ebook img

Artificial Intelligence and Cybersecurity: Advances and Innovations (Green Engineering and Technology) PDF

223 Pages·2022·17.126 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Artificial Intelligence and Cybersecurity: Advances and Innovations (Green Engineering and Technology)

Artificial Intelligence and Cybersecurity Green Engineering and Technology: Concepts and Applications Series Editors: Brujo Kishore Mishra, GIET University, India and Raghvendra Kumar, LNCT College, India Environment is an important issue these days for the whole world. Different strategies and technologies are used to save the environment. Technology is the application of knowledge to practical requirements. Green technologies encompass various aspects of technology which help us reduce the human impact on the environment and creates ways of sustainable development. Social equability, this book series will enlighten the green technology in different ways, aspects and methods. This technology helps people to understand the use of different resources to fulfil needs and demands. Some points will be discussed as the combination of involuntary approaches, government incentives and a comprehensive regulatory framework will encourage the diffusion of green technology, least developed countries and developing small island states require unique support and measures to promote the green technologies. Handbook of Green Engineering Technologies for Sustainable Smart Cities Edited by K. Saravanan and G. Sakthinathan Green Engineering and Technology Innovations, Design, and Architectural Implementation Edited by Om Prakash Jena, Alok Ranjan Tripathy and Zdzislaw Polkowski Machine Learning and Analytics in Healthcare Systems Principles and Applications Edited by Himani Bansal, Balamurugan Balusamy, T. Poongodi and Firoz Khan K P Convergence of Blockchain Technology and E-Business: Concepts, Applications, and Case Studies Edited by D. Sumathi, T. Poongodi, Bansal Himani, Balamurugan Balusamy and Firoz Khan K P Handbook of Sustainable Development Through Green Engineering and Technology Edited by Vikram Bali, Rajni Mohana, Ahmed Elngar, Sunil Kumar Chawla and Gurpreet Singh Integrating Deep Learning Algorithms to Overcome Challenges in Big Data Analytics Edited by R. Sujatha, S. L. Aarthy and R. Vettriselvan Big Data Analysis for Green Computing Concepts and Applications Edited by Rohit Sharma, Dilip Kumar Sharma, Dhowmya Bhatt and Binh Thai Pham Green Computing in Network Security Energy Efficient Solutions for Business and Home Edited by Deepak Kumar Sharma, Koyel Datta Gupta and Rinky Dwivedi Handbook of Green Computing and Blockchain Technologies Edited by Kavita Saini and Manju Khari Artificial Intelligence and Cybersecurity Advances and Innovations Edited by Ishaani Priyadarshini and Rohit Sharma For more information about this series, please visit: https://www.routledge.com/Green -Engineering-and-Technology-Concepts-and-Applications/book-series/CRCGETCA Artificial Intelligence and Cybersecurity Advances and Innovations Edited by Ishaani Priyadarshini and Rohit Sharma First edition published 2022 by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742 and by CRC Press 2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN © 2022 Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, LLC Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publish- ers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www .copyright .com or con- tact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please contact mpkbookspermissions @tandf .co .uk Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging‑in‑Publication Data Names: Priyadarshini, Ishaani, 1992- editor. | Sharma, Rohit, editor. Title: Artificial intelligence and cybersecurity : advances and innovations / edited by Ishaani Priyadarshini and Rohit Sharma. Description: First edition. | Boca Raton, FL : CRC Press, 2022. | Includes bibliographical references and index. Identifiers: LCCN 2021038664 (print) | LCCN 2021038665 (ebook) | ISBN 9780367466664 (hbk) | ISBN 9780367563950 (pbk) | ISBN 9781003097518 (ebk) Subjects: LCSH: Artificial intelligence--Industrial applications. | Artificial intelligence--Medical applications. | Machine learning--Industrial applications. | Blockchains (Databases) | Computer security. Classification: LCC TA347.A78 A788 2022 (print) | LCC TA347.A78 (ebook) | DDC 006.3--dc23 LC record available at https://lccn.loc.gov/2021038664 LC ebook record available at https://lccn.loc.gov/2021038665 ISBN: 9780367466664 (hbk) ISBN: 9780367563950 (pbk) ISBN: 9781003097518 (ebk) DOI: 10.1201/9781003097518 Typeset in Times by Deanta Global Publishing Services, Chennai, India Contents Preface......................................................................................................................vii About the Editors ......................................................................................................ix Contributors ..............................................................................................................xi Chapter 1 Heart Disease Prediction: A Comparative Study Based on a Machine-Learning Approach ...............................................................1 Pijush Dutta, Shobhandeb Paul, Neha Shaw, Susmita Sen and Madhurima Majumder Chapter 2 AI Impacts on Photonic Crystal Sensing for the Detection of Tumors ..............................................................................................19 Sunil Sharma and Lokesh Tharani Chapter 3 Cybersecurity Solutions and Communication Technologies for Internet of Things Applications .........................................................35 Gagan Varshney and Bharat Bhushan Chapter 4 Cyberattacks and Risk Management Strategy in Internet of Things Architecture ...........................................................................51 Saurabh Bhatt and Bharat Bhushan Chapter 5 Blockchain-Based Cybersecurity Solutions for Industry 4.0 Applications ........................................................................................69 Tanya Shrivastava and Bharat Bhushan Chapter 6 A Review of Precision Agriculture Based on Embedded System Applications ........................................................................................87 S. Ramesh and M. Vinoth Kumar Chapter 7 Facial Feature-Based Human Emotion Detection Using Machine Learning: An Overview ....................................................107 Mritunjay Rai, Agha Asim Husain, Rohit Sharma, Tanmoy Maity and R. K. Yadav v vi Contents Chapter 8 A Comprehensive Study of Security in Electronic Commerce Frameworks in the Modern Era of Technology ...............................121 Sushree Bibhuprada B. Priyadarshini Chapter 9 Identification of Paddy Diseases by Various Algorithms–A Review ....................................................................141 S. Ramesh and M. Vinoth Kumar Chapter 10 A Multimodal Biosignal Compression Technique for Monitoring Health in Wearable Devices ..........................................155 Ithayarani Pannerselvam Chapter 11 A Comprehensive Study on Metaheuristics, Big Data and Deep Neural Network Strategies ...............................................................175 Sushree Swagatika Jena, Sushree Bibhuprada and B. Priyadarshini Chapter 12 Communication Strategies for Interaction in Social Networks: A Multilingual Perspective ..............................................................195 Bui Phu Hung and Bui Thanh Khoa Index ......................................................................................................................209 Preface This book will make the readers aware of the current state of the art of artificial intelligence in cybersecurity. It includes content related to various types of artificial intelligence techniques including machine learning and natural language process- ing and therefore highlights the impact of artificial intelligence in cybersecurity. Considering the current state, future research directions may be obtained from the book. Chapter 1 discusses research into the classification of heart disease models from 303 datasets taken from the UCI repository. Before classification of data, cleaning and filtering was performed to eliminate the null values and identify the potential attributes. Among the four classification models: kNN, DT, XGBoost and random forest, the best classification models were identified on the basis of accuracy: area under ROC (AUC) and training time. In Chapter 2, photonic crystals (PhC) have been utilised due to their generous structures and flexibility to adapt to every field. A dual core PCF refractive index sensor is proposed with the aim of improving performance, sensing ability, accuracy and selectivity by using identified AI algorithms. Tumor cells have refractive indices between 1.3342 and 1.4251. The maximum sensitivity observed was 32,358 nm/RIU and the minimum sensitivity observed was 11,258 nm/RIU. The highest accuracy reported for SVM was 96%. The aim of Chapter 3 is to provide a brief overview of security issues in the IoT and discuss possible countermeasures. This work highlights various security mecha- nisms adopted by IoT services and explores the most emerging IoT communication technology protocols. Further, this work provides the new scope to overcome threats and cyberattacks in an efficient and automated manner using computational intel- ligence technologies. The goals of Chapter 4 are to deliver an in-depth review of cybersecurity-ori- ented IoT architecture, provide insights into cyberthreats for the IoT, provide security necessities, outline the cyber-challenges and give visions on how these challenges can be overcome. Finally, the chapter offers new directions and research trends into cybersecurity and the IoT. The focus of Chapter 5 is to highlight the layered security architecture and working of the IoT. This work also throws light on the major threats and challenges faced by Industry 4.0 and other related technologies. Next, it outlines the proposed solutions to cyberthreats in Industry 4.0. Further, this work highlights the need for blockchain technology in Industry 4.0 and presents a detailed discussion on various application scenarios. Chapter 6 discusses the political, social and economic issues plaguing farmers and causing huge economic losses. Research is focusing on detecting the problems in their early stages, thus saving farmers from financial hardship. vii viii Preface Chapter 7 provides a brief discussion on human emotion detection which reveals additional information. Several methods are discussed concerning the detection of human emotions from facial expressions. With the advancement in new technologies such as machine learning and deep learning, emotional features are extracted, show- ing the strength of both algorithms at pattern recognition and classification. Chapter 8 elaborates on the significance of security systems and security mea- sures employed in electronic commerce, discussing the essential requirements of e-transactions. Further, the chapter throws light on the various dimensions of secu- rity relating to e-commerce. Concepts such as secure SSL certificates, SHTTP and secure digital transmission as well as major strategies employed for combating fraud are discussed. The chapter wraps up with a review of e-commerce payment systems. Chapter 9 reports on a survey that uses various techniques to detect, classify and quantify rice diseases. The authors stress the need for early detection of symp- toms. Detection, classification and quantification are integrated into each technique’s algorithms. Chapter 10 proposes a transfer learning-based multimodal convolutional denois- ing auto encoder to perform multimodal compression and to reconstruct the data from its latent representation. Transfer learning helps the system to reuse the learned weights which may reconstruct the data with a better-quality score than by randomly initialised weights. The proposed work achieves a compression ratio of 128 and it is proved that multimodal compression is better than unimodal compression in cases of consuming multiple sensors. And the experimental result proves that the computa- tion cost is lower in multimodal compression than in unimodal compression. Chapter 11 discusses the popular contexts of metaheuristics and big data which are employed in current information technology. Later on, various key concepts of deep learning, deep neural networks and artificial neural networks are detailed. It critically analyses the difference between deep learning and machine learning while discussing the details of various metaheuristic algorithms such as genetic algo- rithms, practical swarm optimisation, etc. Chapter 12 critically reviews communication strategies used on social networks from a multilingual perspective. This chapter first discusses communication strate- gies from different perspectives before making an in-depth review of communica- tion strategies from a multilingual perspective. It then sheds light on the nature of communication on social networks as a multilingual and multicultural environment. Finally, it gives implications for educating second language communication in a multilingual world. About the Editors Ishaani Priyadarshini is a PhD candidate at the University of Delaware, USA. She earned her master’s degree in cybersecurity from the University of Delaware. Prior to that she completed her bachelor’s degree in computer science engineering and a master’s degree in information security from Kalinga Institute of Industrial Technology, India. She has authored several book chapters for reputed publishers including IGI Global and Wiley & Sons and is also an author of several publications for SCIE indexed journals. As a certified reviewer, she conducts peer reviews of research papers for prestigious IEEE, Elsevier and Springer journals and is a mem- ber of the editorial board for the International Journal of Information Security and Privacy (IJISP). Her areas of research include cybersecurity, artificial intelligence and human–computer interaction. Rohit Sharma is an assistant professor in the Department of Electronics and Communication Engineering, SRM Institute of Science and Technology, Delhi NCR Campus, Ghaziabad, India. He is an active member of ISTE, IEEE, ICS, IAENG and IACSIT. He is an editorial board member and reviewer of more than 12 inter- national journals and conferences, including the premier journal IEEE Access and IEEE Internet of Things Journal. He serves as a book editor for seven different titles to be published by Apple Academic Press, CRC Press/Taylor & Francis Group, USA, Springer, etc. He received the Young Researcher Award at the 2nd Global Outreach Research and Education Summit & Awards 2019 hosted by Global Outreach Research & Education Association (GOREA). He serves as guest editor for the SCI journals of Elsevier, CEE and Springer WPC. He has been an organiser for various reputed international conferences. He served as an Editor and Organising Chair to the Third Springer International Conference on Microelectronics and Telecommunication (2019) and has served as the Editor and Organising Chair to the Second IEEE International Conference on Microelectronics and Telecommunication (2018); Editor and Organising Chair to IEEE International Conference on Microelectronics and Telecommunication (ICMETE–2016) held in India; Technical Committee member for CSMA2017, Wuhan, Hubei, China; EEWC 2017, Tianjin, China; IWMSE2017 Guangzhou, Guangdong, China; ICG2016, Guangzhou, Guangdong, China and ICCEIS2016 Dalian, Liaoning Province, China. ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.