
Computational Intelligence and Blockchain in Complex Systems
System Security and Interdisciplinary Applications
- 1st Edition - March 26, 2024
- Imprint: Morgan Kaufmann
- Editor: Fadi Al-Turjman
- Language: English
- Paperback ISBN:9 7 8 - 0 - 4 4 3 - 1 3 2 6 8 - 1
- eBook ISBN:9 7 8 - 0 - 4 4 3 - 1 3 2 7 4 - 2
Computational Intelligence and Blockchain in Complex Systems: System Security and Interdisciplinary Applications provides readers with a guide to understanding the dynamics of AI,… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteComputational Intelligence and Blockchain in Complex Systems: System Security and Interdisciplinary Applications provides readers with a guide to understanding the dynamics of AI, machine learning, and computational intelligence in blockchain, and how these rapidly developing technologies are revolutionizing a variety of interdisciplinary research fields and applications. This book examines the role of computational intelligence and machine learning in the development of algorithms to deploy blockchain technology across a number of applications, including healthcare, insurance, smart grid, smart contracts, digital currency, precision agriculture, and supply chain. The authors cover the unique and developing intersection between cyber security and blockchain in modern networks, as well as in-depth studies on cybersecurity challenges and multidisciplinary methods in modern blockchain networks. Readers will find mathematical equations throughout the book as part of the underlying concepts and foundational methods, especially the complex algorithms involved in blockchain security aspects for hashing, coding, and decoding. This book also provides readers with the most in-depth technical guide to the intersection of computational intelligence and blockchain, two of the most important technologies for the development of next-generation complex systems
- Covers the research issues and concepts of machine learning technology in blockchain
- Provides in-depth information about handling and managing personal data by machine learning methods in blockchain
- Helps readers understand the links between computational intelligence, blockchain, complex systems, and developing secure applications in multidisciplinary sectors
Computer Scientists and researchers in Artificial Intelligence and Machine Learning, specifically in the field of developing Blockchain algorithms and applications. As such, academics, researchers, and professionals in a variety of research fields who work with AI, algorithms, and machine learning and their applications to complex systems will be a target audience. Engineers who need to understand the impacts of AI and Blockchain in complex systems, information security researchers and professionals who are required to secure computer networks and systems, as well as organizations who desire to implement AI and Blockchain in their systems
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- List of contributors
- 1. An overview of future cyber security applications using AI and blockchain technology
- Abstract
- 1.1 Introduction
- 1.2 Previous work extent
- 1.3 Using blockchain technologies in cyber security
- 1.4 Blockchain applications in cybersecurity
- 1.5 The application of artificial intelligence technologies in cyber security
- 1.6 The benefits of artificial intelligence in cybersecurity
- 1.7 Here are a few advantages and applications of artificial intelligence in cybersecurity
- 1.8 Conclusion
- References
- 2. A survey of issues, possibilities, and solutions for a blockchain and AI-powered Internet of things
- Abstract
- 2.1 Introduction
- 2.2 The volume of prior work
- 2.3 Internet of things driven by 6G
- 2.4 What is blockchain, anyway?
- 2.5 Blockchain with artificial intelligence: challenges, opportunities, and solutions for the 6G internet of things
- 2.6 Discussion
- 2.7 Conclusion
- References
- 3. A simple online payment system using blockchain technology
- Abstract
- 3.1 Introduction
- 3.2 Research and design
- 3.3 Conclusions
- References
- 4. Efficient spam email classification logistic regression model trained by modified social network search algorithm
- Abstract
- 4.1 Introduction
- 4.2 Background and literature review
- 4.3 Proposed hybrid metaheuristics
- 4.4 Experiments and comparative analysis
- 4.5 Conclusion
- References
- 5. Reviewing artificial intelligence and blockchain innovations: transformative applications in the energy sector
- Abstract
- 5.1 Introduction
- 5.2 Literature review
- 5.3 Applications of artificial intelligence and blockchain in the energy industry
- 5.4 Use cases
- 5.5 Discussions
- 5.6 Conclusion
- References
- 6. Using artificial intelligence in education applications
- Abstract
- 6.1 Introduction
- 6.2 Extent of past work
- 6.3 Materials and methods
- 6.4 Result and discussion
- 6.5 Conclusion
- References
- 7. Performance measurements of 12 different machine learning algorithms that make personalized psoriasis treatment recommendations with a database of psoriasis patients responding to treatment
- Abstract
- 7.1 Introduction and literature review
- 7.2 Materials and methods
- 7.3 Experimental results
- 7.4 Conclusion and future work
- References
- 8. Healthcare cybersecurity challenges: a look at current and future trends
- Abstract
- 8.1 Introduction
- 8.2 The amount of prior works
- 8.3 Difficulties
- 8.4 A review of current and future trends in cybersecurity challenges in healthcare
- 8.5 Discussion
- 8.6 Cybersecurity tools, defenses, and mitigation techniques
- 8.7 Conclusion
- References
- 9. EU artificial intelligence regulation
- Abstract
- 9.1 Introduction
- 9.2 Background of the regulation
- 9.3 Scope of the regulation
- 9.4 Conclusion
- References
- 10. The issue of personality rıghts and artıfıcıal intellıgence
- Abstract
- 10.1 Introduction
- 10.2 Person and personality
- 10.3 Artificial intelligence and personality
- 10.4 Conclusion
- References
- 11. Will artificial intelligence sit on the judge’s bench?
- Abstract
- 11.1 Introduction
- 11.2 Can artificial intelligence realize law?
- 11.3 Can artificial intelligence interpret or create law?
- 11.4 Conclusion
- References
- 12. The effectiveness of virtual reality-based technology on foreign language vocabulary teaching to children with attention deficiency hyperactivity disorder
- Abstract
- 12.1 Introduction
- 12.2 Method
- 12.3 Results
- 12.4 Conclusion
- References
- 13. BERT-IDS: an intrusion detection system based on bidirectional encoder representations from transformers
- Abstract
- 13.1 Introduction
- 13.2 Review of related works
- 13.3 Dataset
- 13.4 Method
- 13.5 Results and analysis
- 13.6 Conclusion
- References
- 14. Internet of Things and the electrocardiogram using artificial intelligence—a survey
- Abstract
- 14.1 Introduction
- 14.2 Literature study on electrocardiogram
- 14.3 Electrocardiogram signal
- 14.4 Review of technique used in electrocardiogram
- 14.5 Conclusion
- References
- 15. Evaluation of artificial intelligence in education and its applications according to the opinions of school administrators
- Abstract
- 15.1 Introduction
- 15.2 Method
- 15.3 Findings and comments
- 15.4 Conclusion and recommendations
- References
- 16. Evaluation of tourism developments with artificial intelligence according to the opinions of tourism hotel managers
- Abstract
- 16.1 Introduction
- 16.2 Artificial intelligence in tourism
- 16.3 Use of artificial intelligence in hotels
- 16.4 Methodology
- 16.5 Findings
- 16.6 Conclusion and recommendations
- References
- 17. The manager’s perspective on the effect of using artificial intelligence of things in work life
- Abstract
- 17.1 Introduction
- 17.2 Literature survey
- 17.3 Methodology
- 17.4 Findings
- 17.5 Conclusion
- References
- 18. Machine learning algorithms for blockchain-based security mechanisms in UAVs: a review
- Abstract
- 18.1 Introduction
- 18.2 Related works
- 18.3 Results and discussions
- 18.4 Conclusions and future works
- References
- 19. Artificial intelligence and sustainable educational systems
- Abstract
- 19.1 Introduction
- 19.2 Conclusion
- References
- 20. Distributed mobile cloud computing services and blockchain technology
- Abstract
- 20.1 Introduction
- 20.2 Integration of blockchain technology into mobile cloud computing
- 20.3 Smart contracts for mobile cloud computing
- 20.4 Blockchain-based supply chain management
- 20.5 Results and discussions
- 20.6 Conclusion
- References
- 21. Mobile cloud computing security issues in smart cities
- Abstract
- 21.1 Introduction
- 21.2 Amount of previously published work
- 21.3 Security concerns with mobile cloud computing in smart cities
- 21.4 Results and discussion
- 21.5 Conclusion
- References
- 22. IoT-based river monitoring and alerting system to mitigate flood damage
- Abstract
- 22.1 Introduction
- 22.2 Literature review
- 22.3 Proposed system
- 22.4 Analysis and design
- 22.5 System architecture
- 22.6 Results
- 22.7 Send mobile short message service message
- 22.8 Conclusion and recommendation
- References
- 23. Developing plant environment monitoring application using IOT sensors
- Abstract
- 23.1 Introduction
- 23.2 Literature review
- 23.3 Methodology
- 23.4 Implementation of proposed system
- 23.5 Results and analysis of proposed system
- 23.6 Conclusion
- References
- 24. An overview of how AI, blockchain, and IoT are making smart healthcare possible
- Abstract
- 24.1 Introduction
- 24.2 The scope of prior work
- 24.3 Using artificial intelligence, blockchain, and Internet of Things to provide smart healthcare
- 24.4 A blockchain-based data recorder that is immutable, transparent, and secure
- 24.5 The patient dealings process
- 24.6 Access to the Internet of Things in the local area
- 24.7 Findings and evaluation
- 24.8 Conclusion
- References
- 25. An overview of artificial intelligence and blockchain technology in smart cities
- Abstract
- 25.1 Introduction
- 25.2 Extent of past work
- 25.3 Smart cities with artificial intelligence and blockchain
- 25.4 Result and discussion
- 25.5 Conclusion
- References
- 26. IoT-based smart vending machine
- Abstract
- 26.1 Introduction
- 26.2 Related work
- 26.3 Methods and materials
- 26.4 Implementation
- 26.5 Discussion
- 26.6 Conclusion
- References
- Index
- Edition: 1
- Published: March 26, 2024
- Imprint: Morgan Kaufmann
- No. of pages: 320
- Language: English
- Paperback ISBN: 9780443132681
- eBook ISBN: 9780443132742
FA
Fadi Al-Turjman
Dr. Fadi Al-Turjman is the Associate Dean for Research Center for AI and IoT, AI and Robotics Institute, Near East University, Nicosia, Mersin 10, Turkey. He received his Ph.D. in Computer Science from Queen’s University, Canada. Dr. Al-Turjman is a leading authority in the areas of smart/intelligent, wireless, and mobile networks. His publication history spans over 400 SCI/E publications, and more than 11,000 citations, in addition to numerous keynotes and plenary talks at flagship venues. He has authored and edited more than 40 books about cognition, security, and wireless sensor networks’ deployments in smart IoT environments, which have been published by well-reputed publishers such as Taylor and Francis, Elsevier, IET, and Springer. Dr. Al-Turjman received several recognitions and best papers’ awards at top international conferences, including Best Research Paper Award from Elsevier Computer Communications Journal. Dr. Al-Turjman has led a number of international symposia and workshops for flagship communication society conferences. Currently, he serves as book series editor and lead guest/associate editor for several top tier journals, including IEEE Communications Surveys and Tutorials and Elsevier Sustainable Cities and Society, in addition to organizing international conferences and symposiums on leading-edge research topics in AI and IoT.
Affiliations and expertise
Associate Dean and Founding Director, Research Center for AI and IoT, AI and Robotics Institute, Near East University, Nicosia, Mersin 10, TurkeyRead Computational Intelligence and Blockchain in Complex Systems on ScienceDirect