𝔖 Scriptorium
✦   LIBER   ✦

📁

Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough: Volume 4 (Studies in Computational Intelligence, 1117)

✍ Scribed by Vinit Kumar Gunjan, Jacek M. Zurada, Ninni Singh


Publisher
Springer
Year
2024
Tongue
English
Leaves
337
Series
Studies in Computational Intelligence, 1117
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book provides a systematic and comprehensive overview of cognitive intelligence and AI-enabled IoT ecosystem and machine learning, capable of recognizing the object pattern in complex and large data sets. A remarkable success has been experienced in the last decade by emulating the brain–computer interface. It presents the applied cognitive science methods and AI-enabled technologies that have played a vital role at the core of practical solutions for a wide scope of tasks between handheld apps and industrial process control, autonomous vehicles, IoT, intelligent learning environment, game theory, human computer interaction, environmental policies, life sciences, playing computer games, computational theory, and engineering development. The book contains contents highlighting artificial neural networks that are analogous to the networks of neurons that comprise the brain and have given computers the ability to distinguish an image of a cat from one of a coconut, to spot pedestrians with enough accuracy to direct a self-driving car, and to recognize and respond to the spoken word. The chapters in this book focus on audiences interested in artificial intelligence, machine learning, fuzzy, cognitive and neurofuzzy-inspired computational systems, their theories, mechanisms, and architecture, which underline human and animal behavior, and their application to conscious and intelligent systems. In the current version, it focuses on the successful implementation and step-by-step execution and explanation of practical applications of the domain. It also offers a wide range of inspiring and interesting cutting-edge contributions on applications of machine learning, artificial intelligence, and cognitive science such as healthcare products, AI-enabled IoT, gaming, medical, and engineering. Overall, this book provides valuable information on effective, cutting-edge techniques, and approaches for students, researchers, practitioners, and academics in the field of machine learning and cognitive science. Furthermore, the purpose of this book is to address the interests of a broad spectrum of practitioners, students, and researchers, who are interested in applying machine learning and cognitive science methods in their respective domains.

✦ Table of Contents


Contents
Implementation of Improved High Speed SHA-256 Algorithm from RTL to GDSII Using Verilog HDL
1 Introduction
2 Normative SHA-256 System Architecture
2.1 Padding the Input Message (M)
2.2 Parsing the Padded Input
2.3 Message Scheduling Function
2.4 Mechanism of Message Compression
2.5 Intermediate Hash Generation
3 Improved SHA-256 System Architecture
3.1 Proposed Work
4 Reducing 3 Adders to 2 Adders in Message Scheduling
5 Reducing 11 Adders to 5 Adders in Message Compression
6 Results of Simulation and Synthesis Reports
6.1 Simulation Results
6.2 Synthesis Results
7 Conclusion
References
Effect of Social Networking Advertisements (SNAs) on Attitudes and Purchase Intention Towards Brand Products
1 Introduction
2 Review of Literature
3 Objectives of the Study
4 Significancy of the Study
5 Research Methodology
6 Conceptual Model
7 Data Analysis
8 Findings of the Study
9 Conclusion
10 Future Direction of the Study
References
Design of Optimal Waste Management System Using IOT and Machine Learning Technique in Educational Institutions
1 Introduction
2 Literature Survey
3 Existing Methodology
4 Proposed Methodology
5 Experimental Results
6 Conclusion
References
Detection of COVID-19 Based on Deep Learning Methods: A Critical Review
1 Introduction
2 Literature Review
3 Conclusion
References
Performance Evaluation of GA, HS, PSO Algorithms for Optimizing Area, Wirelength Using MCNC Architectures
1 Introduction
2 Literature Review
3 Simulation Results
3.1 Simulation Results of MCNC Benchmark Circuits for PSO Algorithm
3.2 Simulation Results of MCNC Benchmark Circuits for Genetic Algorithm
3.3 Simulation Results of MCNC Benchmark Circuits for HS Algorithm
4 Statistical Comparison
5 Conclusion
References
An Enhanced Woelfel Image Noise Filter
1 Introduction
1.1 Need and Significance of the Proposed Work
2 Proposed Methodology
3 Conclusion
References
MHD Convective Flow of Chemically Reacting Viscoelastic Fluid Through an Infinite Inclined Plate via Machine Learning
1 Introduction
2 Formulation of the Model Problem
3 Method of Solution
4 Results and Findings
5 Conclusions
References
Improved Stockwell Transform for Image Compression and Reconstruction
1 Introduction
2 Review of Literature
3 Methodology & Implementation
3.1 Visual Data Base Collection
3.2 Implementation of Algorithms
3.3 Testing
3.4 Analysis
3.5 Modified Algorithm
3.6 Test Modified Algorithm
3.7 Expected Outcome
4 Experimental Investigation and Analysis
5 Conclusion
References
Facemask Detection Using Bounding Box Algortihm Under COVID-19 Circumstances
1 Introduction
2 Methodology
3 Design and Process Flow of Implementation
4 Experimental Investigations
5 Conclusion
References
Accelerated Addition in Resistive Ram Array Using Parallel-Friendly Majority Gates
1 Introduction
2 QCA Overview
3 Existing RAM Cell
4 Proposed RAM Cell
5 Simulation Results
6 Conclusion
References
Optimization of Area and Wirelength Using Hybrid BPSO Algorithm in VLSI Floorplan and Placement for IC Design
1 Introduction
1.1 Background
1.2 Objectives
1.3 Need and Importance
2 Literature Review
2.1 Drawbacks
3 Methodology
3.1 Existing Method
3.2 Proposed Method
4 Implementation Tool
5 Results and Discussion
5.1 Output 1
5.2 Output 2
5.3 Output 3
5.4 Comparative Results
6 Conclusion
References
PAPR and SER Performance Analysis of OFDMA and SCFDMA
1 Introduction
2 Literature Review
3 Methodology and Process Flow
4 Results and Analysis
References
Food Detection with Image Processing Using Convolutional Neural Network (CNN)
1 Introduction
2 Literature Review
3 Methodology
3.1 Existing Method
3.2 Proposed Method
4 Conclusion
References
Google Appstore Data Classification Using ML Based Naïve’s Bayes Algorithm: A Review
1 Introduction
2 Literature Review
2.1 Random Forest Algorithm Based on Data Classification—Machine Learning
2.2 Classification of Data Using Decision Tree Classifier-Machine Learning Techniques
3 Classification of Data Using Support Vector Machines-Machine Learning
4 Classification Using Logistic Regression Algorithm-Machine Learning
5 Data Classification Using KNN Algorithm-Machine Learning
6 Limitations
References
Improved Spectral Efficiency Using Vehicular Visible Light Communication with 16-Bit DCO in OFDM
1 Introduction
2 Literature Review
3 Existing Methodology
4 Proposed Methodology
5 Results
6 Conclusion
References
Modelling of Symmetrical 13 Level and Asymmetrical 31 Level Generalized Cascaded Multilevel Inverters
1 Introduction
2 Proposed Sub Multilevel Inverter Topology
3 Proposed Generalized Cascaded Multilevel Inverter Topology
4 Seven Level Multi Level Inverters
4.1 Conventional Seven Level Cascaded H-Bridge MLI
5 Modulation Method
6 Symmetrical 13 Level Proposed Generalized Cascaded MLI
7 Proposed Asymmetrical 31 Level Generalized Cascaded MLI
8 Conventional Single Phase 31 Level Cascaded MLI
9 Modeling of Three Phase Induction Motor
10 Simulation Results and Analysis
11 Conclusion
References
Improved Radix-4 Fast Fourier Transform Algorithm Used for Wireless Communication
1 Introduction
2 General Radix-4 Algorithm
3 Improved Radix-4 Algorithm
4 Simulation Results
5 Conclusion
References
Methodologies in Steganography and Cryptography–Review
1 1. Introduction
2 2. Steganography versus cryptography
3 Methodologies
4 Conclusion
References
Study of Secure Data Transmission-Based Wavelets Using Steganography and Cryptography Techniques
1 Introduction
2 Background
3 Approaches Used by Existing Researchers
3.1 RSA Algorithm
4 Steganography Based Data Transmission
5 Data Transfer Using Video Steganography
6 Image Steganography for Data Transmission
7 Data Transmission Using Image Cryptography
8 Data Transmission Using Cryptography
9 Error Metrics
10 Conclusions
References
A Review: Object Detection and Classification Using Side Scan Sonar Images via Deep Learning Techniques
1 Introduction
2 Object Detection in Underwater
2.1 SSS Images
3 Pipeline Detection in Underwater
4 Other Existing Literature Studies in Underwater Object Detection
5 Overall State-of-Art
6 Conclusion
References
Analysis of High Performance Optical Networks Using Dense Wavelength-Division Multiplexing Application
1 Introduction
2 Related Work
3 Materials and Method
3.1 Source Information (Input) and Electrical Stage Transmitter
3.2 Optical Network
3.3 Photodetector
3.4 Dense Wavelength-Division Multiplexing (DWDM)
4 Result and Discussion
5 Conclusion
References
Wireless Sensor Network to Improve Security Performance and Packet Delivery Ratio Using FCL-Boost Based Classification Method
1 Introduction
1.1 Machine Learning Algorithm
1.2 Security Level of Methods
1.3 Wireless Sensor Network Behavior
2 Related Works
3 Materials and Methods
3.1 Collection of Data From the Classifier
3.2 Classifier-Based Ensemble Classifier: FCLBoost.L1
3.3 Functional Integrated Classifier: FCLBoost.L2
3.4 Route Energy Path
4 Result and Discussion
4.1 Implementation and Experimental Results
4.2 FCL-Boost Network Performance
4.3 Time Complexity
4.4 Average Throughput
4.5 Packet Transfer Ratio
5 Conclusion
References
To Analyse the Impact of Integration of Wind and Solar Power Generation System for Uttarakhand, Haryana and Rajasthan: A Scope of Machine Learning
1 Introduction
1.1 Energy Crisis and Renewable Energy Use
1.2 Integration of Machine Learning
2 Renewable Energy Sources Distribution
3 Recent Method and Techniques Used in Hybrid Renewable Energy System
4 Hybrid Renewable Energy System for Different Geographical Condition
4.1 Status of Hybrid System Power Generation System for Uttarakhand, Haryana, and Rajasthan
4.2 Analyse the Wind and Solar Power Generation System for Uttarakhand, Haryana, and Rajasthan
5 Scope of Research and Adoptability of Machine Learning
6 Conclusion and Future Scope
References
VLSI Implementation of an 8051 Microcontroller Using VHDL and  Re-Corrective Measure Using AI
1 Introduction
2 Background
3 Proposed Architecture and Methodology
4 Implementation and Result
5 Corrective Measure Using AI in VLSI Implementation of an 8051-Microcontroller
6 Conclusion and Future Scope
References
K-Mean Energy Efficient Optimal Cluster Based Routing Protocol in Vehicular Ad-Hoc Networks
1 Introduction
2 Related Works
2.1 Energy Efficient Clustering Methods
2.2 Machine Learning Based Energy Efficient
3 Proposed Energy Consumption Model and K-means Clustering Algorithms
4 Process of K-Means Clustering
5 Evaluation Metrics
6 Conclusion
References
Dandelion Algorithm for Optimal Location and Sizing of Battery Energy Storage Systems in Electrical Distribution Networks
1 Introduction
2 Battery Energy Storage System
3 Problem Formulation
4 Dandelion Algorithm
4.1 Normal Sowing
4.2 Mutation Sowing for the Core Dandelion
5 Results
5.1 Simulations on IEEE 33-Bus Test System
5.2 Simulations on IEEE 69-Bus Test System
6 Conclusion
References
A Survey of Internet of Things Frameworks for Crowd Management System
1 Introduction
2 Basics of IoT
3 Functional Blocks
4 Protocols
5 Applications
6 IoT Based Framework for Crowd Management System
7 Conclusion
References
Performance Analysis of Patient Centric EHR Through Hyperledger Fabric
1 Introduction
1.1 Types of Health Record
1.2 Problems with Current EMR Systems
2 Blockchain Technology
2.1 What is Blockchain?
2.2 Types of Blockchain
2.3 Consensus Mechanism
3 Understanding Hyperledger Fabric in Detail
3.1 Simple Hyperledger Fabric Network
3.2 Type of Nodes
3.3 Smart Contract and Chaincode
3.4 Benefits of Blockchain in EMR
4 Implementation of Hyperledger Fabric Network
5 Conclusion
References


📜 SIMILAR VOLUMES


Modern Approaches in Machine Learning &
✍ Vinit Kumar Gunjan, Jacek M. Zurada 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book provides a systematic and comprehensive overview of AI and machine learning which have got the ability to identify patterns in large and complex data sets. A remarkable success has been experienced in the last decade by emulating the brain computer interface. It presents the cogni

Modern Approaches in Machine Learning an
✍ Vinit Kumar Gunjan, Jacek M. Zurada, Balasubramanian Raman, G. R. Gangadharan 📂 Library 📅 2020 🏛 Springer International Publishing;Springer 🌐 English

<p><p>This book discusses various machine learning & cognitive science approaches, presenting high-throughput research by experts in this area. Bringing together machine learning, cognitive science and other aspects of artificial intelligence to help provide a roadmap for future research on intellig

Machine Learning Approaches for Urban Co
✍ Mainak Bandyopadhyay (editor), Minakhi Rout (editor), Suresh Chandra Satapathy ( 📂 Library 🏛 Springer 🌐 English

<p><span>This book discusses various machine learning applications and models, developed using heterogeneous data, which helps in a comprehensive prediction, optimization, association analysis, cluster analysis and classification-related applications for various activities in urban area. It details

Combinatorial Machine Learning: A Rough
✍ Mikhail Moshkov, Beata Zielosko 📂 Library 📅 2011 🏛 Springer 🌐 English

<p><span>Decision trees and decision rule systems are widely used in different applications</span></p><p><span>as algorithms for problem solving, as predictors, and as a way for</span></p><p><span>knowledge representation. Reducts play key role in the problem of attribute</span></p><p><span>(feature