Machine Learning Applications
Home > Computing and Information Technology > Computer science > Artificial intelligence > Machine learning > Machine Learning Applications: From Computer Vision to Robotics
Machine Learning Applications: From Computer Vision to Robotics

Machine Learning Applications: From Computer Vision to Robotics

|
     0     
5
4
3
2
1




International Edition


About the Book

Machine Learning Applications Practical resource on the importance of Machine Learning and Deep Learning applications in various technologies and real-world situations Machine Learning Applications discusses methodological advancements of machine learning and deep learning, presents applications in image processing, including face and vehicle detection, image classification, object detection, image segmentation, and delivers real-world applications in healthcare to identify diseases and diagnosis, such as creating smart health records and medical imaging diagnosis, and provides real-world examples, case studies, use cases, and techniques to enable the reader’s active learning. Composed of 13 chapters, this book also introduces real-world applications of machine and deep learning in blockchain technology, cyber security, and climate change. An explanation of AI and robotic applications in mechanical design is also discussed, including robot-assisted surgeries, security, and space exploration. The book describes the importance of each subject area and detail why they are so important to us from a societal and human perspective. Edited by two highly qualified academics and contributed to by established thought leaders in their respective fields, Machine Learning Applications includes information on: Content based medical image retrieval (CBMIR), covering face and vehicle detection, multi-resolution and multisource analysis, manifold and image processing, and morphological processing Smart medicine, including machine learning and artificial intelligence in medicine, risk identification, tailored interventions, and association rules AI and robotics application for transportation and infrastructure (e.g., autonomous cars and smart cities), along with global warming and climate change Identifying diseases and diagnosis, drug discovery and manufacturing, medical imaging diagnosis, personalized medicine, and smart health records With its practical approach to the subject, Machine Learning Applications is an ideal resource for professionals working with smart technologies such as machine and deep learning, AI, IoT, and other wireless communications; it is also highly suitable for professionals working in robotics, computer vision, cyber security and more.

Table of Contents:
About the Authors xiii Preface xv 1 Statistical Similarity in Machine Learning 1 Dmitriy Klyushin 1.1 Introduction 1 1.2 Featureless Machine Learning 2 1.3 Two-Sample Homogeneity Measure 3 1.4 The Klyushin–Petunin Test 3 1.5 Experiments and Applications 4 1.6 Summary 6 References 6 2 Development of ML-Based Methodologies for Adaptive Intelligent E-Learning Systems and Time Series Analysis Techniques 11 Indra Kumari, Indranath Chatterjee, and Minho Lee 2.1 Introduction 11 2.1.1 Machine Learning 12 2.1.2 Types of Machine Learning 12 2.1.3 Learning Methods 13 2.1.4 E-Learning with Machine Learning 14 2.1.5 Need for Machine Learning 15 2.2 Methodological Advancement of Machine Learning 16 2.2.1 Automatic Learner Profiling Agent 16 2.2.2 Learning Materials’ Content Indexing Agent 17 2.2.3 Adaptive Learning 17 2.2.4 Proposed Research 18 2.2.5 Multi-Perspective Learning 18 2.2.6 Machine Learning Recommender Agent for Customization 19 2.2.6.1 E-Learning 19 2.2.7 Data Creation 19 2.2.8 Naïve Bayes model 19 2.2.9 K-Means Model 20 2.3 Machine Learning on Time Series Analysis 21 2.3.1 Time Series Representation 22 2.3.2 Time Series Classification 24 2.3.3 Time Series Forecasting 25 2.4 Conclusion 26 Acknowledgment 28 Conflict of Interest 28 References 28 3 Time-Series Forecasting for Stock Market Using Convolutional Neural Network 31 Partha Pratim Deb, Diptendu Bhattacharya, Indranath Chatterjee, and Sheetal Zalte 3.1 Introduction 31 3.2 Materials 33 3.3 Methodology 33 3.3.1 The Convolutional Neural Network 34 3.4 Accuracy Measurement 35 3.5 Result and Discussion 35 3.6 Conclusion 47 Acknowledgement 47 References 48 4 Comparative Study for Applicability of Color Histograms for CBIR Used for Crop Leaf Disease Detection 49 Jayamala Kumar Patil, Sampada Abhijit Dhole, Vinay Sampatrao Mandlik, and Sachin B. Jadhav 4.1 Introduction 49 4.2 Literature Review 50 4.3 Methodology 51 4.3.1 Color Features 52 4.3.1.1 RGB Color Model/Space 53 4.3.1.2 HSV Color Space 53 4.3.1.3 YCbCr Color Space 54 4.3.1.4 Color Histogram 54 4.3.2 Database 54 4.3.3 Parameters for Performance Analysis 57 4.3.4 Experimental Procedure for CBIR Using Color Histogram for Detection of Disease 58 4.4 Results and Discussions 60 4.4.1 Results of CBIR Using Color Histogram for Detection of Soybean Alfalfa Mosaic Virus Disease 60 4.4.2 Results of CBIR Using Color Histogram for Detection of Soybean Septoria Brown Spot (SBS) Disease 62 4.4.3 Results of CBIR Using Color Histogram for Detection of Soybean Healthy Leaf 63 4.5 Conclusion 63 References 65 Biographies of Authors 67 5 Stock Index Forecasting Using RNN-Long Short-Term Memory 69 Partha Pratim Deb, Diptendu Bhattacharya, and Sheetal Zalte 5.1 Introduction 69 5.2 Materials 71 5.3 Methodology 71 5.3.1 RNN 71 5.3.2 LSTM 72 5.4 Result and Discussion 73 5.4.1 Comparison Table for the Method TAIEX 80 5.4.2 Comparison Table for Method BSE-SENSEX 80 5.4.3 Comparison Table for Method KOSPI 80 5.5 Conclusion 81 Acknowledgement 83 References 84 6 Study and Analysis of Machine Learning Models for Detection of Phishing URLs 85 Shreyas Desai, Sahil Salunkhe, Rashmi Deshmukh, and Sheetal Zalte 6.1 Introduction 85 6.2 Literature Review 86 6.3 Methodology 87 6.3.1 Proposed Work 87 6.3.2 Traditional Methods 87 6.3.2.1 Blacklist Method 88 6.3.2.2 Heuristic-Based Model 88 6.3.2.3 Visual Similarity 89 6.3.2.4 Machine Learning–Based Approach 89 6.4 Results and Experimentation 89 6.4.1 Dataset Creation 89 6.4.2 Feature Extraction 90 6.4.3 Training Data and Comparison 90 6.4.3.1 XGB (eXtreme Gradient Boosting) 90 6.4.3.2 Logistic Regression (LR) 90 6.4.3.3 RFC (Random Forest Classifier) 91 6.4.3.4 Decision Tree 91 6.4.3.5 SVM (Support Vector Machines) 91 6.4.3.6 KNN (K-Nearest Neighbors) 91 6.5 Model-Metric Analysis 91 6.6 Conclusion 94 References 94 7 Real-World Applications of BC Technology in Internet of Things 97 Pardeep Singh, Ajay Kumar, and Mayank Chopra 7.1 Introduction 97 7.1.1 Relevance and Benefits of Blockchain Technology Applications 98 7.2 Review of Existing Study 100 7.3 Background of Blockchain 101 7.3.1 Blockchain Stakeholders 101 7.3.2 What is Bitcoin? 102 7.3.3 Emergence of Bitcoin 102 7.3.4 Working of Bitcoin 102 7.3.5 Risk in Bitcoin 103 7.3.6 Legal Issues in Bitcoin 103 7.4 Blockchain Technology in Internet of Things 104 7.4.1 Need of Integrating Blockchain with IoT 104 7.4.1.1 IoT Data Traceability and Reliability 105 7.4.1.2 Superior Interoperability 105 7.4.1.3 Increased Security 105 7.4.1.4 IoT System Autonomous Interactions 106 7.4.2 Hyperledger 106 7.4.3 Ethereum 107 7.4.4 Iota 107 7.5 Challenges and Concerns in Integrating Blockchain with the IoT 108 7.5.1 Blockchain Challenges and Concern 108 7.5.1.1 Scalability 108 7.5.1.2 Privacy Infringement 109 7.5.2 Privacy and Security issues with Internet of Things 109 7.6 Blockchain Applications for the Internet of Things (BIoT Applications) 110 7.6.1 BIoT Applications for Smart Agriculture 111 7.6.2 Blockchain for Smart Agriculture 111 7.6.3 Intelligent Irrigation Driven by IoT 111 7.7 Application of BIoT in Healthcare 112 7.7.1 Interoperability 113 7.7.2 Improved Analytics and Data Storage 113 7.7.3 Increased Security 113 7.7.4 Immutability 114 7.7.5 Quicker Services 114 7.7.5.1 Transparency 114 7.8 Application of BIoT in Voting 115 7.9 Application of BIoT in Supply Chain 116 7.10 Summary 116 References 117 8 Advanced Persistent Threat: Korean Cyber Security Knack Model Impost and Applicability 123 Indra Kumari and Minho Lee 8.1 Introduction 123 8.2 Background Study 124 8.3 Literature Review 126 8.4 Research Questions 131 8.5 Research Objectives 131 8.6 Research Hypothesis 131 8.7 Phases of APT Outbreak 131 8.7.1 Gain Access 132 8.7.2 Establish Foothold 132 8.7.3 Deepen Access 133 8.7.4 Move Laterally 133 8.7.5 Look, Learn, and Remain 133 8.8 Research Methodology 134 8.8.1 South Korea Cyber Security Initiatives and Applicability 135 8.8.2 Korea’s Cyber-Security Program Proposals 137 8.8.2.1 Modernized Multi-Negotiator Retreat Arrangement 137 8.8.2.2 Headway of the Realms Exemplary 137 8.8.2.3 Scrutiny of Over apt in Cyber Retreat 137 8.8.2.4 Indiscriminate Inconsistency Revealing 138 8.9 A Deception Exemplary of Counter-Offensive 138 8.10 Conclusion 141 Acknowledgment 142 Conflict of Interest 142 References 142 9 Integration of Blockchain Technology and Internet of Things: Challenges and Solutions 145 Aman Kumar Dhiman and Ajay Kumar 9.1 Introduction 145 9.2 Overview of Blockchain–IoT Integration 146 9.3 How Blockchain–IoT Work Together 146 9.3.1 Network in IoT Devices 147 9.3.2 Network in IoT with Blockchain Technology 148 9.3.3 Data Flow in IoT Devices 148 9.3.4 Data Flow in IoT with Blockchain 149 9.3.5 The Role of Blockchain in IoT 149 9.3.6 The Role of IoT in Blockchain 150 9.4 Blockchain–IoT Applications 151 9.5 Related Studies on Integration of IoT and Blockchain Applications 153 9.6 Challenges of Blockchain–IoT Integration 155 9.7 Solutions of Blockchain-IoT Integration 155 9.8 Future Directions for Blockchain–IoT Integration 156 9.9 Conclusion 157 References 157 10 Machine Learning Techniques for SWOT Analysis of Online Education System 161 Priyanka P. Shinde, Varsha P. Desai, T. Ganesh Kumar, Kavita S. Oza, and Sheetal Zalte 10.1 Introduction 161 10.2 Motivation 162 10.3 Objectives 163 10.4 Methodology 163 10.5 Dataset Preparation 164 10.6 Data Visualization and Analysis 170 10.6.1 Observations 171 10.7 Machine Learning Techniques Implementation 178 10.7.1 K-Nearest Neighbors 178 10.7.2 Decision Tree 178 10.7.3 Random Forest 178 10.7.4 Support Vector Machine 179 10.7.5 Logistic Regression 179 10.8 Conclusion 179 References 180 11 Crop Yield and Soil Moisture Prediction Using Machine Learning Algorithms 183 Debarghya Acharjee, Nibedita Mallik, Dipa Das, Mousumi Aktar, and Parijata Majumdar 11.1 Introduction 183 11.2 Literature Review 185 11.3 Methodology 187 11.4 Result and Discussion 190 11.5 Conclusion 191 References 193 12 Multirate Signal Processing in WSN for Channel Capacity and Energy Efficiency Using Machine Learning 195 Prashant R. Dike, T. S. Vishwanath, V. M. Rohokale, and D. S. Mantri 12.1 Introduction 195 12.2 Energy Management in WSN 197 12.3 Different Strategies to Increase Energy Efficiency 197 12.4 Algorithm Development 198 12.5 Results 202 12.6 Summary 203 References 203 13 Introduction to Mechanical Design of AI-Based Robotic System 207 Mohammad Zubair 13.1 Introduction 207 13.2 Mechanisms in a Robot 209 13.2.1 Serial Manipulator 209 13.2.2 Parallel Manipulator 209 13.3 Kinematics 212 13.3.1 Degree of Freedom 214 13.3.2 Position and Orientation in a Robotic System 215 13.4 Conclusion 216 Acknowledgment 217 Conflict of Interest 217 References 217 Index 219


Best Sellers


Product Details
  • ISBN-13: 9781394173327
  • Publisher: John Wiley & Sons Inc
  • Binding: Hardback
  • No of Pages: 240
  • Returnable: N
  • Sub Title: From Computer Vision to Robotics
  • ISBN-10: 1394173326
  • Publisher Date: 01 Dec 2023
  • Language: English
  • Returnable: Y
  • Returnable: N
  • Weight: 535 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Machine Learning Applications: From Computer Vision to Robotics
John Wiley & Sons Inc -
Machine Learning Applications: From Computer Vision to Robotics
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Machine Learning Applications: From Computer Vision to Robotics

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!