Mathematical Modeling for Intelligent Systems: Theory, Methods, and Simulation

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Mathematical Modeling for Intelligent Systems: Theory, Methods, and Simulation aims to provide a reference for the applications of mathematical modeling using intelligent techniques in various unique industry problems in the era of Industry 4.0. Providing a thorough introduction to the field of soft-computing techniques, this book covers every major technique in artificial intelligence in a clear and practical style. It also highlights current research and applications, addresses issues encountered in the development of applied systems, and describes a wide range of intelligent systems techniques, including neural networks, fuzzy logic, evolutionary strategy, and genetic algorithms. This book demonstrates concepts through simulation examples and practical experimental results.

Key Features:

• Offers a well-balanced mathematical analysis of modeling physical systems

• Summarizes basic principles in differential geometry and convex analysis as needed

• Covers a wide range of industrial and social applications and bridges the gap between core theory and costly experiments through simulations and modeling

• Focuses on manifold ranging from stability of fluid flows, nanofluids, drug delivery, and security of image data to pandemic modeling, etc.

This book is primarily aimed at advanced undergraduates and postgraduate students studying computer science, mathematics, and statistics. Researchers and professionals will also find this book useful.

Author(s): Mukesh Kumar Awasthi, Ravi Tomar, Maanak Gupta
Publisher: CRC Press/Chapman & Hall
Year: 2022

Language: English
Pages: 258
City: Boca Raton

Cover
Half Title
Title Page
Copyright Page
Table of Contents
Preface
Editors
Contributors
1 Sensors, Embedded Systems, and IoT Components
1.1 Introduction
1.2 Introduction to Embedded Computing Systems
1.2.1 Usage of Sensors and Actuators in Embedded System
1.2.2 Embedded Computing System: Reliability Analysis
1.3 Internet of Things: Introduction, Applications, and Trends
1.4 Applications of IoT
1.4.1 Data Privacy, Adaptability, Sensibility, and Security
1.5 Introduction to Sensors
1.5.1 Environmental Monitoring
1.5.2 Control Applications
1.5.3 Trends in Sensor Technology
1.5.4 Future Scope
1.6 Artificial Intelligence and Internet of Things
1.6.1 Intro to Artificial Intelligence (AI)
1.6.2 Convergence of AI and IoT
1.7 Conclusion
1.8 Summary
References
2 Security and Privacy in Mobile Cloud Computing
2.1 Introduction
2.1.1 General Architecture
2.1.2 Features
2.2 Mobile Cloud Service Models
2.3 Green Mobile Cloud Computing
2.4 Introduction to Security and Privacy in Mobile Cloud Computing
2.5 Security and Privacy Challenges in Mobile Cloud Computing
2.5.1 Challenges Related to Data Security
2.5.2 Offloading and Partitioning Security Challenges
2.5.3 Virtualization
2.5.4 Challenges Related to Mobile Cloud Applications
2.5.5 Security Challenges Related to Mobile Devices
2.5.6 Security of Mobile Network
2.5.7 Problems Related to Mobile Terminal
2.5.7.1 Malware
2.5.7.2 Vulnerabilities in Software
2.5.8 Mobile Cloud
2.5.9 Privacy Challenges
2.6 Current Solutions for the Security and Privacy Issues
2.6.1 Data Security
2.6.2 Partitioning and Offloading
2.6.3 Virtualization
2.6.4 Mobile Cloud Applications
2.6.5 Mobile Devices
2.6.6 Mobile Network
2.6.7 Mobile Terminal
2.6.7.1 Antimalware
2.6.7.2 Software Vulnerabilities
2.6.8 Mobile Cloud
2.6.9 Privacy
2.7 Discussion and Conclusion
References
3 A Review on Live Memory Acquisition Approaches for Digital Forensics
3.1 Introduction
3.2 Related Work
3.3 Technical Background
3.3.1 Direct Memory Access
3.3.2 IEEE 1394
3.3.3 System Management Mode
3.3.4 x86 Architecture
3.3.5 Virtualization Support
3.4 Review of Memory Acquisition Techniques
3.4.1 Hardware-Based Memory Acquisition
3.4.1.1 Dedicated Hardware
3.4.1.2 Special Hardware Bus
3.4.1.3 Cold Booting
3.4.1.4 Limitations of Hardware-Based Techniques
3.4.2 Software-Based Memory Acquisition
3.4.2.1 User Level
3.4.2.2 Kernel Level
3.4.2.3 Virtualization Based
3.4.2.4 Limitations of Software-Based Techniques
3.4.3 Firmware-Based Memory Acquisition
3.5 Memory Dump Formats
3.5.1 Raw Memory Dump
3.5.2 Windows Crash Dump
3.5.2.1 Complete Memory Dump
3.5.2.2 Kernel Memory Dump
3.5.2.3 Small Memory Dump
3.5.3 Windows Hibernation File
3.5.4 Expert Witness Format
3.5.5 AFF4 Format
3.5.6 HPAK Format
3.6 Memory Acquisition Tools
3.6.1 Magnet RAM Capture
3.6.2 Belkasoft Live RAM Capturer
3.6.3 FTK Imager
3.6.4 DumpIt
3.7 Implementation
3.8 Performance Comparison
3.9 Conclusion
References
4 IoMT and Blockchain-Based Intelligent and Secured System for Smart Healthcare
4.1 Introduction
4.2 Application of IoT in Intelligent Systems
4.2.1 Smart Homes
4.2.2 Smart City
4.2.3 Self-Driven Cars
4.2.4 IoT in Healthcare
4.3 Application of IoT in Healthcare
4.3.1 Health Monitoring
4.3.2 Remote Sensors
4.3.3 Clinical Alert Systems
4.4 Advantages of IoMT
4.5 Blockchain-Based Security of Intelligent IoMT-Based Smart Healthcare
4.6 Application of Blockchain in Intelligent Systems
4.6.1 Cash Transfer and Installment Handling
4.6.2 Supply Chains Checking
4.6.3 Tracking the Supplies
4.6.4 Verification of the Team
4.6.5 A Focus on Transactions
4.7 Advantages of Blockchain in Healthcare
4.7.1 Transparency in the Supply Chain
4.7.2 Patient-Centric Electronic Health Records
4.7.3 IoT Security for Remote Monitoring
4.8 Challenges for Blockchain in Healthcare
4.8.1 Major Shift
4.8.2 Refusal to Share
4.8.3 Distributed Healthcare
4.9 IoMT with Edge/Fog Computing
4.10 Conclusion
References
5 AI-Enabled Cloud-Based Intelligent System for Telemedicine
5.1 Introduction
5.2 Artificial Intelligence in Intelligent Systems
5.2.1 Application of Artificial Intelligence in Telemedicine Systems
5.2.1.1 AI and BCI
5.2.1.2 AI and Nanotechnology
5.2.1.3 AI with Machine Learning in Research
5.2.1.4 AI and Drug Creation
5.2.2 Challenges of AI in Telemedicine Systems
5.3 Cloud Computing in Intelligent Systems
5.3.1 Application of Cloud Computing in Telemedicine Systems
5.4 Conclusion
References
6 Fuzzy Heptagonal DEMATEL Technique and Its Application
6.1 Introduction
6.2 Preliminaries
6.3 Fuzzy Heptagonal DEMATEL Method
6.3.1 Numerical Illustration
6.4 Conclusion
References
7 A Comparative Study of Intrapersonal and Interpersonal Influencing Factors on the Academic Performance of Technical and Nontechnical Students
7.1 Introduction
7.1.1 Intrapersonal Factors
7.1.2 Interpersonal Influencing Factors
7.2 Aim of the Research
7.3 Methodology
7.4 Data Analysis
7.5 Results and Discussions
7.6 Conclusion
References
8 PIN Solar Cell Characteristics: Fundamental Physics
8.1 Introduction
8.2 Working of the PIN Solar Cell
8.3 Dark Current
8.4 Photocurrent
8.5 Conclusion
References
9 A New Approximation for Conformable Time-Fractional Nonlinear Delayed Differential Equations via Two Efficient Methods
9.1 Introduction
9.2 Basic Literature
9.3 Description of NIDTM
9.4 Description of [sub(O)] HANITM
9.4.1 Error Estimation of[sub(O)] HANITM
9.5 Test Examples
9.6 Conclusion
9.7 Result and Discussion
Acknowledgments
References
10 Numerical Treatment on the Convective Instability in a Jeffrey Fluid Soaked Permeable Layer with Through-Flow
10.1 Introduction
10.2 Mathematical Model
10.2.1 Basic State
10.3 Stability Analysis
10.4 Procedure of Solution
10.5 Outcomes and Discussion
10.6 Conclusions
Acknowledgments
References
11 Computational Modeling of Nonlinear Reaction-Diffusion Fisher–KPP Equation with Mixed Modal Discontinuous Galerkin Scheme
11.1 Introduction
11.2 Mixed Modal Discontinuous Galerkin Scheme
11.3 Numerical Results
11.4 Concluding Remarks
Acknowledgements
References
12 A Numerical Approach on Unsteady Mixed Convection Flow with Temperature-Dependent Variable Prandtl Number and Viscosity
12.1 Introduction
12.2 Formation of Governing Equations
12.3 Numerical Computation with Quasilinearization Technique
12.4 Results and Discussion
12.5 Conclusions
References
13 Study of Incompressible Viscous Flow Due to a Stretchable Rotating Disk Through Finite Element Procedure
13.1 Introduction
13.2 Mathematical Formulation
13.3 Finite Element Procedure for Numerical Solution
13.4 Results and Discussion
13.5 Conclusion
References
14 Instability of a Viscoelastic Cylindrical Jet: The VCVPF Theory
14.1 Introduction
14.2 Formulation of the Problem
14.3 Viscoelastic Potential Flow (VPF) Analysis
14.4 Viscoelastic Contribution for the Viscoelastic Potential Flow (VCVPF) Analysis
14.5 Dissipation Calculation for the Cylindrical Jet of Viscoelastic Fluid
14.6 Dimensionless Form of the Dispersion Relation
14.7 Results and Discussions
14.8 Conclusions
References
15 Evaporative Kelvin–Helmholtz Instability of a Porous Swirling Annular Layer
15.1 Introduction
15.2 Problem Statement
15.3 Boundary and Interfacial Conditions
15.4 Dispersion Relationship
15.5 Nondimensional Form
15.6 Results and Numerical Discussions
15.7 Conclusions
Acknowledgment
References
Index