+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Intelligent Technologies for Research and Engineering

  • Book

  • July 2024
  • Bentham Science Publishers Ltd
  • ID: 5983654

This volume explores diverse applications for automated machine learning and predictive analytics. The content provides use cases for machine learning in different industries such as healthcare, agriculture, cybersecurity, computing and transportation. 
 
Key highlights of this volume include topics on engineering for underwater navigation, and computer vision for healthcare and biometric applications.

Chapters 1-4 delve into innovative signal detection, biometric authentication, underwater AUV localization, and COVID-19 face mask detection. Chapters 5-9 focus on wireless pH sensing, differential pattern identification, economic considerations in off-grid hybrid power, high optimization of image transmission, and ANN-based IoT-bot traffic detection. Chapters 10-12 cover mixed-signal VLSI design, pre-placement 3D floor planning, and bio-mimic robotic fish. Finally, Chapters 13 and 14 explore underwater robotic fish and IoT-based automatic irrigation systems, providing a comprehensive overview of cutting-edge technological advancements.
 
The book is a resource for academics, researchers, educators and professionals in the technology sector who want to learn about current trends in intelligent technologies.

Table of Contents

Chapter 1 A Fuzzy Based High-Performance Decision-Making Model For Signal Detection in Smart Antenna Through Preference Leveled Evaluation Functions

  • Introduction 
  • Antenna Engineering 
  • Machine Learning in Antenna Design 
  • Deep Learning Versus Machine Learning 
  • Application of Machine Learning Algorithm in Smart Antenna 
  • The Background 
  • The Smart Antenna 
  • The Difference Between Conventional Array and Beamforming Array 
  • Comparison Between Switched and the Adaptive Array Antenna 
  • Preference Leveled Evaluation Functions Method to Construct Fuzzy Measures 
  • Construction Method Using Preference Leveled Evaluation Functions 
  • Proposed Model 
  • Signal Range Detection 
  • Parameterized Fuzzy Measures Decision-Making Model Clustering Method (Pfmdmm) For
  • Signal Detection 
  • Deep Learning Model for Best Signal Selection 
  • Experimental Results 
  • Data Source 
  • Illustrative Example 
  • Experiments With Laboratory Data 
  • Conclusion 
  • References 

Chapter 2 Multimodal Biometric Authentication Using Watermarking 20

  • Introduction 
  • Literature Survey 
  • Sub Band Splitting Technique for Embedding the Fingerprint 
  • Maintaining the Integrity of the Specifications 
  • Problem Description 
  • Proposed Multimodal Biometric System 
  • Watermarking 
  • Discrete Wavelet Transform 
  • Inverse Discrete Wavelet Transform 
  • Results 
  • Extracting Face Textures 
  • Embedding Fingerprint Watermark 
  • Extracting Fingerprint Watermark 
  • Integrity Verification of Watermark 
  • Performance Evaluation 
  • Peak Signal-To-Noise Ratio 
  • Mean Square Error (Mse) 
  • Conclusion 
  • References 

Chapter 3 Underwater Auv Localization With Optimal Cardinal Selection Using Dynamic Positioning Parameters 

  • Introduction 
  • Issues to Be Addressed by Routing Protocol 
  • The List of Issues Addressed by the Routing Protocols is as Follows 
  • Challenges in Underwater Communications 
  • Noise in Underwater 
  • Channel Attenuation 
  • Limited Bandwidth 
  • 2-S Localization Process for Communication 
  • Details and Mathematical Models for Network Environment Routing 
  • The Environment of the Network 
  • Mathematical Model 
  • Agencies 
  • Agent-Based Route Discovery Process 
  • Simulation 
  • Simulation Model 
  • Simulation Procedure 
  • Results 
  • Time and Energy of the Clustering Process 
  • Energy Consumption 
  • Packet Delivery Ratio 
  • Conclusion 
  • References 

Chapter 4 Detection of COVID-19 Pandemic Face Mask Using Convnet In Busy Environments 

  • Introduction 
  • Literature Survey 
  • Research Methodologies 
  • Dataset 
  • Proposed Methodology 
  • Data Collection 
  • Preprocessing and Augmentation of Data 
  • Proposed Conv Net Architecture 
  • Four Convolution Layer With Max and Average Pooling 
  • Mobilenetv2 Architecture 
  • Face Mask Detector Face Detection Using Open-Cv 
  • Using a Performance Matrix to Evaluate Performance 
  • Results and Analysis 
  • Conclusion 
  • References 

Chapter 5 Wireless Ph Sensor Employing Zigbee 3.0 Protocol 

  • Introduction 
  • Theory and Principle 
  • Introduction to Embedded Systems 
  • Ph Control Systems Working 
  • Zigbee 3.0 Protocol 
  • Wireless Ph Monitoring Using Zigbee 3.0 Protocol 
  • Conclusion 
  • References 

Chapter 6 Identification of Differential Pattern in Ades Al: Initiation 78

  • Introduction 
  • Materials and Methods 
  • Analytics 
  • Experiment 
  • Mapping 
  • Quantification 
  • Expression 
  • Annotation 
  • Result 
  • Conclusion 
  • References 

Chapter 7 Comparative Modelling and Binding Compatibility of Bi- Functional Proteins in Microcystis Aeruginosa 

  • Introduction 
  • Materials and Methods 
  • Result 
  • Conclusion 
  • References 

Chapter 8 Economic Consideration of An Off-Grid Hybrid Power Generation System Using Renewable Energy Technologies: Case Study Of An Institutional Area in the State of Rajasthan 

  • Introduction 
  • Related Literature Review 
  • Objectives and Input Datas Required 
  • Objectives 
  • Input Data Required 
  • Resources Feasibility 
  • Load Data 
  • Architecture of Hybrid System 
  • Specification of Fuel Used 
  • Results and Discussion 
  • Conclusion and Further Recommendations 
  • References 

Chapter 9 High Optimization of Image Transmission and Object Detection Technique for Wireless Multimedia Sensor Network 

  • Introduction 
  • Related Work 
  • Target Tracking by Particle Filtering in Binary Sensor Networks 
  • Image Texture Feature Extraction Using Glcm Approach 
  • Co-Occurrence Matrix and Its Statistical Features 
  • Proposed System 
  • Kalman Filter 
  • Kalman Filter Extensions 
  • Extended Kalman Filter (Ekf) 
  • Iterated Extended Kalman Filter (Iekf) 
  • Flow Chart of Robust Detector (Fig. 1) 
  • Gabor Filter 
  • Requirement 
  • Simulation Results 
  • Input File 
  • Face (Object) Detection 
  • Total Number of Faces 
  • Object Matching With Training Set 
  • Histogram for Detected Faces 
  • Biograph Model 
  • Input Video 2 
  • Foreground Image of Car 
  • Conclusion 
  • References 

Chapter 10 Ann Based Malicious Iot-Bot Traffic Detection in IoT Network 

  • Introduction 
  • Existing System 
  • Support Vector Machine Algorithm 
  • Naive Bayes Classifier 
  • Decision Trees 
  • Proposed System 
  • Data Pre-Processing in Machine Learning 
  • Splitting Data 
  • Training Data 
  • Validation Data 
  • Test Data 
  • Predicator 
  • Artificial Neural Networks 
  • Artificial Neural Network Layers 
  • Input Layer 
  • Hidden Layer 
  • Output Layer 
  • Structure of a Neural Network 
  • Activation Function 
  • Sigmoid () Function 
  • Relu () Function 
  • Cost Function 
  • Cross Entropy 
  • Gradient Descent 
  • Performance Metrics 

Author

  • S. Kannadhasan
  • R. Nagarajan
  • Alagar Karthick
  • K.K. Saravanan