Professional Documents
Culture Documents
Edited by
Krishna Kant Singh
Professor, Faculty of Engineering & Technology,
Jain (Deemed-to-be University), Bengaluru, India
Mohamed Elhoseny
College of Computer Information Technology,
American University in the Emirates, Dubai, United Arab Emirates
Akansha Singh
Department of CSE, ASET,
Amity University Uttar Pradesh, Noida, India
Ahmed A. Elngar
Faculty of Computers and Artificial Intelligence,
Beni-Suef University, Beni Suef City, Egypt
Academic Press is an imprint of Elsevier
125 London Wall, London EC2Y 5AS, United Kingdom
525 B Street, Suite 1650, San Diego, CA 92101, United States
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
Copyright © 2021 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or any information storage and retrieval system,
without permission in writing from the publisher. Details on how to seek permission, further
information about the Publisher’s permissions policies and our arrangements with organizations such
as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website:
www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the
Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience
broaden our understanding, changes in research methods, professional practices, or medical
treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating
and using any information, methods, compounds, or experiments described herein. In using such
information or methods they should be mindful of their own safety and the safety of others, including
parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume
any liability for any injury and/or damage to persons or property as a matter of products liability,
negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas
contained in the material herein.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress
ISBN: 978-0-12-821229-5
v
vi Contents
Index ......................................................................................................................263
List of contributors
Gaurav Aggarwal
School of Computing and Information Technology, Manipal University Jaipur,
Jaipur, India
Ishpreet Aneja
Department of Data Science, Rochester Institute of Technology, Rochester, NY,
United States
Ashu Ashu
Department of Computer Science, Amity University, Noida, India
Pushpa Choudhary
Department of Information Technology, G. L. Bajaj Institute of Technology and
Management, Greater Noida, India
Subhadip Chowdhury
Durgapur Society of Management Science College, KNU, Asansol, India
Subhankar Das
Researcher and Lecturer, Honors Programme, Duy Tan University, Da Nang,
Vietnam
Ritam Dutta
Surendra Institute of Engineering and Management, MAKAUT, Kolkata, India
Lata Gadhavi
IT Department, Government Polytechnic Gandhinagar, Gandhinagar, India
G. S. Pradeep Ghantasala
Department of Computer Science and Engineering, Chitkara University
Institute of Engineering & Technology, Chandigarh, India
Sarada Prasad Gochhayat
Virginia Modeling, Analysis and Simulation Centre, Simulation and Visualization
Engineering, Old Dominion University, Suffolk, VA, United States
Nalli Vinaya Kumari
Department of Computer Science and Engineering, Malla Reddy Institute of
Technology and Science, Hyderabad, India
Subhra Rani Mondal
Researcher and Lecturer, Honors Programme, Duy Tan University, Da Nang,
Vietnam
Anand Nayyar
Faculty of Information Technology, Graduate School, Duy Tan University,
Da Nang, Vietnam
Rizwan Patan
Department of Computer Science and Engineering, Velagapudi Ramakrishna
Siddhartha Engineering College, Vijayawada, India
xiii
xiv List of contributors
Vandana Patel
Department of Instrumentation and Control Engineering, Lalbhai Dalpatbhai
College of Engineering, Ahmedabad, India
Anju S. Pillai
Department of Electrical and Electronics Engineering, Amrita School of
Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India
Vijayalakshmi Saravanan
Faculty in Department of Software Engineering, Rochester Institute of
Technology, Rochester, NY, United States
Ankit K. Shah
Department of Instrumentation and Control Engineering, Lalbhai Dalpatbhai
College of Engineering, Ahmedabad, India
Shilpi Sharma
Department of Computer Science, Amity University, Noida, India
Akansha Singh
Department of CSE, ASET, Amity University Uttar Pradesh, Noida, India
Arun Kumar Singh
Department of Information Technology, G. L. Bajaj Institute of Technology and
Management, Greater Noida, India
Krishna Kant Singh
Faculty of Engineering & Technology, Jain (Deemed-to-be University),
Bengaluru, India
Latika Singh
Ansal University, Gurugram, India
Narendra Singh
Department of Management Studies, G. L. Bajaj Institute of Management and
Research, Greater Noida, India
Pushpa Singh
Department of Computer Science and Engineering, Delhi Technical Campus,
Greater Noida, India
Ashish Tripathi
Department of Information Technology, G. L. Bajaj Institute of Technology and
Management, Greater Noida, India
Prem Chand Vashist
Department of Information Technology, G. L. Bajaj Institute of Technology and
Management, Greater Noida, India
Hong Yang
Department of Data Science, Rochester Institute of Technology, Rochester, NY,
United States
Noor Zaman
School of Computer Science and Engineering SCE, Taylor’s University, Subang,
Jaya, Malaysia
CHAPTER
Machine learning
architecture and framework
Ashish Tripathi1, Arun Kumar Singh1, Krishna Kant Singh2, Pushpa Choudhary1
1
and Prem Chand Vashist1
1
Department of Information Technology, G. L. Bajaj Institute of Technology and Management,
Greater Noida, India
2
Faculty of Engineering & Technology, Jain (Deemed-to-be University), Bengaluru, India
1.1 Introduction
In 1959, Arthur Samuel proposed the term Machine Learning (ML). He was the
master of artificial intelligence and computer gaming. He stated that machine
learning gives a learning ability to computers without being explicitly
programmed.
In 1997 a relational and mathematical-based definition of machine learning
was given by Tom Mitchell in that a computer program uses experience “e” to
learn from some task “t.” It applies “p” as a performance measure on “t” that
automatically improves with “e.”
In recent years, machine learning has been appearing as the most significant
technology around the globe to solve many real-life problems. So, it is emerging
as a very popular technology among the researchers and industry people for prob-
lem solving.
Machine learning is a subdomain of artificial intelligence (AI) that helps
machines to automatically learn from experience and improve their ability to take
decisions to solve any problem without taking any explicit instructions. The focus
of ML is to develop and apply computer programs that are able to learn from the
problem domain and make better decisions [1].
The learning process in ML starts with observing and analyzing the data
through different techniques, such as using examples, experiences, relying on pat-
tern matching in data, etc., that allows machines to take decisions without any
assistance from humans or any other intervention [2].
Machine-learning algorithms take a sample data set as an input, which is also
known as the training data set, to build and train a mathematical model (ML sys-
tem). Input data may include text, numerics, audio, multimedia, or visual things
and can be taken from various sources such as sensors, applications, devices,
networks, and appliances.
Machine Learning and the Internet of Medical Things in Healthcare. DOI: https://doi.org/10.1016/B978-0-12-821229-5.00005-7
Copyright © 2021 Elsevier Inc. All rights reserved.
1
2 CHAPTER 1 Machine learning architecture and framework
The mathematical model is used to extract knowledge from the input data
through analyzing itself without any explicit programming intervention.
After processing the data, it gives some response as an output. The output
may be in the form of an integer value or a floating-point value [3]. Fig. 1.1
shows the learning of a ML system from data with explicit programming support.
Unlike conventional algorithms, ML algorithms are applicable in different
applications, such as computer vision, filtering of emails, ecommerce, health care
systems, and many more, to provide effective solutions with high accuracy.
FIGURE 1.1
Learning of a ML system from different data sources.
1.1 Introduction 3
FIGURE 1.2
Phases of machine learning architecture.
The architecture of machine learning has been divided into five stages, such
as data acquisition, data processing, data modeling, execution, and deployment.
These stages are shown in Fig. 1.2.
The details are as follows:
FIGURE 1.3
Data acquisition.
Processing of data also depends on the learning techniques which have been
used to solve the problem [28]. For example, in the case of supervised learning,
data segregation is performed which creates sample data in several steps. The
sample data is further applied to train the system and thus the created sample data
is generally called the training data [29].
In unsupervised learning, the unlabeled data is mainly used for analysis pur-
poses. Thus this learning technique mainly deals with unpredictable data that are
more complicated and require complex processing as compared to other existing
learning techniques [29].
In this case data are grouped into clusters and each cluster belongs to a spe-
cific group. Each cluster is formed based on the granularity of the data.
The kind of processing is another factor of data processing which is based
on the features and action taken on the continuous data. Also, it may process
upon discrete data. Processing on discrete data may need memory bound proces-
sing [30].
So, the objective of this stage is to provide a clean and structured data set.
Sometimes, this stage is also known as the preprocessing stage. Some major steps
come under this phase of ML architecture, which are as follows:
The first naval achievement of the war which was attended with
any important result was the successful attack of the fleet under
Commodore Stringham, accompanied by General B. F. Butler, and
his land forces, upon Forts Hatteras and Clark, at Hatteras Inlet,
North Carolina.
ATLANTIC COAST FROM FORTRESS
MONROE TO FORT MACON.
More than a month had now elapsed since General Rosecranz had
been entrusted with the Federal command in Western Virginia, and
the commanders of the hostile forces had been intently watching the
movements of the opposing armies, anxious for an opportunity to
strike a decisive blow.
From his headquarters at Clarksburg, General Rosecranz moved
forward to resume active operations, and at two principal points the
enemy prepared to give him battle. The popular impression was that
he intended to attack General Lee, at Cheat Mountain Gap, his
nearest and most accessible opponent, then held in check by General
Reynolds. Floyd had been permitted to cross the mountains at
Summersville, and was known to be then in the Kanawha region,
some eighty or a hundred miles distant, where it was the intention of
the Federal commander to seek him. It was not until Monday, the
9th of September, that the General reached Birch river, where he
concentrated his force, drawn from various encampments, and which
had marched in detached bodies to the rendezvous appointed. After
leaving the valley of the Big Birch the route lay through a
mountainous and densely wooded country, infested with guerrillas,
who gave them much annoyance; and as no reliable guide
accompanied the army, Rosecranz was obliged to rely chiefly upon
the inhabitants for information of the geographical and
topographical features of the country. The position of Floyd’s forces
was also unknown to him, and it was not until he had reached Cross
Lanes, eight miles from Summersville, that he received reliable
information that the enemy was strongly posted somewhere in the
range of hills that line either side of the Gauley river, immediately
facing that village. Floyd was known to be advised of the approach of
the Federal army, as his scouts and skirmishers had been
encountered frequently on the previous day, and it was the plan of
Rosecranz to carefully reconnoitre the position of the enemy before
advancing any considerable force within range of his guns; but the
eager and importunate requests of various officers, as well as the
impetuosity of the men, urged him forward.
Colonel McCook was first sent with a squadron of Chicago cavalry
to Carnifex ferry, by a road which led through ravines to the Gauley
river. In an attempt to destroy a boat found here he was fired upon
by the enemy, who were out of range of the carbines of the cavalry.
To overcome this opposition, he dispatched a man asking that ten
infantry should be sent to his aid. By some mistake the whole of
Colonel Lytle’s Tenth Ohio, an Irish regiment, came hurrying down,
eager for a fight, and opened fire on the woods on the opposite side
that speedily banished the enemy. Colonel Lytle’s regiment
continued in the advance, acting as skirmishers, and shortly drove in
a detachment of the rebels from an exposed camp on the left, of the
road. This road was very narrow, and shut in to the very wagon
tracks with the jungle of underbrush.
General Rosecranz, who was still ignorant of the precise position
of the enemy, or of the nature of his entrenchments, now sent orders
to General Benham that Lytle should proceed down this road to
make a reconnoissance, to be supported, if necessary, by the
remainder of Benham’s brigade. Lytle was still a mile in advance of
the rest of the brigade, pushing cautiously forward, with companies
A, B, C and E, as skirmishers. They suddenly found themselves in
front of some kind of fortification, and the enemy discovered them at
the same time. At first there was sharp and scattered firing, when
suddenly a terrific crash of musketry was followed by a storm of
bullets. The enemy had opened along his whole front. The remainder
of the Tenth was hurried forward to support the advance, and
General Benham sent orders for the Thirteenth, Colonel Smith, and
the Twelfth, Colonel Lowe, to come forward. The Federal troops
stood their ground with the greatest heroism, in the face of a heavy
battery. The firing on either side was not effective; and though the
Tenth suffered severely, the loss was not great.
The Thirteenth, Colonel Smith, came in on the left, a little in the
rear of the Tenth, and deploying towards Floyd’s right, opened in
fine style. In the thickest of the firing, Colonel Lytle dashed forward
in front of the enemy’s works, leading several companies, and as they
left the cover of the woods, he received a severe wound. The ball
which disabled him also wounded his horse, who dashed his rider to
the ground, and in his death agony plunged over the parapet into the
enemy’s works. Colonel Lytle was carried to a house near by, and lay
in great pain, within hearing of the contest he was unable to share.
The Tenth, discouraged and embarrassed by the loss of their leader,
became somewhat scattered in the woods, but held their position and
kept up a steady fire.
Meantime, Colonel Lowe came up with the Twelfth, and was led by
Adjutant-General Hartsuff into the woods near the spot where the
Tenth first received the enemy’s fire. He was leading up his regiment,
waving his sword to cheer on his men, when he was struck in the
forehead by a musket ball, and fell heavily from his horse. He died
bravely, a soldier’s death, in front of the foe, and in the presence of
his men.
The reconnoissance that was designed, had now grown into a
severe and general engagement. But the unknown position of the
enemy, and the necessity of calling up other regiments to support the
advance, had led to a premature struggle. McMullen’s howitzer
battery, and Captain Snyder’s battery were brought forward as
speedily as possible, and rendered efficient service. General
Rosecranz dispatched Adjutant-General Hartsuff to order up Colonel
McCook’s brigade, who rushed forward in a state of wild enthusiasm
when they were informed that they would have the honor of
storming the batteries. Meantime the General, who had been making
a careful survey of the whole field, found that the work would be too
hazardous, and cost too many valuable lives, if it were then
attempted, and countermanded the order. It was now too dark to
distinguish the foe, and it became absolutely necessary to withdraw
the troops.
The men had marched seventeen miles and a half, and many of
them were exhausted with scouting and skirmishing all day over the
hills. They retired slowly, galled with disappointment, and
bivouacked, wearied and supperless, within musket range of the
rebel front. Sentinels were posted to prevent any attempt of the
enemy to surprise them, and guard against the retreat of Floyd if
possible. But total ignorance of the country, and the intense darkness
of the night, made it impossible to secure all the avenues of retreat.
General Rosecranz himself was up all night long, taking care of his
position with jealous and anxious solicitude; but notwithstanding,
the foe slipped from his grasp.
The troops expected to storm the position and take it by sunrise,
but before that time it was discovered vacant. Floyd began the
evacuation as soon as he ascertained that Rosecranz did not intend
to storm him, and by three o’clock the next morning the enemy put
the deep and turbulent Gauley, and some miles of rugged road,
between himself and the disgusted Federal army—sinking the flats
and destroying the trestle bridge by which he had secured his retreat.
The Union troops immediately took possession of Floyd’s camp, in
which he had left his own personal baggage, that of his officers, and
their parade stores, the baggage and blankets of private soldiers,
large numbers of muskets, squirrel guns, powder, lead, cartridges,
forage, large quantities of commissary stores, and some horses and
wagons.
He took nothing with him, in fact, excepting his guns, part of his
tents, and a small supply of rations. It was also ascertained that he
threw at least a portion of his cannon into the Gauley.
The loss of Rosecranz’s army in the engagement was 16 killed, and
102 wounded. That of the enemy was probably small, as they were
well protected from the Federal fire. Twelve rebel prisoners were
taken, and 25 of Colonel Tyler’s Seventh Ohio, mostly wounded, who
had been captured at Cross Lanes on the 26th of August, were
released.
BATTLE OF CHEAT MOUNTAIN PASS.
October 3, 1861.