9 LoS communication between the racks is 9√2 meters (a) FOV=70° (b) FOV=10° 86
Figure 10.10 Probability of Error for various distances between the racks 86
Figure 11.1 Deep learning in wireless network 90
Figure 11.2 ML using ANN and DNN 91
Figure 11.3 91
Figure 11.4 93
Figure 11.5 94
Figure 11.6 96
Figure 11.7 97
Figure 12.1 Conceptual framework. 102
Figure 12.2 Methodology schema 104
Figure 12.3 Types of admission. 105
Figure 12.4 City Code Patient Count 105
Figure 13.1 Block diagram 110
Figure 15.1 Comparison of proposed method with existing with respect to PDR 126
Figure 15.2 Comparison of proposed method with existing with respect to Delay 126
Figure 15.3 Comparison of proposed method with existing with respect to Overhead 126
Figure 15.4 Comparison of proposed method with existing with respect to Throughput 127
Figure 17.1 A Sample DOTA image of airplane category with OBB representation
(a) v1.0 (b) v1.5 and (c) v2.0waveform of BLDC motor 136
Figure 17.2 A Sample synthetic Image 137
Figure 17.3 Aircraft detection framework using YOLO 137
Figure 17.4 Architecture of Detectron2 137
Figure 17.5 FR-CNN architecture in aircraft detection 138
Figure 18.1 Comparison of proposed method with existing with respect to PDR 150
Figure 18.2 Comparison of proposed method with existing with respect to Delay 150
Figure 18.3 Comparison of proposed method with existing with respect to Overhead 151
Figure 19.1 Text data based sentiment analysis 155
Figure 19.2 Image-based sentiment analysis 155
Figure 19.3 Live video-based sentiment analysis 156
Figure 19.4 Audio-based sentiment analysis 156
Figure 19.5 Emotion detected using text 157
Figure 19.6 Emotion detected using Image 157
Figure 19.7 Emotion detected using Image 157
Figure 19.8 Emotion detected using Audio 157
Figure 20.1 The proposed model diagram 161
Figure 20.2 Comparison with existing frameworks 163
Figure 21.1 A Differential Value of VANET nodes 171
Figure 21.2 Decision of node movements 171
Figure 21.3 Simple AODV setup 172
Figure 21.4 Basic AODV 25 nodes 172
Figure 21.5 Starting simulation of basic AODV 25 nodes 172
Figure 21.6 AODV 20 nodes 172
Figure 21.7 Starting simulation of AODV 20 nodes 173
Figure 21.8 AODV 25 nodes 173
Figure 21.9 Starting simulation of AODV 25 nodes 173
Figure 21.10 AODV 30 nodes 173
xvi List of figures
Table 1.1 Comparison of different optimal control strategies of the mean EQ and EC in storm
weather condition 4
Table 1.2 Statistical results of the proposed model’s performance evaluation (R2 and MSE) for
different stages of modeling (training, validation, testing and all data sets) 5
Table 1.3 The results of three different models 7
Table 1.4 Model Performance on the training, validation and test sets (R2 values) 7
Table 2.1 State-of-the-art of green cloud 18
Table 2.2 Green cloud SAAS performance metric 21
Table 5.1 Respondent’s opinion ranking of construction tasks performed by ICTs 45
Table 5.2 Ranking of the benefits as per respondent’s opinion 46
Table 5.3 Ranking of hindering factors for ICT adaptation 47
Table 6.1 Algorithm and accuracy 56
Table 6.2 Comparison with previous work 56
Table 7.1 Participants distribution on the basis of Age 61
Table 7.2 Participants distribution on the basis of Gender 61
Table 7.3 Participant’s distribution based on their educational background 62
Table 7.4 Responses in favor of online mode of learning 62
Table 8.1 Simulation Parameters 71
Table 10.1 Simulation parameters 83
Table 12.1 Mechanisms of NPT of mHealth in medicine 103
Table 12.2 Research questions and methodology 103
Table 15.1 Simulation requirements 125
Table 17.1 Results of algorithms used 140
Table 20.1 Execution evaluation of the proposed plan of action 162
Table 20.2 Execution comparison 162
Table 21.1 VANET Comparative Tables 172
Table 26.1 Technical layers in an urban infrastructure 204
Table 27.1 Experts’ contributions in web mining 212
Table 28.1 Comparative analysis of cryptographic approaches in cloud security 223
Table 30.1 Various solutions of honeypot 237
Table 31.1 Evaluation of results according to the datasets. 244
Table 41.1 Comparison with other methods 312
Table 46.1 Comparison with other state-of-the-art methods 344
Table 47.1 Quantitative Simulation Results 349
Table 49.1 Students’ employability features 361
Table 49.2 Performance Metrics for ML Algorithms 363
Table 51.1 Dataset popularly used 375
Table 53.1 Number of images with diseases 387
Table 53.2 Model performance comparison 389
Table 56.1 Comparing cryptographic image concealment with neural networks to traditional
steganographic techniques 410
Table 56.2 Comparison of PSNR, SSI, and BER 410
Table 57.1 Results comparison 416
List of tables xxiii
Abstract: A wastewater treatment plant (WWTP), also referred to as a sewage treatment plant or a water
reclamation facility, is a facility designed to treat wastewater and sewage from residential, commercial, and
industrial sources. Wastewater treatment (WWT) facilities are essential for maintaining the well-being of our
communities by safeguarding water supplies, maintaining public health, and minimizing environmental pol-
lution. The specific design and processes employed by a WWTP can change based on variables like the size of
the facility, the characteristics of the wastewater, and the required effluent quality standards. This paper pre-
sents the comprehensive technological review of PID, FLC, PLC, and MPC controllers for an industrial WWT
plant with advantages and disadvantages of the same and results are shown. In addition, this overview includes
Artificial intelligence is revolutionizing the field of water treatment by enhancing model prediction and control
strategies.
Keywords: Deep learning model (DNN), fuzzy logic controller (FLC), machine learning (ML), model predic-
tive controller (MPC), programmable logic controller (PLC), proportional integral derivative controllers (PID),
wastewater treatment plants (WWTPs)
DOI: 10.1201/9781003606635-1
2 Innovations in Computational Intelligence: Trends and Technologies
extensively employed for complicated process lot of data and some serious pre-processing
for treating wastewater (Subari et al., 2022) to work well. It’s crucial to remember that
because to the occurrence of nonlinearities AI can’t replace mechanical models. There-
and turbulences, as well the contemplation fore, the goal of Using Machine Learning for
of particular optimization targets for unfa- Wastewater Treatment is to make better deci-
miliar systems. The reality is that there is a sions depending on projected performance
dearth of AI-based optimization approaches for existing facilities (Sundui et al., 2021;
that work well in a complex, uncertain, and Nourani et al., 2021).
nonlinear setting. Therefore, figuring out how Because of their superior feature extrac-
to acquire intelligent optimum controllers for tion, self-learning, and generalization abilities,
complicated nonlinear systems have been deep learning algorithms have found various
seen as a crucial step in the development of fantastic Implementations in recent years
the area of advanced control. across a wide range of areas. In DL, RNNs
The utilization of single-objective opti- with recurrent links and hidden layers are
mization approaches has generally applied recommended for analyzing difficulties with
in the field of wastewater management of a a historical context, while LSTM is intended
considerable duration, with the aim of opti- to improve the system’s ability to deal with
mizing the effectiveness of the WWT process. dependencies over the long run. However, the
It’s tough to pin down the precise weighting duration of time for training is a major factor
elements, however. As a result, several dif- in DL. Recent advances in genetic based con-
ferent kinds of multi-objective optimization trol algorithms for biological WWT facilities
algorithms, such MOPSO and MODE (Han have allowed for significant improvements
et al., 2022) have been created. Traditional in effluent quality and reductions in operat-
multi-objective optimization algorithms ing costs. This type of controller is primarily
offer numerous benefits in WWT methods, intended to enhance the WWTP’s efficiency
but they also have drawbacks, such as weak by adjusting the set points of the lower-level
global search ability and high levels of unpre- Supervisors, such as PID controllers, in addi-
dictability in the ideal position section. tion to offers insights into the use of genetic
Intelligent technologies based on machine algorithms in the development of advanced
learning (ML) are now being used in the water control systems for sewage treatment facili-
industry to solve pressing problems worldwide. ties. It’s also possible to cut down on process-
Model capabilities for the dynamic aspects of a ing time by employing PSO, DE, or ACO in
WWTP operation have also been improved via the right situation.
the use of a hybrid method that blends several
ML techniques. It has been shown that artifi-
cial neural networks (ANNs) can learn and 2. Literature Review
construct mathematical models of extremely To conserve energy and cut down on emis-
non-linear interactions, making them useful as sions, researchers (Li et al., 2021) proposed
predicting tools in a variety of contexts. the development of an innovative CLSTMA
Artificial Neural Network Ant Lion for observing effluent nature within wide-
Optimization (ANN-ALO), (PSO-ANN) ranging paper industry treatment facility
(Mahadeva et al., 2022) is proposed to using continuous convolution neural network
enhance the effectiveness of conventional (CNN), long short-term memory (LSTM),
multi-objective optimization techniques on a and attention mechanism (AM). For each
global scale and prevent the algorithm from of the study’s output variables, the authors
settling to the point of reaching a regional employed standard performance measure-
maximum. However, AI models do need a ments such as Pearson correlation coefficient
A systematic review on recent controllers for an industrial wastewater treatment plant 3
(R), the Root Mean Squared Error (RMSE), effectiveness and durability of WWT pro-
and the Mean Absolute Error (MAE). The cesses. They also emphasize the need for fur-
findings demonstrated that the hybrid deep ther research and development in this field to
learning model achieved the highest levels of overcome the existing challenges and realize
accuracy, precision, and recall compared to the full potential of control Techniques for the
the other models. The authors argue that their treatment of sewage.
model may be used to lessen the ecological The degradation of proteins and amino
toll of paper manufacturing by increasing the acids in organic waste is the principal source
efficacy of WWT systems in the paper sector. of ammonia in wastewater, Subari et al. (2022)
The RME of the CLSTMA model for the set out to compile a comprehensive overview
effluent Chemical Oxygen Demand (CODeff) of the utilization of biological treatment
was lowered by 23.3–31.55%, the MAE was techniques has emerged as a viable alterna-
condensed by 38.89–74.50%, and the R of tive strategy for the removal of ammonia in
the CLSTMA model was enhanced by 8.29– water and sewage purification facilities. This
11.86% when compared to different mod- article discusses the present worldwide pollu-
els (CNN, LSTM, and CLSTM models). The tion condition of ammonia, the sources about
RMSE of the CLSTMA model decreased by ammonia impurity, and the usual restrictions
10.26% and 9.92% for the effluent suspended on regulation of ammonia concentration pos-
solids (SSeff), the MAE decreased by 5.37% sible dangers, recorded instances, and more.
and 3.44%, and the R of the CLSTMA model In addition, AI is being used into water
rose by 15.13% and 37.21%. Results from purification model prediction and control
computer simulations show that the suggested systems. The ANN is a talented computer
CLSTMA model might be very useful for keep- mechanism that can improve both the WTP
ing an eye on the WWT system in the paper sec- and WWTP in general. Due to the nonlinear-
tor so that cleaner products can be made. ity of their dynamic behavior, variability in
PID control, as well as more modern meth- parameter values over time, constraints on
ods like MPS, FLC and neural network con- manipulated variables, interdependencies
trol, are all discussed in detail by (Iratni et between manipulated and controlled vari-
al., 2019). The authors also explore how to ables, presence of unaccounted Interruptions,
effectively regulate the WWT process by inte- delays in input and measurement processes,
grating control technology with optimization and other factors, a standalone conventional
methods and real-time monitoring systems. PID controller is inadequate for effectively
The complexity and variety of wastewater tuning parameters or achieving optimal
composition, the absence of dependable sen- control outcomes in a WTP or WWTP. It is
sors, and the high cost of installing advanced necessary to know the mathematical connec-
control technologies are all highlighted in this tion between the system’s input and output
article as problems that control systems must in order to design an appropriate controller
overcome in WWT operations. Non-linear and also compares the outcomes of several
controllers like the NMPC controller and the specific analysis involving the optimization
neural-fuzzy controller can be viable alterna- of PID controllers. Hybridization with other
tives, but they demand a high level of knowl- tuning methods, like Ziegler–Nichols (ZN) or
edge due to the complexity of their algorithms, Cohen-Coon (CC), a Fuzzy control system, or
which can lead to increased computing needs. a metaheuristic approach, like Particle Swarm
In conclusion, the authors suggest that the inte- Optimization (PSO), Gravitational Search
gration of control technologies with advanced Algorithm (GSA), or Grey Wolf Optimization
monitoring and optimization techniques can (GWO), can greatly increase the effectiveness
also lead to significant improvements in the of a PID controller.
4 Innovations in Computational Intelligence: Trends and Technologies
Using a WWT process as an example, Han compares appropriate control options for use
et al. (2022) describe the results of a research during storms. MIOC’s optimization perfor-
into the development of a multi-objective mance may be confirmed by its best-in-class
integrated optimum control method. The mean EQ (7167) and its lowest-in-class mean
authors offer a control system that simultane- EC(3889). With a mean IAE of just (0.041),
ously maximizes the plant’s efficiency and the MIOC clearly outperforms conventional,
efficacy of the WWT process, therefore reduc- incrementally optimized control approaches.
ing both operational costs and environmen- To predict the operational effectiveness of
tal effect. Existing multi-objective optimum a desalination facility, Mahadeva et al. (2022)
control approaches, however, tend to analyze offer a model of PSO-ANN. The purpose
the procedure of maximizing efficiency and of this research is in order to improve the
the control method separately, which may dependability of projections and enhance the
lead to the set-point fluctuating wildly and benefits of the Reverse Osmosis (RO)-based
being difficult to follow, and therefore dete- desalination technology plant. Modelling and
riorate the control and practical performance simulation were accomplished with the help
of WWTPs. In order to address this issue, of MATLAB 2019a’s neural network tool-
this research suggests a Multi-Objective Inte- box. The literature implies that changes to
grated Optimal Control (MIOC) approach the modelling parameters of soft computing
for the Sludge Processing Facility. To accom- models may lead to significant gains. In order
plish synchronized optimization and control to determine what those ideal values are, this
action, a Multi-Objective model predictive study provides a comprehensive list of mod-
control framework is designed. elling parameters and an in-depth systematic
Both the model of controlled variables and examination of them. Table 1.2 displays the
the model of operational indices utilized in summary statistics for the suggested mod-
MIOC were constructed using AFNNs. In eling efficiency assessments (R2 and MSE)
BSM1, EQ and EC are used to assess WWTP’s throughout training, validation, testing, and
efficiency. Control performance and optimiza- all datasets. Table 1.2 shows details.
tion performance studies are examined using Model 2 had the greatest training results
simulation in all climates. Example: Table 1.1 (R2 = 99.8%, MSE = 0.000) while Model 1 had
Table 1.1. Comparison of different optimal control strategies of the mean EQ and EC in storm
weather condition
Optimal NH4 Ntot SS COD BOD EQ kg EC Percentages IAE
control mg L–1 mg L–1 mg L–1 mg L–1 mg L–1 poll units kW h % mg
methods L-1
MIOC 2.87 17.27 13.55 46.89 2,74 7167 3889 12.00 0.041
DMOPSO 3.07 17.48 13,02 47.79 2,78 7512 4089 7,42 0.101
(Han, Liu,
2021)
MOO 2.93 17.91 13.56 48.13 2.83 7583 4169 5.61 0.120
(Sweelapple
et al., 2014)
MOOC 2.98 17.39 13.86 48.64 2.71 7236 4410 0.15 0.054
AQ2: (Han et al.,
Please 2018)
provide
source for P1D 3.06 17.52 13.79 49.52 3.18 7970 4417 0 0.108
all tables. Source:
Table 1.2. Statistical results of the proposed model’s performance evaluation (R2 and MSE) for
different stages of modeling (training, validation, testing and all data sets)
Model Performance evaluations of the PSO-
ANN models by different stages
Training (75%) validation (20%) Testing (05%) All (100%)
R2(%) MSE R2(%) MSE R2(%) MSE R2(%) MSE
Model - 1 99.0 0.005 98.7 0.014 99.6 0.003 98.9 0.007
Model - 2 99.8 ~0.000 98.5 0.016 94.7 0.057 99.0 0.006
Model - 3 99.3 0.004 98.9 0.011 98.6 0.015 99.1 0.006
Model - 4 99.1 0.005 98.6 0.014 96.9 0.024 98.8 0.008
Source:
Author's self generated
the ultimate testing outcomes (R2 = 99.6%, quality is enhanced by 5.6% in Scheme 2 and
MSE = 0.006); Model 3 had the ultimate by 20.3% in Scheme 3 as compared to Scheme
outcomes across the board. Overall, this arti- 1. As a consequence, scheme 3 has shown to
cle gives important insights into the use of be an effective method for treating wastewa-
advanced machine learning techniques, such ter. A neural network model-based regulat-
as PSO-ANN, for enhancing the efficiency of ing strategy might be used in the future to
water treatment desalination facilities. The enhance effluent quality while simultaneously
optimized model presented in this study can decreasing electrical energy usage.
help plant operators make informed decisions Ning et al. (2022) propose the PLC with
and optimize the plants performance, leading incremental proportion and incremental
to improved efficiency and cost savings. (IPI) control algorithm to preserve the con-
Saravana Kumar et al. (2021), begin by servation of the aquatic ecosystem and pro-
the difficulties connected with managing the mote supportable growth by automating the
quality of effluent from WWT plants, particu- adjustment of the dissolved oxygen level in
larly in light of increasingly stringent regula- the aeration tank during the WWT process.
tory standards. They introduce the concept of A BP-NN was utilized to improve method of
fuzzy logic control, which is a type of control regulation. Automatic DO content manage-
system that uses linguistic variables to model ment within the aeration tank presented in
complex and uncertain systems. The sug- Figure 1.1 through the PLC’s enhanced IPI
gested study provides two control techniques control algorithm. A PLC-based automated
(ammonia control and total nitrogen man- control system was implemented to miti-
agement) to enhance their performance of gate the astronomical increases in operating
treating wastewater, and the authors propose expenses and energy consumption caused
using a fuzzy logic controller to achieve these by the lack of automation. Under the guid-
goals. The simulation work was done Within ance of the enhanced IPI procedure, the total
the framework of the Benchmark Simulation nitrogen content of wastewater treated in
Model No.1 (BSM1), and this study’s offers the aeration tank was minimized, and its
a supervisory FLC method enhance the efflu- variability was reduced to a minimum. The
ent quality of a WWT facility and provides authors also highlight the challenges faced
numerical evidence of the effectiveness of this by WWT plant, including fluctuating influ-
control strategy. It’s noteworthy that the efflu- ent characteristics and variations in flow rate,
ent quality is maintained despite the higher which can lead to inefficiencies in treatment
AE and PE use in this system. The effluent and increased energy consumption and cost
6 Innovations in Computational Intelligence: Trends and Technologies
savings. Overall, the article provides a useful recycle loop. Even still, MPC may struggle to
example of how PLC-based control Systems deal with input disturbances and frequently
may be utilized to maximize productivity of needs many model coefficients to describe a
municipal WWT plant. response. The investigation found the MPC
Development and evaluation of a neuro- system was able to effectively control the
fuzzy-based Model Predictive Controller treatment process in real-time, reducing
(MPC) approaches that can estimate the key energy consumption and maintaining high
process factors and provide the appropriate levels of treatment efficiency. This paper con-
level of aeration to overcome the factors such cludes that the use of machine learning-based
as process uncertainty, seasonal variation, MPC systems able to offer significant benefits
and nonlinearity was discussed by Bernardelli to WWT plants, improving both their envi-
et al. (2020) in order to attain a streamlined ronmental and economic performance.
and cost-effective functioning. This article In order to forecast the dose of coagu-
describes the process of data collection and lant, Fang et al. (2022) employed the features
pre-processing, which involved the use of parameters such as pH, turbidity, electrical
sensors to monitor the different factors of conductivity, and flow velocity that character-
the treatment plant, such as flow rate, dis- ize influent water quality. Authors note that
solved oxygen levels. The data was then used traditional dosing algorithms for WWT plants
to train the machine learning models, which are often based on empirical formulas or trial
were integrated into the MPC system. and error, which can be inefficient and may
More testing using a weekly switch the result in suboptimal treatment outcomes.
between the two controllers (EW and CC) has In contrast, the proposed intelligent dosing
proven that the EW controller is more reli- algorithm model uses methods in the arena of
able at improving sewage quality while using artificial intelligence, such as machine learning
less energy. Especially by reducing air flow at neural networks to optimize dosing decisions
periods of low load times, but also by pre- based on real-time data from the treatment
venting oxidation during peak loads, as long plant and to suggest a sophisticated Light-
as the nutritional ceiling is never reached. GBM-based dosage prediction method, which
Figure 1.2 shows the process plan of a uses these data to estimate the dosage of coag-
WWTP that uses MPC. The dotted lines rep- ulant. The LightGBM algorithm’s findings for
resent the two control loops: the DO con- predictive power demonstrate its dominance.
trol loop controls the airflow (Ua), and the Overfitting and dataset compatibility are two
internal recycle (Qr) is controlled by the drawbacks of the LightGBM algorithm.
AQ3:
Please
provide
source Figure 1.1. Automatic control flow of aeration tank DO content by the improved IPI control
for all algorithm.
figures.
Source: Author's own resource
A systematic review on recent controllers for an industrial wastewater treatment plant 7
Figure 1.2. shows the process scheme of the WWTP to which MPC is applied.
Source:
AUTHOR'S SELF GENERATED
Table 1.3 provides an evaluation rubric capability is shown by these results. Overall,
for predicting outcomes using various this paper highlights the potential benefits of
approaches. Evaluating the efficacy of three using artificial intelligence methods that may
models using experimental data. The experi- be used to boost the performance of waste-
mental findings demonstrate that the R2 water remediation systems.
value reaches a maximum of 0.9957 for the Matheri et al. (2021) describe a study that
dataset model created by LightGBM, while was done by a group of researchers from dif-
the RMSE and MAE values are reduced to a ferent institutions in South Africa. They used
minimum of 0.3049 and 0.1474 correspond- data from a WWT plant to train and test
ingly. LightGBM’s advantage in predictive ANN. The models were built using a Multi-
layer Perception model and were utilized for
Table 1.3. The results of three different models forecasting potential issues with WWT sys-
tems, such as chemical composition, inherent
Model R2 RMSE MAE MAPE flow rate, and better safety factor. The result
MLR 0.9952 0.7504 0.4458 6.29% demonstrates that ANNs are an effective tool
DT 0.9748 0.4949 0.2978 4.78% for developing integrated wastewater systems
LightGBM 0.9957 0.3049 0.1474 1.34% and simulating the designs of WWTPs. For
the purpose of the real-time prediction of
Source:
nutrient removal efficiency, a neural network
based on the LSTM network (a descendant
Table 1.4. Model Performance on the training, of the RNN) is also suggested. However,
validation and test sets (R2 values) ANN is computationally intensive, difficult
Training Validation Test set to explain, and data-intensive. WWT process
set set issues were predicted using the artificial intel-
TSSe_RF 0.934 0.862 0.920 ligence (AI)-based ANN prediction model,
developed on the popular MATLAB platform
TSSe_ 0.935 0.892 0.920
DNN
and enhanced with machine learning (deep
learning). The research also stresses the need
PO4_RF 0.905 0.870 0.886
of taking into account numerous removal
PO4_DNN 0.904 0.908 0.872 input factors while creating such models to
Source: guarantee precise forecasts.
8 Innovations in Computational Intelligence: Trends and Technologies
Wang et al. (2021) present a unique ML- and require more training data to learn effec-
based method that aims to enhance effluent tively. In addition, GMM is highly sensitive
quality control in WWTPs by showing how to outliers. The best models for each algo-
practical factors and discharge parameters are rithm under test were determined by running
related. The author collected a large dataset multiple tests with different combinations of
of process data, including influent and efflu- their main parameters and selecting the ones
ent water quality parameters, operational lowest errors according to metrics taken into
conditions and environmental factors. This account, including MSE, RMSE, MAE, and
dataset was used to train several ML methods MAPE. With least RMSE, MSE, MAE, and
such as ANNs, decision trees, random forests, MAPE, the Transformer approach obtained
and linear regression. The framework is com- the highest Performance for predicting all of
prised of Random Forest (RF) models, Deep the critical variables.
neural network (DNN) models, and Variable When it comes to forecasting TSS and
Importance Measure (VIM) models and the NO3, LSTM methods fared the best, while
partial Dependence Plot (PDP) analyzers, and ANN and GMM algorithms produced the
it uses a unique method to explain temporal best results for NH4 and BOD5, respectively.
delays between processes. Thirty-two opera- Concerning the predictability of outcomes, it
tional variables and two effluent parameters— is lastly worth noting that the Transformer
Total Suspended Solids in Effluent (TSSe) and algorithm necessitates more time and effort
Phosphate in Effluent (PO4e)—are analyzed to train and make predictions. In accord-
in order to create RF models, which are then ance with the selected metrics, both ANN
verified using DNN models as references and and LSTM provided accurate predictions
demonstrated to be appropriate for VIM and while simultaneously using less computing
PDP in terms of clarifying the specific effects resources and a shorter amount of time to
of these two operational variables on TSSe train and provide predictions.
and PO4e. The model performance of DNN Classification models were shown by
and RF on training, validation and test data Wodecka et al. (2022) to be a useful tool
set as shown in Table 1.4. In conclusion, both for predicting changes in effluent character-
the RF and DNN models accurately forecast istics at the intake of WWT facilities, when
all data sets and demonstrated outstanding these values are directly proportional to the
Performance in generalization for TSSe and flow rate of incoming wastewater. In the
PO4e. considered proposal, the levels of quantified
Salles et al. (2022) suggested using machine wastewater characteristics parameters were
learning algorithms to forecast important divided into lower (lower-than-average indi-
variables (monitoring, control, and optimi- cator values), average (normal and maximum
zation of industrial processes) in the WWT values), and higher (increasing values). The
method. The value of the TSS, BOD5, NH4, results of the computations showed that the
and NO3 variables were approximations values of the chosen wastewater quality indi-
using the Gaussian Mixture Models (GMM), cators (BOD5, COD, TN, TP) can be detected
LSTM, ANFIS, Transformer and ANN algo- with adequate accuracy using the calculated
rithm. Greater computational resources and ensemble models blending support vector
longer preparation time are needed for the machines and boosted trees. The statistical
transformer algorithm. ANFIS has a limi- parameters (minimum, average, maximum,
tation of the type, quantity and position of and standard deviations) of seasonal fluc-
membership functions, the curse of dimen- tuation in the amount and quality of BOD5,
sionality, and the fact that LSTM models COD, TN, and TP were identified, with a
are more complex than conventional RNNs split between winter and autumn/spring. For
A systematic review on recent controllers for an industrial wastewater treatment plant 9
the purpose of maximize the effectiveness of included. The results of this study will help
WWT, this research finds that machine learn- professionals manage WWTPs based on data.
ing approaches may be utilized to forecast the The authors concluded that deep WWTP
quality of incoming wastewater. The findings learning-based models have the potential to
of this investigation could be applied to cre- be useful tools for forecasting key features
ate a real-time monitoring system for WWT of WWT plant and advise future research to
plants, which allow operators to improve take into account sensor networks that can
the treatment process based on the predicted provide data sets with greater dimensions
quality of incoming wastewater. and frequency.
Cheng et al. (2020) utilized training Figure 1.4 depicts the core of the work
and testing data collected over time from a of Do et al. (2021), which is the incorpora-
WWT facility in Norway. Standard LSTM tion of genetic algorithms (GAs) into the
and GRU, exponentially smoothed LSTM, Benchmark Simulation Model1 (BSM1) for
adaptive LSTM, and smoothed LSTM are the purpose of designing a higher-level con-
only some of the six deep learning models trol system for WWTPs. This research article
built using RNN-based soft sensors. Models proposes a unique Genetic Optimization for
built on GRUs are more efficient than LSTM Biological Wastewater Treatment Plants with
models because they converge more quickly. the objectives of increasing discharge qual-
For all important aspects, the LSTM soft- ity while decreasing operational expenses.
sensor performs best overall, succeeded by The suggested controller is meant to optimize
the exponentially-smoothed GRU and the the WWTP by adjusting the set points of the
LSTM. The dynamic models underperformed lower-level controllers, such as the PID con-
the other models in terms of their ability to trollers. This research provides the outcomes
predict the future. All that is needed are the of a simulation research was carried out to
data itself, as the offered models produce test the performance of proposed control-
good forecasting results. Figure 1.3 is a sche- ler. In this work, a GA-based hierarchical
matic illustration of the forecasting system controller was presented, with the bottom
that we propose. Using RNN-based soft sen- tier controller regulating S0,5 by manipula-
sors, this research constructed RNN-based tion of Kla,5, and the upper-level controller
models to predict WWTP essential param- adjusting S0,5 per SNH,4. In the higher-level
eters such influent flow, temperature, BOD, control, GA is utilized to figure out KSO,5
chloride, and energy consumption. To fur- and BSO.5 in order to achieve three prede-
ther reprocess unprocessed Data before deep termined goals in a variety of climates and
learning, the exponential smoothing filter is atmospheric circumstances.
A tank 5 has recently implemented the for designing a suitable treatment system
desired control. For each of the three weather to ensure the safety, efficacy, and quality of
scenarios investigated, the simulated out- the treated wastewater. Here, the limitations
comes will be compared to those obtained faced by the existing research are described as
by using simply the lowest controller, which follows. PID, FLC, PLC, and MPC controllers
is an ILC paired with a PI regulator for the are all commonly used in WWT processes;
wastewater influent data. As a result, the However, the PID controller’s inefficient
suggested strategy might be used to various parameter coordination and substantial time
contexts to further decrease the OCI and delay make it difficult to provide precise con-
EQI. Overall, the research sheds light on trol, especially on complex systems or sys-
how genetic algorithms might be included tems that demand high performance.
into the planning of advanced controls for Moreover, FLC controller has disadvan-
WWT facilities. There may be far-reaching tages of lower speed and longer run time and
consequences for the environment and pub- lack of real time responses. This PLC-based
lic health if the suggested controller is not control system is difficult to adapt or replace,
implemented to enhance the performance of requires extensive training and is always diffi-
WWTPs. Furthermore, time spent might be cult to identify errors. In addition, MPC may
cut down by using PSO, DE, or ACO in effi- struggle to deal with input disturbances and
cient ways. frequently needs many model coefficients to
describe a response.
Since traditional mechanistic models suffer
3. Discussion from a number of drawbacks, scientists have
This paper comprises the discussion about turned to Machine Learning (ML) techniques
the waste water and their various waste to simulate WWTP processes. Therefore, the
water treatment methods which provides existing research utilized LightGBM, RF,
different types of techniques from different ANN, ANFIS, LSTM, and GMM. However,
methods. WWT processes have advanced fast ANN requires lots of computational power
with scientific breakthroughs in recent dec- hard to explain and it requires lots of data,
ades. The treatment effectiveness with respect over fitting and data set compatibility are two
to their benefits, uses, and limitations have drawbacks of the LightGBM algorithm. RF
been thoroughly addressed. Understanding model is not able to deal with unbalanced
the characteristics of wastewater are essential and missing data, also its runtimes are fast,
[9] Li, X., Yi, X., Liu, Z., Liu, H., Chen, T., Niu, using machine learning models. In 2022
G., ... and Ying, G. (2021). Application of International Joint Conference on Neural
novel hybrid deep leaning model for cleaner Networks (IJCNN) (pp. 1–9). IEEE.
production in a paper industrial wastewater [16] Saravana Kumar, S., and Latha, K. (2021).
treatment system. Journal of Cleaner Pro- A supervisory fuzzy logic control scheme
duction, 294, 126343. to improve effluent quality of a wastewater
[10] Mahadeva, R., Kumar, M., Patole, S. P., and treatment plant. Water Science and Technol-
Manik, G. (2022). An optimized PSO-ANN ogy, 84(10-11), 3415–3424.
model for improved prediction of water [17] Subari, F., Harisson, H. F., Kasmuri, N. H.,
treatment desalination plant performance. Abdullah, Z., and Hanipah, S. H. (2022).
Water Supply, 22(3), 2874–2882. An overview of the biological ammonia
[11] Matheri, A. N., Ntuli, F., Ngila, J. C., Seodi- treatment, model prediction, and control
geng, T., and Zvinowanda, C. (2021). Per- strategies in water and wastewater treat-
formance prediction of trace metals and cod ment plant. Malaysian Journal of Chemical
in wastewater treatment using artificial neu- Engineering and Technology (MJCET), 5(1),
ral network. Computers and Chemical Engi- 8–28.
neering, 149, 107308. [18] Sundui, B., Ramirez Calderon, O. A., Abdel-
[12] Newhart, K. B., Holloway, R. W., Hering, dayem, O. M., Lázaro-Gil, J., Rene, E. R.,
A. S., and Cath, T. Y. (2019). Data-driven and Sambuu, U. (2021). Applications of
performance analyses of wastewater treat- machine learning algorithms for biological
ment plants: A review. Water research, 157, wastewater treatment: updates and perspec-
498–513. tives. Clean Technologies and Environmen-
[13] Ning, S., and Hong, S. (2022). Programma- tal Policy, 23, 127–143.
ble logic controller-based automatic control [19] Wang, D., Thunéll, S., Lindberg, U., Jiang,
for municipal wastewater treatment plant L., Trygg, J., Tysklind, M., and Souihi, N.
optimization. Water Practice and Technol- (2021). A machine learning framework to
ogy, 17(1), 378–384. improve effluent quality control in waste-
[14] Nourani, V., Asghari, P., and Sharghi, E. water treatment plants. Science of the total
(2021). Artificial intelligence-based ensem- environment, 784, 147138.
ble modeling of wastewater treatment plant [20] Wodecka, B., Drewnowski, J., Białek, A.,
using jittered data. Journal of Cleaner Pro- Łazuka, E., and Szulżyk-Cieplak, J. (2022).
duction, 291, 125772. Prediction of wastewater quality at a waste-
[15] Salles, R., Mendes, J., Araújo, R., Melo, C., water treatment plant inlet using a system
and Moura, P. (2022, July). Prediction of based on machine learning methods. Pro-
key variables in wastewater treatment plants cesses, 10(1), 85.
2 Green SaaS adoption in cloud
computing: An investigation into
environment sustainability
Bhanu Priyaa, Bhupal Aryab, K. M. Pandeyc, and Prashant Vermad
Department of Computer Science and Engineering, Roorkee Institute of Technology, Roorkee, India
Abstract: The advent of cloud computing has advanced tremendously in the realm of information technology,
resulting in a transformative influence on the IT sector. Cloud computing provides the provision and delivery of
services, software, and computing over the Internet. Due to the utilization of resources such as the virtualiza-
tion of servers, networks, and storage, as well as workload distribution through load-balancing processes, it
consumes a lot of power and energy. In this paper, we have defined the “Green IT component” which refers to
the utilization of energy-saving and environmentally friendly techniques within data centers and their compo-
nents as processing, storage, and network elements. This paper gives the concept of a “greener cloud” and its
implications for sustainability. We have examined various research papers discussing the challenges and oppor-
tunities associated with green cloud computing, with the application of green software-as-a-service models such
as desktop as a service, integration as a service, prognostic, and health management as a service.. Green cloud
technology ensures high performance and productivity through an energy-efficient approach, enabling busi-
nesses while also promoting a sustainable future for the planet. In future work, we will propose a new architec-
ture for a greener cloud for the utilization of different software-as-a-service models of delivery.
Keywords: Sustainability, energy efficiency, resource optimization, carbon footprint, green IT, energy-aware
design
DOI: 10.1201/9781003606635-2
14 Innovations in Computational Intelligence: Trends and Technologies
sector, with a 1.8% increase or 261 Mt. application businesses can eliminate the need
Notably cloud infrastructure is designed to for on-premises hardware and infrastructure,
minimize expenses and maximize resource resulting in lower energy consumption and
utilization, making it more environmentally reduced carbon footprint. PaaS platforms
friendly compared to traditional data centers frequently provide frameworks and tools
(IEA, 2022). In terms of service delivery mod- that encourage effective coding techniques,
els, cloud computing offers infrastructure as optimal resource utilization, and scalability,
a service (IaaS), platform as a service (PaaS), which results in energy savings and decreased
and software as a service (SaaS). Through the waste.
internet, virtualized computer resources are All spheres of life are starting to adopt
made available by IaaS, giving users control cloud computing technologies, particularly in
and management over their infrastructure. the area of data storage. Increasingly, Con-
PaaS provides a framework for creating, sumers are okay with endpoint devices having
testing, and deploying applications with- less storage since they prefer using the cloud.
out requiring the management of the foun- While this has been happening, some com-
dational infrastructure. SaaS eliminates the mercial cloud development firms, like Google,
requirement for local installation and main- Amazon, and IBM Cloud, have offered a vari-
tenance by delivering software programs via ety of services, including infrastructure and
the internet (Gulati, no date). Green cloud services for scientific computing.
solutions offer a means to reduce operational
expenses, minimize greenhouse gas emissions, 2.2. Green IT
and conserve energy resources, thereby fos-
tering a positive impact on the environment, The Environmental Protection Agency initi-
all while ensuring the maintenance of high- ated the Energy Star program in the United
quality service levels (QoS) (Raghavendran et States back in 1992. The program specifi-
al., 2017). cally focuses on enhancing energy efficiency
in computer devices and related technologies.
The term “green computing” gained popular-
2. Background ity subsequent to the inception of the Energy
Star program (Brown, Webber and Koomey,
2.1. Cloud computing 2002)a voluntary labeling program designed
A fundamental transformation in the utili- to identify and promote energy-efficient prod-
zation and management of hardware and ucts, in order to reduce carbon dioxide emis-
software resources are used and managed is sions. Since then, the EPA, now in partnership
brought about by cloud computing. Robust with the US Department of Energy (DOE.
data replication and failover mechanisms Around the same period, TCO Devel-
ensure high reliability and mitigate the risks opment, an organization based in Sweden,
of data loss and downtime. In the context introduced the TCO certification program
of the energy-efficient cloud model, IaaS (Joumaa and Kadry, 2012). This initiative
allows businesses to optimize their resource was aimed at promoting and certifying a
utilization such as provisioning, mapping, wide range of IT equipment include net-
adaptation, discovery, brokering, estimation, work accessories, computer systems, video
and modeling. It emphasizes the benefits of adapters, monitors, keyboards, and even
resource management in IaaS, including scal- mobile phones with a primary focus on ful-
ability, quality of service, cost-effectiveness, filling distinct environmental and sustainabil-
and simplified interfaces (Mary, 2013). SaaS ity standards. The use of energy-saving and
refers to cloud-based software applications environmentally friendly techniques in data
that are accessed through the internet. In SaaS centers, with a focus on the CPU, memory,
Green SaaS adoption in cloud computing: An investigation into environment sustainability 15
the initial condition of the data centers they resources, storage, network usage, data trans-
start with. These techniques aim to minimize fer, load balancing, and additional services.
relocation overhead and maximize consolida- By considering factors such as instance usage,
tion by incorporating it into their modeling data storage, network traffic, and support
process (Arshad et al., 2022). options, the calculator provides an estimation
of cloud service costs.
3.3. Efficient task scheduling By adopting these practices, cloud service
providers (CSPs) contribute to a more sus-
In cloud data centers, an effective task sched- tainable IT industry and offer environmen-
uler is responsible for efficiently utilizing the tally responsible services to their customers.
resources available in the data center for Greener cloud projects offer businesses a
task execution. The efficiency of a scheduling variety of chances to cut costs, support the
algorithm is typically evaluated based on two environment, innovate, and stand out from
key factors: first is makespan which measures the competition while promoting a greener
how long it takes to finish every work on the future as:
cloud, and second is energy consumption,
which concentrates on using energy as effi- 3.6. Environment sustainability
ciently as possible when carrying out activi-
ties (Zambuk et al., 2021)such as security, the In order to reduce the negative effects on the
efficient allocation of resources, which in turn environment, cloud computing sustainabil-
results in the waste of resources. Researchers ity, especially in SaaS offerings, entails uti-
have explored a number of approaches over lizing resource-efficient and environmentally
the past decade to overcome these challenges. friendly practices such as server virtualiza-
The main objective of this research is to tion, resource sharing, and dynamic scaling
explore the task scheduling of cloud comput- also implementing a system to monitor and
ing using multi-objective hybrid Ant Colony report on energy consumption.
Optimization (ACO).
3.7. Innovation technological
3.4. Power and energy calculator advancements
Calculating carbon emissions in data centers The pursuit of energy-efficient cloud com-
involves considering various factors such as puting drives innovation in the development
AQ2:
Please
PUE as it quantifies the ratio of the overall of new technologies, software, and hardware
define energy consumed by a data center compo- solutions. This fosters technological advance-
PUE. nent to the energy consumed exclusively by ments, such as improved virtualization tech-
the IT infrastructure within that facility. A niques, energy-efficient data center designs,
PUE: PUE value of 1.0 represents ideal efficiency, and intelligent workload management systems.
Power indicating that total power utilization by the
Usage data center components is utilized by the IT 3.8. Government incentives and
Effectiveness
hardware and infrastructure. regulations
Governments worldwide are recognizing the
3.5. Cost calculator importance of energy efficiency and environ-
A data center cost calculator estimates mental sustainability. They may offer incen-
expenses including infrastructure, energy, tives, grants, or tax benefits to organizations
maintenance, cooling, personnel, and miscel- adopting green cloud practices. Compliance
laneous costs. Cloud services cost calculator with green regulations can also open doors to
involves estimating expenses for compute new markets and partnerships.
Green SaaS adoption in cloud computing: An investigation into environment sustainability 17
the increasing popularity of cloud computing real-time guarding of data, and restoration
with virtualization technology. By using soft- of vulnerabilities.
ware as a service(SAAS.
5.6. Security as a service
5.3. Database as a service SaaS model of cloud computing faces many
Database as a service (DBaaS) model is a troubles when we build the cloud infrastruc-
cloud computing managed service that allows ture because cloud providers generally are
users to line up, operate, manage, and scale not concerned about the security and pri-
with some style of access to information while vacy of the tenant or customers. Hence the
not the necessity to set up the physical hard- tenant uses specific protection gear together
ware, putting in code, or configuring it for with anti-virus and host-based intrusion
performance and heading for by themselves detection structures to stabilize their digital
(Al Shehri, 2013). Green DBaaS in enterprise machines additionally providers afford flex-
manager is applied all the way through 4 ibility to tenants to determine how a great
options which are: VM based, joint cluster, deal manage they want to have over their
collective installation, and shared database. very own VM.
payments are per-usage and software propri- SaaS provider model based on the base-
etors can get entry to their utility statistics line security framework (Varadharajan and
according to their need. Tupakula, 2014) to secure its own infra-
structure and make sure that malicious ten-
ants aren’t attacking the cloud infrastructure
5.4. Integration as a service or maybe the web website hosting malicious
Integration as a service (INaaS) is a machine software.
of equipment and applied sciences that con-
nects a number of applications, systems, 5.7. Prognostics and health
repositories, and IT environments for the management as a service
real-time trade of facts and processes. Many
industries prefer the SAAS for most consum- Prognostics and Health Management (PHM)
ers because they do not want more machines. service of cloud computing represents a great
So the center of attention is to invoke the chance to notice coming failures by predicting
functionalities and develop the legacy appli- future behavior. There are many challenges to
cation in heterogeneous cloud services such predicting the integrating behavior such as
as web service (Kumar and Bari, 2017). complex data of industries, large volumes of
data stored in different locations, high com-
putational resources, and continuous moni-
5.5. Compliance as a service toring of logistics and infrastructure. This
Compliance as a service (CaaS) is a cloud management service provides PHM solutions
SLA whose principal intent is to regulate and to have the ability of fault detection, fault iso-
the guard consumers’ privatizes and furnish lation, and estimation of remaining useful life
security by imposing greener attributes such (Terrissa et al., 2016).
as confidentiality, integrity, availability, and Table 2.2 Provides a list of critical consid-
accountability (CIAA) (Yimam and Fernan- erations for developing and overseeing envi-
dez, 2016). ronmentally sustainable SaaS and provides
CaaS offers partitioning of duties, annual some comparison and recognition of the ser-
risk evaluation, management of differ- vice’s environmental impact, especially with
ent applications, facts and figures detec- regard to carbon emissions and the ecosys-
tion, policy creation and enforcement, tem’s overall footprint.
Green SaaS adoption in cloud computing: An investigation into environment sustainability 21
[3] Atiewi S, Yussof S. Comparison between Cluster Comput. Published online 2022.
cloud sim and green cloud in measuring doi:10.1007/s10586-022-03713-0
energy consumption in a cloud environ- [14] Kumar M, Bari P. Integration of
ment. In: Proceedings - 3rd International cloud based services. Published online
Conference on Advanced Computer Sci- 2017;2(4):101-105.
ence Applications and Technologies, ACSAT [15] Mary MA. Survey on resource management
2014. IEEE; 2014:9-14. doi:10.1109/ technique in cloud computing. Published
ACSAT.2014.9 online 2013;2(12):1723-1731.
[4] Azambuja M, Camargo M, Filho LM, et al. [16] Park J, Han K, Lee B. Green cloud? An empir-
Enabling lean supply with a cloud comput- ical analysis of cloud computing and energy
ing platform - An exploratory case study. In: efficiency. Manag Sci. 2023;69(3):1639-
21st Annual Conference of the International 1664. doi:10.1287/mnsc.2022.4442
Group for Lean Construction 2013, IGLC [17] Patil A, Patil DR. An analysis report on
2013. 2013:815-824. green cloud computing current trends and
[5] Brown R, Webber C, Koomey JG. Status future research challenges. SSRN Electron
and future directions of the ENERGY STAR J. Published online 2019. doi:10.2139/
program. Energy. 2002;27(5):505-520. ssrn.3355151
doi:10.1016/S0360-5442(02)00004-X [18] Priya L, Nallakannu G, Abirami C, Kumar
[6] Jagtap C, Rathore K, Patel P, et al. Desk- SV, Pavithra A. A novel intelligent diagno-
top virtualization with cloud computing. sis and disease prediction algorithm in green
Int J Eng Res Technol. 2020;9(1):255-257. cloud using machine learning approach. J
doi:10.17577/ijertv9is010157 Green Eng. 2020;10(7):3421-3433.
[7] Chaurasia N, Chauhan R, Agarwal H, [19] Raghavendran CV, Guhan P, Balasubrama-
Kumar N, Jaiswal RK. Shifting from cloud nian P, Sathyakumar M. A study on cloud
computing to green cloud and edge comput- computing services. Int J Eng Res Technol.
ing. SSRN Electron J. Published online 2023. 2017;4(34):1-7.
doi:10.2139/ssrn.4387781 [20] Al Shehri W. Cloud database database as a ser-
[8] Gebreslassie Y, Sharma DP. DPS-Yemane- vice. Int J Database Manag Syst. 2013;5(2):1-
Shareme CSMM model for client-side SLA 12. doi:10.5121/ijdms.2013.5201
of green cloud services measuring and [21] Stoyanova M, Nikoloudakis Y, Panagiotakis
monitoring. S, Pallis E, Markakis EK. A survey on the
[9] Gulati R. A systematic review on the various internet of things (IoT) forensics: challenges,
approaches used for achieving energy con- approaches, and open issues. IEEE Com-
sumption in cloud. Published online. mun Surv Tutor. 2020;22(2):1191-1221.
[10] IEA. CO2 emissions in 2022. Glob doi:10.1109/COMST.2019.2962586
Energy. 2022;62(10):20-21. Available at: [22] Taryana U, Fajar AN, Utama DN. Informa-
https://www.iea.org/news/global-co2-emis- tion as a service on cloud computing tech-
sions-rebounded-to-their-highest-level-in- nology: a review. In: 2018 International
history-in-2021. Seminar on Research of Information Tech-
[11] Jain N, Inderveer K. Energy-aware virtual nology and Intelligent Systems, ISRITI
machine migration for cloud computing - a 2018. IEEE; 2018:39-42. doi:10.1109/
firefly optimization approach. J Grid Com- ISRITI.2018.8864468
put. Published online 2016. doi:10.1007/ [23] Terrissa LS, Sahnoun M, Zghal M, et
s10723-016-9364-0 al. A new approach of PHM as a ser-
[12] Joumaa C, Kadry S. Green IT: Case studies. vice in cloud computing. In: Colloquium
Energy Procedia. 2012;16(PART B):1052- in Information Science and Technology,
1058. doi:10.1016/j.egypro.2012.01.168 CIST. IEEE; 2016:610-614. doi:10.1109/
[13] Katal A, Dahiya S, Choudhury T. Energy CIST.2016.7804958
efficiency in cloud computing data cent- [24] Varadharajan V, Tupakula U. Security as a
ers: a survey on software technologies. service model for cloud environment. IEEE
Green SaaS adoption in cloud computing: An investigation into environment sustainability 23
Trans Netw Serv Manag. 2014;11(1):60-75. [27] Yimam D, Fernandez EB. A survey of com-
doi:10.1109/TNSM.2014.041614.120394 pliance issues in cloud computing. J Inter-
[25] Wang P. Application of cloud computing net Serv Appl. 2016;7(1). doi:10.1186/
and information fusion technology in green s13174-016-0046-8
investment evaluation system. J Sensors. [28] Zambuk FU, Anwar A, Zangeneh F, et al.
2021. doi:10.1155/2021/2292267 Efficient task scheduling in cloud comput-
[26] Yan J, Zhang S, Yu W, Yuan Y. Energy-aware ing using multi-objective hybrid ant colony
systems for real-time job scheduling in cloud optimization algorithm for energy efficiency.
data centers: a deep reinforcement learning Int J Adv Comput Sci Appl. 2021;12(3):450-
approach. Comput Electr Eng. 2022;99:107688. 456. doi:10.14569/IJACSA.2021.0120353
doi:10.1016/j.compeleceng.2022.107688
3 Anomaly detection in wireless sensor
network
Mayank Shuklaa, Sneha Yadavb, Abhay Pratap Singhc, Fizza Rizvid,
and Surya Vikram Singhe
Department Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management, Lucknow, Uttar Pradesh, India
Abstract: With the recent emergence of the notion of the “Internet of Things,” wireless sensor networks (WSNs),
or WLANs, are critical and indispensable platforms for the future. They are employed in the military, health-
care, industry, and habitat for the purposes of tracking, monitoring, and regulating numerous applications.
However, anomalies that arise for a variety of causes, including node failures, reading mistakes, odd events, and
malicious attacks, have an impact on the quality of data that sensor nodes collect. Thus, before sensor data is
used to inform choices, anomaly detection is a crucial step in ensuring its quality.
We outline the difficulties in detecting anomalies in WSNs and the conditions that must be met in order to
create models that are both successful and efficient. Next, we examine the most recent developments in data
anomaly detection research in WSNs and group existing detection techniques into five major classes according
to the detection techniques used to create these techniques. Variations of the most advanced models in each
class are discussed, and their drawbacks are emphasized to give insight into possible future research directions.
In addition, the methods under assessment are contrasted and assessed according to how well they fulfill the
specified criteria. In conclusion, the overall constraints of existing methodologies are referenced and potential
avenues for future research are proposed and deliberated.
Keywords: IoT, anomaly detection, wireless sensor network, machine learning, neural network
a
[email protected]; [email protected]; [email protected];dRizvif952@
gmail.com; [email protected]
DOI: 10.1201/9781003606635-3
Anomaly detection in wireless sensor network 25
specific objectives and approaches in this pro- These applications may include early detec-
ject include: tion of environmental incidents, intrusion
detection in security applications, equipment
2.2. Algorithm selection and fault monitoring in industrial settings, and
more.
development
The project involves a comprehensive review
of existing anomaly detection algorithms, 3. Thematic Overview
both from the domains of machine learn- Anomaly detection in WSNs is a project topic
ing and statistical analysis. After evaluating that involves the identification of unusual
these methods, the project aims to develop a patterns or behaviors within the data col-
customized anomaly detection algorithm tai- lected by sensors in a wireless network. The
lored to the unique characteristics of WSNs. overarching goal is to develop techniques and
algorithms that can effectively distinguish
2.3. Resource efficiency between normal and anomalous activities,
helping to enhance the overall security, reli-
Given the resource constraints of sensor ability, and efficiency of the wireless sensor
nodes, the project focuses on creating an algo- network.
rithm that minimizes the computational and Here’s a thematic overview of such a
memory requirements. This ensures that the system:
anomaly detection process can be executed on
sensor nodes with limited resources without
compromising the network’s overall efficiency. 3.1. Sensor data characteristics
Analyzing the characteristics of sensor data,
2.4. Real-time detection such as signal strength, frequency, and tem-
poral patterns, to identify anomalies that
An important aspect of the project is to deviate from expected norms.
achieve real-time anomaly detection, allow-
ing the network to respond promptly to
abnormal events. This involves optimizing 3.2. Machine learning models
the algorithm for quick decision-making and Utilizing machine learning algorithms to
minimizing communication overhead, as well detect anomalies in user behavior based on
as energy consumption. historical data. This may involve supervised,
unsupervised, or semi-supervised learning
2.5. Evaluation and validation approaches.
The project involves extensive experimen-
tation using both synthetic and real-world 3.3. Pattern recognition
datasets. It aims to assess the performance Identifying patterns of normal user behavior
of the developed algorithm in terms of accu- and flagging deviations from these patterns as
racy, false-positive rate, detection time, and potential anomalies. This can involve statisti-
resource utilization. The algorithm will be cal methods or advanced pattern recognition
compared against existing methods to dem- techniques.
onstrate its advantages.
3.4. User profiling
2.6. Practical applications Creating user profiles based on their typical
The research project also explores practical interactions with the wireless sensor network.
applications of anomaly detection in WSNs. Anomalies are then detected when a user’s
26 Innovations in Computational Intelligence: Trends and Technologies
to minimize false positives, as these can lead between efficiency and accuracy is essential,
to unnecessary alarms and resource wastage. especially in applications where energy con-
servation is critical.
4.1.2. Weaknesses
4.4. Security considerations
Achieving high accuracy may come at the
cost of increased false positives, especially in 4.4.1. Strength
dynamic and noisy environments. Striking the
Anomaly detection is a fundamental com-
right balance is challenging, and the trade-off
ponent of security systems in wireless sensor
between sensitivity and specificity needs care-
networks. It helps identify malicious activities
ful consideration.
and potential threats.
of WSNs. This algorithm considers the technology. Here are some potential areas for
constraints of limited resources, wire- future research and development in anomaly
less communication, and distributed data detection for WSNs:
gathering in WSNs, making it a practical
choice for real-world deployments.
7.1. Deep learning and AI techniques
3. Performance evaluation: Extensive exper-
imentation was conducted on both syn- To improve the precision and effectiveness of
thetic and real-world datasets. Our results anomaly identification in WSNs, deep learn-
demonstrated that the proposed algo- ing models—such as DNNs, CNNs, RNNs,
rithm outperformed existing methods in or hybrid architectures—are included. use
terms of accuracy, false-positive rate, and of pre-trained models and transfer learning
resource efficiency. It exhibited a high to enhance anomaly detection performance,
detection rate while minimizing energy particularly in situations with a shortage of
consumption and communication over- labeled training data.
head, which is crucial in resource-con- Investigate the deployment of anomaly
strained WSNs. detection algorithms directly on edge devices
within the WSN, enabling real-time process-
In conclusion, the successful development ing and reducing the need for transmitting
and evaluation of an efficient anomaly detec- raw sensor data to a central server. Develop
tion algorithm for Wireless Sensor Networks lightweight anomaly detection models opti-
have the potential to enhance the reliability mized for edge devices with constrained com-
and security of WSNs in various applications. putational resources and energy.
This project contributes to the ongoing efforts
to make WSNs more resilient and practical for
real-world deployments. As technology contin- References
ues to evolve, so will the challenges and solu- [1] Akyildiz I. Wireless sensor networks: A sur-
tions in the field of anomaly detection in WSNs. vey. Comput Netw. 2002;38(4):393–422.
[2] Barreca A, Curto R, Malavasi G, and
7. Future Work Rolando D. Energy retrofitting for the
modern heritage enhancement in weak real
Future work in anomaly detection for WSNs estate markets: The Olivetti housing stock
is likely to focus on addressing emerging in Ivrea. Sustainability. 2022;14(6):3507.
challenges and leveraging advancements in doi:10.3390/su14063507.
4 Revolutionizing object recognition
beyond CNN and YOLO with deep
learning breakthrough
G. S. S. S. S. V. Krishna Mohan1,a, Mahammad Firose Shaik2,b,
G. Usandra Babu3,c, R. G. V Prasanna1,d, Pinagadi Venkateswara
Rao4,e, and Inakoti Ramesh Raja5,f
1
Department of Electronics and Communication Engineering, Aditya Institute of Technology and
management, Tekkali, India
2
Department of Electronics and Instrumentation Engineering V R Siddhartha Engineering College
Vijayawada, India
3
Department of Electronics and Communication Engineering, Aditya Engineering College,
Surampalem, India
4
Department of AI and ML, School of Engineering, Malla Reddy University, Hyderabad, Telangana,
India
5
Department of Electronics and Communication Engineering Aditya College of Engineering and
Technology, Surampalem, India
Abstract: In the world of computer vision and object detection, there’s a strong connection between these areas.
Object recognition is all about recognizing specific things in pictures and videos. But this paper goes a step fur-
ther than the usual methods of finding objects. It tries to understand images in more detail, like how our eyes
do. The work starts by looking at deep learning and well- known object detection systems like CNN, R-CNN,
and YOLO. These systems can typically find only a few objects in a picture, and they work best at distance of
5–6 meters. However, our new model is much better at this task and has an interesting feature it can even tell
you the names of the objects it sees using Google Translate. This is especially helpful for people with vision
problems because it helps them understand what’s around them better. In summary, the research combines
computer vision, deep learning, and real-time object recognition to enhance visual perception and offer valuable
assistance to individuals with visual impairments.
Keywords: Deep learning, CNN, YOLO, RCNN, visual impairs, computer vision
a
[email protected]; [email protected]; [email protected]; drgvprasanna@
gmail.com; [email protected]; [email protected]
DOI: 10.1201/9781003606635-4
32 Innovations in Computational Intelligence: Trends and Technologies
environment more quickly, easily, confidently, systems that perform optimally up to 5–6
and with a distinct sense of mobility. Visual meters, our innovative model excels in rec-
impairment extends beyond mere eyesight ognizing various objects, even articulat-
issues, stemming from various causes like ing their names using Google Translate.
trouble with eyesight, cataract development, This distinctive feature proves particularly
issues in the rear side of the eye, or problems advantageous for individuals facing vision
with the optic nerve [4]. People facing visual challenges, enhancing their comprehen-
impairment encounter numerous challenges sion of the surrounding environment. By
in daily life, from navigating roads safely to integrating computer vision, deep learn-
discerning traffic light signals or avoiding ing, and real-time object recognition, our
obstacles. Pursuing education often involves work strives to advance visual perception.
learning Braille, a system of raised dots felt Ultimately, our goal is to foster inclusivity
with the fingers. Basic activities, like visiting in technology, offering valuable support to
the doctor, become challenging as individuals individuals with visual impairments for a
rely on touch and hearing to navigate their more profound understanding of the world
world, introducing an element of motion around them.
awareness.
In the contemporary landscape, artificial
intelligence (AI) stands out as a transforma- 2. Literature Review
tive force, shaping our future with its smart Cheng et al. proposed a comprehensive
capabilities [5]. Advancements in AI, fueled by approach to enhance visual localization for
abundant data and powerful computers, find individuals with visual impairments [6].
applications in diverse fields like retail and Their system comprises multiple components,
delivery services. AI facilitates efficient inven- including a deep descriptor network, 2D–3D
tory management in retail, making shopping geometric validation, and online sequence
more convenient by tracking stock and offer- comparison. In this workflow, a Dual Descrip-
ing personalized product recommendations tor network is integrated with RGB, Infrared,
based on preferences. In the delivery realm, and depth images, enabling the generation
AI plans optimal routes to transport items of robust, context-rich descriptors and local
seamlessly, introducing a dynamic element of features.
motion. Researchers at Springer-Verilog presented
AI’s transformative influence extends to a LiDAR-based technique for predicting
education, enabling personalized support by distances and effectively measuring obsta-
helping teachers understand student progress. cles [7]. They utilize an EfficientDet-LiteV4
In security, AI aids law enforcement in iden- lightweight deep learning model for obsta-
tifying suspects through image processing in cle detection and calculate anticipated dis-
surveillance videos and monitors buildings, tances using LiDAR-generated depth maps.
alerting authorities to any unusual activities. To test their approach, they implemented it
Even in healthcare, when doctors conduct on a Raspberry Pi4 platform integrated with
thorough eye examinations using a contact LiDAR. The results of their experiments dem-
fundus examination tool, they capture not onstrate high accuracy in both obstacle detec-
only static images but also dynamic insights tion and distance estimation.
into motion, aiding in the diagnosis and treat- Shen et al. proposed a two-stage aggregate
ment of various eye conditions.” learning model called VRTMM, designed for
Our research explores a smarter approach interpreting remote sensing images [8]. This
to understanding images beyond merely model combines a variational autoencoder as
spotting objects. In contrast to traditional well as reinforcement learning. Convolutional
Revolutionizing object recognition beyond CNN and YOLO with deep learning breakthrough 33
Neural Networks (CNNs) are first tuned A helpful system has been developed for
using a variational autoencoder. In the later individuals with partial vision using a Rasp-
stage, a transformer-based model that com- berry Pi 3 and optical character recognition
bines semantic and geographical data gener- (OCR) technology, as discussed in [13]. This
ates textual descriptions. system assists people with limited vision by
Rahman et al. introduced an Internet of converting text from documents into spo-
Things (IoT)-enabled system for automated ken words. However, one drawback is that
object recognition in assisting individuals the complexity increases as a computer is
with visual impairments [9]. Their system required to process the images.
facilitates the recognition of obstacles and
enable audio feedback to the user when nec-
essary. It includes four laser sensors employed 3. Technologies
for object recognition and currency denomi- The contemporary atmosphere has increased
nation identification in real-time scenarios, the risk of inhaling disorders, namely asthma,
both indoors and outdoors. To accomplish chronic obstructive pulmonary disease
these objectives, the system makes use of Ten- (COPD), and also few other disorders. That
sorFlow Lite, MobileNet, and a Single-Shot risk has increased due to increase in air pol-
Detector (SSD). lutants like PM2.5, PM10, etc., a respirator
A tool that reads text from images and can be utilized as an immediate countermeas-
turns it into spoken words is created using ure on an individual level safety measure as
a method called Optical Character Recogni- bringing down pollution levels require much
tion (OCR). In this method [10], a specific longer time than the severity of the problem
algorithm called MSER is used to make sure is allowing.
it’s accurate. The setup involves connecting a
Raspberry Pi to a camera for taking pictures,
and then the MSER algorithm is used to pull 3.1. Deep learning
out the words. On average, this system gets it The neural network in the brain is repli-
right about 85–87% of the time. cated by a specific type of computer program
An advanced audio assistance system is known as deep learning [14]. It is frequently
designed to aid blind individuals by reading referred to as ‘deep learning’ because it
letters or text from documents and identify- employs deep neural networks, which are a
ing objects in their surroundings. This sys- subset of machine learning. Connected lay-
tem, as described in [11], uses technology to ers are utilized in the construction process of
detect both text in documents and obstacles deep learning systems.
nearby. Once detected, the system produces a The surface layer is addressed as the input
voice-based audio output, providing valuable layer, while the base layer is addressed as the
information to help individuals with visual output layer. “Hidden layers” refers to the
impairments navigate their environment more intermediary phases. The term ‘deep’ refers to
effectively. A special tool has been created for neural networks that connect neurons across
people who can’t see well [12]. This tool uses more than two layers. Each hidden layer com-
smart technology to help them read books. prises neurons with interconnections between
It works with a small computer called Rasp- them.
berry Pi 2 and is programmed using Python. The input signal undergoes processing
There’s a monitor to check how the program by the neuron before being sent to the layer
is doing, and it’s especially helpful for visually above it. The weight, bias, and activation
impaired students. However, it can read only function that are applied dictate the inten-
one language. sity of the signal that is sent into the neuron
34 Innovations in Computational Intelligence: Trends and Technologies
which lies in the layer below. This very net- Regression analysis, which yields the
work consumes large volumes of input data, greatest likelihood photos, is how YOLO
processing them through several layers and formulates the object identification process.
learning more intricate characteristics of the YOLO utilizes convolutional neural net-
data at each layer. works (CNN) to swiftly diagnose entities. As
Neural networks can be grouped into the name indicates, the approach recognizes
shallow and deep types. In a shallow neu- objects using one forward propagation over
ral network, there is a solitary hidden layer a neural network. This indicates that the pre-
connecting both the input and output layers. diction procedure will be performed through-
Deep learning networks, on the other hand, out the whole image with a single algorithm
include multiple layers, such as the 22 layers run. CNN anticipates numerous class prob-
in the Google LeNet model for recognizing abilities and bounding boxes in a single go.
images. Nowadays, deep learning is utilized The YOLO algorithm comes in a wide
in various applications, ranging from TVs variety, with Tiny YOLO and YOLOv5 being
and autonomous vehicles to cell phones and a couple of the more well-known versions.
Google’s fraudulent activity tracking. The YOLO algorithm functions by employ-
ing three distinct strategies:
3.2. YOLO (You Only Look Once)
• Residual blocks
algorithm • Bounding box regression
You Only Look Once (YOLO) is a cutting- • Intersection Over Union (IOU)
edge problem-solving object identification
technique that was originally published in the 3.3. Region-based convolutional
esteemed academic publication “You Only neural network (RCNN)
Look Once: Unified, Real-Time Object identi-
fication” in 2015. The authors of this work are The multifaceted field of computer vision
Joseph Redmon, Santosh Divvala, Ross Gir- surged in popularity with the advent of
shick, and Ali Farhadi, as shown in Figure 4.1. Convolutional Neural Networks (CNNs),
This real-time technique can be employed to particularly in the context of self-driving
identify various objects in images. automobiles taking the forefront. Within
AQ1:
Please
provide
source
for all the Figure 4.1. YOLO architecture.
figures
Source:
AUTHOR'S SELF GENERATED
Revolutionizing object recognition beyond CNN and YOLO with deep learning breakthrough 35
computer vision, object detection plays a piv- Sophisticated neural networks often employ
otal role. This technique simplifies tasks such COCO sets, a kind of rigorous, better visual
as pose estimation, vehicle identification, sur- dataset. As an illustration, COCO has been
veillance, and more. used extensively to evaluate and compare real-
In contrast to classification algorithms, time object identification skills. The formats
object identification techniques use a bound- of the COCO dataset are quickly interpreted
ing box to encircle the object of interest by sophisticated neural network frameworks.
inside an image. Predicting the exact number The various attributes of COCO are
of bounding boxes in an object identification
scenario that accurately represent the numer- • Segmentation of objects with comprehen-
ous places of interest may be challenging. The sive prototype annotations
variable length of the output layer, reflect- • Contextualizing apprehension
ing the changing number of items of interest, • Super pixel stuff segmentation
makes it impractical to address this issue by • More than 200’000 images of the total
simply adding a fully connected layer on top 330’000 are labelled
of a conventional convolutional network. • 1.5 Mio object prototype
To overcome these challenges, a solution • 80 object assorts, the “COCO classes”,
involves identifying specific regions of interest which comprises “things” for which indi-
and applying a CNN algorithm to determine vidual instances may be promptly labelled
whether an object is located in the specified (human-being, automobile, any kind of
region. The initial approach of creating a furniture etc.,)
large number of areas could lead to computa- Let’s utilize the image from the previous
tional challenges. As a result, algorithms like section as input for an object detection pro-
R-CNN, YOLO, and others have been devel- cess, which encompasses two tasks [8]: object
oped to swiftly identify instances of interest. localization and image classification. Initially,
object localization draws bounding boxes
4. Proposed Method around one or more objects in an image, as
illustrated in Figure 4.2. Subsequently, image
The following arguments make the YOLO classification predicts the type or class of an
algorithm crucial: object by comparing it with a predefined
dataset and assigning a class label to the
1. Speed: This technique is able to predict
image. Consequently, the YOLO algorithm
objects in real time, which speeds up
is employed for both object localization and
detection.
image classification.
2. High accuracy: With minute background
error, the YOLO forecast approach yields • The advantages of this approach include:
decisive results. • Facilitating the correct identification of
3. Learning capability: Due to the algo- objects through speech.
rithm’s superior learning capabilities, it is
capable of distinguishing object represen-
tations and use them for detecting
algorithms consist of interconnected lay- given time, the camera will identify and label
ers. The hidden layers are found in the 5–6 objects, as illustrated in Figure 4.4.
front-end layer, which is addressed as the These steps offer an overview of the key
input layer, and the back-end layer, that procedures involved in running your Python
which is addressed as the output layer. program, starting from importing libraries
The term ‘deep’ indicates a network that to the continuous video processing loop, and
connects neurons across more than two concluding with the program’s termination.
layers. Each Hidden layer comprises neu- Keep in mind that executing the program
rons that are activated during the process. requires running it within a suitable Python
The network consumes large volumes development environment or IDE.
of input data, processing them through
several layers, and progressively learns 1. Import necessary libraries (cv2, imutils,
intricate characteristics of the data at numpy, pyttsx3).
each layer. This iterative learning process 2. Define a text-to-speech (TTS) function.
occurs at each stage of the layer, allowing • Initialize the TTS engine.
the network to understand progressively • Adjust the TTS engine’s properties.
complex features of the input data. • Use TTS to speak labels.
• Trained Data: In this work, a pre-defined 3. Load the YOLO model and class names.
dataset has been imported, consisting of a 4. Open a camera feed for video capture.
network trained on more than 50 images. 5. Start a loop to continuously process
This trained network excels in classify- frames from the camera.
ing photos into various object categories, • Resize the frame for processing.
encompassing a wide range, from animals to • Detect objects in the frame using
everyday objects like keyboards, mice, and YOLO.
various stationery items. The pre-trained • Filter and display the detected objects.
model utilized in this context is COCO • Use TTS to announce the labels of
(Common Objects in Context). Leverag- detected objects.
ing the OpenCV-contrib-python package, • Continue processing frames until the
the recognized objects are compared to a user presses ‘q’ to quit.
pre-trained database. The identified images 6. Release the video capture when done.
are then labeled through a tagging process,
translating the visual information into
text. Subsequently, the spelled-out items
are announced using the winsound pack-
age, and the text is converted into speech
through the pyttsx3 package.
Abstract: The construction sector, being one of the least digitized and major contributors in developed or
developing economies faces lots of challenges. We see an opportunity for reorienting the sector with cutting-
edge information and communication technologies (ICTs) integration. The construction sector challenges
namely poor productivity, lower efficiencies, safety, and sustainability can be addressed by ICT adaptation. The
research objective is to investigate the efficacy of utilizing ICTs as a technological intervention for the Indian
construction sector. The methodology adopted in this research study encompasses a hybrid approach, combin-
ing qualitative interviews of industry professionals and quantitative analytics of data gathered from question-
naire survey of construction projects. The findings of the questionnaire survey highlight that we can harness
emerging digital technology in various construction tasks to overcome challenges of the sector, and also identify
numerous potential benefits of utilizing ICTs. Additionally, the study also explores the challenges and barriers
faced by stakeholders in the adoption and implementation of cutting-edge ICTs within construction companies.
Keywords: Construction sector, cutting-edge ICTs, efficacy, productivity, efficiency, safety, cost-effectiveness
[email protected]; [email protected]
a
DOI: 10.1201/9781003606635-5
Investigating efficacy of emerging ICTs for the Indian construction sector 41
ICT adaptation in different construction extract meaningful insight from it, which ulti-
tasks proliferates the probability of success- mately will help in better decision-making.
ful completion of construction projects. In Doing so all stakeholders can benefit from it
this research work, we have identified various and coordination and communication will be
construction tasks where ICTs can be utilized, in a very efficient and effective manner. This
numerous advantages of using ICTs in con- sharing of information will curtail the time
struction companies, and different hindering required for data gathering, processing, and
factors coming in the way of ICT adaptation decision-making [8, 9]. Researchers have also
by the construction sector [4-6]. So, to carry highlighted that the utilization of wireless
out our research work we have conducted a networking omits the need for fellow work-
series of interviews with industry profession- ers, not to be present physically at the site,
als and recorded their valuable opinions and at the same moment. Web-based companies
suggestions. We have also prepared a ques- can get an edge in their operations [10]. Few
tionnaire, distributed it among the industry researchers have highlighted virtual modeling
expert, obtained their inputs, and lastly ana- for building design. It includes all relevant
lyzed the data obtained. The utilization of design information needed for every con-
emerging ICTs in Indian construction compa- struction phase during the project life cycle.
nies is a technological paradigm shift that has Any modification in the models gets updated,
the potential not only to change the way the and any design-related information may get
industry is working but also to enhance pro- extracted from this database, automatically
ductivity and efficiency, resulting in a higher [11, 12]. Some researchers are also talking AQ1:
Please
success rate of the projects. about the formation of a virtual team for col- provide
laborative purposes to improve communica- reference
tion, coordination and sharing of information citation
for refer-
2. Literature Review of ICT among stakeholders, teams, and enterprises. ences 13,
Adaptation in the Construction The ideation and creation of virtual teams for 14, 20,
21.
construction companies have been advised
Companies by the researchers [15]. ICTs may support
After the review process of the literature, we the virtual team for routine operations, but
have found that Some research papers high- unfortunately, construction enterprises are
lighted that the industry is using some basic much behind in adopting them.
ICTs like MS Office, AutoCAD, Wi-Fi, etc. [6, The present scenario of ICTs utilized in
7] for construction tasks. Many authors con- different construction company activities is
cluded that the utilization of ICTs can aid in discussed in this section. We have studied sev-
enhancing the present situation of construction eral conference papers, journal papers, blogs,
companies, apart from the fact that construc- and articles on different websites, discussing
tion companies are digitally divided, they need old and current trends of the different ICTs
to embrace ICTs to maximize the productivity for construction tasks or applications. It has
and efficiency of the construction enterprises. been noticed that many construction activities
Transfer of data and information among harnessed BIM, AutoCAD, mobile/web-based
the stakeholders are very slow and limited tools and technologies, virtual conferencing,
during and after the construction work as and information sharing systems, etc. [16,
many professionals are not interested in shar- 17]. Few articles, white papers, and bloggers
ing information and keeping it in their silos. have mentioned adaptation of emerging ICTs
So, with the advent of these newer commu- viz. drone, IoT, 5G, Cloud, Blockchain, and
nication technologies in the construction sec- AI/ML, etc. may be good options for different
tor, companies can get this precious data and construction activities/tasks. Deployment of
42 Innovations in Computational Intelligence: Trends and Technologies
interviews. In 223 questionnaires were dis- middle management and 3rd cadre is lower
tributed for data collection and we obtained management. The participation of the 1st
118 responses. cadre is 37% whereas 41% of respondents
A Likert scale of 3-points has been used for are playing their role under the 2nd cadre and
analysis of data, where the scale ranges from belonging in the middle management catego-
1 to 3. The scale of “Agree” was 3, “Disagree” ries. The lower management category share
was scored 2, and “Neutral” was scored 1, is 22%.
The statistical tool used for data analysis and
visual representation of this research study
was Microsoft Excel. 4. Results and Discussion
After the questionnaire survey of the con-
3.4. Types of construction companies struction companies, it has been noticed
that emerging ICTs viz. drone, IoT, and 5G
that contributed to the study
technology and cloud, etc. can be a power-
Figure 5.1 shows the types of construction ful digital solution for the construction sector
enterprises that participated in the research to improve productivity and efficiency with
study. The contribution of large-scale enter- the enhanced safety of the personnel. These
prises is 33% whereas 41% of enterprises are cutting-edge ICTs can be used for various
in medium-scale categories, collectively these construction tasks and it has the potential to
two categories make it nearly three-fourths change the ways construction tasks are per-
of the participating organization. Small-scale formed through conventional approaches.
and microscale enterprise shares are 15% and
11% respectively. 4.1. ICTs can be utilized to perform
different construction sector’s
3.5. Cadre-based classification tasks
(CBC) of respondents
4.1.1. Topographic mapping and land
Figure 5.2 shows the Cadre-based classifica-
tion of the respondents and this cadre depends survey
upon the type of role they performed in their Topographic mapping and land survey-
enterprises. There are three cadre of respond- ing using ICT, particularly drones have
ents that participated in the research study. become increasingly popular due to their
1st cadre is higher management, 2nd cadre is time-efficient, cost-effective and ability to fly
AQ2:
Please
provide
source
for all the Figure 5.1. Types of construction companies Figure 5.2. Cadre-based classification of
figures contributed to the study. respondents.
and tables
Source: Source:
AUTHOR'S SELF GENERATED
AUTHOR'S SELF GENERATED
44 Innovations in Computational Intelligence: Trends and Technologies
4.5. Hindering factors for ICT management support is ranked 2nd with 81%
adaptation in the indian of respondent’s opinion. 79% of Respondents
construction sector are in the notion that the training of employ-
ees to use ICTs is also a serious hurdle and
As depicted in Figure 5.5, the primary barrier ranked as 3rd. Fear of job security is also a
to ICT adoption in the construction sector prime concern for the respondents with 71%,
is the higher cost of purchasing and main- ranked as 4th. Government support for ICT
taining ICTs. 85% of respondents say that integration is at 5th place with 68% and lastly,
the biggest concern is the higher cost of ICT legal and regulatory compliance have the last
adoption. 81% of respondents feel manage- position in the matrix with 64%. Apart from
ment support is 2nd biggest concern. 79% of the above hindering factors respondents also
responders rate training on ICT as a serious highlighted the limited skill of personnel with
concern. 71% of respondents also think that low expertise in managing/handling software
job security is a major hurdle for ICT adapta- solutions and digital devices, data analysis,
tion in construction companies and concerns and its interpretation.
regarding legal and regulatory compliance
are shared by 64% of respondents. Addition-
4.7. Overall performance of
ally, according to 68% of respondents, govt.
support poses a significant obstacle to ICT construction companies after
adoption in the construction industry. ICT adaptation
The utilization of emerging ICTs for construc-
4.6. Ranking of hindering factors tion companies is in the nascent stage and
for ICT adaptation as per has the potential to enhance the overall per-
respondent’s opinion formance of the enterprises. The majority of
in the construction industry. Am J Sci Ind [20] Chien HJ, and Barthorpe S. The current state
Res. 2011. of information and communication technol-
[8] Information and communications technol- ogy usage by small and medium Taiwanese
ogy in construction. Designingbuildings. construction companies. J Inf Technol Con-
co.uk. Last edited March 30, 2022. Accessed str. 2014;15(5):75–85.
September 28, 2024. [21] Mesaros P, and Mandiak T. Impact of ICT on
[9] Paudyal G. Role of ICT in construction. In: performance of construction companies in
National Students Conference on Informa- Slovakia. IOP Conf Ser Mater Sci Eng. 2017.
tion Technology (NaSCoIT). Nepal; 2016. [22] Griffis FH, Hogan DB, and Li W. An analy-
[10] Orihuelaa P, Orihuelab J, and Pachec S. sis of the impact of using three-dimensional
Information and communications technol- computer models in the management of con-
ogy in construction: A proposal for pro- struction. Constr Ind Inst (CII) Austin, TX,
duction control. In: Creative Construction USA. 1995;Research Report 106–11.
Conference 2016, CCC 2016; 2017:25–28. [23] Kang Y, O’Brien WJ, Thomas S, and Chap-
[11] Sharma DK. Digital revolution 4.0: Informa- man RE. Impact of information technologies
tion and communication technology (ICT) on performance: Cross-study comparison. J
in construction industry. JK Lakshmipat Constr Eng Manag. 2008;134:852–863.
University, Jaipur; July 16, 2020. [24] Owolabi OSB, and Olufemi ODK. Effect of
[12] Hosseini MR, Chileshe N, Zuo J, and the use of ICT in the Nigerian construction
Baroudi B. Approaches of implementing ICT industry. Int J Eng Sci. 2018;7(5):71–76.
technologies within the construction indus- [25] Mu’azu DA. The role of the professional
try. Univ South Aust. 2013. builder in the Nigerian construction industry.
[13] Chinowsky PS, and Rojas E. A guide to suc- ATBU J Environ Technol. 2015;1(1):29–31.
cessful implementation: A report on con- [26] Yisa SO. An investigation into the use of
struction industry institute. Univ Texas ICT in the Nigerian construction industry.
Austin, Constr Ind Inst. 2012. Unpublished HND Project, Department of
[14] Brandon PS, Kocaturk T, and Foundation R. Building Technology, The Federal Polytech-
Virtual futures for design, construction and nic, Ado Ekiti. 2014.
procurement. Malden, Ma: Blackwell Pub; [27] Oladapo AA. The impact of ICT on pro-
2018. fessional practice in the Nigerian construc-
[15] Zhang Y, Gregory M, and Shi Y. Global engi- tion industry. Electron J Inf Syst Dev Ctries.
neering networks (Gen): Drivers, evolution, 2016;24(2):1–19.
configuration, performance and key patterns. [28] Leverage on ICT in construction industry.
J Manuf Technol Manag. 2008;19:299-314. New Strait Times. May 13, 2018.
[16] Chen C, and Messner JI. A recommended [29] Al-shammary S, and Ali AA. ICT hindering
practices system for a global virtual engi- factors applied in Jordan construction pro-
neering team. Archit Eng Des Manag. jects. Civ Eng Archit. 2017;5(3):83–88.
2014;6:207–221. [30] Hassan A, and Afrah MHK. Identification
[17] Adwan EJ, and Al-Soufi A. A review of ICT and analysis of hindering factors of ICT
technology in construction. Int J Manag Inf adoption in project management in Iraq. J
Technol. 2016;8(3/4). Univ Babylon Eng Sci. 2019;27(3).
[18] Sarshar M, and Isikdag U. A survey of ICT [31] Shah K, Soni N, and Shah Z. Scrutinizing
use in the Turkish construction industry. Eng attributes influencing role of information
Constr Archit Manag. 2015;11(4):238-247. communication technology in building con-
[19] Mutesi N. Application of ICT in the con- struction. Int Res J Eng Technol. 2020;7(3).
struction industry in Kampala. In: Advances [32] Vasista TG, and Abone A. Benefits, barri-
in Engineering and Technology: Proceedings ers and applications of information com-
of the Second International Conference on munication technology in construction
Advances in Engineering and Technology, industry: A contemporary study. Int J Eng.
Kampala. 2013. 2016;105:933–939.
6 AgriTech: Empowering agriculture
through integrated technology
Pankaj Kunekara, Anushka Popalghatb, Onkar Borudec, Vishal
Gavalid, Dnyanesh Gholape, and Sarvesh Hadolef
Department of Information Technology Vishwakarma Institute of Technology, Pune, India
Abstract: Agriculture plays a pivotal role in ensuring global food security and economic stability. In an era of
rapidly advancing technology, harnessing the power of data and innovation is vital to address the multifaceted
challenges faced by farmers. AgriTech is a comprehensive agricultural technology system designed to empower
farmers at every farming stage. Leveraging a range of technologies, including Full Stack Web Development,
Ethereum, Alan AI and Various Machine learning algorithms, this multifaceted solution offers features such as
nearby soil testing laboratory location, crop recommendations, gamified plant growth mentoring, plant disease
detection, crop price prediction, expert consultations, an integrated e-commerce marketplace, and Realtime
weather monitoring with location-based alerts. This paper provides an overview of AgriTech’s architecture,
emphasizing its technology integration, machine learning applications, and potential impact on modern farm-
ing practices, including enhanced productivity, sustainability, and resource efficiency. AgriTech represents a
pioneering approach to digital agriculture, bridging the gap between traditional farming and the digital era.
Keywords: Agriculture technology, precision farming, crop price prediction, soil testing, disease detection, crop
recommendation
a
[email protected]; [email protected]; [email protected]; dvishal.gavali21@vit.
edu; [email protected]; [email protected]
DOI: 10.1201/9781003606635-6
AgriTech: Empowering agriculture through integrated technology 51
advancement but also a testament to the syn- field which encompasses a wide range of tech-
ergy between human ingenuity and the relent- nologies, including precision farming, robot-
less pursuit of food security and ecological ics, artificial intelligence, and biotechnology,
harmony in an ever-changing world. which have already begun transforming the
agricultural landscape [8]. Discuss the impact
of Internet of Things on farming, including
2. Literature Review using sensors for soil, water, light, humidity,
The authors provide a comprehensive review and temperature management [9]. The paper
of recent advances in image-processing tech- proposes a Blockchain-based framework for
niques for automating leaf pests and disease data quality management in the context of
recognition. They discuss the various stages COVID-19, aiming to ensure a high level of
involved in the image-processing pipeline, data trust, security, and privacy. It explores
from image acquisition to feature extrac- the use of innovative technologies such as
tion and classification [1]. The study Intro- Blockchain, Artificial Intelligence, and Big
duces a framework for crop price forecasting Data in tracking infectious disease outbreaks
in emerging economies, emphasizing the and improving reporting accuracy [10].
importance of accurate price predictions for
farmers and policymakers. The proposed 3. Methodology
framework includes data quality assessment,
In response to the evolving agricultural land-
feature selection, and modeling, offering
scape, the AgriTech project emerges as a com-
advantages such as improved data quality
prehensive agricultural technology platform.
and feature selection techniques for enhanced
This support ranges from initial crop selec-
accuracy [2]. The system’s two-tier architec-
tion to the monitoring of crop growth and
ture and various sensors offer advantages like
culminates in facilitating marketing and sales.
real-time monitoring and portability, while
The platform leverages an amalgamation of
challenges include data quality and real-time
cutting-edge technologies and data-driven
performance [3]. This research Focuses on
methodologies to provide a holistic and User-
online price forecasting for cryptocurrencies
friendly agricultural support system.
like Bitcoin, Ethereum, and Ripple, utilizing
Frontend technologies and functionalities:
artificial intelligence techniques. The model’s
Frontend stack: The front of the AgriTech
advantages include periodic predictions and
platform is built using React, a renowned
customization options.[4].
JavaScript library for developing user inter-
The authors address crop price predic-
faces. This choice of technology ensures a
tion in developing nations, using decision tree
User-friendly and interactive experience.
regression techniques [5]. Authors Delves into
User interface: The frontend features a
crop yield and price forecasting using machine
user-friendly map-based interface, designed
learning, employing the decision tree algo-
to enhance accessibility and usability for
rithm. This research enhances crop yield pre-
farmers.
diction based on weather and price trends [6].
Features:
The authors introduce a neighborhood-
based strategy to optimize parameters and
obtain maximum yield, expanding knowl- 3.1. Soil testing labs map
edge through population exploration. The Farmers can easily locate nearby soil testing
paper presents a method to increase soil fertil- laboratories, simplifying the crucial process
ity performance by providing nutrient recom- of soil quality assessment. This feature facili-
mendations for optimal crop development [7]. tates data-driven decisions about crop selec-
The study examines the Modern agricultural tion and soil management.
52 Innovations in Computational Intelligence: Trends and Technologies
3.4. Coin-based e-commerce
marketplace
AgriTech implements a coin-based reward
system during the plant growth mentoring
process. These earned coins can be redeemed
within an integrated e-commerce market-
Figure 6.2. Heatmap for crop recommendation. place, fostering user engagement and partici-
Source:AUTHOR'S SELF GENERATED
pation.[16,17]
evaluation of machine learning models for impact on modern farming practices. The
automated disease detection. results from table 6.1 and table 6.2 can be sum-
The [Crop Price Prediction Dataset] -marized as follows:
(https://github.com/posi2/Crop-Price-Pre- 1. Improved crop recommendations:
diction) offers historical data on crop prices, Through the utilization of the SVM with
market trends, and relevant factors, serv- an RBF kernel, AgriTech successfully pro-
ing as a foundation for crop price forecast- vided personalized crop recommenda-
ing models that benefit both farmers and tions to farmers.
policymakers. 2. Efficient disease detection: The implemen-
Meanwhile, the [Crop Growth Stage tation of the MobileNetV2 deep learning
Dataset] (https://github.com/jahaniam/Crop- model for plant disease detection exhib-
GrowthStage) provides valuable insights into ited remarkable accuracy in identifying
the growth stages of different crops, aiding and classifying various plant diseases
precision agriculture and crop management from images of leaves. This functionality
research. offered rapid disease diagnosis, allowing
These datasets collectively empower agri- farmers to take timely measures for dis-
cultural advancements, from disease identi- ease management and crop protection.
fication to crop price prediction and growth 3. Enhanced user engagement: The coin-
monitoring. based reward system within the integrated
e-commerce marketplace effectively
5. Results and Discussion increased user engagement. Farmers
actively participated in the plant growth
The AgriTech platform has undergone rigor- mentoring process to earn coins, which
ous testing and real-world implementation, could be redeemed for agricultural prod-
AQ3: resulting in several key findings and outcomes ucts and tools.
Cita- that demonstrate its efficacy and potential 4. Real-time weather insights: AgriTech’s
tions for
both the real-time weather monitoring and alerts
tables are Table 6.1. Algorithm and accuracy provide farmers with essential weather
missing in
the text, Algorithm Accuracy Functionality data, including temperature, humid-
please ity, and rainfall. Farmers reported that
provide SVM + RBF 98.72% Crop
the Kernel Recommendation these insights significantly contributed
appro- to informed decision-making regarding
priate MobileNetV2 98.9% Disease Prediction
CITATION
citations
ADDED
planting and harvesting, resulting in more
Random Forest 97.1% Crop Price efficient resource utilization and crop
AQ4: Regression Prediction management.
Please
provide
Source:
AUTHOR'S SELF GENERATED 5. Secure and transparent transactions: The
source integration of the Ethereum blockchain
for all the
Tables Table 6.2. Comparison with previous work into AgriTech’s e-commerce marketplace
ensured secure and transparent transac-
Algorithm Previous Current tions. Users appreciated the added layer
Accuracy Accuracy
of trust and transparency in their mar-
SVM 98.2% [14] 98.72% ketplace interactions, which is especially
CNN 95.05% [20] 98.9% critical in the agricultural sector.
6. Improved communication: Agora SDK’s
Random Forest 98% [21] 98%
video conferencing capabilities facili-
Regression
tated real-time video calls and chat func-
Source: tionality, enhancing communication and
AUTHOR'S SELF GENERATED
AgriTech: Empowering agriculture through integrated technology 57
support for farmers. This improved com- India’s Livelihoods. 2023:107. Terborgh J.
munication enabled farmers to seek expert Preservation of natural diversity. BioScience.
consultations and collaborate effectively 2009;24:715–22.
with peers. [3] Reyana A, Kautish S, Karthik PS, Al-Baltah
7. Conversational AI: The integration of IA, Jasser MB, and Mohamed AW. Acceler-
ating crop yield: multisensor data fusion and
Alan AI for voice commands enhanced
machine learning for agriculture text classifi-
the platform’s accessibility, allowing users
cation. IEEE Access. 2023;11:20795–20805.
to interact with AgriTech using natural [4] Sundaram P, and Suparna K. Crop recom-
language. This feature proved particu- mendation system using machine learning. J
larly useful for users who may have lim- Eng Sci. 2023;14(09).
ited typing abilities or prefer voice-based [5] Sharma P, Dadheech P, and Senthil ASK. AI-
interactions. enabled crop recommendation system based
on soil and weather patterns. In: Artificial
Intelligence Tools and Technologies for
6. Conclusion Smart Farming and Agriculture Practices.
In conclusion, the AgriTech project represents IGI Global; 2023:184–199.
a pioneering and comprehensive agricultural [6] Baishya DR. International Journal for
technology platform that bridges the gap Research in Applied Science and Engineer-
ing Technology. 2020;8(IV).
between traditional farming practices and
[7] Ahmed U, Lin JCW, Srivastava G, and Dje-
the digital age. AgriTech empowers farm-
nouri Y. A nutrient recommendation system
ers at every stage of the agricultural process, for soil fertilization based on evolution-
from crop selection to growth management, ary computation. Comput Electron Agric.
disease detection, and price forecasting. The 2021;189:106407.
platform’s machine learning capabilities pro- [8] Green S. Reshaping the future of agriculture
vide personalized insights and data-driven through agri-tech innovations. Int Multidis-
recommendations, fostering enhanced pro- cip J Sci Technol Bus. 2023;2(02):1–4.
ductivity, sustainability, and resource effi- [9] Rathod ML, Shivaputra A, Umadevi H,
ciency. The implementation of MobileNetV2 Nagamani K, and Periyasamy S. Cloud com-
for plant disease detection and the integration puting and networking for SmartFarm Agr-
of the Agora SDK for real-time video commu- iTech. J Nanomater. 2022.
nication further demonstrate the platform’s [10] Ezzine I, and Benhlima L. Technology against
COVID-19: a blockchain-based framework
commitment to offering holistic support to
for data quality. In: 2020 6th IEEE Con-
farmers. As digital agriculture continues to
gress on Information Science and Technol-
evolve, AgriTech serves as a testament to the ogy (CiSt). IEEE; 2021:84–89.
potential of technology to revolutionize and [11] Yu J, Yin H, Xia X, Chen T, Li J, and Huang
improve farming practices, making a signifi- Z. Self-supervised learning for recommender
AQ5:
cant contribution to the well-being of farm- systems: a survey. IEEE Trans Knowl Data
Refer- ing communities worldwide. Eng. 2023.
ences are [12] Bandara P, Weerasooriya T, Ruchirawya T,
missing
Nanayakkara W, Dimantha M, and Paba-
cita-
tions in
References sara M. Crop recommendation system. Int J
the text. [1] Ngugi LC, Abelwahab M, and Abo-Zahhad Comput Appl. 2020;975:8887.
Please
ensure
M. Recent advances in image processing [13] Iqbal M, Kumar V, and Sharma VK. Krishi
that all techniques for automated leaf pest and dis- Portal: web-based farmer help assistance. Int
references ease recognition: a review. Inf Process Agric. J Adv Sci Technol. 2007;29:4783–4786.
are cited
2021;8(1):27–51. [14] Bakthavatchalam K, Karthik B, Thiru-
and in
sequential [2] Kanitkar A, and Wadekar I. Digital Agri- vengadam V, Muthal S, Jose D, Kotecha
order. culture: Is this the Future of ‘New’. State of K, and Varadarajan V. IoT framework for
58 Innovations in Computational Intelligence: Trends and Technologies
Abstract: The pandemic, heatwave brought life to a standstill, if not for older but for young ones and students
it brings things to a standstill, presenting a significant obstacle to humanity. However, online learning offers
flexibility, interaction, and cooperation. This article aims to compare and contrast the results of student surveys
and explore the differences between live online instruction and conventional classroom instruction, as well
as the future of education in universities and colleges. The study was conducted at several universities in the
Mathura region of Uttar Pradesh, India, with 150 participants selected from those enrolled in online and offline
university courses, aged between 16 and 40 years. The students were then asked to complete a detailed question-
naire. 58.95% of students mostly agreed with the question in the survey, while 36.69% disagreed. As per the
survey analysis, online learning seems to be more effective. It is concluded that traditional classroom teaching
has advantages for students, saves them time, and improves their academic performance in the current environ-
ment of the COVID-19 epidemic. Higher education institutions must collaborate to make these initiatives effec-
tive, especially by decentralizing educational teleconferences and granting access to surrounding institutions to
ensure that all students have reliable internet connectivity.
learning readiness Estira (2020). Another and Solomon (2021). Atika Qazi et al.2020
state university survey found that students are Qazi et al. (2020) 320 students participated
ready for online lessons, but renting comput- in study about learning in different modes
ers and the Internet in cafes is a burden Yra, during the COVID-19 pandemic. The study
Castillo, Bautista, Camayang, and Camayang concluded that online education is the only
(2020). This study assesses students’ internet solution and effective way Qazi et al. (2020).
connection and learning devices for online or The vast majority (70.4%) of the survey
flexible learning. The study will show school respondents said they would advise use of
administrators how students and staff will e-learning material. Online learning scores
modify teaching-learning procedures. The 4/5 for effectiveness, while offline learning
result will be used to institutionalize flexible scores 3/5 Yang et al. (2022).
learning in the future.
3. Material and Method
2. Literature Review
Favale et al. 2020 Favale, Soro, Trevisan, 3.1. Study design
Drago, and Mellia (2020), The infrastructure The online survey is used to collect data and
for the internet is under pressure as a result respondents’ responses. A questionnaire was
of this sudden spike in usage. E-learning designed to capture respondents’ opinions.
tools like Microsoft Teams and Zoom were The purpose of this study is to see the mood of
quickly adopted. Students are more aware of students at the university level about learning
online learning. E-learning, however, may be techniques adopted by their higher education
extremely challenging for teachers Favale et institutions during the pandemic covid-19 in
al. (2020) who not habitual of making pow- Braj area of Uttar Pradesh which constitutes
erpoint ppts. Agra, Mathura, and some parts of Aligarh.
Padmalini Singh et al. 2021 Singh et al.
(2021), conducted a study at India, Indo- Table 7.1. Participants distribution on the basis
nesia, and Malaysia on learning with 100 of Age
respondents. they compare online and offline
Age Frequency Percentage AQ4:
learning. their study shows traditional teach- Please
ing is more effective than online teaching 16–20 40 26 provide
21–25 46 31 in-text
Singh et al. (2021). Elyassi et al. 2021 Elyassi citation
et al. (2021), various changes in the psychic 26–30 25 16.6 for Tables
of students due to lockdown and pandemics 31–35 19 13
1 to 3.
normal in the post-COVID-19 era, we need Table 7.2. Participants distribution on the basis
to return to traditional classroom teach- of Gender
ing Dalai, Dey, Chatterjee, Chakravorti, and Gender Frequency Percentage
Bhattacharya (2014). Sheba et al. 2021 sur- Female 85 56.6
veyed 450 students for effectiveness of online
Male 65 43.3
study material. students found the mate-
rial was effective when used with anima- Total 150 100
tions, PPT, and visuals Darius, Gundabattini, Source:
AUTHOR'S SELF GENERATED
62 Innovations in Computational Intelligence: Trends and Technologies
the effectiveness of new techniques adopted internet struggling province in the philip-
by various higher educational institutes and pines. Indian Journal of Science and Tech-
government guidelines during COVID-19 for nology, 12 (10), 1–4.
continued learning. The study was conducted [8] Chase, T. J., Julius, A., Chandan, J. S., Powell,
in the Indian state of Uttar Pradesh in the Brij E., Hall, C. S., Phillips, B. L., and Fernando,
B. (2018a). Mobile learning in medicine: an
region. A total of 150 participants partici-
evaluation of attitudes and behaviours of
pated and responded to questions. We con-
medical students. BMC medical education,
clude that in our study online education and 18 (1), 1–8.
techniques are effective and most students are [9] Chase, T. J., Julius, A., Chandan, J. S., Powell,
satisfied with it. E., Hall, C. S., Phillips, B. L., . . . Fernando, B.
(2018b). Mobile learning in medicine: an eval-
uation of attitudes and behaviours of medical
5. Conclusion students. BMC medical education, 18 (1), 1–8.
We can conclude based on the responses col- [10] Chung, E., Subramaniam, G., and Dass, L.
lected, upon analyzing the responses, online C. (2020). Online learning readiness among
learning could be adopted. Online learning university students in malaysia amidst covid-
19. Asian Journal of University Education,
could be more effective if devices and inter-
16 (2), 45–58.
net costs could be subsidized and reach rural
[11] Cleofas, J. V., and Rocha, I. C. N. (2021).
areas. Demographic, gadget and internet profiles
as determinants of disease and consequence
related covid-19 anxiety among filipino col-
References lege students. Education and Information
[1] Aboagye, E., Yawson, J. A., and Appiah, K. Technologies, 26 (6), 6771–6786.
N. (2021). Covid-19 and e-learning: The [12] Dalai, S., Dey, D., Chatterjee, B., Chakra-
challenges of students in tertiary institutions. vorti, S., and Bhattacharya, K. (2014). Cross-
Social Education Research, 1–8. spectrum analysis-based scheme for multiple
[2] Ahmed, S. S., Khan, E., Faisal, M., and Khan, power quality disturbance sensing device.
S. (2017). The potential and challenges of IEEE Sensors Journal, 15 (7), 3989–3997.
moocs in pakistan: a perspective of students [13] Darius, P. S. H., Gundabattini, E., and Solo-
and faculty. Asian Association of Open Uni- mon, D. G. (2021). A survey on the effective-
versities Journal, 12 (1), 94–105. ness of online teaching–learning methods for
[3] Akbar, M. A., Rashid, M. M., et al. (2018). university and college students. Journal of
Technology based learning system in inter- The Institution of Engineers (India): Series
net of things (iot) education. In 2018 7th B, 102 (6), 1325–1334.
international conference on computer and [14] Elyassi, H., et al. (2021). Economics of the
communication engineering (iccce) (pp. financial crisis: any lessons for the pandemic
192–197). downturn and beyond? Contemporary Eco-
[4] Alexander, S. (2001). E-learning develop- nomics, 15 (1), 100–121.
ments and experiences. Education+ Train- [15] Estira, K. L. A. (2020). Online distance
ing, 43 (4/5), 240–248. learning readiness of business administra-
[5] Apuke, O. D., and Iyendo, T. O. (2018). Uni- tion students in one state university in the
versity students’ usage of the internet resources philippines. Journal of Critical Reviews, 7
for research and learning: forms of access and (12), 826–832.
perceptions of utility. Heliyon, 4 (12). [16] Fabito, B. S., Trillanes, A. O., and Sarm-
[6] Bell, B. S., and Federman, J. E. (2013). iento, J. R. (2020). Barriers and challenges
E-learning in postsecondary education. The of computing students in an online learn-
future of children, 165–185. ing environment: Insights from one private
[7] Casillano, N. F. B. (2019). Challenges of university in the philippines. arXiv preprint
implementing an e-learning platform in an arXiv:2012.02121.
64 Innovations in Computational Intelligence: Trends and Technologies
[17] Favale, T., Soro, F., Trevisan, M., Drago, I., Conventional to online education during
and Mellia, M. (2020). Campus traffic and covid-19 pandemic: Do develop and under-
e-learning during covid-19 pandemic. Com- developed nations cope alike. Children and
puter networks, 176, 107290. Youth Services Review, 119, 105582.
[18] Gedera, D., Williams, P. J., and Wright, N. [26] Romeo, G. (2006). Engage, empower, enable:
(2013). An analysis of moodle in facilitating Developing a shared vision for technology in
asynchronous activities in a fully online uni- education. Engaged learning with emerging
versity course. International Journal of Sci- technologies, 149–175.
ence and Applied Information Technology [27] Serhan, D. (2020). Transitioning from face-
(IJSAIT), 2 (2), 6–10. to-face to remote learning: Students’ atti-
[19] Gezgin, D. M. (2017). Exploring the influ- tudes and perceptions of using zoom during
ence of the patterns of mobile internet use covid-19 pandemic. International Journal of
on university students’nomophobia levels. Technology in Education and Science, 4 (4),
European Journal of Education Studies. 335–342.
[20] Hossain, M. A., and Rahman, M. H. (2017). [28] Shafaati, A., Valizade, R., Rahimi, A., and
Comparative study of internet usage among Panahi, A. (2022). The role of smart urban
university students: A study of the university develop- ment in the development of the
of dhaka, bangladesh. European Scientific dilapidated areas of tabriz city: A case study
Journal, 13 (34), 134–150. of 8th district of tabriz. Geography and
[21] Jin, W., and Junio-Sabio, C. (2018). Poten- Environmental Planning, 33 (1), 113–132.
tial use of mobile devices in selected public [29] Singh, P., Sinha, R., Koay, W. L., Teoh, K.
senior high schools in the city of manila phil- B., Nayak, P., Lim, C. H., . . . Aryani, D. N.
ippines. International Journal of Learning, (2021). A comparative study on effective-
Teaching and Educational Research, 17 (4), ness of online and offline learning in higher
102–114. education. International Journal of Tourism
[22] Lee, K. T. (2006). Creating ict-enriched and Hospitality in Asia Pasific (IJTHAP), 4
learner-centred environments: Myths, gaps (3), 102– 114.
and challenges. Engaged learning with [30] Tarimo, R., and Kavishe, G. (2017). Inter-
emerging technologies, 203–223. net access and usage by secondary school
[23] Lorenzo, A. R. (2017). Comparative study students in morogoro municipality, tanza-
on the performance of bachelor of secondary nia. International Journal of Education and
education (bse) students in educational tech- Development using ICT, 13 (2).
nology using blended learning strategy and [31] Yang, S., Tan, C., Madsen, D. Ø., Xiang, H.,
traditional face-to-face instruction. Turkish Li, Y., Khan, I., and Choi, B. J. (2022). Com-
Online Journal of Educational Technology- parative analysis of routing schemes based
TOJET, 16 (3), 36–46. on machine learning. Mobile Information
[24] Muthuprasad, T., Aiswarya, S., Aditya, K. S., Systems, 2022.
and Jha, G. K. (2021). Students’ perception [32] Yra, J. F. P., Castillo, R., Bautista, R. G.,
and preference for online education in india Camayang, J. G., and Camayang, A. G. G.
during covid-19 pandemic. Social sciences (2020). Students’ online learning readiness
and humanities open, 3 (1), 100101. and internet connectivity: Bases for the cus-
[25] Qazi, A., Naseer, K., Qazi, J., AlSalman, H., tomization of qsu e-aral. American Journal
Naseem, U., Yang, S., . . . Gumaei, A. (2020). of Educational Research, 8 (11), 878–884.
8 Strengthening UAV network security:
Advanced authentication-based
intrusion detection systems
Altaf C1,a, Shanila Mahreen2,b, C Atheeq3,c, and Shaista Khanam2,d
1
Department of ECE, Lords Institute of Engineering and Technical, Hyderabad, India
2
Department of ECE, Nawab Shah Alam College of Engineering and Technical, Hyderabad, India
3
Department of CSE, GITAM University, Hyderabad, India
Abstract: This article delves into contemporary Intrusion Detection Systems (IDS) designed for Unmanned
Aerial Vehicle (UAV) networks, emphasizing authentication-based approaches. With UAVs playing pivotal roles
across sectors, securing their communications is paramount. Traditional IDS often falls short in UAV scenarios,
necessitating innovative strategies. The proposed IDS employs advanced authentication mechanisms, including
cryptography, biometrics, and dynamic key generation. Cryptographic techniques ensure secure key exchange,
while biometric authentication ties UAV activities to verified identities. Dynamic key generation, bolstered by
chaotic maps, enhances security, making it computationally challenging for attackers. Anomaly detection and
machine learning contribute to the IDS’s adaptability, distinguishing normal and malicious UAV behavior.
Simulated evaluations using tools like ns3 quantify system performance, with metrics like Packet Delivery
Ratio, Delay, and Overhead providing insights. This authentication-based IDS presents a robust solution for
safeguarding UAV network integrity, addressing unique security challenges in diverse operational scenarios.
DOI: 10.1201/9781003606635-8
66 Innovations in Computational Intelligence: Trends and Technologies
infrastructure inspection and maintenance, sensitive information but also in ensuring the
UAVs offer a safer alternative to manual uninterrupted and reliable operation of UAVs
inspection, particularly in complex and ele- across various applications. UAVs heavily rely
vated structures [3]. They can capture high- on seamless communication for tasks such as
resolution images and data, facilitating the navigation, data acquisition, and command
early detection of potential issues and reduc- execution. Any compromise in communica-
ing the risks associated with traditional tion integrity can lead to severe consequences,
inspection methods. The versatility of UAV including loss of control, unauthorized access
networks is underscored by their adaptabil- to mission-critical data, and potential threats
ity to diverse environments and tasks. Their to public safety.
compact size, agility, and ability to operate One primary consideration in securing
in challenging terrains make them indispen- UAV communication is the protection of
sable tools in scenarios where conventional mission data. In applications like surveil-
methods may fall short. However, this tech- lance, infrastructure inspection, or disaster
nological revolution is not without its chal- response, the data collected by UAVs often
lenges, particularly concerning the security contains sensitive and confidential informa-
and integrity of the communication systems tion [6]. Unauthorized interception or tam-
within UAV networks. pering of this data not only compromises
As UAVs rely heavily on wireless com- the mission’s objectives but can also lead to
munication for control, navigation, and data privacy breaches and misuse of information.
transfer, ensuring the confidentiality, integrity, Therefore, robust security measures are essen-
and authenticity of the transmitted informa- tial to safeguard the confidentiality and integ-
tion is paramount. Unauthorized access, data rity of the data exchanged between UAVs and
tampering, and interception pose significant ground stations.
threats to the secure operation of UAV net- Moreover, securing communication is
works [4]. Therefore, implementing robust integral to maintaining control over UAV
security measures, including Intrusion Detec- operations. In scenarios where UAVs operate
tion Systems (IDS), becomes imperative to autonomously or semi-autonomously, secure
safeguard these networks against evolving communication ensures that commands from
cyber threats. ground control stations reach the UAV accu-
In the face of these challenges, the inte- rately [7]. Any interference or manipulation
gration of authentication-based IDS emerges in these commands could result in the UAV
as a promising solution. By implementing deviating from its intended path or executing
advanced authentication mechanisms, such as unintended actions, posing risks to both the
dynamic key generation with chaotic maps, UAV and its surroundings. Security breaches
UAV networks can enhance their resistance in communication can also open avenues for
against malicious attacks. This article delves malicious actors to take unauthorized control
into the intricacies of these authentication- of UAVs, leading to potential safety hazards
based approaches, exploring their potential and misuse of the technology [8].
to fortify the security posture of UAV net- Beyond the immediate operational con-
works and ensure the continued advancement cerns, the importance of secure communica-
of this transformative technology [5]. tion extends to the public’s perception and
Securing communication in Unmanned regulatory compliance. As UAVs become
Aerial Vehicle (UAV) operations is of para- more integrated into civilian airspace and
mount importance, given the critical nature daily life, ensuring their secure operation is
of the tasks these aerial platforms undertake. crucial to building public trust and meeting
The significance lies not only in protecting regulatory standards. The potential for UAVs
Strengthening UAV network security: Advanced authentication-based intrusion detection systems 67
and processing unique biometric data, specifi- Biometric authentication, a key element in
cally fingerprints, to create templates stored UAV network security, establishes a robust
in a secure database. During UAV opera- connection between UAV activities and veri-
tion initiation, real-time fingerprint data is fied identities. The algorithm initiates by
captured, matched against stored templates, collecting a set of n fingerprint data points
and upon successful authentication, access (Fingerprint = {P1, P2, ..., Pn}). These data are
authorization is granted to the identified then processed to create a biometric template
operator, ensuring only authorized individu- (Template = f(Fingerprint)), securely stored
als control the UAV. This robust authentica- in a database (Database = {Template1, Tem-
tion mechanism links UAV activities with plate2, ..., Templatem}). During UAV operation,
verified operator identities, enhancing overall the operator’s biometric data (Captured-
network security. Data = f(OperatorFingerprint)) is captured
On the other hand, the Dynamic Key and matched against stored templates. If
Generation with Chaotic Maps Algorithm the match is successful, access is authorized,
focuses on fortifying UAV communications ensuring that only authorized operators con-
through the dynamic generation of crypto- trol the UAV. This process enhances overall
graphic keys. Utilizing chaotic maps with network security by linking UAV activities to
unpredictable iterations based on initial verified operator identities.
conditions, the algorithm generates crypto- The Dynamic Key Generation with Cha-
graphic keys that are dynamically updated. otic Maps Algorithm fortifies UAV commu-
These keys are securely distributed across nications through the dynamic generation
the UAV network, serving as the foundation of cryptographic keys. The algorithm begins
for encryption and decryption processes. by setting initial conditions for a chaotic
Chaotic map synchronization ensures con- map (InitialConditions = {IC1, IC2, ..., ICk}).
sistency among communicating entities, and Through iterations, a sequence is generated
a comprehensive security analysis evaluates (xn+1 = f(xn, InitialConditions)), and crypto-
the algorithm’s effectiveness in safeguard- graphic keys (Kn = g(xn)) are derived. The keys
ing UAV communications. This dynamic key are dynamically updated for subsequent iter-
generation approach adds an extra layer of ations (Kn+1 = h(Kn)) and securely distributed
security, mitigating the risk of unauthorized across the UAV network (KeyDistribution =
access in UAV networks. {K1, K2, ..., Km}). Encrypted data (Encrypted-
Cryptography and key exchange play Data = E(OriginalData, Kn)) utilizes the key
a pivotal role in securing communications for encryption/decryption. Chaotic map
within Unmanned Aerial Vehicle (UAV) net- synchronization (Synchronization = i(Map1,
works, where sensitive information transmis- Map2)) ensures consistency, and security
sion demands confidentiality and integrity. In analysis (SecurityAnalysis = j(Data, KeyDis-
UAV networks, cryptographic mechanisms tribution)) evaluates the algorithm’s efficacy
utilize mathematical algorithms to encode in safeguarding UAV communications. This
information, thwarting unauthorized access, dynamic key generation approach enhances
data tampering, and eavesdropping. Key security, mitigating the risk of unauthorized
exchange, a critical component of secure com- access in UAV networks.
munication, involves sharing cryptographic
keys between parties to facilitate encryption
and decryption. This process ensures data 4. Results and Discussions
integrity, a crucial aspect in UAV networks, Network Simulator 3 (ns-3) played a piv-
where robust key exchange protocols are otal role as a powerful tool in simulat-
imperative. ing and evaluating the proposed Chaotic
Strengthening UAV network security: Advanced authentication-based intrusion detection systems 71
Abstract: There are various security issues, challenges, and threats in wireless networks. In this paper, we review
recent work in this field that primarily addresses such issues and challenges. Different researchers have taken
various approaches to justify their research based on different parameters. Methods such as enhanced packet
delivery, residual energy, and link quality, on-demand link and energy aware dynamic multipath (O-LEADM),
Rate aware congestion control (RACC), Quadrature Amplitude Modulation (QAM), Quadrature Phase Shift
Keying (QPSK), Network function virtualization (NFV), Software-defined network (SDN), hidden Markov
model (HMM), IDS, scalable and energy-efficient cluster-based anomaly detection (SEECAD) etc. are used to
identify jamming signal problems in fuzzy logic. The article discusses various issues and approaches covered by
many researchers in last few years paying close attention to wireless network-related topics.
DOI: 10.1201/9781003606635-9
Comparative analysis of wireless routing protocols for security threat—A review 75
The process of a Black Hole Attack follows this research which inspire the researchers
these distinct stages mostly. in this field to propose methods to detect
Advertisement Phase: The malicious node the basic behavior of black-hole nodes and
claims that it has the shortest route for the the route request (RREQ) and RREP which
R-Req by the source and it generate the Route is mostly used by attackers to neutralize the
request reply (RREP) and send it to the target network. O-LEADM [2] is a method used to
node. detect black hole in MANET. It is essential
Attraction Stage: Legitimate nodes, relying to provide safe and secure communication in
on the falsified routing details, unwittingly wireless network, prevent from the network
direct their data packets toward the mali- damage and harm in small and large scale.
cious node. The purpose of this study is to showcase the
Packet Interception: Upon receiving these research conducted in this field and empha-
packets, the malicious node abstains from size the approaches taken to get around secu-
forwarding them to their rightful destina- rity vulnerabilities.
tions, opting to discard or consume them.
Impact and Consequences: As a result,
genuine nodes remain unaware of the com- 2. Theoretical Details
promised communication path, leading to In order to achieve wireless network architectural
data loss, network congestion, and potential complexity, various heterogeneous non-realistic and
service disruption. The detection and elimina- artificial approaches are offered. Communicating in
tion of the Black Hole Attacks present intri- various situations makes the deployment of security
cate challenges due to their deceptive nature. measures and regular packet delivery even more
Nevertheless, researchers have proposed complex. Figure 9.1 illustrates different types of
strategies to tackle this menace. jammers commonly encountered in cybersecurity
Due to highly dynamic and challenging and wireless security. Wireless networks have
open environment of wireless network there revolutionized the way we connect and
are many reasons for packet failure like bat- communicate, but they also come with a range of
challenges that need to be addressed to ensure their
tery drainage in IoT, signal interference and
reliability, security, and efficiency. Some of the key
malicious nodes. A malicious node or faulty
challenges of wireless networks include:
node can enter forcefully or without the prior
knowledge of victim node into the network • Signal Interference and Congestion: Wire-
and damage, disturb the network settings less networks work in shared frequency
and can decrease overall network throughput bands which can lead to potential interfer-
and performance. Black-hole node problem ence from other devices and networks. This
may try to route all the data packets towards interference can degrade the quality of the
itself by falsely claiming of having shortest signal and impact the overall transmission.
path and false unrealistic information. Source • Reduced Bandwidth: The bandwidth of
node chooses the path having higher RREP wireless networks is lower than that of
[2] destination sequence by simply disregard- wired networks. This restriction may
ing other routes and RREPs, comparing all result in slower data transfer in nations
RREPs being trapped in the attacker’s strat- having large population with numerous
egy, and compromising the node connected connected devices.
to the aggressor. The risk of packet drop • Coverage and Range: The range of wire-
exists for nodes that forward data packets less networks can be limited, especially in
along pathways that include rogue nodes, indoor environments or areas with obsta-
which reduces overall network performance. cles. Achieving consistent coverage across
This is the main motivational point behind larger areas can be challenging.
76 Innovations in Computational Intelligence: Trends and Technologies
efforts or trial and error to encrypt the des-sequence [1] which claims to have the
user’s message. shortest path to deliver the data from the
• Black hole Attack: A Black Hole Attack is source to destination node in the network,
a type of security threat in wireless ad hoc which is not true and hence it will disturb
networks in which a false node will gener- the communication.
ate a request-response, req-sequence and
techniques in wireless sensor networks. Elec- [14] Premkumar, M., and Sundararajan, T. V. P.
tronics, 11(15), 2324. (2021). Defense countermeasures for DoS
[7] Michael Savva, Iacovos Ioannou. (2022). attacks in WSNs using deep radial basis net-
Fuzzy-logic based IDS for detecting jam- works. Wireless Personal Communications,
ming attacks in wireless mesh IoT net- 120(4), 2545–2560.
works. 20th Mediterranean Communication [15] Prasse, P., Machlica, L., Pevný, T., Havelka,
and Computer Networking Conference J. and Scheffer, T. (2017). Malware detection
(MedComNet). by analyzing network traffic with neural
[8] Sumaiya Thaseen Ikram and Aswani Kumar networks. 2017 IEEE Security and Privacy
Cherukuri. (2016). Improving accuracy of Workshops (SPW), 205–210.
intrusion detection model using pca and [16] Krishnamurthy, M. and Rajashekara, H.M.
optimized svm. CIT, 24(2), 133–148. (2011). Current trends in wireless technolo-
AQ4:
[9] Naga RohitSamineni, Ferdous A. Barbhuiya, gies in academic libraries. DESIDOC Jour-
Please and Sukumar Nandi. (2012). Stealth and nal of Library and Information Technology,
note semi-stealth mitm attacks, detection and 31(1).
that the
references
defense in ipv4 networks. In 2012 2nd IEEE [17] Chen, Z., Zhou, W., Wu, S., and Cheng,
9-20 is International Conference on Parallel. Dis- L. (2020). An adaptive on-demand mul-
not cited tributed and Grid Computing. tipath routing protocol with QoS support
in text. [10] Farhan Ahmad, AsmaAdnane, Virginia Fran- for high-speed MANET. IEEE Access, 8,
queira, FatihKurugollu, and Lu Liu. (2018). 44760–44773.
Man-in-the-middle attacks in vehicular ad- [18] El-Semary, A. M. and Diab, H. (2019). BP-
ATION ADDEDhoc networks: Evaluating the impact of AODV: Blackhole protected AODV rout-
attackers’ strategies. Sensors. ing protocol for MANETs based on chaotic
[11] QuaziWarisha Ahmed, Shruti Garg, Amrita map. IEEE Access, 7, 95185–95199.
Rai, Manikandan Ramachandran, Noor [19] Thebiga, M., and SujiPramila, R. (2020).
Zaman Jhanjhi, MehediMasud, and Moham- A new mathematical and correlation coef-
med Baz. (2022). Ai-based resource alloca- ficient based approach to recognize and to
tion techniques in wireless sensor internet of obstruct the black hole attacks in manets
things networks in energy efficiency with data using DSR routing. Wireless Personal Com-
optimization. Electronics, 11(13), 2071. munications,, 114(2), 975–993.
[12] J. R. Renofio, M. E. Pellenz, E. Jamhour, [20] Singh, J., Goyal, S., Kumar Kaushal, R.,
A. Santin, M. C. Penna, and R. D. Souza. Kumar, N., and Singh Sehra, S. (Eds.).
(2016). On the dynamics of the RPL proto- (2024). Applied Data Science and Smart
col in AMI networks under jamming attacks. Systems (1st ed.). CRC Press. https://doi.
In 2016 IEEE International Conference on org/10.1201/9781003471059
Communications (ICC), pp. 1–6, IEEE. [21] Jeffrey, Nicholas, Qing Tan, and José R. Vil-
[13] David, J., and Thomas, C. (2019). Efficient lar. (2023). A review of anomaly detection
DDoS food attack detection using dynamic strategies to detect threats to cyber-physical
thresholding on flow-based network traffic. systems. Electronics, 12(15), 3283.
Computers and Security, 82, 284–295.
10 Cascadability analysis of free space
optical wireless data centers
Anand Kumar Dixit1,a, Meenakshi Srivastava2, b, and
Rajiv Srivastava3,c
1
Research Scholar, Amity Institute of Information Technology, Amity University Uttar Pradesh,
Lucknow, India
2
Assistant Professor, Amity Institute of Information Technology, Amity University Uttar Pradesh,
Lucknow, India
3
Ex-Faculty, Indian Institute of Technology, Jodhpur, Rajasthan, India
Abstract: Data centers having optical nature are the heart of modern day communication. The data is rising
continuously and thus increasing the demand for more bandwidth. The current data center relies on the elec-
tronics thus producing lot of heat and for connecting them huge amount of cabling is required. To reduce copper
cabling, use of fiber optic technology with fiber cable was proposed, and optical components produce lesser heat
as compared to electronic devices. However, fiber cabling is still an issue. To deal the cabling and heat dissipa-
tion, free space optical communication can be a better choice. This paper, presents the cascadability analysis
of the free space optical wireless data centers. In this work line of sight links are considered for cascadability
analysis and bit error rate is evaluated for various distances.
Keywords: Bit error rate, data center, free space optical communication, line of sight
1. Introduction
High speed communications switches making the wiring more complex [6]. In addi-
and networks are basically used in tion, we have more consumption of power
data-intensive computing platforms. with electrical switches than optical DCNs
These switches and network divides which also have an added advantage of less
the data into computing resources and expensive [7].
therefore the data is processed separately The issue of the limited frequency spec-
delivering output and scalability as trum in classical RF systems is becoming
per the data. A lot of researches are progressively more critical. However, by
going on to deal with these issues such as implementing optical communication free
introductionof new interconnect space technology, such a problem can be alle-
topologies for data center networks [1–4]. viated [8].
In this topology, we put twenty to fifty 60 GHz lines can support multi-Gbps
servers in a rack along with top of rates [9–11]. In contrast, to solve cabling AQ1:
rack (ToR) switch. Now, as a major issues, [1] proposes a totally wireless DC sys- Please
abbre-
portion of the traffic passes through tem based on 60 GHz technology. Despite its viate
some of the hot ToRs to other [5] which promise, 60 GHz technology has its demerit “DCN”,
makes the requirement of fast reconfiguration like, very high attenuation, low bandwidth “ToR”,
and
of Data Center Networks (DCNs). Generally, [10]. Because of the lack of atmospheric limi- “NLoS”
commodity electrical switches are used tations to free space optical (FSO) commu- in full
at first
bynormal DCNs to optimize nication in interior systems, we recommend mention.
the limited bandwidth. But, the problem
with this is the need of numerous links
and switches
a
[email protected]; [email protected]; [email protected]
DOI: 10.1201/9781003606635-10
82 Innovations in Computational Intelligence: Trends and Technologies
employing FSO in Data Center. Furthermore, The impulse response of LoS channel hLoS
light speed in FSO is approximately 1.5 can be expressed as [14, 15]:
times faster than fiber optics, it is ensure less
latency. As a result, we anticipate that FSO (1)
will result in high-performance, low-cost
DC infrastructure. This approach is useful where Ar is area of the photo-detector,
in situations where lines of optical fiber can- ϕ is radiance angle,
not be installed [12, 13]. It has the advan- ψ is light incidence angle,
tages of spectrum restriction and high-speed d is distance between LED and PD.
1
information transmission over other wireless m = - ln ( 2 ) / ln lim ( cos f1/2 ) is order of lam-
x ®¥ n
communication. Above mentioned system is bertian source emission and LED semiangle
predictable to swap other WC methods in half power is denoted by ϕ1/2.
various industries, including last-mile com-
munication. This technology, which is still in
its early phases, is broadly used in network. 3. Mathematical Modelling of
In the Figure 10.1, communication between Cascadability Analysis
the ToRs using line of sight (LoS) and
In this section, mathematical analysis of cacad-
Non-LoS links is shown. Considering four
ability analysis is presented. In Figure 10.2,
racks for an as example, in cluster 1, rack
BUS topology is shown where four racks are
1, and rack 2 can communicate using LoS
connected.
communication, similarly in cluster 2, rack
3, and rack 4 can communicate using LoS Power Calculation
model. This type of communication is The power received by the rack 2 when rack
known as intra racks com- munication. The 1 transmit is
rack 2 of cluster 1 and rack 3 of cluster 2 can
also communicate using the LoS model. The (2)
communication between the rack 1 and
racks 3, 4, will takes place using NLoS
model. The rack 1 can also communi- cate
to rack 3 via rack 2 using LoS model. In this
work LOS links are considered for cas-
cadability analysis and BER is evaluated
for various distances.
2. Free Space Optical
Communication AQ2:
Please
provide
In FSO communication systems, free space Figure 10.1. Communication between the ToRs source
serves as the communication channel between using LoS and NLoS links. for all
transceivers, playing a vital role in the effective Source:
figures.
AUTHOR'S SELF GENERATED
transmission of optical signals. The quality of
the received signal is significantly impacted by
the parameters of this channel. FSO enables
optical data transfer with potential data rates
of up to 100 Gbps, making it suitable for high-
speed optical networks. However, atmospheric
conditions can hinder FSO performance, limit- Figure 10.2. LoS communication between the
ing sensitivity and achievable data rates while cascaded racks (BUS topology).
maintaining an acceptable bit error rate (BER). Source:
AUTHOR'S SELF GENERATED
Cascadability analysis of free space optical wireless data centers 83
(8)
where, Pr(i) is the power received at the ‘ith’
(3) rack.
The shot noise variance will be given by
(4) (9)
The power received by the rack 4 when The thermal noise expression is as follows:
rack 1 transmit is
.(10)
(5)
Finally, BER can be evaluated using:
In Figure 10.3, 16 racks are connected, (11)
where distance among the nodes is shown.
The power received by the rack 14 when Where, Q is error function.
rack 1 transmit is
(6) 4. Results
Table 10.1 contains parameters utilized in the
The power received by the rack 16 when calculation. In the simulation, we used a sin-
rack 1 transmit is gle LED and a single photo detector (PD) [16].
The server room’s volume is estimated to be racks is 3 meter. FoV=70° is applicable for
10 × 10 × 5 m3. In the simulation transmitter the broadcast messages, while in case of point
and receiver pair placed opposite side of the to point connection FoV=10° is applicable.
racks. FSO rack having servers such that the In case of FoV=10°, the maximum received
same side of the rack having all of the serv- power is −3.36 dBm.
ers’ transmitters (receivers). Main aim is to In Figure 10.5, transmitter and receiver
use the intra/inter-rack option. Optical Beams distance is 3√2 meters with FoV=70° and
are scattered to all servers using a beam dis- FoV=10°. The Pma is −35.29 dBm, and the
tributer, allowing for switch-free intra-rack minimum received power is −45.80 dBm,
connectivity. when the transmitted power is 20 dBm. This
In Figure 10.4, transmitter and receiver result is applicable for all the connection
distance is three meters with FoV=70° and where transmitter and receiver racks are align
FoV=10°. The maximum received power to each other, and distance between the adja-
(Pmax) is −32.29 dBm, and the minimum cent racks is 3√2 meter. In case of FoV=10°,
received power is −47.15 dBm, when the the maximum received power is −6.24 dBm.
transmitted power is 20 dBm. This result is In Figure 10.6, transmitter and receiver dis-
applicable for all the connection where trans- tance is 6 meters with FoV=70° and FoV=10°.
mitter and receiver racks are align to each The Pma is −38.29 dBm, and The min power
other, and distance between the adjacent received is −45.18 dBm, when the transmitted
Figure 10.4. LoS communication between the Figure 10.5. LoS communication between the
racks is 3 meters (a) FOV=70° (b) FOV=10°. racks is 3√2 meters (a) FOV=70° (b) FOV=10°.
Source: Source:
AUTHOR'S SELF GENERATED AUTHOR'S SELF GENERATED
Cascadability analysis of free space optical wireless data centers 85
Figure 10.6. LoS communication between the Figure 10.8. LoS communication between the
racks is 6 meters (a) FOV=70° (b) FOV=10°. racks is 9 meters (a) FOV=70° (b) FOV=10°.
Source: Source:
AUTHOR'S SELF GENERATED AUTHOR'S SELF GENERATED
86 Innovations in Computational Intelligence: Trends and Technologies
5. Conclusion
Data centres are the core of modern day
communication, and as the amount of data
kept in DCs grows, the size of the data cen-
tre grows enormously, as does the amount of
heat released. As a result, it is now important
to develop a new communication paradigm
Figure 10.9. LoS communication between the where heat dissipation and amount of cabling
racks is 9√2 meters (a) FOV=70° (b) FOV=10°. required can be controlled. FSO is one such
Source: technology that can considerably reduce
AUTHOR'S SELF GENERATED
Cascadability analysis of free space optical wireless data centers 87
Abstract: In the current scenario of wireless technology, we go through the many challenges and issues sur-
rounding the application and usage of tools, techniques of machine learning as well and deep learning algo-
rithms in wireless networks. In heterogeneous networks, designing the machine learning foundation routing
approach is challenging. At the beginning of this work, the fundamental basic concepts of (ML) machine learn-
ing and (DL)deep learning in different wireless networks are presented. Because of the constantly changing
network conditions present in many ad-hoc networks, preparing data collection and training with that data is
a particularly difficult process. In addition, this study gives an overview of several studies that used deep learn-
ing and machine learning techniques in a range of research areas, including networking, communications, and
dissipative settings. Finding possible issues and challenging tasks is the main objective of this survey activity.
Keywords: Deep learning; machine learning; routing algorithms; wireless sensor networks
DOI: 10.1201/9781003606635-11
Wireless network with machine learning and deep learning techniques 89
• A fundamental application layer for deep suitability in wireless networks for par-
learning ticular tasks
• to specify a less-complexity deep learn- • Coordination among several CP controllers
ing model depending on the performance
objective of the application layer 2.3. Several machine learning
• Based on deep learning Cloud computing approaches forpacket routing
security in the dew
• applications for controlling cognitive q-routing-
radio networks Q-Learning [10] is a reinforcement learning
• DL/DRL implementations that are effec- algorithm that may discover the best course
tive on real-world wireless systems of action in a given situation to maximize
• Collecting Network configurations for the rewards from that situation. Distribu-
the input phases of deep learning may be tive routing of packets ina network is made
challenging. possible by Q-Routing, a modification of
• The wireless devices’ range restrictions Q-Learning.
• incomplete batches of training samples
• Optimization of the transport layer using 2.3.1. Ant-based routing
deep learning
• the multi-queue evolution pattern An innovative use of reinforcement learn-
detection ing called “Ant-Based Routing” is based on
• determining the length of the RED zone basic biological “ants.” These “ants” trav-
line erse the network and quickly pick up the
• Mixing several protocols and schemes best paths using the ant colony stigmergy
with the congestion control scheme model of communication as inspiration. This
• Control of traffic along the whole route method is more durable than conventional
from source to destination routing algorithms in that it is less affected
• Using deep learning to speed up massive by random route corruption while computing
data transfer is difficult problem employ- packet paths.
ing deep learning for big data transports
• To build a thick routing pipe with the 2.3.2. Particle swarm routing
ability to send a large number of pack- Drs. Russ Eberhard and James Kennedy
ets per second. Identifying the hopby-hop invented particle swarm optimization, a
connection failure population-based stochastic optimization
• MAC parameters selection to guarantee approach, in 1995. They learned from the
service delivery quality. Deep learning’s
AQ3:
Please
provide
Figure 11.2. ML using ANN and DNN. Figure 11.3. Layered ANN caption
Source: Source: 11.3–11.7.
social interactions of flocks of birds and under various circumstances and topolo-
schools of fish. Particle Swarm Routing starts gies. RL-Probe was successful with vari-
with a set of random fixes, followed by iter- ous link topologies and link quality
atively seeks for Optimal solutions through
updating subsequent generations.[3] 2.4. Problems and difficulties with
• The network’s connection may be greatly machine learning in a wifi
improved by using reinforcement learning network
techniques to manage node mobility and Machine learning techniques are now in use
packet routing decisions. widely used in many fields, such as image,
• The four primary categories of contem- speech, video, public safety, and medicine.
porary several types of routing protocols We now have a wealth of data stored in sev-
were developed for wireless networks: eral data centers and these are being analyzed
geographical, on-demand, reactive, and in real-time as a result of the development of
ML/DL-based. Outingtable-based proac- more advanced computer-related processes.
tive protocols. DL-based routing systems While sing machine learning methods and
have received a lot of attention recently techniques, it is possible to construct pre-
due to their enhanced performance in diction or human-like decision-making pro-
complicated networks. cesses. The system should be able to safely
• An innovative method named “RL-Probe” handle the whole planet on its own utilizing
was presented in for improving connec- machine learning techniques. For instance,
tion quality. RL-Probe was crucial in the system gathers all the data generated
boosting RPL’s functionality and capacity. by each person and learns everything about
RPL is a routing protocol for less power the environment on its own. The ability
and dissipative networks. To decrease the of machine learning systems to constantly
overhead, The RL-Probe approach is used learn from data over times one of its major
and is based on the reinforcement advantages. The system may be continually
Learning paradigm. updated while it is in use by using freshly
observed or created data. As a consequence,
• RL-Probe Using the RL-Probe framework, various logics are generated using various
both synchronous and asynchronous training sets using a single machine learning
LQE approaches are compatible. The rel- method. It implies that the system is adapt-
evance of each node is taken into consid- able in terms of how it makes decisions and
eration while making clustering decisions that it can continually learn from experience.
throughout the RPL route maintenance Referring back to the example, the system
and route recovery operation. can sound alert or take any other action that
• Asynchronous probing approach is sug- may be regarded intelligent and beneficial
gested to measure the RSSI and ETX. A when it identifies any harmful or anomalous
MAB model is used to accomplish the situations from the world of humans. Cre-
decision- making process. With the use of ating this ideal system, however, is difficult
the RL-Probe technique, reward function in practice. The difficulty of obtaining trust-
has been utilized to evaluate the trends in worthy training data that covers a variety of
link quality fluctuations. RL-Probe was contexts gives rise to the first problem. To
assessed using three performance assess- build any decision or prediction model with-
ment matrices: Packet loss rate, packet out an appropriate data set, regardless of
overhead on top of the usual energy con- how strong our machine learning algorithms
sumption. Evaluation work was done are at Building robust logic and analyzing
Wireless network with machine learning and deep learning techniques 93
network management and made it practical decide on cloud computing. User input, device
to do so. energy level, and CPU use level are additional
input values that are distinct and steady in
3.3. Network attack forecast contrast to values affected by a dynamic and
unpredictable wireless network.
In the study, a technique based on machine
learning technology for setting security rules
on the SDN controller has been proposed. 3.6. Network of wireless sensor
Security settings for the SDN controller are networks
configured to block the whole subnetwork
to prevent access from possible attackers, 3.6.1. Using machine learning
and machine learning methods are utilized In this area, we present several works that
to identify likely target hosts that can be utilized sensor networks [14] and machine
attacked. The identical datasets were divided learning approaches. These techniques also
into training and test sets in order to evaluate make a significant contribution to the appli-
the suggested strategy. cation of machine learning to solve difficult
issues brought on by dissipative channels and
3.4. Wireless adaptive swimming restricted devices. These studies are important
because they opened the way for the develop-
Network conditions vary greatly depend- ment of trustworthy models that can be used
ing on the situation and alter over time. It to circumvent the challenge of forecasting the
is therefore difficult to predict the network’s future state of dissipative channels.
future condition. Despite the fact that a num-
ber of rate adaptation methods for high-
quality video streaming have been proposed, 3.7. Diagnostics for channel errors
there is still significant room for advance- Many protocols, including 802.11, 802.15.4,
ment. Numerous research has validated the 802.15.1, etc., share the ISM band. Here,
use of machine learning techniques to video Intrusion between several systems impairs
streaming services. It should be possible to communication quality. In-depth studies were
create a system that selects the best bitrate done by the authors to examine the error pat-
and CDN for the streaming user, learns cru- terns in IEEE 802.15.4, and they discovered
cial parameters, and maximizes QoE. Rein- that there are several patterns for the most
forcement learning was used in addition to common wireless situations. They devel-
taking into account the bandwidth, buffer oped a machine learning technique based on
level, and video rate to automatically create this discovery to categorize wireless channel
the best ABR algorithm. faults into distinct groups and offered the
system that can identify various issues in IoT
3.5. Mobile cloud offloading networks.
RSSI and LQI from the most recent packet test subject had a wearable sensor [14] that
received as well as the following features allowed him to identify himself in the wire-
as input information: the quantity of trans- less sensor network.
mission attempts, the reasons behind each
unsuccessful attempt, and RSSI and LQI. The 3.11. Detection of events
optimal channel from the output is one with
a less projected number of transmission tries. Wireless sensor [12] networks have a wide
range of applications. The initiative focuses
on locating pipeline leaks in the transporta-
3.9. Outlier detection tion networks for gas, oil, and water. Using
Wireless sensor [12] networks with a small algorithm-like pattern recognition, it trains
number of nodes are vulnerable to Intrusion the sensor network to distinguish novel traces
[7], unstable channels, and cyber interven- of events, such as leakages. Here, some scat-
tion, which reduces system performance and tered sensor nodes collaborate to estimate the
increases the possibility that false data may size of the leakage event. Despite the employ-
be relayed to higher management levels. This ment of a wireless sensor network in this
might have major consequences for indus- investigation [11], the difficulties associated
trial automation systems and sensor network with using an unreliable and unsafe wireless
systems used for public safety. The existing channel were scarcely considered.
works for outlier identification, according
to their authors, take a lot of memory, a sig- 3.12. Fault detection
nificant amount of energy, power for com-
Data gathering from the sink node is impre-
putation, transmission overhead, and data
cise due to the less- cost sensors and other
transfer capacity. They suggested employing a
problems caused by unreliable wireless net-
multi-agent framework and a machine learn-
works. Fault data must be observed in order
ing approach for online outlier’s identifica-
to monitor the system and respond quickly
tion to tackle the issue
to incidents. The cause of the issue must also
be identified. The paper proposed a statistical
3.10. Invoremental locatization technique for identify and classify issues in a
wireless sensor [14] network while using the
In general, GPS is one of the most widely used
Machine learning techniques. System faults
methods for object localization. Finding an
and data faults were used to categorize various
object’s specific location is difficult because
fault types. System faults are the other fault
of the limited GPS signal strength inside of
types brought on by less battery, calibration,
buildings. Due of this, other tactics are used.
For example, a large number of nodes are
used as anchor points which estimate the
comparative location of a target object. A
precise interior localization system must be
created in order to increase safety in under-
ground mines or caverns. Unfortunately, the
wireless channel continues to experience
Intrusion, which lowers the estimation’s
accuracy. To find the method with the fewest
errors and evaluate its performance, the study
used two alternative architectures and seven Figure 11.6. Wireless Network Communication Path
different machine learning techniques. The Source:
AUTHOR'S SELF GENERATED
Wireless network with machine learning and deep learning techniques 97
5. Conclusion
3.13. Routing
Our study has uncovered a wide range of
Multi-hop routing systems [19] could utilize methods and protocols that might be used to
less energy with the use of machine learning. improve wireless networks and communica-
The work provided a Machine Learning- tions. Based on the literature, we examined
based clustering technique to efficiently place a variety of problems and difficulties with
the nodes(sensor) in the closest cluster. The applying machine learning and deep learn-
researchers applied ML to the wireless sensor ing algorithms to improve various opera-
network’s routing protocol. The suggested tions in networking in various ways. For
routing technique aims to extend network tasks like network administration, network
life and move data packets as quickly as fea- optimization, signal, Data management,
sible. This suggests that ML approach adop- channel assignment, network security, route
tion on WSN is advantageous for resource selection, etc. Machine learning and Deep
management. learning algorithms perform incredibly well.
Our study has uncovered a wide range of The two primary learning methods that per-
methods and protocols that might be used to form well for network operations are deep
improve wireless networks and communica- reinforcement learning and deep learning.
tions. Based on the literature, we examined However, it could be challenging to collect
a variety of problems and difficulties with training data in a variety of settings and it
applying deep learning and machine learning is not possible in this research to complete
algorithms to improve networking operations all the algorithms and methods of ML and
in various ways. For tasks like network admin- Deep learning which we can cover in future
istration, network management, optimization scope Due to the unpredictable behavior of
signal management, network security, opti- wireless networks, creating training data
mum route selection. Machine learning and sets may be challenging
Deep learning algorithms perform incred-
ibly well. The two primary learning methods
AQ4:
that perform well for network operations References Please
are deep reinforcement learning and deep change
[1] Johnson, A. and Smith, B. (2016). Enhancing
learning. However, it could be challenging to the refer-
Data Delivery Efficiency in AODV-Based Ad ences into
Hoc Networks. Wireless Communications Num-
bered
and Networking Conference (WCNC), 1–6. references
[2] Lee, C., and Park, D. (2017). Performance as per
Evaluation ofAODV in Dynamic Mobil- style,
ity Scenarios. IEEE Transactions on Mobile
Computing, 16(8), 2134–2147.
[3] Emilio Ancelotti, CarVallati, Raffaele Bruno,
Enzo Mingozzi, A reinforcement learning-
based link quality estimation strategy for
RPL and its impact on topology manage-
Figure 11.7. ment, Computer Communications, Volume
Source: 112, 2017, Pages 1–13.
AUTHOR'S SELF GENERATED
98 Innovations in Computational Intelligence: Trends and Technologies
[4] Martinez, F., and Rodriguez, G. (2018). Large- Scale MANETs. Wireless Personal
Throughput Optimization in AODV Net- Communications, 113(1), 1–17.
works for IoT Applications. Ad Hoc Net- [16] S.A. Haque, M. Rahman, S.M. Aziz, Sensor
works, 75, 60–72. anomaly detection in wireless sensor net-
[5] Simi S, Sruthi Ann Varghese,“Enhance QoS works for healthcare, Sensors15 (4) (2015)
by LearningData flow rates in Wireless Net- 8764–8786.
works using Hierarchical Docition”, 4th [17] Zhang, W., and Chen, X. (2021). Analyz-
International Conference on Eco-friendly ing Mobility Models and Their Impact on
Computing and Communication Systems, AODV Performance. Journal of Network
ICECCS 2015, Procedia Computer Science and Computer Applications, 185, 102968.
70 (2015) 708–714, Elsevier [18] Garcia, M., and Lopez, A. (2023). Secure
[6] Kim, H., and Jung, I. (2019). Enhancing Routing with AODVin MANETs: A Crypto-
Security in AODV Routing Protocol for Ad graphic Approach. International Journal of
Hoc Networks. Computer Communications, Network Security, 25(4), 692–704.
135, 87–98. [19] Rahman, A., and Khan, M. (2023). Exploit-
[7] Wu, J., and Li, K. (2020). Performance Eval- ing Cross-Layer Design for Improved AODV
uation of AODV in Heterogeneous Ad Hoc Performance in VANETs. Ad Hoc Networks,
Networks. Wireless Personal Communica- 123, 102377.
tions, 112(3), 1519–1532. [20] Wei Wang; Xiaohong Guan; Xiangliang
[8] A. Garofalo, C. Di Sarno, V. Formicola, Zhang,“Profiling program and user behav-
Enhancing intrusiondetection in wireless sen- iors for anomaly intrusion detectionbased
sor networks through decision trees,Depend. on non-negative matrix factorization” 43rd
Computing. (2013) IEEE Conference on Decision and Control,
[9] Rahman, S., and Khan, T. (2022). Perfor- 2004. Issue Date: 14–17 Dec. 2004, On
mance Enhancement of AODV Through page(s): 99–104 Vol.1
Dynamic Parameter Adjustment. Interna- [21] Hazem M. El-Bakry, Nikos Mastorakis A,
tional Journal of Wireless Networks and- “Real-Time Intrusion Detection Algorithm
Communications, 14(1), 53–64. for Network Security,WSEAS Transactions
[10] Zhang, Y., and Wang, Q. (2016). A Survey of on communications, Issue 12,Volume 7,
Energy-Efficient Routing Protocols in Wire- December 2008.
less Sensor Networks. Journal of Internet [22] HR, M., MV, A., S, G. and S. V., “Devel-
Technology, 17(3), 471–482. opment of anti-phishing browser based on
[11] S. Kosunalp, A new energy prediction algo- random forest and rule of extraction frame-
rithm for energy- harvesting wireless sen- work” Cybersecurity, 3(1), 2020
sor networks with Q-learning, IEEEAccess 4 [23] Saxena, S., Shrivastava, A. and Birchha, V.,
(2016) 5755–5763. “A Proposal on Phishing URL Classification
[12] Wang, H., and Li, Q. (2018). An Improved for Web Security,” International Journal of
AODV Algorithm for Load Balancing in Computer Applications, 178(39), pp.47–49,
Mobile Ad Hoc Networks. Wireless Per- 2019.
sonal Communications, 99(3), 1987–2002. [24] G. B. Huang, H. Zhou, X. Ding and R.
[13] Nayak, p. and G.K.Swetha (2021) “Routing Zhang, “Extreme Learning Machine for
in wireless sensornetworks using machine Regression and Multiclass Classification,”
learning techniques”, measurement Volume in IEEE Transactions on Systems, Man, and
178, June 2021, 108974 Cybernetics, Part B (Cybernetics), vol. 42,
[14] Qian Mao, Fei Hu, and Qi Hao, “Deep no. 2, pp. 513–529, April 2012.doi: 10.1109/
Learning for Intelligent Wireless Networks: TSMCB.2011.2168604.
A Comprehensive Survey”, IEEE communi- [25] A. Qayyum, A.S. Malik, N.M.Iqbal, M.
cations surveys and tutorials, vol. 20, no. 4, Abdullah, M.F. Rasheed, W., Abdullah,
fourth quarter 2018, pp. 2595–2621 T.A.R. and M.Y.B. Jafaar,., Image classifi-
[15] Li, X., and Wu, Y. (2020).On the Per- cation based on sparsecoded features using
formance of AODV Routing Protocol in sparse coding technique for aerial imagery:
Wireless network with machine learning and deep learning techniques 99
Abstract: The conventional landscapes therapeutic treatment approach has changed in recent years due to the
arrival of cell phone applications, or heeltaps. The present heeltaps are designed to investigate the skills of scien-
tific specialists to determine those who are reliable, better, and well-liked ones. We can talk about the method of
integrating mHealth advances into clinical practice and figuring out whether professionals want to accept such
through the application of the procedure of normalization hypothesis. We looked at app attributes and perfor-
mance data, completed assessment reports on characteristics, capabilities, and feedback from the audience, and
used data analysis to evaluate feature cross-correlation and market alternatives. There is a possibility of devel-
opment regarding the which are already accessible the marketplace, as we discover unsatisfactory specifications
for workmanship and dependability. Strong ties exist between them.
Keywords: app features, new technology uptake, mobile health, and fitness app (health app), normalization
process (NPT), reliability (UX), and ease-of-use (UI)
DOI: 10.1201/9781003606635-12
Assessing technology innovation of cellular health 101
copious records [2] to produce numbers that for the Introduction with Health Data
can inform negotiating choices. Recently, health data has received increasing
attention for both healthcare and data
mining. PARK, 2018 [4] Abstract In this
2. Literature Survey paper we discuss the challenges in analyzing
and mining health data to find clinical insight.
Somayyeh Zakerabasali, Seyed Mohammad, This paper reviews major challenges, the
Tayebeh Banias Adi, Azita Yazdani and Sha- sources of data, meth- odologies and
habuddin Abhari, 2021 others [1]. Many technologies along with open issues in big
mobile health (mHealth) apps are being data analytics in health care.
AQ2:
integrated into the healthcare system, but Yujun Ma1, (Member, IEEE), Yulei Please
their potential success depends on uptake by Wang1, Ju Yang2, Yiming Miao2, And Wei check the
sentence
healthcare providers. Some of the important Li2 (2017) [ 5]]
is correct.
benefits associated with mHealth technology The paper talks about the challenges of a
are increased efficiency, cost breakdowns and medical and health care system, i.e. uneven
enhanced health care service delivery pro- distribution of medical resources in rural
cesses. Future research is needed to explore areas, explosive growth in chronic diseases,
additional barriers at the healthcare system and rising medical expenses require medical
level i.e. legal, reimbursement/ accountable reform approach to a good solution. This rec-
care organizations, economic and financial ommends us Health Internet of Things (IoT)
factors, health system policy and standardisa- along with big data to deal with such prob-
tion so that systematic interventions can be lems. This paper demonstrates a large-scale
implemented to improve access to mHealth health application system that utilizes the
technology. [2] Ayan Banerjee Member, health IoT, big data architecture, key technol-
IEEE, and Sandeep K. S. Gupta Senior Mem- ogies and typical application of health IoT.
ber, IEEE~~2014~ Abstract: While smart The paper proposes to examine the health
mobile medical computing systems (SMDC- status of non-hospitalized patients using a
Ses) exploit context information to provide Wireless Body Area Network (WBAN) sys-
healthcare services, unexpected changes of tem with load-sharing processing capabilities
the clinical context may result in incorrect on both private and public clouds. [SHAKER AQ3:
or incomplete service provision, generating EL-SAPPAGH 1,2, FARMAN ALI 2, SAMIR Please
check the
faults and violating requirements. To mitigate EL-MASRI3, KYEHYUN KIM4, AMJAD sentence
this issue, this paper presents an approach to ALI 2,5, AND KYUNG-SUP KWAK 2, is correct.
analyze SMDCSes that accounts for dynamic (Member,...2019 [6]] Establishment of smart
changes in context and the interaction with environment and integration of used compo-
the physical world which may exist. nents is the main research issue in a newly
Achilleas Papageorgiou, Michael Strikes, developed network as well standardization
Eugenia Politou, Efthimios Alepis, Constan- network must have a single architecture,
tinos Pataki’s [1], 2018 [3]. The paper seeks protocol, and application program interface
to offer broad feedback to the developers of to connect between heterogeneous smart
these apps to shore up their security/privacy objects. To deliver MH apps and solutions
features while pointing out regular mistakes to address serious medical problems that are
made in the application development life easier to use with increased precision.
cycle that can threaten user privacy rights. [Sabyasachi Dash1†, Sushil Kumar Shakya AQ4:
AQ1: [Gaspard Harerimana, (Student Member, war 2,3†, Mohit Sharma 4,5 and Sandeep Please
Please check the
check the
IEEE), Beakcheol Jang, (Member, IEEE), Jong Kaushik6*,2019 [7]] The paper analyses the sentence
Wook Kim, (Mem- Ber, Ieee), And Hung Kook] data in health care through their necessity of
sentence is correct.
the paper provides a deep understanding
is correct. collectiveness.
102 Innovations in Computational Intelligence: Trends and Technologies
[8] Sohail Imran, Tariq Mahmood, Ahsan All the way through the innovation imple-
Morshed and Timos Sellis (Fellow, IEEE), mentation process, the NPT comprises the
“Enabling Big Data Analytics In TheHealth- following four key additives:
care Sector: Challenges And Neuro-Fuzzy
Based Solutions”, 2021 1. “Coherence” requires knowing the cost,
Mobile Health (mHealth) apps for moni- importance, and uniqueness of the action
toring health status of patients with chronic or by itself “identity the experience-
medical conditions are increasingly becoming creating the desire.” because the method
prevalently used [Gerson, Rodriguez, Devasena, called “experience-making” “paintings
Inupakutika, Sahak, Kaghyan, David Akopian, that creates and organizes an exercise as
Palden Lama, Patricia Chalela, Amelie Ramirez a cognitive category, it’s seen as an assort-
et al.,2020 [10]]. In this paper, the authors dem- ment of competencies this includes sepa-
onstrate the methodology of assessing perfor- ration from other hobbies and a common
mance of a developed prototype model mHealth experience of intent [56].
app for breast cancer patients on EHT. 2. “Cognitive involvement” requires that the
main players in the intervention design
and upkeep.
3. Conceptual Structure 3. “Collective motion” influences kinship
In facts structures (IS) studies and notably in between expert groups and conforms to
technology adoption studies, knowledge of the overarching organizational contextual
the goals or dreams for phone clients is cru- content of objectives, morale, manage-
AQ5:
Please cial to clarify the purpose of usage, satisfac- ment, and assets.
note tion, involvement [53].
that the
Implementing new clinical practices and Fourth, “reflexive tracking” involves eval-
reference
numbers implementing innovations in healthcare uating the new intervention for its efficacy
[53]
requires sophisticated organizational strate- and practice.
onwards
is not gies and sociological understanding of change. Desk I provide an empirical explanation of
occurred So, we took a sociological concept from the NPT methods and components available
in refer-
ence list. the field of generation called the “NPT” [54]
and applied it to the field of technology to
explain how healthcare systems have incor-
porated technological and organizational
changes. This theory sheds light on the
human and organizational linkages behind
the spread of innovative interventions into
everyday practice [55]. Structured inter-
views and questionnaires have been utilized
with the NPT represents the core concept to
examine adoption within health. Us utilize
the NPT to understand value for medical
experts apply a novel way to practice the use
of medicinal drugs, as well as the importance
of app features in attracting and retaining
experts. Engagement, or user engagement, is
the worth of the consumers consider follow AQ6:
interacting app, which is tied to longevity for Please
good application characteristics this stimu- Figure 12.1. Conceptual framework. provide
source
late it is usage. Source: for all the
AUTHOR'S SELF GENERATED figures
Assessing technology innovation of cellular health 103
during mHealth app deployment. As a result, Table 12.2. Research questions and
the NPT details how to embed (implement) methodology
novel artistic routines in existing (sustain- Research Questions Research Approach based
able) societal frameworks (integration). on XPT
You can see how this three-degree NPT RQ1: What are NPT constructs
method works in practice in Figure 12.1. The the app categories, • Implementation
4 NPT mechanisms are defined by the various features, quality stage: app Categories
categories of mHealth apps and the require- and popularity that (coherence)
ments they satisfy. Positive app categories are affect the adoption • Embedding stage:
developed primarily based on their abilities intention of mobile app Feature relevance
(the need for intervention). Customers can app innovation (collective action)
verify their hopes that the app will meet their by health • Integration stage: app
needs by testing it out before they fully accept professionals? Quality (cognitive
the innovation, which is part of the process of participation), app
“implementing” the innovation. The second Popularity (reflexive
monitoring)
level of the system is called “embedding,” and
Findings: Tables 3. 4 and 5
it outlines the mechanisms that can be uti-
lized to carry out new practices; The systems RQ2: What app • Mean differences of
in the instance represent the abilities., that metrics are affected app “integration"
by the inclusion of metrics based on
need to be met, of the apps. Like the idea of
app features? feature inclusion
a social capital, “embeddedness” consists of Findings: Table 7
relational characteristics like norms and trust,
RQ3: To what • Correlations between
levels can be vital for organizations like medi-
extent are the the NPT dynamics
cal care that incorporates social improves this
attributes of Findings: Tables 8a and 8b
frequently necessitate deep comprehension of innovative
intricate societal issues [59]. adoption of
inHealth by health