Preface |
|
iii | |
Acronyms |
|
xi | |
|
1 Introduction to Machine Learning and Probabilistic Graphical Models for Decision Support Systems |
|
|
1 | (4) |
|
|
1 Scope of the Research Domain |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (2) |
|
|
4 | (1) |
|
2 Decision Support Systems for Healthcare based on Probabilistic Graphical Models: A Survey and Perspective |
|
|
5 | (29) |
|
|
|
|
|
|
5 | (3) |
|
1.1 Probabilistic Modeling |
|
|
6 | (1) |
|
|
7 | (1) |
|
2 Decision Support Systems in Healthcare |
|
|
8 | (9) |
|
2.1 Probabilistic Graphical Models |
|
|
9 | (1) |
|
2.2 Bayesian Networks: Directed Graphical Models |
|
|
10 | (2) |
|
|
12 | (2) |
|
|
14 | (2) |
|
2.5 Neural Networks with Probabilistic Graphical Models |
|
|
16 | (1) |
|
3 Artificial Intelligence in Healthcare Applications |
|
|
17 | (2) |
|
4 Healthcare Decision Support Systems based on Probabilistic Graphical Models |
|
|
19 | (1) |
|
5 Perspectives for Healthcare Decision Support Systems based on Probabilistic Graphical Models |
|
|
20 | (1) |
|
|
21 | (5) |
|
6.1 Logistic Regression for ECG Classification |
|
|
21 | (1) |
|
6.2 Variational Autoencoder for ECG Anomaly Detection |
|
|
22 | (4) |
|
|
26 | (8) |
|
|
27 | (7) |
|
3 Decision Support Systems for Anomaly Detection with the Applications in Smart Manufacturing: A Survey and Perspective |
|
|
34 | (28) |
|
|
|
|
|
|
34 | (1) |
|
2 Decision Support Systems for Smart Manufacturing |
|
|
35 | (2) |
|
3 Anomaly Detection in Smart Manufacturing |
|
|
37 | (5) |
|
3.1 Smart Predictive Maintenance |
|
|
37 | (1) |
|
3.2 Integrated Wearable Technology |
|
|
38 | (2) |
|
3.3 Production Monitoring |
|
|
40 | (1) |
|
3.4 Real-time Cybersecurity |
|
|
41 | (1) |
|
4 Difficulties and Challenges of Anomaly Detection Applications in Smart Manufacturing |
|
|
42 | (1) |
|
5 Perspectives for Anomaly Detection in Smart Manufacturing |
|
|
43 | (4) |
|
|
47 | (15) |
|
6.1 Anomaly Detection in Production Monitoring |
|
|
47 | (2) |
|
6.2 Anomaly Detection in Predictive Maintenance |
|
|
49 | (3) |
|
|
52 | (1) |
|
|
53 | (9) |
|
4 Decision Support System for Complex Systems Risk Assessment with Bayesian Networks |
|
|
62 | (26) |
|
|
|
62 | (2) |
|
|
64 | (1) |
|
3 BN Model for Event Oriented Risk Management |
|
|
64 | (7) |
|
3.1 Variables Identification |
|
|
64 | (2) |
|
3.2 Relationships Identification |
|
|
66 | (1) |
|
|
67 | (1) |
|
3.4 Illustrative Case Study in Natural Risk Management |
|
|
67 | (4) |
|
4 BN for Risk Management in Industrial Systems |
|
|
71 | (4) |
|
5 DBN for Risk Management of Industrial Systems |
|
|
75 | (3) |
|
5.1 Brief Presentation of DBN |
|
|
75 | (1) |
|
5.2 Illustrative Case Study |
|
|
76 | (2) |
|
6 EOOBN for Risk Management |
|
|
78 | (7) |
|
6.1 Extended Object Oriented Bayesian Network |
|
|
80 | (1) |
|
6.1.1 Construction of an EOOBN |
|
|
80 | (3) |
|
|
83 | (2) |
|
|
85 | (3) |
|
|
86 | (2) |
|
5 Decision Support System using LSTM with Bayesian Optimization for Predictive Maintenance: Remaining Useful Life Prediction |
|
|
88 | (19) |
|
|
|
|
88 | (1) |
|
2 Predictive Maintenance and Remaining Useful Life Prediction |
|
|
89 | (3) |
|
3 Machine Learning based Decision Support System for Predictive Maintenance |
|
|
92 | (1) |
|
4 Long Short Term Memory Networks using Bayesian Optimization |
|
|
93 | (3) |
|
4.1 Long Short Term Memory Networks |
|
|
93 | (2) |
|
4.2 Bayesian Optimization |
|
|
95 | (1) |
|
5 Decision Support System for Remaining Useful Life Prediction using LSTM with Bayesian Optimization |
|
|
96 | (2) |
|
|
98 | (1) |
|
7 Conclusion and Perspectives |
|
|
99 | (8) |
|
|
101 | (6) |
|
6 Decision Support Systems for Textile Manufacturing Process with Machine |
|
|
107 | (17) |
|
|
|
|
|
|
|
|
107 | (1) |
|
|
108 | (6) |
|
2.1 Intelligent Techniques used for Textile Process Modeling |
|
|
109 | (1) |
|
2.1.1 Artificial Neural Networks |
|
|
109 | (1) |
|
|
110 | (1) |
|
2.1.3 Fuzzy Inference System |
|
|
111 | (1) |
|
2.1.4 Support Vector Machine |
|
|
111 | (1) |
|
2.1.5 Gene Expression Programming |
|
|
111 | (1) |
|
2.2 Decision-making of Textile Manufacturing Process |
|
|
111 | (1) |
|
|
112 | (1) |
|
2.2.2 Meta-heuristic Methods |
|
|
112 | (1) |
|
2.2.3 Multi-criteria Meta-heuristic Methods |
|
|
112 | (2) |
|
3 Case Study: Decision-making of Denim Ozonation |
|
|
114 | (6) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
3.2.2 Determining the Criteria Weights using the AHP |
|
|
116 | (1) |
|
3.2.3 The Markov Decision Process |
|
|
117 | (1) |
|
3.2.4 The RL Algorithm: Q-learning |
|
|
118 | (1) |
|
|
118 | (1) |
|
3.3.1 Results and Discussion |
|
|
119 | (1) |
|
|
120 | (4) |
|
|
121 | (3) |
|
7 Anomaly Detection Enables Cybersecurity with Machine Learning Techniques |
|
|
124 | (60) |
|
|
|
|
|
|
|
|
|
124 | (1) |
|
2 Cybersecurity of Industrial Systems |
|
|
125 | (3) |
|
2.1 Cyberattack Detection for Industrial Control Systems |
|
|
126 | (1) |
|
2.2 Anomaly Detection for Time-series Data |
|
|
127 | (1) |
|
3 Machine Learning-based Anomaly Detection for Cybersecurity Applications |
|
|
128 | (4) |
|
3.1 Data Driven Hyperparameter Optimization of One-Class Support Vector Machines for Anomaly Detection in Wireless Sensor Networks |
|
|
129 | (1) |
|
3.1.1 Anomaly Detection Scheme |
|
|
129 | (3) |
|
3.1.2 Illustrative Example in WSN Anomaly Detection |
|
|
132 | (1) |
|
3.2 Real Time Data-Driven Approaches for Credit Card Fraud Detection |
|
|
132 | (10) |
|
3.2.1 Anomaly Detection Scheme |
|
|
132 | (1) |
|
3.2.2 Illustrative Example in Credit Card Fraud Detection |
|
|
133 | (1) |
|
3.3 Nested One-Class Support Vector Machines for Network Anomaly Detection |
|
|
134 | (1) |
|
3.3.1 Nested OCSVMs and Anomaly Detection Scheme |
|
|
134 | (2) |
|
3.3.2 Illustrative Example in Network Anomaly Detection |
|
|
136 | (1) |
|
3.4 A Data-Driven Approach for Network Anomaly Detection and Monitoring Based on Kernel Null Space |
|
|
137 | (1) |
|
3.4.1 Anomaly Detection Scheme |
|
|
138 | (3) |
|
3.4.2 Illustrative Example in Network Anomaly Detection |
|
|
141 | (1) |
|
4 Federated Learning-based Anomaly Detection for Cybersecurity Applications |
|
|
142 | (1) |
|
4.1 Security System Architecture for IoT Systems |
|
|
142 | (15) |
|
4.1.1 Design of Edge-Cloud System Architecture |
|
|
142 | (2) |
|
4.1.2 Data Pre-processing at the Edge |
|
|
144 | (1) |
|
4.1.3 Detection Mechanism |
|
|
144 | (5) |
|
4.1.4 Performance Evaluation |
|
|
149 | (8) |
|
|
157 | (1) |
|
4.2 Anomaly Detection in Industrial Control System--Smart Manufacturing |
|
|
157 | (18) |
|
4.2.1 Federated Learning-based Architecture for Smart Manufacturing |
|
|
158 | (3) |
|
4.2.2 Anomaly Detection Algorithm using Hybrid VAE-LSTM Model at Edge Devices |
|
|
161 | (5) |
|
4.2.3 Data Pre-processing |
|
|
166 | (1) |
|
4.2.4 Detection Performance Evaluation |
|
|
167 | (2) |
|
4.2.5 Evaluation on Edge Computing Efficiency |
|
|
169 | (5) |
|
|
174 | (1) |
|
5 Difficulties, Challenges, and Perspectives for Machine Learning-based Anomaly Detection for Cybersecurity Applications |
|
|
175 | (2) |
|
|
177 | (7) |
|
|
178 | (6) |
|
8 Machine Learning for Compositional Data Analysis in Support of the Decision Making Process |
|
|
184 | (32) |
|
|
|
|
|
184 | (1) |
|
2 Modeling of Compositional Data |
|
|
185 | (2) |
|
3 Machine Learning for Multivariate Compositional Data |
|
|
187 | (16) |
|
3.1 Principal Component Analysis |
|
|
188 | (3) |
|
|
191 | (2) |
|
|
193 | (1) |
|
3.3.1 Support Vector Machine Classification using Ilr--Transformation |
|
|
194 | (2) |
|
3.3.2 Support Vector Machine Classification using Dirichlet Feature Embedding Transformation |
|
|
196 | (2) |
|
|
198 | (5) |
|
4 Anomaly Detection using Support Vector Data Description |
|
|
203 | (6) |
|
4.1 Support Vector Data Description |
|
|
203 | (1) |
|
4.2 Anomaly Detection using SVDD with Dirichlet Density Estimation |
|
|
204 | (1) |
|
4.2.1 Transform CoDa using Dirichlet Density Estimation |
|
|
204 | (2) |
|
4.2.2 Anomaly Detection using SVDD with Dirichlet Density-transformed Data |
|
|
206 | (1) |
|
4.2.3 An Example of Anomaly Detection using SVDD |
|
|
207 | (2) |
|
|
209 | (7) |
|
|
210 | (6) |
|
9 Decision Support System with Genetic Algorithm for Economic Statistical Design of Nonparametric Control Chart |
|
|
216 | (36) |
|
|
|
|
|
|
216 | (2) |
|
|
218 | (4) |
|
2.1 Statistical Process Monitoring with Control Chart |
|
|
218 | (1) |
|
2.2 Parametric and Nonparametric Control Charts |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
3 Economic Statistical Design of SN & SR Control Charts |
|
|
222 | (3) |
|
|
225 | (3) |
|
|
228 | (3) |
|
|
231 | (21) |
|
|
232 | (2) |
|
|
234 | (18) |
|
10 Jamming Detection in Electromagnetic Communication with Machine Learning: A Survey and Perspective |
|
|
252 | (20) |
|
|
|
|
|
252 | (1) |
|
2 Electromagnetic Waves Communication Jamming |
|
|
253 | (3) |
|
2.1 Susceptibility of the Physical Layer in Presence of a Jamming Signal |
|
|
253 | (2) |
|
|
255 | (1) |
|
3 Difficulties and Challenges of Electromagnetic Waves Communication Anomaly Detection |
|
|
256 | (2) |
|
3.1 Detection on Physical Layers |
|
|
256 | (1) |
|
3.2 Smart Jamming Detection |
|
|
256 | (1) |
|
3.3 Transmission and Mobility |
|
|
257 | (1) |
|
|
257 | (1) |
|
4 Machine Learning Techniques for Electromagnetic Waves Communication Anomaly Detection |
|
|
258 | (4) |
|
4.1 Classification Algorithms Specificities |
|
|
258 | (2) |
|
4.2 ML for Jamming Detection Algorithm for a TETRA Base Station Receiver |
|
|
260 | (1) |
|
4.3 ML for Jamming Detection in 5G Radio Communication |
|
|
260 | (1) |
|
4.4 ML for Jamming Detection in IoT Network |
|
|
261 | (1) |
|
4.5 More Applications of ML for Jamming |
|
|
261 | (1) |
|
|
262 | (5) |
|
5.1 Preliminary Description of the Measurement Test Site |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
263 | (2) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
267 | (5) |
|
|
269 | (3) |
|
11 Intellectual Support with Machine Learning for Decision-making in Garment Manufacturing Industry: A Review |
|
|
272 | (22) |
|
|
|
|
272 | (1) |
|
2 Problems in Garment Manufacturing |
|
|
273 | (3) |
|
3 Garment Manufacturing using Machine Learning |
|
|
276 | (1) |
|
4 Popular Machine Learning Algorithms |
|
|
277 | (3) |
|
5 Potential Machine Learning Applications in Garment Manufacturing |
|
|
280 | (4) |
|
|
284 | (3) |
|
|
287 | (7) |
|
|
288 | (6) |
|
12 Enabling Smart Supply Chain Management with Artificial Intelligence |
|
|
294 | (17) |
|
|
|
|
|
|
|
294 | (2) |
|
2 AI for Demand Forecasting |
|
|
296 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
5 AI for Decision Support Systems in SCM |
|
|
299 | (2) |
|
6 Blockchain Technique for SCM |
|
|
301 | (2) |
|
|
303 | (1) |
|
|
304 | (7) |
|
|
305 | (6) |
Index |
|
311 | (6) |
About the Editor |
|
317 | |