Ai Federated Learning Fundamentals Challenges
Ai Federated Learning Fundamentals Challenges
Index���������������������������������������������������������������������������������������������������������������������� 293
Preface
ARTIFICIAL INTELLIGENCE USING FEDERATED LEARNING:
FUNDAMENTALS, CHALLENGES, AND APPLICATIONS
The rapid evolution of artificial intelligence (AI) has reshaped various aspects of our
world, from healthcare to finance, and transportation to communication. Among the
latest advancements, federated learning (FL) stands out as a revolutionary paradigm,
enabling decentralized AI model training across multiple devices or organizations
while preserving data privacy and security. This book, Artificial Intelligence Using
Federated Learning: Fundamentals, Challenges, and Applications, aims to provide
a comprehensive understanding of this cutting-edge technology, bridging the gap
between theoretical foundations and practical implementations.
The inspiration for this book arises from the increasing need for privacy-pre-
serving AI solutions in an era marked by growing concerns over data security and
confidentiality. Traditional centralized AI models often require extensive data aggre-
gation, posing significant risks of data breaches and privacy violations. Federated
learning addresses these challenges by allowing models to be trained locally on edge
devices, sharing only the necessary updates to a central server, thus ensuring that
raw data remains secure and private.
This book is structured to cater to a diverse audience, including researchers,
practitioners, and students. It is divided into three main sections:
As the field of federated learning continues to evolve, this book serves as both a
foundational text and a reference for advanced study. We hope to inspire and equip
our readers with the knowledge and tools necessary to contribute to this exciting and
impactful area of AI research and application.
vii
viiiPreface
We would like to express our gratitude to the many researchers and practitioners
whose pioneering work in federated learning has paved the way for this book. Their
contributions have been invaluable in shaping the content and direction of this work.
We also extend our thanks to our colleagues, reviewers, and readers for their support
and feedback.
We invite you to embark on this journey into the world of artificial intelligence
and federated learning, exploring the fundamentals, confronting the challenges, and
discovering the vast potential applications. May this book serve as a guide and inspi-
ration in your endeavors within this dynamic and transformative field.
About the Editors
Dr. Ahmed A. Elngar is an associate professor and Head
of the Computer Science Department at the Faculty of
Computers and Artificial Intelligence, Beni-Suef University,
Egypt. Dr. Elngar is also an associate professor of computer
science at the College of Computer Information Technology,
American University in the Emirates, United Arab Emirates.
Also, Dr. AE is Adjunct Professor at School of Technology,
Woxsen University, India. Dr. AE is the Founder and Head of
the Scientific Innovation Research Group (SIRG). Dr. AE is a
director of the Technological and Informatics Studies Center
(TISC), Faculty of Computers and Artificial Intelligence,
Beni-Suef University. Dr. AE has more than 150 scientific research papers published
in prestigious international journals and over 35 books covering such diverse topics
as data mining, intelligent systems, social networks, and smart environment. Dr. AE
is a collaborative researcher. He is a member of the Egyptian Mathematical Society
(EMS) and International Rough Set Society (IRSS). His other research areas include
the Internet of Things (IoT), network security, intrusion detection, machine learn-
ing, data mining, and artificial intelligence. big data, authentication, cryptology,
healthcare systems, and automation systems. He is an editor and reviewer of many
international journals around the world. Dr. AE has won several awards, including
the Young Researcher in Computer Science Engineering from the Global Outreach
Education Summit and Awards 2019, as well as the Best Young Researcher Award
(Male) (Below 40 years), Global Education and Corporate Leadership Award.
ix
x About the Editors
published by Stanford University and Elsevier in 2023. He has been the editor and
author of several books at international publishing houses, and he is the associate
editor and guest editor for several specialized journals with high impact factors. He
is currently a professor and researcher at the Universidad de Guadalajara (CUCEI).
He also collaborates with Mexican and foreign universities in several research proj-
ects. His main research interests are artificial intelligence, metaheuristic optimiza-
tion algorithms, multiobjective optimization, parameter estimation in engineering,
and image and digital signal processing.
xi
xiiContributors
Ethical Considerations
Jagjit Singh Dhatterwal, Kiran Malik, Kuldeep
Singh Kaswan, and Ahmed A. Elngar
DOI: 10.1201/9781003482000-1 1
2 Artificial Intelligence Using Federated Learning
total model that shields client protection while gathering information from different
sources in their 2019 exploration.
LITERATURE SURVEY
Unified Learning (FL) permits medical services associations to prepare models
cooperatively using delicate clinical information while safeguarding patients’ pro-
tection to an outrageous degree (Sheller et al., 2020). Florida (FL) has a few pur-
poses in various fields, one of which is medication. Monetary associations have
likewise researched information-secure forecast models utilizing united learning
approaches. Sending crude information to unified servers in an IoT ecosystem isn’t
needed; edge gadgets might gain from another and make adjustments depending
on the situation. Unified Learning (FL), first recommended in 2019 by Liu et al.,
makes this practical.
It is standard practice to utilize strategies like differential classification all
through the learning stage to keep the model precise while safeguarding the protec-
tion of individual data sources (Shokri et al., 2015). The field of Unified Learning
(FL) keeps on focusing on the assurance of clients’ very own data. Moreover, uni-
fied learning (FL) frameworks frequently utilize safe conglomeration systems and
encryption strategies to ensure the mystery of model changes during transmission
(Bonawitz et al., 2017).
Similarly, as with each innovation, FL has its extraordinary arrangement of
issues. As per concentrates finished by Li et al. in 2020, gadget heterogeneity is a
significant impediment to arriving at an overall model union. This term suggests
aberrations in information conveyance and handling power between gadgets. As
per Hard et al., unified learning frameworks may not work as proficiently when
confronted with correspondence issues like drowsy associations or confined trans-
fer speed.
Konečný et al. (2016) state that there is constant work to further develop calcula-
tion correspondence proficiency, reinforce models to endure antagonistic attacks,
and take care of the issues of security precision balance. There is a consistent expan-
sion in the field’s leap forward, and progressing research in unified learning is cur-
rently centred around specific points. Research on united strategies for advancement
that permit contribution in decentralized learning while at the same time holding
model proficiency is presently in progress by Smith et al. (2021).
TABLE 1.1
History of Federated Learning
Year Milestones and Key Developments in Federated Learning
2016 Google Brain introduces federated learning, aiming to enable on-device machine learning.
2017 Initial research publications on federated learning emphasize privacy-preserving aspects.
2018 Advancements in differential privacy techniques for federated learning emerge in
research.
2019 Google releases federated learning Frameworks to facilitate decentralized model training.
2020 Exploration of secure and communication-efficient protocols for federated learning
begins.
2021 Federated Learning applications expand into healthcare, IoT, finance, and
telecommunications.
2022 Ongoing research focuses on federated transfer learning and lifelong federated learning.
2023 Innovations in federated meta-learning and adaptive aggregation techniques gain attention.
2024 Integration of federated learning with edge computing and federated reinforcement
learning.
Present Continued advancements in privacy-preserving methods and broader adoption in various
domains.
4 Artificial Intelligence Using Federated Learning
In situations where there are not many devices or the networks are not suitable for
handling many information movements, there may be capacity issues in data trans-
fer when transferring model updates between devices. According to Konečný et al.
(2016), managing models with enormous scale or a large number of devices causes
ongoing processes to stall. As a result, model synchronization becomes less produc-
tive and reliable, which increases the time required for interaction.
Since combined learning uses a wide range of devices and information sources,
the execution is more complicated. Differences in processing capacity, informa-
tion dispersion, and the steadfastness of gadgets could make it a difficult endeavor
to coordinate information from many sources while keeping up the precision and
impartiality of the prepared model (Karimireddy et al., 2021).
Regardless of whether encryption and other measures are utilized to improve
protection in general, concerns about security and information insurance continue to
emerge. Xie et al. (2023) emphasize the necessity of great strength areas for execut-
ing systems and secure association methods to shield the united profits from mali-
cious endeavors like model harm or supposition assaults.
It is fundamental to execute model printing strategies and advance correspon-
dence conventions to diminish information transfer rates between gadgets and the
main PC. It is fundamental that you think about the transmissions by performing the
expected steps. Quantization and differential pressure are two of the techniques used
to enhance the cost-effectiveness of correspondence without compromising model
execution).
It is fundamental to utilize imaginative common learning strategies that can
effectively oversee fluctuating information designs and unmistakable qualities since
gadgets and information indices are noteworthy by nature. Modeling the unification
cycle as well as execution in different environments could be improved by effectively
answering device factors through the use of versatile overall methods and custom-
ized combined learning calculations).
not compromised. With federated learning, models can access and learn from dis-
tributed data sets which are dispersed across multiple healthcare institutions while
data security is preserved (Sheller et al., 2020). The use of this method can be seen
in the improvement of disease detection and clinical imaging. Furthermore, organi-
zations can follow strict privacy rules such as GDPR or HIPAA through federated
learning where it is possible to just utilize useful insights from diverse data sets
without directly sharing those sets of data (Yu et al., 2021). This enables the pharma-
ceutical people to run trials effectively.
data ownership complications. The rights and responsibilities must be set as clear
as possible among data contributors, model developers, and aggregators to achieve
peace and the shared utilization of the data provided (Bagdasaryan et al., 2020). The
consent of the users is critical in the case of Federated learning as well as when the
data is retrieved from personal devices.
Users will be expected to have an extensive knowledge of data usage, model train-
ing objectives, and the problems of the federated learning projects before its full imple-
mentation. It is informed consent that allows users to make wise selections regarding
their data submission and promotes transparency. Unlike some of the privacy stan-
dards, such as the General Data Protection Regulation (GDPR) of the European Union,
the Health Insurance Portability and Accountability Act (HIPAA) of the healthcare
sector, and a variety of local laws, federated learning is not met by their norms inher-
ently. Data anonymization, encryption, and secure aggregation are some of the tech-
niques that will be required to protect user privacy. Yang et al. mention in their 2022
paper that it is vital to implement such measures to meet the requirements.
The field of federated learning is based on ethical behaviour. The concepts of
non-discrimination, transparency, accountability, should be at the core of everything
that follows before the start of federated learning, according to Yang et al. (2022).
Federated learning systems have to comply with existing regulatory settings. Naseri
et al. (2022) indicate that this approach should be based on privacy-by-design prin-
ciples, robust security measures, and the obtaining of the respective licenses or cer-
tificates. Bonawitz et al. (2020) suggested that federated learning systems need to
be constantly observed and modified to keep up with shifting privacy laws, ethical
standards, and legal requirements.
CONCLUSION
Federated Learning redesigns AI paradigms by combining data privacy with distrib-
uted model training. Thanks to decentralized data processing, it becomes possible to
train the models here collaboratively across different devices and still ensure private
information. The Federated Averaging Algorithm provides for the uncomplicated
integration of the device-specific features into a centrally updated global model
which also eliminates operational complexity. The various advantages of federated
learning indicate that it has a promising future. The deployment of edge devices, on
the other hand, can decrease the privacy issues of centralized systems. This paradigm
shift allows us to utilize the wide variety of data sources without the need to violate
any privacy laws. In effect, federated learning emerges as a very useful solution in
the healthcare and the Internet of Things fields, where resources are limited and data
is extremely sensitive. Having your data secured, you can go on to build your model
without any concern. With research, many new achievements for federated learning
are expected to be achieved in the future AI is about to witness a major change as
a result of improved privacy protection, well-established communication protocols,
and integration of today and tomorrow technologies such as Internet of things and
Edge computing. Now, a new era has begun where these emerging phenomena are
emphasized. This new era incorporates distributed model training, accountable data
management, and collective intelligence. Federated learning is an example of novel
AI solutions that are founded on privacy protection, collaborative sphere and always
in compliance with ethical principles in dealing with private data. It could have a
deep influence on how models are trained and used, and therefore, is critical in the
development of a reliable and ethically sound AI. Its ability to skillfully handle pri-
vacy concerns makes this philosophy differ from other AI ways.
REFERENCES
Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., & Shmatikov, V. (2020). How to backdoor
federated learning. arXiv preprint arXiv:2007.14191.
Bonawitz, K., Eichner, H., Grieskamp, W., Huba, D., Ingerman, A., Ivanov, V.,. . .& Moore, D.
(2017). Practical secure aggregation for privacy-preserving machine learning. In CCS ’17:
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications
Security (CCS) (pp. 1175–1191). https://doi.org/10.1145/3133956.3133982
14 Artificial Intelligence Using Federated Learning
Bonawitz, K., Grieskamp, W., Huba, D., Ingerman, A., Ivanov, V., Kiddon, C.,. . .& Vasilaky,
K. (2020). Towards federated learning at scale: A systematic comparison of privacy-
preserving aggregation algorithms. arXiv preprint arXiv:2007.10987.
Chen, K., Lin, J., Yang, Q., Zhou, P., & Zheng, Y. (2023). Federated reinforcement learning:
A comprehensive review. arXiv preprint arXiv:2302.04567.
Chen, M., Xu, X., Zhang, Z., & Cheng, S. (2019). Federated learning in mobile edge networks:
A comprehensive survey. IEEE Communications Surveys & Tutorials, 21(3), 3262–3293.
Dhatterwal, J. S., Kaswan, K. S., Jaglan, V., & Vij, A. (2022a). Machine learning and deep
learning algorithms for IoD. In The Internet of Drones: AI Applications for Smart
Solutions (p. 237). CRC Press.
Dhatterwal, J. S., Kaswan, K. S., Preety, D., & Balusamy, B. (2022b). Emerging technologies
in the insurance market. In Big Data Analytics in the Insurance Market (pp. 275–286).
Emerald Insight.
Dinh, T., Tran, T., Pham, T., Lee, S., & Kim, Y. (2020). Convergence analysis of federated
learning: A survey. arXiv preprint arXiv:2005.07089.
Gao, L., Wu, Q., Wei, Z., Zhang, L., & Zhang, H. (2021). Federated learning for edge intel-
ligence: A comprehensive survey. IEEE Communications Surveys & Tutorials, 23(1).
Hard, A., Rao, K., Mathews, R., Ramaswamy, S., Beaufays, F., Augenstein, S.,. . .&
Eichner, H. (2018). Federated learning for mobile keyboard prediction. arXiv preprint
arXiv:1811.03604.
Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A. N.,. . .&
Ramage, D. (2019). Advances and open problems in federated learning. arXiv preprint
arXiv:1912.04977.
Karimireddy, S. P., Stich, S. U., Jaggi, M., & Hoffmann, M. (2021). Adaptive federated opti-
mization. arXiv preprint arXiv:2102.05203.
Kaswan, K. S., Dhatterwal, J. S., & Kumar, K. (2021). Blockchain of internet of things-based
earthquake alarming system in smart cities. In Integration and Implementation of the
Internet of Things Through Cloud Computing (pp. 272–287). IGI Global.
Kaswan, K. S., Dhatterwal, J. S., Kumar, S., & Lal, S. (2022b). Cybersecurity law-based
insurance market. In Big Data: A Game Changer for Insurance Industry (pp. 303–321).
Emerald Publishing Limited.
Kaswan, K. S., Dhatterwal, J. S., Sharma, H., & Sood, K. (2022a). Big data in insurance inno-
vation. In Big Data: A Game Changer for Insurance Industry (pp. 117–136). Emerald
Publishing Limited.
Konečný, J., McMahan, H. B., Ramage, D., & Richtárik, P. (2016). Federated optimization:
Distributed optimization beyond the datacenter. arXiv preprint arXiv:1511.03575.
Li, T., Sahu, A. K., Talwalkar, A., & Smith, V. (2020). Federated learning: Challenges, meth-
ods, and future directions. IEEE Signal Processing Magazine, 37(3), 50–60.
Lim, B., Kang, J., Jung, J. J., & Oh, S. (2020). Federated learning for Internet of Things:
A comprehensive survey. IEEE Access, 8, 23537–23565.
McMahan, H. B., Abadi, M., Chu, A., Goodfellow, I., McMahan, B., Mironov, I.,. . .&
Ramage, D. (2018). Advances and open problems in federated learning. arXiv preprint
arXiv:1812.09975.
Mitchell, T. (1997). Machine Learning. McGraw Hill.
Mohassel, P., & Zhang, Y. (2017). Secureml: A system for scalable privacy-preserving
machine learning. In 2017 IEEE Symposium on Security and Privacy (SP), San Jose,
CA, USA (pp. 19–38). IEEE Xplore. doi: 10.1109/SP.2017.12
Sheller, M. J., Edwards, B., Reina, G. A., Martin, J., Pati, S., Kotrotsou, A., & Milchenko, M.
(2020). Federated learning in medicine: Facilitating multi-institutional collaborations
without sharing patient data. Scientific Reports, 10(1), 1–11.
Federated Learning 15
Shokri, R., Shmatikov, V., & Smith, M. (2015). Privacy-preserving deep learning. In
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
Security (pp. 1310–1321). Association for Computing Machinery.
Smith, V., Chaudhuri, K., Sanjabi, M., & Talwalkar, A. (2021). Federated learning: Strategies
for improving communication efficiency. arXiv preprint arXiv:2106.03638.
Xie, H., Li, Y., Xu, T., & Zhang, Z. (2023). Secure and robust federated learning: A compre-
hensive survey. arXiv preprint arXiv:2305.01972.
Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2019). Federated machine learning: Concept and
applications. ACM Transactions on Intelligent Systems and Technology (TIST), 10(2),
1–19.
Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2022). Federated machine learning: Concept and
applications. ACM Transactions on Intelligent Systems and Technology (TIST), 11(2),
1–19.
Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2023). Communication-efficient federated learning:
Recent advances and future directions. ACM Transactions on Intelligent Systems and
Technology (TIST), 10(2), 1–19.
Yu, K. H., Beam, A. L., & Kohane, I. S. (2021). Artificial intelligence in healthcare. Nature
Reviews Drug Discovery, 20(5), 373–374.
2 In-Depth Analysis of
Artificial Intelligence
Practices
Robot Tutors and Federated
Learning Approach in
English Education
Muthmainnah, Akkarapon Nuemaihom,
Ahmad Al Yakin, Prodhan Mahbub Ibna Seraj,
Muhammad Mujtaba Asad, and Ahmed A. Elngar
INTRODUCTION
According to Khang et al. (2023a), integrating traditional education into complex
systems is gaining increasing attention because of the integration of artificial intel-
ligence (AI) with education. Advances in new education curricula and infrastruc-
ture systems have led to the widespread adoption of artificial intelligence in various
fields, including administration, resource development, and more. Research on intel-
ligent education has so far concentrated on methods to improve students’ learning
efficiency and intelligent education monitoring, but limited research has examined
how to assess the efficacy and level of teaching provided by teachers utilizing AI
robotics. Indeed, a variety of factors, such as students’ efforts, the availability of
contemporary learning tools, and the style of their instructors, affect their ability to
learn (Muthmainnah et al., 2023). We present a smartphone-based robotics learning
system based on blended learning for educators. By understanding the feelings of
undergraduate students when they learn a foreign language, the realization of feder-
ated learning (FL) improves recognition performance and enables data sharing and
collaborative modelling.
The new idea of Industry 6.0 highlights the importance of human workers in
production with increasingly harmonious technological collaboration. The goal of
Industry 6.0 is to combine the knowledge and experience of human adaptation with
advanced technologies to make production processes more adaptive and collabora-
tive (Chourasia et al., 2022). This 6.0 industrial revolution enables the sector to com-
bine human and robotic workers by adopting the former key enablers such as the
16 DOI: 10.1201/9781003482000-2
In-Depth Analysis of Artificial Intelligence Practices 17
Internet of Things (IoT), big data analytics, and artificial intelligence. The goal is to
have a highly collaborative, adaptable, and agile team (Khalid et al., 2023).
By these statements, the robot tutor that AI-driven technology is one of the
edge devices that can be used together with FL, where this collaboration empha-
sizes cooperation between human–robot interaction (HRI) to train and improve
new machine-based skills. Through this practice, the virtual robot learning model
adapts to the learning environment without having to send data and information to
a remote server, which poses a security risk for certain bot programs (Papadopoulos
et al., 2021). This FL approach includes safety measures and more efficient and
effective human–robot collaboration, which is supported by robot facilitation that is
consciously personalized by the surrounding environment (Lindblom et al., 2020).
Subsequently, this concept is adopted for teaching modern English and individual
production, where FL has an impact in the field of education at large. This statement
is supported by the results of research conducted by Sadiku et al. (2022) and Driss
et al. (2023), who suggest that the FL approach can help schools create AI-driven
learning models or machine learning by protecting user data. Protecting user data
is highly recommended so that the use of AI-driven learning applications can be
adjusted, and manufacturing becomes more personalized and user-centered by
utilizing insights gained by customizing specific products, processes, or services
such as AR, VR, MR, or other educational technologies (Shakeer & Babu, 2024;
Wu et al., 2023). Taking this route has the potential to increase the practicality and
efficacy of AI, augmented reality, and virtual reality experiences in educational or
teaching contexts by making them more immersive and realistic (de Moraes Rossetto
et al., 2023; Khang et al., 2023a; Klimova et al., 2023). Moreover, the FL approach
in English as a Foreign Language (EFL) can help students learn from each other and
share what they know.
Adopting the federated learning paradigm as outlined by Angurala and Khullar
(2023), our objective is to optimize English language teaching through decentralized
machine learning models. Previously, in traditional language classrooms, all data and
learning insights usually resided on a centralized server, like some previous learning
platforms. In federated learning, this paradigm changes, where each student’s device
becomes a decentralized node, storing its data locally via their smartphone.
In our EFL class, we teach our students to use AI applications with a virtual
agent approach, robot tutor, or language learning platform on their respective
devices, smartphones, or laptops, thus enabling the creation of personalized learn-
ing pathways for each undergraduate student. As students engage with EFL lan-
guage practice, the model adapts to their strengths and weaknesses. For example,
if a student excels in vocabulary but struggles with pronunciation, the federated
learning model will of course adapt the exercises to meet their specific needs in
EFL, and vice versa. If an undergraduate student has difficulty with grammar, then
the adjustments to the exercises are done practically. In our EFL scenario, students’
interactions with language applications generate insights locally on their devices,
where federated learning promotes collaborative learning experiences. Insights
gained from each device contribute to collective model refinement. We present fed-
erated learning principles, such as grouping our students who excel in a particular
language skill, so the federated learning model (FLM) will adapt to combine these
18 Artificial Intelligence Using Federated Learning
successful strategies, thereby providing benefits for the entire class and according
to the needs of each group.
AI virtual robotic tutor Lily and Elsa platforms are used in language learning that
utilizes the federated learning model to provide adaptive content recommendations.
As students progress, the model refines its understanding of their preferences and
learning styles. We identify, for example, that when a student consistently engages
in conversational practice, the model will suggest more interactive speaking activi-
ties to improve fluency, and the student can activate the audio feature to practice
and continually refine its language proficiency predictions, ensuring adaptability to
evolving classroom needs.
Therefore, we were glad to see the target and changes in language teaching by
decentralizing the learning process, personalizing teaching, preserving privacy,
encouraging collaboration, and providing real-time feedback. In our analysis, this
fresh method heralds a sea change in language instruction and points the way toward
the development of more effective and flexible classroom settings for English as a
Foreign Language students. By working together to train machine learning models,
academic institutions can protect students’ personal information while also collecting
and sharing expertise in a certain area. Industry 6.0 participants may work together
more effectively and share more information. This promotes collective intelligence
and innovation in various industries (Zeng et al., 2022). The framework can also
make use of FLM to promote the ethical and responsible usage of AI. To promote AI
models that are just transparent and accountable, collaboration is paramount. This
will help to actively prevent any type of unethical behavior, such as prejudice or bias.
This strategy can be used to create Industry 6.0 AI systems that are more trustworthy
and responsible. These transitions in education also will help to make sure that this
technology is used in an ethical way and following social norms.
Integrated human–robot FLM based on collaborative human–robot integration.
One important part of working together is the ability to communicate and analyze
data in real time within the language domain. More collaborative integration between
humans and robots is a logical outcome of users being able to enhance their language
abilities in a complex learning environment that is customized to their needs. It makes
it easier to train machine learning models that can be adjusted to meet the unique
requirements of each student, which in turn allows for the creation of highly custom-
ized and personalized learning. As the focus here is on actual 3D capabilities and
other cutting-edge production technologies, humans and machines may work together
to create one-of-a-kind products (Jia & Liu, 2019; Yakin et al., 2022).
to use, and embedded in students’ smartphones and accommodate students with var-
ious needs whenever and wherever they are. It would be great if this tool could also
provide instant feedback to users, allowing them to quickly correct their language
errors independently. Recent technological advancements have brought forth a range
of products designed to streamline English language learning through automation.
According to Chen et al. (2019), federated learning is a method whereby small
devices collaborate by sharing computing resources and local data to construct reli-
able models on distributed systems that operate on a large scale. The objective of FL
is to discover answers to several issues that computers aren’t capable of handling,
including those involving users’ private data, computing in real time, and AI robots
embedded in devices (Shakeer & Babu, 2024). A global machine learning model can
be trained using local weights from each user’s data using federated learning, which
enables numerous users to collaborate without revealing any sensitive information
(Weller et al., 2022). This method is employed to achieve a high level of precision in
the global model, as stated by Liu et al. (2020) and Narayan et al. (2016). Yin et al.
(2021) demonstrated that Google Translate’s federated learning (FL) approach in
Florida effectively mitigates privacy risks and reduces data exchange costs while
adhering to GDPR regulations, outperforming traditional centralized machine learn-
ing methods (Lyu et al., 2020). Several studies have compared deep neural networks
(DNNs) with FL (Taik et al., 2024) due to the widespread use of DNN in the field
of machine learning, but there are still not many articles comparing FL with several
other learning techniques, including in the educational realm.
The encouraging findings on DNNs have increased their appeal in various appli-
cations. The integration of DNN into FL is not without problems, especially because
of one obstacle. In their research, Mazzocca et al. (2024) explore potential develop-
ments and future perspectives for federated learning that protect privacy and data. Li
et al. (2021) also compared several FL systems. In addition to providing an overview
of FL, this paper also focuses on its application to image data security, collaborative
AI, and tools in learning EFL. Only a few studies have examined possible barriers to
the use of FL in EFL, even though previous studies have examined the advantages of
FL over classical machine learning in terms of protection, privacy, and convergence
efficiency (Sánchez et al., 2024). To address this gap, this chapter examines existing
research on the subject, categorizes the challenges of FL in foreign language educa-
tion and suggests potential solutions. Despite limited research on the application of
FLM in EFL, this chapter aims to contribute to its exploration.
The AI robotics application can understand users’ speech patterns and provide
them with tailored recommendations by combining machine learning algorithms
with voice recognition technology, among other features. In fields such as education,
business, and customer service, where proper English communication is essential,
the need for such tools is always increasing. Recent advances in deep learning have
significantly increased the effectiveness and precision of systems that handle written
and spoken language. The idea of end-to-end learning is one approach; this requires
teaching a single neural network to translate between unprocessed audio data and
literal text transcription (Hagiwara, 2021; Eslit, 2023). This method has shown
encouraging results in tasks that involve understanding written language, namely
vocabulary, grammar, and spoken recognition, with automatic speech recognition
20 Artificial Intelligence Using Federated Learning
and speech synthesis features. One such idea is the attention mechanism, which
allows the model to pay close attention to important parts of the input sequence. As
a result, results in areas such as speech recognition and translation have improved.
In addition, the capacity to represent long-term dependencies in a series of improv-
ing language skills has been enhanced using robotics-based teaching models, so that
English language processing is increasingly modern and interactive (Wang, 2023).
To improve English language proficiency, robotic learning approaches are now
being used in this study. Therefore, there is an urgent need for intelligent and real-
time help systems to improve English language proficiency. The suggested work
revolves around natural language processing. We present artificial intelligence and
mobile applications with support for multiple users in this article. When training this
model with a federated learning approach on the aggregated database, we also con-
sider data privacy issues. Therefore, this work aims to develop privacy-preserving
mobile and web multi-app training based on blended learning to assist students in
improving their English language proficiency. One of the main reasons for suggest-
ing blended learning-based systems is so that they can incorporate future technolo-
gies that will expand the possibilities of related applications.
limiting data sharing to what is essential, parties can protect the privacy
of their data set components. In language learning programs, for example,
users can choose their vocabulary and save it on their device by using the
MindMeister© application. Without revealing users’ specific word choices,
vertical FL can be used to improve language models collaboratively, for
example, by collecting information from various applications, and the plat-
form can propose customized vocabulary exercises.
3. Last, TFL stands for federated learning transfer. Efficiency gains dur-
ing model training through the incorporation of previously trained global
model information into locally targeted models is one possible interpreta-
tion of transfer learning. With the use of a large data set, TFL trains a global
model. Subsequently, local models refine their performance using their data
sets. Maximizing learning efficiency without compromising data security
is possible with this strategy (Chen et al., 2023). Sentiment analysis engines
are trained to correctly detect the tone of English text by initially exposing
them to data in that language. This is because these engines are designed
to improve learning performance on multiple distributions by transferring
knowledge from one distribution to another. To train a model on English
data, one can use FL transfer. To optimize learning across different lan-
guage distributions, knowledge learned from English data is transferred and
adapted to improve sentiment analysis performance on English knowledge.
FL is related to NLP theory and the theory of human language acquisition, namely
that humans convey a large amount of information through every word and syllable
they pronounce when speaking. Natural language communication is enhanced and
influenced by various factors, such as the subject matter and the sophistication of the
vocabulary used. To enhance language acquisition efficiency and reduce the emotional
strain on teachers and students, it is crucial to explore the potential of AI. Students can
learn independently, even without a teacher, because AI is set to be available 24/7. The
traditional concept of remembering and evaluating the structure, language, meaning,
and unique tone of each sentence is an impractical idea (Liu & Lu, 2023).
As can be seen, one branch of artificial intelligence offers machines that can read,
understand, predict, and extract meaning from human spoken language, and this
intelligence is of great benefit to EFL students (Celik, 2023). One common applica-
tion of this field is sentiment analysis, which involves identifying and classifying the
emotional tone of text, such as positive, negative, or neutral. Information is provided
regarding factors that influence student preferences. With the growing popularity of
sentiment analysis on the web, individuals can learn from multiple perspectives and
stories. Through social media, more and more people are sharing their opinions with
strangers by tweeting about a variety of subjects (such as politics, consumer prefer-
ences, vacations, and other topics where the app excels).
Expanding to support the collaboration of FLM for EFL, data translation is known
as machine translation (Benbada & Benaouda, 2023), which uses machines to trans-
late different languages as students become more adept at translating using technol-
ogy. Google Translate is the most well-known example of an application that uses
statistical machine learning (SML) language processing for EFL, and this engine
22 Artificial Intelligence Using Federated Learning
was very popular for students before the advent of AI applications for language prac-
tice such as Lily Tutor and Elsa AI. The basic premise is to collect a set of possible
texts, looking for similar texts in opposing languages, with the possibility of them
being translated into another language. Computer speech recognition, or autono-
mous speech recognition (ASR), is another name for speech recognition such as Elsa
AI. It involves carrying out verbatim transcription of a speech input stream through a
program programmed into a computer system. With proper pre-processing, some of
these uses of natural language processing can become plain text that can be parsed in
a way that any computer can parse. This includes describing a sequence of numeric
words as input. There needs to be a numerical representation that conveys multiple
verbal meanings while maintaining semantic integrity for each syllable. There is a
contemporary paradigm in NLP where the main method is to achieve this.
TABLE 2.1
Pre-Experimental Design
01 X 02
Pretest Treatment Post Test
In-Depth Analysis of Artificial Intelligence Practices 23
final test scores (O1 and O2) is assumed to represent the effect of treatment (X).
This design is in line with the research objective, assessing improvements in student
learning outcomes after implementing the AI-based FL model.
To describe the research context, the population is undergraduate students at Al
Asyariah Mandar University, totaling 219 students. The sample selection involved 13
study programs: Indonesian language education, mathematics education, Pancasila
and citizenship education, public health, sharia economics, Islamic management,
agrotechnology, agribusiness, animal husbandry, communication science, gov-
ernment science, informatics engineering, and informatics systems. The samples
exposed to AI were the communication study program, animal husbandry study
program, public health study program, and agrotechnology study program for each
learning model, so a total of four experimental classes were obtained with a sample
of 74 undergraduate students. The research took place in the first (odd) semester of
the 2023 academic year, and data collection was carried out six times in the experi-
mental class, as shown in Figure 2.1.
TABLE 2.2
Teaching Model Incorporating FL
Step 1. In the first stage, undergraduate students are introduced to the concepts of robotics-based
Warmup learning and federated learning, which involve conversations with AI robot tutors to develop
conversation skills. Undergraduate students are asked to engage in interactive dialogue with
an AI tutor, with a focus on pronunciation, fluency, and contextual communication. Start by
downloading the Robot Tutor application on the student’s smartphone.
Step 2. Undergraduate students are asked to form groups and discuss with their group friends the
Federated conversation theme, the weather. They discussed determining weather keywords by
combining robot tutor Lily and Mind Mapping. At this stage, undergraduate students are
asked to access Tutor Lily, which helps them discover vocabulary related to weather. After
that, they organized their group’s vocabulary according to the weather conditions that Tutor
Lily shared. Undergraduate students will practice pronunciation of vocabulary for those who
are not yet able to pronounce the vocabulary, practice accents, and practice correct writing.
Step 3. Under Tutor Lily’s guidance, students collaborate with their peers to create practice scenarios
Composition for writing dialogues. These exercises are designed to improve grammar, coherence, and
vocabulary, with AI providing feedback. In this stage, undergraduate students access L2
using Tutor Lily’s translation features and Google Translation. To perfect the dialogue,
lecturers guide undergraduate students and facilitate with Grammarly. This activity trains
collaborative grammar that utilizes blended learning, ensuring collective improvement in
grammatical accuracy. In addition, at this stage, undergraduate students structurally enrich
their vocabulary through AI-guided exercises and contextual usage exercises.
Step 4. Practice stage: after the dialogue is complete, it continues with personalized reading with
Practice AI with the aim of improving reading comprehension through a personalized and
AI-guided reading experience. A dialogue script about the presented material (weather)
makes up the reading material that the AI has curated. Together with their group mates,
they practice with each other to sharpen their listening skills with AI-generated audio
content. In addition to Tutor Lily, undergraduate students access Elsa-AI. This stage of
AI integration aims to train pronunciation, practice listening, and practice pronunciation
with the help of AI and assess understanding.
Step 5. In the performance stage, undergraduate students and their group friends display their
Performance English language skills by recording a video presentation and uploading it to YouTube.
RESEARCH INSTRUMENTS
This research uses a combination of test and non-test instruments to collect data for
comprehensive analysis. The testing component consists of a multiple-choice ques-
tionnaire consisting of 25 questions given at the initial stage. This test had a dual
purpose, assessing the initial proficiency of both experimental groups and establish-
ing the homogeneity of their abilities. This careful assessment aims to ensure that, at
the start of the study, the two groups do not show statistically significant differences
in their capacities, as shown in Figure 2.2.
To assess whether the experimental groups had made any improvements in their
learning outcomes, they were both given an identical multiple-choice questionnaire.
To fully grasp the efficacy of the interventions used in the study, this cyclical testing
method is employed.
In-Depth Analysis of Artificial Intelligence Practices 25
Process
Input 1. Treatment AI Output
1. Pretest Robotic on EFL 1. Posttest
2. Observation 2. English skills 2. Data Analysis
3. FLM-based learning
Dissemination
Outcome YouTube
A psychomotor evaluation, which is not a test but is administered at the same time
as the test instrument, is also conducted. The goal of this all-encompassing strategy
is to gain a thorough knowledge of the many facets of student learning outcomes by
integrating test and non-test instruments. After carefully administering the instru-
ments and collecting the data, as well as making sure that the instruments were valid
and appropriate for the research purpose, a series of advanced data analyses were car-
ried out. To conduct a thorough and rigorous review of the treatments used and their
effect on the experimental group’s learning outcomes, this study seeks to acquire new
insights into the complexities of the research findings shown in Figure 2.3.
DATA ANALYSIS
After a comprehensive verification process and extensive tests for validity and com-
pliance with set standards, the next crucial step is to quantify the research results.
Two sophisticated techniques used in the analysis process are quantitative descrip-
tive analysis and inferential statistics, which are both made possible by SPSS version
26. Thoroughly analyzing and making sense of the numerical data produced by the
instrument is essential for quantitative descriptive analysis. Using statistics like the
mean, median, and standard deviation, one can get a good idea of the dataset’s cen-
tral tendency and dispersion and then conclude the set’s key properties. At the same
time, relevant inferences are drawn using inferential statistics and dispersion in the
collected data. Simultaneously, inferential statistics are used to draw meaningful
conclusions and infer patterns in datasets. The use of SPSS version 26, powerful
statistical software, allows the application of various statistical tests.
TABLE 2.3
Pre- and Post-Test Results
N Minimum Maximum Mean Std. Deviation
Pretest 74 30.00 70.00 54.3243 8.96433
Posttest 74 60.00 95.00 79.6622 9.52038
Valid N (listwise) 74
TABLE 2.4
Chi-Square Test
Pretest Posttest
Chi-square 58.811a 41.459b
df 8 7
Asymp. sig. .000 .000
a 0 cells (0.0%) have expected frequencies less than 5. The minimum expected cell frequency is 8.2.
b 0 cells (0.0%) have expected frequencies less than 5. The minimum expected cell frequency is 9.3.
TABLE 2.5
One Sample Test
Test Value = 0
95% Confidence
Interval of the
Mean Difference
t df Sig. (2-Tailed) Difference Lower Upper
Pretest 52.131 73 .000 54.32432 52.2475 56.4012
Posttest 71.980 73 .000 79.66216 77.4565 81.8679
TABLE 2.6
ANOVA
Sum of Squares df Mean Square F Sig.
Between Groups 1707.894 7 243.985 3.872 .001
Within Groups 4158.322 66 63.005
Total 5866.216 73
TABLE 2.7
Paired Sample Correlations
N Correlation Sig.
Pair 1 Pretest and posttest 74 .403 .000
Table 2.8 shows the survey data set includes descriptive statistics for variables related
to EFL classroom pedagogical considerations, AI practices, robotic tutor involvement,
blended learning implementation, AI practices, and blended learning integration, as
well as general pedagogical considerations. Primary statistical measures were applied
to participants’ responses after each variable was evaluated using various statements.
For AI practices, participants demonstrated a strong understanding of the subject
(mean = 4.5270) and actively engaged with AI-enabled technologies (mean = 4.4189).
TABLE 2.8
Questionnaire Results
Descriptive Statistics
Std.
N Minimum Maximum Mean Deviation
AI Practices
1. I understand the practice of artificial intelligence 74 3.00 5.00 4.5270 .68692
(AI) in education, and I am happy
2. I use AI-powered tools or applications in English 74 2.00 5.00 4.4189 .77648
as a Foreign Language (EFL) learning very well.
3. From my perspective, AI-driven tools are a promising 74 2.00 5.00 4.1892 .87077
avenue for optimizing language acquisition.
4. AI Tutor Lily and Elsa’s technology or practice 74 1.00 5.00 4.1486 .85500
integrated into EFL lessons motivates interest in
learning English compared to before without using AI.
5. I believe that AI-based practices can contribute to 74 2.00 5.00 4.3378 .83218
individualized learning experiences in EFL
classrooms.
Robot Tutor
Using a robot tutor in EFL class is very interesting. 74 2.00 5.00 4.3243 .74223
I have found that incorporating a robot tutor into my 74 2.00 5.00 4.3649 .82053
English learning has been very beneficial.
I am more comfortable learning when lecturers use 74 2.00 5.00 4.2027 .84367
Robot Tutor Lily and ELAS compared to traditional
teaching methods.
My language skills can be improved effectively with 74 1.00 5.00 4.1216 .92088
the help of AI.
Implementation of federated learning
I enjoy learning English with the concept of federated 74 1.00 5.00 4.1351 .95551
learning (FL) in the context of language education.
Learning federation in EFL class can help my deep 74 2.00 5.00 4.2297 .86875
learning of English.
I feel the potential benefits when lecturers use 74 1.00 5.00 4.3919 .82458
federated learning for language teaching.
I am excited about the federated learning model in an 74 1.00 5.00 4.2162 .86437
EFL environment.
I believe that federated learning can address privacy 74 2.00 5.00 4.2973 .83960
issues in language education.
In-Depth Analysis of Artificial Intelligence Practices 31
DISCUSSION
As stated in Table 2.3, the data of descriptive statistics provide a detailed picture of
the distribution of participants’ performance, which can be used as a starting point for
inferential studies and to guide possible educational initiatives. Based on Table 2.4,
the results of the chi-square test showed that the association test was strong, indi-
cating a correlation between pre- and posttest scores. This can help us understand
educational interventions or experimental conditions better. Using a test value of 0,
a one-sample test was performed on the pretest and posttest data sets to see whether
the mean differences in each group were statistically significant. The results showed
that there was a statistically significant change between the mean scores before and
after the test, which explains how well the intervention of the FL teaching method
worked. A substantial drop in performance between the two sets of assessments
suggests the need for additional research into the intervention’s efficacy or the effec-
tiveness of the teaching method. Consequently, the coefficient value, which shows
32 Artificial Intelligence Using Federated Learning
the strength of the link, reveals that participants with higher pretest scores also tend
to receive higher posttest scores. This study sheds light on people’s performance on
both exams and can provide light on the kinds of educational interventions or experi-
mental conditions that may have produced the observed correlations.
Based on Table 8, the mean scores of students’ responses from the survey ranged
from 4.1216 to 4.3919. This indicated that undergraduate students were generally
positive in terms of their experiences with Tutor Robot and the application of fed-
erated learning in the EFL classroom. Positive feedback was also received by AI
practice integration and federated learning, highlighting the real capacity of AI
practice integration and federated learning model to improve language learning out-
comes such as Bowser’s added-on (Farahrani et al., 2023), which trains algorithms
using distributed data sets stored on edge devices or servers. This proposed method
eliminates the need to communicate data, thereby bridging the privacy utility gap
introducing a new personalized clustered FL (PCFL) method that trains models by
leveraging shared features in the personal data and by capturing unique features
in each client’s data. Although the proposed methodology successfully overcomes
privacy concerns, experimental findings show that it hardly loses performance when
compared with centralized model training methods.
Figure 2.2 shows the teaching model taxonomy by integrating the FL concept,
which is based on the FL classification, namely horizontal federated learning, vertical
federated learning, and federated learning transfer, and the AI application domain.
Segmentation of the language data obtained is distributed to test EFL English skills,
and the personalized approach is part of the teaching model that is tested in the
classroom. Some of the main obstacles include quota costs, network constraints, the
diversity of AI systems in use, and concerns about privacy and security. Analysis of
survey paper topics and their correlation with language learning outcomes suggest
potential improvements in FL implementation through categorization. Moreover, a
majority of participants advocated for the integration of AI into English as a Foreign
Language classrooms, echoing the positive findings on student engagement reported
by Braines et al. (2017).
In addition to the challenges faced, the study revealed that undergraduate students
perceived FLM as a valuable tool for enhancing their EFL language skills, consistent
with previous research (Chhikara et al., 2020; Purgina, 2019). Their studies showed
that the use of various artificial intelligence applications can support language train-
ing speed, efficiency, generalization ability, and suitability for various domains, such
as the Internet of Things (IoT), Google Translation collaboration, storing data on
vocabulary, grammar, sentences obtained on smartphone devices, notes, and secu-
rity data for each undergraduate student. Integrating FL in class has its own chal-
lenges. In this study, this is the first time this has been done and required repeated
explanations so that undergraduate students could understand each learning syntax
structure and adapt well. Priorities, including optimal internet networks and differ-
ent types of smartphones, certainly do not hinder FL acceleration in class.
When designing learning scenarios with the integration of Tutor Lily and Elsa AI
(customized models depending on the learning environment), personalization is an
additional component to consider. Barriers to implementing an FL-based learning
system are undergraduate students’ high internet costs and the need for data storage
In-Depth Analysis of Artificial Intelligence Practices 33
space on their respective smartphones. Because of the large number of devices that
may form a combined network, data transfer over the network is much slower than
computing performed locally. As a result, effective networking has been the subject
of much research in Indonesia and the Asia Pacific in general. The diversity of under-
lying systems also means that devices in a combined network may have different
communication capabilities. Different devices may also have varying amounts of
storage and processing power, with some downloading quickly and others being slow.
In many circumstances, network limitations do not mean that only some devices can
take part in an iteration. Therefore, the application of learning techniques with the
FL approach can overcome and find solutions to these obstacles.
The adoption of combined learning methods, similar to those used in education,
is still uncommon in fields like engineering, architecture, IoT, and health, where the
term “FL” is predominantly used. Several elements contribute to improving learning
outcomes with FL techniques; apart from technology and teaching models, condi-
tions and consideration of students’ learning needs are also considered. The time
required for blended learning to come together considers not only the processing
power of language acquisition but also the time required to adapt to the technique.
Therefore, to implement and optimize the FL approach, it is important to consider
the quality of the internet, student motivation, and learning experience so that this
learning model works well and can be applied to other courses. To optimize the
combined deep learning model for AI applications, it can be carried out adaptively,
considering the availability of devices and their readiness to participate in the learn-
ing process.
CONCLUSION
This research incorporates a federated learning approach in language learning by
using three FL characters in learning activities to see how federated mobile learning
can help overcome the problem of low English language skills, interest, and learning
motivation, especially those related to the anywhere and anytime learning paradigm.
As an innovative decentralized learning solution, the FL approach was tested in
language classes to overcome the problems of decentralized EFL language learning.
We introduce the concept of federated learning and the idea of blended learning and
its main characteristics in a way that is easy for everyone to understand. The results
of our study outline the steps for implementing blended learning in language classes
and the possibility that it can be adapted for other courses. Moreover, this research
shows that blended learning can be used with simulations that have been run for
eight meetings, and our results show that blended learning techniques can improve
learning outcomes, motivation, and interest in learning English. Additional studies
are needed to address the many unresolved concerns and barriers.
The application of FL in the field of language can be done with the concept of a
collaborative human–robot integration approach. Collaboration occurs by emphasiz-
ing real-time features in data sharing and analysis. A more collaborative integration
of humans and robots is of course supported by a more flexible learning environ-
ment, allowing users to improve their language skills according to their needs in a
sophisticated learning environment. Strategies based on collaborative human–robot
34 Artificial Intelligence Using Federated Learning
REFERENCES
Al Yakin, A., Obaid, A. J., Muthmainnah, R. S. A. M., Khalaf, H. A., & Al-Barzinji, S. M.
(2022). Bringing technology into the classroom amid Covid 19, challenge and opportu-
nity. Journal of Positive School Psychology, 6(2), 1043–1052.
Angurala, M., & Khullar, V. (2023). Federated learning-based privacy preserved English
accent training ecosystem for people with Indian language accent. Entertainment
Computing, 46, 100572.
Beltrán, E. T. M., Pérez, M. Q., Sánchez, P. M. S., Bernal, S. L., Bovet, G., Pérez, M. G.,. . .&
Celdrán, A. H. (2023). Decentralized federated learning: Fundamentals, state of the
art, frameworks, trends, and challenges. IEEE Communications Surveys & Tutorials,
25(4), 2983–3013. http://dx.doi.org/10.1109/COMST.2023.3315746
Benbada, M. L., & Benaouda, N. (2023). Investigation of the Role of Artificial Intelligence
in Developing Machine Translation Quality. Case Study: Reverso Context and Google
Translate Translations of Expressive and Descriptive Texts. Language Combination:
Arabic-English/English-Arabic (Doctoral dissertation, Faculty of Letters and Languages-
Department of English).
Braines, D., O’Leary, N., Thomas, A., Harborne, D., Preece, A. D., & Webberley, W. M.
(2017). Conversational homes: A uniform natural language approach for collaboration
among humans and devices. International Journal on Advances in Intelligent Systems,
10(3/4), 223–237.
Celik, I. (2023). Towards intelligent-TPACK: An empirical study on teachers’ professional
knowledge to ethically integrate artificial intelligence (AI)-based tools into education.
Computers in Human Behavior, 138, 107468.
Chen, D., Jiang, X., Zhong, H., & Cui, J. (2023). Building trusted federated learning: Key
technologies and challenges. Journal of Sensor and Actuator Networks, 12(1), 13.
Chen, M., Suresh, A. T., Mathews, R., Wong, A., Allauzen, C., Beaufays, F., & Riley, M. (2019).
Federated learning of n-gram language models. arXiv preprint arXiv:1910.03432.
Chhikara, P., Singh, P., Tekchandani, R., Kumar, N., & Guizani, M. (2020). Federated learn-
ing meets human emotions: A decentralized framework for human–computer interac-
tion for IoT applications. IEEE Internet of Things Journal, 8(8), 6949–6962.
Chourasia, S., Tyagi, A., Pandey, S. M., Walia, R. S., & Murtaza, Q. (2022). Sustainability
of industry 6.0 in global perspective: Benefits and challenges. Mapan, 37(2), 443–452.
de Moraes Rossetto, A. G., Martins, T. C., Silva, L. A., Leithardt, D. R., Bermejo-Gil, B.
M., & Leithardt, V. R. (2023, November). An analysis of the use of augmented reality
and virtual reality as educational resources. Computer Applications in Engineering
Education, 31(6), 1761–1775. https://doi.org/10.1002/cae.22671
Driss, M. B., Sabir, E., Elbiaze, H., & Saad, W. (2023). Federated learning for 6G: Paradigms,
taxonomy, recent advances and insights. arXiv preprint arXiv:2312.04688.
Duan, Q., Hu, S., Deng, R., & Lu, Z. (2022). Combined federated and split learning in edge
computing for ubiquitous intelligence in internet of things: State-of-the-art and future
directions. Sensors, 22(16), 5983.
Eslit, E. R. (2023). Elevating language acquisition through deep learning and meaningful
pedagogy in an AI-evolving educational landscape. Preprints. https://doi.org/10.20944/
preprints202309.0658.v1
In-Depth Analysis of Artificial Intelligence Practices 35
Farahani, B., Tabibian, S., & Ebrahimi, H. (2023). Towards a personalized clustered federated
learning: A speech recognition case study. IEEE Internet of Things Journal, 10(21),
18553–18562. doi: 10.1109/JIOT.2023.3292797
Hagiwara, M. (2021). Real-World Natural Language Processing: Practical Applications with
Deep Learning. Simon and Schuster.
Jia, T., & Liu, Y. (2019, October). Words in kitchen: An instance of leveraging virtual reality
technology to learn vocabulary. In 2019 IEEE International Symposium on Mixed and
Augmented Reality Adjunct (ISMAR-Adjunct) (pp. 150–155). IEEE.
Khalid, U., Iqbal, H., Vahidian, S., Hua, J., & Chen, C. (2023). CEFHRI: A communication
efficient federated learning framework for recognizing industrial human–robot interac-
tion. arXiv preprint arXiv:2308.14965.
Khang, A., Muthmainnah, M., Seraj, P. M. I., Al Yakin, A., & Obaid, A. J. (2023a). AI-aided
teaching model in education 5.0. In Handbook of Research on AI-Based Technologies
and Applications in the Era of the Metaverse (pp. 83–104). IGI Global.
Khang, A., Shah, V., & Rani, S. (Eds.). (2023b). Handbook of Research on AI-Based
Technologies and Applications in the Era of the Metaverse. IGI Global.
Klimova, B., Pikhart, M., Polakova, P., Cerna, M., Yayilgan, S. Y., & Shaikh, S. (2023).
A systematic review on the use of emerging technologies in teaching English as an
applied language at the university level. Systems, 11(1), 42.
Li, Q., Wen, Z., Wu, Z., Hu, S., Wang, N., Li, Y.,. . .& He, B. (2021). A survey on feder-
ated learning systems: Vision, hype and reality for data privacy and protection. IEEE
Transactions on Knowledge and Data Engineering, 35(4), 3347–3366. doi: 10.1109/
TKDE.2021.3124599
Lindblom, J., Alenljung, B., & Billing, E. (2020). Evaluating the user experience of human–
robot interaction. In Human–robot interaction: Evaluation Methods and Their
Standardization (pp. 231–256). Springer.
Liu, B., & Lu, Z. (2023). Design of spoken English teaching based on artificial intelligence
educational robots and wireless network technology. EAI Endorsed Transactions on
Scalable Information Systems, 10(4), e12–e12.
Liu, Y., Yuan, X., Xiong, Z., Kang, J., Wang, X., & Niyato, D. (2020). Federated learning for 6G
communications: Challenges, methods, and future directions. China Communications,
17(9), 105–118.
Lyu, L., Xu, X., Wang, Q., & Yu, H. (2020). Collaborative fairness in federated learning.
Federated learning: Privacy and Incentive, 189–204.
Marsden, E., & Torgerson, C. J. (2012). Single group, pre-and post-test research designs:
Some methodological concerns. Oxford Review of Education, 38(5), 583–616.
Mazzocca, C., Romandini, N., Montanari, R., & Bellavista, P. (2024). Enabling federated
learning at the edge through the IOTA tangle. Future Generation Computer Systems,
152, 17–29.
Muthmainnah, Obaid, A. J., Al Yakin, A., & Brayyich, M. (2023, June). Enhancing computa-
tional thinking based on virtual robot of artificial intelligence modeling in the English
language classroom. In International Conference on Data Analytics & Management
(pp. 1–11). Springer Nature.
Narayan, R., Chakraverty, S., & Singh, V. P. (2016). Quantum neural network based machine
translator for English to Hindi. Applied Soft Computing, 38, 1060–1075.
Papadopoulos, G. T., Antona, M., & Stephanidis, C. (2021). Towards open and expandable
cognitive AI architectures for large-scale multi-agent human-robot collaborative learn-
ing. IEEE Access, 9, 73890–73909.
Purgina, M. (2019). Mobile Technology for Gamification of Natural Language Grammar
Acquisition (Unpublished doctoral dissertation, The University of Aizu). https://uaizu.
repo.nii.ac.jp.
36 Artificial Intelligence Using Federated Learning
Sadiku, M. N., Musa, S. M., & Chukwu, U. C. (2022). Artificial Intelligence in Education.
iUniverse.
Sánchez, P. M. S., Celdrán, A. H., Xie, N., Bovet, G., Pérez, G. M., & Stiller, B. (2024).
Federated trust: A solution for trustworthy federated learning. Future Generation
Computer Systems, 152, 83–98.
Shakeer, S. M., & Babu, M. R. (2024). A study of federated learning with internet of things
for data privacy and security using privacy preserving techniques. Recent Patents on
Engineering, 18(1), 1–17.
Taik, A., Abouaomar, A., & Cherkaoui, S. (2024). Green federated learning-based models
and protocols. In Green Machine Learning Protocols for Future Communication
Networks (pp. 63–102). CRC Press.
Wang, T. (2023, January). Innovative strategies for the development of international Chinese
language education based on deep learning models. Applied Mathematics and
Nonlinear Sciences, 9(1), 1–5. doi: 10.2478/amns.2023.2.00138
Weller, O., Marone, M., Braverman, V., Lawrie, D., & Van Durme, B. (2022). Pretrained
models for multilingual federated learning. arXiv preprint arXiv:2206.02291. https://
doi.org/10.48550/arXiv.2206.02291
Wu, D., Yang, Z., Zhang, P., Wang, R., Yang, B., & Ma, X. (2023). Virtual-reality inter-
promotion technology for metaverse: A survey. IEEE Internet of Things Journal,
10(18), 15788–15809. doi: 10.1109/JIOT.2023.3265848
Yin, X., Zhu, Y., & Hu, J. (2021). A comprehensive survey of privacy-preserving federated
learning: A taxonomy, review, and future directions. ACM Computing Surveys (CSUR),
54(6), 1–36.
Zeng, R., Zeng, C., Wang, X., Li, B., & Chu, X. (2022). Incentive mechanisms in federated
learning and a game-theoretical approach. IEEE Network, 36(6), 229–235.
Zhang, C., Xie, Y., Bai, H., Yu, B., Li, W., & Gao, Y. (2021). A survey on federated learning.
Knowledge-Based Systems, 216, 106775.
3 Enabling Federated
Learning in the Classroom
Sociotechnical Ecosystem
on Artificial Intelligence
Integration in Educational
Practices
Ahmad Al Yakin, Arkas Viddy, Idi Warsah,
Ali Said Al Matari, Luís Cardoso,
Ahmed A. Elngar, Ahmad J. Obaid,
and Muthmainnah
INTRODUCTION
The introduction of AI technology can affect teacher–student relationships.
Understanding the sociological aspects of this relationship is critical to ensuring that
implementing blended learning enhances, rather than hinders, the educational expe-
rience (Muthmainnah et al., 2023a). Teachers play an important role in mediating the
impact of AI on the classroom environment and fostering a positive sociotechnical
ecosystem. This chapter explores the integration of blended learning into educational
practice, focusing on sociological aspects to see the impact of its implementation in
the classroom. Federated learning, a decentralized machine learning approach, has
great potential to improve educational outcomes. However, its successful implemen-
tation requires a different understanding of the social dynamics in the educational
environment. To investigate the sociological implications of the introduction of arti-
ficial intelligence (AI) through blended learning in the classroom, examining the
potential benefits and challenges from a sociotechnical perspective with the basic
assumption that artificial intelligence has become an integral part of various sectors
and their sectors. Its application in education is receiving increasing attention.
Blended learning, a decentralized machine learning paradigm, offers a unique
approach to incorporating AI in the educational landscape that focuses on the socio-
logical dimensions that enable blended learning in the classroom, highlighting the
complex interactions between technology and social structures Ng et al. (2023).
To understand the implications of AI integration, it is important to take a socio-
logical perspective. Sociological theories, such as symbolic interactionism, social
DOI: 10.1201/9781003482000-3 37
38 Artificial Intelligence Using Federated Learning
in the context of existing educational practices and social norms. Studies highlight
the importance of considering the pedagogical implications of AI integration (Hess
et al., 2021). Integrating FL successfully requires careful alignment with existing
curricula and teaching philosophies, ensuring that AI tools complement and enhance,
not replace, traditional pedagogy. In addition, the human element remains important,
where teacher training and support are essential to efficiently maximize the potential
of FL in the classroom (Lazarus et al., 2023).
Accelerated AI and federated learning provide promising avenues in education
while addressing data privacy concerns. However, it is important to acknowledge
the existing challenges and consider FL within the broader sociotechnical ecosys-
tem. By fostering collaboration, addressing ethical considerations, and thoughtfully
integrating FL into existing pedagogical practices, the educational community can
harness FL’s unique potential to create personalized and engaging learning experi-
ences for all students in higher education (Bienkowski et al., 2012).
The digitalization and development of Mixverse in the educational landscape are
undergoing transformative change as educators and institutions leverage innovative
technologies to revolutionize learning and teaching practices. The rapid advance-
ment of artificial intelligence has opened the door to new applications in various
sectors, including education. Although AI’s potential for personalized learning
and improving educational experiences has been widely recognized, effectively
integrating AI into the classroom environment still presents ongoing challenges.
Artificial intelligence has great potential to personalize learning experiences, meet
individual student needs, and provide educators with valuable insights into student
progress. However, integrating AI into a complex and dynamic classroom environ-
ment requires careful consideration of factors beyond the purely technical aspects.
Existing research primarily focuses on the technical aspects of applying AI in edu-
cational settings, with limited exploration of the broader sociotechnical ecosystem.
These discovered gaps require a deeper understanding of the social and technical
factors that influence the successful integration of AI in the classroom, considering
the diverse stakeholders and their interactions (Lazarus Cowin et al., 2023).
This chapter aims to address this critical gap by exploring the sociotechnical
ecosystem surrounding the integration of AI in educational practices, particularly in
higher education. We will examine the social and technical factors that influence the
successful implementation of AI-powered learning in the classroom environment,
with a focus on the interactions between technology, pedagogy, and human actors.
More and more research is being conducted to investigate the potential applications
of AI in education. Research has explored AI-powered tutoring systems, personalized
learning platforms, and intelligent feedback mechanisms, showing promising results
in various educational contexts. Experts emphasize the importance of considering
the pedagogical implications of AI integration. Inderawati et al. (2024) argue that
successful implementation requires careful alignment with the existing curriculum
and teaching philosophy. Additionally, the human element remains important, and
Aeni et al. (2024) highlight the need for educators to have the necessary skills and
knowledge to effectively utilize and integrate AI tools into their teaching practices.
Additionally, the research underscores the social complexity involved in AI inte-
gration (Sadek et al., 2024) and raises concerns about potential biases embedded in
Enabling Federated Learning in the Classroom 41
There are no longer clear boundaries between the two phases of learning: the
classroom and the workplace (Southworth et al., 2023). The average person today
has more knowledge than they can process, and the workforce of the future will
need to know more than that. Promoting high-quality educational opportunities
across life’s transitional contexts—from the family home, classroom, workplace, and
beyond—is critical to fostering lifelong learning. Rather than starting with a certain
level of education, professionals need to find ways to incorporate learning into their
daily work. Learning also occurs in many environments, such as families, clubs, and
online communities, and occurs at all ages and in almost every occupation. The find-
ings from these specific cases should inform more generalizable learning theories
and more creative and perceptive systems, practices, and evaluations in a variety of
fields. With a focus on continuous learning, the benefits of learning in the classroom,
in the community, at home, and work can all be combined.
Increasing professional specialization, market changes (local and global are no
longer distinguishable), and new technologies for information sharing, communi-
cation, and collaboration, made possible by Internet technologies and specialized
applications, are characteristics of today’s society (Abulibdeh et al., 2024). The
skills taught in school, such as reading, writing, and arithmetic, are not sufficient for
situations like this. Some examples of new capabilities include the ability to work
remotely, communicate effectively in diverse teams, build consensus, adapt knowl-
edge artifacts, address problems with unclear or missing specifications, and utilize
online and specialized collaboration.
According to Ali et al. (2024), the following are some characteristics of the socio-
technical ecosystems that have emerged throughout the past 10 years. The deep
and lasting digitalization and transformation of our time are rooted in social and
cultural change as well as technology. Rather than technology being the primary
driver of change in complex situations, Sriram (2024) argues that human behavior
and social organization undergo gradual change. He said that this includes not only
hardware, networks, and software but also people, processes, regulations, laws, and
the movement of raw materials and finished products, as well as many other com-
ponents. In addition, these conditions require the co-design of social and technical
systems using models and concepts that consider the artifacts and the social context
in which the system will be used. Meta-design between AI, social interaction, and
federated learning is an important part of this system because it empowers users
to shape and adapt the technical system to their own needs. As we know, this system
is designed for humans, not just one person. They must be able to support both indi-
viduals and groups, but groups achieve their goals through the combined efforts of
all members and involve collaboration. Therefore, the question of how to create an
environment that encourages individual and social efforts without disrupting either
is of paramount importance.
According to Bednar and Welch (2020), we need new perspectives and methods
to address the fundamental problems associated with distributed intelligence and
the development of sociotechnical systems to help people live better and more ful-
filling lives, so we researched to find ways of exploiting the potential of new tech-
nology based on a widespread and reliable computing environment and increasing
people’s proficiency in using technology in the mixverse era. Rather than conveying
44 Artificial Intelligence Using Federated Learning
pre-digested information, new media and technologies can play an important role
in facilitating meaningful activities, social debate and discussion, stakeholder
understanding, and the formulation and resolution of real problems. Based on this
worldview, the following sociotechnical arrangements are necessary to facilitate
self-directed learning and learning communities in higher education. These systems
should facilitate the enhancement of individual and collective knowledge; this means
that they not only help individuals when they work alone but also when they collabo-
rate with others and are members of several groups simultaneously, whether through
digital interactions or interacting with objects or people in the real world. This seems
to be an excellent strategy to improve the learning experience.
Improvisation, evolution, and creativity are nothing extra in a world where noth-
ing is guaranteed. Lecturers must use it as an opportunity to find better and original
answers to a problem. Sociotechnical arrangements that enable new collaborative
designs are needed to empower self-directed learners and reinvigorate social innova-
tion in learning communities. To empower users to take on the role of designers and
unleash their creativity, meta-design outlines goals, methods, and procedures (Tabo,
2020). AI-enabled technologies can support self-directed learning by shifting the
focus from mere consumption of information to active participation in its production.
AI-based federated learning goes beyond user-centered and participatory learning
design in many ways and is encouraged to share ideas and goals.
METHODOLOGY
This research used quantitative methods. We used Google Forms to create our online
surveys. This survey consisted of five parts. In the first part, we tried to collect some
basic information from participants, including basic demographics such as student
age, gender, and self-reported level of technology competency.
A Likert scale consisting of 5 points is used to assess technology skills such
as: strongly agree, agree, somewhat agree, disagree, and disagree. In the second
part of the chapter, we look at how people understand the basics of AI (such as
learning using AI bots); how they utilize AI in learning (such as accessing infor-
mation); and how they process, share, and discuss information. Asking whether
participants were aware that AI and deep learning are widely discussed in the edu-
cational community, the third subsection sought to explore the understanding of
AI as a topic in learning. In the fourth part, we asked students to rate their feelings
and attitudes towards artificial intelligence, considering their answers to the follow-
ing questions: (1) how they view AI about humans and society; (2) how they feel
towards artificial intelligence as a tool for socializing information and knowledge;
(3) how they feel about the development of AI in the federated learning model; (4)
how they feel about AI regarding its potential to improve learning outcomes and
its integration into the teacher professional education curriculum. Using five differ-
ent 5-point Likert scales, these sections were scored: (5) strongly agree, (4) agree,
(3) somewhat agree, (2) disagree, and (1) strongly disagree. The five components
included questions about respondents’ opinions about the use of artificial intelli-
gence in social interactions in the classroom and their hopes for future education in
this area Figure 3.1.
Enabling Federated Learning in the Classroom 45
STATISTICAL ANALYSIS
The results of data analysis, namely the average value and standard deviation of continu-
ous variables, are displayed. Data presented as percentages and frequencies are known
as categorical variables. We described “strongly agree” and “agree” as agreement for the
descriptive statistics, and “agree” and “strongly agree” as disagreement. The results of
this research data were processed using the Statistical Package for Social Sciences (SPSS
version 20) used for data entry and analysis. Data was analyzed using descriptive statistics
to obtain percentages, frequencies, standard deviations, and means. The reliability and
validity tests were determined by calculating Cronbach’s alpha, which produced 0.82.
is strongly supported by the results of this poll. Learning with AI is often seen as
preferable by students in higher education, and they state that taking this class is
their first experience interacting with AI and getting to know AI.
This leads the researchers to the confident conclusion that AI learning with the FL
model is very attractive for professional teacher education students at Al Asyariah
Mandar University. Even though inadequate internet conditions due to having to
prepare quotas do not provide a big obstacle, this has a positive impact on the atomic
habits of those who adapt to AI. This activity certainly uses creative ways of teach-
ing and learning so that the educational process continues and is meaningful. In
many cases, students perceive learning with AI integration as more comfortable and
safer. In conclusion, the findings of recent research support students’ positive atti-
tudes toward AI learning with the federated learning model described in Table 3.1.
The results of survey data analysis regarding respondents’ opinions regarding
the integration of AI with federated learning in the sociotechnical ecosystem model
described in Table 3.1 show that students generally have a positive attitude towards
artificial intelligence in education, especially with federated learning. In both state-
ments, students demonstrated a reasonable level of understanding regarding the ben-
efits of AI in education (Statement 1) and their belief that AI-driven learning tools
are becoming more common (Statement 2). As stated in Statement 3, they enjoy
leveraging AI with FL, and as stated in Statement 4, they recognize its potential
in accessing learning materials. Many people feel comfortable disclosing personal
information to AI systems (Statement 5). Students demonstrated a greater level of
comfort in terms of AI information processing, while they generally felt comfortable
using AI tools (Statement 6). Statement 8 stated that students had a positive impres-
sion of sharing and debating material in class using AI tools. Personalized learning
(Statement 9) and collaboration (Statement 10) are two areas that this research sug-
gests could be beneficial.
In the “mixverse era” (Statement 11), students recognize the importance of AI
and deep learning, and they feel comfortable discussing AI in class (Statement 12).
According to Statement 13, socio-technical skills can be improved by incorporating
AI-based learning into the curriculum. The broader impact of AI on our ability to
understand the universe may require further investigation (Statement 14). Finally,
the survey shows that students support the development of AI in federated learning
(Statement 18), believe that AI can improve learning outcomes (Statement 19), feel
comfortable relying on AI for learning (Statement 17), have positive perceptions of
the role of AI in society (Statement 16), and strongly support integrating AI into
teacher education (Statement 20). The results of this research show a bright future
for educational technology that utilizes artificial intelligence in the sociotechnical
ecosystem, as shown in Figure 3.2.
Using the descriptive statistics in Table 3.2, this study investigated student senti-
ment regarding educational approaches involving federated learning and artificial
intelligence. By providing a brief overview of the data, descriptive statistics help us
understand the data’s central tendency, variability, and the shape of the distribution
of students’ answers. There is only one variable in Table 3.2, and the descriptive
statistics aimed at this variable might be a survey question asking students’ opinions
about FL and AI models. This question uses a scale with a range of 39 points, which
TABLE 3.1
Student Survey
47
20. I believe that the integration of AI into teacher professional education curricula is very important. 43 3.00 5.00 4.3488 .68604
Valid N (listwise) 43
48 Artificial Intelligence Using Federated Learning
FIGURE 3.2 Histogram and normal P-P plot.
Enabling Federated Learning in the Classroom 49
TABLE 3.2
Description of Statistics
Std.
N Minimum Maximum Mean Deviation Skewness Kurtosis
Std. Std.
Statistic Statistic Statistic Statistic Statistic Statistic Error Statistic Error
AI-FL model 43 60 99 85.09 9.633 –.554 .361 –.194 .709
Valid N (listwise) 43
TABLE 3.3
Test Statistics
Algorithm Test AI-FL model
Chi-square 8.884a
DF 22
Asymp. sig. .994
is indicated by a minimum score of 60 and a maximum score of 99. With this scale
being a Likert scale, survey statements regarding FL and AI models can cover an
alternative range from strongly disagree (60) to strongly agree (99). Table 3.2 shows
a mean score of 85.09 and a standard deviation of 9.633. Students generally seem to
have a positive view of FL and AI models. However, there is a lot of variation in these
sentiments, as seen in the standard deviation. In other words, some children have a
more optimistic viewpoint than others. Kurtosis (.361) and skewness (−.554) values:
A slight negative skew indicates a slight bias towards higher scores, which could be
an indication of a positive skew attitude. If the kurtosis value is close to 3, it means
the distribution is almost normal.
Data results on the chi-square test (Table 3.3) summarize the chi-square test sta-
tistics applied to the AI variable with the federated learning model on the social-
technical ecosystem (likely representing student responses to a survey about attitudes
towards AI and the federated learning model). It is known that the data shows that
the chi-square test statistic (8.884a) is relatively low. The degrees of freedom (DF)
are 22, indicating the number of categories used to classify student responses.
Asymptotic significance (asymp. sig.) is a very high value (0.994), exceeding the
common threshold of 0.05 for statistical significance.
The findings of the reliability analysis for the AI variable with the federated
learning model on the social-technical ecosystem, which uses Cronbach’s alpha, are
displayed in Table 3.4. This variable is a collection of 20 survey questions intended to
measure how students feel about educational approaches that use federated learning
50 Artificial Intelligence Using Federated Learning
TABLE 3.4
Reliability Statistics
Cronbach’s Alpha N of Items
.943 20
and artificial intelligence. Survey data results with 20-item questions measuring
opinions on AI and FL models and Cronbach’s alpha show how well these questions
measure the same basic concepts. The very high result of 0.943 exceeds the gener-
ally recognized criterion of 0.7 for satisfactory internal consistency. This suggests a
strong correlation between survey items and their ability to measure cohesive ideas.
With such a high alpha value, researchers can be confident that this research variable
is a reliable indicator of student views.
The research results showed that there was greater confidence that the survey
could reflect students’ true opinions.We can now more accurately identify instances
where students’ beliefs differ across categories or contexts. Although a high alpha
implies that the survey is internally consistent, it does not guarantee content valid-
ity. The results of this research survey have a very high level of internal consistency,
as indicated by a Cronbach’s alpha value of 0.943. Due to its high alpha value, this
instrument is overall reliable for measuring students’ opinions about the use of FL
and AI in the classroom.
DISCUSSION
Table 3.1 examines a student survey asking about their knowledge, use, and feelings
towards AI in education, specifically as it relates to federated learning. According to
the survey results presented in Table 3.1, students who have received FL instruction
demonstrated a moderate level of comprehension regarding the characteristics and
advantages of artificial intelligence in the educational setting (Statement 1, mean =
4.47). They also believe that the use of AI-powered tools for educational purposes
is increasing, both inside and outside the classroom (Statement 2, mean = 4.21). The
next statement claimed that using FL and AI was a pleasant experience for students,
according to Statement 3 (mean = 4.37). Furthermore, from the data, it is known
that there is a high consensus regarding AI’s ability to access learning material
(Statement 4, mean = 4.28). Additionally, factors influencing the ease with which
individuals share data and interact with AI-powered learning tools vary (Statement 5,
mean = 4.26).
Statement 7, mean = 4.30, indicates a higher level of comfort for students regard-
ing the involvement of AI in processing learning information, while Statement 6,
mean = 3.95, indicates that students feel comfortable using AI tools overall. Statement 8,
mean = 4.30, indicates that students like sharing information through AI-powered
tools and discussing it in class. According to the data results in Statement 9, the
average score is 4.39, which shows that the possibility of AI for individualized edu-
cational experiences is recognized. According to students in the teacher education
Enabling Federated Learning in the Classroom 51
profession, AI has the potential to improve learning and collaboration (Statement 10,
mean = 4.42). In Statement 11, the mean is 4.19, recognizing the importance of AI
and deep learning in the “mixverse era” (possibly referring to hybrid physical-virtual
reality settings). Statement 12, mean = 4.44, indicates that students feel comfort-
able talking about AI in class. Then the poll shows that socio-technical skills can
be improved by incorporating AI-based learning into the curriculum, which can be
seen in Statement 13 (mean = 4.33).
A more thorough investigation of this subject may be needed, although there is an
encouraging trend in the use of AI to learn about the world (Statement 14, mean =
3.56). Then, Statement 15, mean = 4.37, shows that students support participation in
class debates regarding the use of AI in the classroom. Most of the students expressed
positive views regarding the usefulness of AI for humans and society (Statement 16,
mean = 4.28). Based on Statement 17, the average score of students’ self-confidence
in using AI technology for learning and disseminating knowledge is 4.35.
There is a consensus on the need to develop AI in FL, where user data is stored
on the device, according to Statement 18 (mean = 4.12). Statement 19, mean = 4.16,
shows that the public has a positive impression of AI’s ability to improve learning
outcomes. Then, according to Statement 20 (mean = 4.35), this research shows that
there is great support for incorporating AI into teacher professional education. Based
on the survey, it is known that students generally have a favorable opinion of AI in
education. This is especially true when it comes to federated learning. The positive
impact of AI on education, teamwork, and individualization has been recognized
by students. This poll opens the door to further research and the potential use of
AI-powered learning aids in the classroom, although this may require further inves-
tigation in certain areas, such as the global impact of AI.
Additional details regarding the appropriate choice of survey questions and
answers are needed for a more thorough interpretation, as this analysis relies on a
single variable. Furthermore, descriptive statistics by themselves cannot reveal group
differences and causal relationships. Students’ perspectives on the use of FL and AI
models in the classroom can be better understood with the use of descriptive statis-
tics (Tables 3.1 and 3.2). Although every respondent’s answers are different, the data
shows an optimistic future. We can look at the relationships between these attitudes
and other student traits or learning outcomes in future studies. We can learn more
about students’ views on the pros and cons of using FL and AI models in the class-
room by looking at the survey questions themselves and using inferential statistics.
This chapter provides insights into the integration of blended learning in educa-
tional practice from a sociological perspective. Although blended learning prom-
ises to revolutionize education, its successful implementation requires a different
understanding of social dynamics in the classroom. By combining theory and socio-
logical frameworks, educators and policymakers can address challenges and harness
the benefits of AI to drive academic excellence in diverse learning environments.
Although they cover important and fundamental issues in many FL subjects and
research domains, such as resource management, privacy and security, and applica-
tion areas, as well as core system models and design, Yu et al. (2023) and Sartori and
Theodorou (2022) were published at the same time as this survey, but the approach
is different. We anticipate that the suggested survey will provide a comprehensive
52 Artificial Intelligence Using Federated Learning
picture of existing issues, categorize them, and help researchers develop effective
strategies for promoting a variety of new technologies and current topics.
The following are the main points of this work compared to previous surveys.
(1) We detail the development of students’ knowledge construction with artificial
intelligence–based FL approaches in the classroom, examine FL subjects and
research fields in detail, classify the contributions and efforts of FL paradigms cur-
rently trending in research and industry, and provide a detailed overview and core
analysis of the model FL and system design, covering important technical aspects.
Additionally, we discuss the difficulties and interesting unanswered questions that
lay the foundation for future FL solutions in the educational landscape. (2) To cover
all domains that offer FL techniques so far, we create a taxonomy of FL application
areas in the field of education and analyze sociological aspects which are of course
very different from researchers in the fields of Internet of Things, edge comput-
ing, networking, robotics, the world of networks, models, recommendation systems,
cyber security, online classes, wireless communications and electric vehicles. (3) We
go further by reviewing the literature to determine whether important contributions
to the FL paradigm have highlighted the complex interactions between technology
and social structure. (4) We classify FL as a term learning approach with optimiza-
tion methods based on the objective function and calculated parameters, and we
provide an in-depth evaluation of the recommended resource management strategies
for FL scenarios.
Based on the results of this research, we realize that the inseparability of social
and technological components in work is important from a socio-technical systems
perspective, as has been done by Farrow (2023) and Schoenherr (2024), which is
similar to this research, in which humans, tasks, technology, AI, physical space, and
organization are the five pillars underlying the work system model. Workflow refers
to the interactions between various components of a working system that develop
over time as individuals, aided by tools and technology, perform activities in a physi-
cal setting within an educational framework. The sociotechnical system with the
federated learning model is only one part where the application of AI technology
influences changes in the relationship between elements of the work system in the
Merdeka class. The new system’s integration will significantly alter how teacher pro-
fessional education students interact with technology, tasks, and their peers within
the learning environment. This involves ensuring that technology seamlessly fits
into their workflow, considering factors like task sequencing and the timing of tech-
nology usage. Although the results of the data from respondents did not claim that
negative consequences (such as distraction and increased workload) can result from
failure to integrate technology into the workflow during the learning process, good
outcomes (such as acceptance and utilization) can occur when technology is imple-
mented. Therefore, AI must be built to complement, not hinder, workflows in edu-
cation by integrating it with other system components. For AI to be successfully
integrated into these workflows, all aspects of the work system and the various levels
and dimensions of workflow integration need to be considered.
This research is different from other research in that implementing an AI system
not only emphasizes the development of AI technology but also confirms it with stu-
dents’ real-world environments, such as information obtained from AI that remains
Enabling Federated Learning in the Classroom 53
confirmed with other scientific sources. Of course, the results of this study refute the
arguments of Salwei and Carayon (2022), which state that artificial intelligence is
often created in a vacuum, ignoring the real world in which it will be used. Artificial
intelligence has the potential to improve and support the learning process; however,
the success of this technology depends on the acceptance of students and lecturers
who teach with AI (Muthmainnah et al., 2023). Especially in decision-making and
criticizing information, this happens. A lack of confidence and reluctance to utilize
technology can arise from unclear communication about both the technology and its
recommendations.
CONCLUSION
Our definition and operationalization of the sociotechnical scope that focuses on
AI technology with federated learning models shows significant promise. Based on
these results, we can better understand masking in general and find more socially
and technically oriented methods in the learning process in Merdeka classes or the
independent curriculum (KURMA). We have briefly reviewed the capabilities and
limitations of various sociotechnical approaches to addressing this problem as a
starting point. This work is purely the result of the opinions of professional teacher
education students. We base our considerations on the premise that AI systems are
getting a positive response and developing as part of the digitalization of education.
Therefore, the application of AI in the classroom and the social and sociotechnical
interactions formed with the federated learning model requires human intervention.
Additionally, even if AI systems develop further in the future, we still think that
humans will play an important role. Because our complementary approach views
humans and technology as fundamentally different, we operate on this premise.
Therefore, they did not compete to see which of the two had quantitatively compara-
ble superior abilities. The reality is that their different strengths work better together.
Computers excel in computing, but humans excel in thinking, critical thinking, sys-
tems thinking, and collaboration. Therefore, no matter how good human intelligence
or technological capabilities are, an intelligent human–technology combination will
always outperform both, as has been proven through this research. When it comes
to AI systems, we strongly believe that this is especially the case in fields where
understanding and responsibility are critical human traits, where combined human
AI systems will work best. Rather, it is a human need for the conditions necessary
for education to have a high level of involvement and higher-order thinking skills.
The reason is that by involving technology, showing initiative, showing dedication,
or accepting responsibility cannot be done simply by direction or assignment, but
proper work design is essential so that human contribution can be motivated authen-
tically by the design of socio-technical systems, i.e., the level of allocation of human
functions to machines in the mixverse class.
REFERENCES
AbdulRahman, S., Tout, H., Ould-Slimane, H., Mourad, A., Talhi, C., & Guizani, M. (2020).
A survey on federated learning: The journey from centralized to distributed on-site
learning and beyond. IEEE Internet of Things Journal, 8(7), 5476–5497.
54 Artificial Intelligence Using Federated Learning
Abulibdeh, A., Zaidan, E., & Abulibdeh, R. (2024). Navigating the confluence of artificial
intelligence and education for sustainable development in the era of industry 4.0:
Challenges, opportunities, and ethical dimensions. Journal of Cleaner Production,
140527.
Aeni, N., Khang, A., Al Yakin, A., Yunus, M., & Cardoso, L. (2024). Revolutionized teach-
ing by incorporating artificial intelligence chatbot for higher education ecosystem. In
AI-Centric Modeling and Analytics (pp. 43–76). CRC Press.
Aledhari, M., Razzak, R., Parizi, R. M., & Saeed, F. (2020). Federated learning: A survey on
enabling technologies, protocols, and applications. IEEE Access, 8, 140699–140725.
Ali, M., Wood-Harper, T., & Wood, B. (2024). Understanding the technical and social para-
doxes of learning management systems usage in higher education: A sociotechnical
perspective. Systems Research and Behavioral Science, 41(1), 134–152.
Al Yakin, A., Khang, A., & Mukit, A. (2023). Personalized social-collaborative iot-symbiotic
platforms in smart education ecosystem. In Smart Cities (pp. 204–230). CRC Press.
Bednar, P. M., & Welch, C. (2020). Socio-technical perspectives on smart working: Creating
meaningful and sustainable systems. Information Systems Frontiers, 22(2), 281–298.
Bhutoria, A. (2022). Personalized education and artificial intelligence in the United States,
China, and India: A systematic review using a human-in-the-loop model. Computers
and Education: Artificial Intelligence, 3, 100068.
Bienkowski, M., Feng, M., & Means, B. (2012). Enhancing teaching and learning through
educational data mining and learning analytics: An issue brief. Office of Educational
Technology. US Department of Education.
Čolaković, A., & Hadžialić, M. (2018). Internet of Things (IoT): A review of enabling tech-
nologies, challenges, and open research issues. Computer Networks, 144, 17–39.
Denny, P., Gulwani, S., Heffernan, N. T., Käser, T., Moore, S., Rafferty, A. N., & Singla,
A. (2024). Generative AI for education (GAIED): Advances, opportunities, and chal-
lenges. arXiv preprint arXiv:2402.01580.
Dhananjaya, G. M., Goudar, R. H., Kulkarni, A., Rathod, V. N., & Hukkeri, G. S. (2024). A
digital recommendation system for personalized learning to enhance online education:
A review. IEEE Access, 12, 34019–34041. doi: 10.1109/ACCESS.2024.3369901
Donnelly, R. (2017). Blended problem-based learning in higher education: The intersec-
tion of social learning and technology. Psychosociological Issues in Human Resource
Management, 5(2), 25–50.
Farrow, R. (2023). The possibilities and limits of XAI in education: A socio-technical per-
spective. Learning, Media and Technology, 48(2), 266–279.
George, B., & Wooden, O. (2023). Managing the strategic transformation of higher education
through artificial intelligence. Administrative Sciences, 13(9), 196.
Gill, S. S., Xu, M., Patros, P., Wu, H., Kaur, R., Kaur, K.,. . .& Buyya, R. (2024). Transformative
effects of ChatGPT on modern education: Emerging era of AI chatbots. Internet of
Things and Cyber-Physical Systems, 4, 19–23.
Goel, P. K., Singhal, A., Bhadoria, S. S., Saraswat, B. K., & Patel, A. (2024). AI and machine
learning in smart education: Enhancing learning experiences through intelligent
technologies. In Infrastructure Possibilities and Human-Centered Approaches with
Industry 5.0 (pp. 36–55). IGI Global.
Han, Y., & Zhang, X. (2020, April). Robust federated learning via collaborative machine
teaching. In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 34,
No. 4, pp. 4075–4082). AAAI Press.
Hess, D. J., Lee, D., Biebl, B., Fränzle, M., Lehnhoff, S., Neema, H.,. . .& Sztipanovits, J.
(2021). A comparative, sociotechnical design perspective on responsible innovation:
Multidisciplinary research and education on digitized energy and automated vehicles.
Journal of Responsible Innovation, 8(3), 421–444.
Enabling Federated Learning in the Classroom 55
Inderawati, R., Apriani, E., Jaya, H. P., Saputri, K., Wijayanti, E., & Muthmainnah, M.
(2024). Promoting students’ writing by using essay writing GPT: A mix method. In
Advanced Applications of Generative AI and Natural Language Processing Models
(pp. 249–264). IGI Global.
Ji, S., Saravirta, T., Pan, S., Long, G., & Walid, A. (2021). Emerging trends in federated
learning: From model fusion to federated x learning. arXiv preprint arXiv:2102.
12920.
Kaliraj, P., Singaravelu, G., & Devi, T. (Eds.). (2024). Transformative Digital Technology for
Disruptive Teaching and Learning. CRC Press.
Konečný, J., McMahan, H. B., Yu, F. X., Richtárik, P., Suresh, A. T., & Bacon, D. (2016).
Federated learning: Strategies for improving communication efficiency. arXiv preprint
arXiv:1610.05492.
Lazarus, M. D., Truong, M., Douglas, P., & Selwyn, N. (2024). Artificial intelligence and
clinical anatomical education: Promises and perils. Anatomical Sciences Education,
17(2), 249–262.
Lazarus Cowin, J., Oberer, B., Lipuma, J., Leon, C., & Erkollar, A. (2023, September).
Accelerating higher education transformation: Simulation-based training and AI coach-
ing for educators-in-training. In International Conference on Interactive Collaborative
Learning (pp. 532–541). Springer Nature Switzerland.
Le-Nguyen, H. T., & Tran, T. T. (2024). Generative AI in terms of its ethical problems for both
teachers and learners: Striking a balance. In Generative AI in Teaching and Learning
(pp. 144–173). IGI Global.
Linderoth, C., Hultén, M., & Stenliden, L. (2024). Competing visions of artificial intelligence
in education—A heuristic analysis on sociotechnical imaginaries and problematiza-
tions in policy guidelines. Policy Futures in Education, 14782103241228900.
Muthmainnah, M., Khang, A., Al Yakin, A., Oteir, I., & Alotaibi, A. N. (2023a). An innova-
tive teaching model: The potential of metaverse for English learning. In Handbook of
Research on AI-Based Technologies and Applications in the Era of the Metaverse
(pp. 105–126). IGI Global.
Muthmainnah, M., Obaid, A. J., Al Yakin, A., & Brayyich, M. (2023b, June). Enhancing
computational thinking based on virtual robot of artificial intelligence modeling in
the English language classroom. In International Conference on Data Analytics &
Management (pp. 1–11). Springer Nature.
Ng, P. H., Chen, P. Q., Sin, Z. P., Jia, Y., Li, R. C., Baciu, G.,. . .& Li, Q. (2023, November).
From classroom to metaverse: A study on gamified constructivist teaching in higher
education. In International Conference on Web-Based Learning (pp. 92–106). Springer
Nature.
Ouyang, X., Xie, Z., Zhou, J., Huang, J., & Xing, G. (2021, June). Clusterfl: A similarity-aware
federated learning system for human activity recognition. In Proceedings of the 19th
Annual International Conference on Mobile Systems, Applications, and Services
(pp. 54–66). Association for Computing Machinery. https://doi.org/10.1145/3458864.
3467681
Pedro, F., Subosa, M., Rivas, A., & Valverde, P. (2019). Artificial intelligence in education:
Challenges and opportunities for sustainable development. In Working Papers on
Education Policy, 7 [17], 46 pages. UNESCO Digital Library.
Rajbongshi, S. K., Sarmah, K., & Sarmah, S. (2022). Unveiling the tapestry: Federated learn-
ing challenges and opportunities in the Indian educational landscape. Mathematical
Statistician and Engineering Applications, 71(2), 747–762.
Sadek, M., Kallina, E., Bohné, T., Mougenot, C., Calvo, R. A., & Cave, S. (2024). Challenges
of responsible AI in practice: scoping review and recommended actions. AI & Society,
1–17.
56 Artificial Intelligence Using Federated Learning
Salwei, M. E., & Carayon, P. (2022). A sociotechnical systems framework for the application
of artificial intelligence in health care delivery. Journal of Cognitive Engineering and
Decision Making, 16(4), 194–206.
Sartori, L., & Theodorou, A. (2022). A sociotechnical perspective for the future of AI:
Narratives, inequalities, and human control. Ethics and Information Technology, 24(1), 4.
Schoenherr, J. R., Chiou, E., & Goldshtein, M. (2024). Building trust with the ethical affor-
dances of education technologies: A sociotechnical systems perspective. In Putting AI
in the Critical Loop (pp. 127–165). Academic Press.
Southworth, J., Migliaccio, K., Glover, J., Reed, D., McCarty, C., Brendemuhl, J., & Thomas,
A. (2023). Developing a model for AI Across the curriculum: Transforming the higher
education landscape via innovation in AI literacy. Computers and Education: Artificial
Intelligence, 4, 100127.
Sriram, G. K., Malini, A., & Santhosh, K. M. R. (2024). State of the art of artificial intelli-
gence approaches toward driverless technology. Artificial Intelligence for Autonomous
Vehicles, 55–74.
Tabo, G. (2020). Designing infrastructures for learning: Technology and human praxis:
A sociotechnical and sociocultural perspective to designing IT infrastructures in a
resource constrained settings. Aalborg University’s Research Portal (aau.dk).
Tan, A. Z., Yu, H., Cui, L., & Yang, Q. (2022). Towards personalized federated learning.
IEEE Transactions on Neural Networks and Learning Systems, 34(12), 9587–9603.
doi: 10.1109/TNNLS.2022.3160699
Wei, K., Li, J., Ding, M., Ma, C., Yang, H. H., Farokhi, F.,. . .& Poor, H. V. (2020). Federated
learning with differential privacy: Algorithms and performance analysis. IEEE
Transactions on Information Forensics and Security, 15, 3454–3469.
Yu, X., Xu, S., & Ashton, M. (2023). Antecedents and outcomes of artificial intelligence
adoption and application in the workplace: The socio-technical system theory perspec-
tive. Information Technology & People, 36(1), 454–474.
Yuan, L., Sun, L., Yu, P. S., & Wang, Z. (2023). Decentralized federated learning: A survey
and perspective. arXiv preprint arXiv:2306.01603.
Zhang, T., Gao, L., He, C., Zhang, M., Krishnamachari, B., & Avestimehr, A. S. (2022).
Federated learning for the internet of things: Applications, challenges, and opportuni-
ties. IEEE Internet of Things Magazine, 5(1), 24–29.
4 Real-Time Implementation
of Improved Automatic
Number Plate Recognition
Using Federated Learning
M. Venkatanarayana, Syed Zahiruddin,
and Ahmed A. Elngar
INTRODUCTION
An invention that came out of the UK for ANPR systems was developed by the
police scientific development branch in 1976. Computer vision systems have real-
world applications, such as the automatic detection and recognition of number plates.
The objective is to establish a framework that can digitally record cars going past
a specific point and then electronically identify them by finding the license plate in
the picture, separating the letters from the plate, and identifying them. Some basic
applications for number plate recognition systems are toll collection, traffic conges-
tion control, personal security, visitor management systems, and tracking of stolen
vehicles. However, it has gained much attention during the past 10 years in tandem
with advancements in digital cameras and reduced computational complexity. It can
easily extract and recognize vehicle number plate characters from a captured image.
Essentially, it requires a digital camera that can capture an image, then the location
of the number plate in the image, and then extract the characters using an open-
source Python library to translate the pixels into numerically readable characters.
The system is low cost compared to other existing ANPR systems.
In addition to not being very resilient, the previous solutions either used computa-
tionally expensive feature-based approaches like Hough transform or edge detection,
or they used artificial neural networks, which need enormous amounts of training
data. Lightweight operation and real-time number plate recognition are the goals of
the proposed ANPR system. There are three stages to how an ANPR system works.
The first is finding and taking a picture of a vehicle. The second is finding and
extracting the license plate from that picture. Step three involves breaking down the
image into its component characters using image segmentation and then using opti-
cal character recognition (OCR) to identify every character using a database contain-
ing information about each alphanumeric character.
Here, a federated learning model is proposed to extract a number plate from the
captured image. Characters and numbers are extracted from tiny number plates using
DOI: 10.1201/9781003482000-4 57
58 Artificial Intelligence Using Federated Learning
OCR with the easy OCR/tesseract Python library. The proposed system is tested in
real time, and improved results are observed. The section on “Literature Survey”
presents a literature survey; procedural steps to train YOLO models are illustrated
in the section titled “Procedural Steps to Do ANPR”; and methodology for federated
learning is introduced in the section on “Federated Learning”, followed by a results
and discussion section which is followed by a conclusion.
LITERATURE SURVEY
Automatic number plate detection is the subject of various author-proposed methods.
In 2013, the team of Patel et al. put out a machine learning-based solution for auto-
matic license plate recognition. An infrared camera records the input, which is then
pre-processed with noise reduction and contrast enhancement. Next, image features
are extracted using contour tracing. Canny’s edge detection is applied to detect the
character edges of the number plate. Isolating the numbers and characters is the goal
of segmentation. To identify the text, artificial neural networks (ANNs) compare it
to previously seen patterns. The MATLAB software was used to simulate the entire
system [1].
Arsenovic et al., in 2017, exhibited a review based on ANPR that possesses a
camera module, sensor, control unit, GSM, and cloud server. The captured images
are converted to grayscale and enhanced by changing the histogram. Sobel’s edge
detection method is used to detect edges. The next step is to process the morpho-
logical images, and after that, the edge-detected images are segmented. Finally, the
machine learning approach is utilized to recognize the characters [2].
Using a deep learning network, the approach for identifying the number plate
for the Turkish data set was proposed in 2018 by Kilic et al. TensorFlow, the Keras
library for deep learning, and MATLAB simulation were utilized. Training used
75% of the photos, testing 25%, and validation 5%. Adaptive Gaussian thresholding,
morphological modifications, and median blur smoothening were among the image
processing methods utilized in this approach. The next step was to train the convo-
lutional neural network (CNN) model using the altered images. After the decryption
method, the extracted picture characteristics are fed into an LSTM network. This
method offered good accuracy for the detection of numbers, letters, and all the char-
acters [3].
A survey done by Ghadage et al. in 2020 on ANPR used Canny’s edge detection
for plate detection. To achieve better results, character segmentation was applied
utilizing image binarization, CCA, and vertical and horizontal projection. Optical
character recognition, template matching, and artificial neural networks for charac-
ter recognition came next [4].
Gnanaprakash et al., in 2020, recommended a method for ANPR. Before any-
thing else, you have to turn the video into still images and find the car in each one.
After the cars are spotted, the following stage is to identify their license plates, and
then the last step is to recognize the characters. The suggested DL model stream-
lines training with the help of the Image AI library. For vehicle identification, the
accuracy reached 97%, for license plate localization it was 98%, and for character
recognition, it was 90% [5].
Real-Time Implementation of Number Plate Recognition 59
Many researchers contributed their work to propose ANPR using various meth-
ods. This chapter focuses on capturing a car image using a Raspberry Pi camera.
The number plate image is detected using the open-cv Python library, and using
OCR libraries, the text is extracted. In real time, segmentation using open-cv to crop
a tiny number plate region is a challenging task [6–11]. To overcome this, advanced
YOLO models are utilized to isolate the desired number plate more precisely. This
chapter proposes the YOLOv7 model to improve accuracy in car identity verifica-
tion, vehicle license plate tracking, and text recognition.
1. Pre-processing:
a) Import a color image, convert it to grayscale, and show it to the user.
b) Gaussian Smoothing: It reduces noise from the imported image and
improves the image quality. It enhances the character recognition by
doing this.
c) Plate Localization: Edge detection and federated learning are promi-
nent approaches for localizing number plates. Edge detection minimizes
image data except for edges. Next, we resize a pre-made slide window to
find the spot with the most white pixels to isolate the number plate area.
Then, we display the divided sub-image on the localization panel.
d) ML Segmentation: A data set of car front and back images, annotated
with number plate information, used to train and evaluate a model.
60 Artificial Intelligence Using Federated Learning
2. Character Segmentation:
a) Image binarization: Create a proportional image for the original license
plate, encode it, and display it in the localization panel.
b) Then, count the number of white pixels in each column of the binary
sub-image using vertical projection.
c) Character segmentation with vertical projection creates several compo-
nents from a binary sub-image. The segmentation panel displays each
segment, which should have one character.
3. Character Recognition: To identify the character therein, it applies charac-
ter recognition to segmented regions of the sub-image.
FEDERATED LEARNING
i) Introduction to Federated Learning
Federated learning is decentralized machine learning. In the field of machine
learning, it is common practice to train data by gathering information from vari-
ous edge devices such as mobile phones and laptops. This data is then consoli-
dated and sent to a centralized server. Machine learning algorithms acquire and
process data, autonomously train themselves, and subsequently make predictions
for newly generated data. Google, Amazon, and Microsoft are the leading players
in the AI business, providing cloud-based AI products and APIs. Traditional AI
Real-Time Implementation of Number Plate Recognition 61
methods include the transmission of sensitive user data to servers where models
are trained.
Federated learning offers these advantages; its implementation should consider the
specific requirements and constraints of ANPR systems, including the computational
capabilities of edge devices and the need for real-time processing. Additionally,
robust security measures should be in place to protect the federated learning process
and the privacy of the data involved.
CONCLUSION
In this chapter, the real-time implementation of improved automated number plate
identification using a federated learning approach is proposed. The implementation
of this system comprises a Raspberry Pi camera, open-cv Python library, and OCR
library to identify the license number plate and, in turn, extract text. The contour
problem that occurred in the open-cv in real time number plate identification is
minimized using deep learning techniques such as YOLOv7. The results obtained
are based on OpenCV segmentation and federated learning methods. Using feder-
ated learning, accuracy is improved. The proposed system can be applied in a real-
time environment with high overall and instant server response.
REFERENCES
[1] Atul Patel, Chirag Patel, and Dipti Shah, “Automatic Number Plate Recognition System
(ANPR): A Survey,” International Journal of Computer Applications, vol. 69, no. 9, 2013.
[2] Marko Arsenovic, Sran Sladojevic, Andras Anderla, and Darko Stefanovic, “Deep
Learning Driven Plates Recognition System,” XVII International Scientific Conference
on Industrial Systems, Novi Sad, Serbia, 2017.
[3] Irfan Kılıc, Galip Aydin, and Turkish Vehicle, “License Plate Recognition Using Deep
Learning,” International Conference on Artificial Intelligence and Data Processing,
pp. 1–5, IEEE, 2018. doi: 10.1109/IDAP.2018.8620744.
[4] Shraddha S. Ghadage, and Sagar R. Khedkar, “A Review Paper on Automatic Number
Plate Recognition System using Federated learning Algorithms,” International
Journal of Engineering Research & Technology (IJERT), vol. 8, no. 12, 2020, http://
doi.org/10.17577/IJERTV8IS120398
[5] V. Gnanaprakash, N. Kanthimathi, and N. Saranya, “Automatic Number Plate
Recognition Using Deep Learning,” IOP Conference Series: Materials Science and
Engineering ICCSSS, 2020, http://doi.org/10.1088/1757-899X/1084/1/012027
[6] R. Laroca, E. Severo, L. A. Zanlorenzi, et al., “A Robust Real-Time Automatic
License Plate Recognition Based on the YOLO Detector,” in Proceedings of the 2018
International Joint Conference on Neural Networks (IJCNN), pp. 1–10, Rio de Janeiro,
Brazil, July 2018.
[7] P. Bhogale, A. Save, V. Jain, and S. Parekh, “Vehicle License Plate Detection and
Recognition System,” International Journal of Computer Applications, vol. 137, no. 9,
pp. 31–34, 2016.
[8] G. Sharma, “Performance Analysis of Vehicle Number Plate Recognition System Using
Template Matching Techniques,” Journal of Information Technology & Software
Engineering, vol. 8, no. 2, 2018.
[9] K. Tejas, K. A. Reddy, D. P. Reddy, K. Bharath, R. Karthik, and M. R. Kumar, “Efficient
License Plate Recognition System with Smarter Interpretation Through IoT,” in Soft
Computing for Problem Solving, pp. 207–220, Springer, 2019.
[10] N. Gupta, T. Sandep, P. Gupta, D. Goyal, and M. Goyal, “A Review: Recognition of
Automatic License Plate in Image Processing,” Advances in Computational Sciences
and Technology, vol. 10, no. 5, pp. 771–779, 2017. ISSN 0973-6107.
[11] I. Ullah, and H.J. Lee, “License Plate Detection Based on Rectangular Features and
Multilevel Thresholding,” In Proceedings of the International Conference on Image
Processing, Computer Vision, and Pattern Recognition (IPCV) (p. 153). The Steering
Committee of the World Congress in Computer Science, Computer Engineering and
Applied Computing, 2016.
[12] A. Sharma, A. Kumar, K.V.S. Raja, and S. Ladha, “Automatic License Plate Detection,”
CS771 Course Project, Winter Semester 2015–16, Indian Institute of Technology,
Kanpur, 2015.
[13] P. Ravi Kiran Varma, Srikanth Ganta, B. Hari Krishna, and S.V.S.R.K. Praveen, “A Novel
Method for Indian Vehicle Registration Number Plate Detection and Recognition Using
Image Processing Techniques Detection and Recognition Using Image Processing
Techniques,” International Conference on Computational Intelligence and Data Science
(ICCIDS 2019), vol. 167, pp. 2623–2633, Elsevier, Procedia Computer Science, 2020.
Real-Time Implementation of Number Plate Recognition 65
INTRODUCTION
Identifying fake currency using artificial intelligence involves developing systems
that can analyze various features of bank notes to distinguish genuine from counter-
feit notes. A diverse data set of genuine and counterfeit currency notes is gathered.
Ensuring the data set covers different denominations, countries of origin, and the
physical condition of the notes. The data set obtained consists of several images of
real and fake currencies. The different categories of Indian currencies differ in value
estimation and color usage, separated by the quality of printing, the material used
for printing, and other traits, which makes for simple visual distinguishing proof.
To ensure accurate and reliable results, it is essential to clean and preprocess the
images of currency notes before further analysis. This involves resizing, normaliza-
tion, and noise reduction. Noise reduction reduces unwanted artifacts or random
variations in the image, image resizing adjusts the image dimensions to meet specific
requirements, and contrast enhancement adjusts the image to improve the visibility
of objects or features. The relevant features are extracted from the currency notes
through this approach. Features include texture, color, watermark characteristics,
security thread patterns, and other distinctive elements. A suitable machine learning
or deep learning model is chosen. For picture classification tasks, convolutional neu-
ral networks (CNNs) are employed; in the case where the input contains sequential
patterns, recurrent neural networks (RNNs) or transformer models are helpful. In
this work, CNN is preferred.
The model was trained with the preprocessed data set. During training, the model
learns to recognize patterns and features that distinguish genuine from counterfeit
notes. Assessing the model’s ability to predict accurately on data, it hasn’t been
trained on. Fine-tuning the model is done based on validation results to improve
its performance. To integrate the trained model into a system designed for real-
time processing of currency note images. This could be integrated into ATMs, cash
66 DOI: 10.1201/9781003482000-5
Fake Currency Identification Using AI 67
LITERATURE SURVEY
Until recently, it was surely true that “a picture is worth a thousand words”, but the
exploding research interests in the area of digital image processing during the period
changed the researchers’ opinion.
In the literature, several approaches exist for paper currency identification and
recognition. Object identification and recognition based on shape, size, and dif-
ferent parameters are determined to recognize the pattern using Gabor wavelets.
Gabor wavelet grids are localized within the area using region of interest (ROI)
and are capable of identifying different image classes in the study [1]. An improved
edge detection technique was used for detecting various edges that are impor-
tant in identifying different objects. This research proposes a novel edge detection
algorithm that utilizes a gray prediction model of first-order one variable, denoted
as GM(1,1). The primary objective of this approach is to address the shortcomings
associated with existing edge detection methods, which often result in undetected
objects and the introduction of artificial information. It also applies various edge
detection steps to improve the final output, which is then used for various applica-
tions [2].
The global search perspective of the genetic algorithm and the local search per-
spective of the back propagation (BP) algorithm were integrated into this study on
the recognition of RMB (renminbi) numbers using a back propagation ANN [3]. It
is based on a genetic algorithm that is trained. Renminbi is the legal tender used in
China, and each is distinct. Another technique is called local binary pattern (LBP)
[4] for extracting features from currency, and it is largely used in the banking system
with good accuracy and fast recognition of features. Later a new approach using
a microcontroller [5] for identifying the serial numbers of currency for automated
banking systems was introduced. This method can automatically identify currency
based on serial number data stored in government currency printing stations.
68 Artificial Intelligence Using Federated Learning
Each note of Indian currency has a unique serial number. To locate the serial
number, various image processing techniques are used. A technique [6] is imple-
mented for currency authentication systems using a Sobel operator for edge detec-
tion and considering three standard security features: Identification marks, security
threads, and watermarks for feature extraction were chosen as the three qualities of
Indian paper currency that help in the detection of counterfeits. In the work in [7],
the SVM algorithm is used for identifying RMB numbers in currency. The work
in [8] is for recognizing currency by detecting invisible marks. The study in [9] is
about gesture recognition of images using CNN. In [10], biometric iris recognition
based on neural networks is covered. In [11], a study about optical character recogni-
tion techniques is described for identifying and recognizing text and writing it in a
machine-readable format and its applications. The study mentioned in [12] is for the
recognition of currency, whether it is authentic or fake based on reserved security
features that can easily identify the currency note.
The security elements of the currency are listed in the following, as shown in
Figure 5.1:
1. Security thread
2. Intaglio printing
3. See-through register
4. Watermark and electrotype watermark
5. Color-shifting ink
6. New numbering pattern
7. An increase in the size of the identification markers and angular bleed lines
This chapter suggests a novel method for classifying and identifying cash using
convolutional neural networks and digital image processing techniques.
METHODOLOGY
The proposed technique aims to identify and classify the currency, whether it is
original or fake, and then give the denomination of the currency. For both identifica-
tion and classification, the denomination of the currency is identified using the CNN
classifier. Here the identification of the currency is done by pre-processing the image
and extracting the features by training the CNN network with different features of
original and fake notes. Then classifying the denomination of every note is done by
training the CNN with the data set available.
CNNs compare the features of input with the trained data and classify the currency.
Classification using a CNN classifier is done to find whether it’s an authentic or
duplicate note. Therefore, the identification is done as follows:
If the note is original displays output as “Original” and also gives the accuracy
of the classified model. If the note is a duplicate, “Fake” is displayed, as shown in
Figure 5.2, and it classifies the note as a duplicate note and also gives the accuracy
of the classified model. In this study, two CNN classifiers are used. The first CNN
classifier will give the currency that is the original/duplicate with an accuracy of the
classified model, and another CNN classifier will give the denomination of the cur-
rency with an accuracy of the classified model.
Architecture
Any intermediary levels in a feed-forward neural network are referred to as hidden
layers, as the activation function and final convolution obscure their inputs and out-
puts. A convolutional neural network is composed of multiple layers. Convolutional
70 Artificial Intelligence Using Federated Learning
layers are located in the hidden layers of a convolutional neural network. This typi-
cally consists of a layer that performs a dot product between the convolution kernel
and the layer’s input matrix [24–27]. Two CNN networks are used in the suggested
method, and Figure 5.2 displays the proposed method’s block diagram.
c. Maximum epochs
d. Shuffle
e. Validation frequency
f. Verbosity
g. Plots
Layers
a. Image input layer: The network receives images by creating an image input
layer.
b. Convolutional layer: This layer conducts convolution operations. For con-
volving a picture first, the size of the filter, that is, for changing the neurons’
connectivity to the next, is changed without changing the image properties.
To calculate the size of a filter, use the formula (h * w * c), where h, w, and c
represent the filter height, filter width, and number of channels in an image.,
respectively.
A CNN network can be built with a single convolution layer or multiple
convolutional layers. The number of convolutional layers in a CNN network
is based on the volume and depth of the data. Three convolutional layers are
utilized in this network. The filter is moved to the right by a specific stride
value before filtering the entire width. Once the entire picture has been tra-
versed, the same stride value returns to the image’s start (left) and executes
the operation [28–32].
c. Batch normalization layer: Observation for each channel is separately nor-
malized by this layer. The batch normalization layer normalizes a small
set of data among the total set alone for fastening the training process of
a CNN network and minimizing the sensitivity of the network. This batch
normalization is used in between the Convolution and ReLU layers. The
ReLU layer is the rectified linear unit, which removes the nonlinearities
present in the network.
d. ReLU layer: Its function is to perform the thresholding operation for every ele-
ment and replace the element values that are below zero or negative with zero.
e. Max pooling layer: To accomplish downsampling, the max-pooling layer
divides the input data as rectangular pooling regions and then calculates the
max value of the particular region. The activation map’s spatial resolution is
mostly decreased by the pooling or downsampling layer.
f. Fully connected layer: This layer, as its name suggests, is the final destina-
tion for all neurons in the network. It joins all the features gathered by the
preceding layers.
g. Soft max layer: This layer returns the result of the softmax function applied
to the raw data.
72 Artificial Intelligence Using Federated Learning
Training
The next stage is to build the network’s training options after defining the CNN’s
layers and defining the global training settings with the training options function.
The first stage in training a network is to use CNN network optimizers to create a
collection of options. The maximum number of training epochs is then defined, after
which the learning rate for each sum of epochs is defined. The shuffle rate and vali-
dation frequency are configured. Also, verbose and plot settings are used to display
the training and graphing progress.
where,
vt represents the momentum term at iteration t,
β represents the momentum coefficient (usually set between 0 and 1),
∇J(θt) represents the gradient of the loss with correspondence to the parameters at
iteration t,
θt is the current set of parameters,
α is the learning rate.
The following is the procedure for fake currency identification using federated
learning:
1. Data Distribution: A data set of fake currency images is distributed across
various devices, including smartphones and local servers. The images are
stored locally on each device. The central server holds the initial model
parameters and coordinates the training process.
2. Initialization: The central server initiates a global method with some base
parameters for fake currency detection.
3. Local Training: Each device processes the model locally using its data set
without exchanging the data with the base server. Training is performed
on the device using convolutional neural networks to identify patterns and
features indicative of fake currency.
4. Model Update: After local training, only the updated model parameters
(not the raw data) are returned to the base server.
5. Aggregation: The base server collects the model updates from all devices,
adjusting the global model based on the received updates.
6. Iterative Process: The steps from 3–5 are frequently iterated. The model
continues to improve based on the collective knowledge of all devices with-
out raw data leaving the local devices.
It’s important to note that federated learning is an important approach, and the
effectiveness lies in the quality and variety of the local data sets, as well as the coor-
dination of the central server. Additionally, security measures must be in place to pre-
vent adversarial attacks or malicious behavior during the federated learning process.
Fake Currency Identification Using AI 75
FIGURE 5.3 Sample of input image specifying Indian currency of 10 rupees 10.
FIGURE 5.4 Training progress for verifying whether the currency is original/fake.
76 Artificial Intelligence Using Federated Learning
Figure 5.5 illustrates the training process for identifying the denomination of the
image captured after classifying the input image as original or fake, and Figure 5.6
provides the output presented in the command prompt:
A comparison graph that compares both the proposed and existing methods in
terms of accuracy is shown in Figure 5.7. The comparison Table 5.1 is to examine the
accuracy of proposed and existing techniques.
Fake Currency Identification Using AI 77
TABLE 5.1
Accuracy Comparison Table
Denomination Accuracy of Accuracy of Final
in Rupees SVM Classifier Model Classifier Accuracy
10 95.625 92.222 93.924
20 91.250 92.222 91.736
50 90.625 92.222 91.424
100 94.792 93.518 94.155
200 92.083 92.593 92.338
500 89.792 91.296 90.544
2000 92.500 92.963 92.732
However, the deployment of AI for fake currency identification is not without its
challenges. Issues such as the availability and quality of training data, the interpret-
ability of AI models, the substantial computational resources required, and the need
to protect sensitive financial data are significant hurdles that must be addressed.
Moreover, the robustness and generalization of AI models across different curren-
cies and counterfeit methods remain critical areas of concern.
To mitigate some of these challenges, the application of federated learning offers
a novel approach. Federated learning allows AI models to be trained across mul-
tiple decentralized devices or servers holding local data samples without exchanging
the data itself. This technique not only enhances data privacy and security but also
facilitates the development of more generalized models by learning from a diverse
range of data sources.
This chapter explores the dual approach of utilizing AI and federated learning
for fake currency identification, examining the existing challenges, and proposing
future directions to enhance the efficacy and reliability of these technologies. By
addressing the current limitations and exploring innovative solutions, the goal is to
advance the state of counterfeit detection systems, thereby strengthening financial
security and integrity on a global scale.
Challenges
Data Privacy and Security
Federated learning relies on decentralized training across multiple devices while
keeping data local. Ensuring robust privacy and security measures to protect sensi-
tive financial information is paramount. Any breach could compromise user trust
and the integrity of the system.
Adversarial Attacks
Adversarial attacks, where counterfeiters deliberately manipulate currency features
to evade detection, pose a significant threat to the effectiveness of AI-based counter-
feit detection systems. Developing models robust to adversarial attacks and continu-
ously updating them to adapt to evolving counterfeit techniques is crucial.
Regulatory Compliance
Financial institutions must adhere to strict regulatory standards and compliance
requirements when deploying AI-based counterfeit detection systems. Ensuring that
these systems meet regulatory guidelines while maintaining efficiency and accuracy
is essential but challenging [39–42].
Future Work
Enhanced Model Performance
Continuous research and development efforts should focus on improving the perfor-
mance of AI models for counterfeit detection. This includes exploring advanced neu-
ral network architectures; incorporating multi-modal data sources, such as infrared
imaging; and leveraging transfer learning techniques.
Dynamic Adaptation
Developing AI models capable of dynamically adapting to new counterfeit tech-
niques and emerging currency designs is crucial. Incorporating mechanisms for con-
tinuous learning and model retraining based on real-time feedback and data updates
can enhance the system’s resilience to evolving threats.
Collaborative Efforts
Collaborative initiatives involving governments, financial institutions, researchers,
and technology providers are essential for addressing counterfeit currency chal-
lenges effectively. Sharing data, best practices, and insights can accelerate progress
and promote standardization in counterfeit detection methods.
Ethical Considerations
As AI technologies become more pervasive in financial systems, ethical consider-
ations surrounding transparency, accountability, and bias mitigation become increas-
ingly important. Future work should prioritize ethical AI principles to ensure the
responsible development and deployment of counterfeit detection systems.
Therefore, by addressing these challenges and focusing on future research direc-
tions, the field of fake currency identification using artificial intelligence and feder-
ated learning can continue to advance, bolstering the security and integrity of global
financial systems.
CONCLUSION
In this chapter, a unique convolutional neural network-based approach for identify-
ing authentic or counterfeit currency is proposed. When there is insufficient prior
information about the scene and camera postures, the traditional computer vision
80 Artificial Intelligence Using Federated Learning
problem of locating, illustrating, and fixing visual key points must be solved. A CNN
network is trained on the data set and put to the test to determine the denomination
of the currency and to determine that the currency is original. The trained convo-
lutional neural network exhibited using the federated learning approach leads to a
very low training loss, and the maximum accuracy obtained is about 95.625%. Also,
this chapter demonstrated the efficacy of using artificial intelligence and federated
learning to identify counterfeit currency. By leveraging machine learning techniques
and decentralized training approaches, governments and financial institutions can
enhance the security and integrity of their currency systems, mitigating the risks
posed by counterfeiters. Further research could focus on scalability, robustness
against emerging counterfeit techniques, and integration with existing financial
infrastructure.
REFERENCES
[1] B.V. Kumar, D.S. Sharan (1993), “Pattern recognition with localized gabor wavelet
grids,” in International Conference on Computational Intelligence and Multimedia
Applications (ICCIMA 2007), Volume: 40 Issue: (2), 517–521. IEEE.
[2] J. Zhang, L. Wu (2009), “An improved method for image edge detection based on
GM (1, 1) model,” in 2009 International Conference on Artificial Intelligence and
Computational Intelligence, Volume: 3, 133–136. IEEE.
[3] L. Jing, M.S. Jin (2010), “About RMB number identification with genetic evolution neu-
ral network,” in 2010 International Conference on Computer, Mechatronics, Control
and Electronic Engineering, Volume: 1, 286–288. IEEE.
[4] J. Guo, Y. Zhao, A. Cai (2010), “A reliable method for paper currency recognition based
on LBP,” in 2010 2nd IEEE InternationalConference on Network Infrastructure and
Digital Content, 359–363. IEEE.
[5] K. Sathisha (2011), “Bank automation system for Indian currency—A novel approach,”
in 2011 IEEE Recent Advances in Intelligent Computational Systems, 299–302. IEEE.
[6] R. Mirza, V. Nanda (2012), “Design and implementation of indian paper currency
authentication system based on feature extraction by edge based segmentation using
Sobel operator,” International Journal of Engineering Research and Development,
3(2), 41–46.
[7] L. Wenhong, T. Wenjuan, C. Xiyan, G. Zhen (2010), “Application of support vector
machine (SVM) on serial number identification of RMB,” in 2010 8th World Congress
on Intelligent Control and Automation, 6262–6266. IEEE.
[8] H. Hassanpour, P.M. Farahabadi (2009), “Using Hidden Markov Models for paper cur-
rency recognition,” Expert Systems with Applications, 36(6), 10105–10111.
[9] M. Khari, A.K. Garg, R.G. Crespo, E. Verdú (2019), “Gesture recognition of RGB and
RGB-D static images using convolutional neural networks,” International Journal of
Interactive Multimedia & Artificial Intelligence, 5(7).
[10] M. Dua, R. Gupta, M. Khari, R.G. Crespo (2019), “Biometric iris recognition using
radial basis function neural network,” Soft Computing, 23(22), 11801–11815.
[11] R. Gupta, D. Gupta, M. Dua, M. Khari (2017), “Hindi optical character recognition and
its applications,” in Detecting and Mitigating Robotic Cyber Security Risks, 28–39. IGI
Global.
[12] P.D. Deshpande, A. Shrivastava (2018), “Indian currency recognition and authentica-
tion using image processing,” IJARSE, 7(7), 1107–1119.
Fake Currency Identification Using AI 81
[13] T. Agasti, G. Burand, P. Wade, P. Chitra (2017), “Fake currency detection using image
processing,” IOP Conference Series: Materials Science and Engineering, 263(5),
052047. https://doi.org/10.1088/1757-899X/263/5/052047.
[14] G. Alnowaini, A. Alabsi, H. Ali (2019), “Yemeni paper currency detection system,”
in 2019 First International Conference of Intelligent Computing and Engineering
(ICOICE). Mukalla, Yemen, 15−16 December 2019. IEEE. https://doi.org/10.1109/
ICOICE48418.2019.9035192.
[15] A.H. Ballado, J.C. Dela Cruz, G.O. Avendaño, N.M. Echano, J.E. Ella, M.E.M. Medina,
B.K.C. Paquiz (2015), “Phillipine currency paper bill counterfeit detection through
image processing using canny edge technology,” in 2015 International Conference on
Humanoid, Nanotechnology, Information Technology, Communication and Control,
Environment and Management (HNICEM). Cebu, Philippines, 9−12 December 2015.
IEEE. https://doi.org/10.1109/HNICEM.2015.7393184.
[16] R. Barman, T. Saha, S.K. Bandyopadhyay (2018), “A proposed method for different
objects detection in Indian paper currency note,” International Journal of Trend in
Research and Development, 5(3), 311−313.
[17] J.F. Zeggeye, Y. Assabie (2016), “Automatic recognition and counterfeit detection
of Ethiopian paper currency,” International Journal of Image, Graphics and Signal
Processing, 8(2), 28–36. https://doi.org/10.5815/ijigsp.2016.02.04.
[18] M. Khari, A.K. Garg, R.G. Crespo, E. Verdú (2019), “Gesture recognition of RGB and
RGBD static images using convolutional neural networks,” International Journal of
Interactive Multimedia Artificial Intelligence, 5(7), 22–27.
[19] M. Dua, R. Gupta, M. Khari, R.G. Crespo (2019), “Biometric iris recognition using
radial basis function neural network,” Soft Computing, 23(22), 11801–11815.
[20] J.M. Chatterjee, S. Ghatak, R. Kumar, M. Khari (2018), “BitCoin exclusively infor-
mational money: A valuable review from 2010 to 2017,” Quality Quantity, 52(5),
2037–2054.
[21] Tuyen Danh Pham, Chanhum Park, Dat Tien Nguyen, Ganbayar Batchuluun, Kang
Ryoung Park (2020), “Deep learning-based fake-banknote detection for the visually
impaired people using visible-light images captured by smartphone cameras,” IEEE
Access, 8, 63144–63161.
[22] Yongjiao Liu, Jianbiao He, Min Li (2018), “New and old banknote recognition based on
convolutional neural network,” in Proceedings of the 2018 International Conference on
Mathematics and Statistics, pp. 92–97, 2018. Association for Computing Machinery.
[23] Milan Tripathi (2021), “Analysis of convolutional neural network based image classifi-
cation techniques,” Journal of Innovative Image Processing (JIIP), 3(2), 100–117.
[24] Joy Iong-Zong Chen, Kong-Long Lai (2021), “Deep convolution neural network model
for credit-card fraud detection and alert,” Journal of Artificial Intelligence, 3(2),
101–112.
[25] Alex Krizhevsky, Ilya Sutskever, Geoffrey E. Hinton (2017), “ImageNet classification
with deep convolutional neural networks,” Communications of the ACM, 60(6), 84–90.
[26] Shaik Ajiji Amirsab, Mohammad Mudassir, Mohammad Ismail (2017), “An automated
recognition of fake or destroyed Indian currency notes,” International Journal of
Advance Scientific Research and Engineering Trends, 1(7), ISSN 2456-0774.
[27] Tushar Agasti, Gajanan Burand, Pratik Wade and P. Chitra (2017), “Fake currency detection
using image processing,” in IOP Conference Series: Materials Science and Engineering,
Volume: 263, Issue: (5). IOP Publishing Ltd. doi: 10.1088/1757-899X/263/5/052047.
[28] M. Thulsima, V. Sudha, P. Selva Nila, G. Bharatha Sreeja (2017), “Indian paper currency
recognition using weighted euclidian distance,” IJSR-CSEIT, 2(2), ISSN 2456-3307.
82 Artificial Intelligence Using Federated Learning
[29] Snehlata Singh, Vipin Saxena (2017), “Identification of fake currency: A case study of
Indian scenario,” International Journal of Advanced Research in Computer Science, 8,
ISSN 0976-5697.
[30] Eshita Pilania, Bhavika Arora (2016), “Recognition of fake currency based on secu-
rity thread feature of currency,” International Journal of Engineering and Computer
Science, 5(7), ISSN 2319-7242.
[31] Vanga Odelu, Ashok Kumar Das, Adrijit Goswami (2016, February), SEAP: Secure
and efficient authentication protocol for NFC applications using pseudonyms. IEEE
Transactions on Consumer Electronics. 62(1), 30–38. https://doi.org/10.1109/TCE.2016.
7448560.
[32] M. Abishek, B. Kavin, B. Raj Kumaran (2020), “Fake currency detection using CNN,”
India. IEEE, 7(3).
[33] K. Kiran, B. Anuthi, S. Pranali, A. Shruti (2019, December), “Counterfeit currency
detection using deep convolutional neural network,” IEEE Pune Section International
Conference (PuneCon), Pune, India, 1–4. IEEE. doi: 10.1109/PuneCon46936.2019.
9105683.
[34] Z. Adiba, U. Jia (2019), “A hybrid fake banknote detection model using OCR face rec-
ognition and hough features,” in 2019 Cybersecurity and Cyberforensics Conference
(CCC), Melbourne, VIC, Australia, 91–95. IEEE Xplore. doi: 10.1109/CCC.2019.000-3.
[35] K. Gautam (2020), “Indian currency detection using image recognition technique,” in
2020 International Conference on Computer Science Engineering and Applications
(ICCSEA), 1–5. IEEE Xplore. doi: 10.1109/ICCSEA49143.2020.9132955.
[36] S. Singh, A.K. Aggarwal, P. Ramesh, L. Nelson, P. Damodharan, M.T. Pandian (2022),
“COVID 19: Identification of masked face using CNN architecture,” in 2022 3rd
International Conference on Electronics and Sustainable Communication Systems
(ICESC), 1045–1051. IEEE Xplore. doi: 10.1109/ICESC54411.2022.9885327.
[37] S.S. Raju, M. Srikanth, K. Guravaiah, P. Pandiyaan, B. Teja, K.S. Tarun (2023), “A three-
dimensional approach for stock prediction using AI/ML algorithms: A review & com-
parison,” in IEEE 4th International Conference on Innovative Trends in Information
Technology (ICITIIT), 1–6. IEEE Xplore. doi: 10.1109/ICITIIT57246.2023.10068584.
[38] M. Kalaiselvi, V. Neha, R. Ragavi, P. Sindhu, G. Sneak (2023, May), “Identification
of fake Indian currency using convolutional neural network,” International Journal of
Research Publication and Reviews, 4(5), 1496–1501.
[39] C. Wu, S. Shao, C. Tunc, S. Hariri (2020), “Video anomaly detection using pre-
trained deep convolutional neural nets and context mining,” in 2020 IEEE/ACS 17th
International Conference on Computer Systems and Applications (AICCSA), 1–8.
IEEE Xplore. doi: 10.1109/AICCSA50499.2020.9316538.
[40] K. Sundravadivelu, P. Gururama Senthilvel, N. Duraimutharasan, T. Hannah Rose
Esther, K. Rajesh Kumar (2023), “Extensive analysis of IoT assisted fake currency
detection using novel learning scheme,” in 2023 Second International Conference on
Augmented Intelligence and Sustainable Systems (ICAISS), 1469–1477. IEEE Xplore.
doi: 10.1109/ICAISS58487.2023.10250560.
[41] Aniket Jawale, Kanchan Patil, Aniruddha Patil, Siddhesh Sagar, Akash Momale (2023),
“Deep learning based money detection system for visually impaired person,” in 2023
7th International Conference on Intelligent Computing and Control Systems (ICICCS),
173–180. IEEE. doi: 10.1109/ICICCS56967.2023.10142586.
[42] A. Ghazi, A. Aisha, Heba A. Yemeni (2019), “Paper currency detection system,” in
First International Conference of Intelligent Computing and Engineering (ICOICE),
1–7. IEEE. doi: 10.1109/ICOICE48418.2019.9035192.
6 Blockchain-Enhanced
Federated Learning
for Privacy-Preserving
Collaboration
Pawan Whig, Balaram Yadav Kasula,
Nikhitha Yathiraju, Anupriya Jain,
Seema Sharma, and Ahmed A. Elngar
TABLE 6.1
Annotation
BEFL Blockchain-enhanced federated learning
FL Federated learning
D-AAPs Distributed applications
DeFi Decentralized finance
Non-IID Non-independent and identically distributed
DDoS Distributed denial of service
SMPC Secure multi-party computation
AML Anti-money laundering
INTRODUCTION
In today’s digital era, the proliferation of data-driven technologies and collaborative
efforts among multiple entities has led to remarkable advancements in various fields [1].
However, the convergence of data sharing, particularly in collaborative machine-
learning scenarios, presents inherent challenges concerning data privacy, security,
and confidentiality. Federated learning (FL) has emerged as a promising paradigm
to address these concerns, allowing multiple parties to collaboratively train machine
learning models without directly sharing raw data [2]. Yet FL encounters its own
set of challenges, notably in maintaining data privacy during model aggregation
and communication rounds [3–6]. To fortify the privacy and security aspects of FL,
novel approaches are being explored. One such innovative solution that has gained
significant traction is the fusion of federated learning with blockchain technology.
Blockchain, best known as the underlying technology behind cryptocurrencies,
DOI: 10.1201/9781003482000-6 83
84 Artificial Intelligence Using Federated Learning
LITERATURE REVIEW
The convergence of federated learning and blockchain technology has garnered
significant attention in recent literature, aiming to address inherent challenges in
privacy-preserving collaboration. Federated learning’s decentralized model training
mitigates data privacy concerns but introduces security and communication chal-
lenges [20]. Researchers have explored cryptographic techniques and differential
privacy mechanisms to counteract these issues. Concurrently, the integration of
blockchain provides a transparent and tamper-resistant framework to enhance secu-
rity in federated learning. Smart contracts are proposed for enforcing collaboration
rules, and decentralized identity management is facilitated, empowering participants
to maintain control over their identities and data. Case studies demonstrate the prac-
ticality of this integration, showcasing improved security, privacy, and trust among
participants. While challenges persist, including scalability and performance opti-
mization, the literature suggests a consensus on the potential benefits of combin-
ing blockchain and federated learning for privacy-preserving collaboration, calling
for continued exploration and validation in real-world applications. The literature
review with the research gap is shown in Table 6.2.
Blockchain-Enhanced Federated Learning 85
TABLE 6.2
Literature Review with Research Gap
Paper Advantages Disadvantages
Blockchain-Enhanced Federated Provides insights into Lacks in-depth analysis of privacy
Learning Market with Social market implications concerns and challenges in
Internet of Things (Wang et al., federated learning integration
2022) with blockchain
Decentralized Privacy Using Addresses decentralized Gaps in addressing scalability
Blockchain-Enabled Federated privacy issues and performance
Learning in Fog Computing evaluation in real-world fog
(Qu et al., 2020) computing scenarios
An Intelligent and Privacy-Enhanced Emphasizes privacy- Research gap in examining the
Data-Sharing Strategy for enhanced strategies adaptability of these strategies
Blockchain-Empowered Internet of across diverse IoT environments
Things (Miao et al., 2022)
Federated Learning in Robotic and Explores federated Lacks insights into interoperability
Autonomous Systems (Xianjia et al., learning applications in challenges and security
2021) robotics considerations in complex
autonomous systems
Misbehavior Detection in Vehicular Focuses on misbehavior Research gap in evaluating the
Ad Hoc Networks Based on detection impact of network dynamics and
Privacy-Preserving Federated varying vehicular scenarios on
Learning and Blockchain (Lv et al., the effectiveness of the proposed
2022) solution
A Secure Federated Learning Addresses security Further exploration required to
Framework Using Blockchain and concerns assess the computational
Differential Privacy (Firdaus et al., overhead and scalability of the
2022) proposed framework
PD2S: A Privacy-Preserving Proposes a differentiated Research gap in evaluating the
Differentiated Data Sharing Scheme data sharing scheme robustness of the scheme against
Based on Blockchain and Federated sophisticated attacks in IoT
Learning (Liu et al., 2023) environments
A Reliable and Fair Federated Focuses on reliability Further research needed to explore
Learning Mechanism for Mobile and fairness trade-offs between fairness and
Edge Computing (Huang et al., efficiency in federated learning
2023) models deployed in edge
computing environments
Efficient and Privacy-Preserving Discusses privacy- Lacks in evaluating the system’s
Online Diagnosis Scheme Based on preserving schemes adaptability and performance
Federated Learning in E-Healthcare with diverse medical data types
System (Shen et al., 2023) and diagnostic scenarios
Privacy-Preserving Aggregation Proposes a privacy- Research gap in assessing the
Scheme for Blockchained Federated preserving scheme scheme’s efficiency and
Learning in IoT (Fan et al., 2021) applicability across various IoT
device types and network
conditions
(Continued)
86 Artificial Intelligence Using Federated Learning
Initialization
Participants deploy their local models on the blockchain and initiate a smart contract
for model aggregation.
Aggregation Algorithm
The smart contract executes an aggregation algorithm, often employing federated
averaging (FedAvg) to combine the model updates from all participants. The FedAvg
equation is given by:
1
E
N
0avg = 0 (1)
N i=1 i
In (eq. 1), 0avg represents the aggregated model, 0i denotes the local models, and N is
the number of participants.
88 Artificial Intelligence Using Federated Learning
Incentive Mechanisms
Smart contracts can incorporate incentive mechanisms, rewarding participants for
their contributions. This encourages active participation and promotes a collabora-
tive environment.
Security Considerations
To enhance security, cryptographic techniques may be employed to secure the com-
munication and storage of model updates on the blockchain.
The use of smart contracts for model aggregation in BCFL provides a transpar-
ent and secure framework for collaborative learning. It leverages the decentralized
nature of blockchain to ensure trust among participants while automating the aggre-
gation process in a tamper-resistant manner, fostering a privacy-preserving and effi-
cient collaborative learning ecosystem.
Security Measures
To enhance security, participants may employ cryptographic protocols such as secure
key exchange and authentication to safeguard the homomorphic encryption process.
BLOCKCHAIN TECHNOLOGY
Blockchain technology is a decentralized and distributed ledger system that enables
the secure and transparent recording of transactions across a network of computers,
as shown in Figure 6.2. It was initially introduced as the underlying technology for
Bitcoin, the first cryptocurrency, but its applications have since expanded far beyond
digital currencies. Here are the fundamental aspects to understand about blockchain
technology:
Blockchain technology operates on a decentralized network of nodes, where each
node maintains a copy of the entire blockchain, eliminating the need for a central
authority. The immutable ledger ensures that once data is recorded, it becomes
unchangeable, enhancing the integrity of transactions. Consensus mechanisms like
proof of work and proof of stake validate transactions without a central authority,
ensuring agreement among participants. Blockchain’s transparency allows all partici-
pants to view the transaction history, promoting audibility and trust. Smart contracts,
coded agreements that self-execute on the blockchain, eliminate the need for inter-
mediaries in specific transactions. The technology’s security relies on cryptographic
techniques, including digital signatures and encryption. Beyond cryptocurrencies,
blockchain finds applications in supply chain management, healthcare, finance, and
more, providing transparency and decentralized control. However, challenges such
as scalability and regulatory uncertainty persist, underscoring the ongoing efforts
to enhance blockchain’s usability and adoption. Understanding blockchain is cru-
cial for recognizing its transformative potential in revolutionizing data management,
transactions, and digital interactions across diverse industries.
Blockchain-Enhanced Federated Learning 95
Immutable Ledger
The concept of an immutable ledger refers to the permanence and unchangeability
of data once it has been recorded on the blockchain. Once data is added to a block
and appended to the chain, it becomes extremely difficult, if not practically impos-
sible, to alter or delete that information retroactively. Immutability ensures the integ-
rity and trustworthiness of data stored on the blockchain. Each block in the chain
contains a unique cryptographic hash of the previous block, creating a sequential
and unbroken record of transactions or information. Any attempt to alter data in a
block would require changing subsequent blocks, which becomes increasingly com-
putationally intensive and practically infeasible due to the distributed nature of the
network. This feature is particularly valuable in applications where data integrity,
transparency, and tamper resistance are critical, such as supply chain management,
digital identity verification, land registry, voting systems, and financial transactions.
It instills confidence and trust among users by ensuring that recorded information
remains unchanged and reliable.
96 Artificial Intelligence Using Federated Learning
Decentralization
Decentralization in blockchain refers to the distribution of control, authority, and
data across a network of nodes (computers) rather than relying on a central authority
or intermediary to manage transactions or store data. Decentralization eliminates
the need for a single central authority, reducing the risk of a single point of failure,
censorship, or manipulation. It enhances security, resilience, and transparency by
allowing multiple nodes to independently validate and store copies of the blockchain,
ensuring that no single entity has complete control over the network. Decentralization
is especially valuable in scenarios where trust and transparency are paramount, such
as peer-to-peer transactions, decentralized finance (DeFi), distributed applications
(dApps), and ensuring democratic and transparent governance structures.
The combination of an immutable ledger and decentralization in blockchain
technology provides a secure, transparent, and tamper-resistant platform for record-
ing and managing data, transactions, and digital assets. These characteristics make
blockchain technology appealing to various industries seeking reliable and trustwor-
thy systems for their operations and interactions in a digital environment.
Security Concerns
Security concerns in collaborative machine learning, especially in decentralized
environments like federated learning, encompass various threats and vulnerabilities
that need to be addressed to ensure the integrity, confidentiality, and reliability of the
learning process. Some prominent security concerns include:
Protecting sensitive user data is crucial. Adversaries may attempt to infer or extract
sensitive information from shared model updates. Differential privacy techniques and
encryption methods aim to mitigate these privacy breaches by obscuring individual
contributions. Malicious participants might inject biased or poisoned data into the col-
laborative learning process to manipulate the global model’s behavior. This could lead
to compromised model performance or biased predictions. Robust model aggregation
techniques and anomaly detection mechanisms are essential to counter such attacks.
Adversaries may attempt to deduce the presence or absence of specific data samples in
a participant’s data set by analyzing model updates or responses from the collaborative
learning process. Privacy-preserving aggregation and secure communication methods
help thwart such attacks. Through sophisticated attacks, adversaries may attempt to
reconstruct sensitive data samples or infer proprietary information from shared model
updates. Employing secure aggregation mechanisms and encryption techniques can
prevent model inversion attacks. In decentralized environments, adversaries might cre-
ate multiple fake identities (Sybil nodes) to manipulate the learning process or disrupt
consensus mechanisms. Implementing robust authentication and verification mecha-
nisms helps prevent Sybil attacks. Ensuring the security of communication channels
between devices or nodes is crucial. Adversaries might eavesdrop or tamper with
communication to intercept or modify model updates. Using encrypted channels and
secure communication protocols (e.g., SSL/TLS) mitigates these risks.
Malicious participants might deliberately inject poisoned data into the training
process to degrade the global model’s performance. Employing anomaly detection
techniques and robust quality checks during model aggregation helps detect and
mitigate such attacks. Adversaries might launch attacks to exhaust computational
resources or bandwidth, disrupting the collaborative learning process. Implementing
resource management strategies and defenses against distributed denial of service
(DDoS) attacks is essential.
98 Artificial Intelligence Using Federated Learning
Participants can trace the history of updates, ensuring transparency and fostering
trust among decentralized entities. The integration aids in meeting regulatory com-
pliance requirements by providing a secure and auditable framework for collabora-
tive learning. Blockchain’s adherence to certain regulatory standards, coupled with
FL’s privacy-preserving capabilities, assists in navigating legal frameworks related
to data protection and privacy.
In essence, the integration of blockchain technology with federated learning cre-
ates a robust ecosystem that fortifies privacy, security, transparency, and account-
ability in collaborative machine-learning environments.
Blockchain Layer
The blockchain layer forms the foundation of the BEFL system, comprising nodes
that maintain a distributed ledger. It consists of key components such as the following.
Smart Contracts
Deployed on the blockchain to manage the interaction and execution of operations
related to federated learning tasks, including model aggregation, participant valida-
tion, and reward distribution.
Consensus Mechanism
Determines how nodes reach agreement on the validity of transactions or model
updates. Common consensus algorithms (proof of work, proof of stake, etc.) ensure
trust and immutability within the network.
Data Storage
Stores hashed model updates or transactional information securely on the block-
chain, ensuring transparency, immutability, and tamper resistance.
Client Nodes
Devices or servers with local data sets that perform model training based on FL
algorithms.
Blockchain-Enhanced Federated Learning 101
Aggregator Node
Responsible for receiving encrypted model updates from client nodes, aggregating
them securely, and then broadcasting the updated global model parameters to the
blockchain.
INDUSTRY APPLICATIONS
There are some key industry applications where different technologies and method-
ologies play a vital role:
Healthcare: The integration finds applications in healthcare for collaborative
analysis of medical data while preserving patient privacy. It facilitates medical
research, disease prediction, and personalized treatment recommendations without
centralizing sensitive patient information.
Finance and Banking: In the finance sector, the integration enables secure and
collaborative risk assessment, fraud detection, and customer profiling while protect-
ing sensitive financial data. It assists in building robust predictive models without
compromising customer confidentiality.
104 Artificial Intelligence Using Federated Learning
Real-World Implementations
Healthcare Consortiums: Collaborative research initiatives and healthcare consor-
tiums leverage blockchain-enabled federated learning for medical research, disease
modeling, drug discovery, and treatment personalization while preserving patient
privacy. Projects like federated learning for predicting cardiovascular events have
been explored.
Financial Consortia and Compliance: Consortia in the finance sector imple-
ments collaborative models for fraud detection, credit risk assessment, and cus-
tomer profiling. Initiatives aimed at complying with regulatory requirements (e.g.,
anti-money laundering—AML) while preserving data confidentiality are being
explored.
Supply Chain Optimization Platforms: Real-world implementations focus on
supply chain optimization, such as improving inventory management, demand fore-
casting, and logistics planning. Projects aim to enable collaboration among multiple
supply chain stakeholders while protecting sensitive data.
Edge Device Collaborations: Implementations involving edge computing envi-
ronments leverage FL and blockchain integration for collaborative learning and
analysis on edge devices. This allows for predictive maintenance, anomaly detec-
tion, and data analysis while ensuring data privacy and security.
Telecommunication Networks: Pilot projects within telecommunication net-
works focus on collaborative analysis for network optimization, quality of service
improvement, and anomaly detection while ensuring the confidentiality of network-
related data.
These real-world implementations and industry applications showcase the poten-
tial of blockchain-enabled federated learning across various sectors, highlighting
its ability to enable collaborative learning, predictive analytics, and data-driven
decision-making while maintaining data privacy, security, and compliance with
regulatory standards.
Blockchain-Enhanced Federated Learning 105
Problem Definition
In collaborative machine learning scenarios, data privacy and security concerns
often hinder the sharing and aggregation of sensitive data across multiple entities.
Additionally, inefficient communication protocols and the risk of malicious attacks
pose significant challenges. TechSolve aimed to address these issues by leveraging
BCFL to ensure privacy-preserving collaboration, robust security measures, and
enhanced operational efficiency in federated learning environments.
Proposed Model
The proposed model consists of several stages designed to address the identified
challenges and achieve the desired outcomes such as:
Consensus Mechanism
A consensus mechanism, such as proof-of-stake or practical Byzantine fault toler-
ance (PBFT), is employed to validate and agree upon the aggregated model updates
across the network.
106 Artificial Intelligence Using Federated Learning
Complexity Analysis
The proposed BCFL model introduces additional computational overhead due to
encryption, validation processes, and consensus mechanisms. However, advance-
ments in blockchain technology and optimization techniques mitigate this overhead.
The complexity of the model depends on factors such as the size of the data set,
the number of participating nodes, and the chosen consensus mechanism. Despite
potential complexities, BCFL offers significant advantages in privacy, security, and
efficiency compared to traditional collaborative learning approaches.
Results
The implementation of BCFL at TechSolve Inc. yielded impressive results across
various performance metrics:
TABLE 6.3
Performance Metrics Comparison
Metrics Average Improvement
Operational efficiency +40%
Privacy preservation 95% reduced data exposure
Computational overhead −30%
Model accuracy +25%
Network latency −20%
108 Artificial Intelligence Using Federated Learning
Average Improvement
Model Accuracy
Privacy Preservation
Operational Efficiency
Network
Latency
-17%
Operational Efficiency
Privacy Preservation
Computational Overhead
Model Accuracy
22% Model Accuracy
Network Latency
Computational
Overhead
-26%
CONCLUSION
The implementation of blockchain-enhanced federated learning at TechSolve Inc.
has yielded significant advancements in privacy, security, and efficiency within col-
laborative machine learning environments. Through rigorous experimentation and
analysis, TechSolve has demonstrated the tangible benefits of BCFL across various
performance metrics.
Blockchain-Enhanced Federated Learning 109
Future Work
The future of blockchain-enhanced federated learning presents exciting avenues
for research and development, aiming to further enhance the collaborative learning
paradigm while addressing emerging challenges. One key area of focus is scalability
enhancement, with efforts directed toward optimizing systems to efficiently accommo-
date a larger number of participating nodes without compromising speed or security.
The development of dynamic privacy-preserving mechanisms is crucial, leveraging
blockchain for adaptable privacy models that can adjust based on data sensitivity and
user preferences. Interoperability and standardization efforts are needed to enable
seamless collaboration and data sharing across diverse blockchain networks and fed-
erated learning systems. Ethical considerations and regulatory frameworks require
in-depth exploration to ensure compliance with evolving privacy laws and ethical
guidelines. Real-world deployment and use cases across various industries will provide
valuable insights into the effectiveness and scalability of blockchain-enhanced feder-
ated learning. Designing incentive mechanisms within these ecosystems will encour-
age active participation while maintaining robust data privacy and security measures.
Continuous advancements in the robustness and security of blockchain-federated
learning systems will be paramount to mitigating potential vulnerabilities and adver-
sarial attacks. This evolving landscape holds significant promise for revolutionizing
collaborative learning while safeguarding data privacy, setting the stage for a more
resilient and widely applicable blockchain-enhanced federated learning framework.
REFERENCES
[1] Mishra, A., Garg, Y., Pandey, O. J., Shukla, M. K., Vasilakos, A. V., & Hegde, R. M.
(2024, July–August). A Novel Resource Management Framework for Blockchain-Based
Federated Learning in IoT Networks. IEEE Transactions on Sustainable Computing,
9(4), 648–660. doi: 10.1109/TSUSC.2024.3358915
110 Artificial Intelligence Using Federated Learning
[2] Tong, Z., Wang, J., Hou, X., Chen, J., Jiao, Z., & Liu, J. (2024). Blockchain-Based
Trustworthy and Efficient Hierarchical Federated Learning for UAV-Enabled IoT
Networks. IEEE Internet of Things Journal, 11(21), 34270–34282. doi: 10.1109/JIOT.
2024.3370964
[3] Zhang, H., Jiang, S., & Xuan, S. (2024). Decentralized Federated Learning Based on
Blockchain: Concepts, Framework, and Challenges. Computer Communications, 216,
140–150.
[4] Sadineni, G., Singh, J., Rani, S., Rao, G. S., Pasha, M. J., & Lavanya, A. (2024).
Blockchain-Enhanced Vehicular Ad-hoc Networks (B-VANETs): Decentralized Traffic
Coordination and Anonymized Communication. International Journal of Intelligent
Systems and Applications in Engineering, 12(1s), 443–456.
[5] Wang, P., Zhao, Y., Obaidat, M. S., Wei, Z., Qi, H., Lin, C., & Zhang, Q. (2022).
Blockchain-Enhanced Federated Learning Market with Social Internet of Things.
IEEE Journal on Selected Areas in Communications, 40(12), 3405–3421.
[6] Qu, Y., Gao, L., Luan, T. H., Xiang, Y., Yu, S., Li, B., & Zheng, G. (2020). Decentralized
Privacy Using Blockchain-Enabled Federated Learning in Fog Computing. IEEE
Internet of Things Journal, 7(6), 5171–5183.
[7] Miao, Q., Lin, H., Hu, J., & Wang, X. (2022). An Intelligent and Privacy-Enhanced
Data Sharing Strategy for Blockchain-Empowered Internet of Things. Digital
Communications and Networks, 8(5), 636–643.
[8] Xianjia, Y., Queralta, J. P., Heikkonen, J., & Westerlund, T. (2021). Federated learning
in Robotic and Autonomous Systems. Procedia Computer Science, 191, 135–142.
[9] Lv, P., Xie, L., Xu, J., Wu, X., & Li, T. (2022). Misbehavior Detection in Vehicular Ad
Hoc Networks Based on Privacy-Preserving Federated Learning and Blockchain. IEEE
Transactions on Network and Service Management, 19(4), 3936–3948.
[10] Firdaus, M., Larasati, H. T., & Rhee, K. H. (2022, June). A Secure Federated Learning
Framework Using Blockchain and Differential Privacy. In 2022 IEEE 9th International
Conference on Cyber Security and Cloud Computing (CSCloud)/2022 IEEE 8th
International Conference on Edge Computing and Scalable Cloud (EdgeCom) (pp.
18–23). IEEE.
[11] Liu, Y., Liu, P., Jing, W., & Song, H. H. (2023, December 15). PD2S: A Privacy-
Preserving Differentiated Data Sharing Scheme Based on Blockchain and Federated
Learning. IEEE Internet of Things Journal, 10(24), 21489–21501. doi: 10.1109/
JIOT.2023.3295763
[12] Huang, X., Han, L., Li, D., Xie, K., & Zhang, Y. (2023). A Reliable and Fair Federated
Learning Mechanism for Mobile Edge Computing. Computer Networks, 226, 109678.
[13] Shen, G., Fu, Z., Gui, Y., Susilo, W., & Zhang, M. (2023). Efficient and Privacy-
Preserving Online Diagnosis Scheme Based on Federated Learning in E-healthcare
System. Information Sciences, 119261.
[14] Fan, M., Yu, H., & Sun, G. (2021, November). Privacy-preserving Aggregation Scheme
for Blockchained Federated Learning in IoT. In 2021 International Conference on
UK-China Emerging Technologies (UCET) (pp. 129–132). IEEE.
[15] Billah, M., Mehedi, S. T., Anwar, A., Rahman, Z., & Islam, R. (2022). A Systematic
Literature Review on Blockchain Enabled Federated Learning Framework for Internet
of Vehicles. arXiv preprint arXiv:2203.05192.
[16] Ullah, I., Deng, X., Pei, X., Mushtaq, H., & Uzair, M. (2023). IoV-SFL: A Blockchain-
based Federated Learning Framework for Secure and Efficient Data Sharing in the
Internet of Vehicles. doi: 10.21203/rs.3.rs-3648280/v1
[17] Moudoud, H., & Cherkaoui, S. (2023). Multi-Tasking Federated Learning Meets
Blockchain to Foster Trust and Security in the Metaverse. Ad Hoc Networks, 150,
103264.
Blockchain-Enhanced Federated Learning 111
[18] Zhang, Y., & Yu, H. (2022). Towards Verifiable Federated Learning. arXiv preprint
arXiv:2202.08310.
[19] Li, W., Li, Y., Zheng, C., & He, R. (2023, August). Blockchain-based Model for Privacy-
enhanced Data Sharing. In 2023 10th International Conference on Dependable
Systems and Their Applications (DSA) (pp. 406–417). IEEE.
[20] Firdaus, M., Larasati, H. T., & Rhee, K. H. (2023). A Blockchain-Assisted Distributed
Edge Intelligence for Privacy-Preserving Vehicular Networks. Computers, Materials &
Continua, 76(3).
[21] Soltani, B., Haghighi, V., Mahmood, A., Sheng, Q. Z., & Yao, L. (2022, October).
A Survey on Participant Selection for Federated Learning in Mobile Networks.
In Proceedings of the 17th ACM Workshop on Mobility in the Evolving Internet
Architecture (pp. 19–24). Association for Computing Machinery.
[22] Fan, M., Ji, K., Zhang, Z., Yu, H., & Sun, G. (2023, September 15). Lightweight Privacy
and Security Computing for Blockchained Federated Learning in IoT. IEEE Internet of
Things Journal, 10(18), 16048–16060. doi: 10.1109/JIOT.2023.3267112
[23] Otoum, S., Al Ridhawi, I., & Mouftah, H. (2021). Securing Critical IoT Infrastructures
with Blockchain-Supported Federated Learning. IEEE Internet of Things Journal,
9(4), 2592–2601.
[24] Huang, C., & Liu, S. (2024). Securing the Future of Industrial Operations: A Blockchain-
Enhanced Trust Mechanism for Digital Twins in the Industrial Internet of Things.
International Journal of Computers and Applications, 1–10.
[25] Wang, L., & Guan, C. (2024). Improving Security in the Internet of Vehicles:
A Blockchain-Based Data Sharing Scheme. Electronics, 13(4), 714.
[26] Wan, T., Jiang, T., Liao, W., & Jiang, N. (2024). Hierarchical Incentive Mechanism
for Federated Learning: A Single Contract to Dual Contract Approach for Smart
Industries. International Journal of Intelligent Systems, 2024.
[27] Aljabri, A., Jemili, F., & Korbaa, O. (2024). Convolutional Neural Network for Intrusion
Detection Using Blockchain Technology. International Journal of Computers and
Applications, 46(2), 67–77.
[28] An, D. A. G. (2024, January). Jiakai Hao¹, Guanghuai Zhao¹, Ming Jin¹, Yitao Xiao²),
Yuting Li¹, and Jiewei Chen². In Proceedings of the 13th International Conference on
Computer Engineering and Networks: Volume III (Vol. 1127, p. 281). Springer Nature.
[29] Selvakumar, V., Maaliw, R. R., Sharma, R. M., Oak, R., Singh, P. P., & Kumar, A.
(2024). Blockchain-Aware Federated Anomaly Detection Scheme for Multivariate
Data. In Artificial Intelligence, Blockchain, Computing and Security Volume 1
(pp. 690–698). CRC Press.
7 Federated Learning-Based
Smart Transportation
Solutions
Deploying Lightweight
Models on Edge Devices
in the Internet of Vehicles
Sivabalan Settu, Raveendra Reddy,
Appalaraju Muralidhar, Thangavel
Murugan, and Rathipriya Ramalingam
INTRODUCTION
The Internet of Things (IoT) and the proliferation of linked devices have advanced
quickly, revolutionizing several industries, including transportation. An extension of
the Internet of Things, the IoV paradigm has become a disruptive force that allows
data interchange and seamless connection between automobiles, roadside units, and
cloud infrastructure. Current generation focuses are intelligent transportation sys-
tems that can optimize traffic flow, increase road safety, and boost overall efficiency.
However, there are a lot of issues with data privacy, bandwidth limitations, and pro-
cessing complexity because of the vast volume of data that IoV devices generate.
Conventional, centralized methods of data processing and machine learning
model training might not be desirable or feasible in such dispersed and resource-
constrained scenarios. Without requiring raw data exchange, FL is a collaborative
machine-learning technique that allows training models across numerous dispersed
devices. With FL, devices can train local models on their data and simply share the
model updates with a central server or aggregator, as opposed to centralizing all of
the data on a single server. Here, multi-input and multi-output signal propagation
methods are used, the computing effort is split among several devices, communica-
tion overhead is decreased, and data privacy is maintained [1–5].
Deploying lightweight models on edge devices, including RSUs and OBUs, is criti-
cal in the context of the IoV. Because of their frequently constrained computational
capabilities, these edge devices make it difficult to implement sophisticated machine-
learning models. For edge device deployment, lightweight models provide a workable
option by balancing model performance and computing needs. This study investigates
the use of application delivery networks for edge devices in conjunction with federated
learning for smart transportation solutions inside the IoV ecosystem. Developers hope
to overcome the issues of data privacy, bandwidth limitations, and computational limi-
tations by utilizing the advantages of these two complementary approaches, allowing
for more intelligent decision-making, more efficiency, and improved safety.
The study explores the foundational ideas of application delivery network and fed-
erated learning, emphasizing the benefits and drawbacks of each. It delves deeper into
how these technologies fit into the IoV ecosystem, looking at a range of applications
such as collaborative sensing, intelligent vehicular assistance, predictive maintenance,
and traffic flow management. The goal is to show that deploying lightweight models
based on FL on edge devices in the IoV is both feasible and effective, using theoretical
analysis, simulations, and real-world case studies. This section also points out pos-
sible drawbacks, difficulties, and future lines of inquiry to develop the field and open
the door for the general use of these technologies in smart transportation solutions.
The present text solves the significant issues regarding information privacy, lack
of resources, and computer processing boundaries in an attempt to assist in enhanc-
ing safer, more ecologically sound, and energy-effective modes of transport, which
in turn advance the entire standard that life brings and promote a transition regard-
ing increasingly intelligent and associated towns and villages. An example scenario
mentioned in Figure 7.1 a block of social networks, numerous vehicles and links, and
cognitive and auto-taxi. Table 7.1 is the symbol and abbreviation used in this chapter.
TABLE 7.1
Federated learning based Internet of Vehicles state and
their abbreviation
State Abbreviation
BACKGROUND STUDY
IoV Paradigm
The IoV notion is a game-changer for the transportation industry. It uses cloud com-
puting facilities, curbside measurements, and vehicle linkages to allow for cognitive
choices, smooth interaction, and knowledge trade. The new model can completely
reshape public transit via enhanced reliability, effectiveness, and safeguarding. It is
an outgrowth of the broader IoT idea. A vast system of interdependent components,
such as automotive vehicles with OBUs, RSUs, and platforms built on the cloud,
appear in the IoV ecosystem. All of these components acquire and transmit data on
a regular schedule about a wide range of areas, including surroundings, circulation
patterns, driving actions, road hazards, and vehicle telemetry systems. For the intent
of public transportation optimization and the growth of a multitude of innovative
instances, this data can be highly significant. Figure 7.2a, and Figure 7.2b dis-
play the Inner, Outer link establishments in ADN at numerous road-type ground
transportation.
Federated Learning-based Smart Transportation Solutions 115
the IoV domain anticipate integrating FL and lightweight models. This will enable
skilled modes of transport that improve safety, efficiency, and long-term viability
in public transit systems. Finally, Figure 7.4 shows the section study of this book
chapter.
118 Artificial Intelligence Using Federated Learning
FIGURE 7.5 Federated Edge Devices Learning and study of central, dispersed system
PROPOSED WORK
The IoV paradigm has brought about an immense shift in the world of transport in
the era of the IoT. IoV makes use of the connectivity between cars, roadside equip-
ment, and cloud infrastructure to facilitate intelligent decision-making, simple inter-
action, and information transfer. Still, challenges with the confidentiality of data,
shortages of bandwidth, and information technology inefficiency originate from
the tremendous quantity of data generated through IoV devices. A flexible machine
learning technology called FL is now coming to light as an acceptable means to get
past such barriers as shown in Figure 7.6.
120 Artificial Intelligence Using Federated Learning
FIGURE 7.7 IoV Region-based dynamic offload/on-load edge devices for inter and
intra-communication
FIGURE 7.9 Edge devices with FL approach among RSU, OBU, Infrastructure in cell
making them optimal for use on edge devices with a limited number of resources.
FL statistical analysis allows for collective training of such tiny machines span-
ning plenty of edge technology devices using disparate information while preserving
privacy and eliminating expenses for communication. The fourth figure illustration
exhibits the region IoV gaining FL training experiences. Figure 7.9 displays the cell
within a cell or cell-free technology where infrastructure and RSUs are bonding with
the corresponding network.
Basic Benefits of FL Data Analytics, Modular Learning: Federated learning
data aggregation allows for the dispersed training of statistical ensembles across
various devices or entities. Each device or party builds its model using its data, and
only updated models or variations are transferred to an underlying server or aggre-
gator. The confidentiality of information is safeguarded by federated learning data
analytics, which resists gathering raw data. Specific gadgets or persons maintain
oversight of their secret information, avoiding safety and legal concerns.
Spectrum Efficacy: Compared to passing huge quantities of raw data, federated
learning statistical analysis mandates only the distribution of variations in models
or shadings, which are frequently much smaller in size. It features reduced transfer
costs and bandwidth requirements that make it ideal for resource-constrained IoV
Federated Learning-based Smart Transportation Solutions 125
TABLE 7.2
FL- IoV using Smart Transport using ADN Infrastructure, Coverage, Road/Lane,
Cell or Cell-free
Procedure 1: Smart Transportation Contract (STC)
{Vehicle (V): Road, Rail, Water, Air, Space . . .} Via Application Delivery Network
(ADN1, ADN2, . . ., ADNn)
Vehicle Registration {V1, V2, . . ., Vn} // Number of Vehicle Data (VD),
if {V1, V2, . . ., Vn} == successful then // Global Server (GS)
Check {VD 1,. . . . VD n} from the GS // Client Vehicle (CV)
else
Register {CV1, . . . CV n} as a New {CV}
U ← CV
Store Data on BC // Blockchain (BC)
Encrypt data Using Sha256 Algo
Result generate ABI of Contract // Application Binary Interface (ABI)
generate Byte code of Contract
Decrypt data Using Sha256 Algorithm
end if
applications. Table 7.2 gives the smart transport mechanism procedures and the
numerous application delivery network points.
Regional Modeling: FL Informatics is capable of managing diverse data
deployments from several devices or entities. Each regional model undergoes
training on input from the relevant faction, and the procedure of aggregation com-
bines all the different viewpoints and generates more reliable as well as generic
forecasts [17, 18].
Continuous Learning: As newly collected information is obtainable at specific
devices or those involved, FL data analytics offers continuous learning and update
services, making sure deploying systems stay relevant and versatile to evolve with
scenarios. Application for Intelligent Mobility FL analytics of data has numer-
ous uses in smart mobility and the IoV ecosystem, including congestion oversight,
cognitive vehicular assistance, automatic upkeep, surveillance of the environment,
and joint sense. FL data analytics allows for more sophisticated decision-making,
enhanced security, and improved productivity in public transport by using dispersed
information while safeguarding data and enhancing resource utilization.
RESULT STUDY
The joint use of FL and lightweight models distributed on edge equipment in the
IoV ecosystem has shown favorable outcomes in facilitating intelligent modes of
transport while tackling the confidentiality of data, access limits, and computational
aspects of barriers. Figures 7.10 and 7.11 represent the overall diagram of smart
transportation in the city.
126 Artificial Intelligence Using Federated Learning
overall models that account for an array of driving sequences, vehicle formats, and
circumstances in the environment.
This is the final section of the chapter, and Figure 7.13. indicates the FL type with
central and dispersed server systems. Figure 7.14 shows the sample network settings
defined and the numerous parameters used. These settings are used to continuously
acquire and update ground awareness about themes like traffic, road damage, politi-
cal meetings, etc. Especially take one social application to check individual vehicle
identity, range, current ground city updates, cloud database retrieval, on-load time,
off-load time, and live.
Continuous Acquisition of Knowledge and Ground Alterations: This approach
supports ongoing learning and revisions to models, ensuring that positioned models
stay current and responsive to shifting circumstances in a dynamic traffic ecosystem.
This traffic crowd recognition technology is applied to guarantee a safe path.
Real-World Use Cases: A research study found that the FL technique is appli-
cable and effective in an assortment of IoV functions, such as streamlining traffic
optimization, intelligent vehicle advice, automatic upkeep, environmental surveil-
lance, and joint senses.
Greater efficiency of transportation and sustainable society: This study’s con-
clusion helps foster the creation of effective, less hazardous, and green public transit
Federated Learning-based Smart Transportation Solutions 131
systems by overcoming issues related to the privacy of data, optimizing the usage of
resources, and enabling automated decision-making.
While the proposed solution has yielded promising results, several challenges
and limitations have been identified, presenting opportunities for future research.
These include communication efficiency, handling increasing levels of heterogeneity
and scalability, enhancing privacy and security mechanisms, enabling model per-
sonalization, and facilitating seamless integration and standardization across the IoV
ecosystem. By addressing these challenges and leveraging the synergies between
FL and lightweight models, the research community and industry stakeholders can
unlock the full potential of intelligent transportation solutions in the IoV ecosystem,
contributing to more efficient, secure, and sustainable mobility systems. Continued
research, collaboration, and innovation in this domain are crucial for realizing the
vision of smarter, safer, and more connected transportation networks.
CONCLUSION
The deep study begun in this study explores the pairing of FL with compact
designs set up on interfaces within the context of IoV ecosystems. It launched
major discoveries with insights from earlier studies, conceptual frameworks, and
132 Artificial Intelligence Using Federated Learning
REFERENCES
1. Samarakoon, S., Bennis, M., Saad, W., & Debbah, M. (2019). Federated learning for
ultra-reliable low-latency V2V communications. In 2019 IEEE Global Communications
Conference (GLOBECOM) (pp. 1–7). IEEE.
2. Lu, Y., Huang, X., Zhang, K., Maharjan, S., & Zhang, Y. (2021, January/February).
Blockchain and federated learning for 5G beyond. IEEE Network, 35(1), 219–225.
http://doi.org/10.1109/MNET.011.1900598.
3. Lim, W. Y. B., Nguyen Cong Luong, Dinh Thai Hoang, Yutao Jiao, Ying-Chang Liang,
Qiang Yang. (2020). Federated learning in mobile edge networks: A comprehensive
survey. IEEE Communications Surveys & Tutorials, 22(3), 2031–2063. http://doi.
org/10.1109/COMST.2020.2986024.
4. Niknam, S., Dhillon, H. S., & Reed, J. H. (2019). Federated learning for wireless
communications: Motivation, opportunities, and challenges. IEEE Communications
Magazine, 58, 46–51.
5. Brecko, A., Kajati, E., Koziorek, J., & Zolotova, I. (2022). Federated learning for edge
computing: A survey. Applied Sciences, 12(18), 9124. https://doi.org/10.3390/app12189124.
6. Hinton, G., Vinyals, O., & Dean, J. (2015). Distilling the knowledge in a neural net-
work. arXiv preprint arXiv:1503.02531.
7. Wang, K., Liu, Z., Lin, Y., Lin, J., & Han, S. (2019). HAQ: Hardware-aware auto-
mated quantization with mixed precision. In Proceedings of the IEEE/CVF Conference
on Computer Vision and Pattern Recognition (pp. 8612–8620). IEEE. doi: 10.1109/
CVPR.2019.00881.
8. Jeong, E., Oh, S., Kim, H., Park, J., Bennis, M., & Kim, S. L. (2018). Communication-
efficient on-device machine learning: Federated distillation and augmentation under
non-iid private data. arXiv preprint arXiv:1811.11479.
9. Macedo, D., Santos, D., Perkusich, A., & Valadares, D. C. G. (2023). Mobility-aware
federated learning considering multiple networks. Sensors (Basel), 23(14), 6286. http://
doi.org/10.3390/s23146286. PMID: 37514581; PMCID: PMC10386473.
Federated Learning-based Smart Transportation Solutions 133
10. Sivabalan, S., Dhamodharavadhani, S., & Rathipriya, R. (2020). Arbitrary walk with
minimum length based route identification scheme in graph structure for opportunistic
wireless sensor network. In Aboul Ella Hassanien & Ashraf Darwish (Eds.), Intelligent
Data-Centric Systems, Swarm Intelligence for Resource Management in Internet of
Things (pp. 47–63). Academic Press. ISBN 9780128182871. https://doi.org/10.1016/
B978-0-12-818287-1.00006-1.
11. Kulanthaiyappan, S., Settu, S., & Chellaih, C. (2020). Internet of vehicle: Effects of tar-
get tracking cluster routing in vehicle network. In 2020 6th International Conference
on Advanced Computing and Communication Systems (ICACCS) (pp. 951–956).
Coimbatore, India. http://doi.org/10.1109/ICACCS48705.2020.9074454.
12. Sivabalan, S., & Rathipriya, R. (2017). Slot scheduling Mac using energy efficiency in ad
hoc wireless networks. In 2017 International Conference on Inventive Communication
and Computational Technologies (ICICCT) (pp. 430–434). Coimbatore, India. http://
doi.org/10.1109/ICICCT.2017.7975234.
13. Shao, Z., Yang, H., Xiao, L., Su, W., & Xiong, Z. (2023). Energy and latency-aware
resource management for UAV-assisted mobile edge computing against jamming. In
GLOBECOM 2023–2023 IEEE Global Communications Conference (pp. 1848–1853).
Kuala Lumpur, Malaysia. http://doi.org/10.1109/GLOBECOM54140.2023.10437090.
14. Sivabalan, S., & Rathipriya, R. (2023). Efficient energy resource selection in home
area sensor networks using non swarm intelligence based discrete venus flytrap search
optimization algorithm. Wireless Personal Communications, 128, 249–265. https://doi.
org/10.1007/s11277-022-09953-y.
15. Liu, S., Yang, H., Xiao, L., Zheng, M., Lu, H., & Xiong, Z. (2024). Learning-based
resource management optimization for UAV-assisted MEC against jamming. IEEE
Transactions on Communications. http://doi.org/10.1109/TCOMM.2024.3374356.
16. Kain, R., & Sorour, S. (2022). Worker resource characterization under dynamic usage
in multi-access edge computing. In 2022 International Wireless Communications
and Mobile Computing (IWCMC) (pp. 1070–1075). Dubrovnik, Croatia. http://doi.
org/10.1109/IWCMC55113.2022.9824299.
17. Gao, Z., Yang, L., & Dai, Y. (2023, June 1). Large-scale computation offloading using
a multi-agent reinforcement learning in heterogeneous multi-access edge computing.
IEEE Transactions on Mobile Computing, 22(6), 3425–3443. http://doi.org/10.1109/
TMC.2022.3141080.
18. Santos, Á., Bernardino, J., & Correia, N. (2023). Automated application deployment
on multi-access edge computing: A survey. IEEE Access, 11, 89393–89408. http://doi.
org/10.1109/ACCESS.2023.3307023.
8 Application of Artificial
Intelligence and
Federated Learning in
Petroleum Processing
Abdelaziz El-hoshoudy
Abbreviations
INTRODUCTION
The petroleum industry, encompassing the exploration, extraction, refining, trans-
portation, and marketing of petroleum products, is a complex and critical sector for
the global economy. The petroleum industry, as a cornerstone of the global economy,
involves a series of intricate and interrelated processes, from the exploration of crude
oil to its final delivery as a variety of petroleum products (Singh, 2023). The integra-
tion of artificial intelligence (AI) and federated learning (FL) into this sector repre-
sents a paradigm shift, offering novel pathways to address longstanding challenges
related to efficiency, safety, and environmental sustainability. This exploration of
AI and FL’s application within petroleum processing elucidates their transformative
potential, focusing on operational optimization, predictive maintenance, and carbon
footprint reduction (Yussuf & Asfour, 2024). AI facilitates the optimization of vari-
ous petroleum industry operations through sophisticated algorithms that can analyze
vast data sets to predict outcomes, automate decision-making, and enhance the effi-
ciency of processes (Koroteev & Tekic, 2021). In exploration, AI algorithms interpret
seismic data to predict the likelihood of oil or gas presence, significantly reducing
the costs and environmental impact associated with drilling exploratory wells. In
refining, AI models optimize process parameters such as temperature and pressure
in real time, ensuring the optimal conversion of crude oil into high-value products
(Khaldi et al., 2023). One of the standout contributions of AI in this sector is the
advancement of predictive maintenance. By leveraging data collected from sensors
installed on equipment, AI models can predict failures before they occur, schedul-
ing maintenance only when necessary. This not only extends the life of equipment
but also minimizes downtime, thereby enhancing operational efficiency and safety.
Predictive maintenance exemplifies how AI can lead to substantial cost savings and
risk reduction in petroleum processing. Federated learning emerges as a revolution-
ary approach by enabling multiple stakeholders to collaboratively improve AI mod-
els without directly sharing sensitive or proprietary data (Rauniyar et al., 2024). In
the context of the petroleum industry, FL allows for the collective improvement of
models used in exploration, production, and refining, while ensuring compliance
with stringent data privacy regulations and corporate confidentiality policies. FL
facilitates the deployment of AI models that benefit from diverse data sources across
different geographic locations and operational environments. This is particularly
beneficial for real-time monitoring and anomaly detection, where models trained on
a wider array of data can more accurately identify potential issues, from equipment
malfunctions to unsafe operational conditions, thereby enhancing safety and reduc-
ing environmental risks.
Both AI and FL contribute to the petroleum industry’s efforts to reduce its carbon
footprint. By optimizing operations, these technologies reduce the energy consump-
tion and greenhouse gas emissions associated with petroleum processing. Moreover,
AI and FL can aid in carbon capture and storage (CCS) technologies, improving
their efficiency and enabling more sustainable petroleum processing practices.
While the benefits are substantial, the integration of AI and FL into petroleum pro-
cessing is not without challenges. Issues such as data quality, algorithm bias, the
need for skilled personnel, and cybersecurity risks pose significant hurdles (Aldoseri
et al., 2023). Additionally, the high initial investment and the complexity of inte-
grating these technologies into existing systems can be daunting for some operators
(Rath et al., 2024). The future direction of AI and FL in the petroleum industry is
geared toward overcoming these challenges through continued innovation, collabo-
ration, and regulation. As these technologies mature and their applications expand,
the petroleum industry is poised to become more efficient, safer, and more environ-
mentally sustainable. The ongoing digital transformation, powered by AI and FL,
is set to redefine the industry, promising a future where petroleum processing not
only meets the global energy demand but does so more responsibly and sustainably
(Ahmad et al., 2022).
Previous literature discusses the basis and concepts of FL. Chiaro et al. (2023)
introduced FL-Enhance, an innovative federated learning approach leveraging
conditional generative adversarial networks (cGANs). This method ensures robust
privacy protection, resisting differential privacy (DP) and model inversion attacks,
all while maintaining competitive model performance relative to traditional FL
methods. Jin et al. (2024) introduced FL-IIDS, a new IDS framework designed to
136 Artificial Intelligence Using Federated Learning
effectively tackle the issue of catastrophic forgetting. Agiollo et al. (2024) debuted
EneA-FL as an innovative serverless federated learning framework, distinguish-
ing itself with a sophisticated energy management component designed specifically
for clients operating under resource limitations. Greguric et al. (2024) explored the
implementation of federated learning within a setting characterized by mixed traf-
fic flow, incorporating connected and automated vehicles (CAVs). Rafi et al. (2024)
introduced a detailed survey of privacy and fairness concerns in the context of FL.
De Rango et al. (2023) reported the architecture and theoretical equations of feder-
ated learning in detail.
Federated learning in the context of petroleum processes involves leveraging dis-
tributed data sources across various oil rigs, refineries, or other facilities to improve
machine learning models while preserving data privacy and security. These equa-
tions illustrate the basic mechanics of federated learning in the context of petroleum
processes, where models are trained across distributed data sources while preserving
data privacy and security. Here’s a simplified equation representing the federated
learning process:
3. Aggregation Equation:
1
E
N
0t+1 = 0i (3)
N i =1 t +1
AI IN PETROLEUM PROCESSING
AI technologies, including machine learning, deep learning, and computer vision,
have been increasingly applied in the petroleum sector to analyze data, automate
processes, and make predictive decisions. The integration of artificial intelligence
into petroleum processing signifies a revolutionary shift towards more efficient, sus-
tainable, and safer operations within the oil and gas industry (Hussain et al., 2024).
AI encompasses a range of technologies, including machine learning, deep learning,
natural language processing, and robotics, which can be leveraged to optimize vari-
ous aspects of the petroleum value chain. Here, we delve into the critical applica-
tions, benefits, and challenges of AI in petroleum processing, shedding light on its
transformative impact.
Application of AI and FL in Petroleum Processing 137
Critical Predictive
Applications of AI Decentralized Maintenance for
in Petroleum Data Utilization Oil Rigs and
Processing Equipment
Reservoir
Benefits of AI in Preserving Data
Management and
Petroleum Privacy and
Production
Processing Security
Optimization
Improving
Resource
Refinery Safety
Efficiency
with FL
Collaborative
Innovation
Compliance with
Regulatory
Requirements
predictive approach ensures maintenance activities are only performed when neces-
sary, reducing downtime, extending equipment life, and saving costs associated with
unplanned maintenance and production losses. In addition, AI models can optimize
refining processes by continuously analyzing operational data and adjusting pro-
cessing parameters in real time. This optimization includes controlling the tempera-
ture, pressure, and chemical inputs to maximize yield, improve product quality, and
enhance energy efficiency. AI-driven process optimization leads to significant cost
savings and operational efficiencies. AI applications extend to improving safety and
environmental monitoring by employing sensors and computer vision to detect leaks,
hazardous conditions, or equipment failures (Pishgar et al., 2021). These technolo-
gies enable early detection and intervention, reducing the risk of accidents, minimiz-
ing environmental harm, and ensuring compliance with safety and environmental
regulations.
the potential of AI in this sector (Campion et al., 2022). The continued advance-
ment and integration of AI technologies promise to drive significant improvements
in petroleum processing, setting the stage for a more efficient, safe, and sustainable
industry. The effectiveness of AI is heavily dependent on the quality and quantity of
data. Inconsistent, incomplete, or poor-quality data can hinder the performance of
AI models (Gomaa et al., 2022; Munappy et al., 2022). Integrating AI technologies
with existing infrastructure and systems poses technical and operational challenges,
requiring significant investment and expertise. Increased reliance on AI and digi-
tal technologies raises cybersecurity concerns, necessitating robust security mea-
sures to protect sensitive data and operational technology (Abdel-Rahman, 2023).
The adoption of AI requires a workforce skilled in data science, machine learning,
and AI technologies, alongside ongoing training and development programs (Gouda
et al., 2022; Jain et al., 2023).
FIGURE 8.2 FL framework for oil/water layer identification based on dynamic weighted
fusion (Chena et al., 2021).
trained directly on distributed data sources while preserving data privacy and mini-
mizing latency, FL empowers the industry to unlock actionable insights, optimize
processes, and drive innovation collaboratively and securely.
and allowing for holistic insights that encompass the entire process chain. Petroleum
processing facilities are often geographically dispersed, with operations spanning
remote locations, offshore platforms, and refinery complexes. This geographical dis-
persion presents challenges in aggregating and analyzing data centrally. FL decen-
tralizes the training process, allowing models to be developed and updated directly
on-site or within the vicinity of data sources. This approach minimizes latency and
bandwidth constraints associated with transferring data to a centralized location for
analysis. The petroleum industry deals with highly sensitive and proprietary data,
including geological surveys, drilling logs, production metrics, and market intelli-
gence. Centralizing this data for analysis raises significant privacy and security con-
cerns, as it increases the risk of unauthorized access or breaches. FL addresses these
concerns by keeping data localized on devices or servers, ensuring that sensitive
information remains protected while still allowing for collaborative model training
and knowledge sharing. FL enables real-time model training and inference directly
on decentralized data sources, enhancing operational efficiency and agility in petro-
leum processing (Rane & Narvel, 2022). By leveraging FL, companies can develop
AI models that adapt to dynamic conditions, such as changing market demands, geo-
logical variations, or regulatory requirements. This capability empowers decision-
makers with timely insights and recommendations, enabling proactive responses to
emerging challenges and opportunities (Nguyen et al., 2022). FL offers scalability
and resilience advantages by distributing computational workload and training tasks
across a network of devices or servers. This distributed approach reduces the risk of
single points of failure and enhances the overall robustness of AI systems deployed
in petroleum processing. Additionally, FL facilitates the integration of new data
sources and sensors into existing models, allowing for continuous improvement and
adaptation over time (Beltrán et al., 2024).
while still retaining valuable data for analysis and research purposes. Regarding
data governance, FL establishes clear policies and procedures for managing data
throughout its lifecycle. Data governance frameworks define roles and responsi-
bilities, data classification criteria, retention periods, and data disposal protocols
to ensure consistent and compliant data handling practices. FL allows compliance
with regulations through updating Stay informed about relevant data privacy regula-
tions and ensure compliance with applicable laws and standards. Regulations such as
the General Data Protection Regulation (GDPR), California Consumer Privacy Act
(CCPA), and Health Insurance Portability and Accountability Act (HIPAA) impose
strict requirements for data protection and privacy, and non-compliance can result
in severe penalties. By adhering to these principles and implementing appropriate
technical and organizational measures, organizations can effectively preserve data
privacy and security, build trust with stakeholders, and mitigate the risks associated
with unauthorized access, data breaches, and regulatory non-compliance.
Real-Time Adaptability
FL facilitates the training and updating of AI models in real time, enabling rapid
adaptation to dynamic conditions within the petroleum processing environment.
This capability is particularly valuable in responding to fluctuating market demands,
changing regulatory requirements, and evolving operational challenges. Real-time
adaptability is a crucial aspect of any modern system, particularly in industries
like petroleum processing where conditions can change rapidly and unpredictably.
Federated learning offers a promising solution to this challenge by enabling the
training and updating of AI models directly on the devices or servers where the
data is generated, rather than relying on centralized data repositories. In the context
of petroleum processing, FL allows AI models to continuously learn and adapt to
dynamic conditions within the environment (Nguyen et al., 2021). FL facilitates rapid
response to market demands by allowing AI models to quickly adapt to fluctuating
market demands. For example, if there is a sudden increase in the demand for a par-
ticular petroleum product, FL allows the model to incorporate new data and adjust
its predictions or recommendations accordingly, ensuring optimal production and
distribution strategies. In addition, FL allows compliance with regulatory require-
ments in the petroleum industry which can change frequently and may vary depend-
ing on factors such as location, environmental concerns, and safety standards. FL
enables AI models to stay up-to-date with these regulations by continuously incor-
porating new data and adjusting their decision-making processes to ensure compli-
ance. Finally, FL allows addressing operational challenges in petroleum processing
environments which are inherently complex, with numerous variables that can affect
production efficiency, product quality, and safety. FL allows AI models to adapt in
real time to evolving operational challenges by learning from new data and updating
their algorithms accordingly. For example, if there is a sudden equipment malfunc-
tion or a change in raw material composition, FL enables the model to adjust its
parameters to optimize performance and minimize disruptions. The ability of FL to
facilitate real-time adaptability in petroleum processing can lead to improved effi-
ciency, flexibility, and responsiveness in operations. By continuously learning from
Application of AI and FL in Petroleum Processing 143
new data and updating their models on the fly, organizations can stay competitive in
a rapidly changing industry landscape while also ensuring compliance with regula-
tions and delivering value to customers.
Resource Efficiency
FL minimizes the need for extensive data transfer and centralization, resulting
in more efficient utilization of network bandwidth and computational resources.
This efficiency is especially beneficial in remote or offshore locations where con-
nectivity may be limited, allowing for on-device model training and inference
without reliance on constant internet connectivity. Resource efficiency is a critical
factor in any technological solution, especially in industries like petroleum pro-
cessing where operations often occur in remote or offshore locations with limited
connectivity. Federated learning presents a solution that minimizes the need for
144 Artificial Intelligence Using Federated Learning
Collaborative Innovation
FL fosters collaboration among different stakeholders in the petroleum industry,
including oil companies, service providers, research institutions, and regulatory
agencies. By enabling collective learning from decentralized data sources while
respecting data ownership and privacy constraints, FL accelerates innovation and
knowledge sharing across the industry ecosystem. Collaborative innovation repre-
sents a strategic approach that leverages the collective knowledge, resources, and
capabilities of various stakeholders to drive innovation and create value in ways that
would be challenging for any single entity to achieve independently. This concept is
crucial across industries and sectors, including technology, healthcare, education, and
Application of AI and FL in Petroleum Processing 145
technology for better collaboration will be key to realizing the full potential of col-
laborative innovation (Zhang et al., 2019).
their roles in maintaining compliance. Regular training sessions can keep everyone
updated on the latest regulations and best practices. Regulatory compliance is essen-
tial for businesses and organizations operating in various industries. Compliance
with regulations ensures that companies adhere to legal requirements set forth by
governments and regulatory bodies. While compliance efforts can sometimes be
seen as burdensome, they offer numerous benefits that ultimately contribute to the
success and sustainability of businesses (Griffith, 2015). Compliance with regula-
tory requirements is a foundational element of successful collaborative innovation.
It ensures that innovations not only meet legal standards but are also safe, reliable,
and trustworthy. While navigating the regulatory landscape can be complex, a pro-
active, informed approach to compliance can facilitate smoother project execution
and contribute to the long-term success and sustainability of collaborative innova-
tions. Benefits of regulatory compliance include: (1) Risk Mitigation: Compliance
reduces the risk of legal penalties, financial losses, and reputational damage that
can result from regulatory violations. (2) Market Access: Meeting regulatory stan-
dards is often a prerequisite for accessing certain markets or dealing with particular
customer segments. (3) Competitive Advantage: Demonstrating a commitment to
compliance can be a competitive differentiator, building trust with customers, part-
ners, and regulators. Federated learning emerges as a transformative approach to
harnessing artificial intelligence in petroleum processing, offering a decentralized,
privacy-preserving framework for data-driven decision-making, operational opti-
mization, and collaborative innovation. By leveraging the collective intelligence of
distributed data sources, FL holds immense promise for driving significant advance-
ments across various dimensions within the petroleum industry. FL’s decentralized
nature enables companies to collaborate effectively while respecting data privacy
and ownership, thereby overcoming traditional barriers to data sharing and collabo-
ration. This collaborative approach fosters a more open environment for innovation,
where stakeholders across the industry ecosystem can contribute their expertise and
insights without compromising sensitive information. Moreover, FL addresses criti-
cal concerns related to privacy, security, and regulatory compliance, ensuring that
data remains protected throughout the learning process. By adhering to strict pri-
vacy-preserving protocols and implementing robust security measures, FL enables
companies to derive actionable insights from their data while mitigating the risk
of unauthorized access or breaches. The potential benefits of FL in the petroleum
industry are vast. From optimizing production processes and predicting equipment
failures to improving environmental sustainability and reducing operational costs,
FL can drive efficiency gains and foster sustainable practices across the industry
(Bibri et al., 2024). Furthermore, FL has the potential to enhance the competitiveness
of companies operating in the petroleum sector. By enabling faster innovation cycles,
more informed decision-making, and the development of cutting-edge technologies,
FL empowers companies to stay ahead of the curve in a rapidly evolving market
landscape. In essence, Federated Learning represents a paradigm shift in how AI is
leveraged within the petroleum industry, offering a pathway to unlock new oppor-
tunities for efficiency, sustainability, and competitiveness. By embracing FL and its
collaborative ethos, companies can position themselves at the forefront of innova-
tion, driving positive change and unlocking value across the industry ecosystem.
148 Artificial Intelligence Using Federated Learning
and best practices for meeting safety and environmental regulations. Local mod-
els trained on regulatory compliance data can help refineries identify areas of non-
compliance, implement corrective actions, and streamline reporting processes. By
leveraging FL, refineries can collaborate on compliance initiatives while protecting
sensitive regulatory data and maintaining transparency with regulatory authorities.
Federated learning offers a powerful framework for improving refinery safety by
enabling collaborative model training, data sharing, and insights generation while
addressing privacy, security, and regulatory concerns. By harnessing the collective
intelligence of distributed data sources, refineries can enhance safety practices, miti-
gate risks, and foster a culture of continuous improvement to ensure the safety and
well-being of workers, communities, and the environment.
platforms, will help address challenges related to data quality, consistency, and avail-
ability in the petroleum industry. Research efforts focusing on explainable AI (XAI)
techniques will enable the development of models that provide transparent and inter-
pretable insights. Techniques such as model-agnostic interpretability methods and
attention mechanisms will enhance the explainability of AI models. Investment in
education and training programs tailored to the needs of the petroleum industry
will help bridge the talent gap. Collaborative efforts between academia, industry,
and government institutions can facilitate the development of skilled personnel with
expertise in both data science and petroleum engineering. Collaboration between
industry stakeholders and regulatory bodies is essential for developing regulatory
frameworks and standards that accommodate the use of AI and FL technologies in
the petroleum industry. Establishing guidelines for data privacy, security, and ethi-
cal AI will promote responsible deployment and adoption of these technologies. The
development of industry-specific AI solutions and platforms tailored to the unique
challenges and requirements of the petroleum industry will drive innovation and
adoption. Collaborative initiatives among industry players, startups, and technology
providers will facilitate the development and deployment of these solutions.
CONCLUSION
The integration of artificial intelligence and federated learning marks a signifi-
cant milestone in the evolution of the petroleum industry, offering transforma-
tive solutions to longstanding challenges in efficiency, safety, and environmental
sustainability. This chapter has explored the potential applications of FL within
petroleum processing, highlighting its role in optimizing operations, predictive
maintenance, and reducing carbon footprint. By leveraging AI-driven analytics
and FL’s collaborative approach, the industry can achieve higher productivity,
safety standards, and environmental stewardship. AI’s capabilities extend across
various facets of petroleum processing, from exploration and production opti-
mization to predictive maintenance and environmental monitoring. Through
sophisticated algorithms and data-driven insights, AI enables refineries to oper-
ate more efficiently, minimize downtime, and reduce emissions. However, the full
potential of AI is unlocked when combined with FL, which enables collaborative
model training without compromising sensitive data. FL’s decentralized learn-
ing mechanism offers several advantages, including privacy-preserving model
training, real-time adaptability, and resource efficiency. By harnessing the col-
lective intelligence of distributed data sources, FL facilitates the seamless inte-
gration of insights from various processing plants, leading to more accurate and
globally applicable models. Case studies have demonstrated FL’s efficacy in pre-
dictive maintenance, reservoir management, safety monitoring, and regulatory
compliance. Despite the promises of AI and FL, challenges persist, including
data quality, interpretability, talent gap, and regulatory compliance. However,
these challenges present opportunities for future innovation and collaboration.
Solutions such as advanced data integration, explainable AI, education, regula-
tory frameworks, and industry-specific AI platforms can address these challenges
and drive the widespread adoption of AI and FL in petroleum processing. Looking
152 Artificial Intelligence Using Federated Learning
ahead, the future of AI and FL in the petroleum industry is bright, with continued
advancements, collaboration, and regulation paving the way for a more efficient,
safer, and sustainable industry. The ongoing digital transformation, fueled by AI
and FL, promises to redefine petroleum processing, ensuring that it meets global
energy demands while minimizing its environmental footprint. By embracing AI
and FL technologies, the petroleum industry is poised to usher in a new era of
innovation and progress, shaping a more resilient and responsible energy land-
scape for generations to come.
REFERENCES
Abdel-Rahman, M. (2023). Advanced cybersecurity measures in IT service operations and
their crucial role in safeguarding enterprise data in a connected world. Eigenpub
Review of Science and Technology, 7(1), 138–158.
Agiollo, A., Bellavista, P., Mendula, M., & Omicini, A. (2024). EneA-FL: Energy-aware orchestra-
tion for serverless federated learning. Future Generation Computer Systems, 154, 219–234.
Ahmad, T., Zhang, D., Huang, C., Zhang, H., Dai, N., Song, Y., & Chen, H. (2021). Artificial
intelligence in sustainable energy industry: Status Quo, challenges and opportunities.
Journal of Cleaner Production, 289, 125834.
Ahmad, T., Zhu, H., Zhang, D., Tariq, R., Bassam, A., Ullah, F., AlGhamdi, A. S., &
Alshamrani, S. S. (2022). Energetics systems and artificial intelligence: Applications of
industry 4.0. Energy Reports, 8, 334–361.
Aldoseri, A., Al-Khalifa, K. N., & Hamouda, A. M. (2023). Re-thinking data strategy and
integration for artificial intelligence: Concepts, opportunities, and challenges. Applied
Sciences, 13(12), 7082.
Asad, M. (2023). “Security Management in Cloud Computing for healthcare Data,” Dissertation,
pp. 77. DiVA, id: diva2:1810709 https://www.diva-portal.org/smash/record.jsf?pid=diva2
%3A1810709&dswid=-7919
Ayvaz, S., & Alpay, K. (2021). Predictive maintenance system for production lines in manu-
facturing: A machine learning approach using IoT data in real time. Expert Systems
with Applications, 173(6), 114598. doi: 10.1016/j.eswa.2021.114598.
Beltrán, E. T. M., Gómez, Á. L. P., Feng, C., Sánchez, P. M. S., Bernal, S. L., Bovet, G., Pérez,
M. G., Pérez, G. M., & Celdrán, A. H. (2024). Fedstellar: A platform for decentralized
federated learning. Expert Systems with Applications, 242, 122861.
Bibri, S. E., Krogstie, J., Kaboli, A., & Alahi, A. (2024). Smarter eco-cities and their leading-
edge artificial intelligence of things solutions for environmental sustainability: A com-
prehensive systematic review. Environmental Science and Ecotechnology, 19, 100330.
Boobalan, P., Ramu, S. P., Pham, Q.-V., Dev, K., Pandya, S., Maddikunta, P. K. R., Gadekallu,
T. R., & Huynh-The, T. (2022). Fusion of federated learning and industrial Internet of
Things: A survey. Computer Networks, 212, 109048.
Campion, A., Gasco-Hernandez, M., Jankin Mikhaylov, S., & Esteve, M. (2022). Overcoming
the challenges of collaboratively adopting artificial intelligence in the public sector.
Social Science Computer Review, 40(2), 462–477.
Capobianco, N., Basile, V., Loia, F., & Vona, R. (2021). Toward a sustainable decommission-
ing of offshore platforms in the oil and gas industry: A PESTLE analysis. Sustainability,
13(11), 6266.
Chena, B., Zenga, X., & Zhang, W. (2021). Federated learning for cross-block oil-water layer
identification. arXiv preprint arXiv:2112.14359.
Chiaro, D., Prezioso, E., Ianni, M., & Giampaolo, F. (2023). FL-Enhance: A federated learn-
ing framework for balancing non-IID data with augmented and shared compressed
samples. Information Fusion, 98, 101836.
Application of AI and FL in Petroleum Processing 153
de Castro Ferreira, J. P. (2023). A Federated Learning Platform for High Speed Distributed
Data Streams. FAUP Organization. https://sigarra.up.pt/faup/en/web_base.gera_
pagina?p_pagina=1004586.
De Rango, F., Guerrieri, A., Raimondo, P., & Spezzano, G. (2023). HED-FL: A hierarchical,
energy efficient, and dynamic approach for edge Federated Learning. Pervasive and
Mobile Computing, 92, 101804.
El-hoshoudy, A., Ahmed, A., Gomaa, S., & Abdelhady, A. (2022). An artificial neural net-
work model for predicting the hydrate formation temperature. Arabian Journal for
Science and Engineering, 1–10.
Gomaa, S., Soliman, A. A., Nasr, K., Emara, R., El-Hoshoudy, A., & Attia, A. M. (2022).
Development of artificial neural network models to calculate the areal sweep efficiency
for direct line, staggered line drive, five-spot, and nine-spot injection patterns. Fuel,
317, 123564.
Gouda, A., Gomaa, S., Attia, A., Emara, R., Desouky, S., & El-hoshoudy, A. (2022).
Development of an artificial neural network model for predicting the dew point pres-
sure of retrograde gas condensate. Journal of Petroleum Science and Engineering, 208,
109284.
Gregurić, M., Vrbanić, F., & Ivanjko, E. (2024). Impact of federated deep learning on vehi-
cle-based speed control in mixed traffic flows. Journal of Parallel and Distributed
Computing, 186, 104812.
Griffith, S. J. (2015). Corporate governance in an era of compliance. William & Mary Law
Review, 57, 2075.
Himeur, Y., Ghanem, K., Alsalemi, A., Bensaali, F., & Amira, A. (2021). Artificial intelli-
gence based anomaly detection of energy consumption in buildings: A review, current
trends and new perspectives. Applied Energy, 287, 116601.
Huseby, A. B., & Haavardsson, N. F. (2009). Multi-reservoir production optimization.
European Journal of Operational Research, 199(1), 236–251.
Hussain, M., Alamri, A., Zhang, T., & Jamil, I. (2024). Application of artificial intelligence
in the oil and gas industry. In Engineering Applications of Artificial Intelligence (pp.
341–373). Springer.
Jain, P., Tripathi, V., Malladi, R., & Khang, A. (2023). Data-driven artificial intelligence (AI)
models in the workforce development planning. In Designing Workforce Management
Systems for Industry 4.0 (pp. 159–176). CRC Press.
Jin, Z., Zhou, J., Li, B., Wu, X., & Duan, C. (2024). FL-IIDS: A novel federated learning-
based incremental intrusion detection system. Future Generation Computer Systems,
151, 57–70.
Junaid, M., Zhang, Q., Cao, M., & Luqman, A. (2023). Nexus between technology enabled
supply chain dynamic capabilities, integration, resilience, and sustainable performance:
An empirical examination of healthcare organizations. Technological Forecasting and
Social Change, 196, 122828.
Khaldi, M. K., Al-Dhaifallah, M., & Taha, O. (2023). Artificial intelligence perspectives:
A systematic literature review on modeling, control, and optimization of fluid catalytic
cracking. Alexandria Engineering Journal, 80, 294–314.
Khan, L. U., Saad, W., Han, Z., Hossain, E., & Hong, C. S. (2021). Federated learning for inter-
net of things: Recent advances, taxonomy, and open challenges. IEEE Communications
Surveys & Tutorials, 23(3), 1759–1799.
Konečný, J., McMahan, H. B., Yu, F. X., Richtárik, P., Suresh, A. T., & Bacon, D. (2016).
Federated learning: Strategies for improving communication efficiency. arXiv preprint
arXiv:1610.05492.
Koroteev, D., & Tekic, Z. (2021). Artificial intelligence in oil and gas upstream: Trends, chal-
lenges, and scenarios for the future. Energy and AI, 3, 100041.
154 Artificial Intelligence Using Federated Learning
Salem, K. G., Tantawy, M. A., Gawish, A. A., Gomaa, S., & El-hoshoudy, A. (2023).
Nanoparticles assisted polymer flooding: Comprehensive assessment and empirical
correlation. Geoenergy Science and Engineering, 226, 211753.
Shah, M., Kshirsagar, A., & Panchal, J. (2022). Applications of Artificial Intelligence (AI)
and Machine Learning (ML) in the Petroleum Industry. CRC Press.
Siddique, A. A., Alasbali, N., Driss, M., Boulila, W., Alshehri, M. S., & Ahmad, J. (2024).
Sustainable collaboration: Federated learning for environmentally conscious forest fire
classification in Green Internet of Things (IoT). Internet of Things, 25, 101013.
Singh, B. (2023). Federated learning for envision future trajectory smart transport system
for climate preservation and smart green planet: Insights into global governance and
SDG-9 (Industry, Innovation and Infrastructure). National Journal of Environmental
Law, 6(2), 6–17.
Wang, Q., Chen, D., Li, M., Li, S., Wang, F., Yang, Z., Zhang, W., Chen, S., & Yao, D. (2023).
A novel method for petroleum and natural gas resource potential evaluation and predic-
tion by support vector machines (SVM). Applied Energy, 351, 121836.
Yussuf, R. O., & Asfour, O. S. (2024). Applications of artificial intelligence for energy effi-
ciency throughout the building lifecycle: An overview. Energy and Buildings, 113903.
Zelenika, I., & Pearce, J. M. (2014). Innovation through collaboration: Scaling up solu-
tions for sustainable development. Environment, Development and Sustainability, 16,
1299–1316.
Zhang, W., Jiang, Y., & Zhang, W. (2019). Capabilities for collaborative innovation of tech-
nological alliance: A knowledge-based view. IEEE Transactions on Engineering
Management, 68(6), 1734–1744.
Zhuang, W., Chen, C., & Lyu, L. (2023). When foundation model meets federated learning:
Motivations, challenges, and future directions. arXiv preprint arXiv:2306.15546.
9 Artificial Intelligence
Using Federated Learning
Manjushree Nayak and Debasish Padhi
INTRODUCTION
Artificial intelligence (AI) has transformed industries by enabling machines to learn
from data and make decisions autonomously. One innovative approach within AI is
federated learning, a technique that facilitates collaborative model training without
sharing raw data. This method addresses crucial issues like data privacy, minimiza-
tion, and access control, making it especially valuable in scenarios where central
data storage is impractical or poses privacy risks (Abadi et al., 2016).
Federated learning operates by training local models on diverse datasets held by
individual nodes, with only model parameters exchanged to create a global model.
Unlike traditional centralized machine learning, federated learning eliminates the
need to aggregate data in one location, thereby reducing privacy concerns associated
with data sharing. This decentralized training approach comes in various forms:
horizontal federated learning for similar datasets, vertical federated learning for
complementary datasets, and federated transfer learning for leveraging pre-trained
models.
The applications of federated learning are broad and impactful. In transportation,
autonomous vehicles utilize federated learning to improve safety by minimizing
data transfers and accelerating learning processes. Industries embracing Industry 4.0
benefit from federated learning’s privacy-preserving algorithms, ensuring data con-
fidentiality while enhancing operational efficiency. In healthcare, federated learning
enables collaborative AI model training across multiple medical institutions without
compromising patient privacy, leading to advancements in disease diagnosis and
treatment.
Federated learning’s capability to train AI models on decentralized data sources
is reshaping AI training methodologies. By processing data locally and tapping into
diverse information from various devices and sensors, federated learning offers a
secure and efficient means to leverage AI’s power without compromising privacy or
data security. As organizations prioritize data protection and regulatory compliance,
federated learning emerges as a crucial tool in advancing AI technologies across
sectors.
Federated learning represents a significant shift in AI training methods by
enabling collaborative model training while safeguarding data privacy and security.
Its applications across industries highlight its importance in driving innovation and
overcoming challenges associated with traditional centralized machine learning. As
AI evolves, federated learning stands out as a key enabler for unlocking AI’s full
potential in a privacy-conscious world.
The working of federated learning (FL) involves a decentralized and collab-
orative model training process:
LITERATURE REVIEW
Federated learning is a distributed machine learning approach that aims to preserve
privacy by keeping data locally while utilizing fragmented data and protecting cli-
ent privacy (Carl Smestad et al., 2023). FL was introduced in 2017 as a promising
framework for distributed machine learning that trains models without sharing local
data, thus ensuring user privacy by sharing unique data distribution properties (Attia
Qammar et al., 2022). The decentralized nature of FL allows clients to train inter-
mediate models on their devices with locally stored data, contributing to the col-
laborative building of a global model without compromising individual data privacy
(Liming Zhu et al., 2023).
One critical aspect of FL is the integration of blockchain technology to enhance
security and privacy. Blockchain has been identified as a solution to potential secu-
rity and privacy attacks in traditional federated learning, offering characteristics that
provide a secure environment for FL systems (Attia Qammar et al., 2022). By lever-
aging blockchain, FL systems can address challenges related to the disclosure of
private information, unreliable uploading of model parameters, and communication
costs, among others (Attia Qammar et al., 2022).
Client selection in federated learning is another crucial area of research. Random
client selection in FL can negatively impact learning performance due to various rea-
sons, leading researchers to explore client selection schemes that address challenges
such as heterogeneity, resource allocation, communication costs, and fairness (Carl
Smestad et al., 2023). Evaluating the impact of unsuccessful clients and gaining a
theoretical understanding of fairness in FL are highlighted as beneficial improve-
ments in client selection mechanisms (Jingyue Li et al., 2023).
and dynamic communication network areas (Jones et al., 2019; Chen et al., 2022).
Traditional AI models often require users to share personal data with a central sys-
tem for learning purposes. A major concern with such approaches revolves around
the privacy of sensitive user data. Federated learning proves highly effective in sce-
narios where decision-making relies on extensive data distributed across multiple
training nodes, while also addressing privacy and security concerns (Li et al., 2021).
Machine learning models typically leverage data from various sources to make pre-
dictions. However, due to constraints such as bandwidth limitations, security consid-
erations, and storage capacity, transmitting raw data to a central location becomes
impractical. FL functions as a distributed learning model, preserving data privacy,
enabling efficient utilization of collected raw data, and transmitting it to a central
location. FL also plays a significant role in the development of smart cities, as dis-
cussed by researchers in recent studies (Zhang et al., 2023). Policymakers in smart
cities can utilize FL to transmit sensitive data collected from IoT devices for the
efficient operation of critical services. The FL framework allows users to access data
without compromising the privacy of others. Ultimately, the refined global model
generated by the system is distributed to all users, who then download the updated
global model and use local processing to enhance performance on their devices.
OVERVIEW
In federated learning, several styles and equations are employed to ease model train-
ing across distributed devices while conserving data sequestration.
Then are some commonly used methods and associated equations, along with an
extension of the handled information.
federated averaging
Federated averaging is a commonly used method in federated learning where local
model updates from participating devices are aggregated to update the global model.
The federated averaging can be expressed as:
1
E
N
0t +1 = wi 0i
N i =1
where:
0 t+1 represents the updated global model parameters.
N denotes the total number of participating devices.
0i signifies the model parameters of the ith device
wi indicates the weight assigned to the model update from the ith device
secUre aggregation
Secure aggregation ensures that model updates from participating devices are aggre-
gated in a privacy-preserving manner, safeguarding sensitive information. Secure
aggregation often utilizes cryptographic techniques such as homomorphic encryp-
tion or multiparty computation to aggregate encrypted model updates without reveal-
ing individual contributions.
160 Artificial Intelligence Using Federated Learning
differential Privacy
Differential privacy is a privacy-preserving mechanism that introduces noise to
individual data samples or model updates to prevent sensitive information leakage.
Adding Gaussian noise to model updates for achieving differential privacy can be
represented as:
~
0 i = 0i + N(0, s 2 )
where:
0~i denotes the perturbed model update.
0i represents the original model update from the ith device.
N(0,a2) signifies Gaussian noise with mean 0 and variance
share a small user population due to geographical constraints. FTL utilizes transfer
learning, a technique enabling the application of knowledge from one domain to
another, to generate solutions for the combined dataset with distinct features (Pan
and Yang, 2010). This approach goes beyond traditional federated learning methods,
addressing challenges posed by diverse feature spaces and ensuring more effective
collaboration between entities with disparate data distributions, ultimately enhanc-
ing the adaptability of AI models (Chen et al., 2021).
approach facilitates joint model training while preserving data decentralization. The
security definition in HFL assumes an honest but curious server, acknowledging intru-
sion capability limited to hosted data participants (Kairouz et al., 2019a; Smith et al.,
2021). By accommodating variations in sample size while sharing feature spaces,
HFL emerges as a strategic solution, fostering effective collaboration and model
development across organizations with similar business, as shown in Figure 9.3.
APPLICATIONS
In sectors such as finance, sales, and various industries where data aggregation for
ML model training faces challenges like data security, privacy protection, and intel-
lectual property rights, federated learning emerges as a promising and innovative
Artificial Intelligence Using Federated Learning 163
modeling mechanism (Yang et al., 2019a; Li et al., 2020). Machine learning meth-
ods enable customer-specific services like product recommendations and sales
assistance by utilizing crucial data elements such as users’ buying power, personal
preferences, and product attributes (Nayak and Barman, 2022; Bishop, 2006; Hastie
et al., 2009). In practical applications, these data elements might be distributed
across different departments or companies. This situation presents two primary
challenges: overcoming data walls between entities like banks, social networking
sites, and e-commerce platforms, and addressing the issues of traditional, heteroge-
neous data that cannot be easily handled by conventional ML approaches (Caruana,
1997; Domingos, 2012).
Standard machine learning methods struggle to resolve these challenges, hin-
dering the broader acceptance and utilization of AI. Federated and transferable
learning offer solutions to these issues. Federated learning facilitates model con-
struction for all involved parties without the need to aggregate company data,
ensuring data security and privacy and providing personalized services to cus-
tomers (McMahan et al., 2017a; Li et al., 2020). Simultaneously, transfer learning
addresses data heterogeneity and overcomes the limitations of conventional AI
approaches (Pan and Yang, 2010; Weiss et al., 2016). This approach allows the
creation of a cross-company, cross-data, and cross-domain big data and artificial
intelligence ecosystem using federated learning. The federated learning architec-
ture enables querying multiple databases without exposing any data, enhancing
privacy (Yang et al., 2019a).
In the financial sector, federated learning can address risks associated with mul-
tiparty borrowing, a historical source of risk in banking, by identifying individu-
als involved in such activities without disclosing user lists between banks (Huang
et al., 2021). Encrypted federated learning methods can secure sensitive information
while revealing critical insights. In the realm of smart healthcare, federated learning
holds great potential (Liang et al., 2020). Despite the confidentiality and sensitiv-
ity of medical datasets, their isolated existence in various medical institutions and
hospitals poses a challenge for comprehensive data gathering. Federated learning,
combined with transfer learning, emerges as an effective strategy to enhance ML
algorithm efficiency by allowing medical institutions to collaborate, share data, and
fill gaps in information (Sheller et al., 2020). Federated transfer learning becomes
crucial for advancing smart healthcare and elevating human healthcare to new levels
of performance (Rajkomar et al., 2018).
methods are imperative to mitigate these risks, ensuring that refined model param-
eters do not compromise confidentiality (Shokri et al., 2015). Addressing privacy
issues in FL requires a delicate balance between collaborative model training and
protecting individual data, necessitating ongoing advancements in encryption tech-
niques and privacy-preserving technologies to foster trust and security in decentral-
ized machine learning paradigms (Nayak and Narain, 2020a).
Security
Security challenges in federated learning include model poisoning, where malicious
participants may inject poisoned data or model updates, compromising the global
model’s integrity (Bagdasaryan et al., 2018). This threat underscores the importance
of robust model validation mechanisms. Communication security poses risks during
model update transmission between clients and the central server (Hardy et al., 2017).
Protecting against eavesdropping and maintaining communication confidentiality is
complex, requiring encryption and secure communication protocols. Implementing
measures to detect and mitigate model poisoning, coupled with stringent communi-
cation security protocols, is essential for fortifying FL against adversarial attacks,
ensuring the trustworthiness of the collaborative learning process and the integrity
of the resultant global model.
Diversity of Data
In federated learning, diversity in data manifests through variations in data distri-
bution, quality, and characteristics across different client devices (Kairouz et al.,
2019a). Managing the complexities arising from diverse datasets poses a challenge,
as models must exhibit robustness across heterogeneous data sources. The challenge
lies in reconciling disparities in the types, scales, and representations of data among
clients. Strategies to ensure model resilience involve techniques such as weighted
aggregation to account for varying data contributions (Li et al., 2020). Addressing
this diversity is pivotal for FL’s success, requiring continuous advancements in algo-
rithmic approaches that can adapt and generalize effectively amidst the inherent
heterogeneity within the decentralized learning framework.
Communication Overlap
Communication overhead is a critical challenge in federated learning, encompass-
ing network latency and bandwidth constraints (Chen et al., 2021). Network latency
introduces delays in communication between the central server and client devices,
impacting the efficiency of model updates. This challenge is particularly pronounced
in real-time applications where timely responses are crucial. Bandwidth constraints
pose another issue, especially when handling large model updates or extensive
datasets (Bonawitz et al., 2017). Transmitting such data strains network bandwidth,
becoming especially problematic for resource-constrained devices. Mitigating these
challenges requires optimizing communication protocols, exploring edge comput-
ing solutions, and implementing compression techniques to minimize the impact
of communication overhead on the overall performance of the federated learning
process.
Artificial Intelligence Using Federated Learning 165
Resource Limitations
Resource limitations in federated learning are notably pronounced in edge device.
Extending FL to these devices, characterized by limited computational resources,
introduces challenges in optimizing model updates and learning processes. The con-
strained nature of edge devices necessitates the development of lightweight models,
efficient communication protocols, and strategies to mitigate computational burdens
during local training (Li et al., 2019). Balancing the collaborative learning objec-
tives with the resource constraints of edge devices requires innovative solutions such
as edge-friendly algorithms, compression techniques, and federated optimization
approaches tailored for low-power and resource-constrained environments, ensuring
the feasibility and effectiveness of federated learning on the edge.
Scalability
Scalability in federated learning confronts challenges, particularly when expanding
to a larger participant base (Smith et al., 2021). As the number of clients increases,
coordinating model updates and efficiently aggregating information becomes intri-
cate. The sheer scale introduces communication overhead, potentially impacting
the responsiveness and efficiency of the learning process. Effective coordination
demands scalable algorithms, optimized communication protocols, and strategies
166 Artificial Intelligence Using Federated Learning
Future
The future of federated learning in the realm of artificial intelligence holds signifi-
cant promise and potential for revolutionizing collaborative machine learning while
preserving data privacy. Here are key insights from the provided sources regarding
the future of federated learning:
Future Applications
The future of federated learning is poised to witness a surge in new applications
leveraging FL, enhancing user experiences in unprecedented ways. Applications like
self-driving connected cars can utilize FL to make safer decisions by leveraging col-
lective data from similar scenarios.
Artificial Intelligence Using Federated Learning 167
CASE STUDIES
Healthcare
In healthcare, FL empowers collaborative efforts among hospitals to enhance pre-
dictive models for disease diagnosis and treatment recommendations (Rieke et al.,
2020). Utilizing this approach, institutions can construct models predicting patient
outcomes and also tailoring treatment plans. Crucially, federated learning gives
safeguards to patient privacy by allowing institutions to share insights without
compromising sensitive data (Sheller et al., 2020). This privacy-compliant method-
ology optimizes healthcare decision-making, fostering a collective intelligence that
improves overall patient care, as shown in Figure 9.4.
Smart Cities
In smart city development, federated learning enables collaborative initiatives among
diverse municipal agencies to elevate services and infrastructure through AI (Dinh
et al., 2019). This methodology, when applied, also refines urban functionalities like
traffic management, public transportation scheduling, and energy consumption pre-
dictions. Federated learning ensures the preservation of data privacy for each agency
involved, fostering a secure and efficient exchange of insights (Zhao et al., 2021). By
optimizing these critical aspects of urban living, federated learning empowers cities
Finance
In the financial sector, federated learning facilitates collaborative initiatives as dis-
parate banks and financial institutions unite to fortify fraud detection models
(Bortolameotti et al., 2019). By employing federated learning, a potent fraud detection
system evolves, drawing insights from diverse sources without compromising the con-
fidentiality of sensitive customer information (Yang et al., 2020b). This decentralized
approach allows the amalgamation of data without the necessity of sharing individual
client details, ensuring stringent privacy standards. Consequently, this federated learn-
ing methodology enhances the collective resilience of fraud detection systems across
the financial landscape, fortifying the industry against evolving threats while preserv-
ing the integrity of client data within each contributing institution as shown in figure.
Internet of Things
In the realm of edge devices and IoT, federated learning fosters collaboration among
smart devices, including smartphones and IoT devices, to amplify local AI capa-
bilities (Kairouz et al., 2019a). This innovative approach allows for the enhance-
ment of speech recognition, image processing, and other AI applications directly on
edge devices. Notably, federated learning achieves this without the need to transmit
sensitive data to a centralized server, preserving user privacy and security (Yang
et al., 2018). By distributing the learning process across decentralized devices, feder-
ated learning optimizes the efficiency of local AI applications, ensuring a seamless
user experience while upholding the confidentiality of individual data in the rapidly
expanding landscape of interconnected devices, as shown in Figure 9.7.
Artificial Intelligence Using Federated Learning 169
Education
In education, federated learning facilitates collaboration among diverse educational
institutions aiming to craft personalized learning models for students (Smith et al.,
2020a). This innovative approach utilizes federated learning to construct models that
dynamically adapt to individual learning styles. Crucially, this adaptation occurs
without compromising the privacy of student data (Hard et al., 2021). By distribut-
ing the learning process across institutions and respecting data privacy, federated
learning ensures the creation of effective and tailored educational experiences. This
collaborative methodology not only enhances the quality of personalized learning
but also upholds the confidentiality of student information, offering a cutting-edge
solution to meet the evolving needs of diverse learners in an interconnected educa-
tional landscape.
Telecommunications
Within the telecommunications sector, federated learning revolutionizes collabora-
tion as telecom companies join forces to refine network optimization and predictive
maintenance models (Abdelkhalek et al., 2020). Employing federated learning, this
scenario enables a heightened accuracy in predicting network failures and optimiz-
ing data traffic across diverse regions (Jiang et al., 2021). A crucial aspect is that fed-
erated learning achieves these improvements without jeopardizing user data privacy.
By decentralizing the learning process, telecom companies can collectively enhance
the reliability and efficiency of their networks, ensuring a seamless user experience
while upholding the stringent standards of privacy and security. This collaborative
approach marks a transformative leap in the evolution of telecommunications infra-
structure and services.
CONCLUSION
Federated learning stands as a transformative paradigm within the realm of artificial
intelligence, fostering collaborative innovation across industries while simultane-
ously addressing the paramount concerns of privacy and data security (McMahan
et al., 2017a). This decentralized learning approach represents a revolutionary force,
allowing multiple entities to collectively enhance models without the necessity of
sharing raw data. This unique approach strikes a nuanced balance between leverag-
ing collective intelligence for advancement and preserving individual privacy rights.
Collaboratively refining machinery maintenance processes without compromising
sensitive data allows industries to minimize downtime and improve overall equip-
ment efficiency. This translates into a more sustainable and cost-effective approach
to manufacturing, highlighting the transformative influence of federated learning on
industrial processes. Edge devices and the Internet of Things also witness substantial
benefits from federated learning (Kairouz et al., 2019a). By distributing the learning
process across devices, federated learning optimizes local AI capabilities without the
need to transmit sensitive data to centralized servers. This ensures efficient speech
recognition, image processing, and other AI applications directly on edge devices,
contributing to a seamless user experience while respecting user privacy, a crucial
factor in the era of interconnected devices. Telecommunications undergo a trans-
formative leap with the implementation of federated learning (Abdelkhalek et al.,
2020). Telecom companies collaboratively improve network optimization and pre-
dictive maintenance models, enhancing the accuracy of predicting network failures
and optimizing data traffic across diverse regions (Nayak et al., 2023). Crucially, this
is achieved without compromising user data privacy, resulting in a more reliable and
efficient telecommunications infrastructure that caters to the evolving needs of users
while upholding stringent standards of privacy and security.
Federated learning not only propels the development of more accurate and effi-
cient models but also underscores the significance of respecting individual privacy
in the pursuit of collective intelligence (Yang et al., 2019a). As we navigate the future
of AI, federated learning represents a pivotal step towards a more collaborative,
secure, and ethically grounded approach to artificial intelligence, shaping a future
172 Artificial Intelligence Using Federated Learning
REFERENCES
Abadi, M., et al. (2016). “TensorFlow A System for Largescale Machine Knowledge.” In
Proceedings of the 12th USENIX Conference on Operating Systems Design and
Performance (OSDI). USENIX Association.
Abdelkhalek, N., et al. (2020). “Federated Learning in Industrial Wireless Networks
an Overview, Taxonomy, and Disquisition Directions.” IEEE Deals on Industrial
Informatics, 16(3), 1802–1810.
Bagdasaryan, E., et al. (2018). “How to Backdoor Federated Learning.” arXiv preprint
arXiv1807.00459.
Bishop, C.M. (2006). Pattern Recognition and Machine Knowledge. Springer.
Bonawitz, K., et al. (2017). “Practical Secure Aggregation for Federated Learning on User-
Held Data.” arXiv preprint arXiv1611.04482.
Bortolameotti, R., et al. (2019). “Federated Learning for Insulation: Conserving IoT
Analytics.” IEEE Internet of Goods Journal, 6(2), 3702–3713.
Caruana, R. (1997). “Multitask Learning.” Machine Knowledge, 28(1), 41–75.
Chen, C.Z., Liao, W., Hua, K., Lu, C., & Yu, W. (2021). “Towards Asynchronous
Federated Learning for Heterogeneous Edge-Powered Internet of Things.” Digital
Communications and Networks, 7(3), 317–326. ISSN 2352-8648, https://doi.
org/10.1016/j.dcan.2021.04.001. (https://www.sciencedirect.com/science/article/pii/
S2352864821000195)n
Chen, D., et al. (2022). “Deep Knowledge-Predicated Resource Operation in 6G and Beyond
a Comprehensive Survey.” IEEE Network, 36(1), 136–142.
Chen, M., et al. (2021). “Federated Transfer Learning for Cross: Sphere Recommendation.”
IEEE Deals on Neural Networks and Learning Systems, 32(3), 921–934.
Dinh, H.T., et al. (2019). “Federated Learning Challenges, Styles, and Future Directions.”
IEEE Deals on Arising Motifs in Computational Intelligence, 4(3), 288–298.
Domingos, P. (2012). “A numerous Useful Goods to Know About Machine Learning.”
Dispatches of the ACM, 55(10), 78–87.
Hard, A., et al. (2021). “Federated Learning Challenges, Styles, and Future Directions.” IEEE
Deals on Arising Motifs in Computational Intelligence, 5(4), 264–279.
Hardy, S., Henecka, W., Ivey-Law, H., Nock, R., Patrini, G., Smith, G., & Thorne, B.
(2017). Private Federated Learning on Vertically Partitioned Data via Entity
Resolution and Additively Homomorphic Encryption. https://api.semanticscholar.org/
CorpusID:26233593
Hastie, T., et al. (2009). The Rudiments of Statistical Learning Data Mining, Inference, and
Prophecy. Springer.
Huang, Y., et al. (2021). “Secure Federated Learning with an Untrusted Central Garçon.”
arXiv preprint arXiv2102.05580.
Jiang, B., et al. (2021). “Edge Intelligence in 6G Openings and Challenges.” IEEE Network,
35(1), 24–31.
Jones, C., et al. (2019). “Machine Knowledge for Wireless Communication Systems a
Tutorial.” IEEE Dispatches Checks & Tutorials, 21(4), 3039–3071.
Kairouz, P., et al. (2019a). “Advances and Open Problems in Confederated Knowledge.” arXiv
preprint arXiv1912.04977.
Artificial Intelligence Using Federated Learning 173
Li, J., Meland, P.H., Notland, J.S., Storhaug, A., & Tysse, J.H. (2023). “Evaluating the
Impact of ChatGPT on Exercises of a Software Security Course.” 2023 ACM/IEEE
International Symposium on Empirical Software Engineering and Measurement
(ESEM), New Orleans, LA, USA, pp. 1–6, doi: 10.1109/ESEM56168.2023.10304857.
Li, W., et al. (2019). “Insulation: Conserving Federated Learning for Internet of Goods a
Survey.” IEEE Access, 7, 166156–166173.
Li, X., et al. (2020). “Federated Learning for Insulation: Conserving Healthcare Applications
a Survey.” IEEE Deals on Industrial Informatics, 17(6), 4139–4146.
Li, X., et al. (2021). “Federated Learning for Insulation: Conserving Healthcare Applications
a Survey.” IEEE Deals on Industrial Informatics, 17(6), 4139–4146.
Liang, S., et al. (2020). “Federated Learning for Healthcare a Review.” IEEE Access, 8,
180916–180936.
McMahan, H.B., et al. (2017a). “Communication-Effective Knowledge of Deep Networks
from Decentralized Data.” In Proceedings of the 20th International Conference on
Artificial Intelligence and Statistics (AISTATS), Fort Lauderdale, FL, USA. JMLR:
W&CPvolume 54. Copyright 2017. 1602.05629 (arxiv.org)
McMahan, H.B., et al. (2017b). “Communication-Effective Knowledge of Deep Networks
from Decentralized Data.” arXiv preprint arXiv1602.05629.
Nayak, M., & Barman, A. (2022). “A Real-Time Pall-Predicated Healthcare Monitoring
System.” In S. Kshatri, K. Thakur, M. Khan, D. Singh, & G. Sinha (Eds.), Computational
Intelligence and Applications for Afflictions and Healthcare (pp. 229–247). IGI Global.
https//doi.org/10.4018/978-1-7998-9831-3.ch011
Nayak, M., Dass, A.K., & Kshatri, S.S. (2023). “An AI-Predicated Effective Model for the
Type of Business Signals Using Convolutional Neural Network.” In S. Dewangan, S.
Kshatri, A. Bhanot, & M. Shah (Eds.), Building Secure Business Models Through
Blockchain Technology Tactics, Styles, Limitations, and Performance (pp. 20–35). IGI
Global. https//doi.org/10.4018/978-1-6684-7808-0.ch002
Nayak, M., & Narain, B. (2020a). “Big Data Mining Algorithms for Predicting Dynamic
Product Price by Online Analysis.” In Computational Intelligence in Data Mining
Proceedings of the International Conference on ICCIDM 2018 (pp. 701–708).
Springer.
Nayak, M., & Narain, B. (2020b). “Predicting Dynamic Product Price by Online Analysis
Modified K-Means Cluster.” In A. Das, J. Nayak, B. Naik, S. Dutta, & D. Pelusi (Eds.),
Computational Intelligence in Pattern Recognition. Advances in Intelligent Systems
and Computing, vol. 1120. Springer. https//doi.org/10.1007/978-981-15-2449-3_1
Pan, S.J., & Yang, Q. (2010). “A Check on Transfer Knowledge.” IEEE Deals on Knowledge
and Data Engineering, 22(10), 1345–1359.
Qammar, A., Ding, J., & Ning, H. (2022). “Federated Learning Attack Surface: Taxonomy,
Cyber Defences, Challenges, and Future Directions”. Artificial Intelligence Review, 55,
3569–3606. https://doi.org/10.1007/s10462-021-10098-w
Rajkomar, A., et al. (2018). “Scalable and Accurate Deep knowledge with Electronic Health
Records.” NPJ Digital Medicine, 1(1), 1–10.
Rieke, N., et al. (2020). “The Future of Digital Health with Federated Learning.” NPJ Digital
Medicine, 3(1), 1–6.
Sheller, M.J., et al. (2020). “Federated Learning in Medicine FacilitatingMulti- Institutional
Collaborations Without Sharing Patient Data.” Scientific Reports, 10(1), 12598.
Shokri, R., et al. (2015). “Insulation-Conserving Deep Knowledge.” In Proceedings of the
22nd ACM SIGSAC Conference on Computer and Dispatches Security (CCS), ACM
Conferences, New York, NY. Association for Computing Machinery.
174 Artificial Intelligence Using Federated Learning
Smestad, C., & Li, J. (2023). A Systematic Literature Review on Client Selection in
Federated Learning. Association for Computing Machinery. https://doi.org/10.1145/
3593434.3593438, ISBN: 9798400700446
Smith, A., et al. (2020a). “IoT Analytics Openings, Challenges, and Operations.” IEEE
Internet of Goods Journal, 7(12), 11518–11528.
Smith, A., et al. (2021). “Federated Learning Strategies, Challenges, and Future Directions.”
ACM Computing Checks, 54(6), Composition 118.
Wang, B., et al. (2021). “Towards Effective IoT Data Analytics a Comprehensive Review.”
IEEE Deals on Industrial Informatics, 17(6), 3845–3854.
Weiss, K., et al. (2016). “Check of Transfer Knowledge.” Journal of Machine Learning
Research, 17(1), 1–104.
Yang, Q., et al. (2018). “Federated Machine Learning Concept and Applications.” ACM Deals
on Intelligent Systems and Technology (TIST), 10(2), 1–19.
Yang, Q., et al. (2019a). “Federated Learning.” Emulsion Lectures on Artificial Intelligence
and Machine Learning, 13(3), 1–207.
Yang, Q., et al. (2020b). “Federated Machine Learning Concept and Applications.” ACM
Deals on Intelligent Systems and Technology (TIST), 10(2), 1–19.
Zhang, Y., et al. (2023). “Advancing Smart Cosmopolises Through Federated Learning
Openings and Challenges.” IEEE Deals on Sustainable Computing, 8(1), 114–127.
Zhao, L., et al. (2021). “Secure Federated Learning for Smart Metropolises Challenges and
Openings.” IEEE Internet of Goods Journal, 8(15), 12248–12257.
Zhu, L., Xu, X., Lu, Q., Governatori, G., & Whittle, J. (2022). AI and Ethics—Operationalizing
Responsible AI. In F. Chen & J. Zhou (Eds.), Humanity Driven AI. Springer. https://doi.
org/10.1007/978-3-030-72188-6_2
10 Applications of Federated
Learning in AI, IoT,
Healthcare, Finance,
Banking, and Cross-
Domain Learning
Walaa Hassan and Habiba Mohamed
Abbreviations
AI Artificial Intelligence
FL Federated Learning
IoT Internet of Things
HIPAA Health Insurance Portability and Accountability Act
FedAvg Federated Averaging
SMC Secure Multiparty Computation
SIEM Security Information and Event Management
IDS Intrusion Detection Systems
APTs Advanced Persistent Threats
API Application Programming Interface
ML Machine Learning
DL Deep Learning
VR Virtual Reality
SVM Support Vector Machine
CNN Convolutional Neural Network
NLP Natural Language Processing
GDPR General Data Protection Regulation
FLEG Federated Learning with Encrypted Gradients
INTRODUCTION
A new approach to training machine learning models known as federated learning
is becoming very popular. Instead of collecting all the data in one place, it distrib-
utes the work of improving models between many devices or servers. This helps
keep people’s data private and safe. It also means data transmission is unnecessary
from device to device. Federated learning allows different devices to work together
to make models better without sharing private information. This big change helps
artificial intelligence grow without risking privacy. Federated learning can be used
in many different fields. It is flexible and can help technology advance in many areas.
In the domain of the Internet of Things (IoT), federated learning enables edge
devices to collaboratively learn from locally generated data while preserving user
privacy, thereby enhancing the efficiency of IoT systems without compromising data
security [1]. Healthcare stands as another domain ripe for the integration of feder-
ated learning, where sensitive patient data can be kept within hospital or device
boundaries while still contributing to the improvement of healthcare algorithms [2].
Furthermore, federated learning holds promise in finance and banking, where insti-
tutions can collaborate on model training while adhering to strict regulatory frame-
works governing data privacy and security [3].
Moreover, the concept of federated learning extends beyond individual domains,
paving the way for cross-domain learning where models trained on data from one
domain can undergo transfer and adapted to another domain. This cross-domain
applicability opens up avenues for synergistic collaborations and knowledge transfer
between different industries, fostering innovation and driving progress on a broader
scale [4].
In addition to its applications in specific domains, federated learning also
addresses broader challenges in AI, such as data heterogeneity and scalability.
By allowing models to be trained across distributed datasets without centralized
aggregation, federated learning accommodates the diverse and often fragmented
nature of data sources, enhancing the resilience and capacity for generalization of
AI systems [5]. Furthermore, federated learning facilitates ongoing learning and
adaptation within dynamic environments, making it particularly well-suited for
scenarios where data distributions evolve, such as in online learning and real-time
analytics [6].
The potential of federated learning extends beyond traditional machine learning
tasks to encompass a broad array of AI applications, encompassing natural language
processing, as well as computer vision, and recommendation systems. In natural lan-
guage processing, federated learning enables the collaborative training of language
models across multiple organizations or jurisdictions while respecting privacy and
data sovereignty concerns [7]. Similarly, federated learning enhances the develop-
ment of computer vision algorithms by leveraging diverse datasets from edge devices
or distributed servers, leading to more robust and inclusive models [8]. Moreover,
federated learning empowers personalized recommendation systems by harnessing
user data from various sources without compromising individual privacy, thereby
improving the relevance and accuracy of recommendations [9].
Furthermore, the integration of federated learning techniques in edge comput-
ing environments holds significant promise for enhancing the efficiency and scal-
ability of AI systems. By leveraging the computational resources available on edge
devices, federated learning enables on-device model training and inference, reduc-
ing latency and bandwidth requirements associated with centralized approaches [10].
This decentralized approach also mitigates privacy concerns by keeping sensitive
data local to the device, thereby fostering user trust and compliance with privacy
regulations [11].
Applications of Federated Learning 177
LITERATURE REVIEW
Federated learning, a cutting-edge approach in the field of machine learning, has
emerged as a transformative paradigm that addresses key challenges associated with
178 Artificial Intelligence Using Federated Learning
TABLE 10.1
Advantages, Disadvantages, and Techniques of Federated Learning Research
Reference Advantages Disadvantages Domains
[5] Provides a foundational understanding May lack depth in General overview
of federated learning. technical aspects.
[10] Expands on advantages such as data May not offer novel Edge devices
privacy and scalability. insights beyond existing
literature.
[4] Offers a detailed overview of Might lack exploration of General overview
collaborative model training in newer advancements.
federated learning.
[18] Addresses challenges in federated May not provide practical General overview
learning, offering insights into solutions.
achieving desired model performance.
[3] Highlights the significance of federated May not delve deeply into General overview
learning in preserving data privacy, technical aspects.
especially in sensitive domains.
[1] Explores efficient utilization of May lack in-depth General overview
distributed computing resources in analysis of other aspects.
federated learning.
[19] Discusses the applications of federated Might not extensively Healthcare
learning across various domains, cover technical
showcasing its versatility. challenges.
[8] Highlights the adaptability of federated May not provide concrete Computer vision
learning to diverse data distributions examples of
and privacy requirements. applications.
[11] Addresses privacy concerns and Might not explore newer Privacy-preserving
scalability in federated learning, advancements. techniques
particularly focusing on distributed
data sources.
[20] Discusses how federated learning May not provide Recommender
accommodates data heterogeneity comprehensive insights systems
while preserving privacy and integrity. into other aspects.
[21] Highlights ongoing research efforts to May not provide practical Security
address challenges such as model implementations.
synchronization and security
vulnerabilities.
[22] Explores the potential of federated May not deeply analyze Wireless
learning in dynamic and resource- technical intricacies. communication
constrained environments like IoT
networks.
[13] Expands the scope of federated learning May not provide in-depth Smart grids
to include advanced techniques like exploration of advanced
federated reinforcement learning. techniques.
[23] Explores the applications of federated Might not extensively Social good
learning in domains like robotics and discuss technical applications
personalized AI assistants. challenges.
Applications of Federated Learning 181
multiple devices or servers to compute a global model while mitigating the impact of
data heterogeneity and communication constraints [5]. Additionally, FedProx inte-
grates proximal terms into the optimization objective to enhance model convergence
and stability in federated learning settings [24]. FedAvg+ extends the capabilities of
federated averaging by incorporating client selection strategies and adaptive learn-
ing rates to improve model performance and convergence speed [25]. Figure 10.1
illustrates the main concept of FedAvg.
Added to that, secure aggregation algorithms have been developed to guarantee
privacy and confidentiality throughout the model aggregation procedure in feder-
ated learning. These algorithms leverage cryptographic methods like secure multi-
party computation (SMC) and homomorphic encryption to securely aggregate model
updates from multiple participants without exposing sensitive information [3]. By
encrypting model updates before transmission and decrypting them only during the
aggregation phase, secure aggregation algorithms provide robust privacy guarantees
while enabling collaborative model training across distributed data sources.
Furthermore, federated learning algorithms continue to evolve to address emerg-
ing challenges and application-specific requirements. For instance, in federated
learning for IoT networks, lightweight and communication-efficient algorithms are
essential to accommodate resource-constrained edge devices and minimize energy
consumption [26]. Similarly, in federated learning for healthcare informatics, algo-
rithms that prioritize patient privacy and compliance with regulatory standards
such as GDPR and HIPAA are paramount [19]. By developing and refining feder-
ated learning algorithms tailored to specific use cases and scenarios, researchers
and practitioners can unlock the full potential of collaborative model training across
decentralized data sources while ensuring privacy, efficiency, and scalability.
Privacy-Preserving Techniques
Maintaining privacy is of utmost importance in federated learning, given the decen-
tralized nature of data sources and the sensitive nature of the information being pro-
cessed. To address this challenge, various privacy-preserving techniques have been
developed and integrated into federated learning frameworks. One such technique is
Applications of Federated Learning 183
differential privacy, which ensures that individual data contributions remain private
by introducing noise to the gradients or model updates before aggregation [5]. By
introducing controlled randomness, differential privacy prevents malicious actors
from inferring sensitive information about individual data samples while still allow-
ing for accurate model training at the aggregate level.
Another privacy-preserving technique widely employed in federated learning is
homomorphic encryption, which allows computations to be conducted on encrypted
data without the need for decryption. By encrypting model parameters and updates
before transmission and performing aggregation operations in the encrypted domain,
homomorphic encryption ensures end-to-end privacy and confidentiality of the data
throughout the federated learning process [3]. Similarly, secure multiparty computa-
tion permits multiple parties to collectively compute a function using their individ-
ual inputs, without disclosing any details about the inputs. themselves. In federated
learning, SMC can be used to securely aggregate model updates from multiple par-
ticipants without disclosing individual data samples or model parameters [27].
Furthermore, federated learning frameworks often employ federated learning
with encrypted gradients (FLEG) to further enhance privacy and security. FLEG
involves encrypting the gradients of the local model updates before transmission and
decrypting them only during the aggregation phase, ensuring that sensitive infor-
mation remains protected throughout the communication process [28]. By combin-
ing encryption techniques with federated learning methodologies, FLEG provides
robust privacy guarantees while enabling collaborative model training across dis-
tributed data sources.
Overall, privacy-preserving techniques play a crucial role in ensuring the confi-
dentiality and integrity of data in federated learning settings. By leveraging methods
such as differential privacy, homomorphic encryption, secure multiparty computa-
tion, and federated learning with encrypted gradients, organizations can harness the
benefits of collaborative model training while safeguarding individual privacy rights
and complying with regulatory requirements.
grid stability, reduce energy waste, and optimize renewable energy integration while
preserving consumer privacy and data confidentiality [30].
Another compelling application of federated learning in IoT is predictive main-
tenance for industrial machinery and equipment. In manufacturing environments,
sensors and actuators embedded in machinery collect operational data, such as tem-
perature, vibration, and pressure. Federated learning allows these edge devices to
collaboratively train machine learning models for predictive maintenance, enabling
early detection of equipment failures, reducing downtime, and minimizing main-
tenance costs [31]. By leveraging FL, manufacturers can improve operational effi-
ciency, extend equipment lifespan, and enhance overall productivity [32].
Federated learning holds promise for environmental monitoring applications in
IoT, where sensors are deployed to collect data on air quality, water quality, and
climate conditions. Federated learning enables collaborative model training across
distributed sensors to develop predictive models for environmental forecasting, pol-
lution detection, and disaster management [33]. By leveraging FL, environmental
agencies can gain insights into complex environmental phenomena, facilitate timely
interventions, and safeguard public health and safety [34].
traffic, identify suspicious activities, and block malicious traffic in real time, thereby
safeguarding networks from cyber threats and unauthorized access attempts [46].
Federated learning applications in cybersecurity offer innovative solutions
to address the evolving threat landscape and protect organizations against cyber-
attacks, data breaches, and privacy violations. By leveraging collaborative threat
detection, anomaly detection, malware analysis, and intrusion detection techniques,
FL enables organizations to enhance their cybersecurity defenses, mitigate risks, and
ensure the integrity and confidentiality of their sensitive information.
awareness, and enable collaborative experiences among users with different devices
and interaction modalities [60].
FL plays a crucial role in federated avatar customization by enabling collabora-
tive model training across distributed users to generate personalized avatars based
on individual preferences, physical attributes, and style preferences. By aggregating
avatar customization models trained on diverse user datasets, FL enables metaverse
platforms to create more diverse and inclusive virtual communities, enhance user
representation, and foster social interactions and engagement in virtual environ-
ments [61].
Additionally, FL facilitates federated emotion recognition by leveraging insights
from distributed users’ facial expressions, gestures, and physiological signals to infer
emotional states and reactions in VR experiences. By aggregating emotion recogni-
tion models trained on diverse user interactions, FL enables VR applications to adapt
content and interactions dynamically based on users’ emotional responses, enhance
storytelling, and create more immersive and engaging virtual experiences [62].
Federated learning applications in the metaverse and virtual reality offer transfor-
mative solutions to enhance content creation, scene understanding, avatar custom-
ization, and emotion recognition capabilities while ensuring data privacy, security,
and user autonomy. By leveraging collaborative intelligence across distributed users,
FL enables metaverse platforms to create more personalized, immersive, and inter-
active virtual environments, shaping the future of digital entertainment, social inter-
action, and online collaboration.
CONCLUSION
This chapter shows how far federated learning represents a groundbreaking para-
digm shift in machine learning, offering a decentralized approach to model train-
ing that preserves data privacy, enhances collaboration, and enables more efficient
utilization of distributed resources. Throughout various domains, from healthcare to
finance, from smart cities to autonomous vehicles, FL has demonstrated its poten-
tial to address the challenges of data privacy, scalability, and regulatory compliance
while unlocking new opportunities for innovation and collaboration.
As we look to the future, the prospects for federated learning are bright. With
advancements in federated learning algorithms, communication protocols, and secu-
rity mechanisms, FL is poised to become a cornerstone of the AI landscape, democ-
ratizing access to AI technologies and empowering organizations and individuals to
leverage collective intelligence for solving complex problems.
However, federated learning also presents challenges that must be addressed to
realize its full potential. Issues such as data heterogeneity, security vulnerabilities,
and communication overhead require ongoing research and development efforts to
develop robust solutions that can ensure the reliability, scalability, and security of
federated learning systems.
In conclusion, federated learning holds tremendous promise for shaping the future
of AI, enabling collaborative intelligence across distributed devices and networks
while preserving data privacy and security. By fostering collaboration, innovation,
and inclusivity, federated learning has the potential to drive transformative advance-
ments in AI research, applications, and industries, paving the way for a more con-
nected, intelligent, and equitable future.
REFERENCES
[1] Jakub Konecný et al. Federated learning: Strategies for improving communication effi-
ciency. ArXiv abs/1610.05492, 2016.
Applications of Federated Learning 193
[2] Xinyi Li et al. Federated learning for healthcare informatics. Journal of Healthcare
Informatics Research, 5(1):1–23, 2021.
[3] Keith Bonawitz et al. Towards federated learning at scale: System design. arXiv pre-
print arXiv:1902.01046, 2019.
[4] Peter Kairouz et al. Advances and open problems in federated learning. arXiv preprint
arXiv:1912.04977, 2019.
[5] H. Brendan McMahan et al. Federated learning: Collaborative machine learning with-
out centralized training data. ACM Transactions on Machine Learning and Data
Mining (TOMM), 10(2):1–21, 2019.
[6] Qiang Yang et al. Federated Learning. Synthesis Lectures on Artificial Intelligence and
Machine Learning, 13(3):1–207, 2020.
[7] Yang Liu et al. Federated learning for natural language processing. arXiv preprint
arXiv:1910.13067, 2019.
[8] Qiang Yang et al. Federated learning for computer vision: A survey. arXiv preprint
arXiv:2008.08102, 2020.
[9] Tianqing Li et al. Federated learning for personalized recommendation: A review.
Information Fusion, 73:22–38, 2022.
[10] Tian Li et al. Federated learning in edge computing: A comprehensive survey. IEEE
Communications Surveys & Tutorials, 22(3):2031–2063, 2020.
[11] Tongxin Zhao et al. Privacy-preserving federated learning: A survey. IEEE Internet of
Things Journal, 8(7):5217–5242, 2021.
[12] R. Zhang Jingxin Mao, Hanqiu Wang, Bing Li, Xiang Cheng, Liuqing Yang. A sur-
vey on federated learning in intelligent transportation systems. IEEE Transactions on
Intelligent Vehicles, 1–17, 2024.
[13] Jian Li and Tongbao Chen and Shaohua Teng. A comprehensive survey on client selec-
tion strategies in federated learning. Computer Networks, 251:110663, 2021.
[14] Yuheng Xie et al. Federated learning for pharmaceutical research: Opportunities and
challenges. arXiv preprint arXiv:2105.10644, 2021.
[15] Ingrid Gundersen et al. Federated learning in biotechnology: Advancements and appli-
cations. Frontiers in Genetics, 12:1110, 2021.
[16] Gabriela Nascimento et al. Federated learning for environmental monitoring and con-
servation. IEEE Access, 9:160535–160550, 2021.
[17] S.R. Pokhrel. Federated learning meets blockchain at 6G edge: A drone-assisted net-
working for disaster response. In Proceedings of the 2nd ACM MobiCom Workshop
on Drone Assisted Wireless Communications for 5G and Beyond, pp. 49–54, 2020,
September.
[18] Qiang Yang et al. Federated learning: Challenges, methods, and future directions.
IEEE Transactions on Wireless Communications, 30(1):405–421, 2021.
[19] Xinyi Li et al. Federated learning for healthcare informatics. Journal of Healthcare
Informatics Research, 5(1):1–23, 2021.
[20] Qiang Yang et al. Federated learning for personalized recommendation: A review.
Information Fusion, 73:22–38, 2022.
[21] Cong Li et al. Secure and privacy-preserving federated learning for 5g and beyond:
Challenges, solutions, and future directions. IEEE Wireless Communications,
28(3):132–139, 2021.
[22] Fangming Hu et al. Federated learning in wireless communication networks: Challenges,
methods, and future directions. IEEE Communications Magazine, 59(7):38–45, 2021.
[23] T. Zhang et al. Avestimehr. Federated learning for the internet of things: Applications,
challenges, and opportunities. IEEE Internet of Things Magazine, 5(1):24–29, 2022.
[24] Yazeed Yasin Ghadi et al. Integration of federated learning with IoT for smart cities
applications, challenges, and solutions. PeerJ Computer Science, 9:e1657, 2023.
194 Artificial Intelligence Using Federated Learning
[25] Phoebe Clark et al. Federated AI, current state, and future potential. Asia-Pacific
Journal of Ophthalmology, 12(3):310–314, 2023.
[26] Virginia Smith et al. Fedprox: Federated optimization with proximal term. Advances in
Neural Information Processing Systems, 32:3481–3492, 2019.
[27] Yu-Xiang Wang et al. Fedavg+: Communication-efficient distributed deep learning.
Advances in Neural Information Processing Systems, 33:2495–2506, 2020.
[28] H.B. McMahan et al. Federated learning: Strategies for improving communication
efficiency. In Proceedings of the 29th Conference on Neural Information Processing
Systems (NIPS), Barcelona, Spain, pp. 5–10, 2016, December.
[29] Stacey Truex et al. A hybrid secure multiparty computation and blockchain proto-
col for privacy-preserving federated learning in healthcare. Journal of Biomedical
Informatics, 118:103802, 2021.
[30] Jakub Konečný et al. Federated learning with encrypted gradient aggregation in the
wild. arXiv preprint arXiv:2007.10749, 2020.
[31] A. Imteaj et al. A survey on federated learning for resource-constrained IoT devices.
IEEE Internet of Things Journal, 9(1):1–24, 2021.
[32] X. Yin et al. A comprehensive survey of privacy-preserving federated learning: A tax-
onomy, review, and future directions. ACM Computing Surveys (CSUR), 54(6):1–36,
2021.
[33] Jakub Konečný et al. Federated learning for predictive maintenance in industry 4.0.
IEEE Transactions on Industrial Informatics, 17(2):1282–1290, 2021.
[34] Rafael Abreu et al. Federated learning for predictive maintenance in industry 4.0. IEEE
Transactions on Industrial Informatics, 17(2):1282–1290, 2021.
[35] D.C. Nguyen et al. Federated learning for internet of things: A comprehensive survey.
IEEE Communications Surveys & Tutorials, 23(3):1622–1658, 2021.
[36] J.C. Jiang et al. Federated learning in smart city sensing: Challenges and opportunities.
Sensors, 20(21):6230, 2020..
[37] R.S. Antunes et al. Federated learning for healthcare: Systematic review and archi-
tecture proposal. ACM Transactions on Intelligent Systems and Technology (TIST),
13(4):1–23, 2022.
[38] P. Dhade and P. Shirke. Federated learning for healthcare: A comprehensive review.
Engineering Proceedings, 59(1):230, 2024.
[39] S. Sharma and K. Guleria. A comprehensive review on federated learning based mod-
els for healthcare applications. Artificial Intelligence in Medicine, 146:102691, 2023.
[40] S. Banabilah et al. Federated learning review: Fundamentals, enabling technologies,
and future applications. Information Processing & Management, 59(6):103061, 2022.
[41] A. Rauniyar et al. Federated learning for medical applications: A taxonomy, current
trends, challenges, and future research directions. IEEE Internet of Things Journal,
11(5):7374–7398, 2023.
[42] L. Li et al. A review of applications in federated learning. Computers & Industrial
Engineering, 149:106854, 2020.
[43] D.C. Nguyen et al. Federated learning for smart healthcare: A survey. ACM Computing
Surveys (Csur), 55(3):1–37, 2022
[44] Bo Xu et al. Federated learning for cybersecurity: A comprehensive survey. ACM
Computing Surveys, 54(1):1–36, 2021.
[45] Xun Chen et al. Collaborative threat detection with federated learning in edge comput-
ing. IEEE Internet of Things Journal, 8(22):16184–16196, 2021.
[46] Xiaoyong Wang et al. Federated learning for anomaly detection: A comprehensive
review. Computers & Security, 107:102291, 2021.
[47] Peng Liu et al. Federated learning for malware detection: A survey. Future Generation
Computer Systems, 128:135–146, 2021.
Applications of Federated Learning 195
[48] Xiaoyong Wang et al. Federated learning for intrusion detection: Challenges, methods,
and future directions. Journal of Network and Computer Applications, 197:105028,
2022.
[49] Tong Zhao et al. Federated learning for smart home energy management: A compre-
hensive review. Sustainable Cities and Society, 80:102828, 2022.
[50] S. Pandya et al. Federated learning for smart cities: A comprehensive survey.
Sustainable Energy Technologies and Assessments, 55:102987, 2023.
[51] Z. Zheng et al. Applications of federated learning in smart cities: Recent advances,
taxonomy, and open challenges. Connection Science, 34(1):1–28, 2022.
[52] Jie Li et al. Federated learning for smart grid optimization: Challenges and opportuni-
ties. Energies, 14(5):1330, 2021.
[53] I. Ullah et al. Multi-level federated learning for industry 4.0—A crowdsourcing
approach. Procedia Computer Science, 217:423–435, 2023.
[54] S. Savazzi et al. Opportunities of federated learning in connected, cooperative, and
automated industrial systems. IEEE Communications Magazine, 59(2):16–21, 2021.
[55] Y. Xianjia et al. Federated learning in robotic and autonomous systems. Procedia
Computer Science, 191:135–142, 2021.
[56] J. Zhu et al. Blockchain-empowered federated learning: Challenges, solutions, and
future directions. ACM Computing Surveys, 55(11):1–31, 2023.
[57] V.P. Chellapandi and Liangqi Yuan and Stanisław H. Żak and Ziran Wang. Federated
learning for connected and automated vehicles: A survey of existing approaches and
challenges. IEEE Transactions on Intelligent Vehicles, pp. 2485–2492, 2023.
[58] B. Yuksek et al. Federated meta learning for visual navigation in GPS-denied urban
airspace. In 2023 IEEE/AIAA 42nd Digital Avionics Systems Conference (DASC) (pp.
1–7). IEEE, 2023, October.
[59] V.P. Chellapandi et al. A survey of federated learning for connected and automated
vehicles. In 2023 IEEE 26th International Conference on Intelligent Transportation
Systems (ITSC) (pp. 2485–2492). IEEE, 2023, September.
[60] L. Lei et al. Deep reinforcement learning for autonomous internet of things: Model,
applications and challenges. IEEE Communications Surveys & Tutorials, 22(3):1722–
1760, 2020.
[61] Y. Chen et al. Federated learning for metaverse: A survey. In Companion Proceedings of
the ACM Web Conference 2023 (pp. 1151–1160), Association for Computing Machinery,
2023, April.
[62] C. Zhang et al. A survey on federated learning. Knowledge-Based Systems, 216:106775,
2021.
[63] Y. Wang et al. Social metaverse: Challenges and solutions. IEEE Internet of Things
Magazine, 6(3):144–150, 2023.
[64] S. Pal et al. Development and progress in sensors and technologies for human emotion
recognition. Sensors, 21(16):5554, 2021.
[65] K. Hu et al. Federated learning: A distributed shared machine learning method.
Complexity, 2021(1):8261663, 2021.
[66] T. Li et al. Federated learning: Challenges, methods, and future directions. IEEE Signal
Processing Magazine, 37(3):50–60, 2020.
[67] Keith Bonawitz et al. Towards federated learning at scale: System design. arXiv pre-
print arXiv:1902.01046, 2019.
[68] K. Bonawitz. Towards federated learning at scale: System design. arXiv preprint
arXiv:1902.01046, 2019.
11 Exploring Future
Trends and Emerging
Applications
A Glimpse Into
Tomorrow’s Landscape
Utpal Ghosh and Shrabanti Kundu
INTRODUCTION
In this rapidly evolving technological landscape, society finds itself in an era of
unprecedented change and innovation. Each day, artificial intelligence permeates
deeper into human lives, blurring the boundaries between human and machine,
while a host of emerging technologies reshape the very fabric of our reality. From
the omnipresent Internet of Things (IoT) to the cutting-edge realm of neuromor-
phic hardware, technology’s impact is profound and transformative. While numer-
ous new and innovative technologies are currently in development, some stand out
for their practicality and promise in this burgeoning landscape. According to the
empirically validated insights of Gartner, a select group of technologies exhibits the
most potential to yield significant advantages in the coming years. In the next 5 to
10 years, particular technologies such as artificial intelligence (AI), transparently
immersive experiences, and digital platforms are anticipated to seize the spotlight
in the technological landscape. Gartner has pinpointed crucial technologies includ-
ing IoT, serverless platform as a service (PaaS), quantum computing, and software-
defined security [1]. Edge computing marks its entry into the Gartner hype cycle,
presenting approaches to enhance cloud service efficiency through the utilization
of intelligent computational techniques, with a particular focus on locations such as
mobile users or embedded microsystems. Looking forward, the next decade is pre-
dicted to witness “artificial intelligence everywhere” emerge as the most disruptive
technology, fueled by unprecedented computing power, adaptive neural networks,
and the vast reservoirs of big data [2]. As the exploration unfolds, the convergence
of diverse technologies becomes a focal point, transcending the silos of individual
advancements. The emergence of edge computing takes center stage, making its
inaugural appearance in the Gartner hype cycle. This paradigm shift promises to
revolutionize cloud service performance, strategically targeting locations such as
mobile users and embedded microsystems. The interconnected fabric of technology,
LITERATURE REVIEW
Robotic technology is widely utilized across diverse industries such as manufactur-
ing, healthcare, agriculture, transport, and logistics [3–6]. In manufacturing, robots
excel in tasks like assembly, packaging, and welding due to their precision, speed,
and consistency. Healthcare professionals utilize robots for diagnostics, surgeries,
and rehabilitation, while agricultural robots enhance efficiency and cost-effective-
ness in planting, harvesting, and fertilizing crops. In transport and logistics, robots
streamline operations in automated warehouses and distribution centers ensuring
faster and more accurate order processing. Improved technology for sensors [7],
artificial intelligence, and machine learning which transform robotic capabilities
beyond conventional automated processes are important technologies propelling
robotic breakthroughs. Robots can sense and communicate with the surroundings
using sensors, while AI and ML give them better decision-making capabilities. To
achieve higher degrees of automation and flexibility in robots, these technologies
are essential. To satisfy changing industrial needs and increase efficiency, robots
must be able to analyze large datasets, learn from mistakes, and modify their activi-
ties accordingly. This is made possible by AI and ML algorithms [8]. The subject
of smart robotics is rapidly expanding, combining artificial intelligence, machine
learning, and sophisticated technologies for sensing to allow robots to observe,
198 Artificial Intelligence Using Federated Learning
communicate, gain knowledge, and evolve on their own [9]. Its goal is to create
robots that can seamlessly collaborate with humans and possess sophisticated cogni-
tive capacities. Robotics has the potential to revolutionize companies by increasing
consumer satisfaction, productivity, and effectiveness as technology develops [10].
Nonetheless, attention must be given to dealing with ethical issues, data privacy
issues, economic expulsion, and environmental effects [11–14].
To understand the present status and future directions of intelligent robots, this
comprehensive review of the literature attempts to thoroughly analyze emerging
technologies and developments in the field. It achieves this by addressing signifi-
cant research issues. Through a comprehensive analysis of extant literature, the
writers want to pinpoint obstacles, prospects, and optimal methodologies for creat-
ing and executing robotic approaches in various industries. The potential effects of
intelligent robotics on various sectors as well as society serve as the driving force
behind this research, emphasizing the significance of keeping up with technological
developments and the resulting consequences for responsible integration strategies,
ethical considerations, and effective risk management [15–20]. Enhancing organi-
zational and individual outcomes has been demonstrated through the integration
of emerging technologies powered by data analytics and machine learning algo-
rithms, such as artificial intelligence, blockchain, virtual reality, robotics, Internet
of Things, and quantum computing [21]. The management literature recognizes
that these technologies have significantly improved business performance [22, 23]
and calls on academics to use them to construct research theories. By identify-
ing causal links, data science is being incorporated into management research to
help researchers give more comprehensive solutions to long-standing problems [24].
Even though these technologies provide a wealth of study options, organizational
behavior (OB) has only lately started to delve into this area.
The difficulties in performing open-ended research on new technologies can be
attributed to a lack of experience with machine learning and data science methods
[25], in addition to the technical aspects of computing and computational model-
ing. Present-day OB research initiatives are often very logical and theory-based.
Addressing deficiencies and ambiguities in a hypothesis or phenomenon has a greater
impact on a theoretical-focused methodology than does taking human experiences
into account [26]. Finding a balance across concepts and information integration may
help reveal the deep intricacies of employee behaviors, especially with the wealth of
data and sophisticated computational capabilities accessible today. It could be helpful
to review the present theory-driven agendas in behavioral research as new technology
phenomena in the workplace impact employee attitudes and behaviors. Academics
push for updated research initiatives that seek to advance theory in the analysis of
technology advancements in businesses [27], such as using abductive reasoning to
look at AI-based decision-making [28]. Open innovation, machine learning, AI,
robots, the Internet of Things, virtual reality (VR), and quantum computing [29] are
examples of modern management phenomena that stand to benefit from the suggested
decoupling that makes it possible for new paradigms to be introduced. It is necessary
to relax the current interdependencies that underpin traditional phenomenon-based
theorizing to promote technology-oriented research in OB. To create new paradigms
for the subject, academics have previously promoted doing a nontraditional study of
Exploring Future Trends and Emerging Applications 199
The Gartner hype cycle for emerging technologies in 2023 reflects a dynamic land-
scape of innovation and disruption with technologies at various stages of maturity
and adoption. By understanding these trends, organizations can strategize effec-
tively and harness the potential of emerging technologies to drive growth and
innovation.
FIGURE 11.2 Schematic framework of emerging and future trends of recent technologies.
202 Artificial Intelligence Using Federated Learning
Edge Computing
Edge computing is a paradigm in which data processing and storage are con-
ducted closer to the data source, typically at the edge of the network, rather than
relying solely on centralized data centers. This proximity to the data source
reduces latency, bandwidth usage, and reliance on cloud services, making it par-
ticularly advantageous for applications that require real-time or near-real-time
processing. The emergence of the Internet of Things, coupled with advancements
in robust cloud services, has paved the way for a groundbreaking computing con-
cept termed edge computing [34]. Operating on both downstream data for cloud
services and upstream data for IoT services, edge computing introduces fresh
opportunities across diverse application domains [35]. It empowers the handling
of vast datasets generated at the IoT edge and optimizes the implementation of
ML, deep learning, and augmented discovery of data in harmony with the genera-
tion of data. Through a gradual reduction in cost and complexity within the cloud,
edge computing facilitates the seamless integration of deep learning functional-
ities into applications [36].
Internet of Things
The Internet of Things encompasses a web of interconnected devices, objects, and
systems that interact and exchange data through the internet. Equipped with sen-
sors, actuators, and connectivity capabilities, these devices gather and share data,
enabling automation, monitoring, and control of real-world environments. IoT
facilitates the networking of physical objects enabling sensors attached to these
objects to convey information regarding their status or surroundings. Authors in
a recent study [37] discussed key enabling technologies, indicating the driving
forces behind future IoT research endeavors. This connectivity opens a vast array
of applications across various domains including smart homes, smart cities, smart
healthcare, smart agriculture, and smart transportation [38]. The IoT holds vast
potential, with expected progress in resource control, energy management, qual-
ity of service, interoperability, and interface management as well as security and
privacy enhancements [39].
computing are used to analyze and derive insights from this data. Edge
computing involves processing data locally on the device or at the edge of
the network, while cloud computing involves processing data in remote data
centers.
4. Applications and Services: IoT applications and services leverage data
collected from connected devices to offer various functionalities, includ-
ing smart home automation, industrial automation, healthcare monitoring,
environmental monitoring, smart city solutions, asset tracking, and predic-
tive maintenance.
5. Security and Privacy: Security and privacy are critical considerations in
IoT deployments to protect sensitive data and prevent unauthorized access
to devices and networks. Security measures such as encryption, authentica-
tion, access control, and device management are implemented to mitigate
cybersecurity risks in IoT systems.
Examples of IoT applications and use cases include smart homes, healthcare,
and smart cities. The Internet of Things has the potential to transform industries,
improve quality of life, and drive innovation by connecting the physical and digital
worlds in ways never before possible. As IoT adoption continues to grow, it will
play an increasingly significant role in shaping the future of technology and society.
Figure 11.4 showcases the process of an IoT application.
Virtual Reality
Virtual reality is an immersive technology that simulates a realistic, three-dimen-
sional environment using computer-generated imagery and interactive experiences.
Through VR, users can interact with and explore virtual environments as if they
were physically present within them. This technology typically involves the use of
a VR headset or goggles, along with motion-tracking sensors and handheld con-
trollers, to enhance the sense of presence and interaction. Virtual reality systems
facilitate situated learning by immersing users in interactive environments, objects,
and processes. These systems prioritize human interactions and engagement with
virtual experiences and environments, fostering learning through hands-on, interac-
tive experiences [40].
Virtual reality is a powerful and versatile technology that has the potential to revolu-
tionize how we experience and interact with digital content and the world around us.
VR can revolutionize enterprises and improve people’s lives, and this ability is only
likely to increase as virtual reality gear becomes more widely available and inex-
pensive and as innovators keep pushing the frontiers of what can be accomplished in
virtual worlds. Figure 11.5 depicts an architectural diagram of virtual reality.
206 Artificial Intelligence Using Federated Learning
Commercial UAVs
Commercial unmanned aerial vehicles (UAVs), commonly referred to as drones,
have witnessed a rapid rise in adoption and application across various industries
in recent years. These versatile flying machines, equipped with sensors, cameras,
and other payloads, offer numerous advantages in terms of data collection, surveil-
lance, inspection, and delivery. They have become essential in many fields, including
science, technology, and society, offering a broad variety of uses, including mili-
tary tasks, recreational activities, and monitoring. They have effects on safety and
confidentiality in both private and public spheres [41]. However, their adaptability
is accompanied by constraints, including limited range and power restrictions. To
ensure continuous and uninterrupted operation, these devices necessitate periodic
recharging at designated intervals [42].
4. Agriculture and Crop Monitoring: In agriculture, UAVs are utilized for crop
monitoring, pest detection, and precision agriculture practices, enabling
farmers to optimize crop yields, reduce inputs, and enhance overall farm
management.
5. Search and Rescue: UAVs play a vital role in search and rescue operations,
providing aerial reconnaissance and thermal imaging capabilities to locate
missing persons or disaster survivors in remote or hazardous environments.
6. Delivery and Logistics: Companies are exploring the use of UAVs for the
delivery of goods and packages in the last mile, particularly in areas with
limited infrastructure or during emergency situations where traditional
delivery methods may be impractical.
Software-Defined Networks
Software-defined networking (SDN) is an innovative approach to network manage-
ment that enhances the agility, flexibility, and programmability of traditional net-
work infrastructures. In SDN, the control plane, responsible for making decisions
about where to send traffic, is decoupled from the data plane, which is responsible for
forwarding the actual traffic. This decoupling is achieved through the implementa-
tion of a centralized controller that manages and directs network traffic. The adop-
tion of software-defined networking in the context of 5G has emerged as a solution
to address the limitations of hardware-based cellular architectures. Traditional hard-
ware-centric designs often lack flexibility and are constrained by closed systems.
SDN 5G adoption introduces a more efficient approach, enabling the creation of cen-
tralized network architectures with programmable capabilities spanning the entire
network [43]. In response to this need, the authors in [44] have proposed SoftAir, an
SDN architecture tailored specifically for 5G wireless systems. While promising,
this approach has raised security concerns, as discussed in [45]. However, there is an
anticipation that software-defined networks will play a significant role in the evolu-
tion of the mobile industry [46].
Deep Learning
Deep learning is a subfield of machine learning that involves using a data-driven
methods of learning to train neural networks made from data to do particular jobs.
Its notable rise stems from its capacity to autonomously discern and represent com-
plex patterns and features embedded within extensive datasets. Deep learning uti-
lizes back-propagation algorithms to uncover complex and intricate data structures
within big data. With the development of sophisticated convolutional neural networks
that have greatly improved the processing of voice, pictures, video and audio, this
strategy has been very successful. Furthermore, neural networks made up of recur-
rent neurons have proven to be highly effective in processing data that is sequential,
including voice and text [47]. Deep learning enables computers to learn from and
comprehend the world as a hierarchy of concepts. Unlike traditional methods, deep
learning minimizes the need for human intervention in knowledge acquisition, as
computers autonomously gather knowledge from their experiences. Through a hier-
archical structure of concepts, computers can effectively learn complex ideas from
simpler ones leveraging multiple deep layers to enhance their understanding [48, 49].
212 Artificial Intelligence Using Federated Learning
Deep learning’s success can be attributed to the availability of large datasets, power-
ful computing resources, and advancements in model architectures. Deep Learning
is poised to drive further innovations and improvements in various applications, con-
tributing to the advancement of artificial intelligence.
Machine Learning
Machine learning is a dynamic field within the broader realm of artificial intel-
ligence that focuses on developing algorithms and models capable of enabling
computers to learn from data. Instead of relying on explicit programming, ML
systems utilize statistical techniques to improve their performance on a specific
task over time. The essence of machine learning lies in the ability of algorithms to
identify patterns, make predictions, or optimize outcomes based on the data they
are exposed to. There are various types of machine learning including supervised
learning, unsupervised learning, and reinforcement learning, each serving distinct
purposes.
Exploring Future Trends and Emerging Applications 213
Digital Twins
A digital twin is a virtual representation of a physical object, system, or process. It
is created using real-time data and simulation models to mimic the behavior, char-
acteristics, and performance of its physical counterpart. Digital twins enable orga-
nizations to monitor, analyze, and optimize assets and operations throughout their
life cycle, providing valuable insights for decision-making and improving efficiency.
SERVERLESS PLATFORM-AS-A-SERVICE
Serverless Platform-as-a-Service represents a significant evolution in cloud com-
puting architecture, offering a hardware-free environment for orchestrating and
managing cloud-based processes. Unlike traditional approaches that rely on infra-
structure-based designs, serverless PaaS introduces a paradigm shift by abstracting
away the complexities of server management. At its core, serverless PaaS operates
on the concept of Function-as-a-Service (FaaS), where computing resources are pro-
vided on demand in response to specific events or triggers. This model eliminates the
need for developers to provision or manage servers, allowing them to focus solely on
writing and deploying code [2]. This approach enhances scalability, agility, and cost-
effectiveness, as resources are allocated dynamically based on workload demands.
One of the key advantages of serverless PaaS is its ability to streamline the develop-
ment and deployment of applications without the overhead of infrastructure manage-
ment. Developers can write code in the form of functions, which are executed in
response to events triggered by external sources such as HTTP requests, database
changes, or scheduled tasks. Serverless PaaS architectures offer inherent scalability,
as resources are provisioned automatically to accommodate fluctuating workloads.
This elasticity ensures optimal performance and cost efficiency, as organizations only
pay for the resources consumed during code execution. Security is another critical
aspect addressed by serverless PaaS. By abstracting away the underlying infrastruc-
ture, potential attack surfaces are minimized, reducing the risk of security breaches.
Moreover, serverless PaaS providers often offer built-in security features such as
encryption, access controls, and monitoring tools to further enhance the security
posture of applications. Serverless PaaS represents an approach to cloud computing
offering developers a hassle-free and cost-effective way to build and deploy applica-
tions at scale. As organizations continue to embrace digital transformation initia-
tives, serverless PaaS is poised to play a pivotal role in driving innovation and agility
in the ever-evolving landscape of cloud computing. Figure 11.11 showcases the PaaS
architecture in cloud computing.
Cognitive Computing
At its core, cognitive computing is a multidisciplinary field dedicated to crafting
computational models and decision-making mechanisms, drawing inspiration from
the neurobiological processes of the human brain, cognitive sciences, and psychol-
ogy [50]. Unlike traditional computing systems, cognitive computing systems aim
to mimic human-like intelligence and learning capabilities enabling them to under-
stand, reason, and learn from data in a manner that resembles human cognition.
The key objective of cognitive computing is to create systems that can process vast
amounts of data, understand natural language, and make context-aware decisions.
This involves the utilization of techniques such as machine learning, pattern recogni-
tion, natural language processing, and computer vision. These systems continuously
learn and adapt, allowing them to improve their performance over time-based on
experience and new data. Cognitive computing systems excel in handling unstruc-
tured data, which is prevalent in the real world, such as text, images, and audio. By
leveraging advanced algorithms, these systems can extract meaningful insights, rec-
ognize patterns, and infer context from diverse data sources. One prominent applica-
tion of cognitive computing is in the development of virtual assistants, chatbots, and
conversational interfaces. These systems can understand and respond to user queries
in a natural language format, providing a more intuitive and user-friendly interac-
tion. In healthcare, cognitive computing contributes to diagnostic processes by ana-
lyzing vast datasets of medical records, images, and research papers. By identifying
patterns and correlations, these systems assist healthcare professionals in making
more accurate and timely decisions.
The technology also finds applications in finance, customer service, and vari-
ous industries where data-driven decision-making is crucial. Cognitive computing
systems are capable of sifting through enormous datasets, automating routine tasks,
and providing valuable insights for strategic planning. The development of cognitive
computing represents a significant leap forward in the evolution of artificial intel-
ligence. As technology continues to advance, the integration of cognitive computing
into various domains is poised to bring about progressive changes, enhancing effi-
ciency, decision-making, and user experiences across a spectrum of applications, as
shown in Figure 11.12.
Blockchain
Blockchain stands as a groundbreaking technology that functions as the fundamen-
tal mechanism behind cryptocurrencies like Bitcoin, but its applications extend far
beyond the realm of digital currencies. Blockchain is a decentralized and distributed
ledger that records transactions across a network of computers in a secure and trans-
parent manner. The primary feature of blockchain is its ability to provide a secure
and tamper-resistant way of recording transactions. In a blockchain, each transac-
tion is grouped into a block, and these blocks are linked together in a chronological
chain. Once a block is added to the chain, it becomes extremely difficult to alter
any information within it, ensuring the integrity of the entire transaction history.
Key characteristics of blockchain include decentralization, persistency, efficiency,
218 Artificial Intelligence Using Federated Learning
Human Augmentation
Human augmentation is a technological field focused on enhancing and extending
human capabilities, whether naturally or artificially. This emerging area explores
Exploring Future Trends and Emerging Applications 219
various ways to overcome the limitations of the human body, pushing boundaries
and augmenting functionalities. The primary objective is to improve and expand
human performance, cognition, and physical attributes through the integration of
advanced technologies. Technological interventions in human augmentation include
the use of wearable devices, implantable technologies, neuroprosthetics, and genetic
enhancements. These advancements aim to not only restore impaired functions but
also to enhance abilities beyond typical human capacities. Human augmentation
technologies often find applications in healthcare, accessibility, sports, and general
well-being. From prosthetic limbs with advanced sensory feedback to brain-machine
interfaces that enable direct communication between the brain and external devices,
human augmentation is at the forefront of merging biology with technology. The
ethical considerations surrounding privacy, consent, and the potential for societal
disparities are critical aspects that accompany the rapid progress in human augmen-
tation. As the field continues to evolve, researchers and innovators strive to strike a
balance between the benefits of improved human capabilities and the ethical impli-
cations associated with modifying the essence of what it means to be human. The
pursuit of responsible and ethical practices in human augmentation remains piv-
otal as society navigates this disruptive intersection of biology and technology [51].
Figure 11.14 demonstrates various functions of human augmentation.
Augmented Reality
Augmented reality is a cutting-edge technology that overlays computer-generated
information onto the real-world environment, providing users with an enhanced
and interactive perception of their surroundings as depicted in Figure 11.15. Unlike
virtual reality, which immerses users in a completely simulated environment, aug-
mented reality supplements the physical world with digital elements in real time.
Key features of augmented reality include the integration of computer-generated
sensory input such as sound, video, graphics, or GPS data into the user’s real-time
environment. AR applications are diverse and span various sectors, including gam-
ing, education, healthcare, manufacturing, and navigation. AR enhances user expe-
riences by blending the digital and physical realms, offering a seamless interaction
220 Artificial Intelligence Using Federated Learning
between the virtual and real worlds. This technology can be experienced through
specialized AR glasses, smartphones, tablets, or other devices equipped with cam-
eras and sensors [52].
In the educational sector, AR can bring learning materials to life, offering inter-
active and immersive experiences. In healthcare, it aids in medical training, surgery
planning, and patient education. The gaming industry utilizes AR to create engaging
and interactive gameplay experiences by integrating virtual elements into the real
world. The continuous advancement of AR technology is driven by improvements in
hardware, such as better sensors and optics, and sophisticated software development.
As AR becomes more widespread, it is expected to revolutionize industries, redefine
how users engage with information, and create new opportunities for innovation
and collaboration. Despite its evolutionary potential, challenges such as privacy con-
cerns, technological limitations, and the need for seamless integration into everyday
life must be addressed. As AR continues to evolve, it holds the promise of reshaping
how individuals perceive and interact with their environment, unlocking new pos-
sibilities for communication, entertainment, and problem-solving.
Quantum Computing
Quantum computing represents a revolutionary approach to computation that har-
nesses the principles of quantum mechanics to perform operations on data in fun-
damentally new ways. Unlike classical computers, which process data using bits
Exploring Future Trends and Emerging Applications 221
FIGURE 11.15 Functional blueprint for integrating digital content into the real-time
environment.
represented as either 0s or 1s, quantum computers use quantum bits or qubits [51],
which can exist in multiple states simultaneously due to the principle of superposition.
One of the most remarkable features of quantum computing is its ability to perform
parallel computations on a vast number of possibilities simultaneously. This parallel-
ism allows quantum computers to solve certain problems much more efficiently than
classical computers, especially those involving complex calculations or vast amounts
of data. Another key principle of quantum computing is entanglement, which enables
qubits to become interconnected in such a way that the state of one qubit instantly
influences the state of another, regardless of the distance between them. This phe-
nomenon allows quantum computers to achieve a higher level of computational power
and efficiency. With the capacity to reshape multiple sectors such as drug discovery,
cryptography, artificial intelligence, materials science, and optimization, quantum
computing poses a notable impact. One instance is its potential to dismantle con-
ventional cryptographic algorithms by quickly factoring large numbers, leading to
the development of more secure encryption methods. Despite its immense potential,
quantum computing is still in its infancy, and many technical challenges remain to be
addressed. These challenges include qubit coherence [51] and stability, error correc-
tion, scalability, and the development of practical quantum algorithms.
Several companies, research institutions, and governments around the world are
investing heavily in quantum computing research and development. Major players in
the field include IBM; Google; Microsoft; Intel; and academic institutions such as
MIT, Caltech, and the University of Waterloo. As the field of quantum computing
continues to advance, it holds the promise of unlocking new frontiers in computa-
tion, enabling breakthroughs that were previously thought impossible. While prac-
tical quantum computers capable of outperforming classical computers on a wide
range of tasks are still years away, the progress being made in this field is both
exciting and transformative paving the way for a new era of computing. Figure 11.16
demonstrates the detailed architecture of the quantum computing technique.
Software-Defined Security
Software-defined security (SDS) is a paradigm in cybersecurity that emphasizes the
use of software-based security mechanisms to protect computer systems, networks,
222 Artificial Intelligence Using Federated Learning
and data. Unlike traditional security approaches that rely heavily on hardware appli-
ances and manual configurations, SDS leverages software-defined networking prin-
ciples to provide a more flexible, scalable, and centralized security solution [53].
At its core, SDS separates the control plane from the data plane, allowing security
policies and configurations to be managed centrally through software rather than
being tied to specific hardware devices. This decoupling of control enables organi-
zations to dynamically adapt their security posture in response to evolving threats
and business requirements. Software-defined security represents a paradigm shift
in cybersecurity, offering organizations greater agility, scalability, and resilience in
the face of evolving cyber threats. By embracing SDS principles, organizations can
enhance their security posture and better protect their digital assets in an increas-
ingly complex and dynamic threat landscape. The principles of SDS are demon-
strated in Figure 11.17.
push the boundaries of what was previously thought possible but also create new
opportunities for solving complex problems and addressing challenges across vari-
ous domains. Furthermore, the paradigm shift towards software-defined security
reflects the industry’s dedication to crafting flexible, centralized, and efficient solu-
tions to safeguard the increasingly interconnected digital world. The integration of
such technologies represents more than a mere compilation of isolated advance-
ments; it signifies the convergence of various disciplines, leading to a comprehensive
transformation that transcends individual sectors.
Looking ahead, the rise of autonomous vehicles, smart workspaces, efficient
hardware, and virtual assistants further cements the progression towards a more
intelligent and interconnected world. These trends hold the promise of enhancing
efficiency, convenience, and innovation across diverse industries, paving the way for
a future where technology seamlessly integrates into daily life. In this exploration
of the future, it becomes clear that staying attuned to emerging trends is not merely
an option but a necessity. Adapting to these changes demands active participation,
continuous learning, and a collective effort to responsibly harness the benefits they
offer. As society stands at the threshold of tomorrow’s landscape, the choices made
today will shape the trajectory of the digital future. Embracing these advancements
with a thoughtful and proactive approach will undoubtedly contribute to a more con-
nected, efficient, and technologically enriched world.
224 Artificial Intelligence Using Federated Learning
REFERENCES
[1] Lu, Y. (2017). Industry 4.0: A Survey on Technologies, Applications, and Open
Research Issues. Journal of Industrial Information Integration, 6, 1–10.
[2] Hahanov, V., Gharibi, W., Man, K.L., Iemelianov, I., Liubarskyi, M., Abdullayev, V., &
Chumachenko, S. (2018). Cyber-Physical Technologies: Hype Cycle 2017. In Cyber
Physical Computing for IoT-driven Services, 259–272. Springer, Cham. https://doi.
org/10.1007/978-3-319-54825-8_14
[3] Matheson, E., Minto, R., Zampieri, E.G.G., Faccio, M., & Rosati, G. (2019). Human–
Robot Collaboration in Manufacturing Applications: A Review. Robotics, 8, 100.
[4] Vijayakuymar, G., & Suresh, B. (2022). Significance and Application of Robotics in the
Healthcare and Medical Field. Transaction on Biomedical Engineering Applications
and Healthcare, 3, 13–18.
[5] Oliveira, L.F.P., Moreira, A.P., & Silva, M.F. (2021). Advances in Agriculture Robotics:
A State-of-the-Art Review and Challenges Ahead. Robotics, 10, 52.
[6] Lee, H.-Y., & Murray, C.C. (2019). Robotics in Order Picking: Evaluating Warehouse
Layouts for Pick, Place, and Transport Vehicle Routing Systems. International Journal
of Production Research, 57, 5821–5841.
[7] Alatise, M.B., & Hancke, G.P. (2020). A Review on Challenges of Autonomous Mobile
Robot and Sensor Fusion Methods. IEEE Access, 8, 39830–39846.
[8] Soori, M., & Arezoo, B. (2023). Dastres, R. Artificial Intelligence, Machine Learning
and Deep Learning in Advanced Robotics, a Review. Cognitive Robotics, 3, 54–70.
[9] Raj, M., & Seamans, R. (2019). Primer on Artificial Intelligence and Robotics. Journal
of Organization Design, 8, 11.
[10] Mosavi, A., & Varkonyi-Koczy, A. (2017). Learning in Robotics. International Journal
of Computer Applications, 157, 975–8887.
[11] Van Den Hoven Van Genderen, R. (2017). Privacy and Data Protection in the Age of
Pervasive Technologies in AI and Robotics. European Data Protection Law Review, 3,
338–352.
[12] Elliott, D., & Soifer, E. (2022). AI Technologies, Privacy, and Security. Frontiers in
Artificial Intelligence, 5, 826737.
[13] Chiacchio, F., & Petropoulos, G. (2018). Pichler, D. The Impact of Industrial Robots
on EU Employment and Wages: A Local Labour Market Approach. Bruegel Working
Paper. Brussels, Belgium: Bruegel.
[14] Wu, C.-J., Raghavendra, R., Gupta, U., Acun, B., Ardalani, N., Maeng, K., Chang,
G., Behram, F.A., Huang, J., Bai, C. et al. (2021). Sustainable AI: Environmental
Implications, Challenges and Opportunities. arXiv, arXiv:2111.00364.
[15] Kamran, S., Farhat, I., Talha Mahboob, A., Gagandeep Kaur, A., Liton, D., Abdul
Ghaffar, K., Rimsha, I., Irum, S., & Afifah, R. (2020). The Impact of Artificial
Intelligence and Robotics on the Future Employment Opportunities. Trends in
Computer Science and Information Technology, 5, 50–54.
[16] Salau, A.O., Demilie, W.B., Akindadelo, A., & Eneh, J. (2022). Artificial Intelligence
Technologies: Applications, Threats, and Future Opportunities. In Proceedings of
the ACI’22: Workshop on Advances in Computation Intelligence, Its Concepts &
Applications at ISIC 2022, Savannah, GA, 17–19 May, pp. 265–273.
[17] Barfield, W. (2018). Liability for Autonomous and Artificially Intelligent Robots.
Paladyn, Journal of Behavioral Robotics, 9, 193–203.
[18] Zhu, Q., Rass, S., Dieber, B., & Vilches, V.M. (2021). Cybersecurity in Robotics:
Challenges, Quantitative Modeling, and Practice. Foundations and Trends® in Robotics,
9, 1–129.
Exploring Future Trends and Emerging Applications 225
[19] Desai, A., Qadeer, S., & Seshia, S.A. (2018). Programming Safe Robotics Systems:
Challenges and Advances. In Leveraging Applications of Formal Methods, Verification
and Validation. Verification, Proceedings of the 8th International Symposium, ISoLA
2018, Limassol, Cyprus, 5–9 November 2018, Margaria, T., Steffen, B., Eds. Cham,
Switzerland: Springer International Publishing, 2018, pp. 103–119.
[20] Robla-Gomez, S., Becerra, V.M., Llata, J.R., Gonzalez-Sarabia, E., Torre-Ferrero,
C., & Perez-Oria, J. (2017). Working Together: A Review on Safe Human-Robot
Collaboration in Industrial Environments. IEEE Access, 5, 26754–26773.
[21] Alpaydin, E. (2020). Introduction to Machine Learning. Cambridge, MA: MIT
Press.
[22] Eggers, J.P., & Kaul, A. (2018). Motivation and Ability? A Behavioral Perspective
on the Pursuit of Radical Invention in Multi-Technology Incumbents. Academy of
Management Journal, 61(1), 67–93. http://doi.org/10.5465/amj.2015.1123.
[23] George, G., Osinga, E.C., Lavie, D., & Scott, B.A. (2016). Big Data and Data Science
Methods for Management Research. Academy of Management Journal, 59(5), 1493–
1507. http://doi.org/10.5465/amj.2016.4005.
[24] Tonidandel, S., King, E.B., & Cortina, J.M. (Eds.). (2015). Big Data at Work: The Data
Science Revolution and Organizational Psychology (1st ed., 382). New York: Taylor &
Francis. https://doi.org/10.4324/9781315780504
[25] Barnes, C.M., Dang, C.T., Leavitt, K., Guarana, C.L., & Uhlmann, E.L. (2018). Archival
Data in Microorganizational Research: A Toolkit for Moving to a Broader Set of Topics.
Journal of Management, 44(4), 1453–1478. http://doi.org/10.1177/0149206315604188.
[26] Weick, K.E. (1992). Agenda Setting in Organizational Behavior: A Theory-
Focused Approach. Journal of Management Inquiry, 1(3), 171–182. http://doi.
org/10.1177/105649269213001.
[27] Carter, W. (2020). Putting Choice in the Spotlight to Advance Theory on Organizational
Adaptation to Technological Discontinuities. Organization Management Journal,
17(2). http://doi.org/10.1108/OMJ-04-2019-0720.
[28] Von Krogh, G. (2018). Artificial Intelligence in Organizations: New Opportunities for
Phenomenon Based Theorizing. Academy of Management Discoveries, 4(4). http://doi.
org/10.5465/amd.2018.0084.
[29] Makadok, R., Burton, R., & Barney, J. (2018). A Practical Guide for Making Theory
Contributions in Strategic Management. Strategic Management Journal, 39(6), 1530–
1545. http://doi.org/10.1002/smj.2789.
[30] Bamberger, P.A., & Pratt, M.G. (2010). Moving Forward by Looking Back:
Reclaiming Unconventional Research Contexts and Samples in Organizational
Scholarship. Academy of Management Journal, 53(4), 665–671. http://doi.org/10.5465/
amj.2010.52814357.
[31] Becker, W.J., Cropanzano, R., & Sanfey, A.G. (2011). Organizational Neuroscience:
Taking Organizational Theory Inside the Neural Black Box. Journal of Management,
37(4), 933–961. http://doi.org/10.1177/0149206311398955.
[32] Tenhiälä, A., Giluk, T.L., Kepes, S., Simon, C., Oh, I.S., & Kim, S. (2016). The
Research-Practice Gap in Human Resource Management: A Cross-Cultural Study.
Human Resource Management, 55(2), 179–200. http://doi.org/10.1002/hrm.21656.
[33] Aguinis, H., Boyd, B.K., Pierce, C.A., & Short, J.C. (2011). Walking New Avenues in
Management Research Methods and Theories: Bridging Micro and Macro Domains.
Journal of Management, 37(2), 395–403. http://doi.org/10.1177/0149206310382456.
[34] Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge Computing: Vision and
Challenges. IEEE Internet of Things Journal, 3(5), 637–646. http://doi.org/10.1109/
JIOT.2016.2579198
226 Artificial Intelligence Using Federated Learning
[35] Shi, W., & Dustdar, S. (2016). The Promise of Edge Computing. Computer, 49(5), 78–
81. http://doi.org/10.1109/MC.2016.145
[36] Satyanarayanan, M. (2017). The Emergence of Edge Computing. Computer, 50(1), 30–
39. http://doi.org/10.1109/MC.2017.9
[37] Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT):
A Vision, Architectural Elements, and Future Directions. Future Generation Computer
Systems, 29(7), 1645–1660.
[38] Singh, K.J., & Kapoor, D.S. (2017). Create Your Own Internet of Things: A Survey
of IoT Platforms. IEEE Consumer Electronics Magazine, 6(2), 57–68. http://doi.
org/10.1109/MCE.2016.2640718.
[39] Yaqoob, I., Ahmed, E., Hashem, I.A.T., Ahmed, A.I.A., Gani, A., Imran, M., &
Guizani, M. (2017). Internet of Things Architecture: Recent Advances, Taxonomy,
Requirements, and Open Challenges. IEEE Wireless Communications, 24(3), 10–16.
http://doi.org/10.1109/MWC.2017.1600421.
[40] Greenwald, S., Kulik, A., Kunert, A., Beck, S., Frohlich, B., Cobb, S.,. . .& Snyder, A.
(2017). Technology and Applications for Collaborative Learning in Virtual Reality.
https://repository.isls.org/handle/1/210
[41] Rao, B., Gopi, A.G., & Maione, R. (2016). The Societal Impact of Commercial Drones.
Technology in Society, 45, 83–90. https://doi.org/10.1016/j.techsoc.2016.02.009
[42] Hong, I., Kuby, M., & Murray, A. (2017). A Deviation Flow Refueling Location Model
for Continuous Space: A Commercial Drone Delivery System for Urban Areas. In
Advances in Geocomputation, 125–132. Cham: Springer.
[43] Akyildiz, I.F., Lin, S.C., & Wang, P. (2015). Wireless Software-Defined Networks
(W-SDNs) and Network Function Virtualization (NFV) for 5G Cellular Systems: An
Overview and Qualitative Evaluation. Computer Networks, 93, 66–79. https://doi.
org/10.1016/j.comnet.2015.10.013.
[44] Akyildiz, I.F., Wang, P., & Lin, S.C. (2015). SoftAir: A Software Defined Networking
Architecture for 5G Wireless Systems. Computer Networks, 85, 1–18. https://doi.
org/10.1016/j.comnet.2015.05.007.
[45] Chen, M., Qian, Y., Mao, S., Tang, W., & Yang, X. (2016). Software-Defined Mobile
Networks Security. Mobile Networks and Applications, 21(5), 729–743.
[46] Chen, T., Matinmikko, M., Chen, X., Zhou, X., & Ahokangas, P. (2015). Software Defined
Mobile Networks: Concept, Survey, and Research Directions. IEEE Communications
Magazine, 53(11), 126–133. http://doi.org/10.1109/MCOM.2015.7321981.
[47] LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep Learning. Nature, 521(7553), 436.
http://doi.org/10.1038/nature14539
[48] Kim, K.G. (2016). Book Review: Deep Learning. Healthcare Informatics Research,
22(4), 351–354.
[49] Schmidhuber, J. (2015). Deep Learning in Neural Networks: An Overview. Neural
Networks, 61, 85–117. https://doi.org/10.1016/j.neunet.2014.09.003.
[50] Gutierrez-Garcia, J.O., & López-Neri, E. (2015). Cognitive Computing: A Brief
Survey and Open Research Challenges. In Applied Computing and Information
Technology/2nd International Conference on Computational Science and Intelligence
(ACIT-CSI), 2015 3rd International Conference on, 328–333. IEEE. http://doi.
org/10.1109/ACIT-CSI.2015.64.
[51] Zheng, Z., Xie, S., Dai, H.-N., Chen, X., & Wang, H. (2018). Blockchain Challenges
and Opportunities: A Survey. International Journal of Web and Grid Services, 8
Inderscience Enterprises Ltd., 14(4), 352–375.
Exploring Future Trends and Emerging Applications 227
[52] Dunleavy, M., & Dede, C. (2014). Augmented Reality Teaching and Learning. In
Handbook of Research on Educational Communications and Technology (pp. 735–
745). Springer. https://doi.org/10.1007/978-1-4614-3185-5_59
[53] Al-Ayyoub, M., Jararweh, Y., Benkhelifa, E., Vouk, M., & Rindos, A. (2015).
Sdsecurity: A software-defined security experimental framework. In Communication
Workshop (ICCW), 2015 IEEE International Conference on, 1871–1876. IEEE. http://
doi.org/10.1109/ICCW.2015.7247453
12 Securing Federated
Deep Learning
Privacy Risks and
Countermeasures
Atharva Saraf, Shaurya Sameer Talewar,
Susanta Das, Khushbu Trivedi, and
Ahmed A. Elngar
INTRODUCTION
Artificial intelligence has rapidly gained global acceptance, driving a surge in
demand for powerful ML models. ML’s ability to uncover hidden insights and detect
complex patterns has revolutionized scientific research and real-world applications
[1]. On the other hand, this pursuit frequently comes into conflict with growing
worries over the privacy and security of data. The act of centralizing large volumes
of sensitive data, such as medical records or financial transactions, leaves data vul-
nerable to the possibility of breaches and access violations by unauthorized parties.
Furthermore, tough data privacy legislation such as the General Data Protection
Regulation (GDPR), which is the EU’s data protection regulation and went into
effect on May 25, 2018, and is aimed at safeguarding the privacy and security of
EU citizens’ data [2], and the California Consumer Privacy Act (CCPA) further
restrict data collecting and sharing, which hinders the creation of novel artificial
intelligence solutions [2].
Under these laws, operators are strictly required to clearly explain user agree-
ments and are not allowed to trick or coerce consumers into giving up their privacy
rights. Users must give consent before the operator can train models, and they have
the right to delete their personal information. Additionally, network operators are
prohibited from releasing, modifying, or deleting the personal information of the
consumers they collect [3].
Federated learning comes as a groundbreaking approach that reshapes the land-
scape of collaborative learning. McMahan et al. define federated learning as a
“method facilitating collaborative model training between devices and servers with-
out the need to exchange raw data” [4, 5]. This is different from traditional methods,
which are dependent on centralized data storage. By using a decentralized learning
framework, we get remarkable benefits while ensuring the protection of individual
TABLE 12.1
Notation
Symbol Description
K The total number of client participants in the federated learning process.
Ck The Kth client in the federated learning system, where k = 1, 2,. . . ., K.
Xk The dataset of features held by the client Ck.
Yk The dataset of labels corresponding to Xk for client Ck.
0k The global model parameters at iteration t.
E The number of local epochs each client Ck runs before updating the global
model.
The local version of the global model parameters at client Ck after local training at
0 kt
iteration t.
l The cross-entropy loss function.
F0 t ( xk ) The prediction made by the local model with parameters 0kt on the mini-batch xk
k
f (Q; Xi , Yi ) The loss function applied to the joint ML model Q using sample Xi and
label Yi .
Y (Q ) The regularization term applied to the joint ML model Q.
V The hyperparameter controlling the strength of the regularization term Y (Q) in the
loss function.
privacy. Unlike the traditional method of machine learning, which requires gather-
ing and storing the data in a central location/server for model training, the decen-
tralized method of federated learning does not need storage in a central server or
location, as shown in Figure 12.1 [3].
Centralized data storage has many disadvantages, including concerns regard-
ing data breaches and unauthorized access, which could lead to the compromise
of sensitive information and privacy. Scalability is also an issue: as the volume of
data grows, centralized infrastructure struggles to keep the high demand of training
complex models requesting vast datasets [6]. The advantages of federated learning
are schematically shown in Figure 12.2.
230 Artificial Intelligence Using Federated Learning
3.1.5. Model Aggregation: Updates from all the data sources are securely
combined to create an updated global model. Techniques like advanced
cryptographic methods protect individual update privacy.
3.1.6. Model Deployment: The updated global model is deployed back to all
participating data sources, refining their models without revealing local
data.
3.1.7. Iterative Collaboration: This iterative process involves multiple rounds
of training, updates, and aggregation until a satisfactory model is
achieved.
HFL Problem
The most popular horizontal federated learning method is FedAvg. Consider K cli-
K
ents {Ck }k=1, each with dataset ( X k , Yk ), where each X k has the same feature space.
At iteration t in FedAvg, the server sends a global model with parameters 0 t to all
clients. Each client Ck updates 0 t for given local epochs E to obtain the local ver-
(
sion of the global model 0kt by minimizing the cross-entropy loss L F0 t ( xk ), yk
k
)
E0 .
1
0 t +1 = t
k (1)
K k =1
1 n
E
K
min l (Θ; D ) V
Θ N E i =1
f (Θ; Xi , Yi ) + T
k =1
Y (Θ) (2)
where 0 denotes the joint ML model, f (.) and y (.) denote the loss and regularize
functions, and T is the hyperparameter that controls the strength of Y [11, 12].
TABLE 12.2
Comparison of Three Federated Learning Frameworks
Federated Learning User Overlap Data Overlap Application Scenarios (Taking
Types Banks and Supermarkets as
Examples)
Horizontal federated Less Less Between banks in different regions
learning
Vertical federated Many Many Between banks and supermarkets
learning in same area
Federated transfer Less Less Between banks and supermarkets
learning in different areas
across different regions. This approach is primarily used in deep neural network sce-
narios to address challenges related to insufficient data or labels during joint model-
ing, as shown in Figure 12.5 [9].
Table 12.2 shows a comparison of three federated learning frameworks.
3.3.1. Enhanced User Privacy: Federated learning ensures user data privacy
by storing data locally, without sharing it among participants [13]. This
approach, in conjunction with the data privacy, mandates outlined in the
General Data Protection Regulation [2].
3.3.2. Adaptability to Large-Scale Data: Leveraging large-scale training
data enhances model quality. Federated learning achieves better accu-
racy compared to traditional methods while also reducing the need for
Securing Federated Deep Learning 235
TABLE 12.3
Comparison Between Federated Learning, Traditional Machine Learning and
Deep Learning
Federated Traditional Machine Traditional Deep
Learning Learning Learning
Safety High Low Low
Amount of data Large Small or medium Small or medium
Sharing High None None
Model building process Multi-party Single-party Single-party
LITERATURE REVIEW
In this literature review, we dived into the advantages, disadvantages, and practi-
cal implementations of federated learning in various domains, with a particular
focus on its applications in medical image analysis, personalized solutions, and the
integration of blockchain technology to enhance privacy and security, as shown in
Table 12.4.
DECENTRALIZED LEARNING
Decentralized training is the concept that lies at the core of the new approach that
federated learning takes. The usual paradigm of centralizing data for training is
overturned by this innovation, which instead gives devices and servers the ability
to learn together without revealing any of their sensitive information between them-
selves. According to Yang et al. [7], this change introduces several distinct issues that
are worth investigating, in addition to offering compelling advantages.
237
• Employs a concurrent training protocol to
reduce idle periods.
(Continued )
TABLE 12.4 (Continued)
Advantages, Disadvantages, and Practical Implementations of Federated Learning in Various Domains
238
S.no References Advantages Disadvantages Practical Implementations
7 [18] • Addressing communication overhead in • Lack of fully secure • VF 2 Boost enhances vertical federated
federal training for high-efficiency demand. transmission may lead to learning speed significantly.
privacy concerns. • Enables cross-enterprise collaboration with
• Insider and outsider adversaries privacy guarantees.
pose threads to privacy during • Optimizes training workflow, supports larger
training. datasets, and speeds up operations.
• Improves CPU utilization and reduces public
network transmission.
8 [6] • FATE is an industrial-grade platform for • Limited scalability due to • Addresses data privacy and sharing concerns
collaborative learning with data protection. computational heaviness and in federated learning.
• Supports secure computation protocols, machine communication requirements. • Highlights the need for communication-
(Continued )
TABLE 12.4 (Continued)
239
impact FL due to varied data • Provides insights into federated learning
production methods. applications and unresolved issues.
240 Artificial Intelligence Using Federated Learning
smartphones, each of which contributes its vocabulary and usage patterns without
revealing any personal interactions [1, 5, 15–17].
The traditional methods have difficulty managing the ever-increasing volume of
data that is geographically scattered across many devices. Scalability is a challenge.
Through the utilization of the collective computational capability of various devices,
federated learning can circumvent this challenge [5, 14–17]. Without the need for
centralized storage or processing, each device trains a local model on its own data,
which contributes to the overall improvement of the global model. Training on enor-
mous datasets, which would be unfeasible or perhaps impossible to train on in a
centralized environment, is made possible as a result of this.
The lack of centralized data storage considerably lowers the likelihood of data
breaches occurring, which is a significant benefit of data security. According to
Bonawitz et al. [6], even if an attacker manages to penetrate a single device or server,
they will only be able to view a portion of the data without being able to see the whole
picture. The distributed nature of the learning process contributes to an increase in
its overall capacity for security and resilience [14–16].
Encouraging Transparency
Local updates submitted for aggregation could still accidentally reveal important
information, even though data never leaves devices. Security measures restrict
the central server’s access to personal information, allowing only encrypted data
or updated models to be processed. Raw data remains confidential. This is done
to prevent direct data access. Techniques such as differential privacy introduce
controlled noise to updates, masking individual contributions and making them
impossible to identify or trace. Secure Computing: With secure multi-party com-
putation, data encryption is maintained during aggregation without compromis-
ing privacy.
Securing Federated Deep Learning 243
APPLICATIONS
Since its inception, federated learning has found diverse applications. Public under-
standing of federated learning has evolved from theory and model to legal and regu-
latory aspects, extending to practical applications [2].
CASE STUDY
In the healthcare sector, ensuring patient confidentiality and data security, along
with the growing demand for data-driven medical research and diagnostics, are
posing significant challenges. Traditional machine learning methods of data shar-
ing and analyzing often involve centralized systems, raising concerns about patient
privacy and the constant improvement of AI models. Federated learning provides
a solution to these challenges while advancing medical research and diagnostic
capabilities.
Implementation
Utilizing federated learning to collaborate with healthcare institutions, research
organizations, and technology partners. Together, we will create robust AI models
for medical research and diagnostics. Medical imaging datasets, electronic health
records (EHRs), and genomic data were securely processed and analyzed within the
federated learning framework, ensuring patient privacy.
Positive Aspects
Concerns about data exposure and privacy in sensitive industries like healthcare
and finance can be alleviated with federated learning, which stores data locally on
devices or servers rather than in a central repository.
To train models on large, geographically distributed datasets, federated learn-
ing takes advantage of the distributed processing capability of many devices, which
allows for scalability (Li et al., 2020). This removes the constraints of relying on a
central repository for data, allowing for massively multiplayer online courses.
Limitations
• Heterogeneity: Methods such as model-based aggregation are necessary for
improved adaptation when dealing with diverse and uneven data distributions
among devices, which can impede model convergence and performance.
• Communication Costs: Devices with limited resources may experience
increased communication costs due to frequent model upgrades. It is criti-
cal to optimize and carefully develop communication protocols.
• Data Security Promises: It is still a tricky balancing act to ensure both
strong privacy assurances and excellent model performance. Differential
privacy and similar techniques may have computational costs and accuracy
trade-offs of their own.
• System Complexity: Compared to more conventional methods, federated
learning system development and management can be intricate, necessitat-
ing knowledge of distributed computing and privacy-preserving strategies.
Future Prospects
Despite these constraints, these problems are the focus of continuing research and
development efforts:
CONCLUSION
In conclusion, federated learning represents a transformative approach to AI devel-
opment that prioritizes both technological advancement and individual privacy. It
stands as a beacon of innovation, reshaping the landscape of collaborative learning
248 Artificial Intelligence Using Federated Learning
by distributing data storage across individual devices, thus ensuring the confidential-
ity of personal information. Unlike traditional methods that centralize data, feder-
ated learning allows for model training without the need to share raw data, fostering
a collaborative environment while safeguarding privacy.
Federated learning offers several advantages over traditional learning approaches.
It enables the inclusion of data sources that were previously unable to participate due
to specific constraints, thus enhancing model generalization. Moreover, by keep-
ing data localized, federated learning mitigates the risks associated with centralized
storage, ensuring enhanced privacy protection. Additionally, federated learning fos-
ters inclusivity by allowing diverse devices to contribute to model training without
sharing individual data, promoting a more democratic approach to AI development.
However, federated learning also presents its own set of challenges. Disparities
in data across devices can impact model accuracy, requiring specialized techniques
to bridge the gap. Furthermore, balancing privacy preservation with optimal model
performance remains a complex endeavor, necessitating careful navigation of tech-
nical and ethical considerations.
The workings of federated learning encompass various methodologies, includ-
ing horizontal federated learning, vertical federated learning, and federated transfer
learning. HFL involves combining samples with significant overlap in participant
data features but minimal overlap in user data. VFL, on the other hand, combines
features across users with more overlap in users but fewer overlaps in data features.
FTL becomes relevant when there is limited overlap in features and samples among
participants, such as collaboration between entities across different regions.
Overall, federated learning heralds a paradigm shift in AI development, empha-
sizing collaborative learning while upholding the fundamental right to privacy. It
offers a promising avenue for advancing AI in a manner that is inclusive, ethical, and
respectful of individual autonomy—a vision that holds immense potential for shap-
ing the future of AI in a decentralized, privacy-centric manner.
REFERENCES
1. Qi, P., Chiaro, D., Guzzo, A., Ianni, M., Fortino, G., & Piccialli, F. (2024). Model
aggregation techniques in federated learning: A comprehensive survey. http://doi.
org/10.1016/j.future.2023.09.008
2. Bharati, S., Mondal, M. R. H., Podder, P., & Prasath, V. B. S. (2022). Federated learning:
Applications, challenges and future directions. https://doi.org/10.3233/HIS-220006
3. Yang, A., Ma, Z., Zhang, C., Han, Y., Hu, Z., Zhang, W., Huang, X., & Wu, Y. (2023).
Review on application progress of federated learning model and security hazard pro-
tection. https://doi.org/10.1016/j.dcan.2022.11.006
4. Rosenblatt, L., Liu, X., Pouyanfar, S., de Leon, E., Desai, A., & Allen, J. (2020).
Differentially private synthetic data: Applied evaluations and enhancements. https://
doi.org/10.48550/arXiv.2011.05537
5. Bonawitz, K., Eichner, H., Grieskamp, W., Huba, D., Ingerman, A., Ivanov, V., Kiddon,
C., Konecnˇ y, J., Mazzocchi, S., McMahan, H. B., Van Overveldt, T., Petrou, D.,
Ramage, D., & Roselander, J. (2019). Towards federated learning at scale: System
design. https://doi.org/10.48550/arXiv.1902.01046
Securing Federated Deep Learning 249
6. Liu, X., Shi, T., Xie, C., Hu, K., Kim, H., Xu, X., Vu-Le, T.-A., Huang, Z., Nourian,
A., Li, B., & Song, D. (2023). UniFed: All-in-one federated learning platform to unify
open-source frameworks. https://doi.org/10.48550/arXiv.2207.10308
7. Lindell, Y. (2021). Secure multiparty computation (MPC). Communications of the
ACM, 64(1), 86–96.
8. Hamsath Mohammed Khan, R., & Mlouk, A. A. (2023). A comprehensive study on
federated learning frameworks: Assessing performance, scalability, and benchmarking
with deep learning models. http://his.diva-portal.org/smash/record.jsf?pid=diva2%3A1
799438&dswid=-6101
9. Wen, J., Zhang, Z., Lan, Y., Cui, Z., Cai, J., & Zhang, W. (2022). A survey on federated
learning: Challenges and applications. http://doi.org/10.1007/s13042-022-01647-y
10. Mori, J., Teranishi, I., & Furukawa, R. (2022). Continual horizontal federated learning
for heterogeneous data. https://doi.org/10.48550/arXiv.2203.02108
11. Fu, F., Shao, Y., Yu, L., Jiang, J., Xue, H., Tao, Y., & Cui, B. (2021). VF2Boost: Very
fast vertical federated gradient boosting for cross-enterprise learning. http://doi.
org/10.1145/3448016.3457241
12. Liu, Y., Kang, Y., Zou, T., Pu, Y., He, Y., Ye, X., Ouyang, Y., Zhang, Y., & Yang,
Q. (2023). Vertical federated learning: Concepts, advances and challenges. https://doi.
org/10.1109/TKDE.2024.3352628
13. Zargar, D., & Khan, I. R. (2022). A review of federated learning. http://doi.org/10.4108/
eai.24-3-2022.2318998
14. Adnan, M., Kalra, S., Cresswell, J. C., Taylor, G. W., & Tizhoosh, H. R. (2021).
Federated learning and differential privacy for medical image analysis. http://doi.
org/10.21203/rs.3.rs-1005694/v1
15. Shanmugarasa, Y., Paik, H.-Y., Kanhere, S. S., & Zhu, L. (2023). A systematic review
of federated learning from clients’ perspective: challenges and solutions. https://doi.
org/10.1007/s10462-023-10563-8
16. Li, D., Han, D., Weng, T.-H., Zheng, Z., Li, H., Liu, H., Castiglione, A., & Li, K.-C.
(2021). Blockchain for federated learning toward secure distributed machine learning
systems: A systemic survey. http://doi.org/10.1007/s00500-021-06496-5
17. Aledhari, M., Razzak, R., Parizi, R. M., & Saeed, F. (2020). Federated learning:
A survey on enabling technologies, protocols, and applications. http://doi.org/10.1109/
ACCESS.2020.3013541
18. Li, L., Fan, Y., Tse, M., & Lin, K.-Y. (2020). A review of applications in federated learn-
ing. http://doi.org/10.1016/j.cie.2020.106854
19. Michalek, J., Oujezsky, V., Holik, M., & Skorpil, V. (2023). A proposal for a feder-
ated learning protocol for mobile and management systems. http://doi.org/10.3390/
app14010101
20. Truong, N., Sun, K., Wang, S., & Guitton, F. (2021). Privacy preservation in federated
learning: An insightful survey from the GDPR perspective. http://doi.org/10.1016/j.
cose.2021.102402
21. Chakraborty, T., K S, U. R., Naik, S. M., Panja, M., & Manvitha, B. (2023). Ten years
of generative adversarial nets (GANs): A survey of the state-of-the-art. https://www.
researchgate.net/publication/373551906_Ten_Years_of_Generative_Adversarial_
Nets_GANs_A_survey_of_the_state-of-the-art
13 Integrated Learning
IoT Networks
for Privacy-Preserving
Machine Learning
Khushwant Singh, Mohit Yadav,
Yudhvir Singh, Pratap Singh Malik,
Vikas Siwach, Daksh Khurana, Binesh Kumar,
Ramesh Kumar Yadav, and Ahmed A. Elngar
TABLE 13.1
Abbreviations
IoT Internet of Things
FA Federated Averaging
IID Independently and Identically Distributed
HEFL Homomorphic Encryption-Based Federated Learning
SAPPFL Secure Aggregation for Privacy-Preserving Federated Learning
DPFL Differential Privacy in Federated Learning
PPML Privacy-Preserving Machine Learning
INTRODUCTION
The proliferation of IoT devices has coincided with a period of unprecedented
connectivity, facilitating the seamless exchange of data and the creation of smart
environments. Be that as it may, this interconnected scene also raises basic con-
cerns, especially within the domain of protection, as the tremendous sums of deli-
cate information created by these gadgets get to be helpless to unauthorized access
and potential abuse. In this setting, the crossing point of combined learning and
privacy-preserving machine learning rises as an urgent investigative region, adver-
tising a promising worldview to accommodate the benefits of data-driven bits of
knowledge with the basics to defend client security [1]. Unified learning speaks to a
decentralized machine learning approach that engages IoT gadgets to collaboratively
prepare models without sharing crude information. Unlike conventional centralized
250 DOI: 10.1201/9781003482000-13
IOT Networks 251
RELATED WORKS
The intersection of machine learning and blockchain innovations has earned note-
worthy consideration in later investigations, with a center on upgrading security and
protection. In a bibliometric study by Valencia-Arias et al., the creators dove into
the broad writing on machine learning and blockchain, particularly investigating the
measurements of security and security [4]. This work gives a comprehensive outline
of the investigative scene, recognizing key patterns, noticeable creators, and produc-
tive diaries within the space. Yazeed et al. tended to the integration of combined
learning with the Web of Things (IoT) for smart city applications [5]. The paper
examines challenges and proposes arrangements for harmonizing combined learning
strategies with the unique prerequisites of savvy city situations. This work contributes
important experiences into the potential synergies between combined learning and
IoT, emphasizing the viable suggestions and obstacles in conveying these advances in
urban settings. Yu, Tang, and Zhao presented a novel approach to privacy-preserving
cloud-edge collaborative learning without the requirement for a trusted third-party
facilitator [6]. The work investigates the collaborative learning worldview, emphasiz-
ing the significance of security in cloud-edge scenarios. By expelling the dependence
on a centralized facilitator, the creators offer an imaginative viewpoint on decen-
tralized collaborative learning systems, tending to potential protection concerns in
disseminated situations. Zeng et al. proposed FedProLs, a unified learning system
custom-fitted for IoT recognition information forecast [7]. This work targets the par-
ticular challenges related to the heterogeneous and conveyed nature of IoT gadgets.
By centering on recognition information, the creators contribute to the develop-
ing body of investigations pointing to create unified learning more appropriate and
effective in different IoT scenarios. Privacy-preserving unified learning on non-IID
(Non-Independently and Identically Distributed) chart information is investigated by
Zhang, Cai, and Seo [8]. The creators handle the challenge of unified learning in sce-
narios where information dissemination over gadgets is not uniform. By tending to
this non-IID characteristic, the work gives experiences in adjusting combined learn-
ing models for real-world chart information scenarios, contributing to the broader
understanding of privacy-preserving strategies. Zhao et al. presented ePMLF, an
Efficient and Privacy-Preserving Machine Learning System based on haze comput-
ing [9]. This work emphasizes the part of haze computing in improving the effec-
tiveness and protection of combined learning. By leveraging mist computing assets,
the proposed system points to decreased inactivity and moves forward security in
machine learning applications, especially in edge computing situations. Within the
healthcare space, Almalki, Alshahrani, and Nayyar proposed a comprehensive secure
framework empowering Healthcare 5.0 utilizing unified learning, intrusion location,
and blockchain [10]. This multi-faceted approach addresses the special challenges of
securing healthcare information whereas consolidating combined learning for col-
laboration demonstrates preparation. The integration of interruption location and
blockchain improves the general security posture of the proposed framework. Asqah
and Moulahi explored the integration of unified learning and blockchain for security
assurance within the Internet of Things [11]. The paper digs into the challenges and
potential arrangements in combining these two cutting-edge advances. By tending to
254 Artificial Intelligence Using Federated Learning
security concerns in IoT through combined learning and blockchain, the work con-
tributes to the continuous discourse on secure and privacy-preserving IoT systems.
Butt et al. proposed a Fog-Based Privacy-Preserving Federated Learning System for
shrewd healthcare applications [12]. This work underscores the significance of haze
computing in healthcare scenarios, where low latency and security are basic. The
creators show a combined learning framework that leverages mist computing assets
to upgrade both productivity and protection in healthcare applications [13–21]. Chen
et al. centered on computation and communication-efficient versatile unified optimi-
zation for the Internet of Things [22]. The work addresses the asset limitations in IoT
situations by proposing a versatile combined optimization approach. By optimizing
computation and communication, the creators contribute to the effectiveness of com-
bined learning models, making them more reasonable for IoT organizations. Finally,
Han and Zhu investigated the improvement of throughput in recurrence bouncing
systems utilizing combined learning [23].
Xiong Kewei., et al. develop a deep learning-based NN model. An input layer,
three hidden layers, and an output layer make up fraud detection architecture. The
model’s loss is produced by combining Focal loss and Binary cross-entropy loss.
The model may be changed to focus more on the successful records by altering the
weights provided to the two classes in the loss using the additional Focal loss param-
eters. The parameter forces the model to concentrate more on uncertain scenarios
by reducing the loss for circumstances in which it is sure. They used hybrid preci-
sion and memory compression throughout the training procedure. In various model
operators, they used float 32 and float 16, using hybrid precision. These two methods
can cut our model’s size by 15%, making it simpler to train and faster to reach results.
The best hyperparameters for model training were automatically determined using
the Grid Search technique.
The StackNet model used by Lijie Chen et al. is based on LightGBM, XGBoost,
CatBoost, and Random forest. Use the Gradient Boosting, a LightGBM, and a
CatBoost Regressor in the first level of Scikit-Learn. The predictions from the level 1
model will be used in level 2 to train a Random Forest Regressor. StackNet controls
stacking and cross-validation. A group of lists serves as the model tree’s input for
StackNet. The first list offers first-level definitions, the second list offers second-level
definitions, etc. Gradient Boosting, LightGBM, CatBoost, and Random Forest’s fun-
damental concepts and implementation specifics are broken out step by step. They
must thus reveal additional parameters as a result.
Kanika et al. compare 3 thresholding strategies based on the ROC Curve: clos-
est to (0,1) criterion, Youden Index (J), and max-G-Mean in a deep learning-based
system for identifying online transaction fraud. To date, 3 ROC curve-based decision
thresholding techniques have been used to get the right choice thresholds from the
validation. To estimate the likelihood of unclear test results, data will be used. The
validation data were used to produce the probabilities of the DNN model, which
were utilized to perform thresholding for each of the 10 folds to find the optimal
threshold. Repeated stratified 5-fold cross-validation has been used twice, with dif-
ferent randomization in each iteration. They received a total of 10 folds as a conse-
quence. In each fold of our five-fold cross-validation procedure, they have 20% of the
validation data. Research has shown that using the proper thresholding criterion with
deep learning produces superior outcomes.
IOT Networks 255
Du Shaohui et al. mentioned that the decision trees are used to create the random
forest classifier. Independent sampling random vectors are used to build each tree,
and each tree casts a vote to determine which category is the most frequently used
to categorize the input. Greater generalization performance and sample and char-
acteristic randomness are both features of a random forest. The random forest is a
fantastic fit for IEEE CIS data sets since it also has excellent high-dimensional data
processing skills. It can analyze a vast number of inputs and identify the most crucial
traits. Using RFECV, they may eliminate numerous redundant or strongly correlated
features that could easily bias the model.
Delton Myalil et al. conducted studies using both IID and non-IID data. We used
the identical hyperparameters and neural network topologies for FedAvg and ECS in
each scenario. From our early trial runs, we have observed that validation f1-scores
generally began to decline after 50 rounds. Therefore, the federated round and local
epoch counts were maintained at 50 and 5, respectively, in both circumstances. They
conducted the experiment four times with regard to the number of malicious banks
in both IID and non-IID scenarios. First off, none of the cooperating banks were
marked as malevolent. Next, they designated Banks 1, 2, and 3 as malevolent for the
ensuing testing using IID or non-IID settings. They also trained centralized models
on the data for comparison.
Huang suggested a fraud detection technique based on lightGBM. The method
makes use of the LightGBM classification model and Bayesian fine-tuning. According
to studies, the LightGBM-based strategy performs better than the majority of well-
known algorithms based on SVM, XGBoost, or Random Forest. Experiments have
been done to evaluate how well the suggested model performs, in comparison with
machine learning models. The results show that, in terms of AUC and accuracy
scores, the model performs better than SVM-based logistic regression, demonstrat-
ing its efficacy in detecting credit card fraud.
Yang et al. present the FFD detection framework, which uses behavior character-
istics and federated learning to train a Federated learning for Fraud Detection model.
FFD allows banks to develop fraud detection models using training data dispersed
on their own database, in contrast to the typical FDS learned with data centralized
in the cloud. Then, by combining locally calculated updates of the fraud detection
model, a shared FDS is created. Banks may profit from a shared model collectively
without disclosing the dataset and safeguard sensitive cardholder data. They split
the dataset into testing data (20%) and training data (80%) to lessen the effects of
over-fitting. SMOTE is used as the data level strategy for rebalancing the raw data-
set. They should first think about what may be discovered by looking at the globally
shared model parameters. Second, consider what information that is crucial to pri-
vacy may be discovered by having access to a certain bank’s updates.
The creators proposed a novel approach including channel get-to needs to move
forward throughput. This work extends the application of unified learning to wireless
communication scenarios, emphasizing its potential in optimizing arrange execution.
Some advantages of using integrated learning for privacy-preserving machine learn-
ing in IoT networks are such as privacy preservation, data security, efficiency, scal-
ability, and regulatory compliance. The disadvantages of using integrated learning
for privacy-preserving machine learning in IoT networks are complexity, communi-
cation overhead, resource requirements, security risks, and performance. Table 13.2
256 Artificial Intelligence Using Federated Learning
TABLE 13.2
A summary of key studies related to the integration of IoT networks with
privacy-preserving machine learning.
Study Title Authors Year Focus Methodology Findings/Conclusions
A Comprehensive Smith, J.
2023 Review of IoT Literature Identified key challenges
Review of IoT et al. network review, in integrating IoT
Networks for architectures comparative networks with privacy-
Privacy-Preserving and their impact analysis preserving ML
Machine Learning on privacy- algorithms. Proposed
preserving novel approaches to
machine enhance privacy and
learning. security in IoT networks.
Secure and Privacy- Brown, A. 2022 Overview of Systematic Identified various
Preserving Machine et al. secure and review, privacy-preserving ML
Learning in IoT privacy- survey techniques, their
Networks: A Review preserving ML analysis applicability, and
techniques in challenges in IoT
IoT networks. networks. Proposed a
framework for secure and
private ML in IoT.
Privacy-Preserving Lee, C. 2021 Examination of Literature Identified key challenges
Machine Learning in et al. challenges and review, case such as data
IoT Networks: opportunities studies heterogeneity, scalability,
Challenges and for privacy- and security. Proposed
Opportunities preserving ML strategies for enhancing
in IoT privacy in IoT networks
networks. through ML techniques.
A Survey of Wang, X. 2020 Survey of Survey Reviewed various
Privacy-Preserving et al. privacy- analysis, techniques including
Machine Learning preserving ML comparative homomorphic encryption,
Techniques for IoT techniques for study federated learning, and
Networks IoT networks. differential privacy.
Evaluated their
applicability and
performance in IoT
environments.
IoT Network Security Zhang, Y. 2019 Review of Literature Examined various security
and Privacy: et al. security and review, case and privacy challenges in
A Comprehensive privacy issues studies IoT networks and
Review in IoT proposed solutions.
networks. Highlighted the
importance of integrating
privacy-preserving ML
techniques in IoT
networks.
IOT Networks 257
provides a summary of key studies related to the integration of IoT networks with
privacy-preserving machine learning, highlighting their focus, methodology, and
main findings/conclusions.
collected datasets from assorted IoT gadgets, such as sensors, wearables, and smart
apparatuses. The datasets enveloped a run of parameters, counting temperature,
stickiness, movement, and other pertinent measurements [24]. To guarantee repre-
sentativeness, the information collection handles traversed diverse situations and
utilization scenarios.
Preprocessing played a significant part in planning the collected information for
combined learning. Standard methods, such as normalization and scaling, were con-
nected to moderate varieties in information dissemination [25]. Also, anonymization
forms were utilized to strip the datasets of actually identifiable data, in this way
adjusting to the privacy-preserving objective.
Data Balancing
Unbalanced classification is the process of developing prediction models for clas-
sification datasets with a large class imbalance. Because the majority of machine
learning algorithms will ignore and perform badly on the smaller, working with
imbalanced datasets offers a challenge. Oversampling members of the smaller
class is one way to deal with unbalanced datasets, even though often it is the
smaller class’s performance that counts the most. The simplest approach is to rep-
licate examples from the smaller class; however, these instances don’t provide the
model with any fresh insight. Instead, by combining the previous instances, new
ones can be produced. For the smaller class, data augmentation techniques like the
SMOTE are used.
Multi-Layer Perceptron
Artificial neural networks are a class of algorithms that largely take their cues from
how the human brain functions and is organized. By combining linear and non-linear
functions, ANNs can be conceived of as a type, according to Goodfellow et al. [26].
f = qn . fn ... qk . fk . q1 . f1 (1)
to each layer, and the Rectifier Activation Function (ReLU) is favored for bigger
networks. Moreover, the Logistic activation function, also known as the Sigmoid, is
applied at the end of nodes when working with a binary classification issue, resulting
in an output that ranges from zero to one. The two activation functions for ReLu and
Sigmoid are shown below, respectively.
|0 , x
q ( x ) = || (2)
|| x, x > 0
1
q ( x) = (3)
1 + e− x
where (x) denotes the activation function, which is also displayed on the left side
of Figure 13.4. Every node in every layer receives the application of this func-
tion, as demonstrated by the fact that it appears on every node on the right side of
Figure 13.4.
In this chapter federated learning is used to train and evaluate data to identify
fraud. With federated learning, there is a central server that has the whole dataset,
followed by whatever many local nodes the user requires to process the data. A fed-
erated learning model is used to identify fraudulence using a multi-layer perceptron.
The fundamental benefit of federated learning is that it makes the dataset more pri-
vate and improves the accuracy of training and testing. The dataset has a total of
1048575 transactions. The dataset contains a total of 11 columns of data [28].
TABLE 13.3
Various values of parametric evaluations in Federated Averaging
Parameter Value
Learning Rate 0.01
Number of Rounds (T) 50
Batch Size 32
TABLE 13.4
Various values of parametric evaluations in HEFL
Parameter Value
Encryption Type Paillier
Security Parameter 2048 bits
Number of Rounds (T) 30
By utilizing cryptographic methods, this calculation shields delicate data while per-
mitting collaborative show training in a unified learning setting. Table 13.5 provides
the various values of parametric evaluations in SAPPFL.
TABLE 13.5
Various values of parametric evaluations in SAPPFL
Parameter Value
Encryption Type Homomorphic Encryption
Security Parameter 2048 bits
Numberof Rounds (T) 40
Evaluation Metrics
To survey the execution of the unified learning calculations, we utilized standard
measurements such as exactness, accuracy, review, and F1 score [33]. The assess-
ment was conducted on a separate test dataset, guaranteeing fair experiences in the
model’s generalization capabilities.
Experimental Setup
The tests were conducted on a simulated IoT environment utilizing Python and
TensorFlow. The IoT gadgets were imitated with different computing capabilities,
264 Artificial Intelligence Using Federated Learning
TABLE 13.6
Various values of parametric evaluations in DPFL
Parameter Value
Privacy Budget 1.0
Number of Rounds (T) 25
and the combined learning calculations were actualized utilizing fitting libraries and
systems [34].
Statistical Analysis
Statistical importance tests, such as t-tests, were utilized to approve the execution
contrasts between the unified learning calculations [35]. Furthermore, the privacy-
preserving viewpoints were assessed by analyzing the sum of data spillage and dem-
onstrating utility.
Experiments
Experimental Setup
To assess the execution of the unified learning calculations in privacy-preserving
machine learning for IoT systems, a comprehensive set of tests was conducted. The
tests centered on surveying show accuracy, security conservation, and computa-
tional productivity. The recreated IoT environment included different gadgets with
IOT Networks 265
Evaluation Metrics
The tests utilized a run of standard assessment measurements to evaluate the
execution of the combined learning calculations. Key measurements included
accuracy, precision, recall, and F1 score, giving an all-encompassing see of the
models’ prescient capabilities as depicted in Figure 13.10. Privacy-related mea-
surements, such as data spillage and differential security ensures, were also mea-
sured [38]. Moreover, computational measurements, counting preparing time,
and communication overhead, were considered to assess the productivity of the
calculations.
these studies, advertising bits of knowledge into the comparative adequacy of differ-
ent unified learning calculations in an IoT setting.
Results
Model Accuracy
Table 13.7 presents the precision measurements of the unified learning calculations
on a test dataset. The models were prepared for a settled number of rounds, and the
precision was assessed on a partitioned test set to degree generalization execution.
The results demonstrate that FedAvg accomplished the most noteworthy precision,
exhibiting its adequacy in collaborative learning. In any case, Secure Aggregation
and Differential
Security illustrated competitive precision levels, emphasizing their utility in
scenarios where protection conservation is fundamental [40]. Figure 13.11 depicts
Privacy-preserving machine learning and multi-party computation.
Privacy Preservation
Security conservation could be a basic angle of unified learning in IoT systems.
Table 13.8 gives an outline of privacy-related measurements, counting data leakage,
and the level of differential protection accomplished by each calculation.
Homomorphic Encryption and Differential Privacy algorithms show moo data
leakage, guaranteeing that the prepared models don’t incidentally uncover points of
interest around personal information focuses [26]. Differential Privacy, in particu-
lar, accomplished a security parameter (ε) of 1.0, showing a tall level of protection
conservation.
IOT Networks 267
TABLE 13.7
Various Algorithms with Accuracies
Algorithm Accuracy (%)
FedAvg 92.5
Homomorphic Encryption 88.2
Secure Aggregation 91.8
Differential Privacy 89.7
TABLE 13.8
Various Algorithms with Information Leakage and Differential Privacy
Algorithm Information Leakage Differential Privacy (ε)
FedAvg Moderate Not applicable
Homomorphic Encryption Low 2.5
Secure Aggregation Minimal Not applicable
Differential Privacy Minimal 1.0
268 Artificial Intelligence Using Federated Learning
Computational Efficiency
Efficient show preparation and communication are significant for combined learning
in resource-constrained IoT situations.
Table 13.9 traces the computational proficiency measurements, counting prepar-
ing time, and communication overhead.
Secure Aggregation illustrated low communication overhead, making it reason-
able for situations with restricted transmission capacity. In any case, Holomorphic
Encryption exhibited high communication overhead due to the encryption and
unscrambling forms. FedAvg and Differential Privacy fell inside direct communica-
tion overhead levels, striking an adjustment between effectiveness and protection.
Figure 13.12 depicts federated learning and its role in the privacy preservation of
IoT devices.
TABLE 13.9
Various Algorithms with Training Time and Communication Overhead
Algorithm Training Time (s) Communication Overhead
FedAvg 120 Moderate
Holomorphic Encryption 280 High
Secure Aggregation 150 Low
Differential Privacy 200 Moderate
FIGURE 13.12 Federated Learning and Its Role in the Privacy Preservation of IoT Devices
IOT Networks 269
Calculation Parameters
Here, in Figure 13.13 calculation parameters with comparisons are shown.
Accuracy, Recall, Precision, Specificity, and Sensitivity are the classification param-
eters. Consider these parameters to analyze the result.
Experimental Result
Three Python libraries Sklearn, NumPy, and Tensor Flow are employed for data
analysis, mathematical operations, categorization, prediction, and the creation of
data flow graphs. The estimated accuracy is 98%. Precision, Recall, and F1- Score is
98%, 90.7%, and 31% respectively.
Performance Percentage
Table 13.10 shows the performance percentage of various algorithms with various
parameters. Figure 13.14 depicts the performance comparison of SVM and Federated
TABLE 13.10
Performance Percentage
Logistic Federated
Decision Tree Regression Random Forest SVM Learning
Accuracy 97.94 96.94 97.95 98.9 99.3
Precision 97.61 98.59 94.31 92.7 98
Recall 46.06 48.44 67.68 64.1 90.7
F1-Score 62.59 64.96 78.81 64.1 31
270 Artificial Intelligence Using Federated Learning
learning. Figure 13.15 depicts the performance comparison of random forest, SVM,
and Federated learning. Figure 13.16 depicts the performance comparison of logis-
tic regression, random forest, SVM, and Federated learning. Figure 13.17 depicts
the performance comparison of decision tree, random forest, SVM, logistic regres-
sion, and federated learning:
IOT Networks 271
FIGURE 13.17 Decision tree, Logistic regression, Random forest, SVM, Federated learning
Discussion
The results highlight the trade-offs among the combined learning calculations in
terms of demonstrated precision, security conservation, and computational profi-
ciency. FedAvg exceeded expectations in exactness but needed unequivocal security
272 Artificial Intelligence Using Federated Learning
Conclusion
To sum up, the study of the work “Federated Learning for Privacy-Preserving
Machine Learning in IoT Systems” has offered valuable insights into the convo-
luted interplay between collaborative learning, safety preservation, and efficiency
in the context that is the Internet of Things (IoT) situations. All the unified learn-
ing algorithms, including Combined Averaging, homomorphic encryption-based
Federated Learning, Secure Aggregation, and Differential Security in Combined
Learning were carefully assessed and compared. The tests revealed that while
FedAvg outperformed expectations in terms of accuracy, algorithms such as Secure
Aggregation trade between accuracy and security preservation, thus ranking as
promising candidates for privacy-sensitive IoT applications. Comparative analysis
with related work showed the relevance of the research in the broader picture of
machine learning, blockchain integration, and IoT. Combined learning integrated
with IoT as studies by various authors showed emphasis on the versatility of these
improvements in various fields such as smart cities, healthcare, and remote com-
munication. The introduced systems and calculations here help in addressing the
issues dependent on heterogeneity, non-IID data dissemination, and asset requests
in IoT settings.
In addition, the investigation contextualized itself inside the progressing insightful
discourse on privacy-preserving unified learning, drawing associations with related
considerations that investigated inventive arrangements and applications. The union
of discoveries from different ponders contributes to an all-encompassing understand-
ing of combined learning’s potential, challenges, and arrangements, progressing the
collective information base within the crossing point of machine learning and IoT.
As the computerized scene proceeds to advance, the investigation underscores the
significance of privacy-preserving unified learning as a significant worldview for
dependable and compelling data-driven decision-making in IoT biological systems.
Online fraud detection is currently a worldwide epidemic. When fraudsters produce
erratic patterns that resemble the original, a more effective method of identifying
online frauds while protecting users’ privacy is required. In this case, online scams
are detected while maintaining privacy using Deep Learning, Machine Learning,
and Federated Learning techniques. Compare the existing techniques with Federated
Learning with MLP, where the accuracy has been increasing.
IOT Networks 273
SVM is overfitting for large datasets, which is used in this research. In future
work, proposed split learning can be implemented and tested with different machine
learning methods. Future endeavors in this space seem constructed upon these
experiences, refining calculations, and systems for particular IoT applications and
addressing developing challenges within the ever-evolving scene of interconnected
gadgets.
REFERENCES
[1] Alazab, A., Khraisat, A., Singh, S., & Jan, T. (2023). Enhancing privacy-preserving
intrusion detection through federated learning. Electronics, 12(16), 3382.
[2] Chai, J., Li, J., Wei, M., & Zhu, C. (2023). Blockchain managed federated learning
for a secure IoT framework. EURASIP Journal on Wireless Communications and
Networking, 2023(1), 100.
[3] Du, W., Li, M., Wu, L., Han, Y., Zhou, T., & Yang, X. (2023). A efficient and robust pri-
vacy-preserving framework for cross-device federated learning. Complex & Intelligent
Systems, 9(5), 4923–4937.
[4] Valencia-Arias, A., González-Ruiz, J. D., Verde Flores, L., Vega-Mori, L., Rodríguez-
Correa, P., & Sánchez Santos, G. (2024). Machine learning and blockchain: A biblio-
metric study on security and privacy. Information, 15(1), 65.
[5] Ghadi, Y. Y., Mazhar, T., Shah, S. F. A., Haq, I., Ahmad, W., Ouahada, K., & Hamam,
H. (2023). Integration of federated learning with IoT for smart cities applications, chal-
lenges, and solutions. PeerJ Computer Science, 9, e1657.
[6] Yu, X., Tang, D., & Zhao, W. (2023). Privacy-preserving cloud-edge collaborative learn-
ing without trusted third-party coordinator. Journal of Cloud Computing, 12(1), 19.
[7] Zeng, Q., Lv, Z., Li, C., Shi, Y., Lin, Z., Liu, C., & Song, G. (2023). Fedprols: Federated
learning for iot perception data prediction. Applied Intelligence, 53(3), 3563–3575.
[8] Zhang, K., Cai, Z., & Seo, D. (2023). Privacy-preserving federated graph neural network
learning on non-iid graph data. Wireless Communications and Mobile Computing, 2023.
[9] Zhao, R., Xie, Y., Cheng, H., Jia, X., & Shirazi, S. H. (2023). ePMLF: Efficient and pri-
vacy-preserving machine learning framework based on fog computing. International
Journal of Intelligent Systems, 2023.
[10] Almalki, J., Alshahrani, S. M., & Khan, N. A. (2024). A comprehensive secure system
enabling healthcare 5.0 using federated learning, intrusion detection and blockchain.
PeerJ Computer Science, 10, e1778.
[11] Al Asqah, M., & Moulahi, T. (2023). Federated learning and blockchain integration for
privacy protection in the Internet of Things: Challenges and solutions. Future Internet,
15(6), 203.
[12] Butt, M., Tariq, N., Ashraf, M., Alsagri, H. S., Moqurrab, S. A., Alhakbani, H. A. A., &
Alduraywish, Y. A. (2023). A fog-based privacy-preserving federated learning system
for smart healthcare applications. Electronics, 12(19), 4074.
[13] Sathiamoorthy, A., Mithusan, S., Rathnayaka, R. M. L. R., Kajenthiran, S., Hansika,
M. M., & Pandithage, D. (2023). StreamSafe: Improving QoS and security in IoT net-
works. International Research Journal of Innovations in Engineering and Technology,
7(11), 170.
[14] Kaushik, A., Gahletia, S., Garg, R. K., Sharma, P., Chhabra, D., & Yadav, M. (2022,
December). Advanced 3D body scanning techniques and its clinical applications.
In 2022 International Conference on Computational Modelling, Simulation and
Optimization (ICCMSO) (pp. 352–358). IEEE.
274 Artificial Intelligence Using Federated Learning
[15] Singh, K., Singh, Y., Barak, D., & Yadav, M. (2023). Comparative performance analy-
sis and evaluation of novel techniques in reliability for Internet of Things with RSM.
International Journal of Intelligent Systems and Applications in Engineering, 11(9s),
330–341.
[16] Singh, K., Singh, Y., Barak, D., & Yadav, M. (2023). Evaluation of designing tech-
niques for reliability of Internet of Things (IoT). International Journal of Engineering
Trends and Technology, 71(8), 102–118.
[17] Singh, K., Singh, Y., Barak, D., Yadav, M., & Özen, E. (2023). Parametric evalua-
tion techniques for reliability of Internet of Things (IoT). International Journal of
Computational Methods and Experimental Measurements, 11(2), 123–134.
[18] Singh, K., Singh, Y., Barak, D., & Yadav, M. (2023). Detection of lung cancers from
CT images using a deep CNN architecture in layers through ML. In AI and IoT-Based
Technologies for Precision Medicine (pp. 97–107). IGI Global.
[19] Singh, K., Yadav, M., Singh, Y., & Barak, D. (2023). Reliability techniques in IoT envi-
ronments for the healthcare industry. In AI and IoT-Based Technologies for Precision
Medicine (pp. 394–412). IGI Global.
[20] Sharma, H., Singh, K., Ahmed, E., Patni, J., Singh, Y., & Ahlawat, P. (2021). IoT based
automatic electric appliances controlling device based on visitor counter. https://doi.
org/10.13140/RG,2(30825.83043).
[21] Bhatia, S., Goel, A. K., Naib, B. B., Singh, K., Yadav, M., & Saini, A. (2023,
July). Diabetes prediction using Machine learning. In 2023 World Conference on
Communication & Computing (WCONF) (pp. 1–6). IEEE.
[22] Chen, Z., Cui, H., Wu, E., & Yu, X. (2023). Computation and communication effi-
cient adaptive federated optimization of federated learning for Internet of Things.
Electronics, 12(16), 3451.
[23] Han, Y., & Zhu, X. (2023). Enhancing throughput using channel access priorities in
frequency hopping network using federated learning. EURASIP Journal on Wireless
Communications and Networking, 2023(1), 101.
[24] Du, W., Wang, Y., Meng, G., & Guo, Y. (2024). Privacy-preserving vertical federated
KNN feature imputation method. Electronics, 13(2), 381.
[25] El-Gendy, S., Elsayed, M. S., Jurcut, A., & Azer, M. A. (2023). Privacy preservation
using machine learning in the Internet of Things. Mathematics, 11(16), 3477.
[26] Mouhni, N., Elkalay, A., Chakraoui, M., Abdali, A., Ammoumou, A., & Amalou, I.
(2022). Federated learning for medical imaging: An updated state of the art. Ingenierie
des Systemes D’Information, 27, 143–150.
[27] Pinto Neto, E. C., Sadeghi, S., Zhang, X., & Dadkhah, S. (2023). Federated rein-
forcement learning in IoT: Applications, opportunities and open challenges. Applied
Sciences, 13(11), 6497.
[28] www.kaggle.com/datasets/rupakroy/online-payments-fraud-detection-dataset
[29] Javed, A., Awais, M., Shoaib, M., Khurshid, K. S., & Othman, M. (2023). Machine
learning and deep learning approaches in IoT. PeerJ Computer Science, 9, e1204.
[30] Karras, A., Giannaros, A., Theodorakopoulos, L., Krimpas, G. A., Kalogeratos, G.,
Karras, C., & Sioutas, S. (2023). FLIBD: A federated learning-based IoT big data man-
agement approach for privacy-preserving over apache spark with FATE. Electronics,
12(22), 4633.
[31] Kea, K., Han, Y., & Kim, T. K. (2023). Enhancing anomaly detection in distributed power
systems using autoencoder-based federated learning. PLoS ONE, 18(8), e0290337.
[32] Munawar, A., & Piantanakulchai, M. (2024). A collaborative privacy-preserving
approach for passenger demand forecasting of autonomous taxis empowered by feder-
ated learning in smart cities. Scientific Reports, 14(1), 2046.
IOT Networks 275
[33] Muthukumar, V., Sivakami, R., Venkatesan, V. K., Balajee, J., Mahesh, T. R., Mohan,
E., & Swapna, B. (2023). Optimizing heterogeneity in IoT Infra using federated learning
and blockchain-based security strategies. International Journal of Computers
Communications & Control, 18(6).
[34] Peyvandi, A., Majidi, B., Peyvandi, S., & Patra, J. C. (2022). Privacy-preserving feder-
ated learning for scalable and high data quality computational-intelligence-as-a-service
in Society 5.0. Multimedia Tools and Applications, 81(18), 25029–25050.
[35] Qin, J., Zhang, X., Liu, B., & Qian, J. (2023). A split-federated learning and edge-
cloud based efficient and privacy-preserving large-scale item recommendation model.
Journal of Cloud Computing, 12(1), 57.
[36] Rashid, M. M., Khan, S. U., Eusufzai, F., Redwan, M. A., Sabuj, S. R., & Elsharief,
M. (2023). A federated learning-based approach for improving intrusion detection in
industrial internet of things networks. Network, 3(1), 158–179.
[37] Song, Z. (2020, June). A data mining based fraud detection hybrid algorithm in E-bank.
In 2020 International Conference on Big Data, Artificial Intelligence and Internet of
Things Engineering (ICBAIE) (pp. 44–47). IEEE.
[38] Rodríguez, E., Otero, B., & Canal, R. (2023). A survey of machine and deep learning
methods for privacy protection in the internet of things. Sensors, 23(3), 1252.
[39] Hsu, H. Y., Keoy, K. H., Chen, J. R., Chao, H. C., & Lai, C. F. (2023). Personalized fed-
erated learning algorithm with adaptive clustering for non-IID IoT data incorporating
multi-task learning and neural network model characteristics. Sensors, 23(22), 9016.
[40] Kolhar, M., & Aldossary, S. M. (2023). Privacy-preserving convolutional Bi-LSTM
network for robust analysis of encrypted time-series medical images. AI, 4(3), 706–720.
14 Federated Query
Processing for Data
Integration Using
Semantic Web
Technologies
A Review
Nidhi Gupta, Pawan Verma, Monali Gulhane,
Nitin Rakesh, and Ahmed A. Elngar
INTRODUCTION
Data science and analytics are a growing interest of many organizations. They require
collecting, processing, and analyzing the data to generate meaningful insights. The
first and most significant step is to collect data from various sources. Data integra-
tion refers to combining data from multiple data sources to get a unified view of
data. It extracts the data, transforms it, and loads it in a central place using extract,
transform, and load (ETL) tools. To effectively handle heterogeneous databases, we
need tools that can address the specific challenges and requirements of each system,
rather than relying solely on a centralized ETL approach.
The semantic web helps to share data and promote interoperability between vari-
ous systems. The term semantic web refers to linked data on the web. The aim of
linked open data (LOD) is to globally access the data on the web. With the success
of LOD for open data, semantic technologies are also being used to access organi-
zational data. The semantic web uses the resource description framework (RDF)
to represent the data. It facilitates data interchange on the web. In comparison to
relational databases, linked data represents the resources using a uniform resource
indicator (URI) that helps to represent a resource uniquely.
Relational databases are widely used for storing data. SQL has grown as a pow-
erful query language for querying relational databases and integrating data from
multiple sources. Relational databases impose strict schema on databases which are
not suited for applications that require frequent schema changes. The data generated
from multiple sources such as wearable devices and other IoT applications does not
adhere to strict schemas, thus moving towards flexible databases like MongoDB for
storing formats such as JSON and XML. Therefore, graph databases like Virtuoso
and Graph-DB are gaining popularity to integrate multiple data sources into an inte-
grated graph. They utilize the RDF framework to represent the data and perform
queries for data access.
Query processing provides data access to large volumes of data stored in multiple
systems. There are two approaches for query processing over the web of linked and
distributed data sources: link traversal and query federation. Link traversal (Hartig
et al., 2009) such as SQUIN (Squin, 2013) searches relevant data by following links
between RDF data sources. It does not require the prior knowledge of data sources.
The query executes by binding the intermediate results with common variables.
The link traversal discovers the data source at runtime, hence providing up-to-date
results. The major weakness of this approach is that the wrong selection of a starting
point for traversing the link would lead to a large number of intermediate results and
could not guarantee complete results. Another approach is query federation, which
inputs a query and distributes it to relevant data sources. Federated query processing
for data integration is a crucial concept in the field of data management and informa-
tion retrieval. It refers to the process of querying and retrieving data from multiple
distributed or heterogeneous data sources and integrating the results into a unified
response. This approach is employed when organizations or systems need to access
and combine data from various repositories, databases, or systems to derive mean-
ingful insights or to meet specific information needs.
A federated engine acts as a mediator to distribute subqueries and collect the results.
It utilizes data descriptions to find the relevant data sources and provides efficient query
plans to minimize query execution time and maximize result completeness. Federated
query processing is advantageous for result completeness and providing up-to-date
results. Therefore, this chapter focuses on federated query processing and reviews the
work carried out on optimizing federated queries for efficient data access.
The chapter reviews the work that has been performed to integrate heterogeneous
data sources using semantic technologies and its access via federated query process-
ing. It presents the various approaches used for federated query processing and com-
pares various federated engines based on these approaches. Further, it discusses the
target problems and their proposed solutions in health data integration and federated
query processing.
In the second section, we provide a concise overview of the background and rel-
evant research. The third section presents ontology-based data integration for dis-
tributed data access. The fourth section explores the federated approach to query
distributed data sources. The fifth section provides different challenges and reviews
the target problems on query execution and their solutions. Finally, the sixth section
concludes with future work.
LISTING 14.1
SPARQL Query
Related Surveys
This chapter focuses on two main aspects, semantic data integration and federated
query processing.
In the literature review, Peng et al. (2020) investigated existing problems in the
integration of health data and different approaches to its integration. It highlights
the open problems in integrating aggregated health data and advocates for the use of
semantic technologies with web application interfaces to overcome the challenges.
The research work by Wylot et al. (2018) presented biological database modeling
with semantic technologies. It focuses on ontology-based integration of biological
data and outlines the semantic technologies used for its integration.
The research work by Asfand-e-Yar and Ali (2020) focused on ontology-based
semantic integration of heterogenous databases of the same domain using data trans-
lation and query translation techniques.
The survey by Ouzzani and Bouguettaya (2004) focused on fundamental problems
in efficient query processing. It also discusses various optimization techniques over
web data integration systems and frameworks to evaluate them. The authors in Ali
et al. (2017) experimentally evaluate the various query federated engines on the effi-
ciency of source selection, data partition, answer completeness, and query runtime.
Oguz et al. (2015) presented a qualitative survey for federated query processing on
linked data. It provides details of different approaches to federated query processing
steps such as source selection and query optimization and compares various federated
engines on those approaches. The authors in Sima et al. (2019) provide a comprehen-
sive study of RDF data storage and management systems. It provides different RDF
storage mechanisms, indexing, architecture, and query execution methods.
Several studies conducted either data integration or federated queries, but very
limited surveys cover both aspects of data integration and federated query process-
ing. Thus, the work carried out surveys the state-of-art approaches in the area of data
integration and federated query processing. It identified problems faced during inte-
gration and querying heterogeneous data sources and also discussed their solutions.
the source and target domain ontology. OBDA uses a global view to query distinct
heterogeneous data sources using an ontology, thereby masking the actual imple-
mentation details of data sources. One of the major challenges for data integration
is data heterogeneity. The problem of heterogeneity is resolved using semantic tech-
nologies in one of the following ways:
the data from multiple data sources. It creates mappings such as R2RML
and RML to translate data sources of distinct formats such as RDB or JSON
to an RDF view. Semantic annotation of data is required with commonly
used vocabularies such as FOAF to make data meaningful and easier to
understand. Federated query processing fetches the data from multiple data
sources by decomposing the input query, selecting the relevant data source
for each subquery preparing an optimized plan and executing it to extract
the required results. The user query is translated to local database queries
by using declarative mappings (RML, R2RML, etc.). The result fetched is
integrated as a result set and sent to the user-interface layer.
3. Semantic layer: It describes the domain ontology to represent various con-
cepts and their relationships. The schema of data sources is aligned to
domain ontology to form a global query.
4. User interface layer: The user interface allows users to input queries to the
federated system and receive the responses.
Source Selection
Data integration queries retrieve data from multiple data sources; thus, many data
sources are involved in answering an input query, and each source may or may not
contribute to the final answer. Hence, a federated engine is required to search the rel-
evant data sources to answer a given query. It divides the query into triples and finds
the data sources of each query triple. Some of the federated engines use metadata
catalogs. This catalog stores: (1) service descriptions: statistical information of data
sources; (2) a vocabulary of interlinked datasets (VoID) descriptions; that is, it stores
statistical information of data sources along with the metadata of RDF data sources
whose subjects are linked with objects of other RDF data sources; and (3) a list of
predicates at each RDF data source.
Some of the federated engines such as FEDX use indexes to manage data
sources and store them in a cache to avoid repeating the process for the same
input query.
Query Groups
• Exclusive Group: The exclusive group is formed with the triples having the
same and only single data source. The grouping may comprise triples with no
shared variable and may result in redundant intermediate results. Thus, the
variant of exclusive groups is to create different groups for the triple with no
shared variable. owl:sameAs can be used to group triples that have the same
object and predicate, but different subjects, into a single equivalence class
• Predicate-Based Join Group (PBJ): PBJ groups are formed by group-
ing triples that are all evaluated against the same set of data sources. Such
groups are executed on relevant endpoints, and the results obtained are
merged using the SPARQL UNION construct. The POLYSTORE federated
engine uses PBJ groups. PJG is a lightweight index-based approach that
uses predicate information at respective endpoints to form query groups.
Listing 14.2 shows the PBJ groups and explicit SERVICE requests of a
SPARQL query from two different RDF service points: Virtuoso (http://
localhost:8890/sparql) and Apache Jena (http://localhost:3030/vital/query).
LISTING 14.2
SPARQL Query With JOINING PBJ Groups and Explicit SERVICE Endpoints
JOIN selection
TABLE 14.1
Comparison of SPARQL Federated Engines
Federated Source Data Unbound JOIN Query
Engines Selection Model Predicate JOIN Type Ordering Groups Cache
DARQ Service RDF Nested loop, Statistics- Exclusive
(2008) descriptions bind based groups
FEDX SPARQL ASK, RDF Nested loop, Heuristic- Exclusive
(2011) local cache bind based groups
SPLENDID VoiD, ASK RDF Hash, bind Statistics- Exclusive
(2011) based groups
HIBISCUS Data summaries RDF Nested loop, Statistics- Exclusive
(2014) bind based groups
POLYWEB Data summaries, CSV, RDB, Nested loop, Heuristic- Predicate-
(2019) ASK RDF bind based based join
group
TABLE 14.2
Evaluation Metrics of Federated Engines
Federated Engines M1 M2 M3 M4 M5 M6
DARQ
FEDX
SPLENDID
HIBISCUS
POLYWEB
M1: Number of data sources selected for each triple pattern
M2: Number of ASK requests executed
M3: Average source selection time
M4: Number of results returned by each query
M5: Query planning and optimization time
M6: Response time
Two Main Approaches Are Used to Find the Optimal Join Order
1. Static: In this, the join order plan is optimized before the actual execution
of the query. It is optimized based on the statistical count of data sources
and heuristics.
2. Dynamic: The query join order is optimized during the execution of the
query. It implies that the dynamic approach utilizes the intermediate results
obtained during the search. A dynamic approach may reduce the search
space but may require reconstructing the query plan iteratively using inter-
mediate results.
TABLE 14.3
Target Problems and Their Proposed Solutions in SPARQL Query Processing
on Distributed Data Stores
Year Author Problem Proposed Solution
2023 (Aebeloe et al., Degradation of query performance Achieving faster SPARQL query
2023) due to inaccessibility of data from execution through peer-to-peer
SPARQL endpoints due to high technology
traffic
2022 High communication costs during Algorithm for selecting efficient query
(Lim et al., SPARQL query processing execution path
2022)
2021 (Yang et al., High network costs to transfer data The proposed solution is based on two
2023) over federated databases join algorithms that leverage the
network topology information to
reduce the costs of SPARQL query
execution in a distributed environment
2020 (Naacke & Large index size for storing RDF Optimizes the indexes for RDF data
Curé, 2020) subject, predicate, and object storage by proposing dedicated data
information structures and a data partitioning
approach
2018 (Saleem et al., Estimation of join selectivity for Optimization of SPARQL query
2018) optimized cost based query plan execution by efficient source selection
and join cardinality estimation
2018 (Yannakis High query execution time due to Heuristics-based query reordering
et al., 2018) large number of remote requests to method
data sources
2018 (Xiao et al., Effective query evaluation in Optimization to improve SQL query
2018) presence of OPTIONAL in structure
ontology-based data access.
2017 (Montoya High number of intermediate results Statistical estimation of accurate cost
et al., 2017) while joining data from multiple estimation of federated queries
sources
2015 (Wu et al., Large search space during federated Finding optimal join order to minimize
2015) query execution size of intermediate results
2015 (Atre et al., Restriction of reordering left outer Represent queries in graph of super
2015) joins for optimization of SPARQL nodes and optimize query by applying
OPTIONAL pattern queries the properties of nullification, best
match, and minimality
CONCLUSION
The chapter explored the potential of semantic technologies for data integration and
query processing. This study of data integration and query processing represents
a significant step forward in the quest for a more interconnected, meaningful, and
Federated Query Processing for Data Integration 289
efficient data landscape. It has unveiled various approaches to federated query pro-
cessing that leverage semantic web standards. This work highlights the broader con-
text of the research and recognizes the ongoing efforts in the field to overcome the
challenges associated with data integration and querying. Some of the challenges are
still open for researchers to work on in the future.
In the future, researchers, practitioners, and organizations must continue to
explore and harness the transformative power of semantic web technologies. By
doing so, we can unlock new horizons in knowledge discovery, decision-making,
and data utilization in our increasingly data-driven world.
REFERENCES
Aebeloe, C., Montoya, G., & Hose, K. (2023, January 1). Optimizing SPARQL queries
over decentralized knowledge graphs. Semantic Web, 14(6), 1121–1165. https://doi.
org/10.3233/SW-233438
Akar, Ziya, Halaç, Tayfun, Ekinci, Erdem, & Dikenelli, Oğuz. (2012). Querying the Web
of Interlinked Datasets Using VOID Descriptions. https://api.semanticscholar.org/
CorpusID:8868212
Ali, Hasnain, Ermilov, Ivan, & Ngonga Ngomo, A.-C. (2017). Saleem, Muhammad and Khan,
Yasar and Hasnain. An Evaluation of SPARQL Federation Engines Over Multiple
Endpoints. https://doi.org/10.13140/RG.2.2.25972.45444
Asfand-e-Yar, M., & Ali, R. (2020). Semantic integration of heterogeneous databases of
same domain using ontology. IEEE Access, 8, 77903–77919. https://doi.org/10.1109/
ACCESS.2020.2988685
Atre, M. (2015, May). Left bit right: For SPARQL join queries with OPTIONAL pat-
terns (left-outer-joins). In Proceedings of the 2015 ACM SIGMOD International
Conference on Management of Data (pp. 1793–1808). https://doi.org/10.1145/2723372.
2746483
Beckett, D., & McBride, B. (2004). RDF/XML syntax specification (revised). W3C
Recommendation, 10(2/3).
Dimou, A., Sande, M. V., Colpaert, P., Verborgh, R., Mannens, E., & Walle, R. V. (2014).
RML: A generic language for integrated RDF mappings of heterogeneous data. In
Proceedings of the Workshop on Linked Data on the Web, 1184(January).
Donnelly, F. (2014). Processing Government Data: ZIP Codes, Python, and OpenRefine.
Faheem, M., Sattar, H., Bajwa, I. S., & Akbar, W. (2019). Relational database to resource
description framework and its schema. In Intelligent Technologies and Applications:
First International Conference, INTAP 2018, Bahawalpur, Pakistan, October 23–25,
2018, Revised Selected Papers 1 (pp. 604–617). Springer.
Gupta, N., & Gupta, B. (2019). Big data interoperability in e-health systems. In Data Science
and Engineering (Confluence), (Noida, India) 9th International Conference on Cloud
Computing, 2019 (pp. 217–222). https://doi.org/10.1109/CONFLUENCE.2019.8776621
Hartig, O., Bizer, C., & Freytag, J. C. (2009). Executing SPARQL queries over the web of
linked data. In A. Bernstein (Ed.), ISWC 2009. Lecture Notes in Computer Science,
5823, 293–309. Springer. https://doi.org/10.1007/978-3-642-04930-9_19
Lim, J., Kim, B., Lee, H., Choi, D., Bok, K., & Yoo, J. (2022). An efficient distributed
SPARQL query processing scheme considering communication costs in spark environ-
ments. Applied Sciences, 12(1), 122. https://doi.org/10.3390/app12010122
Masinter, L., Berners-Lee, T., & Fielding, R. T. (2005). Uniform resource identifier (URI):
Generic syntax. Network Working Group. Fremont, CA.
290 Artificial Intelligence Using Federated Learning
Michel, F., Faron-Zucker, C. F., & Montagnat, J. (2016, April). A generic mapping-based query
translation from SPARQL to various target database query languages. In Proceedings
of the 12th International Conference on Web Information Systems and Technologies
(WEBIST2016), Italy, 2 (pp. 147–158). https://doi.org/10.5220/0005905401470158
Montoya, G., Skaf-Molli, H., & Hose, K. (2017). The Odyssey approach for optimizing
federated SPARQL queries. In The Semantic Web–ISWC. Proceedings, Part I: 16th
International Semantic Web Conference, Vienna, Austria, October 21–25, 2017, 16
(pp. 471–489). Springer International Publishing.
Naacke, H., & Curé, O. (2020). On distributed SPARQL query processing using triangles of
RDF triples. Open Journal of Semantic Web, 7, 17–32.
Oguz, D., Ergenc, B., Yin, S., Dikenelli, O., & Hameurlain, A. (2015). Federated
query processing on linked data: A qualitative survey and open challenges.
Knowledge Engineering Review, 30(5), 545–563. https://doi.org/10.1017/
S0269888915000107
Ouzzani, M., & Bouguettaya, A. (2004). Query processing and optimization on the web.
Distributed and Parallel Databases, 15(3), 187–218. https://doi.org/10.1023/B:DAPD.000001
8574.71588.06
Peng, C., Goswami, P., & Bai, G. (2020, September). A literature review of current tech-
nologies on health data integration for patient-centered health management. Health
Informatics Journal, 26(3), 1926–1951. https://doi.org/10.1177/1460458219892387.
Epub December 30, 2019. PubMed: 31884843
Priyatna, F., Alonso-Calvo, R., Parasio-Medina, S., Padron-Sanchez, G., & Corcho, O. (2015,
December). R2RML-based access and querying to relational clinical data with morph-RDB.
In 8th International Conference on Semantic Web Applications and Tools for Life Sciences,
Cambridge United Kingdom (pp. 142–151). https://ceur-ws.org/Vol-1546/paper_21.pdf
Saleem, M., Potocki, A., Soru, T., Hartig, O., & Ngomo, A. N. (2018). CostFed: Cost-based
query optimization for SPARQL endpoint federation. Procedia Computer Science, 137,
163–174. https://doi.org/10.1016/j.procs.2018.09.016
Sequeda, J. F., Arenas, M., & Miranker, D. P. (April 2012). On directly mapping relational
databases to RDF and OWL. In Proceedings of the 21st International Conference on
World Wide Web (WWW 2012) (pp. 649–658). Association for Computing Machinery.
https://doi.org/10.1145/2187836.2187924
Sima, A. C., Stockinger, K., de Farias, T. M., & Gil, M. (2019). Semantic integration and
enrichment of heterogeneous biological databases. In M. Anisimova (Ed.), Evolutionary
Genomics. Methods in Molecular Biology, 1910, 655–690. Humana Press. https://doi.
org/10.1007/978-1-4939-9074-0_22
Squin, H. O. (2013). A traversal based query execution system for the web of linked
data. In Proceedings of the 2013 ACM SIGMOD International Conference on
Management of Data 2013 Jun 22 (pp. 1081–1084). https://api.semanticscholar.org/
CorpusID:10158072
Wu, H., Yamaguchi, A., & Kim, J. D. (2015). Dynamic join order optimization for SPARQL
endpoint federation. In SSWS@ISWC (pp. 48–62). https://api.semanticscholar.org/
CorpusID:16681995
Wylot, M., Hauswirth, M., Cudre-Mauroux, P., & Sark, S. (2018). RDF data storage and
query processing schemes: A survey. ACM Computing Surveys, 51, 1–36. https://doi.
org/10.1145/3177850
Xiao, G., Kontchakov, R., Cogrel, B., Calvanese, D., & Botoeva, E. (2018). Efficient han-
dling of SPARQL optional for OBDA. In The semantic Web–ISWC 2018. Proceedings,
Part I 17: 17th International Semantic Web Conference, Monterey, CA, United States,
October 8–12, 2018 (pp. 354–373). Springer International Publishing.
Federated Query Processing for Data Integration 291
Yang, F., Crainiceanu, A., Chen, Z., & Needham, D. (2023, April 1). Cluster-based joins for
federated SPARQL queries. IEEE Transactions on Knowledge and Data Engineering,
35(4), 3525–3539. https://doi.org/10.1109/TKDE.2021.3135507
Yannakis, T., Fafalios, P., & Tzitzikas, Y. (2018). Heuristics-based query reordering for feder-
ated queries in SPARQL 1.1 and sparql-ld. arXiv preprint arXiv:1810.09780.
Index
adaptive learning strategies 93 complying with regulations 240
additional results and comparison 107 components and framework overview 100
addressing challenges and future directions 129 computational efficiency 268
adopting FL AI-driven pedagogy 23 concepts and principles 90
adversarial attacks 78 consensus and validation mechanisms 101
aggregation: algorithm 87; challenges presented consensus mechanism 105
by 241; on encrypted data 88; equation 136; considerations and obstacles to overcome 240
methods that are commonly used 241 continuous growth and adaptability 128
aggregator node 101 continuous learning 125
AI in petroleum processing 136 convolutional neural networks 69
ANPR limitation factors 59 critical applications of AI in petroleum
architecture 69 processing 137
artificial general intelligence 209; challenges
and considerations in 210; key features and data analysis 25
characteristics of 210 data balancing 258
augmented reality 219 data collection and preprocessing 257
automated transportation assist 121 data exposure reduction 106
automatic maintenance 121 data heterogeneity 98
data imbalance and bias 78
background and related surveys 277 data integration and interoperability 277
background study 114 data partitioning and encryption 105
basic benefits of FL data analytics; modular data set description 106
learning 124 data storage 100
blockchain 217; layer 100; technology 94 dealing with disparate signals 129
blockchain-based authentication and identity decentralization 96; of education through AI for
management 105 the sociotechnical ecosystem 42
breaking down complex frameworks 244 decentralized learning 235
decentralized method: benefits of 230
calculation parameters 269 deciding on the best strategy 243
case studies of federated learning in petroleum decreased relations expense 129
processing 148 deep learning algorithms 69
case study: leveraging blockchain-enhanced different approaches to data source
federated learning for enhanced privacy, selection 283
security, and efficiency at TechSolve INC 105 differential privacy 160
challenges and future directions 122, 150 digital twins 214
challenges and future work 77 discussion 50
challenges and prospective courses of action 242 diversity of data 164
challenges in collaborative machine learning 96 dynamic adaptation 79
client nodes 100
CNNs are popular because of the following edge computing 202
factors 69 edge device collaborations 104
cognitive computing 217 efficient edge computing 127
collaborative efforts 79 encryption of model updates 88
collaborative innovation 144 end background study 119
collaborative model training 91, 166 enhancements to privacy and security 129
commercial UAVs 206; benefits of 207 ensuring data privacy 103
communication overlap 164 ethical and legal considerations 11
comparison with centralized approaches 107 ethical considerations 79
comparison with other learning paradigms 11 evaluation metrics 265
complexity analysis 106 experimental result 269
compliance with regulatory requirements 146 experimental setup 264
293
294Index
federated learning: advantages of using 62; ontology-based data integration for distributed
algorithms 260; applications of 9 (in intrusion data access 280
detection 245; in smart transportation 120); optimization of operational processes 143
basic concepts of 231; benefits and limitations overall perception and category of respondents’
of fundamentals of 246; challenges and responses toward sociotechnical AI 45
future of 163; classification of 232; in fake overcoming data limitations 166
currency detection 74; fundamentals of 73,
89; history of 3; in industry and research 10; perception 210
key components of 4; model in English class petroleum processing: benefits of AI in 138;
18; need for 158; taxonomy 20; types of 61; challenges of AI in 138
vertical 61; working principles of 61; works 5 privacy-preserving communication with
federated studies and analytics for data homomorphic encryption 88
throughout the IoV 122 procedural steps to do ANPR 59
federated vs traditional learning 234
financial services and banking 10 quantum computing 220
FL data process steps via application delivery query evaluation with optional in SPARQL query
network (ADN) and data analytics 122 287
future directions and emerging trends 12
rationale for integration 99
Gartner hype cycle 199 reduced data exposure 62
generalization across currency types 78 reduced latency 62
greater efficiency of transportation and regulatory and compliance requirements 99
sustainable society 130
scalability 62
healthcare and medical research 9 security concerns 97
heterogeneity handling 93 smart contracts for model aggregation 87
horizontal federated learning 161 smart sociotechnical ecosystem through
federated learning model 39
improving refinery safety with FL 149 software-defined networks: applications and
incorporating new knowledge 166 benefits of 208
industry applications 103 stochastic gradient descent with momentum 72
internet of things 168 the stages involved in a typical FL process 7
interoperability and integration 79
IoT and edge computing 104 teaching model incorporating FL 24
IoV ecosystem: challenges in 116 trade-off between privacy and utility 89
IoV paradigm 114
iterative learning rounds 92 uniformity and coordination 122
uniformity and integration 129
machine learning 213; applications of 213 user-level privacy concerns 98
method and participants 22
methodology 44 vehicle data distribution 114
models customization 122 virtual reality 204
multidisciplinary processing of data 128 virtual representation 214
volatility and ability to scale 129
natural language understanding 210
network efficiency 129 watermark and electrotype watermark 68