Selvi G. IoT and Machine Learning for Smart Applications 2025
Selvi G. IoT and Machine Learning for Smart Applications 2025
Machine Learning
for Smart Applications
This book provides an illustration of the various methods and structures that are
utilized in machine learning to make use of data that is generated by IoT devices.
Numerous industries utilize machine learning, specifically machine learning-as-a-
service (MLaaS), to realize IoT to its full potential. On the application of machine
learning to smart IoT applications, it becomes easier to observe, methodically ana
lyze, and process a large amount of data to be used in various fields.
Features:
• Explains the current methods and algorithms used in machine learning and
IoT knowledge discovery for smart applications
• Covers machine-learning approaches that address the difficulties posed by
IoT-generated data for smart applications
• Describes how various methods are used to extract higher-level information
from IoT-generated data
• Presents the latest technologies and research findings on IoT for smart
applications
• Focuses on how machine learning algorithms are used in various real-world
smart applications and engineering problems
Edited by
G. Vennira Selvi, T. Ganesh Kumar, M. Prasad,
Raju Hajare, and Priti Rishi
CRC Press
Taylor &. Francis Group
Boca Raton London New York
© 2025 selection and editorial matter, G. Vennira Selvi, T. Ganesh Kumar, M. Prasad, Raju Hajare, and
Priti Rishi; individual chapters, the contributors
Reasonable efforts have been made to publish reliable data and information, but the author and publisher
cannot assume responsibility for the validity of all materials or the consequences of their use. The authors
and publishers have attempted to trace the copyright holders of all material reproduced in this publication
and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any future
reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com or
contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750
8400. For works that are not available on CCC please contact [email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used
only for identification and explanation without intent to infringe.
DOI: 10.1201/9781032623276
Typeset in Times
by Newgen Publishing UK
Contents
About the Editors .......................................................................................................... vii
Contributors .................................................................................................................... ix
v
vi Contents
□. SoftArchive
vii
viii About the Editors
ix
x Contributors
K. Prabha S. Saranyadevi
Department of Computer Science Department of Biotechnology
Arunachala Arts and Science (Women) Paavai Engineering College
College (Autonomous)
Tamil Nadu, India Namakkal, India
P. Sivakumar Vaissnavie V.
School of Computer Science and Sathyabama Institute of Science and
Engineering Technology
Vellore Institute of Technology Chennai, India
Chennai, India
Kavitha V.P.
S.K. Somasundaram SRM Institute of Science and
School of Computer Science and Technology
Engineering Vadapalani Campus
Vellore Institute of Technology Chennai, India
Vellore, India
Balasaraswathi V.R.
Nathezhtha T. Vellore Institute of Technology
Vellore Institute of Technology Chennai, India
Chennai, India
Recent Advances
1 in Machine Learning
Strategies and Its
Applications
S. Saranyadevi and Lekshmi Gangadhar
1.1 INTRODUCTION
The domain of computer science called machine learning (ML) aids machines in
learning without explicitly predetermined [1]. Rather than utilizing programing to
perform tasks, ML comprises the conception of algorithms. Machines pick up know
ledge from historical patterns and examples from their previous experience. Models
are used to estimate new values can be constructed. When the amount of data and
queries is too great for natural solutions, ML can be used to help identify answers by
analyzing the data. It can make it easier for users to find crucial information faster.
Because machines learn faster and can even outclass humans in a few sectors, they
can easily tackle complex issues [2]. Its demand is constantly rising as a result. ML is
growing in relevance along with big data and cloud computing because of how many
problems it can solve with its computational capacity. It has a wider variety of uses
in other fields, particularly because it mainly helps in the unearthing of novel drugs
and enables physicians to diagnose patients accurately, enabling the early detection
of numerous ailments.
In the field of data analysis and computing, artificial intelligence (AI), particularly
ML, can be expanded quickly nowadays, usually enabling the applications to perform
intelligently [3]. In general, ML is the well-liked new technology in the fourth indus
trial revolution (Industry 4.0) since it makes systems capable of automatically learning
from experience and improving without the need for special programing [4-6].
DOI: 10.1201/9781032623276-1 1
2 IoT and Machine Learning for Smart Applications
problem, we find patterns that characterize a significant section of the dataset, like
predicting that buyers of X will probably purchase Y.
encouraging behaviors that yield higher rewards while discouraging those leading to
lower or negative rewards. This component is crucial in shaping the agent’s behavior
over time, as it learns to optimize actions that maximize cumulative rewards in the
long run.
This mechanism results in a drift to the dendritic. Terminals that guide the output
to the subsequently linked neuron with the aid of an axon. The neural network that
allows electrical signals to flow throughout the brain comprises these connections
between neurons. An artificial neural network (ANN) functions similarly and has
three layers [11]. Three primary forms of ANNs exist: Reinforcement, unsuper
vised, and supervised [12].
1.3.2 Cybersecurity
Internet is prevalently employed for information and services alike. According to the
author [13], nearly 48% of the world’s populace has utilized the Internet as a source
of acquaintance since 2017. In developed nations, this percentage rises to 82%, as the
study [13] concludes. The Internet is a connectivity of various devices, networks, and
computers. Its primary function is to transfer data between devices via networks. The
improvements and breakthroughs in computer systems and mobile device networks
caused a surge in Internet usage. Since most people use the Internet to obtain data,
cybercriminals are more likely to target it [13]. It is considered stable when a
computer-based system delivers idea integrity, obtainability, and secrecy. According
to the study [14], if someone gains illegal access to the network to interfere with
consistent operations, the integrity and security of the computer-based system would
be jeopardized. Cybersecurity (CS), user assets, and cyberspace can be dwindling
from unauthorized discrete outbreaks and access. According to a study by Thomas
et al. [15], maintaining data availability, integrity, and confidentiality is the major
objective of CS.
6 IoT and Machine Learning for Smart Applications
1.3.3 Healthcare
Many changes are occurring in the domains of industry, transportation, and gov
ernment because of developments in the area of deep learning (DL) and ML. Over
the decades, many studies have been conducted on DL. DL has been used exten
sively and has produced state-of-the-art results in several areas, like computer vision,
text analytics, and speech processing [16]. Recently, DL/ML strategies have been
executed in the healthcare field, and researchers have shown remarkable results in
tasks, such as brain tumor division, medical image reconstruction, lung nodule iden
tification, types of lung disease, the identity of body parts, etc. [17].
CAD systems might deliver a second view that will help radiologists in corrob
orating the diagnosis. DL and ML will progress the functionality of CAD and other
systems that will help radiologists in making judgments. Technological advancements
in big data, cloud-computing, edge-computing, and mobile connectivity also facili
tate the usage of ML and DL algorithms in the field of healthcare [18]. Together,
they can increase prediction accuracy and promote the development of an intelligent,
human-centered solution.
TABLE 1.1
Different ML Strategies with Examples
Types of
S. No. Examples Model Development Learning Strategies
1 Regression and Models that utilize labeled Supervised Task-driven
Classification data for learning
2 Reduction of Models that utilize unlabeled Unsupervised Data-driven
dimensionality, data for learning
association,
and clustering
3 Category and By utilizing joint data Semi Labeled and
clustering models were developed supervised unlabeled
by employing the concept
of penalty and reward
as a base for model
development
4 Category and Reinforcement Environment-
control driven
8 IoT and Machine Learning for Smart Applications
of supply chains, and demand-driven, fast adjustments to production levels are among
the other duties. Smart manufacturing is made possible by advancements in robotics,
massively parallel processing power, and industry-wide networking for gadgets and
services. Despite criticism of the electrical energy grid’s basic architecture, this
design has endured consistently over time. The electrical system remains unchanged
over the centuries, and we are living in the 21st century. But power has become more
and more necessary as population and consumption have increased [21].
1.4 PROBLEMS
i. Demand analysis is challenging
ii. Response times are sluggish
An innovative smart grid concept has emerged to report the problems. SG is a vast
energy network that uses intelligent and real-time monitoring, communication, con
trol, and self-healing technologies to ensure the reliability and security of clients’
electricity supply while offering a range of options. SGs are advanced cyber-physical
systems. The modern SG’s functionality can be divided into four categories.
In the area of SG, ML, and DL functionalities have forecasting fraud detection,
optimal scheduling, stability of the SG, identification of security breaches, identifica
tion of network anomalies, sizing, identification of faults, energy consumption, price,
and energy generation.
making it harder to administer and carry out network processes. Time series esti
mating projects traffic patterns for the near future. Classifying network traffic is a
crucial step in managing and carrying out network operations. This process involves
resource provisioning, performance monitoring, and differentiation of services.
to make their own decisions and actions. This makes it challenging to fix errors
and guarantee the impartiality and precision of a model’s output. For example,
when it was identified that women were given significantly smaller credit lines
by Apple’s credit card model than men, the company was not able to provide an
explanation or fix the issue. This relates to data and algorithmic bias, which are the
two biggest issues plaguing the area. Algorithms are regularly prejudiced against
women, Americans, and people of various civilizations. The topmost AI research
center in the world, Google DeepMind, has warned that LGBT people may be at
risk from the technology.
Even though this problem is widespread and well-known, there was oppos
ition to the significant action that several industry professionals believe is required.
Researchers, legislators, and activists were surveyed, and the majority voiced concern
that as AI advances by 2030. The entire country is currently discussing and passing
laws about AI, especially regarding applications that are instantly and harmful recog
nition for police enforcement.
1.7 UTILIZATIONS OF ML
In Industry 4.0, ML strategies are more common because of the capacity for intelli
gent decision-making and for learning from the past. Here, we go over and condense
several application areas for ML algorithms.
tagging. The well-known language and sound models in speech recognition are Alexa,
Siri, Cortana, Google Assistant, etc. Pattern recognition is the automatic identification
of regularities and patterns in data, like image study [45]. Various ML strategies are
used in this field, like feature selection, classification, clustering, and sequence labeling.
The efficacy and efficiency of ML solutions are determined by the nature as well as
the qualities of the information, along with the performance of ML processes over it.
The development of vast volumes of data in a short period by numerous application
domains, like cyber-security, healthcare, as well as agriculture, makes data collecting
in these areas challenging. Relevant data collecting is essential to moving on with the
investigation of the data in ML-based uses. Consequently, while working with real-
world information, attention must be paid to a deeper analysis of the data collection
techniques.
We must do the challenging process of purifying the acquired data from numerous
sources because there might be numerous outliers, missing and confusing values in
the prevailing information, which will impair the training of ML strategies. Therefore,
to maximize the utilization of ML strategies, pretreatment should be enhanced, and a
novel preprocessing procedure should be used.
The features and nature of the information might affect the results of the various
ML strategies, making it difficult to choose the ML procedure that is better opted for
the target use, for removing understandings, and for data analysis. An improper ML
process will provide unforeseen results, which could lessen the model’s efficacy and
accuracy. These algorithms are adjusted for the intended usage domains, or novel
techniques must be suggested.
The uses and their associated ML-based solutions’ final success will be based on
ML algorithms and the characteristics of the data. When the data is not representa
tive, contains irrelevant characteristics, is of low quality, or is not enough for training,
ML models will produce fewer accurate results and become unusable. Two important
Machine Learning: Advances and Applications 15
1.9 CONCLUSION
This study on ML techniques includes an extensive examination of data analysis.
Here, a summary of real-world problems and how various learning processes are
employed to produce answers is provided. The performance of ML procedures and
the properties of data will determine the accomplishment of the ML model. ML
algorithms must be educated by data collected from diverse real-world scenarios and
familiar with target application knowledge to produce intelligent decision-making.
In this overview, a range of application areas and challenges in the real world are
highlighted about the applicability of ML techniques. Finally, a summary and discus
sion of future research prospects and other problems are provided. Every problem in
the target uses field needs to be solved with the help of efficient solutions. This chapter
will function as a sample point for experts in the industry as well as academia. From
the methodological viewpoint, it also serves as a yardstick for decision-makers across
various usage realms followed by real-world situations. The applications of ML are
not limited to a single industry. Instead, it is affecting various areas, like gaming,
broadcasting and entertainment, information technology, lending and finance, and the
car industry. Because ML has so many applications, researchers are working in sev
eral fields to attempt and change the nation.
REFERENCES
1. Sharma, D. and Kumar, N., 2017. A review on machine learning algorithms, tasks and
applications. International Journal ofAdvanced Research in Computer Engineering &
Technology (IJARCET), 6(10), pp. 215-223.
16 IoT and Machine Learning for Smart Applications
21. Mosavi, A., Salimi, M., Faizollahzadeh Ardabili, S., Rabczuk, T., Shamshirband, S.
and Varkonyi-Koczy, A.R., 2019. State of the art of machine learning models in energy
systems, a systematic review. Energies, 12(7), p. 1301.
22. Smets, A., Jager, K., Isabella, O., Van Swaaij, R. and Zeman, M., 2016. Solar
energy: the physics and engineering of photovoltaic conversion, technologies and
systems. London: Bloomsbury Publishing.
23. Torabi, M., Hashemi, S., Saybani, M.R., Shamshirband, S. and Mosavi, A.,
2019. A Hybrid clustering and classification technique for forecasting short
term energy consumption. Environmental Progress & Sustainable Energy, 38(1),
pp. 66-76.
24. Yildiz, B., Bilbao, J.I. and Sproul, A.B., 2017. A review and analysis of regression
and machine learning models on commercial building electricity load forecasting.
Renewable and Sustainable Energy Reviews, 73, pp. 1104-1122.
25. Abidi, M.H., Alkhalefah, H., Moiduddin, K., Alazab, M., Mohammed, M.K., Ameen,
W. and Gadekallu, T.R., 2021. Optimal 5G network slicing using machine learning and
deep learning concepts. Computer Standards & Interfaces, 76, p. 103518.
26. Kao, H.C., Tang, K.F. and Chang, E., 2018, April. Context-aware symptom checking
for disease diagnosis using hierarchical reinforcement learning. In Proceedings of the
AAAI conference on artificial intelligence (vol. 32, no. 1), pp. 1-7.
27. Sohail, M. N., Ren, J. and Uba Muhammad, M., 2019. A Euclidean group assessment
on semi-supervised clustering for healthcare clinical implications based on real-life
data. International Journal of Environmental Research and Public Health, 16(9),
p. 1581.
28. Ramana, K., Ponnavaikko, M. and Subramanyam, A., 2019. A global dispatcher load
balancing (GLDB) approach for a web server cluster. In ICCCE 2018: proceedings of
the international conference on communications and cyber physical engineering 2018
(pp. 341-357). Springer Singapore.
29. Jha, S. and Topol, E.J., 2016. Adapting to artificial intelligence: Radiologists and
pathologists as information specialists. JAMA, 316(22), pp. 2353-2354.
30. Zhang, X. and Chow, K.P., 2020. A framework for dark web threat intelligence analysis.
In Cyber warfare and terrorism: concepts, methodologies, tools, and applications (pp.
266-276). Hershey, PA: IGI Global.
31. Sharma, A., Kalbarczyk, Z., Barlow, J. and Iyer, R., 2011, June. Analysis of security
data from a large computing organization. In 2011IEEE/IFIP 41st international con
ference on dependable systems & networks (DSN) (pp. 506-517). IEEE.
32. Ribeiro, M.T., Singh, S. and Guestrin, C., 2016, August. “Why should I trust you?”
Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD
international conference on knowledge discovery and data mining, San Francisco,
California, pp. 1135-1144.
33. Ghosh, S., Lincoln, P., Tiwari, A. and Zhu, X., 2017, March. Trusted machine
learning: model repair and data repair for probabilistic models. In Workshops at
the thirty-first AAAI conference on artificial intelligence, San Francisco, California,
pp. 143-152.
34. Zhu, M. and Jin, Z., 2009, September. A trust measurement mechanism for service
agents. In 2009 IEEE/WIC/ACM international joint conference on web intelligence
and intelligent agent technology (vol. 1, pp. 375-382). New York, NY: IEEE.
35. Tao, H. and Chen, Y., 2009, September. A metric model for trustworthiness of
softwares. In 2009 IEEE/WIC/ACM international joint conference on web intelligence
and intelligent agent technology (vol. 3, pp. 69-72). New York, NY: IEEE.
18 IoT and Machine Learning for Smart Applications
36. Berral, J.L., Goiri, I., Nou, R., Julia, F., Guitart, J., Gavalda, R. and Torres, J., 2010,
April. Towards energy-aware scheduling in data centers using machine learning.
In Proceedings of the 1st international conference on energy- efficient computing
and networking (pp. 215-224). New York, NY: ACM (Association for Computing
Machinery).
37. Li, X.H., Cao, C.C., Shi, Y., Bai, W., Gao, H., Qiu, L., Wang, C., Gao, Y., Zhang, S.,
Xue, X. and Chen, L., 2020. A survey of data-driven and knowledge-aware explainable
AI. IEEE Transactions on Knowledge and Data Engineering, 34(1), pp. 29-49.
38. Sarker, I.H., Abushark, Y.B., Alsolami, F. and Khan, A.I., 2020. IntruDTree: a machine
learning based cyber security intrusion detection model. Symmetry, 12(5), p. 754.
39. Zanella, A., Bui, N., Castellani, A., Vangelista, L. and Zorzi, M., 2014. Internet of
things for smart cities. IEEE Internet of Things Journal, 1(1), pp. 22-32.
40. Adnan, N., Nordin, S.M., Rahman, I. and Noor, A., 2018. The effects of knowledge
transfer on farmers decision making toward sustainable agriculture practices: In view
of green fertilizer technology. World Journal of Science, Technology and Sustainable
Development, 15(1), pp. 98-115.
41. Kamble, S.S., Gunasekaran, A. and Gawankar, S.A., 2018. Sustainable Industry 4.0
framework: A systematic literature review identifying the current trends and future
perspectives. Process Safety and Environmental Protection, 117, pp. 408-425.
42. Kamble, S.S., Gunasekaran, A. and Gawankar, S.A., 2020. Achieving sustainable
performance in a data-driven agriculture supply chain: a review for research and
applications. International Journal of Production Economics, 219, pp. 179-194.
43. Ardabili, S.F., Mosavi, A., Ghamisi, P., Ferdinand, F., Varkonyi-Koczy, A.R., Reuter,
U., Rabczuk, T. and Atkinson, P.M., 2020. COVID-19 outbreak prediction with
machine learning. Algorithms, 13(10), p. 249.
44. Alakus, T.B. and Turkoglu, I., 2020. Comparison of deep learning approaches to pre
dict COVID-19 infection. Chaos, Solitons & Fractals, 140, p. 110120.
45. Chiu, C.C., Sainath, T.N., Wu, Y., Prabhavalkar, R., Nguyen, P., Chen, Z., Kannan, A.,
Weiss, R.J., Rao, K., Gonina, E. and Jaitly, N., 2018, April. State-of-the-art speech rec
ognition with sequence-to-sequence models. In 2018 IEEE international conference
on acoustics, speech and signal processing (ICASSP) (pp. 4774-4778). New York,
NY: IEEE.
Understanding the
2 Concept of IoT
C. Emilin Shyni, Megha Menon K.,
and Anesh D. Sundar ArchVictor
2.1 INTRODUCTION
Imagine waking up to the sound of your favorite melody, with the curtains in your
bedroom gently pulling back to reveal the first rays of sunshine, your coffee machine
already brewing the perfect cup to jumpstart your day. This isn’t a scene from a futur
istic movie; it’s a slice of the present, brought to life by the Internet of Things (IoT).
A silent revolution has unfurled throughout homes and cities around us, connecting
devices and everyday objects to work seamlessly, making our lives more comfortable
and efficient. But what exactly lies behind this technological evolution that’s subtly
yet persistently transforming our daily routines?
IoT is no longer a buzzword confined to tech enthusiast circles; it has become an
integral part of our lives, and its relevance is proliferating with each passing day. This
intricate web of interconnected gadgets and sensors offers a symphony of conveni
ence that orchestrates our thermostats, vehicles, and even healthcare devices. It’s a
concept that weaves itself into the very fabric of our existence, aiming to optimize
our world by enhancing communication between devices - as much as we humans
communicate with each other.
Yet, despite its ubiquitous nature, the essence of IoT is shrouded with a sense of
mystique for many.
For the uninitiated, the IoT can seem overwhelming - a complex network of intel
ligent objects turning the mundane into the magical. But fear not, for understanding
IoT doesn’t require a degree in rocket science; it simply demands curiosity and a
willingness to embrace the future. As we usher in an era where your car notifies your
heater to warm up the house in anticipation of your arrival, isn’t it time to demystify
the magic and grasp the strings that control this technological puppetry?
This blog post aims to pull back the curtain on IoT, revealing the wizardry of
interconnected tech in a language you’ll not only comprehend but relate to. We’re
about to dive into the sprawling ecosystem of the IoT to unveil how it shapes our
modern lives and, more importantly, how it stands to revolutionize the future. Ready
to embark on a journey of discovery that will change the way you interact with the
world around you? Then let’s get connected, for this is a narrative that stretches from
the smallest microchip to the largest cities, narrating a story where you are an insep
arable protagonist.
DOI: 10.1201/9781032623276-2 19
20 IoT and Machine Learning for Smart Applications
Historical Context:
The concept of IoT was first coined in the early 1990s when researchers started
exploring the possibility of connecting everyday objects to networks. However, the
term “Internet of Things” was coined in 1998 by Kevin Ashton, a British entrepreneur
who worked at Procter & Gamble.
Evolution of IoT:
Future of IoT:
From 2020 to 2027, the IoT market is anticipated to expand at a compound annual
growth (CAGR) of 25.2%. The rising need for new IoT applications, such as linked
automobiles and smart factories, is the reason for this rise.
The concept of IoT has been around for decades, and over time, it has evolved to
become an integral part of our lives. From smart homes to smart cities and Industry 4.
Sensors and devices: These gather information from the real world and transmit it
to the IoT platform.
Protocols for communication: Data is sent between devices and the cloud via these
protocols. The most widely used protocols are Bluetooth Low Energy (BLE),
Wi-Fi, and Zigbee.
Data processing and storage: The databases and analytical tools that make up
this layer are used to store and handle the data that IoT devices have acquired.
Additionally, it offers machine-generated insights and user interfaces for
decision-making.
Sensors are instruments that are capable of detecting and quantifying various phys
ical events or attributes, including motion, light, humidity, pressure, and temperature.
They transform the signals they detect into electrical signals or digital data that other
system components can process with ease. It is usual to find temperature, pressure,
motion, proximity, and ultrasonic sensors, among other sorts of sensors.
Actuators, on the other hand, are devices that convert electrical signals or digital
commands into physical actions. They are responsible for controlling and moving
physical systems, such as opening and closing valves, adjusting motor speeds, or
operating robotic arms. Examples of actuators include motors, solenoids, relays,
pumps, and pneumatic or hydraulic cylinders.
In many applications, sensors and actuators work together in a closed-loop
system. Sensors detect and measure certain physical parameters, and the obtained
data is processed by a controller or a computer. The controller then sends appropriate
commands to actuators to perform specific actions based on the collected data. This
feedback loop allows systems to continuously monitor and adapt to changes in their
environment, ensuring efficient and accurate operation.
Numerous industries and applications, including robotics, aircraft, automo
tive systems, industrial automation, healthcare, and smart homes, use sensors and
actuators. They make it possible to create intelligent, self-governing systems that
can communicate with the outside world and react instantly to changes in their
surroundings.
IoT platforms serve as a central hub for collecting, processing, and analyzing the
data generated by IoT devices. They typically offer functionalities such as device
management, data management, real-time analytics, and integration with other
systems or applications. These platforms enable organizations to monitor and control
their IoT devices, as well as derive meaningful insights from the collected data.
Middleware, on the other hand, acts as a bridge between the IoT devices and the
applications or services that utilize the data. It provides services such as data trans
formation, protocol conversion, message routing, and security. Middleware effect
ively manages the communication and interaction between IoT devices and backend
systems, allowing seamless integration and interoperability.
Overall, the devices and hardware used in IoT systems enable the collection, trans
mission, processing, and control of data, making IoT applications possible across
various domains.
Data analytics and AI are critical components in leveraging the full potential of IoT.
By collecting, analyzing, and interpreting the enormous amount of data generated
by IoT devices, organizations can optimize operations, improve decision-making,
enhance user experience, and ensure the security of their IoT ecosystem.
26 IoT and Machine Learning for Smart Applications
Urban development and smart cities work hand in hand to build livable, sustain
able, and resilient urban environments through efficient use of data and tech
nology. Smart cities improve the quality of life for their citizens by integrating
e-governance techniques, public safety measures, mobility solutions, and modern
infrastructure.
For devices and systems inside the IoT ecosystem to communicate and exchange
data seamlessly, interoperability and integration are essential. By facilitating effi
cient communication, integration promotes scalability, cost reduction, and improved
decision-making.
Infrastructure and scalability are essential components of the IoT. Scalability is the
capacity to manage growing numbers of devices and data without appreciable per
formance reduction. Infrastructure is the supporting framework that enables connect
ivity between devices and the cloud.
IoT systems need to be scalable in order to expand and change to meet shifting
needs. The system ought to be able to manage the rise in data and processing demands
as more devices are connected to the network without experiencing overload.
Infrastructure, on the other hand, refers to the physical and digital infrastructure
that supports IoT. This includes network connectivity, data centers, cloud infrastruc
ture, and devices themselves.
2.13 CONCLUSION
We have discussed the key points, such as the ability to collect vast amounts of data,
the seamless connectivity of devices, and the automation of mundane tasks, all of
which contribute to the profound potential of IoT. This technology revolution has
the potential to improve people’s quality of life in addition to increasing operational
efficiency for corporations. IoT has enormous potential effects on both the business
and society.
Smart cities could lead to more sustainable and efficient living environments,
while industries can achieve unmatched levels of productivity and innovation. From
a societal perspective, the enhanced data and connectivity across devices can lead
to improved healthcare, smarter transportation systems, and more personalized con
sumer experiences.
Looking forward to the future of IoT, we are on the cusp of a new era where every
object can be smart and connected. The possibilities are limitless, and the opportun
ities for improvement and growth are boundless. While challenges such as security
and privacy remain, with the right regulations and ethical considerations in place, IoT
can lead humanity into a more interconnected and intelligent world.
Understanding the Concept of IoT 31
32 DOI: 10.1201/9781032623276-3
Unlocking the Power of IoT: An In-Depth Exploration 33
enhanced, connected devices are enabled, data transfer speeds are faster, with
low latency, and connections are more plentiful [7,8,3].
• As technology continues to advance and more devices become connected,
a more connected and data-driven world is anticipated as a result of the IoT
ecosystem’s predicted exponential growth and new breakthroughs and uses
across several industries.
3.5.1 Challenges
Huge prospects for modernization and connection are provided by IoT. Nonetheless,
it also poses a number of difficulties that must be resolved to guarantee its
36 IoT and Machine Learning for Smart Applications
• Privacy and Security: As IoT devices often transmit and gather sensitive infor
mation, they are vulnerable to hacking and privacy violations. Unauthorized
data retrieval or manipulation of connected devices might result from inad
equate security measures and inadequate encryption [9,2].
• Interoperability: The IoT ecosystem consists of numerous devices and
platforms from different manufacturers. The development of cohesive IoT
solutions can be hindered by the difficulty of ensuring seamless communica
tion and compatibility between these devices.
• Scalability: IoT network’s infrastructure management and scalability become
a rise in difficulty as additional linked devices are added. As the number of
devices increases, it is more difficult to ensure that the system remains effi
cient and reliable.
• Data Management and Analytics: IoT creates a tons of data from many
sources. It might be difficult to adequately organize and interpret this data in
order to produce practical insights; this requires strong data analytics capabil
ities [7,2,4,3].
• Power Consumption: The majority of IoT devices are battery-powered, and
optimizing power consumption is essential in order to extend their lifespan
and reduce the frequency with which they need to be replaced or recharged.
• Connectivity Issues: Internet access must be dependable and consistent for
IoT. Data transfer and device control may be difficult in places with patchy
network coverage or inconsistent connectivity.
• Standards and Regulations: The lack of universal standards and regulations
in the IoT industry can create challenges in terms of data security, interoper
ability, and compliance with legal requirements [3].
• Cost: IoT infrastructure and device deployment can be expensive at first, espe
cially for large-scale applications. Widespread adoption may be hampered by
this expense, particularly in certain sectors or geographical areas [4].
• Privacy Concerns: IoT devices are embedded in various aspects of daily life,
raising concerns about constant data collection and potential invasion of
privacy [9,2,3,10].
• Environmental Impact: When IoT devices proliferate quickly and are not
properly recycled or disposed of this can result in electronic waste and envir
onmental problems [7].
• Reliability and Resilience: IoT devices and systems need to be highly reliable
and resilient, notably in mission-critical settings like medical care, transporta
tion, and business operations where failure can have serious repercussions [3].
3.5.2 Opportunities
An array of opportunities are offered by the IoT across a wide range of industries and
fields. As technology develops and linked gadgets keep multiplying the opportunities
in IoT become increasingly compelling. Some of the key opportunities in IoT include:
Enhanced Efficiency: The IoT enables automation and real-time data analysis and
improves the efficiency of processes and operations. Some of the efficiency-driven
opportunities in IoT include optimizing operations, eliminating waste, and opti
mizing resource consumption.
Improved Decision Making: Through its network of linked devices, IoT produces col
ossal volumes of data. Businesses and groups may be able to maximize their strategies
and make decisions based on data by examining this data and gaining insightful insights.
Smart Cities: IoT is revolutionizing urban living by making cities smarter, more
efficient, and sustainable. Smart cities cover a wide range of topics, including smart
mobility, energy management, waste management, and public safety [2,7].
Industry 4.0 and Smart Manufacturing: IoT is driving the fourth industrial revo
lution, where connected machines, sensors, and data analytics enable smart manu
facturing and intelligent supply chain management. As a result, production rises,
downtime decreases, and the quality of the final product improves [8,5].
Connectivity and Communication: IoT makes it possible for people and things to
communicate and interact seamlessly. This enables real-time collaboration, remote
monitoring, and improved communication channels.
Safety and Security: IoT technologies provide improved security and safety
measures, including surveillance, asset monitoring, and smart home security systems.
These advancements help in preventing accidents, reducing crime rates, and protecting
valuable assets [2].
Smart Energy Management: Energy use in homes, buildings, and enterprises may
be better controlled and monitored owing to the IoT. This leads to optimized energy
usage, cost savings, and reduced carbon emissions [6].
3.6.1 Introduction
IoT architecture is the combination of sensors, software, communication protocols,
vehicles, intelligent devices, buildings, physical objects, cloud services, users,
developers, business layers, actuators, etc. Data management systems gather data for
storage, analysis, processing, and exchange. All these network physical components,
configuration, practical organization measures, and working values.
3.6.2.2 Detection
An important function of the sensing layer is to detect fluctuations in the physical
form of the practical components during actual stretching. The main component of
this layer is sensors, which are responsible for recognizing and positioning the intel
lectual objects, gathering the information, and transporting the information to the
Unlocking the Power of IoT: An In-Depth Exploration 39
cloud environment for processing and storing the information. In this layer, we can
find an actuator, which is a mechanical device such as a switch that is used to execute
the chosen device.
3.6.2.3 Announcement
The communication layer has certain devices like gateways, routers, and switches,
which are connected to devices that cannot link to the cloud services directly. This
layer is accountable for interactions or transfer of information to the other IoT layers.
The data which are composed by the sensing layer will be shifted to the cloud service
and the application layers.
3.6.2.4 Cloud
Universally, the function of the cloud is to use a data center as a fundamental server
to develop the generated information by the edge device. Information composed
from sensors and devices are consumed into the cloud layer. The purpose of cloud
is to store data, processing of data, and finally analyze the information that is
available. In different circumstances we can say this cloud layer as the IoT system
processing unit.
3.6.2.5 Administration
The responsibility of the administration layer is to operate and monitor all the
other layers with the help of cloud administration tools, which are generally
employed [11].
The absence of a solid architectural pattern has led to numerous initiatives. However,
no standard model has been adopted due to the wide range of applications and outline
plans with diverse variables and design patterns. In order to scale the computation of
the current classifications, the standard model has not been implemented.
Despite this, the most commonly used IoT architectures are:
1. Three-layer Architecture.
2. Middleware-based Architecture.
3. Service-Oriented Architecture.
40 IoT and Machine Learning for Smart Applications
1. The application layer describes how the computer software contributes to the
exact provision of a service.
2. In the network layer, information is broadcast to the upper layers.
3. The Perception Layer describes the physical surface of an object and clusters
all its features together.
To overcome these issues in an IoT-based network, we can use the 6LoWPAN com
munication protocol, which attaches a group of Zigbee devices with an Internet
protocol-based setup that affords peer-peer announcement to direct ZigBee-enabled
IoT networks with the IPv6 [18].
Three primary services will be offered when the protocol has an enquiry from the
user, they are:
consists of five different layers that perform different functionalities to provide the
proper communication between the nodes which are all connected [19]. The ZigBee
Protocol layer is shown in Figure 3.1.
The five building blocks used to develop the ZigBee communication protocol are:
signals at each and every triggering of the device will loss huge amount of power
[18]. ZigBee communication networks use guided transmission frequency access
to expand their potential and extend their snooze intervals. The routers in ZigBee
occasionally release signals at all signaling points to broadcast their presence. The
communicated signal edges will work as a register, which varies between 15 Ms and
252 s. Among each signal break, the nodes can snooze, dropping duty routines, which
increases battery life and lowers latency.
1. Camera and Imaging Modules: IoT devices are unified with cameras for
object detection surveillance [22].
2. Global Positioning System (GPS): IoT devices may include different
positioning modules, which provide information on locating objects over the
devices through the Internet [23].
3. Edge Computing Devices: IoT applications are commonly used in edge
computing devices to process the data locally instead of transferring all data
to the cloud, which reduces latency and saves bandwidth [24].
4. Display Interfaces: Most IoT devices use display interfaces to communi
cate with the outsiders, such as Liquid Crystal Display (LCD), Light Emitting
Diode (LED), and touchscreen displays to interact with the users [20].
5. Gateways: To maintain communication between IoT devices and other
existing networks a gateway is a common technique used to collect informa
tion from multiple devices, develop the information and then send the infor
mation to other networks for further usage and storage.
Unlocking the Power of IoT: An In-Depth Exploration 45
Humidity sensors: which helps in scaling the level of moisture in the air and are used
in applications like Heating, Ventilation, and Air Conditioning (HVAC) systems, agri
culture, and weather stations [21].
Light sensors (photodetectors): Detect the light levels in the physical world and
are utilized by applications like automatic lighting control, display brightness adjust
ment, and outdoor lighting.
Motion sensors: Detect the movement or change in position and are used in security
systems, smart lighting, and gaming applications [23].
Accelerometers: Scale the acceleration forces and are commonly used in fitness
trackers, smartwatches, and motion-based applications.
Pressure sensors: Scale the atmospheric or fluid pressure and find applications in
weather forecasting, altitude measurement, and industrial monitoring [24].
46 IoT and Machine Learning for Smart Applications
Gas sensors: Detect the existence of several gases in the atmosphere and are useful
in quality monitoring and safety in industrial settings [23].
Sound sensors (microphones): Captures audio signals and is used in voice recogni
tion noise monitoring.
Ultrasonic sensors: Use sound waves to detect the remoteness of an entity and are
widely used in robotics, parking assistance systems, and industrial automation [21].
Image sensors (cameras): Capture the visual data and utilize that information in
applications like surveillance systems, facial recognition, and object detection.
Stress sensors: Measure the stress and are used in health monitoring and industrial
applications.
These are a few examples of the wide variety of IoT sensors available. Each type of
sensor serves specific purposes in different IoT applications, making them valuable
components in building smart and interconnected systems [25].
3.9.1 Introduction
IoT and CC are the two best examples that have gained attractions from the academics.
Cloud computing provides services to users as an on-demand service that helps them
avail the services from anywhere [26]. On the other hand, IoT uses hardware and
sensors to provide service to the users as they smell changes in the physical world,
and transmit information to the users who access it. We will discuss how both tech
nologies work together to improve the betterment of the existing work [27].
SaaS: It is anticipated to build on top of the foundation of IoT structure and ser
vices to help in reaching the highest level of development and implementation. Using
the SaaS cloud model, sensing servers can effectively manage and process sensing
requests originating from various locations.
3.9.4 Benefits
Prior studies have demonstrated the broader benefits of combining IoT with cloud
computing, encompassing advantages such as enhanced storage capacity, increased
computational resources, and access to novel capabilities like advanced computing
technologies and protocols. Additionally, it offers improved scalability, accuracy, and
accessibility, which are typically challenging to obtain otherwise [31]. These benefits
will prompt companies and individuals to contemplate the ways they can leverage the
enabled technologies. This could aid organizations in addressing challenges related
48 IoT and Machine Learning for Smart Applications
to cloud computing, such as limited financial resources and infrastructure, while also
assisting them in making sense of their IoT information.
3.9.5 Demerits
The various challenges and complexities are.
Concerns and challenges related to IoT cloud often led organizations to hesitate or
be reluctant to adopt cloud technologies. Nevertheless, despite potential challenges
and issues, it’s essential to recognize that cloud computing also brings additional
benefits [26].
3.10.1 Introduction
Using edge computing, advanced computing capabilities are brought closer to
IoT nodes, facilitating the support of complex applications in the future IoT. By
deploying powerful computing resources at the edge that are closer to users, edge
computing offers real-time computing services [32]. Edge computing is used to
decentralize computing power, moving it away from centralized cloud servers, and
instead, placing it in edge nodes located near the end-users [33]. This approach
yields two significant enhancements over traditional cloud computing. First, edge
nodes can perform data preprocessing on a large scale before transmitting the data
to central cloud servers.
The result is a reduction in the amount of data that needs to be transferred,
resulting in an improved data handling process. Second, edge computing optimizes
cloud resources by endowing edge nodes with their own computing capabil
ities [34].
1. Hierarchical model
2. Software-defined model
3.10.5 Advantages
The integration of IoT with edge computing offers several advantages. By com
bining these two technologies, IoT systems can benefit from the reduction of latency,
improved actual processing, improved information confidentiality and safety,
optimized packet utilization, increased scalability, and more efficient use of com
putational resources [35]. As a result of edge computing, data can be processed and
50 IoT and Machine Learning for Smart Applications
analyzed in a localized manner, allowing for faster response times and better overall
performance [34].
1. Transmission
a. Latency/delay, bandwidth, energy, overhead
2. Storage
a. Storage balancing
b. Recovery policy
i. Availability
ii. Data replication
3. Computation
a. Computation offloading
i. Local
ii. Edge/cloudlet
iii. Cloud
b. Pricing policy
i. Single service provider
ii. Multiple service providers
c. Priority
3.10.6 Disadvantages
The integration of edge computing to support IoT brings forth numerous advantages.
However, alongside these benefits, there are also challenges specific to edge
computing-based IoT that need to be addressed [36]. These challenges may arise
due to factors such as network connectivity issues, security concerns, scalability
limitations, and the complexity of managing distributed computing resources at the
edge. Edge Computing can significantly enhance IoT applications and services by
identifying and overcoming these challenges [33].
1. System integration
2. Resource management
3. Security and privacy
4. Advanced communication
5. Smart system support
3.11.1 Introduction
As a paradigm, the IoT has emerged in recent years, enabling billions of devices
to communicate and generate vast quantities of data. Data management and ana
lysis are essential for facilitating decision-making processes and gaining meaningful
insights from them. As IoT-generated data is large, fast, varied, and verifiable, the
study explores data management strategies tailored specifically for IoT environments.
Sensors, actuators, and connected devices are all part of IoT data management, which
52 IoT and Machine Learning for Smart Applications
involves gathering and integrating heterogeneous data from a variety of sources [37].
A network of interconnected devices, including phones, tablets, and wearables, the
IoT communicates and exchanges data through the Internet. IoT has the potential to
transform a variety of industries and aspects of our daily lives, in addition to enab
ling automation, improving efficiency, and facilitating intelligent decision-making.
Data from sensors is used by edge gateway devices to make decisions through data
analysis. Data must be collected in real time, organized, and communicated between
these high-performance systems in real time. Data flow can be monitored by end
users using web-based dashboards running on edge devices. When searching a large
database containing a lot of data, graphs over arbitrary time periods can be used
to locate records. It involves a variety of technologies and techniques, such as data
warehouses, data lakes, and machine learning. IoT data management can be used for
a variety of purposes, such as improving operational efficiency. IoT data can be used
to identify inefficiencies in operations and make changes to improve efficiency. For
example, IoT data can be used to track the performance of machines in a factory and
identify machines that are not operating at peak efficiency. This information can be
used to make changes to the production process, which can lead to increased prod
uctivity and decreased costs. Improving customer service: Customers’ behavior and
preferences can be tracked using IoT data. For example, IoT data can be used to
track the browsing history of website visitors and recommend products that they are
likely to find interesting. The result can be an increase in sales and a greater level of
customer satisfaction for businesses. IoT data can be used to identify new market
opportunities and to develop new products and services. For example, a supply chain
can be tracked using data collected from IoT devices. In order to improve efficiency
and lower costs, new logistics solutions can be developed based on this information.
Automating tasks and improving efficiency can be achieved. An example of the use of
IoT data is the tracking of inventory levels in a warehouse and the automatic ordering
of additional inventory when levels decline [38].
FIGURE 3.3 Internet of things (IoT) general solution architecture and storage.
collect data [42]. In this case, it determines which addresses account for cloud servers
that will be used for storing data and sends blocks of data to those hosts. An edge
server maintains a copy of each device’s identity and helps each device generate
homomorphic verifiable tags and data shards. In the prototype system, edge com
puting processors are located close to the IoT devices in order to preprocess large
amounts of IoT data. This has the potential to significantly reduce the communication
costs and computational load associated with the system. Traditionally, P2P solutions
were based on client-server architecture where the server had powerful processing
abilities.
HBase are commonly used for IoT data storage. In addition to handling unstructured
and semi-structured data, NoSQL databases also handle IoT data [43].
3.11.5.1 Introduction
Networking and connectivity are fundamental pillars of the IoT ecosystem. The
IoT devices are constructed on a system with interconnected gadgets that can net
work and share data instantly. IoT networking and connectivity encompass a wide
range of technologies, protocols, and architectures that enable efficient and secure
communication among IoT devices and cloud-based services. Networking refers
to the integration of computing devices to share resources, data, and information.
It allows computers, servers, printers, and other devices to communicate locally
and internationally (through the Internet). Networking is an essential component
of modern technology, facilitating communication, and data transfer between
devices.
Connectivity in IoT is a vast field with various subdisciplines, including net
work administration, network security, network design, and network engineering.
For various types of networking, connectivity is also used in the IOT applica
tion. The IoT relies heavily on networking to enable communication and data
exchange between a vast number of connected devices. IoT refers to a concept in
which everyday objects or devices are arranged through sensors, actuators, and
communications capabilities, allowing them to collect and exchange data via the
Internet or other networks. From smart home appliances to wearable technology to
industrial machinery and smart city infrastructure, these interconnected devices can
serve a variety of purposes.
In today’s interconnected world, it is critical for enterprises, organizations, and
individuals to understand networking fundamentals in order to facilitate efficient
and secure communication. Typically, network protocols describe how data is trans
mitted over a computer network according to a set of rules and conventions. Data
packet protocols define not only the format and structure of data packets, but also
the procedures involved in creating, maintaining, and terminating communication
sessions between devices connected to a network, as well as the structure of the
data packets themselves. These are the physical devices used in a network, such as
computers, routers, switches, access points, and servers.
There are several key components and concepts in networking devices:
Wi-Fi: Wireless technology such as Wi-Fi allows fast data transfer between devices
and the Internet, making it ideal for applications requiring fast communication. Data
58 IoT and Machine Learning for Smart Applications
can be transferred over LANs at high speeds, making it suitable for home, office, and
industrial settings where Wi-Fi access points are nearby.
Zigbee: Wireless communication protocols such as Zigbee are designed for devices
to communicate at low power, low rate, and short distances. This technology is pri
marily used to create wireless sensor and control networks, also called the “Internet
of Things” (IoT). As part of IEEE 802.15.4, Zigbee provides a framework for creating
reliable and scalable wireless networks. The system is generally used in smart lighting
applications, industrial monitoring applications, and home automation applications.
Cellular Connectivity: IoT devices can leverage existing cellular networks (2G, 3G,
4G, and now transitioning to 5G) to connect to the Internet over long distances. Cellular
connectivity is particularly suitable for IoT deployments in remote areas or applications
requiring wide-area coverage, such as asset tracking and smart city solutions.
Wired Connectivity: Though less common in many consumer IoT applications, some
devices may utilize wired connectivity, such as Ethernet, to connect to the Internet or
local networks. This approach is more prevalent in IIoT settings.
Unlocking the Power of IoT: An In-Depth Exploration 59
Mesh Networking: Mesh networks are formed when IoT devices communicate
with each other directly, rather than relying solely on a centralized hub or access
point. Mesh networking is advantageous for its self-healing capabilities and extended
coverage range. Zigbee and Thread are examples of protocols used to create mesh
networks.
Edge Computing: IoT generates a large amount of data, which is difficult to transfer
efficiently to centralized servers due to the large amount of data generated. In order to
conserve network bandwidth and reduce latency, edge computing is used to process
and analyze data at the edge (i.e., the IoT device) in order to process and analyze data.
in many regions, providing connectivity even in remote areas. This wide area
coverage allows IoT devices to operate in various locations, making them suitable for
applications such as environmental monitoring, smart agriculture, and asset tracking.
• High Data Transfer Rates: In the last few years, cellular technologies have
dramatically improved the transfer of data from 3G to 4G and now to 5G.
This improvement in bandwidth enables real-time communication and high-
throughput applications, making cellular networks suitable for video surveil
lance, industrial automation, and healthcare monitoring.
• Reliability and QoS: Cellular networks are designed to offer high reliability
and consistent connectivity. Unlike smart grids, transportation systems, and
emergency services, which are dependent on IoT, this is essential for mission-
critical IoT applications, where downtime or communication interruptions
can have severe consequences.
• Security: A cellular network protects the data that is transmitted between IoT
devices and the cloud, including encryption and authentication, as well as
other security components. This level of security is critical for safeguarding
sensitive information and preventing unauthorized access to IoT systems.
• Global Roaming: For IoT applications with international deployments, cel
lular networks support global roaming capabilities. This allows devices to
connect seamlessly to different networks in various countries, enabling inter
national tracking, logistics, and asset management solutions.
• Cost-Efficiency: With the widespread adoption of cellular technologies,
the cost of connectivity has become more affordable. Many cellular net
work providers offer cost-effective data plans and packages tailored for IoT
deployments, making it more accessible for businesses and organizations to
implement large-scale IoT solutions.
• Mobility Support: Cellular networks support mobility, allowing IoT devices
like vehicles and wearable devices to maintain continuous connectivity while
on the move. This capability is essential for applications like connected cars,
fleet management, and healthcare wearables.
• Future-Proofing with 5G: The emergence of 5G technology brings signifi
cant enhancements to cellular networks, such as lower latency, higher data
rates, increased device density, and support for massive machine-type com
munication (mMTC). 5G’s attributes will unlock new possibilities for IoT
applications, particularly in areas requiring real-time responsiveness, like
augmented reality, industrial automation, and smart cities.
FIGURE 3.4 IoT gateways come in a variety of shapes, sizes, and types.
The success of IoT implementations depends on both IoT gateways and edge devices.
The use of IoT gateways facilitates communication between devices and the cloud by
facilitating data flow between them [52]. Edge devices, on the other hand, serve as the
frontline data collectors and processors, bringing real-time capabilities and localized intel
ligence to the IoT ecosystem. Together, they form a robust and responsive IoT infrastruc
ture that addresses the unique challenges and requirements of various IoT applications.
In addition to interconnecting sensing networks, gateways are used to connect cloud
computing environments or data centers to the Internet. Its objective is to manage het
erogeneous data collected by multiple devices in many forms and deliver this data to
a developed phase [53]. Before transferring assembled data to data centers for optimal
operation and management of IoT devices, it should be cleaned, pre-processed, and
filtered. In terms of functionality, gateways can be divided into two types: basic
gateways and smart gates. By forwarding data incoming from low-end IoT devices to
data centers, the basic gateway serves as a gateway between them. In contrast, a smart
gateway performs data processing efficiently by preprocessing, filtering, and analyzing
the data prior to distributing it to the cloud database. The purpose of these intermediary
gadgets is to function in harsh environments and improve from failures while restoring
the displacement gap in the shortest amount of time possible.
As a gateway, software, and hardware equipment are used together. It consists of
a small software package that manages, preprocesses, and stores nodes in a network.
Additionally, a modest backup should be included to handle the connection defeat
issue, which involves maintaining the current configuration, running it in nested
mode for restoration, and performing data restoration from the same location.
REFERENCES
1. Jianxin Wang, Ming K. Lim, Chao Wang and Ming-Lang Tseng, “The Evolution
of the Internet of Things (IoT) over the Past 20 Years,” Computers & Industrial
Engineering, vol. 155, p. 107174, 2021, ISSN 0360-8352, https://doi.org/10.1016/
j.cie.2021.107174.
2. Anass Sedrati, Abdellatif Mezrioui and Aafaf Ouaddah, “IoT-Gov: A Structured
Framework for Internet of Things Governance,” Computer Networks, vol. 233,
p. 109902, 2023, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2023.109902 .
3. Colakovic A., Hadzialic, M., “Internet of things (loT): A Review of Enabling
Technologies, Challenges, and Open Research Issues,” Computer Networks, vol. 144,
pp. 17-39, Oct. 2018, https://doi.org/10.1016/j.comnet.2018.07.017.
4. Yosra Hajjaji, Wadii Boulila, Imed Riadh Farah, Imed Romdhani and Amir Hussain,
“Big Data and IoT-based Applications in Smart Environments: A Systematic Review,”
Computer Science Review, vol. 39, p. 100318, 2021, ISSN 1574-0137, https://doi.org/
10.1016/j.cosrev.2020.100318.
5. M. Z. Khan, O. H. Alhazmi, M. A. Javed, H. Ghandorh and K. S. Aloufi, “Reliable
Internet of Things: Challenges and Future Trends,” Electronics, vol. 10, no.19,
pp. 23-77, Sep. 2021, https://doi.org/10.3390/electronics10192377.
6. Kehinde Lawal and Hamed Nabizadeh Rafsanjani, “Trends, Benefits, Risks, and
Challenges of IoT Implementation in Residential and Commercial Buildings,” Energy
and Built Environment, vol. 3, no. 3, pp. 251-266, 2022, ISSN 2666-1233, https://doi.
org/10.1016/j.enbenv.2021.01.009.
7. Ibrar Yaqoob, Khaled Salah, Raja Jayaraman and Mohammed Omar, “Metaverse
Applications in Smart Cities: Enabling Technologies, Opportunities, Challenges, and
64 IoT and Machine Learning for Smart Applications
Future Directions,” Internet of Things, vol. 11, p. 100884, 2023, ISSN 2542-6605,
https://doi.org/10.1016/j.iot.2023.100884.
8. Mirani, G. Velasco-Hernandez, A. Awasthi and J. Walsh, “Key Challenges and
Emerging Technologies in Industrial IoT Architectures: A Review,” Sensors, vol. 22,
no. 15, p. 5836, Aug. 2022, https://doi.org/10.3390/s22155836.
9. Nishant Chaurasia and Prashant Kumar, “A Comprehensive Study on Issues and
Challenges Related to Privacy and Security in loT,” e-Prime - Advances in Electrical
Engineering, Electronics and Energy, vol. 4, p. 100158, 2023, ISSN 2772-6711,
https://doi.org/10.1016/j.prime.2023.100158.
10. Evolution of Internet of Things. www.techaheadcorp.com/knowledge-center/evolut
ion-of-iot/, accessed 03 August 2023.
11. Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework
by A. Tewari and B.B. Gupta.
12. M. M. Islam, S. Nooruddin, and F. Karray, “Internet of Things: Device Capabilities,
Architectures, Protocols, and Smart Applications in Healthcare Domain,” IEEE
Internet of Things Journal, vol. 7, no. 10, pp. 10093-10108, Oct. 2020.
13. H. A. Khattak, M. A. Shah, S. Khan, I. Ali, and M. Imran, “Perception Layer Security
in Internet of Things,” Future Generation Computer Systems, vol. 100, pp. 144-164,
Nov. 2019.
14. M. Lombardi, F. Pascale, and D. Santaniello, “Internet of Things: A General Overview
between Architectures, Protocols and Applications,” Information Systems Frontiers,
vol. 23, pp. 1261-1281, Mar. 2021.
15. B. Padma and S. B. Erukala, “Peer-to-Peer Communication Protocol in IoT-Enabled
ZigBee Network: Investigation and Performance Analysis,” Journal of Ambient
Intelligence and Humanized Computing, vol. 12, pp. 7497-7505, 2021.
16. C. K. Rath, A. K. Mandal, and A. Sarkar, “Microservice Based Scalable IoT Architecture
for Device Interoperability,” in Proceedings ofthe 2020 IEEE International Conference
on Advanced Networks and Telecommunications Systems (ANTS), 2020, pp. 1-6.
17. A. Gerodimos, L. Maglaras, M. A. Ferrag, N. Ayres, and I. Kantzavelou,
“IoT: Communication Protocols and Security Threats,” in Proceedings of the 2019
IEEE Global Communications Conference (GLOBECOM), 2019, pp. 1-6.
18. R. Attarian and S. Hashem, “An Anonymity Communication Protocol for Security and
Privacy of Clients in IoT-Based Mobile Health Transactions,” IEEE Transactions on
Industrial Informatics, vol. 16, no. 4, pp. 2702-2711, Apr. 2020.
19. C. Bayilmis, M. A. Ebleme, U. Qavu^oglu, K. Ku^uk, and A. Sevina, “A Survey
on Communication Protocols and Performance Evaluations for Internet of Things,”
Internet of Things, vol. 9, p. 100149, Sep. 2020.
20. T. Dommguez-Bolano, O. Campos, V. Barral, C. J. Escudero, and J. A. Garrfa-
Naya, “An Overview of IoT Architectures, Technologies, and Existing Open-Source
Projects,” Electronics, vol. 9, no. 2, p. 275, Feb. 2020.
21. J. Trevathan, W. Read, and A. Sattar, “Implementation and Calibration of an IoT Light
Attenuation Turbidity Sensor,” Sensors, vol. 19, no. 9, p. 2130, May 2019.
22. J. D. A. Correa, A. S. R. Pinto, and C. Montez, “Lossy Data Compression for IoT
Sensors: A Review,” IEEE Access, vol. 8, pp. 68506-68527, 2020.
23. M. Kumar, “A Survey on Event Detection Approaches for Sensor Based IoT,” Journal
of King Saud University- Computer and Information Sciences, vol. 33, no. 5, pp. 489
500, Jun. 2021.
24. F. Fama, J. N. Faria, and D. Portugal, “An loT-Based Interoperable Architecture for
Wireless Biomonitoring of Patients with Sensor Patches,” Sensors, vol. 20, no. 18,
p. 5266, Sep. 2020.
Unlocking the Power of IoT: An In-Depth Exploration 65
42. H. Wang and J. Zhang, “Blockchain Based Data Integrity Verification for Large-Scale
loT Data,” IEEE Access, vol. 7, pp. 164996-165006, 2019, https://doi.org/10.1109/
ACCESS.2019.2952635.
43. M. Babar, M. A. Jan, X. He, M. U. Tariq, S. Mastorakis and R. Alturki, “An Optimized
IoT-Enabled Big Data Analytics Architecture for Edge-Cloud Computing,” IEEE
Internet of Things Journal, vol. 10, no. 5, pp. 3995-4005, 1 Mar. 2023, https://doi.org/
10.1109/JIOT.2022.3157552.
44. A. R. Dargazany, P. Stegagno, and K. Mankodiya, “WearableDL: Wearable Internet-
of-Things and Deep Learning for Big Data Analytics—Concept, Literature, and
Future,” Mobile Information Systems, no. 1, 8125126.
45. S. A. Shah, D. Z. Seker, S. Hameed and D. Draheim, “The Rising Role of Big
Data Analytics and IoT in Disaster Management: Recent Advances, Taxonomy and
Prospects,” IEEE Access, vol. 7, pp. 54595-54614, 2019, https://doi.org/10.1109/ACC
ESS.2019.2913340.
46. D. Wei et al., “Dataflow Management in the Internet of Things: Sensing, Control, and
Security,” Tsinghua Science and Technology, vol. 26, no. 6, pp. 918-930, Dec. 2021,
https://doi.org/10.26599/TST.2021.9010029.
47. J. Cook, S. U. Rehman and M. A. Khan, “Security and Privacy for Low Power IoT
Devices on 5G and Beyond Networks: Challenges and Future Directions,” IEEEAccess,
vol. 11, pp. 39295-39317, 2023, https://doi.org/10.1109/ACCESS.2023.3268064.
48. Gunjan Beniwal and Anita Singhrova, “A Systematic Literature Review on IoT
Gateways”, Journal of King Saud University - Computer and Information Sciences,
vol. 34, no. 10, Part B, 2022, pp. 9541-9563, ISSN 1319-1578, https://doi.org/
10.1016/j.jksuci.2021.11.007.
49. Vaigandla, Karthik, Radha, Krishna and Allanki, Sanyasi Rao, A Study on IoT
Technologies, Standards and Protocols. 2021. https://doi.org/10.17697/ibmrd/2021/
v10i2/166798.
50. Pons, Mario, Estuardo Valenzuela, Brandon Rodriguez, Juan Arturo Nolazco-
Flores and Carolina Del-Valle-Soto, “Utilization of 5G Technologies in IoT
Applications: Current Limitations by Interference and Network Optimization
Difficulties—A Review”, Sensors, vol. 23, no. 8, p. 3876, 2023, https://doi.org/
10.3390/s23083876.
51. Tariq, Usman, Irfan Ahmed, Ali Kashif Bashir, and Kamran Shaukat, “A Critical
Cybersecurity Analysis and Future Research Directions for the Internet of Things: A
Comprehensive Review”, Sensors, vol. 23, no. 8, p. 4117, 2023, https://doi.org/10.3390/
s23084117.
52. Yaser Mohammed Al-Worafi, “Chapter 6 Internet Technologies for Drug Safety”,
Springer Science and Business Media LLC, 2023. https://doi.org/10.1007/978-3-031-
34268-4_6.
53. Isa Avci and Cevat Ozarpa. “Chapter 10 Machine Learning Applications and Security
Analysis in Smart Cities”, Springer Science and Business Media LLC, 2022. https://
doi.org/10.1007/978-3-030-97516-6_10.
54. Laguidi, Ahmed, Tamtam, Samiya and Mejdoub, Youssef. “A Technique to Improve
IoT Connectivity Based on NB-IoT and D2D Communications”, ITM Web of
Conferences, vol. 52, pp. 01010-01018, 2023, https://doi.org/10.1051/itmconf/2023
5201010.
55. Soori, Mohsen, Arezoo, Behrooz and Dastres, Roza. “Internet of Things for Smart
Factories in Industry 4.0, A Review”, Internet of Things and Cyber-Physical
Systems, vol. 3, pp. 192-204, 2023, https://doi.org/10.1016/j.iotcps.2023.04.006.
Machine Learning
4 in Internet of Things
Sujni Paul and Grasha Jacob
4.1 INTRODUCTION
A new era of technological innovation has begun with the confluence of the Internet
of Things (IoT) and Machine Learning (ML), which has completely changed the
ways to gather, process, and use data from linked devices. A thorough investiga
tion of this synergistic link is undertaken in this book chapter, revealing its signifi
cant influence in a variety of fields. Fundamentally, the chapter seeks to clarify the
complex interactions between IoT and ML, providing readers with information and
understanding to help them navigate and take advantage of this revolutionary com
bination. To ensure a strong foundation upon which to develop, a deep knowledge of
the fundamental ideas behind both ML and IoT is established.
The potential and problems that come along with the data of IoT, such as data var
iety, velocity, volume, and accuracy are evaluated next. Additionally, ML techniques—
supervised, unsupervised, and reinforcement learning designed specifically for IoT
are explored to find how they may be used in various IoT scenarios. A range of fascin
ating case studies and real-world applications will highlight the practical implications
of this integration, showing how ML, among other revolutionary use cases, optimizes
energy consumption, improves predictive maintenance procedures, and spurs innov
ation in the healthcare industry. To enable readers to effectively utilize both tech
nologies in their domains, this chapter aims to give a complete understanding of the
dynamic interplay between IoT and ML. It does this by providing information and
practical insights. The structure of the chapter is organized as follows.
DOI: 10.1201/9781032623276-4 67
68 IoT and Machine Learning for Smart Applications
like random forests, combine multiple models to enhance overall performance. The
success of ML relies heavily on data quality, feature selection, and model evalu
ation. Additionally, ethical considerations, interpretability, and fairness in ML models
have become more and more important. As ML advances, it revolutionizes automated
complex tasks, industries, and contributes to solving challenging problems in diverse
fields [3].
DT are an indispensable tool for categorizing IoT devices depending on their behavior.
DT can be utilized in the perspective of IoT security to distinguish between legit
imate and malicious activity. For example, a decision tree model can detect anomalies
and possible security risks by examining the communication and behavior patterns
of devices. DTs have the benefit of being simply interpretable making it easier for
stakeholders to comprehend the decision-making process [5].
• SVM
• Random Forest
• Decision trees
2.20
2.15
2.10
2.05
2.00
1.95
- 1.90
- 1.85
i -1.80
Maintenance
Predicted
given below illustrates anomaly identification by SVM for an IoT network. Figure 4.2
shows the confusion matrix for SVM.
In this example, the SVM classifier is trained on a simulated dataset where different
features represent network traffic characteristics, and ‘Anomaly’ is a binary label
indicating whether the traffic is normal or an anomaly. The SVM model is trained to
separate normal from anomalous traffic patterns. The confusion matrix visualization
provides insights into the model’s performance in detecting anomalies. Figure 4.3
shows the predicted value of SVM.
74 IoT and Machine Learning for Smart Applications
K-Means is scalable and efficient, making it suitable for large datasets. The initial
choice of centroids is sensible and may converge to local minima.
Sensor Deployment:
The considered manufacturing plant is furnished with a network of sensors
connected to the IoT platform. These sensors are attached to critical machinery,
measuring various parameters like temperature, vibration, pressure, and power
consumption.
Predictive Analytics:
As the ML models are refined and improved over a period of time, they are cap
able of predicting potential equipment failures. For instance, if abnormal vibra
tion patterns are detected in a certain machine, it may indicate an impending
failure.
Proactive Maintenance:
Provided with predictive information, maintenance teams can schedule pro
active maintenance activities. Instead of relying on fixed schedules or reactive
maintenance after a breakdown, they can suggest potential issues before they
escalate. This reduces downtime, increases the lifespan of equipment, and
minimizes the chances of unexpected failures.
scenario where a patient with chronic conditions, such as diabetes and hyper
tension, is equipped with a wearable health monitor. This device continuously
collects real-time data on vital signs, activity levels, and glucose levels. The
data is seamlessly transmitted to a centralized healthcare platform utilizing
IoT technology. Advanced analytics algorithms on the platform process this
personalized health data, generating dynamic insights into the patient’s health
status. In the event of deviations from baseline parameters, the system triggers
automated alerts for healthcare providers and the patient, facilitating prompt
intervention. This proactive approach allows for timely medical adjustments
and empowers patients to actively manage their health, fostering a personalized
and preventative healthcare model.
Through personalized healthcare monitoring, patients benefit from
individualized treatment plans based on real-time data, ultimately improving
health outcomes and reducing the risk of complications. This case study
exemplifies the transformative potential of IoT-enabled personalized
healthcare, illustrating how the convergence of wearable devices and data
analytics can usher in a new era of patient-centric and data-driven healthcare
management.
4.7 CONCLUSION
The chapter accomplishes by reviewing the key points discussed in this chapter. It
highlights the transformative impact of ML in enhancing intelligence and efficiency
within IoT systems.
REFERENCES
[1] Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2011). Edge computing: Vision and
challenges. IEEE Internet of Things Journal, 3(5), 637-646.
[2] Hastie, T., Tibshirani, R., & Friedman, J. (2009). The Elements of Statistical
Learning: Data Mining, Inference, and Prediction. Springer.
[3] Russell, S. J., & Norvig, P. (2009). Artificial Intelligence: A Modern Approach (3rd
ed.). Pearson.
80 IoT and Machine Learning for Smart Applications
[4] Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things
(IoT): A vision, architectural elements, and future directions. Future Generation
Computer Systems, 29(7), 1645-1660.
[5] Breiman, L. (1984). Classification and Regression Trees. CRC Press.
[6] Cortes, C., & Vapnik, V. (1995). Support-vector networks. ML, 20(3), 273-297.
[7] Liaw, A., & Wiener, M. (2002). Classification and regression by random forest.
R News, 2(3), 18-22.
Role of Machine
5 Learning in Real-Life
Environment
Balasaraswathi V.R., Nathezhtha T.,
Vaissnavie V., and Rajashree
5.1 INTRODUCTION
Machine learning (ML) has a crucial role in leveraging technologies around Artificial
Intelligence (AI). ML is frequently referred to as AI due to its capacity for learning
and decision-making, but in truth, it is a subset of AI. Image Processing and Natural
language processing (NLP) are examples of machine learning approaches that can be
used to speed up data collection and format data. This can improve the ability to spot
clinical patterns and help with more accurate forecasts. Pattern recognition and data
analysis are a sort of data mining (DM) that enables computers to “learn” on their
own. Numerous advantages of ML include enhanced decision-making, accuracy, and
effectiveness. ML has emerged as a powerful tool in many fields, growing businesses,
and a wide range of applications [1]. Following are the categories of machine learning.
Supervised Learning: In supervised learning, the input is coupled with target labels,
and the system learns from labelled samples. The objective is to train the model to use
the labels provided to transfer the input data to the desired output. In order to forecast
or categorise previously unobserved data, the algorithm generalises from the labelled
data. Supervised learning algorithms encompass a variety of methods, such as Linear
Regression (LR), Logistic Regression, Decision Trees (DT), and SVM [2].
DOI: 10.1201/9781032623276-5 81
82 IoT and Machine Learning for Smart Applications
Improved Diagnosis
• Learning patterns from medical data
• Assist healthcare professions on early diagnosis
Predictive Analytics
• Patient outcomes based on historical data
• Help healthcare providers allocate resources effectively
recognise small patterns that would not be noticeable to human observers, resulting
in quicker and more accurate diagnoses. For instance, ML models in radiology can
discover anomalies in medical pictures or early indicators of diseases like cancer,
allowing for early intervention and better patient outcomes [5].
Liang et al. introduced an innovative classification framework known as Multi
Level FC Fusion (MFC) to identify brain diseases. The model is developed utilising
both supervised and unsupervised learning techniques and methodical functional
Magnetic Resonance Imaging dataset tests. The effectiveness and generality of the
method are shown by the results, demonstrating strong classification performance
across various preprocessing pipelines and cross-validation schemes, which is a char
acteristic feature of the proposed approach [6].
[15] Cancer Logistic Regression. Wisconsin Importance early diagnoses experienced Early diagnosis can
KNN. SVM. RF. DT. Breast by both current and former breast reduce the risk of
and Naive Bayes (NB) Cancer cancer patients. death
classification Dataset
[16] Breast, lung, and Genetic Algorithm- Irvine Provides physicians with a diagnostic It acts as a general tool
cervical cancer Correlation Based repository tool by helping them to make a proper for extracting patterns
Datasets Feature Selection. diagnosis from several clinical
DT. SVM. Linear trials for various
Discriminant Analysis cancer diseases.
(LDA). NN
[17] Oral Potentially Random Forest Surgical Care Predict the risk of cancer for It is a unique model
Malignant Unit(SCU) Oral Potentially for accurate and
Disorders Dataset Malignant Disorders. Sensitivity: 0.82 affordable OPMDs/
(OPMD) Specificity: 0.9 Oral Squamous Cell
Carcinoma (OSCC)
screening.
Cost-effective tool for
predicting OPMDs.
[18] Oral Cavity Naive Bayes NB. Patients of 92 % Tumour level and the prediction of Accurate feature subset
Squamous-Cell Bagging of Naive University nodal status in patients with oral cavity is identified for
Carcinoma Bayes. KNN. J48. of Naples squamous cell carcinoma (OCSCC) and predicting the cancer
(OCSCC) boosting J48 oropharyngeal cancers is anticipated. in an accurate manner
[19] Coronavirus SVM Epidemiology 87% accurately categorise the patient's Accurate prediction
disease Dataset condition into no infection, mild
infection, and serious infection based
on the infection level.
86 IoT and Machine Learning for Smart Applications
0 20 40 60 80 100
Accuracy
FIGURE 5.2 (a) Accuracy of breast cancer prediction for Wisconsin dataset (b) accuracy of
cancer prediction Irvine dataset.
FIGURE 5.4 Accuracy of credit card fraud detection compared with the results.
TABLE 5.2
Application for Business and the Techniques Used with Its Dataset
FIGURE 5.5 Accuracy of (a) robotic assisted urologic surgery (b) pedestrians detection
in autonomous vehicle environment (c) analysis of crash severity (d) citrus fruit disease
detection.
TABLE 5.4
Survey of ML in NLP
[39] Sentiment analysis Unsupervised Airport and - Analyses the online Helps to develop
using online learning Airline reviews, reviews in the the managerial
reviews tourist reviews, domain of tourism strategies for
etc. and hospitality. consumers.
[40] Determines the Social media
Binary Classification Twitter- ML models identify Negative opinion
Machine learning models can find and classify named entities within a text, such
as people, organisations, places, and dates. Named Entity Recognition (NER) can be
useful for applications, including information extraction, search engines, and recom
mendation systems. Machine learning algorithms are trained to accurately recognise
and extract named things from annotated data.
Text documents are categorised into predetermined groups by machine learning
algorithms for purposes including spam detection, subject categorisation, sentiment
analysis, and content filtering.
Machine translation systems improve with machine learning approaches like
neural machine translation (NMT), enhancing accuracy by recognising contextual
cues and grammatical patterns in multiple languages.
Question-answering systems use machine learning techniques to analyse and pro
vide answers to questions using text matching, natural language comprehension,
and information retrieval, enabling them to understand queries and extract relevant
information.
REFERENCES
1. S. V. Mahadevkar et al., “A Review on Machine Learning Styles in Computer Vision—
Techniques and Future Directions,” IEEE Access, vol. 10, pp. 107293-107329, 2022,
DOI: 10.1109/ACCESS.2022.3209825.
2. J. Camacho, G. Macia-Fernandez, N. M. Fuentes-Garda and E. Saccenti, “Semi
Supervised Multivariate Statistical Network Monitoring for Learning Security
Threats,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 8,
pp. 2179-2189, Aug. 2019, DOI: 10.1109/TIFS.2019.2894358.
3. S. J. Pan and Q. Yang, “A Survey on Transfer Learning,” IEEE Transactions on
Knowledge and Data Engineering, vol. 22, no. 10, pp. 1345-1359, Oct. 2010,
DOI: 10.1109/TKDE.2009.191.
4. X. Ma and W. Shi, “AESMOTE: Adversarial Reinforcement Learning with
SMOTE for Anomaly Detection,” IEEE Transactions on Network Science and
Engineering, vol. 8, no. 2, pp. 943-956, 1 Apr.-June 2021, DOI: 10.1109/
TNSE.2020.3004312.
5. M. Li and Z.-H. Zhou, “Improve Computer-Aided Diagnosis with Machine Learning
Techniques Using Undiagnosed Samples,” IEEE Transactions on Systems, Man, and
Cybernetics - Part A: Systems and Humans, vol. 37, no. 6, pp. 1088-1098, Nov. 2007,
DOI: 10.1109/TSMCA.2007.904745.
6. Y. Liang and G. Xu, “Multi-Level Functional Connectivity Fusion Classification
Framework for Brain Disease Diagnosis,” IEEE Journal of Biomedical and
Health Informatics, vol. 26, no. 6, pp. 2714-2725, June 2022, DOI: 10.1109/
JBHI.2022.3159031.
7. K. Paranjape, M. Schinkel and P. Nanayakkara, “Short Keynote Paper: Mainstreaming
Personalized Healthcare - Transforming Healthcare through New Era of Artificial
Intelligence,” IEEE Journal of Biomedical and Health Informatics, vol. 24, no. 7,
pp. 1860-1863, July 2020, DOI: 10.1109/JBHI.2020.2970807.
8. S. Zhang, S. M. H. Bamakan, Q. Qu and S. Li, “Learning for Personalized
Medicine: A Comprehensive Review from a Deep Learning Perspective,” IEEE
Reviews in Biomedical Engineering, vol. 12, pp. 194-208, 2019, DOI: 10.1109/
RBME.2018.2864254.
94 IoT and Machine Learning for Smart Applications
24. Armedja, Dejan, et al., “Credit card fraud detection-machine learning methods,”
International symposium INFOTEH-JAHORINA (INFOTEH), 2019.
25. Hamid, Yasir, et al., “An improvised CNN model for fake image detection,”
International Journal of Information Technology, vol. 15, no. 1, pp. 5-15, 2023.
26. Carcillo, Fabrizio, et al,. “Combining unsupervised and supervised learning in credit
card fraud detection,” Information Sciences, vol. 557, pp. 317-331, 2021.
27. Jain, Nishant, Abhinav Tomar and Prasanta K. Jana, “A Novel Scheme for Employee
Churn Problem Using Multi-Attribute Decision Making Approach and Machine
Learning,” Journal of Intelligent Information Systems, vol. 56, pp. 279-302, 2021.
28. Marappan, Raja and S. Bhaskaran, “Movie Recommendation System Modeling Using
Machine Learning,” International Journal of Mathematical, Engineering, Biological
and Applied Computing, pp. 12-16, 2022.
29. G. Jia, H.-K. Lam, S. Ma, Z. Yang, Y. Xu and B. Xiao, “Classification of
Electromyographic Hand Gesture Signals Using Modified Fuzzy C-Means Clustering
and Two-Step Machine Learning Approach,” IEEE Transactions on Neural Systems and
Rehabilitation Engineering, vol. 28, no. 6, pp. 1428-1435, June 2020, DOI: 10.1109/
TNSRE.2020.2986884.
30. A. A. Alhussan, D. S. Khafaga, E.-S. M. El-Kenawy, A. Ibrahim, M. M. Eid and A. A.
Abdelhamid, “Pothole and Plain Road Classification Using Adaptive Mutation Dipper
Throated Optimization and Transfer Learning for Self Driving Cars,” IEEE Access,
vol. 10, pp. 84188-84211, 2022, DOI: 10.1109/ACCESS.2022.3196660.
31. A. Altameem, A. Kumar, R. C. Poonia, S. Kumar and A. K. J. Saudagar,
“Early Identification and Detection of Driver Drowsiness by Hybrid Machine
Learning,” IEEE Access, vol. 9, pp. 162805-162819, 2021, DOI: 10.1109/
ACCESS.2021.3131601.
32. Ma, Runzhuo, et al., “Machine Learning in the Optimization of Robotics in the
Operative Field,” Current Opinion in Urology, vol. 30, no. 6, p. 808, 2020.
33. Navarro, Pedro J., et al., “A Machine Learning Approach to Pedestrian Detection for
Autonomous Vehicles Using High-Definition 3D Range Data,” Sensors, vol. 17, no. 1,
pp. 1-15, 2016.
34. Chen, Hengrui, et al., “Exploring the Mechanism of Crashes with Autonomous
Vehicles Using Machine Learning,” Mathematical Problems in Engineering, vol. 1,
pp. 1-10, 2021.
35. Doh, Benjamin, et al., “Automatic Citrus Fruit Disease Detection by Phenotyping
Using Machine Learning,” 25th International Conference on Automation and
Computing (ICAC), pp. 1-5, 2019.
36. Vij, Anneketh, et al., “IoT and Machine Learning Approaches for Automation of Farm
Irrigation System,” Procedia Computer Science, vol. 1, pp. 1250-1257, 2020.
37. S. A. Pedram, P. W. Ferguson, M. J. Gerber, C. Shin, J.-P. Hubschman and J. Rosen,
“A Novel Tissue Identification Framework in Cataract Surgery Using an Integrated
Bioimpedance-Based Probe and Machine Learning Algorithms,” IEEE Transactions
on Biomedical Engineering, vol. 69, no. 2, pp. 910-920, Feb. 2022, DOI: 10.1109/
TBME.2021.3109246.
38. D.-P. Tran, G.-N. Nguyen and V.-D. Hoang, “Hyperparameter Optimization
for Improving Recognition Efficiency of an Adaptive Learning
System,” IEEE Access, vol. 8, pp. 160569-160580, 2020, DOI: 10.1109/
ACCESS.2020.3020930.
39. Jain, Praphula Kumar, Rajendra Pamula and Gautam Srivastava, “A Systematic
Literature Review on Machine Learning Applications for Consumer Sentiment
Analysis Using Online Reviews,” Computer Science Review, vol. 41, pp. 100413, 2021.
96 IoT and Machine Learning for Smart Applications
40. Bakalos, Nikolaos, Nikolaos Papadakis and Antonios Litke, “Public Perception of
Autonomous Mobility Using ML-Based Sentiment Analysis Over Social Media Data,”
Logistics, vol. 4, no. 2, p. 12, 2020.
41. Muaad, Abdullah Y., et al., “An Effective Approach for Arabic Document Classification
Using Machine Learning,” Global Transitions Proceedings, vol. 3, no. 1, pp. 267
271, 2022.
42. Rahman, Atiqur and Md Sharif Hossen, “Sentiment Analysis on Movie Review Data
Using Machine Learning Approach,” International Conference on Bangla Speech and
Language Processing (ICBSLP), pp. 1-4, 2019.
Efficient Blockchain
6 Based Edge Computing
System Using Transfer
Learning Model
P. Sivakumar, S. Nagendra Prabhu,
S.K. Somasundaram, J. Uma Maheswari,
and Murali Murugan
6.1 INTRODUCTION
The IoT devices are integrated in several applications like gesture-tracking devices
with a high power and capability. The IoT system has consumed a maximum power
because of its broad usage. Many conventional IoT-based cloud communication are
performed and redesigned by using a mobile edge computing (MEC) system to reduce
computing power. The MEC system is integrated among sensor medium IoT nodes
and the cloud environment [1]. Thus, the MEC system achieved a lower computation
power using it but the security of the system is required. Decentralized technology
like blockchain is integrated with an MEC to achieve anonymity, secrecy, and privacy
of IoT cloud data.
Blockchain technology is based on bitcoin and has characteristics of decentraliza
tion, transparency, and openness. Generally, this technology has an addition of string
data to a blockchain by encryption [2]. This technology is implemented in many con
fidential sectors like banking, registration, and military data using a trust approach
based on credit identification. The blockchain can solve the third-party issue by dir
ectly connecting two strange entities. It was a distributed system through consensus
mechanisms and node verification [3]. Thus, the distributed blockchain architecture
of IoT is presented for a value transfer by transmitting data.
This chapter implements the blockchain-based MEC (BMEC) for IoT data [4]. To
achieve a higher security and scheduling strategy, the TL-based clone block identi
fication (CBI) is performed for the detection of clone block attacks. Therefore, the
proposed system carried a BMEC with a TL-based CBI to achieve an efficient system.
The proposed model’s performance is compared with a conventional method. The
rest of the work carried a related work in Section 6.2 and the preliminary of TL-based
MEC in Section 6.3. Section 6.4 presents the proposed BMEC system, and Section
DOI: 10.1201/9781032623276-6 97
98 IoT and Machine Learning for Smart Applications
6.5 includes experimental results. Finally, Section 6.6 includes a conclusion followed
by references.
privacy-preserving access policy and a lightweight policy update algorithm for the
effective management of data. Comparative analysis and experiments demonstrate
the scheme’s computation cost and performance. The hybrid system is proposed by
Y. Zhong et al. [18] to design a double-layer mining service offloading. The proposed
system combines MEC with a blockchain. The task of offloading is handled by the
algorithm of actor-critic (A3C) algorithm and double auction.
Ren et al. [19] have introduced a task-offloading strategy known as blockchain
based trust-aware task offloading strategy, which leverages blockchain technology
and trust-awareness. The authors employ smart contracts to facilitate secure and
automated task offloading. To mitigate network insider attacks, they incorporate
a recommendation filtering technique and a trust penalty measure. Furthermore,
the researchers analyze the challenges related to time efficiency when integrating
blockchain into their proposed system.
In [20], a blockchain authentication scheme is proposed for securing the messages.
The authors used edge servers and a lightweight message authentication algo
rithm, reducing the computational overhead. Du et al. [21] present a system called
Blockchain-based Intelligent Edge Cooperation System (BIECS), which combines
blockchain and intelligent edge cooperation to enable efficient resource sharing.
Tian et al. [22] introduce Blockchain-based Secure Searching for Metadata
(BSSMeta), a secure searching approach for metadata in MEC using blockchain
technology. The authors employ various techniques such as lightweight proxy re
encryption, master-slave smart contracts, and buffer uploading. These measures
enable efficient searching and uploading of metadata within the system. Chavhan
et al. [23] present a security scheme for vehicle platooning that integrates edge com
puting and blockchain technology. The authors designed a security architecture and
implemented smart contracts that were seamlessly integrated with the Simulation of
Urban Mobility Traffic Control Interface Application Programming Interface. This
integration ensures the establishment of a secure environment for vehicle platooning.
L. Qi et al. [24] present a cooperative proof-of-work (PoW) strategy named
Relay-PoW, which reduces the consumption of energy and improves the efficiency of
resource utilization. They proposed a supervision group mechanism and parallel relay
mining to increase the throughput and ensure security. B. Jiang et al. [25] propose an
attribute-based encryption technique, blockchain, and smart contracts for access con
trol and event traceability.
Lang et al. [26] introduce a framework for cooperative carbon monoxide (CO)
detection and utilize blockchain technology for secure handover in Vehicle Edge
Computing. The authors incorporated a consensus mechanism to develop models
for vehicle mobility and cooperative handover to guarantee the immutability of
offloaded data. J. Li et al. [27] propose a blockchain-assisted access control technique
for healthcare systems in fog computing. They utilize smart contracts and a multi
authority attribute-based encryption scheme to ensure data transparency, reliability,
and confidentiality.
Y. Li et al. [28] propose a blockchain-based data integrity verification scheme
for cloud-edge computing environments. They propose a detailed scheme without
a trusted third party, consisting of data upload and verification phases. R. Li et al.
[29] propose a secure blockchain-based access control framework for the Industrial
100 IoT and Machine Learning for Smart Applications
6.3 PRELIMINARIES
In this section, the TL-based MEC is presented for an IoT application. This TL model
is based on the Convolutional Neural Network (CNN) structure of the DL approach.
The TL model is applied for fast computing, and it allocates a minimum amount of
time to learn the huge dataset. This TL model achieved a robustness of the system and
also computational delay is reduced in it due to its shortcut.
TL Model structure
In this MEC system, the VGG16-TL model is used for IoT data computing. The
VGG16 model provided a better system performance with a higher accuracy but does
not reduce the learning device.
VGG16 Description
The VGG16 is applied to a large-scale dataset that provides an ImageNet. This model
reduced the delay of learning time and also minimized insufficient data. Figure 6.1
shows the VGG16 block diagram that consists of a total of 16 layers, including 13
convolutional layers and 3 dense layers.
From Figure 6.1, the VGG16 consisted of convolutional and dense layers. The
dataset is used to learn the dense layer weights. Several convolutional layers are
categorized, namely 64 filters in 2 layers, 128 filters in 2 layers, 256 filters in 3 layers,
and 512 filters in 3 layers. All the convolutional filters provided a 3 x 3 size with a
Efficient Blockchain-Based Edge Computing System 101
maximum pooling layer of 2 x 2 size. This VGG16 has two dense layers such as one
as a hidden layer with 128 neurons and another as an output layer. There are approxi
mately 138 million parameters provided for the network.
To identify this issue, the CBI is performed using a VGG16 TL model shown in
Figure 6.4. The TL model is very effective in prediction by training a few data sets.
The clone blocks are identified with their higher classification and prediction strategy.
This proved that the proposed TL-based CBI can be used to improve security in the
BMEC system. Therefore, the proposed BMEC system achieved both scheduling
accuracy and security using TL-based CBI.
VGG Tuning
The parameters in VGG16 include the weights and biases of these layers, which are
learned through the training process. These parameters define the network’s ability to
extract features from input data and make accurate predictions.
In deep learning, tuning of parameters is an essential step for the performance
optimization of a model. It involves adjusting the values of the model’s parameters
to achieve better accuracy or other desired metrics. Grey Wolf Optimization is a
metaheuristic algorithm based on the social behavior of wolves. It mimics the hunting
behavior of gray wolves to find the optimal solutions.
The objective function could be a combination of different metrics that capture
the system’s performance, such as classification accuracy, system delay, and security
measures. For example, you could define the objective function as a weighted sum of
accuracy and delay, where accuracy represents the model’s performance in correctly
classifying data, and delay represents the time taken for processing.
The Grey Wolf Optimization (GWO) algorithm would then be utilized to search the
parameter space of VGG16 and find the optimal values that maximize the objective
function. GWO is a population-based algorithm that emulates the hunting behavior of
104 IoT and Machine Learning for Smart Applications
gray wolves, consisting of alpha, delta, beta, and omega wolves representing different
positions in the search space.
During the optimization process, each wolf in the GWO algorithm corresponds
to a set of parameters in VGG16. The position of a wolf represents a potential solu
tion in the parameter space. By iteratively updating the positions of wolves based on
their hunting behavior, GWO explores the parameter space and gradually converges
toward the optimal solution.
The behavior of wolves in GWO involves three main steps: encircling, attacking, and
updating positions. These steps can be related to the optimization process as follows:
Encircling: In this step, the GWO algorithm performs a search around the current
positions to explore new potential solutions. This simulates the exploration of
different parameter combinations in VGG16.
Attacking: The GWO algorithm identifies the most promising positions and updates
them to move closer to the optimal solution. This step corresponds to refining the par
ameter values of VGG16.
Updating positions: The GWO algorithm changes the positions of wolves based on
their hunting behavior and the positions of the alpha, beta, delta, and omega wolves.
This step helps the algorithm converge toward the optimal solution and fine-tune the
parameters of VGG16.
Applying GWO-based tuning to VGG16, the objective function defined earlier
guides the optimization process to find the parameter values that maximize the desired
goals of efficient security and lower delay in the BMEC system. The GWO algorithm
explores the parameter space of VGG16, updating the weights and biases, until an
optimal solution is found. The pseudocode for the proposed GWO-based parameter
tuning is given below:
Through this iterative optimization process, the tuned VGG16 model achieves
improved performance, leading to better scheduling strategies, efficient security, and
reduced delay in the BMEC-IoT system compared to conventional methods. The
transfer learning (TL) based CBI further leverages the optimized VGG16 model to
improve the overall efficiency and effectiveness. The GWO algorithm explores the
parameter space and refines the parameters based on the hunting behavior of wolves.
The tuned VGG16 model contributes to the improved performance of the BMEC-IoT
system, resulting in better scheduling.
TABLE 6.1
Performance Table of Scheduling Accuracy
proportional to the total delay in BMEC, where both the parameters increase non-
linearly. This showed that the system can enhance the throughput transaction and
have low latency of computation.
Table 6.1 and Figure 6.6 show the proposed BMEC and TL-based MEC
performances in scheduling accuracy. The proposed method has achieved a 99.54%
and TL-based MEC attained 98.76% scheduling accuracy. The result showed that
the proposed BMEC method is much better than the existing system. Therefore, the
proposed system has obtained both scheduling accuracy and security by reducing
computational delay. This shows that system is more scalable than conventional
systems.
6.6 CONCLUSION
In this work, the BMEC system is proposed and designed using a TL-based CBI
method. The TL-based CBI method is used to identify the clone block attack that was
attained in the BMEC system. This system consists of IoT devices, an Edge server, a
Cloud Server, and a Blockchain. The implementation of blockchain achieved a higher
security with a TL-based CBI method. This method predicted the various clone block
Efficient Blockchain-Based Edge Computing System 107
attacks in the edge server with a knowledge of legal block ID and Key functions.
The performance result showed that the total delay in BMEC gets increased non-
linearly, which achieved a high throughput transaction and low latency. Also, the
proposed BMEC system has obtained a scheduling accuracy of 99.54% compared to
the existing TL-based MEC system. This showed that this system is more scalable
than the conventional systems.
REFERENCES
[1] C. Xu, X. Yu, H. Cui, H. Qiu, Y. Huang, and Y. Xiao, “Privacy computing technology
and secure architecture based on blockchain,” Journal of Parallel and Distributed
Computing, vol. 145, pp. 68-80, 2020.
[2] J. Liu, T. Peng, and W. Wang, “Blockchain-based edge computing resource allo
cation in IoT: A deep reinforcement learning approach,” IEEE Internet of Things
Journal, vol. 8, no. 6, pp. 4099-4108, 2021.
[3] W. Jin, Y. Xu, Y. Dai, and Y. Xu, “Blockchain-based continuous knowledge
transfer in decentralized edge computing architecture,” Electronics, vol. 12, no. 5,
p. 1154, 2023.
[4] K. Samy, Y. R. Rezk, M. A. R. Ghany, and A. A. R. Shehab, “A blockchain system
for task offloading security in MEC systems,” Journal of Network and Computer
Applications, vol. 158, p. 102660, 2020.
[5] Q. Tang, H. Zhu, Y. Luo, and J. Liu, “Secure aerial computing architecture using
blockchain,” IEEE Transactions on Network and Service Management, vol. 16, no. 3,
pp. 1047-1058, 2019.
[6] W. Wang, X. Li, X. Shen, and Y. Liu, “Triple real-time trajectory privacy protection
methodology in MEC,” IEEE Transactions on Mobile Computing, vol. 20, no. 1,
pp. 101-115, 2021.
[7] W. Wu, X. Yuan, Y. Zhang, and J. Zhang, “PBFT method for overcoming committee
selection issues and improving network security,” IEEE Transactions on Parallel and
Distributed Systems, vol. 32, no. 5, pp. 1034-1047, 2021.
[8] X. Wang, Y. Wang, Z. Wang, and Y. Sun, “Deep reinforcement learning (DRL) based
method using mean field theory (MFT),” IEEE Transactions on Neural Networks and
Learning Systems, vol. 31, no. 8, pp. 2901-2913, 2020.
[9] S. Zhang, X. Wang, T. Guo, and Z. Huang, “Blockchain-based deep actor-critic
method for task offloading,” IEEE Access, vol. 9, pp. 158205-158218, 2021.
[10] J. Yang, X. Wei, Z. Wang, and H. Zhao, “Blockchain-based conditional privacy
preserving authentication method for vehicular edge computing,” IEEE Internet of
Things Journal, vol. 8, no. 3, pp. 1831-1841, 2021.
[11] S. Ma, T. Zhang, Y. Xu, and W. Wu, “BFT model to improve performance in MEC,”
IEEE Transactions on Computers, vol. 70, no. 7, pp. 1085-1099, 2021.
[12] S. Huang, X. Liu, J. Chen, and Q. Wu, “Service provider location using a blockchain
network,” Sensors, vol. 21, no. 5, p. 1652, 2021.
[13] P. Kumar, S. Singh, R. Misra, and Y. Liu, “SAE-ABIGRU: A mechanism for intru
sion detection in MEC,” IEEE Transactions on Information Forensics and Security,
vol. 16, pp. 3005-3016, 2021.
[14] J. Liu, Z. Zhu, X. Hu, and Y. Zhang, “Edge-based networks for increased security
and efficiency,” IEEE Transactions on Dependable and Secure Computing, vol. 18,
no. 4, pp. 1770-1781, 2021.
108 IoT and Machine Learning for Smart Applications
[15] X. Huang, Y. Liu, W. Wang, and T. Zhang, “Hierarchical federated learning network
enabled by a multi-layer blockchain,” IEEE Transactions on Network and Service
Management, vol. 18, no. 1, pp. 100-113, 2021.
[16] P. Liu, L. Zhang, J. Zhou, and S. Wang, “P2P consortium blockchain-based trading
system for resources,” IEEE Transactions on Emerging Topics in Computing, vol. 9,
no. 2, pp. 769-782, 2021.
[17] S. Fugkeaw, T. Boonkrong, P. Jantaporn, and A. Sae-Tang, “IoT aggregation and
data transmission method using digital signing and encryption,” Future Generation
Computer Systems, vol. 116, pp. 164-175, 2021.
[18] Y. Zhong, Q. Wang, M. Li, and X. Tang, “A hybrid system for double-layer mining
service offloading,” IEEE Transactions on Cloud Computing, vol. 8, no. 1, pp. 14
27, 2020.
[19] J. Ren, Y. Zhang, X. Huang, and T. Wang, “Task-offloading strategy leveraging
blockchain technology and trust-awareness,” IEEE Transactions on Sustainable
Computing, vol. 6, no. 4, pp. 593-606, 2021.
[20] F. Wang, Z. Liang, T. Chen, and Y. Sun, “Blockchain authentication scheme for
messages,” Journal of Network and Computer Applications, vol. 173, p. 102881,
2021.
[21] X. Du, L. Chen, Y. Liu, and R. Wang, “BIECS: Blockchain and intelligent edge
cooperation for resource sharing,” IEEE Internet of Things Journal, vol. 8, no. 10,
pp. 8555-8567, 2021.
[22] Y. Tian, Z. He, L. Li, and Y. Xu, “BSSMeta: A secure searching approach for meta
data in MEC using blockchain,” IEEE Transactions on Services Computing, vol. 14,
no. 4, pp. 1371-1384, 2021.
[23] A. Chavhan, S. Patil, Y. Fang, and R. Zheng, “Security scheme for vehicle platooning
integrating edge computing and blockchain,” IEEE Transactions on Intelligent
Transportation Systems, vol. 23, no. 3, pp. 2034-2046, 2021.
[24] L. Qi, X. Liu, Z. Wang, and Y. Wu, “Cooperative proof-of-work (PoW) strategy
named Relay-PoW,” IEEE Transactions on Information Theory, vol. 67, no. 4,
pp. 2323-2338, 2021.
[25] B. Jiang, Q. Zhao, Y. Liang, and M. Li, “Attribute-based encryption technique,
blockchain, and smart contracts for access control,” IEEE Access, vol. 9, pp. 184123
184137, 2021.
[26] C. Lang, Y. Huang, Z. Zhang, and S. Wei, “Cooperative carbon monoxide detection
using blockchain technology,” IEEE Transactions on Vehicular Technology, vol. 70,
no. 8, pp. 7860-7870, 2021.
[27] J. Li, X. He, Y. Zhang, and M. Chen, “Blockchain-assisted access control for
healthcare systems in fog computing,” IEEE Transactions on Emerging Topics in
Computing, vol. 9, no. 3, pp. 1264-1275, 2021.
[28] Y. Li, H. Zhao, X. Xu, and Y. Wang, “Blockchain-based data integrity verification
scheme for cloud-edge computing,” Future Generation Computer Systems, vol. 117,
pp. 341-351, 2021.
[29] R. Li, W. Yu, H. Zhao, and Y. Sun, “Secure blockchain-based access control
framework for IIoT,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2623
2636, 2021.
[30] X. Ding, Y. Liu, L. Li, and J. Yang, “IoT devices assistance from edge servers for data
analysis and storage-related tasks,” IEEE Transactions on Cloud Computing, vol. 9,
no. 4, pp. 1323-1334, 2021.
Efficient Blockchain-Based Edge Computing System 109
[31] L. Sun, X. Zhou, T. Chen, and Y. Gao, “Truthful auction for fog system (TAFS) to
incentivize fog nodes,” IEEE Transactions on Network and Service Management,
vol. 18, no. 2, pp. 1884-1896, 2021.
[32] X. Du, Y. Wang, Q. Zhang, and L. Chen, “Matching mechanism based on smart
contracts for renting associations,” IEEE Transactions on Smart Grid, vol. 12, no. 1,
pp. 567-578, 2021.
[33] H. Nguyen, X. Wang, T. Zhang, and P. Li, “Proof-of-reputation consensus mech
anism based on block verification,” IEEE Transactions on Network and Service
Management, vol. 18, no. 1, pp. 104-116, 2021.
Introducing a Compact
7 and High-Speed Machine
Learning Accelerator
for IoT-Enabled Health
Monitoring Systems
Kavitha V.P., Magesh V., Theivanathan G.,
and S.S. Saravana Kumar
7.1 INTRODUCTION
Recently, high-speed ML accelerators have evolved into new innovations due to
the arrival of IoT-enabled AI integration [1]. Recent trends in medical applications
have seen a paradigm shift toward edge and embedded devices, emphasizing the
need for high-performance hardware to meet the growing demands of real-time data
processing. As the Internet of Things (IoT) continues to expand its footprint across
industries, the integration of artificial intelligence (AI) at the edge has become a crit
ical driver of progress [2].
High-speed machine learning accelerators are used in different fields like image
and signal processing. The hardware components in accelerators support for the inte
gration of AI and ML programs [3]. Also, it allows an IoT environment for continuous
monitoring. The data is updated to the cloud continuously with the consumption
of huge amount of power. The collected data from the cloud is used for different
forecasting, such as weather, disaster, traffic, etc.
Recent trends in the tech industry highlight the increasing prevalence of IoT
ecosystems across domains such as health care, smart cities, industrial automation,
and autonomous vehicles. These trends make the need for efficient and high-speed
ML acceleration at the edge. The processors needed to work heavily when the volume
of the data increases [4]. As data volumes grow exponentially, the ability to process
and interpret this data directly on the device offers substantial advantages, including
reduced latency, enhanced privacy, and more robust operation, particularly in envir
onments with limited connectivity.
In this work, design optimization of a High-Speed Machine Learning Accelerator
is proposed, which brings AI capabilities closer to the edge in IoT deployments. By
using cutting-edge techniques such as Support Vector Machines (SVM) for data
truncation and Honey Batcher optimization for hyperparameter tuning, our hardware
accelerator promises to be a game-changer in the IoT landscape. The performance
of the processors can be improved in terms of accuracy and efficiency for various
applications.
This work also explains optimization methodologies to illustrate how these
advancements contribute to the realization of intelligent and responsive IoT devices.
By applying the high-speed ML revolution, we prove that our work will give signifi
cant advancements in IoT-enabled AI integration, opening up new possibilities for
innovation and problem-solving across multiple sectors.
Lai et al. [14] proposed a new attack detection mechanism for hardware
accelerators. The ML-trained mechanism is utilized to learn the attacker’s behavior
when compared to the normal users. The data from the Kaggle website is used to train
the ML model for attacker detection.
Zheng et al. [15] applied encryption algorithms in ML-based hardware accelerators.
The security of the processors can be improved by applying encryption algorithms in
accelerators. The homomorphic encryption is processed to secure data in accelerators
to prevent attackers’-learning is a reinforcement learning algorithm used in ML. It’s
designed to solve problems with minimum computational requirements. The concept
of q learning used in hardware accelerators by Sutisna et al. [16] for multimedia pro
cessing applications.
Wang et al. [17] constructed a hardware accelerator using the strategy of paral
lelism. The parallelism is used to minimize the execution time by applying simul
taneous execution. The data is processed parallelly to avoid latency in execution.
Aboye et al. [18] proposed a new processor design using triple modular redundancy.
The fault-tolerant capability of the system can be improved by placing redundant
modules. These redundant modules help when an error is detected.
The reconfiguration of the system is used to switch over the functionality based on
user requirements. The reconfiguration-based accelerator is proposed by Vranjkovic
and Struharik [19] for multimedia applications. The power consumption of the pro
cessor can be optimized by reconfiguration. Edge-enabled ML refers to the prac
tice of deploying machine learning models and algorithms on edge devices. This
approach was applied by Suresh and Renu Madhavi [20] in hardware accelerators for
communications systems.
The hybrid Polyvalent ML-based hardware accelerator is proposed by Zhou et al.
[21]. It combines the different ML algorithms for processing the data in accelerators.
Based on applications, the ML algorithm can be loaded from memory. Aizaz et al. [22]
designed a new type of multiplier architecture for ML-based hardware accelerates.
The power consumption of processors is greatly optimized by introducing new multi
plier structures. Likewise, Nurvitadhi et al. [23] proposed a new vector multiplication
architecture for ML-based accelerator design. Xin et al. [24] developed a new multi
layer architecture for image-processing ML hardware accelerators. The pixels in the
processors are optimized using the multi-layer network.
7.3 PRELIMINARY
7.3.1 Multipliers
High-speed machine learning accelerators have become essential part all fields
for real-time AI integration and processing at the edge. The multiplier is the key
component of accelerators, which performs data multiplications and addresses
calculations.
Multipliers are specialized hardware units designed to perform the crucial task of
rapidly and efficiently executing complex mathematical operations. It plays a major
role in ML algorithms for difficult computations. The demand for high-speed and
low-power multipliers is increases when ML-based applications grow in all fields.
Introducing a Compact and High-Speed Machine Learning Accelerator 113
For high-speed machine learning accelerators, multipliers are the key components
responsible for executing the numerous matrix multiplications and convolution
operations essential for tasks such as image processing, NLP, pattern recognition,
and analysis. The performance of multipliers directly impacts the overall speed and
efficiency of an ML-based accelerator. Different algorithms and architecture have
been introduced by the researchers to design a multiplier in minimal area and delay.
The integration of the inelegance algorithm in the multiplier leads to area and delay
minimization achievements.
7.3.2 HBO
The honey badger’s remarkable foraging behavior serves as the inspiration for the
Honey Badger Optimization (HBO) model, a nature-inspired algorithm that aims to
solve complex optimization problems. This mathematical model is based on the two
key phases observed in the honey badger’s foraging process: the digging and honey
stages.
In above equation, “pop” represents the entire population, and each “x_l” in Equation
(7.3) is an individual candidate solution as follows:
Intensity Calculation (Step 2): In the HBO model, an intensity value (IV) is
calculated based on Inverse Square Law. This value represents the energy or distance
between the badger to prey.
S
IV, = RN x----- - (7.4)
l 2 4nd,2
114 IoT and Machine Learning for Smart Applications
where
S=(xl-xl+1 ), that indicated the concentration strength
dl=xprey-xl, that specified a distance among prey and lth honey badger
Here, “S” represents the concentration strength, and “d_l” is the distance from source
to destination.
Density Factor Update (Step 3): a-density factor controls the time-varying ran
domization, facilitating balance between convergence rate during the optimization
approach. This factor decreases over time, smoothing the solution.
t
C x expexp (7.5)
tmax
where
[max ^ allowable computation
C ^ Constant > 1 (default = 2)
In above Equation, “t_max” is the Max_No. of iterations, and “C” is a constant typ
ically set to a value greater than or equal to 1.
Escaping Local Optima (Step 4): The HBO model introduces a mechanism to
escape local optima. A flag (F) is used to change the position, enabling a more exten
sive exploration of the search space.
Position Update (Step 5): The location of badger is updated using the digging stage
and the honey stages.
= X + F x B x I x X + F x r3x^x d,l x
Xnewpreyprey
cos (2 n.rand4 )x [1 - coscos (2 n.rand5 )J (7.6)
where
Xpeey ^ Prey position
B ^ ability factor of Honey Badger
There is a flag (F) work is used to modify the direction of search that is expressed in
below Equation (7.12):
In the phase of Honey stage, the beehive is attained by a honeyguide bird using honey
badger which is expressed as follows (7.8):
= X + F.rand7. ^ .d,l
Xnewprey (7.8)
Introducing a Compact and High-Speed Machine Learning Accelerator 115
In above Equation, “X_new” represents the new position, the position of the prey
denoted as “X_prey”, “F ’ is flag controlling the search direction, “p ’ represents ability
of honey_badger’s, “I” the intensity, “d_l” is the distance between best solutions, and
various random values are used for perturbation.
The HBO model encompasses these phases, combining exploration and exploit
ation to find optimal solutions in the search space. By adapting the behavior of the
honey badger in foraging for solutions, the HBO model provides a unique and effi
cient approach to solving complex optimization problems.
7.3.3 SVM
SVM are a powerful ML approach especially used for classification problems.
SVMs are mainly used where data points belong to two distinct classes and need to
be separated by a hyper_plane. The basic strategy of SVM, is to discover the most
advantageous hyper_plane that optimizes the distinction between the two classes,
leading to improved generalization and robustness.
The objective of SVM is to find the decision boundary that separates the data into
two classes. This decision boundary is represented by a hyperplane, which can be
expressed as:
In above Equation, “f(x)’ is the decision function, “sign’ is the sign function (indicates
the fall of data point on the hyper_plane), and “b’ is the bias term.
that error. Compensation values are introduced to address the accuracy loss caused by
multiplier truncation. These values are determined through optimization techniques
with the goal of minimizing the impact of truncation errors. The choice of these com
pensation values is critical to balancing efficiency and precision.
Here, the SVM is used to find out the best compensation values in order to reduce
an error value of multiplier during truncation. The error values of the multiplier
changed based on the number of ones present in the least significant bits of the multi
plier output.
The system utilizes approximate multipliers in its architecture. Approximate
multipliers are designed to provide fast but slightly less precise results. These
multipliers are well-suited for applications where a small degree of error is accept
able in exchange for significant improvements in computational speed and efficiency.
The design of a truncated multiplier includes three different stages: partial product
generation, truncation of bits, and final vector merging addition stages. In trunca
tion, the hyperparameter-tuned SVM is applied for truncation and adds compensation
values to the multiplier final outputs.
By using approximate multipliers in hardware accelerators, the system achieves
a substantial improvement in computational efficiency. The proposed architecture is
best suited for ML-based hardware accelerators, especially in real-time signal pro
cessing, edge computing, and IoT devices.
The reduced precision of multipliers and optimized compensation values lead to
savings in terms of hardware resources and power consumption. This is particularly
valuable in resource-constrained environments. While focusing on efficiency, the
system ensures that a satisfactory level of accuracy is maintained through the careful
selection of compensation values. This is achieved with the assistance of the SVM,
which helps strike a balance between computational speed and precision.
Introducing a Compact and High-Speed Machine Learning Accelerator 117
Hyperparameters of SVM
SVMs offer several hyperparameters that allow for fine-tuning the model to achieve
the best performance for a specific dataset. The primary hyperparameters include:
Kernel Function (K): SVMs can use different kernel functions to formulate data
into a large-dimensional space. The SVM kernel functions are classified as linear,
radial basis function (RBF), polynomial and sigmoid.
Regularization Parameter (C): The regularization parameter “C” reduces the clas
sification error. The minimum value of “C” denotes a wider margin but may lead to
errors, while a larger “C” emphasizes accurate classification, potentially at the cost
of a narrower margin.
Kernel-specific Hyperparameters: If a kernel function is used (e.g., the RBF
kernel), there are additional hyperparameters specific to the kernel. For the RBF
kernel, these include “gamma,” which controls the shape of the decision boundary.
The process begins by defining the population size, which determines the number
of “honey badgers” in the population. These honey badgers represent sets of
SVM hyperparameters. The population is initialized with random hyperparameter
configurations, providing a diverse starting point for optimization. The objective
function plays a central role. It measures the performance of the SVM model with
a given set of hyperparameters. Typically, this could be a classification accuracy
metric on a validation dataset. The objective function is essential because the HBO
algorithm’s objective is to maximize it. The better the model performs, the higher the
fitness value assigned to the hyperparameters.
The heart of the algorithm lies in this main optimization loop. The loop runs for
a predefined number of iterations (max_iterations). In each iteration, the algorithm
evaluates the fitness of each honey badger in the population. Fitness is determined
by applying the objective function to each set of hyperparameters, reflecting how
well the SVM model performs with those hyperparameters. The algorithm maintains
awareness of the best-performing set of hyperparameters. As fitness values are
computed, the algorithm compares each honey badger’s fitness to the best fitness
observed. If a honey badger’s hyperparameters yield better results, the best fitness is
updated, and the corresponding set of hyperparameters is recorded as the best solu
tion found.
The HBO algorithm distinguishes between exploration and exploitation phases
controlled by the coefficient factors. These parameters are altered during every iter
ation in order to balance the exploration and exploitation ranges. In each iteration the
algorithm decides whether to explore or exploit each honey badger. If exploration is
favored, the algorithm generates random hyperparameters within valid bounds.
In contrast, during exploitation, it modifies the current hyperparameters. This
choice is guided by the exploration and exploitation parameters. The generated
or modified hyperparameters are checked to ensure they fall within valid bounds.
For instance, in the case of SVM hyperparameters, the regularization parameter
(C) should be positive, and the kernel-specific parameters should also adhere to
appropriate constraints. If the newly generated or modified hyperparameters improve
the fitness of a honey badger, the hyperparameters are updated for that honey badger.
This process mimics the honey badger’s ability to adapt and refine its approach as
it searches for prey. After the optimization process concludes, the algorithm returns
the set of hyperparameters associated with the honey badger that achieved the best
fitness. These hyperparameters represent the optimal configuration for the SVM
model, which should lead to the best performance on your specific problem.
with other models. These findings underscore the positive impact of our approach,
which leverages SVM integration in FPGA design. The simulated waveforms are
given in Figures 7.2 and 7.3.
The observed resource efficiency of SVM is very high when compared to existing
systems. These results prove that more streamlined utilization of logic elements and
combinatorial logic resources. The reduction in resource consumption can be attributed
to the optimized precision of multipliers and careful compensation strategies. This
outcome underscores the suitability of our approach for resource-constrained envir
onments where the efficient allocation of hardware resources is paramount.
Moreover, our system’s resource efficiency not only conserves FPGA resources
but also holds the potential for enhanced power efficiency. As FPGA devices increas
ingly find applications in edge computing and IoT contexts, the system’s ability to
balance computational speed and precision holds particular relevance.
The performance of the proposed system is given in Table 7.1. Slice is a metric
in FPGA terminology that refers to a group of configurable logic elements. A lower
number of slices in the “With SVM” configuration compared to “Conventional” and
“Without SVM” suggests that the implementation of SVM is more resource-efficient in
Introducing a Compact and High-Speed Machine Learning Accelerator 121
122 loT and Machine Learning for Smart Applications
Introducing a Compact and High-Speed Machine Learning Accelerator 123
TABLE 7.1
Performance Analysis
Slice analysis
1400
TABLE 7.2
Power Analysis
Power
terms of logic elements. Look-up tables (LUTs) are used for implementing combina
torial logic. The number of LUTs used in the “With SVM” configuration is lower than
in both the “Conventional” and “Without SVM” configurations. This indicates that the
SVM-based system is more resource-efficient in terms of logic resources, as shown in
Figures 7.4 and 7.5. The comparison is graphically shown in Figures 7.6 and 7.7.
Table 7.2 shows the power analysis of the proposed model and it’s clear that the
proposed model “With SVM” consumes less power (7.6 nW) than the model “Without
SVM” (9.5 nW). The power analysis is graphically shown in Figure 7.8.
7.6 CONCLUSION
In conclusion, the HBO algorithm presents a nature-inspired approach to the challen
ging task of tuning SVM hyperparameters. This optimization method leverages the
behaviors of honey badgers in foraging for prey, balancing exploration, and exploit
ation to find the best set of hyperparameters for an SVM model.
REFERENCES
[1] M. Capra, B. Bussolino, A. Marchisio, M. Shafique, G. Masera, and M. Martina, “An
updated survey of efficient hardware architectures for accelerating deep convolutional
neural networks,” Future Internet, vol. 12, no. 7, p. 113, Jul. 2020.
Introducing a Compact and High-Speed Machine Learning Accelerator 125
[15] M. Zheng, F. Chen, L. Jiang, and Q. Lou, “PriML: An electro-optical accelerator for
private machine learning on encrypted data,” 2023 24th International Symposium
on Quality Electronic Design (ISQED), San Francisco, CA, USA, 2023, pp. 1-7,
DOI: 10.1109/ISQED57927.2023.10129302.
[16] N. Sutisna, Z. N. Arifuzzaki, I. Syafalni, R. Mulyawan, and T. Adiono, “Architecture
design of Q-learning accelerator for intelligent traffic control system,” 2022
International Symposium on Electronics and Smart Devices (ISESD), Bandung,
Indonesia, 2022, pp. 1-6, DOI: 10.1109/ISESD56103.2022.9980698.
[17] C. Wang, L. Gong, X. Li, and X. Zhou, “A ubiquitous machine learning acceler
ator with automatic parallelization on FPGA,” IEEE Transactions on Parallel and
Distributed Systems, vol. 31, no. 10, pp. 2346-2359, 1 Oct. 2020, DOI: 10.1109/
TPDS.2020.2990924.
[18] D. Aboye et al., “PyRTLMatrix: An object-oriented hardware design pattern for proto
typing ML accelerators,” 2019 2nd Workshop on Energy Efficient Machine Learning
and Cognitive Computing for Embedded Applications (EMC2), Washington, DC,
USA, 2019, pp. 36-40, DOI: 10.1109/EMC249363.2019.00015.
[19] V. Vranjkovic and R. Struharik, “Coarse-grained reconfigurable hardware accelerator
of machine learning classifiers,” 2016 International Conference on Systems, Signals
and Image Processing (IWSSIP), Bratislava, Slovakia, 2016, pp. 1-5, DOI: 10.1109/
IWSSIP.2016.7502737.
[20] Suresh, B. N. Reddy and C. Renu Madhavi, “Hardware accelerators for edge enabled
machine learning,” 2020 IEEE REGION 10 Conference (TENCON), Osaka, Japan,
2020, pp. 409-413, DOI: 10.1109/TENCON50793.2020. 9293918.
[21] S. Zhou et al., “ParaML: A polyvalent multicore accelerator for machine learning,”
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,
vol. 39, no. 9, pp. 1764-1777, Sept. 2020, DOI: 10.1109/TCAD.2019.2927523.
[22] Z. Aizaz, K. Khare, and A. Tirmizi, “FASBM: FPGA-specific approximate sum-based
booth multipliers for energy efficient hardware acceleration of image processing and
machine learning applications,” 2023 IEEE 31st Annual International Symposium on
Field-Programmable Custom Computing Machines (FCCM), Marina Del Rey, CA,
USA, 2023, pp. 210-210, DOI: 10.1109/FCCM57271.2023.00038.
[23] E. Nurvitadhi, A. Mishra, and D. Marr, “A sparse matrix vector multiply accelerator for
support vector machine,” 2015 International Conference on Compilers, Architecture
and Synthesis for Embedded Systems (CASES), Amsterdam, Netherlands, 2015, pp.
109-116, DOI: 10.1109/CASES.2015.7324551.
[24] G. Xin, Y. Zhao, and J. Han, “A multi-layer parallel hardware architecture for homo
morphic computation in machine learning,” 2021 IEEE International Symposium
on Circuits and Systems (ISCAS), Daegu, Korea, 2021, pp. 1-5, DOI: 10.1109/
ISCAS51556.2021.9401623.
Realization of Smart City
8 Based on IoT and AI
Pavithra N., Sapna R., Preethi,
Manasa C.M., and Raghavendra M. Devadas
8.1 INTRODUCTION
The term “smart city” is quite popular since it improves urban residents’ quality of life
by integrating many fields, like smart communities, smart transit, smart healthcare,
smart parking, and many more. Real-time data processing and the ability to generate
smarter decisions pose a substantial threat to the continuous evolution of complex
metropolitan networks. The bounds of conventional networks have been widened by
the phenomenal expansion of the many devices linked to the network. This significant
development introduced the third wave of the internet, followed by social networking
and static pages web (WWW), “Internet of Things (IoT)” [1]. Internet of Technology,
prominent field which can identify as well as share data across heterogeneous objects
that may be uniquely addressed. IoT has attracted interest from a variety of groups
because of the expansion of embedded systems and the hasty growth in the number
of devices being used. The Internet of Things (IoT) concept has expanded due to the
attention of multiple interest groups and advancements in embedded device tech
nology. This develops useful efforts, including smart housing, smart cities, smart
health, etc. To effectively fulfill service requests, a huge volume of instantaneous data
processing is required. General data processing and analytical procedures are unable
to meet the demand for processing data instantaneously because of the enormous
expansion in data volume. Therefore, it is thought that working with analysis is the
best way to start building a smarter city. Academic and industrial professionals have
made numerous attempts to realize the concept of intelligent cities. The present-day
state of the art [2] documents numerous initiatives on particular areas of concern,
such as water resource management, waste management, parking management, and
many more. Big Data analytics is integrated with metropolitan IoT to realize the
smart city vision. As an illustration, a smart meter placed in a home gathers readings
from the meter and compares them to a predetermined power consumption limit.
Based on the comparison, the smart grid is notified of the energy demand that exists
at that moment. Consumers are simultaneously informed of the level of energy usage,
enabling them to effectively manage energy use. Although the buzzword “smart city”
has attained popularity in the era of technology, actual implementation is still in its
early stages. Multiple initiatives are done in this regard to build a practical smart city.
The heterogeneous data will be stored and processed using Hadoop [3]. After
Hadoop processing, intelligent decision-making linked to smart city functions
is produced. The decisions’ accompanying actions or events are then carried out.
Numerous state administrations are embracing the urban communities and executing
large information applications to arrive at the necessary degree of maintainability and
work on the expectations for everyday comforts. Urban areas use various advances
to work on the more elevated levels of solace to their residents. Shrewd urban areas
include decreasing asset utilization and costs notwithstanding more effectively and
successfully captivating their residents. One of the new advancements upgrades a huge
amount of information in urban areas. The gathering of enormous volumes of data
that can be used in useful fields has become a part of daily life. Success in numerous
industries and sectors relies heavily on the utilization and effective analytics of huge
quantity of data, commonly referred to as big data. Ninety percent of the world’s
digital data has been acquired in the previous 5 years alone, and big data growth is
expected to exceed 40 percent every year [4]. As a result, numerous governments
have started utilizing big data to support the growth and sustainability of smart cities.
As a result, cities were able to maintain the standards, requirements, applications, and
concepts of smart cities. Big data stores a lot of information, whether it is organized
or not and whether it is structured. Big data is a typical database that comes through
data processing. Large volumes of data will be efficiently stored by big data systems,
which will then supply information to enhance the services that smart cities deliver.
Using this information, big data will assist administrators in planning for any expan
sion in smart cities, locations, and resources. Many cities are transforming into smart
cities because of advantages such as those for the environment, economy, and ana
lysis. Therefore, we’ll talk about some of the advantages and possibilities that could
aid in transforming our city into a smart city. Through these advantages and possibil
ities, we may redesign our city to be a smart city. We can reach higher standards of
sustainability, governance, and resilience by making use of benefits and possibilities.
We can enhance natural resource management and life quality by implementing intel
ligent infrastructure management. Figure 8.1 illustrates the broader list of applications
based on smart cities using big data analytics.
The following are some advantages of having a smart city: Effective resource man
agement: As resources become either limited or very expensive, they must be used
more carefully and integrated into solutions. Systems involving technology like cor
porate resource planning with geospatial information systems will aid this process.
Locating waste distribution locations with a monitoring system will be easier, which
will also help with energy conservation and resource management. Applications for
interconnection and data gathering in smart cities that work together to provide ser
vices and applications.
many different areas of a smart city, enhancing customer experiences and services
while also helping businesses operate more effectively. Healthcare can be enhanced
by providing more patient attention, therapeutic and diagnostic instruments, manage
ment of medical records, and preventive care services. Big data has the potential to
significantly increase environmental friendliness, adjust to fluctuating demand, and
optimize routes and schedules for transportation networks. Big data is precisely what
results from the production of numerous resources from databases. Smartphones,
GPS, environmental sensors, computers, and even people’s numerous apps, including
games, advertising applications, digital photographs, social media sites, and greater
numbers of faster data from previous times. Big data is a typical database that comes
through data processing.
Big data is characterized by variety, value, velocity, and veracity. Large amounts
of data will be efficiently stored by big data systems to supply knowledge that will
enhance the services provided by smart cities. Big data will use this information
to assist administrators in planning for any growth in smart locations, buildings,
and resources. To provide a framework and coding tools for the parallel computing
of huge datasets over numerous clusters, Hadoop was developed. MapReduce and
Hadoop Distributed File System, the two main parts of Hadoop, are interconnected
[6,7]. Despite the requirement for live/real-time data processing and storing in smart
cities, the streaming style will provide good connectivity among various sensors
inside the network. Such technology has lately become widely employed with the
launch of different real-time data processing platforms, like Apache-Sturm, Apache-
S4, Spark-streaming, and MLLib [7], which may permit data storage plus analysis
132 IoT and Machine Learning for Smart Applications
technology that is unconnected to any firm or cloud services. For instance, REST
technology provides a scalable architecture that facilitates device interaction via the
hypertext-transfer protocol (HTTP) and is tailored for IoT applications to allow com
munication between any device and a server [11].
RFID
Radio Frequency Identification [3] uses electromagnetic waves to recognize and
track through tags affixed to things automatically. The tags, which come in active,
passive, and battery-assisted passive varieties, retain information electronically.
The battery-operated active kind periodically transfers its ID signal. The battery-
free passive versions employ the radio-electric energy sent by the reader. With a
small onboard battery, the passive battery-assisted model can only communicate
when an RFID reader is nearby. RFID is a widely used embedded communica
tion technology that may be used to identify almost everything, including people,
clothing, pets, and even other people. Because of its wide range of applications,
RFID is now perfect for smart cities; it may be used for cargo tracking, hospitals,
and libraries.
The software manages and keeps track of the RFID tags that are added to user data.
It is either a piece of unique software or a smartphone app. RFID software frequently
includes a clever mobile app that functions in conjunction with it. This program can
connect via Bluetooth or beacon technology with the RFID reader. With another elec
tronic RFID-enabled gadget, communication is possible. The item with which you
want to connect must have an RFID tag installed so that it can recognize the electro
magnetic waves sent out by the RFID reader. The technology allows us to connect
two RFID-enabled devices, one of which is an RFID reader and the other of which
is an electronic gadget with an RFID tag. Some RFID readers are manufactured with
built-in RFID antennas, whereas others include antenna ports. To use the readers, the
users must add additional antennas [12].
Components of RFID used are as follows:
RFID tag: RFID tags come in passive and active varieties. A passive RFID tag is the
barcode at the store. It doesn’t require a power source, is easy to activate, and is paired
with a certain object. Like the sensor tag behind the library book, an active RFID tag
has a microchip that records data about the item and might also have an antenna or
onboard sensor.
RFID scanner: A device that reads RFID tags and gathers evidence concerning the
item or device to which the tag is attached is called an RFID scanner or reader. These
tethered or portable readers support both USB and Bluetooth. Although not every
barcode scanner has the capability to interpret an RFID tag, all RFID readers possess
the ability to read a barcode. We can classify the RFID readers into three groups based
on the range they cover, and they are described below.
• Low-Frequency (LF) RFID: When put within the range of 30 to 300 kHz,
RFID-enabled devices can communicate with low-frequency RFID readers.
They travel a lot less distance.
134 IoT and Machine Learning for Smart Applications
RFID Software
This manages and keeps track of the RFID tags that are attached to the user’s assets.
It is only run by a piece of proprietary software or a mobile app. RFID software fre
quently includes a mobile app that functions in conjunction with it. This can com
municate with the reader using Bluetooth or beacon technologies. Unlike barcodes,
which are limited to certain products, RFID tags are universally compatible and their
signal may be detected by a scanner even when they are covered.
Due to its potential, RFID is currently setting the standard for the creation of
integrated gadgets that are fully trackable. For example, a meter can become a smart
measuring device when an RFID tag is installed. RFID tags are used by many com
panies. For instance, the development of an automobile’s assembly line while it is
being produced can be observed. Animals can be positively identified thanks to the
RFID microchips installed in livestock and companion animals. Through RFID-
embedded technology, such an identification approach makes intelligent equipment
for smart cities possible.
Ultra-wideband, Zig Bee, and Bluetooth, Wireless Fidelity (WiFi) [16]: If a city
has integrated wireless communication platforms, it might be referred to as smart.
Realization of Smart City Based on IoT and AI 135
sector and impacts income, too. In order to reduce or completely eliminate their reli
ance on proprietary hardware, network operators. Network function virtualization
emerged from the need to change the paradigm away from relying solely on hardware
to perform key network functions (Network Functions Virtualization [NFV]) [18].
Industrial NFV specifications were created by a collaboration of telecom carriers from
the European Telecommunications Standards Institute. NFV is a technique developed
to benefit from the development of virtualization in information technology. Utilizing
commercially available hardware, this technology converts network functions that are
hardware-based into software-based applications.
A few benefits of this emerging technology include platform transparency, expan
sion, adaptability, enhancements in efficiency, lower capital, and operational expenses.
The following elements are supported by NFV: physical servers, hypervisors, and
guest virtual machines. Physical resources like RAM, storage space, and CPU are
offered by the physical server. The environment in which a guest virtual machine can
function is created by a virtual machine monitor known as a hypervisor [18]. The
necessary software is started on the guest virtual machine, a piece of software that
mimics the appearance and functionalities of an actual platform.
smart cities to populate data and enhance many solutions for smart urban areas. Big
data can be used to build any resources or services needed for a smart city [20]. Big
Data requires the appropriate concepts for effective data analysis in order to attain its
objectives and enhance utilities in smart urban areas. These methods and tools may
promote interaction and collaboration among entities, offer assistance to many indus
tries in the smart city, and enhance customer perspectives and investment prospects.
This idea is inextricably linked to the emergence of sustainable sources that are ever
evolving and reducing dependency on fossil fuel substitutes while maintaining equi
librium between supply and demand [20]. A typical component to spot in this is a
dual-directional energy flow, which suggests that users are no longer only passive
consumers but also energy producers [21]. The main challenge for the smart grid is
the networks themselves, as the majority of them were built to serve massive plants
that run on fossil fuels, supplying power to customers only in a single way [22]. Three
essential elements are required for this bidirectional flow: storage technology, man
agement systems, and infrastructure supervision. Technical assistance is encouraged
by each of these elements.
Studies have been trying to incorporate, assess, and use actual information on
electricity generation and demand, as well as the types of climatic data due to this
rapid spread of smart grids. Significant investment effectiveness of the current smart
grid infrastructure is anticipated as a result of the improved system performance and
various performance metrics. A significant amount of data is produced in this envir
onment by varied sources like user energy consumption patterns, phasor measure
ment data for insight, and power usage data measured by widely used smart meters
between multiple other sources [23].
Big data gathered from the smart grid environment used effectively will aid to take
decision in making wise decisions regarding the quantity of electricity to be offered
along with meeting user demand. Moreover, the analysis of the smart grid data can
help to achieve well-planned objectives by providing a particular assessment plan that
is reliable as per the source, request, and functional prototypes. The data analysis of
these data could be used to foresee the future demand for power supply [24].
• Smart healthcare
IoT-enabled medical care has the potential to facilitate communication among all
involved parties in the healthcare sector, guarantee that participating individuals
obtain the services they need, support decision-making, and encourage the effective
use of technology. Smart healthcare is about raising the bar for information creation
within the medical system.
The medical field has produced a vast amount of material over the years. The
world’s population increase has enabled abrupt changes in diagnosis deploy
ment methods, with various conclusions driving these changes being data-driven.
Healthcare professionals possess the ability to collect and assess medical data that
can help administrative organizations and health insurers by using the appropriate
analytics technologies. Also, efficient analytics of large medical data sets can improve
quality of life, prevent unnecessary deaths, and help predict the emergence and spread
of treatment options and diseases. Smart devices that are linked to homes or clinics
to keep a check on patients, might raise the volume and consistency of informa
tion collected for certain individual’s health conditions. This information is used to
interpret clinical notes. Additionally, the analysis of vast volumes of healthcare data
enables physicians to recognize warning symptoms of a severe illness during the ini
tial therapy phases, potentially saving many patients [26].
• Smart Transportation
• Smart Governance
Despite its significance, there isn’t a consensus on what this idea means. Many have
concentrated on the procedure for gathering various types of data as well as info
pertaining to public administration by sensors or sensor networks [29] or on the
accomplishment of the social integration of city dwellers using government ser
vices, whereas some earlier research focuses on both political engagement and the
government’s operation [30].
Smart governance can be enabled by big data analytics [31]. Analysis of data
that can lead to collaborations between them can quickly identify organizations or
agencies with similar goals. Collaboration like this can help countries develop. Since
governments are well-versed in the requirements of individuals concerning healthcare
and societal well-being, training, and other sectors, big data analytics may also help
them create and execute effective policies. A review of comprehensive data from mul
tiple academic institutions may also help to reduce unemployment.
must be resolved [38]. In a smart city, data is extracted from numerous sources. To
interpret the data and make decisions, one needs special algorithms and visualization
techniques, which have an impact on activities related to smart cities. For instance,
synchronizing the consumption detected by consumers’ meters with that estimated
by other utilities’ systems helps reduce energy/water losses due to defective systems
[39]. In the big data era, personal data in smart cities is susceptible to analytics, trade,
and misuse, which creates worries about control loss, theft, and profiling [39]. People
specific information about residents, such as social events and places, is gathered
daily, for instance. The massive amounts of personal data that smart city technology
has collected are being protected against theft and hacking despite countless attempts
to do so. A number of cyber-security issues related to smart city technology need to
be addressed, even though city-level successful cyberattacks are still comparatively
infrequent.
8.6 CONCLUSION
This chapter delves into the burgeoning proliferation of interconnected devices within
urban landscapes, capturing the interest of scholars across diverse disciplines. The
central focus is a comprehensive exploration of the utilization of big data analysis
within the context of smart cities. The genesis of the “smart cities” idea is intrin
sically connected to the remarkable expansion of the IoT, catalyzing the evolution
of urban infrastructures toward intelligence. Despite this paradigm shift, the matur
ation of smart cities is still in its nascent phases, necessitating continuous innovation,
robust networking frameworks, and adept data management capabilities. Establishing
a pragmatic foundation for smart cities holds significant esteem among both aca
demic circles and industry practitioners. This analysis elucidates pivotal technolo
gies integral to intelligent urban frameworks, offering insights into specific smart
city initiatives that stand to benefit significantly from the application of big data
analytics. Additionally, prospective business models and architectural intricacies are
scrutinized, with a distinct emphasis on the efficacious handling of voluminous data
sets. In summation, the discourse underscores the pivotal role of extensive data in
facilitating informed decision-making and extracting valuable knowledge within the
ambit of smart city development.
REFERENCES
[1] Nathali Silva, Bhagya, Murad Khan, et al. “Big data analytics embedded smart city
architecture for performance enhancement through real-time data processing and
decision-making”. Wireless Communications and Mobile Computing, no. 1 (2017):
9429676.
[2] Susmitha, K., & S. Jayaprada. “Smart cities using big data analytics”. International
Research Journal ofEngineering and Technology (IRJET) 4, no. 8 (2017): 1615-1620.
[3] Hashem, Ibrahim Abaker Targio, Victor Chang, et al. “The role of big data in smart
city”. International Journal of Information Management 36, no. 5 (2016): 748-758.
[4] Silva, Bhagya Nathali, Murad Khan, Changsu Jung, & Jihun Seo. “Urban planning and
smart city decision management empowered by real-time data processing using big
data analytics”. Sensors 18, no. 9 (2018): 2994.
Realization of Smart City Based on IoT and AI 141
[5] Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. “Internet of Things (IoT): A
vision, architectural elements, and future directions”. Future Generation Computer
Systems 29, no. 7 (2013): 1645-1660.
[6] Hashem, I. A. T, Yaqoob, Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. “The
rise of big data on cloud computing: review and open research issues”. Information
Systems 47 (2015): 98-115. http://dx.doi.org/10.1016/j.is.2014.07.006.
[7] Hashem, I. A. T., Anuar, N. B., Gani, A., Yaqoob, I., Xia, F., & Khan, S. U.
“MapReduce: Review and open challenges”. Sciento Metrics, (2016): 1-34. http://
dx.doi.org/10.1007/s11192-016-1945-y.
[8] Mell, Peter. “The NIST Definition of Cloud Computing.” NIST Special
Publication (2011): 1-7.
[9] Chang, V., David, B., Wills, G., & De Roure, D. “A categorisation of cloud business
models.” In CCGrid, 10th International Symposium on Cluster, Cloud and Grid
Computing. 2010.
[10] Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., & Stoica,
I. “A view of cloud computing”. Communications of the ACM 53, no. 4 (2010): 50-58.
[11] Atzori, L., Iera, A., & Morabito, G. “The internet of things: A survey”. Computer
Networks 54, no. 15 (2010): 2787-2805.
[12] Kang, Y.-S., Park, I.-H., Rhee, J., & Lee, Y.-H., “MongoDB-Based repository design
for IoT-generated RFID/sensor big data”. IEEE Sensors Journal 16, no. 2 (2016): 485
497. http://dx.doi.org/10.1109/jsen.2015.2483499 .
[13] Dargie, W. W., & Poellabauer, C., “Fundamentals of Wireless Sensor Networks: Theory
and Practice”. John Wiley & Sons (2010).
[14] Al Nuaimi, E., Al Neyadi, H., Mohamed, N., & Al-Jaroodi, J., “Applications of big data
to smart cities”. Journal of Internet Services and Applications 6, no. 1 (2015): 1-15.
[15] Oualhaj, O. A., Kobbane, A., Sabir, E., Ben-othman, J., & Erradi, M., “A ferry-assisted
solution for forwarding function in Wireless Sensor Networks”. Pervasive and Mobile
Computing 22 (2015): 126-135. http://dx.doi.org/10.1016/j.pmcj.2015.05.003Owen.
[16] Lee, J.-S., Su, Y.-W., & Shen, C.-C., “A comparative study of wireless
protocols: Bluetooth, UWB, ZigBee, and Wi-Fi”. Paper presented at the 33rd Annual
Conference of the IEEE Industrial Electronics Society, 2007. IECON (2007).
[17] Abdalla, I., & Venkatesan, S., “Remote subscription management of M2Mterminals in
4G cellular wireless networks”. Proceedings of the 37th Annual IEEE Conference on
Local Computer Networks (LCN 2012): 869-877.
[18] Hawilo, H., Shami, A., Mirahmadi, M., & Asal, R. “NFV: State of the art, challenges,
and implementation in next generation mobile networks (vEPC)”. IEEE Network 28,
no. 6 (2014): 18-26.
[19] P. W. Shor, “Algorithms for quantum computation: discrete logarithms and factoring”.
Proceedings 35th Annual Symposium on Foundations of Computer Science
(1994): 124-134. http://dx.doi.org/10.1109/SFCS.1994.365700.
[20] Crossley, P., & Beviz, A. “Smart energy systems: Transitioning renewables onto the
grid”. Renewable Energy Focus 11 (2010): 54-59.
[21] Lund, H., Andersen, A. N., 0stergaard, P. A., Mathiesen, B.V., & Connolly, D. “From
electricity smart grids to smart energy systems—A market operation based approach
and understanding”. Energy 42 (2012): 96-102.
[22] “Renewables Won’t Save Us If the Electric Grid Is Not Ready”. Available
online: www.forbes.com/sites/davidblackmon/ 2020/09/30/renewables-wont-save-us-
if- the-electric-grid-is-not-ready/?sh=76da985c7abf (accessed May 23, 2022).
[23] Zhang, Y., Huang, T., & Bompard, E.F., “Big data analytics in smart grids: a review”.
Energy Informatics, 1, no 1 (2018): 1-24.
142 IoT and Machine Learning for Smart Applications
[24] Al Nuaimi, E., Al Neyadi, H., Mohamed, N., & Al-Jaroodi, J. “Applications of bigdata
to smart cities”. Journal of Internet Services and Applications 6, no. 1 (2015): 1-15.
[25] J. L. Martin, H. Varilly, J. Cohn, & G. R. Wightwick, “Preface: Technologies for a
smarter planet”. IBM Journal of Research and Development, 54, no. 4 (July-Aug,
2010): 1-2. http://dx.doi.org/10.1147/JRD.2010.2051498 .
[26] Roy, N., Pallapa, G., & Das, S.K. “A middleware framework for ambiguous context
mediation in smart healthcare application”. Third IEEE International Conference on
Wireless and Mobile Computing, Networking and Communications, 2007. WiMOB
(2007).
[27] Benevolo, C., Dameri, R. P., & D’Auria, B. “Smart mobility in smart city”. In: Torre,
T., Braccini, A., Spinelli, R. (eds.) Empowering Organizations. Lecture Notes in
Information Systems and Organisation, 11. Cham: Springer (2016). https://doi.org/
10.1007/978-3- 319-23784-8_2.
[28] Ju, G., Cheng, M., Xiao, M., Xu, J., Pan, K., Wang, X., & Shi, F. “Smart transportation
between three phases through a stimulus-responsive functionally cooperating device”.
Advanced Materials 25, no. 21 (2013): 2915-2919.
[29] Giffinger, Rudolf, Christian Fertner, Hans Kramar, Robert Kalasek, Natasa Pichler-
Milanovic, & Evert J. Meijers. “Smart cities. Ranking of European medium-sized
cities. Final Report.” (2007).
[30] Schuurman, D., Baccarne, B., De Marez, L., & Mechant, P. “Smart ideas for smart
cities: Investigating crowdsourcing for generating and selecting ideas for ICT innov
ation in a city context”. Journal of Theoretical and Applied Electronic Commerce
Research 7, no. 3 (2012): 49-62.
[31] Caragliu, A., Del Bo, C., & Nijkamp, P. “Smart Cities in Europe”. Proceedings to
the 3rd Central European Conference on Regional Science, Kosice, Slovak Republic,
45-59 (2009).
[32] Bellavista, Paolo, Antonio Corradi, & Andrea Reale. “Quality-of-service in data center
stream processing for smart city applications.” In: Samee U. Khan, Albert Y. Zomaya,
& Elias Houstis. Cham (eds.), Handbook on Data Centers, 1047-1076. Cham,
Switzerland: Springer (2015).
[33] Jalali, R., El-Khatib, K., & McGregor, C. (2015). “Smart city architecture for commu
nity level services through the internet of things”. Paper Presented at the 2015 18th
International Conference on Intelligence in Next Generation Networks(ICIN).
[34] Jin, J., Gubbi, J., Marusic, S., & Palaniswami, M. “An information framework for cre
ating a smart city through internet of things”. IEEE Internet of Things Journal 1, no. 2
(2014): 112-121.
[35] Tsai, C.-W., Lai, C.-F., & Vasilakos, A. V. “Future Internet of Things: open issues and
challenges”. Wireless Networks 20, no. 8 (2014): 2201-2217.
[36] Su, K., Li, J., & Fu, H. (2011). “Smart city and the applications”. International
Conference on Electronics, Communications and Control (ICECC) (2011).
[37] Gouveia, J. P., Seixas, J., & Giannakidis, G. “Smart city energy planning integrating
data and tools”. Proceedings of the 25thInternational Conference Companion on
World Wide Web (2016).
[38] Gulisano, Vincenzo, Magnus Almgren, & Marina Papatriantafilou. “When smart cities
meet big data.” Smart Cities 1, no. 98 (2014): 40.
[39] Tene, O., & Polonetsky, J. “Privacy in the age of big data: A time for big decisions”.
Stanford Law Review Online, 64 (2012): 63.
Sentiment Analysis
9 of Airline Tweets Using
Machine Learning
Algorithms and Regular
Expression
S. Nagendra Prabhu, A.P. Rohith,
Shubhankar Bhope, and P. Sivakumar
9.1 INTRODUCTION
Sentiment analysis, as the name implies, is determining the perspective or feeling
underlying an event. Essentially, it entails analyzing and determining the emotions
and intents underlying text, speech, and modes of communication. We, humans, com
municate in a variety of languages, but each language is merely an intermediary or
means through which we seek to express ourselves. And we are attached to every
thing we say. It can be positive, negative, or neutral. Suppose you have a restaurant
chain that sells a variety of foods such as dosa, paratha, naan, and milkshakes. You
created a website to sell groceries. Clienteles may now order items from your website
and even leave reviews.
The first review was positive, and that means the customer was really satisfied with
the butter naan. The second opinion is negative; therefore, the company must review
its dosa division. The third does not mean whether the customer is satisfied, so we
can take that as a neutral statement. However, now a problem arises: there will be
hundreds and thousands of user reviews for their product, and after a while, reviewing
each user review and making conclusions will become almost impossible. They also
can’t come to a conclusion by taking only about 100 reviews because maybe the first
100-200 customers tasted the same and liked the naan, but over time, they didn’t.
With rating increases, there can be a situation where none of the positive reviews can
cross negative reviews.
©O¥ • v
FIGURE 9.1 Emoji for sentiment analysis.
produced several endorsements for instructors and course designers. In their research
[2], Kevin Andrey and Liedy offered three methods for categorizing the moods of
tweets. A strategy centered on word, emotion, and a hybrid approach. The sentiment
infused into the emotions is taken into consideration as a criterion for categorizing
the messages in the emotion-based method. The inclusion of an emoticon was a
selection factor for the tweet. Words like bad, excellent, good, etc., that reflect sen
timent are engaged in interpretation when using the word-based technique to infer
sentiment. In the hybrid method, the use of words and emoticons was taken into
consideration. Stoffova et al. [3] executed the three main experiments to determine
the student’s place of origin in relation to technical awareness in a global educational
setting. Students from two nations on two distinct continents took part in this study.
They used principal component analysis (PCA) and support vector machine (SVM)
to do the same. Adarsh and Ravikumar [4] performed a similar study. By taking into
consideration the tweets from three well-known Airlines, a performed efficient yet
straightforward way of recognizing feelings on Twitter is proposed. Based on the
score calculation, sentiments were classified as negative, neutral, or positive. Torre-
D^ez et al. [5] castoff two machine learning processes to perform the basic architec
ture. The process involves a data gathering phase, preliminary text processing phases
over tumbling incorrect information, and expression-entrenching strategies for reno
vating text-based information into numerical-constructed information; Convolutional
Neural Network’s (CNN’s) algorithm can automatically determine qualities.
Feedforward Neural Network (FFNN) for manipulative neither positive sentiment
score (PSS) nor negative sentiment score (NSS) requirements, and Mamdani Fuzzy
System (MFS) for categorizing the data they provide as favorable, unfavorable, or
neutral. Ishaq et al. [6] provide a sentiment evaluation categorization strategy that
employs a CNN’s besides a GN (genetic algorithm) strategy. After mining semantic
structures, many techniques, including the recommended CNN-based ensemble,
Support Vector Machine, random forests, maximum entropy, stable differential inves
tigation, decision tree, and generalized linear conventional, are trained concurrently.
Lei et al. [7] propose an algorithm for suggestions based on sentiment data extracted
from user feedback on social media platforms. To achieve the assessment prediction
goal, they combine user opinion, resemblance interaction sentiments influence, and
element reputation similarity in a solitary matrix factoring method. They mainly rely
on social media users’ emotional responses to determine their preferences. Chen et al.
[8] take an alternative strategy. A cross-modal hypergraph prototype was developed to
combine documentary and emotive data for sentiment categorization, which is useful
for producing online service predictions. Furthermore, the Latent Dirichlet Allocation
(LDA) concept prototypes have been implemented into our projected cross-modal
hypergraph framework, allowing us to better interpret global higher-level facts
and eliminate ambiguity in certain specific phrases. Manshu and Bing presented a
Hierarchical Attention Network with Priority (HANP) method for Context-Dependent
Sentiment Classification (CDSC) employment [9]. When classifying sentiment, the
recommended HANP can prioritize keywords and phrases. The sentiment vocabu
lary matching stage can identify key pivots and non-pivots. By learning synonyms,
the HANP can identify and understand terms related to both pivot and non-pivot (or
dis-pivot) concepts. Abdalgader and Shibli [10] presented a novel application of the
146 IoT and Machine Learning for Smart Applications
The proposed method categorizes text based on sentiment using a Random Forest
based Classifier. The evaluation of a considerable number of research articles found
that the following algorithms are most commonly utilized for sentiment analysis in
text: support vector machine and random forest.
The challenge of using the support vector machine is that it is superlative suited
for two-class complications. The size of the dataset may have an impact on our work.
Sentiment Analysis of Airline Tweets Using Machine Learning
TABLE 9.1
Literature Survey
Algorithm
Publication Details Methodology Used Advantages Limitations
I. D. L. TorreDrez. The basic architectural hybrid model was carried Deep learning Predicting highest • Time ingesting is
et al.. "Sentence Level out by I. D. L. Torre Dez. et al., data collection classifier accuracy 90% with more.
Classification Using phase, the preprocessing of texts processes to using parallel this model. • Space cast-off by a
Parallel Fuzzy Deep reduce noisy data. Methods for transforming fuzzy. model is very large.
Learning Classifier". IEEE text-based data into numeric representations
Access, vol. 9. pp. 17943- using word embedding techniques.
17985. 2021. Convolutional Neural Network (CNN) methods
for obtaining characteristics immediately.
FFNN calculates PSS and NSS values, while
MFS classifies the information it receives into
neutral, negative, or positive classifications.
V. S toffova. Z. illes et al.. The three main tests were carried [3] to Support vector Clarity of data and ease • Limited number
"Machine Learning-Based determine the student's country of origin machine. of training. of extraction
Student's Native Place with regard to technical knowledge in a PCA. techniques.
Identification for Real- global educational setting. The participants • Overfitting, data
Time". IEEE Access, vol. in this research study were students from two leakage.
8. pp. 130840-130854. nations located on opposite continents. They
2020. accomplished the same using PCA and SVM.
Brandon Huynh and James When making predictions, it seems to be conducted TF-IDF vector In this particular' case Course structure was
Schaffer. "An Analysis a pictorial proportional examination of the space models. study, employing a considered when
of Student Behavior in various progressions to examine the effects of visual and systematic making predictions.
Two Massive open online the variations in development assembly while analytics approach The predictive power
courses". IEEE/AC M captivating into interpretation the behavioral proved effective in of the algorithm was
ASONAM. 2016. characteristics of the students. They then elucidating student not good.
provided a number of recommendations for achievement.
147
teacher's and course designer's.
(continued')
148
TABLE 9.1 (Continued)
Literature Survey
Algorithm
Publication Details Methodology Used Advantages Limitations
T. Zhong, et al.. "Learning This article offered StockNF. a flow-based StockNF Improved the/- Overfitting, data
Sentimental and Financial framework for forecasting fluctuations measure of sentiment leakage.
Signals With Normalizing in stocks. The proposed methodology prediction and overall
Flows for Stock Movement employs flow normalization to empower the classification accuracy.
Prediction". IEEE Signals- development of more accommodating and
Processing Letters, vol. 29. communicative latent illustrations for tweets
pp. 414-418. 2022. and previous stock values.
149
(continued)
150
TABLE 9.1 (Continued)
Literature Survey
Algorithm
Publication Details Methodology Used Advantages Limitations
T. Manshu et al.. "Adding They propose using the HANP technique to CNN and RNN. The effectiveness of Overfitting
Prior Knowledge in the CDSC problem in this chapter. When HANP has been tested
Hierarchical Attention recognizing sentiment, the recommended using the Amazon
Neural Network for HANP can focus on significant words and review dataset. We
Cross Domain Sentiment phrases. The emotion dictionary match layer achieve cutting-edge
Classification". IEEE tracks key pivots, non-pivots. and dis-pivots. accuracy with this
Access, vol. 7. pp. 32578- By understanding its equivalents, the HANP dataset.
151
training dataset.
(continued)
152
TABLE 9.1 (Continued)
Literature Survey
Algorithm
Publication Details Methodology Used Advantages Limitations
Y. Yue et al.. "Sentiment In this chapter, it deliver a approach that is used SVM. Improved the F- • Overfitting, data
Classification Based on to increase the classifier's overall accuracy Adaboosted measure of sentiment leakage,
Part-of Speech and Self when classifying Twitter data. For the same decision prediction and overall
Attention Mechanism". reason, we employ preprocessing techniques Tree and classification accuracy.
Institute of Electrical and to ensure that the training process receives decision tree.
Electronics Engineers, valid data. Our proposed method categorizes
Access, vol. 8. 2020. tweets as good or negative, which improves
Multinomial Naive Bayes is an alternative. The Naive Bayes procedure’s primary pur
pose is to determine the possibilities of classes dispensed to texts using the combined
possibilities of arguments and classes. We will also employ regular expressions to
ensure our model accurately represents modern slang and emojis.
9.5.3 Objective
Implementing regular expression and machine learning together will help progress
the accuracy of the classical. Here, we create a list of positive and negative sentiments
using regular expressions. This list includes all the modern text abbreviations, slang,
and emojis. We will create a flag for each sentiment by looking at all patterns defined
in the list. After the above step, we get a new dataset, and after applying the ML
algorithm to the new dataset, we get better accuracy. Also, a comparative study will
be conducted to display the actual difference in the classification when a machine
learning system is used and when the machine learning system with regular expres
sion is used.
system using linear regression and multinomial Naive Bayes to categorize the text in
as positive or negative.
We will also use TF-IDF to determine the most communal word incorporated
in the file or text. TF and IDF combine the two distinct metrics to process further
stages. When there are numerous documents, TF-IDF are utilized. This is constructed
on the concept that uncommon words reveal more about a document’s content than
words that are frequently used across all publications. TF-IDF is calculated with
the following formulas: where d signifies a document, “N” is the overall quantity
of credentials, and df denotes the quantity of documents comprehending the tenure t
indicated in Equations 9.1, 9.2, and 9.3. TF-IDF is a word frequency score that aims
156 IoT and Machine Learning for Smart Applications
to highlight more fascinating terms. The scores have the effect of highlighting spe
cific words in a given manuscript.
N
IDF (t) = log-— (9.2)
1 + df
9.5.6 Classification
The final step in the process is applying the classifier used here, which is Multinomial
Naive Bayes, and linear regression with regular expression. Multinomial Naive Bayes
is a popular method for categorizing documents according to a statistical assessment
of their material, as seen in Equation 9.4. It offers a feasible alternative to “heavy” AI-
based semantic evaluation while considerably simplifying textual data classification.
The Bayesian probability p1(Ck I W):
P (Ck) * P (Ck । W)
p1(Ck |W)= (9.4)
P (W)
The fundamental tenet of the Naive Bayes is that each characteristic in W separately
influences the probability that S fits to Ck.
p1(Ck I W) Equation 9.5 can also be given as:
prior * likelihood
Posterior = (9.5)
evidence
The likelihood (W I Ck) and estimated prior (Ck) both proportionally contribute to the
outcome that Ck is the class of S.
Text search strings can be expressed using a language known as regular expressions
(REs). RE allows us to compare or identify other strings or groupings of strings by
encoding specified syntax into a pattern. Similarly, regular expressions are utilized to
search texts in MS WORD and UNIX, as shown in Figure 9.5.
import re
positive_words = [
r '\bthanks\b', r'\bthank\s+you\b', r'\bawesome\b', r' \bgood\b', r'\bgreat\b',
r'\bexceLLent\b', r'\bamazing\b', r'\bhappy\b', r'\bfantastic\b', r'\bLove\b', r'\bjoy\b'
]
most occurring words. After training our dataset on MultinomialNB(), we print the
accuracy of the model in Figure 9.6.
9.5.8 Analysis
The results of our model outperformed previous ones significantly. A comparison
between our developed models and multinomialNB is illustrated in Figures 9.7 and
9.8. While the current state-of-the-art precision value for multinomialNB stands
at 0.82, our model demonstrates a precision value of 0.86. Furthermore, our
model exhibits a recall value of 0.52 for positive and 0.90 for negative sentiment,
representing a significant improvement compared to the state-of-the-art value of 0.22
for multinomialNB (as shown in Figures 9.9-9.12). Moreover, our model achieves an
F1 score of 0.56, which is notably higher than the state-of-the-art score of 0.35 for
multinomialNB shown in Tables 9.2-9.4.
158 IoT and Machine Learning for Smart Applications
data = {
•precision': [0.81, 0.82, 0.83, 0.82, 0.82],
'recaLL': [0.99, 0.22, 0.60, 0.82, 0.90],
'fl-score': [0.89, 0.35, 0.82, 0.62, 0.80],
'support': [897, 258, 1155, 1155, 1155]
}
labels = ['Negative', 'Positive', 'accuracy', 'macro avg', 'weighted avg']
FIGURE 9.7 Positive and negative sentiments with various parameter for linear regression.
FIGURE 9.8 Positive and negative sentiments with accuracy for linear regression.
data = {
'precision': [0.90, 0.60, 0.86, 0.75, 0.85],
'recall': [0.93, 0.52, 0.86, 0.72, 0.86],
'fl-score': [0.91, 0.56, 0.86, 0.74, 0.85],
'support': [897, 258, 1155, 1155, 1155]
}
labels = ['Negative', 'Positive', 'accuracy', 'macro avg', 'weighted avg']
FIGURE 9.9 Positive and negative sentiments with various parameter for MultinomialNB.
Sentiment Analysis of Airline Tweets Using Machine Learning 159
Recall
Metrics
FIGURE 9.10 Positive and negative sentiments with accuracy for MultinomialNB.
FIGURE 9.11 Positive and negative sentiments with various parameter for linear regression.
TN+ TP
Accuracy = (9.6)
TN+FP+TP+ FN
TP
Precision (P) = (9.7)
TP + FP
TP
Recall (R) =-------- (9.8)
TP+ FN
160 IoT and Machine Learning for Smart Applications
-0 65
-0 60
Recall
Metrics
FIGURE 9.12 Positive and negative sentiments with accuracy for linear regression.
TABLE 9.2
Twitter Airlines Review
Accuracy
Dataset Algorithm Used Initial Accuracy (%) Final Accuracy (%)
Twitter Airlines review Linear regression 82.0 86.3
Twitter Airlines review MultinomialNB 82.3 86.9
TABLE 9.3
For Positive Sentiment
Linear regression 59 60 59 86
MultinomialNB 60 52 86 86.9
TABLE 9.4
For Negative Sentiment
Linear regression 90 93 91 86
MultinomialNB 91 91 91 86.9
Sentiment Analysis of Airline Tweets Using Machine Learning 161
Accuracy
The distinctiveness lies in the ratio of the combination of true negative (TN) with
true positive (TP) divided by the sum of true positive (TP), false negative (FN), false
positive (FP), and true negative (TN). The accuracy of the projected classification is
achieved and detailed in Tables 9.2-9.4 and Equation 9.6.
Precision
It is distinct as the proportion of the quantity of tweets related to the quantity of
inappropriate data retrieved. The performance of the projected classification
accomplishes high when the rate of precision is high, and it is low when the precision
rate is low, as depicted in Tables 9.2-9.4 and Equation 9.7.
Recall
It is distinct as the proportion of (TP)True positive by the sum of true negative (TN)
and false negative (FN). The recall of the projected classification is accomplished and
mentioned in Tables 9.2-9.4 and Equation 9.8.
F1 Score
It is distinct as the ratio of meticulousness multiplied by recall(R) and the sum of
precision with recall. The Fl score of the projected classification is accomplished and
mentioned in Tables 9.2-9.4 and Equation 9.9.
9.6 CONCLUSION
In this chapter, sentiment scrutiny of airline tweets consuming machine learning
systems and regular expression has been training itself. Our model examines a total
of 11541 tweets from 6 distinct airlines and we implement a technique of multi
nomial NB with regular expression. Also, the proposed concept in the chapter, which
has much better accuracy as a result, is more efficient and has improved accuracy,
which was successful. The retrieved characteristics are trained. And classified Twitter
airlines review, got output as for initial accuracy for linear regression is 82% and final
accuracy is 86.3%, for MultinomialNB, the output as for initial accuracy for linear
regression is 82.3% and final accuracy is 86.9%. The result analysis of positive senti
ment using linear regression, we achieved 59% for precision, 60% for recall, 59% for
F1 score, and a final accuracy is 86%, and similarly in the result analysis of positive
sentiment using MultinomialNB we achieved 60% for precision, 52% for recall, 86%
for F1 score and accuracy is 86.9%. For the result analysis of negative sentiment using
linear regression, we achieved 90% for precision, 93% for recall, 91% for F1 score,
and a final accuracy is 86%, and similarly, result analysis of positive sentiment using
MultinomialNB we achieved 91% for precision, 91% for recall, 91% for F1 score,
and accuracy is 86.9%.
162 IoT and Machine Learning for Smart Applications
REFERENCES
[1] James Schaffer and Brandon Huynh, “An Analysis of student Behavior in Two
Massive open online courses,” IEEE/ACM International Conference on Advances in
Social Network analysis and mining (ASONAM), 2016.
[2] Kevin Andrey Ferreira and Liedy’s del Carmen, “Analysis of Behavior of Customers
in the Social Networks using Data Mining Techniques,” IEEE/ACM International
Conference on Advances in Social Network analysis and mining (ASONAM), 2016.
[3] C. Verma, V. Stoffova, Z. Illes, S. Tanwar and N. Kumar, “Machine Learning
Based Student’s Native Place Identification for Real Time,” IEEE Access, vol. 8,
pp. 130840-130854, 2020, DOI: 10.1109/ACCESS.2020.3008830.
[4] M. J. Adarsh and P. Ravikumar, “An Effective Method of Predicting the Polarity
of Airline Tweets Using Sentimental Analysis,” 2018 4th International Conference
on Electrical Energy Systems (ICEES), 2018, pp. 676-679, DOI: 10.1109/
ICEES.2018.8443195.
[5] F. Es-Sabery, A. Hair, J. Qadir, B. Sainz-DeAbajo, B. Gartfa-Zapirain and I.
D. L. Torre-D^ez, “Sentence-Level Classification Using Parallel Fuzzy Deep
Learning Classifier,” IEEE Access, vol. 9, pp. 17943-17985, 2021, DOI: 10.1109/
ACCESS.2021.3053917.
[6] A. Ishaq, S. Asghar and S. A. Gillani, “Aspect-Based Sentiment Analysis Using a
Hybridized Approach Based on CNN and GA,” IEEE Access, vol. 8, pp. 135499
135512, 2020, DOI: 10.1109/ACCESS.2020.3011802.
[7] X. Lei, X. Qian and G. Zhao, “Rating Prediction Based on Social Sentiment From
Textual Reviews,” IEEE Transactions on Multimedia, vol. 18, no. 9, pp. 1910-1921,
Sept. 2016, DOI: 10.1109/TMM.2016.2575738.
[8] Z. Chen, F. Lu, X. Yuan and F. Zhong, “TCMHG: Topic-Based Cross-Modal
Hypergraph Learning for Online Service Recommendations,” IEEE Access, vol. 6,
pp. 24856-24865, 2018, DOI: 10.1109/ACCESS.2017.2782668.
[9] HT. Manshu and W. Bing, “Adding Prior Knowledge in Hierarchical Attention
Neural Network for Cross Domain Sentiment Classification,” IEEE Access, vol. 7,
pp. 32578-32588, 2019, DOI: 10.1109/ACCESS.2019.2901929.
[10] K. Abdalgader and A. A. Shibli, “Experimental Results on Customer Reviews
Using Lexicon-Based Word Polarity Identification Method,” IEEE Access, vol. 8,
pp. 179955-179969, 2020, DOI: 10.1109/ACCESS.2020.3028260.
[11] H. S. Lee, “Exploring the Initial Impact of COVID-19 Sentiment on US Stock
Market Using Big Data,” Sustainability, vol. 12, no. 16, p. 6648, 2020, DOI: 10.3390/
su12166648.
[12] G. Xu, Z. Yu, H. Yao, F. Li, Y. Meng and X. Wu, “Chinese Text Sentiment Analysis
Based on Extended Sentiment Dictionary,” IEEE Access, vol. 7, pp. 43749-43762,
2019, DOI: 10.1109/ACCESS.2019.2907772.
[13] M. Rathi, A. Malik, D. Varshney, R. Sharma and S. Mendiratta, “Sentiment Analysis
of Tweets Using Machine Learning Approach,” 2018 Eleventh International
Conference on Contemporary Computing (IC3), pp. 1-3, 2018, DOI: 10.1109/
IC3.2018.8530517.
[14] W. Tai, T. Zhong, Y. Mo and F. Zhou, “Learning Sentimental and Financial Signals
With Normalizing Flows for Stock Movement Prediction,” IEEE Signal Processing
Letters, vol. 29, pp. 414-418, 2022, DOI: 10.1109/LSP.2021.3135793.
[15] K. Cheng, Y. Yue and Z. Song, “Sentiment Classification Based on Part-of-Speech
and Self Attention Mechanism,” IEEE Access, vol. 8, pp. 16387-16396, 2020,
DOI: 10.1109/ACCESS.2020.2967103.
Smart Workspace
10 Automation
Harnessing IoT and AI
for Sustainable Urban
Development and Improved
Quality of Life
Sapna R., Preethi, Pavithra N., Manasa C.M.,
and Raghavendra M. Devadas
10.1 INTRODUCTION
Several individuals spend a significant amount of time in workplaces these times.
Everybody should feel at ease in the office since the working environment seriously
influences how successfully employees accomplish their tasks. So, convenience is
essential and required in the workplace. When technology was at its greatest in the
past, it meant having an electronic pager and a landline connection; today, it means
having an electronic tablet linked to the web. A smart office is one that empowers
life with ease and comfort for its people and clients, empowering them yet enhan
cing their capability to keep themselves connected to one another. Organizations are
harnessing the power of modern technology and implementing effective strategies to
drive staff efficiency and output. As the physical barriers are being breached, a multi
faceted and competitive atmosphere prioritizing innovation and creativity is forming.
Intelligent growth zones are rapidly emerging worldwide, so smart offices quickly
become necessary.
A “smart workplace” ensures IT resources and infrastructural facilities are used
as effectively and efficiently as possible. In other terms, offices are automated in
the current generation of information technology. An accessible, innovative technical
setting is required. Thus, office automation replaces processes that are more access
ible and encourages open information exchange, which creates the opportunity to
have a substantial effect on how industries as well as enterprises operate. The system’s
usage of various communication tools and efficient automated systems demonstrates
the favorable effects on a company’s or lender’s long-term growth. The benefit of a
smart office is eliminating internal reporting procedures, such as employee arrival and
departure times, through an open office layout. Improving cooperation and communi
cation can raise efficiency, which influences the outcome.
greater depth [16]. AI-powered solutions have been created to help such practices
in this scheme. Boza and Evgeniou [17] suggested an RL algorithm to stabilize ser
vice suppliers’ profits and clients’ savings in order to attain power system reliability.
Data centers are a potential load management sector where AI can be used [18]. The
enormous volume of data a smart office should produce is among its most crucial
features [19]. Nevertheless, the establishment and growth of such a smart workplace
may face environmental challenges related to the collection and storage of data. Data
centers are energy-intensive businesses that consumed 1% or more of the world’s
electricity in 2018. Their efficiency is based on the consolidation of multiple servers.
According to the research by Crawford [20], data centers will use 2.13% of the total
electrical supply by 2030 in 2021. Mytton [21] reports a warning against statements
made by businesses that they are carbon neutral because this may be the result of
buying carbon credits instead of using renewable sources of energy.
From an environmental standpoint, the sustainable development of data centers is
inextricably linked to the use of renewable resources to influence their operations. It is
crucial to note that exorbitant water usage is a related problem because water is used
to keep down data centers, which can have a significant role in energy utilization. Yet,
it is also employed in oblique ways to generate power [22]. This is significant to the
water shortages due to climatic change, as it has been disclosed that the global water
supply, such as snow and ice, has reduced by 1 cm per annum over the last 20 years [23].
Although service providers and lawmakers have taken steps to reduce these environ
mental issues [22], optimizing energy usage can help to solve this challenging problem.
Li et al. [23] recommended an algorithm to optimize the data center. Cooling systems
and reducing associated costs. A related real-world AI application in data centers is the
ML method proposed by DeepMind for Google, which reduced the expanse of energy
needed for the cooling system by 40%. According to reports, Google and DeepMind will
work together to make the technology accessible to commercial organizations [24,25].
Energy storage is another method for achieving both supply and demand stability.
There are numerous types of energy storage systems, including mechanical (like
flywheels), electrochemical, thermal, and chemical. They may also be split into two
groups based on where they apply. Grid-scale implementations appropriate for mass
storage are accessible. Demand-side applications, on the other hand, are confined to
small regions. Demand-side storage is frequently used with on-site energy produc
tion, as is typically with some sustainable energy sources, like wind and solar. A wide
range of storage technology applications for AI can be thought of. AI has been used,
for example, to create and evaluate the storage systems themselves, such as when
choosing the requirements for lithium-ion batteries to increase their individualism.
An algorithm was created to evaluate the suitable location and measurements of an
energy storage system in the context of improving management in a business signifi
cantly an electric grid using renewable energy sources, as doing so should improve
reliability and minimize power shortfalls [26].
company. This indicates that the distinction between the methods employed to assess
the outcome is an important consideration for management edification and the formu
lation of moral judgment.
Vujovic and Maksimovic [31] suggested authoring a report to elaborate on the
influence of performance monitoring, information/data security, and additional social
immersion coaching elements on employees’ behavior regarding safety assertion.
The safety pledge represents the actions taken to protect employees’ diligent work
and information arrangements. The behavior is very desired because it relates to a
personal aspect within the context of information safety. The authors concluded that
implementing information security monitoring can enhance the cultural behavior
of safety assertion. The study concluded that when employees’ behavior is deemed
inconvenient, safety procedures must be abandoned.
Many earlier studies on monitoring focused on the benefits and drawbacks of
e-monitoring implementation and employees’ reactions. Many businesses have
introduced e-surveillance without the knowledge of their employees, which has a nega
tive effect and makes them worry about their privacy. Most systems use monitoring
systems to keep track of employees’ time records. By utilizing the biometric tech
nology built within their system, practically every firm heavily relies on this strategy.
As a result, a system that can monitor employees’ computer use while they are at
work is needed, in addition to being able to record their arrival and departure times.
A Building automation system lowers energy usage and makes utilizing various
appliances more convenient. Thanks to the energy-saving strategy, building auto
mation today makes a living quite simple. All electrical and technological home
appliances and devices will be controlled remotely through a wireless connection.
Individual control device systems, distributed control device systems, and centrally
controlled device systems are all possible configurations for automation systems
[32]. The simplest home automation devices are individual control devices, which
are programmable gadgets that may be configured to user preferences. On the other
hand, distributed and centrally controlled systems, which build automation systems,
have remote communication and device control capabilities. The distinction between
distributed and central systems is that the latter has a controller to centrally control
all the devices, while the former does not. The disadvantage of a centralized control
system is the breakdown when the controller breaks down [32].
Commercial building automation systems are pricey because they require
specialized hardware, components, and installation. Utilizing open-source platforms
and IoT sensors to perform specialized automated home systems that is tailored to the
demands of the end user is an alternative strategy. The cost of IP-based devices and
customer inexperience with open-source home automation systems are the two main
drawbacks of this strategy. This automation needs to install multiple such pricey IP
based devices, which are out of the price range of low-income homes.
The image shows that the system’s primary implementation components are
sensors, regulating mechanisms, and actuators. The sensors’ data regarding light,
Smart Workspace Automation 171
motion, temperature, and other sensory features is transferred to the primary controlling
devices. Various sensors, such as photodetectors, level sensors, pressure transducers,
transformers, infrared sensors, and temperature sensors or thermistors, require add
itional signal processing apparatus to communicate with the main controller.
Controllers are designed to be coupled to control devices, such as program
mable logic controllers, which get data from sensing devices and perform operations
upon them in accordance with a program. This software could be altered by the
load operations. Different analog or digital inputs and output units, such as sensing
devices, actuating devices, and other devices can be connected to the programmable
controller.
The last devices to regulate the appliances are called actuators, which com
prise limit switches, relays, motors, and other controlling mechanisms. In the home
automation system, connectivity is essential for remote access to these operations.
Additionally, this smart home system provides scheduling, power features, and con
stant surveillance via video surveillance with cameras. This is the best treatment—
even for the old. A simple office building automation system is shown in Figure 10.3.
Typically, it takes place in an automated home setting. It can be divided into sev
eral sorts. A smartphone can be used to control some of them remotely. Second, it can
command a motor or actuator that assures security, like a door lock. Nowadays, many
building automation systems are mostly Android-based, allowing a single smartphone
to manage all household appliances. Arduino, relay modules, Wi-Fi (IEE802.11 b/g/
n)/4G, 5G, or Bluetooth modules can be used with a PC or microcontroller to quickly
create a home automation prototype.
Relay channel count is determined to quickly create a home automation prototype
based on how many appliances you want to connect to the automation system. An
Arduino board can accept up to 12 V of power. It might also be powered by a 9-V DC
battery. Arduino’s 5 V/3.3 V output pin can power Bluetooth and the relay module.
The most common asynchronous transfer method utilized by the Bluetooth
module is the universal asynchronous receiver/transmitter (UART) mode with a band
rate of 9,600-115,200. Use this mode to communicate with another device, such as
a laptop or smartphone. In this instance, a native Android app was utilized to link the
Bluetooth module with the Android phone and control the appliances.
The relay primarily manages electrical devices, including fans, lights, refrigerators,
and air conditioners. It offers total isolation between the high-voltage line and Arduino
or another module. Its primary coil is agitated by delivering 5 V to the coil, which is
mostly applied from the Arduino board.
computing techniques with the emergence of cyber systems, the IoT, cloud computing,
cognitive computing systems, and artificial intelligence (AI) technical platforms.
Since its introduction in 2011, innovations in Industry 4.0 have revolutionized caring
for patients at every stage, including integrating medical facilities, accelerating the
growth of groundbreaking treatments, and prompt detection.
Unfortunately, Industry 4.0 did not meet the increasing demand for “Personalized
care” despite recent automation and high efficiency satisfying the requirement for
production in large quantities with reduced human effort using intelligent produc
tion methods. Industry 5.0, a concept first suggested in 2015, has made it possible
to personalize products and integrate more human intelligence into manufacturing.
Enhancing the interplay between smart machine systems, human intelligence, and
robotic technology is anticipated to design and deliver individualized care and
responsibility for patients with orthopedic disorders. This helps in building on the
sophistication of Industry 4.0 technologies.
Industry 5.0, unlike its predecessor Industry 4.0, shifts its focus from solely
maximizing production efficiency through automation to prioritizing the human
element in manufacturing. It emphasizes the development and implementation of
cutting-edge technologies, such as the IoT and big data analytics, to enhance human
capabilities and improve job satisfaction. While Industry 4.0 focused on replacing
human labor with robots and intelligent systems, Industry 5.0 aims to create collab
orative environments where humans and machines work together synergistically,
leveraging each other’s strengths. With proof of recent research and technological
development, industry 5.0 will advance marketably. Over the last five years, the
manufacturing sector has witnessed significant advancements and transformations
driven by key technologies. Artificial intelligence (AI) and machine learning (ML)
have played pivotal roles in optimizing production processes, enhancing predictive
maintenance, and improving overall efficiency. Collaborative Robots (Cobots)
have been integrated into manufacturing workflows, fostering human-robot col
laboration to streamline tasks and increase productivity. The Internet of Everything
(IoET) has interconnected devices and systems, creating a smart and interconnected
manufacturing environment. Blockchain technology has been employed to enhance
supply chain transparency, traceability, and security. Additionally, adopting digital
twins has become prominent, enabling virtual replicas of physical assets to enhance
monitoring, analysis, and decision-making in the manufacturing sector. Collectively,
these technologies signify a paradigm shift toward more intelligent, connected,
and data-driven manufacturing processes. Their use cases will change, and new
implementation areas will emerge that are essential to defining Industry 5.0. AI has
been integrated into every stage of the manufacturing value chain. AI-enhanced
human machines are a crucial development that will reestablish AI’s standing in
Industry 5.0. The level of interaction between humans and robots has increased
from simple to complex, encompassing the use of data to verify, manufacture, and
operate autonomous vehicles and the development of sophisticated storage facility
picking robots capable of classifying commodities based on the order in which they
are obtained
With the confluence of IoT, big data analytics, and AI, the Smart Factory was born.
Industry 4.0 marked the beginning of the IT-OT combo, which is still expanding to an
174 IoT and Machine Learning for Smart Applications
extent to become IoET. IoET, taken as a whole, refers to various intricately coupled
devices.
In the next decades, these developing technologies are anticipated to grow in a
number of important fields, including:
1. AI-ML: Increased Intelligent Automation will boost office and shop floor
productivity. Businesses place a high priority on quality management, and
AI will help them do that by facilitating decisions in less time. For instance,
process manufacturer Koch collaborates with Independent Software Vendor
(ISVs) headed by AI, such as C3.AI, to deploy AI throughout the organiza
tion. This will enable managing energy use, planning and scheduling manu
facturing, and optimizing inventory.
2. Cobots: The employment of cobots in production and warehouse management
will boost factory productivity, leading to improved uniformity and precision
in product production. ABB, the first company to offer cobots, is leading
technological breakthroughs with its 46 years of cobot-building experience.
Cobots are being introduced to replace manual labor on the shop floor for
Automated Guided Vehicles (AGV) mounting, assembly line automation,
simple packaging, and industrial testing.
3. IoET: IoT is gradually evolving into IoET, and connected industrial
equipment is assisting producers in reducing costs, increasing asset product
ivity, lowering downtimes, and establishing realistic supply chain visibility.
A notable example is Koch, which is utilizing invisible, IoT-enabled tapes
from US-based ISV to make its factories smarter. This clever wireless tape
transmits data like location, position, and temperature while monitoring valu
able cargo and equipment.
4. Blockchain: Assuring operational transparency and enhancing supply chain
visibility, asset monitoring, and operational enhancements for manufacturers
are all aspects of operations in which blockchain technology is gaining
prominence. This development is not just limited to the Banking, Financial
Services, and Insurance (BFSI) sectors.
With Honeywell, this development has already taken a step forward. To
replace manual processes and paper use, Honeywell Aerospace is assiduously
investing in Blockchain to list products for sale, track stakeholder interactions,
and keep track of transactions.
10.4 CONCLUSION
The existing smart workplace principles are expanded upon in this chapter from
the perspective of users. Because cutting-edge technology and design might create
an expectation of modern workplaces with smart office ideas, the requirement for
ongoing improvement of the workplaces must be considered from a management per
spective. This study recommends that a precise statement of the intelligent idea should
be supplied to the consumers, referring to the specific qualities, as various users may
have varied viewpoints and aspirations for smart ideas. With the smart workspace,
Smart Workspace Automation 175
employees can manage the equipment throughout the office to cut down on electri
city waste. For the upcoming development, it is anticipated that a better system will
be developed and created with the addition of more and different outcomes to allow
for greater enhancement in attempting to control other equipment present throughout
the workplace. It can also be created with a data warehouse within every individual’s
smart working space.
All new construction will soon include sensing and communication systems to
give occupants the desired convenience. As a result, it will impact how buildings
are designed in the future, possibly even turning non-residential facilities like hotels
and airports into intelligent structures. There will be a multitude of cutting-edge
life cycle models for smart buildings. To give users of the smart building a richer
user experience, all units should be flexible enough to accommodate technological
improvements.
REFERENCES
[1] Bodker, S. “Rethinking technology on the boundaries of life and work,” Personal
and Ubiquitous Computing, vol. 20, no. 4, 2016, pp. 533-544, DOI: 10.1007/
s00779-016-0933-9.
[2] Kim, J., De Dear, R. “Workspace satisfaction: The privacy-communication trade-off in
open-plan offices,” Journal of Environmental Psychology, vol. 36, 2013, pp. 18-26.
[3] Alipio, M.I. Development of Smart Indoor Workplace System Using Decision
Tree Algorithm. In 2021 IEEE International Conference on Internet of Things and
Intelligence Systems (IoTaIS), 2021, pp. 196-202. IEEE.
[4] A. Jaribion, S. H. Khajavi, J. Holmstrom, “loT-enabled workplaces: a case study of
energy management and data analytics,” IECON 2019 - 45th Annual Conference
of the IEEE Industrial Electronics Society, 2019, pp. 5325-5330, DOI: 10.1109/
IECON.2019.8927003.
[5] Ahvenniemi, H., Huovila, A., Pinto-Seppa, I., Airaksinen, M. “What are the differences
between sustainable and smart cities?” Cities, 2017, 60, 234-245.
[6] Kramers, A., Hojer, M., Lovehagen, N., Wangel, J. “Smart sustainable cities -
Exploring ICT solutions for reduced energy use in cities,” Environmental Modelling &
Software, 2014, 56, 52-62.
[7] Hoang, A.T., Pham, V.V., Nguyen, X.P. “Integrating renewable sources into energy
system for smart city as a sagacious strategy towards clean and sustainable process,”
Journal of Cleaner Production, 2021, 305, 127161.
[8] Adhikari, M., Ghimire, L.P., Kim, Y., Aryal, P., Khadka, S.B. “Identification and ana
lysis of barriers against electric vehicle use,” Sustainability, 2020, 12, 4850.
[9] Sanguesa, J.A., Torres-Sanz, V., Garrido, P., Martinez, F.J., Marquez-Barja, J.M.
“A review on electric vehicles: technologies and challenges,” Smart Cities, 2021, 4,
372-404.
[10] Omitaomu, O.A., Niu, H. “Artificial intelligence techniques in smart grid: a survey,”
Smart Cities, 2021, 4, 548-568.
[11] Yigitcanlar, T., Mehmood, R., Corchado, J.M. “Green artificial intelligence: towards
an efficient, sustainable and equitable technology for smart cities and futures,”
Sustainability, 2021, 13, 8952.
[12] Crossley, P., Beviz, A. “Smart energy systems: transitioning renewables onto the grid,”
Renewable Energy Focus, 2010, 11, 54-59.
176 IoT and Machine Learning for Smart Applications
[13] Lund, H., Andersen, A.N., 0stergaard, P.A., Mathiesen, B.V., Connolly, D. “From
electricity smart grids to smart energy systems—A market operation based approach
and understanding,” Energy, 2012, 42, 96-102.
[14] Blackmon, D. Renewables Won’t Save Us If the Electric Grid Is Not Ready. Forbes. 2020.
[15] O'Connell, N., Pinson, P., Madsen, H., O'Malley, M. “Benefits and challenges of
electrical demand response: A critical review,” Renewable and Sustainable Energy
Reviews, 2014, 39, 686-699.
[16] Lu, R., Hong, S.H., Zhang, X. “A dynamic pricing demand response algorithm
for smart grid: reinforcement learning approach,” Applied Energy, 2018, 220,
220-230.
[17] Boza, P., Evgeniou, T. “Artificial intelligence to support the integration of vari
able renewable energy sources to the power system,” Applied Energy, 2021, 290,
116754.
[18] Hashem, I.A.T., Chang, V., Anuar, N.B., Adewole, K., Yaqoob, I., Gani, A., Ahmed, E.,
Chiroma, H. “The role of big data in smart city,” International Journal of Information
Management, 2016, 36, 748-758.
[19] Koot, M., Wijnhoven, F. “Usage impact on data center electricity needs: a system
dynamic forecasting model,” Applied Energy, 2021, 291, 116798.
[20] Crawford, K. The Atlas of AI: Power, Politics, and the Planetary Costs of Artificial
Intelligence. New Haven, CT: Yale University Press, 2021.
[21] Mytton, D. “Data centre water consumption,” npj Clean Water, 2021, 4, 11.
[22] Tiefenbeck, V., Worner, A., Schob, S., Fleisch, E., Staake, T. “Real-time feedback
promotes energy conservation in the absence of volunteer selection bias and monetary
incentives,” Nature Energy, 2019, 4, 35-41.
[23] Li, Y., Wen, Y., Tao, D., Guan, K. “Transforming cooling optimization for green data
center via deep reinforcement learning,” IEEE Transactions Cybernetics, 2020, 50,
2002-2013.
[24] Google. Our third decade of climate action: realizing a carbon-free future. 14
September 2020. Available online: https://blog.google/outreach-initiatives/sustain
ability/our-third-decade-climate-action-realizing-carbon-free-future/ (accessed on 20
December 2022).
[25] Wong, L.A., Ramachandaramurthy, V.K., Walker, S.L., Taylor, P., Sanjari, M.J.
“Optimal placement and sizing of battery energy storage system for losses reduc
tion using whale optimization algorithm,” Journal of Energy Storage, 2019, 26,
100892.
[26] Almulaiki, W.A. “The impact of performance management on employee perform
ance,” Saudi Journal of Business and Management Studies, 8(2), 2023, pp. 22-27.
[27] Ikonne Chinyere, Prof. Ikonne Chiemela, “Workplace E-monitoring and surveillance
of employees: Indirect tool of information gathering,” International Journal of Science
and Research (IJSR), 3, no. 10, October 2014.
[28] Vilde Hoff Bernstr0m, Helge Svare, “Significance of monitoring and control for
employees’ felt trust, motivation, and mastery,” Nordic Journal of Working Life
Studies, 7, no. 4, December 2017.
[29] Jeske, D., Kapasi, I. “Electronic performance monitoring: Lessons from the Past and
Future Challenges,” In Organizing for digital economy: Societies, communities and
individuals. Proceedings of the 14th annual conference of the Italian chapter of the
AIS, 2018, pp. 119-132.
Smart Workspace Automation 177
[30] Ahmad, Z., Ong, T.S., Liew, T.H., Norhashim, M. “Security monitoring and information
security assurance behaviour among employees: An empirical analysis,” Information
& Computer Security, vol. 27, no. 2, 2019, pp. 165-188.
[31] Vujovic V, Maksimovic M. “Raspberry Pi as a sensor web node for home automation,”
Computers & Electrical Engineering, 44, 2015, 153-171.
[32] George, A.S., George, A.H., Baskar, T. “The evolution of smart factories: How Industry
5.0 is revolutionizing manufacturing,” Partners Universal Innovative Research
Publication, vol. 1, no. 1, 2023, pp. 33-53.
Application of Digital
11 Image Watermarking
in the Internet of Things
and Machine Learning
K. Prabha and I. Shatheesh Sam
11.1 INTRODUCTION
In an increasingly connected world, the convergence of advanced technologies
such as Digital Image Watermarking, the Internet of Things (IoT), and machine
learning has opened up new avenues for securing and interacting with digital
content. Digital Image watermarking is the technique that embeds invisible data
(watermarks) in digital media, such as text, images, audio, and videos, in order to
safeguard its ownership, validity, and integrity. This has significant applications
in the fields of machine learning and the IoT. This powerful combination helps us
to address critical issues such as data security, authentication, and robust image
processing.
The IoT, a network of interconnected devices that communicate seamlessly,
generates an enormous amount of data every day in this fast growing environment.
Frequently, this data consists of sensitive visual information, such as surveillance
camera footage, medical images, or industrial sensor data. The incorporation of Digital
Image Watermarking provides a robust solution for data protection and authentica
tion. Watermarked images can be reliably traced back to their source, ensuring data
integrity and authenticity throughout the IoT ecosystem.
Furthermore, the integration of machine learning techniques enhances the cap
abilities of Digital Image Watermarking within IoT environments. Machine learning
algorithms help in the detection and extraction of watermarks from images, enab
ling real-time monitoring and analysis. This synergy can prove invaluable in various
applications (Hussain et al., 2020), from fraud detection in smart cities to quality
control in industrial IoT (IIoT) setups (Shah et al., 2022).
The landscape exploration of Digital Image Watermarking in the IoT and ML
will delve into the pivotal role in enhancing data security, ensuring authenticity, and
facilitating advanced image processing. This journey will reveal the potential of this
combination, shedding light on how it is reshaping the way to safeguard and leverage
digital imagery in our increasingly interconnected world.
Advantages:
Traceability: Watermarks can embed data about the source or ownership of images,
facilitating traceability, and accountability in data usage.
Disadvantages:
Ethical Considerations: Ethical concerns associated with privacy and consent may
arise, especially in IoT applications, where images may be captured and shared
without the explicit consent of individuals.
Digital image watermarking brings several advantages, including copyright pro
tection and enhanced security; there are some drawbacks such as potential quality
degradation, susceptibility to attacks, and the necessity for careful integration in
diverse IoT environments. It is vital to balance these factors and choose appropriate
watermarking techniques based on specific use cases and requirements.
11.3 APPLICATIONS
When it comes to the IoT and machine learning (ML), digital image watermarking
has numerous valuable applications. Figure 1 shows the Applications of ML and IoT
based digital image watermarking.
Copyright Protection
In IoT scenarios where images are shared and exchanged, digital watermarking aids
to protect the intellectual property rights of content creators and owners.
Data Augmentation in ML
In machine learning models, large datasets are often required for training.
Watermarking can be used to create synthetic datasets with known labels, facilitating
model training and improving its ability to generalize across different scenarios.
For example, watermarking can be applied to images to create synthetic data with
established ground truth labels, which can enhance model robustness.
Forensic Analysis
Watermarking can help in the forensic analysis of images and videos collected by
IoT devices, helping law enforcement agencies and investigators in solving crimes.
It’s important to implement robust and secure watermarking techniques to withstand
various attacks, including image manipulation and removal attempts. Additionally,
compliance with privacy regulations and intellectual property rights is crucial when
implementing watermarking in IoT and ML applications.
Collaborative AI Research
Watermarking is used to protect the intellectual property of research institutions and
organizations involved in collaborative AI research and data sharing. It ensures proper
attribution and credit for contributions.
Privacy-Preserving Collaborative ML
Watermarking can be incorporated into federated learning and collaborative ML
approaches, allowing multiple parties to train models without sharing sensitive raw
data. Watermarks can attest to the credibility of contributed data.
Blockchain-Enabled Watermarking
Combining watermarking with blockchain technology (Wang & Hsu, 2022) offers
a robust solution for data integrity and provenance tracking in diverse applications,
comprising supply chain management and legal documentation.
Privacy-Preserving AI Services
Watermarking can be applied to data used by AI services to confirm that user data
remains confidential and untouched during model training and inference, supporting
privacy-preserving AI.
11.4 CONCLUSION
Digital Image Watermarking emerges as a vital tool in this context, providing robust
mechanisms for data protection, authentication, and ensuring the integrity of visual
content. With its ability to process and analyze vast datasets, machine learning
complements Digital Image Watermarking by enhancing the detection and extrac
tion of watermarks from images. This synergy opens up new avenues for real-time
monitoring and analysis, fostering innovation in various domains. These advanced
applications underscore the adaptability and importance of digital image watermarking
in addressing evolving challenges and opportunities in IoT and machine learning.
Watermarking techniques should be chosen carefully, considering the specific needs
and constraints of each use case, to achieve optimal results in terms of data security,
authenticity, and trustworthiness. In summary, digital image watermarking finds
extensive applications in IoT and ML, ranging from data integrity and privacy protec
tion to content attribution and fairness enhancement.
REFERENCES
[1] Al-kahtani, M. S., Khan, F., & Taekeun, W. (2022). Application of Internet of Things
and Sensors in Healthcare. Sensors, 22(15), 5738. https://doi.org/10.3390/s22155738
[2] Allaf, A. H., & Kbir, M. A. (2019). A Review of Digital Watermarking Applications
for Medical Image Exchange Security. In M. Ben Ahmed, A. A. Boudhir, & A. Younes
(Eds.), Innovations in Smart Cities Applications Edition 2 (pp. 472-480). Springer
International Publishing. https://doi.org/10.1007/978-3-030-11196-0_40
[3] Begum, M., & Uddin, M. S. (2020). Digital Image Watermarking Techniques: A
Review. Information, 11(2), 110. https://doi.org/10.3390/info11020110
[4] Behnia, R., Ozmen, M. O., & Yavuz, A. A. (2019). ARIS: Authentication for Real-Time
loT Systems. ICC 2019 - 2019 IEEE International Conference on Communications
(ICC), 1-6. https://doi.org/10.1109/ICC.2019.8761207
[5] Hashim, M. M., Rhaif, S. H., Abdulrazzaq, A. A., Ali, A. H., & Taha, M. S. (2020).
Based on IoT Healthcare Application for Medical Data Authentication: Towards
A New Secure Framework Using Steganography. IOP Conference Series: Materials
Science and Engineering, 881(1), 012120. https://doi.org/10.1088/1757-899X/881/1/
012120
[6] Hussain, F., Hassan, S. A., Hussain, R., & Hossain, E. (2020). Machine Learning for
Resource Management in Cellular and IoT Networks: Potentials, Current Solutions,
and Open Challenges. IEEE Communications Surveys & Tutorials, 22(2), 1251-1275.
https://doi.org/10.1109/COMST.2020.2964534
[7] Kamili, A., Hurrah, N. N., Parah, S. A., Bhat, G. M., & Muhammad, K. (2021).
DWFCAT: Dual Watermarking Framework for Industrial Image Authentication and
Tamper Localization. IEEE Transactions on Industrial Informatics, 17(7), 5108-5117.
https://doi.org/10.1109/TII.2020.3028612
[8] Muhammad, K., Mustaqeem, Ullah, A., Imran, A. S., Sajjad, M., Kiran, M. S., Sannino,
G., & De Albuquerque, V. H. C. (2021). Human Action Recognition Using Attention
Based LSTM Network with Dilated CNN Features. Future Generation Computer
Systems, 125, 820-830. https://doi.org/10.1016/j.future.2021.06.045
[9] Rahmati, P., Adler, A., & Tran, T. (2013). Watermarking in E-commerce. International
Journal of Advanced Computer Science and Applications, 4(6), 256-306. https://doi.
org/10.14569/IJACSA.2013.040634
Application of Digital Image Watermarking in IoT and ML 195
[10] Shah, S., Iqbal, M., Aziz, Z., Rana, T., Khalid, A., Cheah, Y.-N., & Arif, M. (2022). The
Role of Machine Learning and the Internet of Things in Smart Buildings for Energy
Efficiency. Applied Sciences, 12(15), 7882. https://doi.org/10.3390/app12157882
[11] Sherekar, M. S. S., Thakare, D. V. M., & Jain, D. S. (2008). Role of Digital Watermark
in E-governance and E-commerce. International Journal of Computer Science and
Network Security, 8(1), 257-261.
[12] Wang, C.-H., & Hsu, C.-H. (2022). Blockchain of Resource-Efficient Anonymity
Protection with Watermarking for IoT Big Data Market. Cryptography, 6(4), 49.
https://doi.org/10.3390/cryptography6040049
[13] Zhang, G., Kou, L., Zhang, L., Liu, C., Da, Q., & Sun, J. (2017). A New Digital
Watermarking Method for Data Integrity Protection in the Perception Layer of IoT.
Security and Communication Networks, 2017, 1-12. https://doi.org/10.1155/2017/
3126010
Index
A H
Actuators, 21, 24, 45 Honey badger optimization, 113
Augmented reality, 187
I
B
Industry 4.0, 190
Bigdata, 33, 146 Instance-based learning, 5
Blockchain, 97, 174 Intelligent IoT, 33
Bluetooth, 58, 134 Intelligent transportation system, 6
Internet of Things, 127
C Internet of Things in industry, 28, 33
IoET, 174
Cellular networks, 59
Clone block attack, 97
K
Cloud computing, 22, 33
Cobots, 174 K-Means clustering, 74
Context-dependent sentiment classification,
145 L
Convolutional neural network, 145
Linear regression, 153
Cutting edge technologies, 130
Long Term Evolution Advanced (LTE-A), 135
Cybersecurity, 5
Long-Term Evolution (LTE), 135
Low-power WAN, 58
D
Database as a Service (DBaaS), 47 M
Data heterogeneity, 70
Machine-to-Machine (M2M) communication, 33
Decision trees, 71
Mesh networking, 59
Digital watermarking, 187
Microcontrollers, 24, 45
Mobile edge computing, 97
E
MQTT, 166
Edge computing, 22, 35, 59 MultinomialNB, 146
Embedded systems, 25 Multipliers, 112
Encircling, 104 Multitask learning, 4
Ensemble learning, 4
N
F
NB-IoT, 58
Feedforward neural network, 145 Network functions virtualization, 136
Field programmable gate array, 111 Neural network learning, 4
5G Connectivity, 33 NLP, 113
G P
Global roaming, 60 Perception layer, 40
Grey wolf optimization, 103 Principal component analysis, 145
197
198 Index
Q T
Quantum key distribution, 136 Three-layer architecture, 40
Quantum networking, 136 Title firmness, 42
Transfer learning, 105
R
U
Random forest, 73
Reinforcement learning, 3, 82 Ultra-wideband, 134
Renewable energy, 7 Unsupervised learning, 2, 81
RFID, 33, 133, 164
V
S
VGG16, 107
Semi-supervised learning, 3 VGG16-TL, 102
Sensing and Actuation as a Service (SAaaS),
47 W
Sensing as a Service (SaaS), 47
Wearable devices, 27
Sensor as a Service (SenaaS), 47
Wireless fidelity, 134
Sensors, 21, 24, 45
Wireless sensor networks, 134
Sigfox, 58
6LoWPAN, 43
Z
Smart grid, 130
Supervised learning, 2, 81 ZigBee, 42, 58, 134
Support vector machines, 71, 115 Z-wave, 58