200,99 €
Information Visualization for Intelligent Systems provides readers with essential insights into cutting-edge advancements in machine intelligence and explores how these transformative technologies are revolutionizing data analysis and decision-making in an increasingly complex world.
The book explores advanced computing, or machine intelligence, which enables technology—machines, devices, or algorithms—to interact intelligently with their surroundings, make decisions, and take actions to achieve objectives. Unlike natural human intelligence, artificial intelligence (AI) is demonstrated by machines.
Modern advancements in high-speed computing drive paradigm shifts, enabling complex machine intelligence systems and novel cyber systems that utilize data to perform specific tasks. While standalone cyber systems are common, integrating multiple systems into cohesive, intelligent structures interacting deeply with physical systems remains underexplored and primarily philosophical in existing literature.
These technological breakthroughs have revolutionized data generation, cloud storage, global information exchange, and rapid computing. For example, machine intelligence models analyze video surveillance to identify threats, support early infection detection in healthcare, and enhance chemical industry processes. While promising, these advancements remain in their infancy, offering significant potential for further development.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 788
Veröffentlichungsjahr: 2025
Cover
Table of Contents
Series Page
Title Page
Copyright Page
Preface
1 Analysis of Restaurant Reviews Using Novel Hybrid Approach Algorithm Over Convolutional Neural Network Algorithm with Improved Accuracy
Introduction
Related Work
Existing Methodology
Proposed Methodology
Results
Discussion
Conclusion
References
2 Forecasting of Product Demand Using Hybrid Regression Model in Comparison with Autoregressive Integrated Moving Average Model
2.1 Introduction
2.2 Materials and Methods
2.3 Tables and Figures
2.4 Results
2.5 Discussion
Conclusion
References
3 Identification of Stress in IT Employees by Image Processing Using Novel KNN Algorithm in Comparison of Accuracy with SVM
Abbreviations Used
3.1 Introduction
3.2 Materials and Methods
3.3 Statistical Analysis
3.4 Results
3.5 Discussions
3.6 Conclusion
Acknowledgements
References
4 Observing the Accuracy of Breast Cancer Using Support Vector Machine with Digital Mammogram Data in Comparison with Naive Bayes
Introduction
Materials and Methods
Statistical Analysis
Results
Discussion
Conclusion
References
5 Analyzing and Improving the Efficiency of Winning Prediction in Chess Game Using AlexNet Classifier in Comparison with Support Vector Machine for Improved Accuracy
Introduction
Materials and Methods
Results
Discussion
Conclusion
References
6 Accurate Prediction of Vehicle Number Plate Segmentation and Classification with Inception Compared over Alexnet
6.1 Introduction
Organization of Chapter
6.2 Relevant Works
6.3 Proposed Methodology
6.4 Resources and Techniques
Tables and Figures
6.5 Results and Discussion
6.6 Conclusion
References
7 A Novel Method to Analyze a Server Instance’s Performance During a Crypto-Jacking Attack Using Novel Random Forest Algorithm Compared with Logistic Regression
Abbreviations Used
7.1 Introduction
7.2 Materials and Methods
7.3 Statistical Analysis
7.4 Results
7.5 Discussion
Conclusion
Acknowledgements
References
8 A Comparative Analysis of Twin Segmentation and Classification Over MultiClass SVM and Innovative CNN: An Innovative Approach
8.1 Introduction
Statistical Analysis
Discussion
Conclusion
References
9 Prediction of Yields in Semiconductor Using XGBoost Classifier in Comparison with Random Forest Classifier
9.1 Introduction
Results
Discussion
Conclusion
References
10 A Robust Medical Image Watermarking Scheme with a Better Peak Signal-to-Noise Ratio Based on a Novel Modified Embedding Algorithm and Spatial Domain Algorithm
10.1 Introduction
10.2 Result
10.3 Discussion
10.4 Conclusion
References
11 BER Comparison of BPSK-DCO-OFDM and OOK-DCO-OFDM in Visible Light Communication
Abbreviations Used
11.1 Introduction
11.2 Materials and Methods
11.3 Statistical Analysis
11.4 Results
11.5 Discussions
11.6 Conclusion
References
12 Improved Accuracy in Blockchain-Based Smart Vehicle Transportation System Using KNN in Comparison with SVM
Abbreviations Used
12.1 Introduction
12.2 Materials and Methods
12.3 Tables and Figures
12.4 Results
12.5 Discussion
12.6 Conclusion
References
13 Improvement in Accuracy of Red Blood Cells (RBC), White Blood Cells (WBC), and Platelets Detection Using Artificial Neural Network and Comparison with Hybrid Convolution Neural Network
13.1 Introduction
13.2 Materials and Methods
13.3 Results
13.4 Discussion
13.5 Conclusion
References
14 Novel Design of Meta Ring Array Antenna Using FR4 for Biomedical Applications
14.1 Introduction
14.2 Related Work
14.3 Materials and Methods
14.4 Results
14.5 Discussions
14.6 Conclusion
Abbreviations Used
References
15 Review: Recommendation System in Tourism and Hospitality Based on Comparison of Different Algorithms
15.1 Introduction
15.2 Literature Review
15.3 Research Gaps
15.4 Conclusion
15.5 Future Work
Abbreviations Used
References
16 Secure and Reliable Routing for Hybrid Network to Support Disaster Recovery and Management
Abbreviations
16.1 Introduction
16.2 Related Work
16.3 Proposed Methodology
16.4 Experimental Results
16.5 Conclusion
Acknowledgments
References
17 Machine Learning Techniques for Sentimental Analysis
Abbreviations Used
17.1 Introduction
17.2 Applications of Sentimental Analysis
17.3 Related Work
17.4 Existing Methodology
17.5 Comparison and Discussion
17.6 Conclusion
References
18 Design of 40-mm Period, 0.8-Tesla Variable-Gap Pure Permanent Magnet Undulator Magnet in RADIA
18.1 Introduction
18.2 Undulator Modeling in RADIA
18.3 Results and Discussion
Acknowledgment
References
19 Predicting Academic Performance of Students: An ANN Approach
Abbreviations Used
19.1 Introduction
19.2 Literature Survey
19.3 Proposed ANN Model
19.4 Experimental Setup
19.5 Result Analysis
19.6 Conclusion and Future Scope
Acknowledgements
References
20 A Deep Study on Discriminative Supervised Learning Approach
20.1 Introduction
20.2 Literature Survey
20.3 Introductory Information About Deep Learning and Its Features
20.4 Methodology of DL Approaches
20.5 Deep Learning Network Structures
20.6 Conclusion
References
21 AI Medical Assistant Machine Learning Techniques
21.1 Introduction
21.2 Literature Review
21.3 Data and Methodology
21.4 Result and Discussion
21.5 Conclusion
References
22 Early Schizophrenia Prediction Using Wearable Devices and Machine Learning
22.1 Introduction
22.2 Related Works
22.3 Proposed Methodology
Methodology
22.4 Results and Discussion
22.5 Comparison with Existing Methods
22.6 Conclusion
References
23 Forecasting the Trends in Stock Market Employing Optimally Tuned Higher Order SVM and Swarm Intelligence
Abbreviations Used
23.1 Introduction
23.2 Related Work
23.3 Proposed Methodology
23.4 Result
23.5 Conclusion
Acknowledgements
References
24 Social Media Text Classification Analysis and Influence of Feature Selection Methods on Classification Performance
24.1 Introduction
24.2 Literature Review
24.3 Proposed Work
24.4 Results Analysis
24.5 Conclusions
References
25 4G Versus 5G Communication Using Machine Learning Techniques
25.1 Introduction
25.2 Literature Review
25.3 Data and Methodology
25.4 4G and 5G Methodology
25.5 4G and 5G Algorithm
25.6 Conclusion
References
26 Design and Development of Programmable and UV-Based Automated Disinfection for Sanitization of Package Surfaces
26.1 Introduction
26.2 Materials and Methodology
26.3 Result and Discussion
26.4 Conclusion
Funding
Acknowledgements
References
27 Fuzzy-Based Segmentations Performance Analysis for Breast Tumor Detection Using Spatial Fuzzy C-Means Filtering with Preconditions (SFCM-P) Over Bilateral Fuzzy K-Mean Clustering Algorithm (BiFKC)
27.1 Introduction
27.2 Materials and Methods
27.3 Results
27.4 Discussion
27.5 Conclusion
References
28 Analysis of Vehicle Accident Prediction Using GoogleNet Classifier Compared with AlexNet Algorithm to Enhance Accuracy
28.1 Introduction
28.2 Significance of GoogleNet and AlexNet for Vehicle Accidents
28.3 Related Work
28.4 Proposed Methodology
28.5 Results Analysis
28.6 Conclusion
References
29 Maximizing the Accuracy of Fake Indian Currency Prediction Using Particle Swarm Optimization Classifier in Comparison with Lasso Regression
29.1 Introduction
29.2 Significance of PCO and Lasso Regression
29.3 Related Work
29.4 Proposed Methodology
29.5 Result Analysis
29.6 Conclusion
References
30 Convolutional Neural Network Algorithm for Proliferative Diabetic Retinopathy Detection and Comparison with GoogleNet Algorithm to Improve Accuracy
Abbreviations Used
30.1 Introduction
30.2 Materials and Methods
30.3 Statistical Analysis
30.4 Results
30.5 Discussion
30.6 Conclusion
Acknowledgements
References
31 Conversational AI – Security Aspects for Modern Business Applications
Abbreviations Used
31.1 Introduction
31.2 CAI – Security Threats
31.3 Literature Review
31.4 Mitigation Strategies
31.5 CAI Models
31.6 Future Research Directions
31.7 Conclusion
References
32 Literature Review Analysis for Cyberattacks at Management Applications and Industrial Control Systems
Abbreviations Used
32.1 Introduction
32.2 Literature Survey
32.3 Research Techniques
32.4 Observational Values
32.5 Analysis
32.6 CICS -CCSC Future Scope
32.7 Future Work
Acknowledgements
References
33 Fractal Natural Language Semantics and Fractal Machine Learning Engineering: Cultural Heritage Generative Management Systems
33.1 Introduction
33.2 Frameworks, Directions, and Domains
33.3 CH-GeMS Architecture
33.4 Conclusions
References
About the Editors
Index
Also of Interest
End User License Agreement
Chapter 1
Table 1.1 An analysis of accuracy and loss was conducted on a novel hybrid app...
Table 1.2 A CNN with a sample size of 10 is used to analyze its accuracy and l...
Table 1.3 The group statistics for the novel hybrid model show a mean accuracy...
Table 1.4 Performing a T-test on an independent sample to establish significan...
Table 1.5 Comparison of Hybrid Algorithm and CNN with their accuracy. The accu...
Chapter 2
Table 2.1 The group statistics of the data were performed for 20 iterations be...
Table 2.2 The independent sample T-test between NHR and ARIMA.
Chapter 3
Table 3.1 Precision assessment of conventional and suggested method.
Table 3.2 The group’s mean, standard deviation, and precision of the KNN and S...
Table 3.3 The outcomes of the independent sample assessment indicated that the...
Chapter 4
Table 4.1 Comparison of prediction accuracy using SVM and naive Bayes.
Table 4.2 The mean of the SVM is 85.91 and naive Bayes is 92.64.
Chapter 5
Table 5.1 The AlexNet attained accuracy of 99.92% compared to SVM having 94.99...
Table 5.2 The group’s mean and standard deviation, along with the accuracy met...
Table 5.3 The independent sample test detected a significant improvement in ac...
Chapter 6
Table 6.1 Accuracy assessment.
Table 6.2 The mean, standard deviation, and standard error imply statistical c...
Table 6.3 Independent sample statistical calculations and the inception approa...
Chapter 7
Table 7.1 Accuracy values of novel RF and LR algorithms.
Table 7.2 Calculating the mean, standard deviation, and standard error of the ...
Table 7.3 The independent sample T-test findings show that there is no statist...
Table 7.4 When comparing the accuracy of RF to LR, performance differences app...
Chapter 8
Table 8.1 Enhanced precision in twin identification is observed with a convolu...
Table 8.2 It summarizes the outcomes of the independent samples T-Test conduct...
Table 8.3 Statistical evaluation employing convolutional neural network and mu...
Chapter 9
Table 9.1 Accuracy and loss analysis of novel XGB and RF.
Table 9.2 Group statistical analysis of novel XGB and RF. Mean, standard devia...
Table 9.3 The independent sample t-test was performed between XGB and RF for 1...
Chapter 10
Table 10.1 Comparative performance analysis of PSNR for Group 1 and Group 2 in...
Table 10.2 Statistical analysis of novel modified embedding and spatial domain...
Table 10.3 Independent sample test for significance and standard error determi...
Chapter 11
Table 11.1 Comparison of BPSK and OOK for BER values.
Table 11.2 Group statistics for BER.
Table 11.3 Independent sample test.
Chapter 12
Table 12.1 Accurateness and loss examination of K-nearest neighbor.
Table 12.2 Accurateness and loss examination of support vector machine.
Table 12.3 Descriptive analysis of KNN and SVM. KNN improved accuracy and less...
Table 12.4 K-nearest neighbor is better than SVM.
Chapter 13
Table 13.1 Group statistics of artificial neural network and hybrid CNN-based ...
Table 13.2 Group of independent sample tests of Levene’s test for equality of ...
Chapter 14
Table 14.1 Comparison of different studies carried out for antenna design.
Table 14.2 Design parameters of S patch antenna designed using HFSS.
Table 14.3 A comparison is made between the gain of the multi-band meta ring a...
Table 14.4 Design parameters of meta ring array antenna designed using HFSS.
Chapter 15
Table 15.1 Systematic literature review.
Chapter 16
Table 16.1 Parameter setting.
Table 16.2 Parameter setting.
Chapter 19
Table 19.1 Configuration parameters.
Table 19.2 CFFNN model (Predict G3 on demo).
Table 19.3 CFFNN model (predict G3 on demo and G1).
Table 19.4 CFFNN model (predict G3 on demo, G1 and G2).
Chapter 20
Table 20.1 Description of CNN architecture.
Chapter 21
Table 21.1 Amalgamated correlation coefficients (R2) between LBNP and CRM and ...
Chapter 22
Table 22.1 Performance evaluation for schizophrenia prediction using machine l...
Table 22.2 Comparison of F1-score for schizophrenia prediction.
Chapter 23
Table 23.1 Various features of utilized data.
Table 23.2 Training data (before normalization).
Table 23.3 Testing results.
Table 23.4 Performance evaluations results (linear SVM).
Table 23.5 Linear SVR comparative values.
Table 23.6 Performance evaluations results (quadratic SVM).
Table 23.7 Quadratic SVR comparative values.
Table 23.8 Performance evaluations results (cubic SVM).
Table 23.9 Cubic SVR comparative values.
Table 23.10 Performance evaluations results (fine Gaussian SVM).
Table 23.11 Fine Gaussian SVR comparative values.
Chapter 24
Table 24.1 Dataset used.
Chapter 25
Table 25.1 The comparison: 4G vs. 5G.
Table 25.2 Theoretical 4G vs. 5G, speed monitor various parameters result anal...
Table 25.3 Theoretical 4G vs. 5G, speed monitor various parameters result anal...
Chapter 27
Table 27.1 Sfcm-p is the spatial fuzzy c-means filtering the accuracy values a...
Table 27.2 The accuracy for the BiFKC model is tabulated.
Table 27.3 Group statistical analysis of mean, standard deviation (STD) and st...
Table 27.4 SPSS statistics depicts the accuracy of the SFCM-P and the BiFKC-ba...
Table 27.5 Comparative analysis of different modules proposed in this research...
Chapter 28
Table 28.1 Accuracy comparison of GoogleNet and AlexNet algorithm.
Table 28.2 The average accuracy and standard deviation for the Novel GoogleNet...
Table 28.3 The independent sample test indicated a significant difference in a...
Chapter 29
Table 29.1 Accuracy comparison of PSO classifier and LR.
Table 29.2 The average accuracy and standard deviation for the novel PSO and L...
Table 29.3 The independent sample test highlighted a notable difference in the...
Chapter 30
Table 30.1 Statistical analysis of GoogleNet and CNN.
Table 30.2 Independent sample T-test: CNN is significantly better than GoogleN...
Chapter 31
Table 31.1 CAI aspects [16–20].
Table 31.2 CAI for business applications [21–24].
Table 31.3 CAI tools [25, 26].
Table 31.4 Comparative study of techniques.
Table 31.5 CAI techniques.
Table 31.6 CAI issues.
Chapter 32
Table 32.1 Comparative study of literature reviews.
Table 32.2 E-Publication database’s IE.
Table 32.3 Research publications.
Table 32.4 Keywords in IE.
Chapter 33
Table 33.1 Processes of the knowledge and the valorization frameworks.
Table 33.2 Networks dynamic interactions.
Table 33.3 Demand-supply mechanism.
Chapter 1
Figure 1.1 A flowchart illustrating a cutting-edge hybrid method that combines...
Figure 1.2 Comparative analysis of the Hybrid Approach Algorithm and CNN. The ...
Chapter 2
Figure 2.1 Comparison of NHR and ARIMA model. The NHR (84.61%) regression outp...
Chapter 3
Figure 3.1 Flow diagram of stress detection.
Figure 3.2 In terms of predicting stress among IT workers due to work pressure...
Chapter 4
Figure 4.1 Detecting the accuracy for two algorithms, the accuracy of the naiv...
Chapter 5
Figure 5.1 The proposed method accuracy is greater than the conventional one. ...
Chapter 6
Figure 6.1 The accuracy rate of the inception classifier and the Alexnet algor...
Chapter 7
Figure 7.1 Flow diagram for the proposed system.
Figure 7.2 The graphical depiction compares novel RF against LR classifiers on...
Chapter 8
Figure 8.1 A comparative analysis is performed on the accuracies of the multic...
Chapter 9
Figure 9.1 Comparison of RF and novel XGB Classifier in terms of mean accuracy...
Chapter 10
Figure 10.1 Block diagram of robust medical image watermarking based on embedd...
Figure 10.2 (a) Original medical image, (b) a watermarked image with correspon...
Figure 10.3 Outputs of CT image watermarking, (a) DCT recovered image, and (b)...
Figure 10.4 Bar chart representing the comparison of mean PSNR of the watermar...
Chapter 11
Figure 11.1 The block diagram for BPSK and OOK with DCO-OFDM.
Figure 11.2 Simulation result.
Figure 11.3 Comparison of BPSK and OOK performance.
Chapter 12
Figure 12.1 K-nearest neighbor is better than SVM.
Chapter 13
Figure 13.1 Flowchart for finding the accuracy for hybrid CNN, artificial neur...
Figure 13.2 The artificial neural network and hybrid CNN-based cells and plate...
Figure 13.3 Independent sample tests were used to design and examine the convo...
Chapter 14
Figure 14.1 The design of a multi-band meta ring array is shown.
Figure 14.2 Radiated power of meta ring array antenna 5 dB at 1 GHz to 6 GHz (...
Figure 14.3 Bar chart comparing the mean (+/−2 SD) of radiated power of double...
Chapter 15
Figure 15.1 Tourism in India.
Figure 15.2 Recommendation system for tourism using Facebook check-in data [11...
Figure 15.3 Collaborative filtering model.
Figure 15.4 Content-based filtering model.
Figure 15.5 Neural network architecture.
Figure 15.6 CNN for recommendation.
Figure 15.7 Semantic analysis for recommender system.
Figure 15.8 Genetic algorithm approach.
Chapter 16
Figure 16.1 Example of ad hoc networks.
Figure 16.2 Proposed hybrid network architecture for the disaster recovery sys...
Figure 16.3 Network topology of hybrid network.
Figure 16.4 Network topology of secure hybrid model.
Figure 16.5 Network throughput between hybrid and secure hybrid models.
Figure 16.6 Packet-delivery ratio between hybrid and secure hybrid model.
Figure 16.7 Load on the network.
Figure 16.8 Packet drop rate.
Chapter 17
Figure 17.1 Classification algorithms in detail [8].
Figure 17.2 Diagram of social media sentiment analysis [23].
Chapter 18
Figure 18.1 Magnet design with a cut at the corners for RADIA.
Figure 18.2 Magnet design without cutting at the corners from RADIA.
Figure 18.3 Symmetric end field configuration with a half magnet at each undul...
Figure 18.4 Symmetric end field configuration with a half magnet at each undul...
Figure 18.5 Magnetic flux density versus longitudinal position of the undulato...
Figure 18.6 First field integral for the symmetric end design.
Figure 18.7 Second field integral for the symmetric end design.
Figure 18.8 Magnetic flux density versus longitudinal position of the undulato...
Figure 18.9 First field integral for symmetric end design.
Figure 18.10 Second field integral for the symmetric end design.
Figure 18.11 Magnetic flux density versus gap.
Figure 18.12 Difference in magnetic flux density versus gap from both designs.
Figure 18.13 Comparison of first field integral versus gap for both designs.
Figure 18.14 Comparison of second field integral versus gap for both designs.
Figure 18.15 Angular offset versus undulator gap for both the design.
Figure 18.16 Trajectory deviation versus undulator gap.
Chapter 19
Figure 19.1 Process diagram of the proposed approach.
Figure 19.2 CFFNN with traingdx function.
Figure 19.3 CFFNN with trainlm function.
Chapter 20
Figure 20.1 Deep learning roles in data science [22].
Figure 20.2 Deep learning approaches [19].
Figure 20.3 Classification of supervised DL.
Figure 20.4 Classification of semi-supervised DL.
Figure 20.5 Classification of unsupervised DL.
Figure 20.6 Schematic structure of MLP.
Figure 20.7 Schematic structure of RvNN.
Figure 20.8 Schematic structure of CNN layers.
Chapter 21
Figure 21.1 The architecture of AI medical assistant. AR enhancing perception.
Figure 21.2 Correlation coefficients R2 between LBNP and CRM and CRI.
Chapter 22
Figure 22.1 Dataset class distribution on schizophrenia.
Figure 22.2 Proposed methodology for schizophrenia prediction.
Figure 22.3 ROC curve for the proposed methodology.
Figure 22.4 Confusion matrix for the algorithms used for schizophrenia predict...
Figure 22.5 Precision-recall curve for the proposed methodology.
Figure 22.6 F1-scores comparison between various methods.
Chapter 23
Figure 23.1 Architecture of the model designed for predicting stock opening pr...
Figure 23.2 Selected opening stock prices and their corresponding trading date...
Figure 23.3 Graph indicating the opening stock prices.
Figure 23.4 Actual opening stock market (blue) price vs quadratic and cubic pr...
Figure 23.5 Comparison of actual stock price (blue) vs predicted on quadratic ...
Figure 23.6 Actual opening (blue) vs. linear predicted (red).
Figure 23.7 Comparisons of actual (blue) vs. predicted on fine Gaussian (red).
Chapter 24
Figure 24.1 Comparison of different methods of classification.
Figure 24.2 The common architecture of text classification.
Figure 24.3 Fake news classification model.
Figure 24.4 Proposed text classification model.
Figure 24.5 Performance of different feature selection technique with CNN clas...
Figure 24.6 Efficiency of the feature selection techniques in terms of (a) tra...
Chapter 25
Figure 25.1 Theoretical 4G vs. 5G speed.
Figure 25.2 Live 4G vs. 5G speed.
Chapter 26
Figure 26.1 Flow chart of developed machine.
Figure 26.2 Frame and parts fitting.
Figure 26.3 3D frame and parts fitting.
Figure 26.4 Percentage of disinfection.
Chapter 27
Figure 27.1 Bar chart comparison of accuracy of the SFCM-P model and the BiFKC...
Figure 27.2 Proposed RFC-ConvNet works with the BiFKC segmentation and classif...
Figure 27.3 Similarity index between the detected BT lesion spot region and it...
Figure 27.4 Clinical observation for infectious depth spreads of BT lesion seg...
Chapter 28
Figure 28.1 A comparison of mean accuracy between the Novel GoogleNet and Alex...
Chapter 29
Figure 29.1 A comparison of the mean accuracy rates for detecting counterfeit ...
Chapter 30
Figure 30.1 Block diagram of novel convolutional neural network algorithm and ...
Figure 30.2 Preprocessed images with novel CNN and GoogleNet.
Figure 30.3 Simple bar mean of accuracy.
Chapter 32
Figure 32.1 RQ.
Figure 32.2 Observational studies filtering technique.
Figure 32.3 Review criteria.
Figure 32.4 Paper processing and stratification.
Figure 32.5 Observational studies theme chart.
Figure 32.6 Most recent IE ICSS-focused CICS applications.
Figure 32.7 Patterns of threats analysis.
Figure 32.8 CCSC datasets.
Chapter 33
Figure 33.1 The hexagon of LHC processes interactions.
Figure 33.2 The landscapes, heritage, and culture x-management system.
Figure 33.3 Informative query-answer learning interaction mechanism.
Figure 33.4 Operative demand-supply learning interaction mechanism.
Figure 33.5 Management of the dual roles of two entities i and j.
Figure 33.6 Dynamic data–driven application systems for LHC learning interacti...
Figure 33.7 Distributed augmented (human-artificial) intelligence systems.
Cover Page
Table of Contents
Series Page
Title Page
Copyright Page
Preface
Begin Reading
About the Editors
Index
Also of Interest
WILEY END USER LICENSE AGREEMENT
ii
iii
iv
xvii
xviii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
Scrivener Publishing100 Cummings Center, Suite 541JBeverly, MA 01915-6106
Publishers at ScrivenerMartin Scrivener ([email protected])Phillip Carmical ([email protected])
Edited by
Premanand Singh Chauhan
Rajesh Arya
Rajesh Kumar Chakrawarti
Elammaran Jayamani
Neelam Sharma
and
Romil Rawat
This edition first published 2025 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA© 2025 Scrivener Publishing LLCFor more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
Wiley Global Headquarters111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Limit of Liability/Disclaimer of WarrantyWhile the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Library of Congress Cataloging-in-Publication Data
ISBN 978-1-394-30578-0
Front cover images supplied by Adobe FireflyCover design by Russell Richardson
The book focusses on advanced computing, or machine intelligence, the ability of a technology (a machine, device, or algorithm) to interact with its surroundings intelligently. This means that the technology can make decisions and take actions that will increase the likelihood that its objectives will be met. In contrast to the natural intelligence exhibited by people, artificial intelligence (AI), sometimes referred to as machine intelligence, is intelligence manifested by machines. The modern world is experiencing a period of paradigm shifts. New technologies have contributed to these shifts in part because they offer high-speed computing capabilities that make complicated machine intelligence systems possible. These advancements are paving the way for the creation of new cyber systems, which employ continually generated data to construct machine intelligence models that carry out specific functions inside the system. While the isolated use of cyber systems is becoming more common, the synchronic integration of these systems with other cyber systems to create a compact and intelligent structure that can interact deeply and independently with a physical system is still largely unanswered and has only been briefly discussed from a philosophical perspective in a few works.
Modern civilisation has undergone many paradigms shifts as a result of technological breakthroughs. These developments brought in immense data creation, cloud data storage systems, near-instantaneous worldwide information exchange, very quick computer capabilities, etc. Additionally, they paved the way for the development of cutting-edge cyber systems that employ systematically created data pipelines to carry out certain tasks. For instance, in certain nations, video surveillance imagery is used to detect criminals or possible criminals using machine intelligence (MI) models. Moreover, autonomous MI systems have applications in the medical field, where they enable prompt detection of infections like COVID-19. The chemical industry also uses a variety of applications.