Machine Learning Adoption in Blockchain-Based Intelligent Manufacturing
eBook - ePub

Machine Learning Adoption in Blockchain-Based Intelligent Manufacturing

Theoretical Basics, Applications, and Challenges

Om Prakash Jena, Sabyasachi Pramanik, Ahmed A. Elngar, Om Prakash Jena, Sabyasachi Pramanik, Ahmed A. Elngar

Share book
  1. 192 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Machine Learning Adoption in Blockchain-Based Intelligent Manufacturing

Theoretical Basics, Applications, and Challenges

Om Prakash Jena, Sabyasachi Pramanik, Ahmed A. Elngar, Om Prakash Jena, Sabyasachi Pramanik, Ahmed A. Elngar

Book details
Book preview
Table of contents
Citations

About This Book

This book looks at industry change patterns and innovations (such as artificial intelligence, machine learning, big data analysis, and blockchain support and efficiency technology) that are speeding up industrial transformation, industrial infrastructure, biodiversity, and productivity.

This book focuses on real-world industrial applications and case studies to provide for a wider knowledge of intelligent manufacturing. It also offers insights into manufacturing, logistics, and supply chain, where systems have undergone an industrial transformation. It discusses current research of machine learning along with blockchain techniques that can fill the gap between research and industrial exposure. It goes on to cover the effects that the Fourth Industrial Revolution has on industrial infrastructures and looks at the current industry change patterns and innovations that are accelerating industrial transformation activities.

Researchers, scholars, and students from different countries will appreciate this book for its real-world applications and knowledge acquisition. This book targets manufacturers, industry owners, product developers, scientists, logistics, and supply chain engineers.

  • Focuses on real-world industrial applications and case studies to provide for a wider knowledge of intelligent manufacturing
  • Offers insights into manufacturing, logistics, and supply chain where systems have undergone an industrial transformation
  • Discusses current research of machine learning along with blockchain techniques that can fill the gap between research and industrial exposure
  • Covers the effects that the 4th Industrial Revolution has on industrial infrastructures
  • Looks at industry change patterns and innovations that are speeding up industrial transformation activities

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Machine Learning Adoption in Blockchain-Based Intelligent Manufacturing an online PDF/ePUB?
Yes, you can access Machine Learning Adoption in Blockchain-Based Intelligent Manufacturing by Om Prakash Jena, Sabyasachi Pramanik, Ahmed A. Elngar, Om Prakash Jena, Sabyasachi Pramanik, Ahmed A. Elngar in PDF and/or ePUB format, as well as other popular books in Tecnologia e ingegneria & Ingegneria industriale. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2022
ISBN
9781000600308

1 Integration of Big Data, Machine Learning, and Blockchain Technology

Sadia Showkat and Shaima Qureshi
DOI: 10.1201/9781003252009-1

CONTENTS

1.1 Introduction
1.2 Big Data Analytics
1.3 Big Data and Machine Learning
1.4 ML and Blockchain
1.5 Big Data and Blockchain
1.6 Big Data, ML, and Blockchain Technology
1.7 Blockchain- and ML-Based Supply Chain Management
1.8 Benefits of ML–Blockchain Integration
1.9 Challenges Faced in ML–Blockchain Integration
1.10 Conclusion

1.1 INTRODUCTION

The world is witnessing a technological shift due to the high availability of the data and the methods of analyzing them. Data procurement is no longer a problem as an enormous amount of data is generated from various sectors such as business, health care, education, government, banking, e-commerce, social media, and the Internet of Things (IoT) (Showkat and Qureshi 2020). The analysis of the enormous amount of data is beyond the capability of traditional statistical techniques and methods. Machine learning (ML) and other intelligent learning methods have become a favorite for data analysis due to their immense capabilities of learning from data.
ML has revolutionized the way systems work conventionally. ML aims to create systems that learn on their own. The learning is based on data and algorithms. ML algorithms find the patterns in the data, perform tasks, and predict outcomes. ML models thrive on big data and perform better with more data sets. A subfield of ML that has proved promising, especially in pattern recognition, is Deep Learning (DL). DL has evolved from artificial neural networks. Table 1.1 summarizes the prime DL algorithms.
TABLE 1.1 Brief Description of Prime Deep Learning (DL) Algorithms
DL Algorithms Summary
Convolutional Neural Networks (CNNs)(Albawi, Mohammed, and Al-Zawi 2017) The input is usually an image but can be speech or any other data to be analyzed. The data passes through the convolutional layers that do most of the computations and extract the high-level features convolving the input with appropriate filters. Pooling layers are employed to reduce the dimensions.
Recurrent Neural Networks (RNNs)(Mikolov et al. 2011) Employed when the output depends on the current input and the previous outputs. Hence, each neuron is associated with a feedback loop. The hidden layers thus have a memory component associated with them where they store the output locally. The training is done based on an algorithm called backpropagation through time.
Long Short-Term Memory (LSTM)(Tang et al. 2016) Special RNNs that overcome the problem of long dependencies in RNNs. The usage of gates—the forget gate (decides which data to be kept or eliminated), read gate (regulates which neurons can read the content), write gate (to write information)—regulates the information. Like RNNs, backpropagation through a time algorithm is used to train the network.
Generative Adversarial Networks (GANs)(Pan et al. 2019) It comprises two neural networks that contest against each other: generative and discriminative. The generative network delivers new images/data based on the training data set, and the discriminative model assesses them. The job of the generative network is to create images that match the training data set, and the job of the discriminative network is to differentiate between the actual image and the forged one.
AutoEncoders (AEs)(Roche et al. 2019) AEs aim to reconstruct the input. They have the same number of layers in the input and output and in between are connected by a set of hidden layers. The data from the input layer are encoded, and a new representation is created, from which the decoding is done to reconstruct the original image to be produced as the output.
Restricted Boltzmann Machine (RBM)(Zhang et al. 2018) These are similar to AEs as they also reconstruct the input from latent variables. There are two types of units in an RBM: hidden units and visible units. The neurons in an RBM must produce a bipartite graph. Each visible unit must be connected to all hidden units and vice versa, but none should be connected to its kind. RBMs are stacked and converted into deep neural networks and serve as the building blocks of deep belief networks.
Tasks such as fraud detection, prediction of events, language translation, speech-to-text conversion, delivery of refined web results, spam detection, surveillance, speech recognition, image recognition, the inception of driverless cars, and virtual assistants have been realized using ML models trained on big data. However, the unreliability or incorrectness in the input data leads to less throughput and decreased efficiency, which may even prove fatal in specific environments.
Blockchain is a decentralized, distributed, transparent, secure ledger that provides a peer–peer manner of sharing information. The data in the blockchain network is added based on a consensus algorithm, thus maintaining the veracity of the data. A shift from centralized to decentralized blockchain-based systems is vital for secure storage of user data and for feeding correct data to ML models or recording results from them.
Information hidden in big data can be harnessed by feeding them to ML models, and ML models can produce more generalized results on big data, making it a perfect marriage between the two. The integrity of the data can be maintained by feeding reliable data to ML through blockchain. Blockchain increases data trust, imparts verifiability, eliminates intermediation, provides transparency, and increases user data control. More security can be imparted into blockchain through ML. The three paradigms are a perfect fit for realizing applications that need reliable data-based decisions. The convergence of the three fields is inevitable in revolutionizing future technological systems.
This chapter entails the following:
  • 1.2. Big data analytics
  • 1.3. Big data and ML
  • 1.4. ML and blockchain
  • 1.5. Big data and blockchain
  • 1.6. Big data, ML, and blockchain technology
  • 1.7. Blockchain- and ML-based supply chain management
  • 1.8. Benefits of ML–blockchain integration
  • 1.9. Challenges faced in ML–blockchain integration

1.2 BIG DATA ANALYTICS

Data are considered the new oil and are serving as the fuel for the realization of various applications. Business organizations use large amounts of data to boost their business and improve users’ experience. Big data analysis has made it possible to make data-centric controlled and intelligent decisions that have proved crucial in improving various sectors. The analysis of data usually comprises the following steps (Belhadi et al. 2019):
  1. Data acquisition: Users can obtain or create data by primary sources or secondary sources that are open and democratized. Some open sources of data include Google Public Data Explorer, Kaggle, data.gov, World Bank open data, and the UCI ML repository.
  2. Data storage: The storage of data is met with challenges, for example, the limited capabilities of the users’ systems force the adoption of cloud services. Apache Hadoop framework provides HDFS (Hadoop Distributed File System) for distributed storage of data. Other databases include Cassandra (distributed and fault-tolerant), MongoDB (for flexible storage of data), and Neo4g (stores data as key-value pairs).
  3. Preprocessing the data: Preprocessing stage comprises the cleaning of data (filtering of noisy data, handling missing data), data transformation, and removing redundancies. Data are compressed, and dimensionality reduction is applied. The features in the data may not all be relevant; hence, a subset of the features is selected using co-relation analysis. Principal component analysis is used for feature extraction.
  4. Actual analysis: The analysis of the data can be exploratory or confirmatory. In the confirmatory analysis, a hypothesis is proposed, and the data sets are examined to see if the proposed hypothesis is correct or incorrect. Exploratory analysis is close to actual data mining, where the data sets are examined to reveal patterns, find correlations, or generate new information.
  5. Utilization of harnessed information: The data harnessed can be utilized to detect frauds, spam, detect diseases, identify business trends, marketing, language translation, improve verification systems, geotagging, personalized ads, and product recommendations.
Major companies take data from text-based reviews, question–answer techniques, and forms to analyze customers’ viewpoints regarding a product or anything of businesses’ interest and base their strategi...

Table of contents