Machine Learning Strategies in Real-World Engineering Applications: A Comprehensive Survey

Authors

  • Raman Kumar Department of Computer Science and Engineering, I K Gujral Punjab Technical University Kapurthala, 144603, Punjab, India.
  • Priyanka Rani Research Scholar

Keywords:

Machine Learning, Machine Learning Techniques, Deep Learning, Current Challenges, Natural Language Processing, Future Research Directions

Abstract

In the age of Industry 5.0, we find ourselves amidst a torrent of digital data. Machine learning has emerged as a resounding success story, making substantial inroads across various sectors including computer graphics, intelligent control, computer vision, speech recognition , decision making & natural language processing. Its remarkable performance has catapulted Deep Learning & Machine Learning Techniques into the spotlight, where they are now being widely embraced and integrated into a multitude of real time (happen instantly) engineering applications. A profound understanding of machine learning has become indispensable in the development of automated and intelligent applications, especially in fields like healthcare, cyber security, and intelligent transportation systems. This survey paper aims to comprehensively explore the diverse applications of machine learning strategies in real-world engineering scenarios. The review covers a wide spectrum of engineering fields, including but not limited to robotics, manufacturing, energy systems, civil engineering, and biomedical applications. The paper discusses the challenges, opportunities, and recent advancements in deploying machine learning techniques in these domains, emphasizing the impact on performance, efficiency, and adaptability. The study also illuminates the research objectives and challenges faced by machine learning approaches when navigating the complexities of real-world.

Downloads

Download data is not yet available.

References

H. Sarker, M. M. Hoque, M. D. K. Uddin, and A. Tawfeeq, 2020. 'Mobile data science and intelligent apps: concepts, ai-based modeling and research directions, Mobile Networks and Applications, vol. 26, no. 1, pp. 1–19.

M. S. Mahdavinejad, M. Rezvan, M. Barekatain, P. Adibi, P. Barnaghi, and A. P. Sheth, 2018. Machine learning for internet of things data analysis: a survey, Digital Communications and Networks, vol. 4, no. 3, pp. 161–175.

I. H. Sarker, A. S. M. Kayes, S. Badsha, H. Alqahtani, P. Watters, and A. Ng, 2020. Cybersecurity data science: an overview from machine learning perspective, Journal of Big Data, vol. 7, no. 1, pp. 41–29.

I. H. Sarker and R. FurhadNowrozy, 2021. Ai-driven cybersecurity: an overview, security intelligence modeling and research directions, SN Computer Science, vol. 2, no. 3, p. 173.

B. Slusarczyk, 2018. Industry 4.0 - are we ready? Polish Journal of Management Studies, vol. 17, no. 1, pp. 232–248.

Google, ''Trends In,'' 2019, https://trends.google.com/trends/.

J. Han, J. Pei, and M. Kamber, 2011. Data Mining: Concepts and Techniques, Elsevier, Amsterdam.

I. H. Witten and E. Frank, 2005. Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, Burlingto,MA, USA.

I. H. Sarker, 2021. Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective, SN Computer Science, vol. 2, no. 3, pp. 154.

I. H. Sarker, P. Watters, and A. S. M. Kayes, 2019. Effectiveness analysis of machine learning classifcation models for predicting personalized context-aware smartphone usage, J Big Data, vol. 6, no. 1, pp. 1–28.

L. P. Kaelbling, M. L. Littman, and A. W. Moore, 1996. Reinforcement learning: a survey, Journal of Artificial Intelligence Research, vol. 4, pp. 237–285.

R. Jhaveri, S. Ramani, G. Srivastava, T. Reddy Gadekallu, and V. Aggarwal, 2021. Fault-Resilience for Bandwidth Management in Industrial Software-Defined Networks, IEEE Transactions on Network Science and Engineering, IEEE, vol. 8, no. 4, pp. 3129–3139.

ICT-Fact, ICT-Fact and Figures 2017 Accessed, 2020. https://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2017.pdf.

ICT-Facts, Telecommunication Union, 2017, https://www.itu.int/en/ITU-D/Statistics/Pages/facts/default.aspx.

D. K. Bhattacharyya and J. K. Kalita, 2013. Network Anomaly Detection: A Machine Learning Perspective, Chapman & Hall, London, U.K.

V. Ambalavanan and B. P. Shanthi, 2020. Cyber threats detection and mitigation using machine learning, Handbook of Research on Machine and Deep Learning Applications for Cyber Security, IGI Global, Hershey, PA, USA, pp. 132–149.

T. Thomas, A. Vijayaraghavan, and S. Emmanuel, 2020. Machine Learning and Cybersecurity, Machine Learning Approaches in Cyber Security Analytics, Springer, Berlin, Germany, pp. 37–47.

S. Latif, J. Qadir, S. Farooq, and M. Imran, 2017. How 5G wireless (and concomitant technologies) will revolutionize healthcare? Future Internet, vol. 9, no. 4, pp. 93.

Y. Zhan, Y. Zhennan, P. Zhigang et al., 2016. Multi-instance deep learning: discover discriminative local anatomies for bodypart recognition, IEEE Transactions on Medical Imaging, vol. 35, no. 5, pp. 1332–1343.

M. Anthimopoulos, S. Christodoulidis, L. Ebner, A. Christe, and S. Mougiakakou, 2016. Lung pattern classification for interstitial lung diseases using a deep convolutional neural network, IEEE Transactions on Medical Imaging, vol. 35, no. 5, pp. 1207–1216.

W. Shen, M. Zhou, F. Yang, C. Yang, and J. Tian, 2015. Multi-scale convolutional neural networks for lung nodule classification, Lecture Notes in Computer Science, vol. 24, pp. 588–599.

Mohammed M, Khan MB, Bashier Mohammed BE, 2016. Machine learning: algorithms and applications. CRC Press.

Sarker IH, Hoque MM, MdK Uddin, 2020. Tawfeeq A. Mobile data science and intelligent apps: concepts, ai-based modeling and research directions. Mob Netw Appl, pp. 1–19.

Sarker IH, Kayes ASM, 2020. Abc-ruleminer: user behavioral rule-based machine learning method for context-aware intelligent services. J Netw Comput Appl., pp. 102762.

Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A, 2020. Cybersecurity data science: an overview from machine learning perspective. J Big Data. pp. 7(1):1–29.

Han J, Pei J, Kamber M, 2011. Data mining: concepts and techniques. Amsterdam: Elsevier.

Kaelbling LP, Littman ML, Moore AW. Reinforcement learning: a survey. J Artif Intell Res. 1996;4:237–85.

Tavallaee M, Bagheri E, Lu W, Ghorbani AA, 2009. A detailed analysis of the kdd cup 99 data set. In. IEEE symposium on computational intelligence for security and defense applications. IEEE, pp.1–6.

Moustafa N, Slay J. Unsw-nb15: 2015. a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 military communications and information systems conference (MilCIS), IEEE, pp. 1–6.

Mehrotra A, Hendley R, Musolesi M. , 2016. Prefminer: mining user’s preferences for intelligent mobile notification management. In: Proceedings of the International Joint Conference on Pervasive and Ubiquitous Computing, Heidelberg, Germany, 12–16 September, ACM, New York, USA, pp. 1223–1234.

Mohamadou Y, Halidou A, Kapen PT, 2020. A review of mathematical modeling, artificial intelligence and datasets used in the study, prediction and management of covid-19. Appl Intell.50(11):3913–25.

Safdar S, Zafar S, Zafar N, Khan NF., 2018. Machine learning based decision support systems (dss) for heart disease diagnosis: a review. Artif Intell Rev. 2018; 50(4): pp.597–623.

Zhu H, Chen E, Xiong H, Kuifei Y, Cao H, Tian J, 2014. Mining mobile user preferences for personalized context-aware recommendation. ACM Trans Intell Syst Technol (TIST).5(4):58.

Zikang H, Yong Y, Guofeng Y, Xinyu Z, 2020. Sentiment analysis of agricultural product ecommerce review data based on deep learning. In: 2020 International Conference on Internet of Things and Intelligent Applications (ITIA), IEEE, pp. 1–7.

Ślusarczyk B., 2018. Industry 4.0: Are we ready? Polish J Manag Stud. 17.

Sarker IH, 2021. Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective. SN Comput Sci.

Sarker IH, Colman A, Kabir MA, Han J, 2016. Phone call log as a context source to modeling individual user behavior. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (Ubicomp): Adjunct, Germany, ACM , pp. 630–634.

Downloads

Published

23.02.2024

How to Cite

Kumar, R. ., & Rani, P. . (2024). Machine Learning Strategies in Real-World Engineering Applications: A Comprehensive Survey. International Journal of Intelligent Systems and Applications in Engineering, 12(16s), 131–140. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4799

Issue

Section

Research Article