- Home
- A-Z Publications
- Recent Advances in Computer Science and Communications
- Previous Issues
- Volume 17, Issue 6, 2024
Recent Advances in Computer Science and Communications - Volume 17, Issue 6, 2024
Volume 17, Issue 6, 2024
-
-
Komodo Dragon Mlipir Algorithm-based CNN Model for Detection of Illegal Tree Cutting in Smart IoT Forest Area
Introduction: Trees and woods are vital to preventing climate change and protecting our planet. Sadly, they are constantly being destroyed due to human activities like deforestation, fires, etc. Method: This research presents and examines an outline for using audio event categorisation to automatically detect unlawful tree-cutting activity in forests. To monitor large swaths of forest, the research team proposes using ultra-low-power, minor devices incorporating edgecomputing microcontrollers and long-range wireless communication. An efficient and accurate audio classification solution based on multi-layer perceptron (MLP) and modified convolutional neural networks (M-CNN) is projected and tailored for cutting. The Komodo Dragon Mlipir Algorithm (KDMA) is used to pick the best weight for the CNN. Result: Compared to earlier efforts, the suggested system uses a computing technique to recognise deforestation-related hazards. Various preprocessing methods have been evaluated, with special attention paid to the trade-off between classification precision and computer resources, memory, and power use. Conclusion: Additionally, there have been long-range communication trials performed in natural settings. The experimental consequences demonstrate that the suggested method can notice and apprise tree-cutting occurrences through smart IoT for efficient and lucrative forest nursing.
-
-
-
CNN-FastText Multi-Input (CFMI) Neural Networks for Social Media Clickbait Classification
Authors: Chirag Sharma, Gurneet Singh, Pratibha S. Muttum and Shubham MahajanIntroduction: User-generated video portals, such as YouTube, are facing the challenge of Clickbait. These are used to lure viewers and gain traffic on specific content. The real content inside the video deviates from its title. and a thumbnail. The consequence of this is poor user experience on the platform. Methods: The existing identification techniques either use pre-trained models or are restricted to text only. Other video metadata is not considered. To tackle this situation of clickbait, we propose a CNN-Fast Text Multi-Input (CFMI) Neural Network. The method employs a self-developed convolutional model, combined with different other video metadata. The thumbnail of any video plays a vital role in gathering user attention; hence, it should also be addressed. With greater expressiveness, it depicts and captures the parallels between the title and thumbnail and the video content. Results: This research also compares the proposed system with the previous works on various parameters. With the usage of the proposed network, the platforms can easily analyze the videos during the uploading stage. The future belongs to Post Quantum Cryptography (PWC), we reviewed various encryption standards in this paper. Conclusion: In Industry 4.0, every data bit is crucial and must be preserved carefully. This industry will surely benefit from the model as it will eliminate false and misleading videos from the platform.
-
-
-
Dynamic Data Placement Strategy with Network Security Issues in Distributed Cloud Environment for Medical Issues: An Overview
Authors: Devasis Pradhan, Majusha Behera and Mehdi GheisariThe rapid integration of distributed cloud systems in the healthcare industry has profoundly impacted the management of valuable medical data. While this advancement has significantly improved data handling, protecting sensitive healthcare information in such a complex environment remains daunting. This comprehensive study explores the crucial intersection between dynamic data placement strategies and network security concerns in distributed cloud environments, particularly healthcare. After establishing the significance and context of this research, the survey delves into the growing need to safeguard medical data within the everevolving landscape of cloud-based healthcare systems. It lays out fundamental concepts, such as dynamic data placement and network security, highlighting their unique implications in the medical domain. Ultimately, this survey sheds light on the most effective approaches for balancing dynamic data placement and network security in the healthcare sector. This research delves into examining many tactics, evaluating their effectiveness in handling delicate medical information, and presenting tangible use cases. A key focus of this investigation is the fusion of data organization and network safety within the healthcare industry. It investigates the adaptability of dynamic data positioning techniques in fortifying network security and safeguarding against potential threats unique to the healthcare sector. Case studies of the successful implementation of these strategies in healthcare establishments are also included.
-
-
-
A Security Analysis Model for IoT-ecosystem Using Machine Learning-(ML) Approach
Authors: Pradeep K. N.S, MVV Prasad Kantipudi, Praveen N, Suresh S, Rajanikanth Aluvalu and Jayant JagtapIntroduction: The attacks on IoT systems are increasing as the devices and communication networks are progressively integrated. If no attacks are found in IoT for a long time, it will affect the availability of services that can result in data leaks and can create a significant impact on the associated costs and quality of services. Therefore, the attacks and security vulnerability in the IoT ecosystem must be detected to provide robust security and defensive mechanisms for real-time applications. Method: This paper proposes an analytical design of an intelligent attack detection framework using multiple machine learning techniques to provide cost-effective and efficient security analysis services in the IoT ecosystem. Result: The performance validation of the proposed framework is carried out by multiple performance indicators. Conclusion: The simulation outcome exhibits the effectiveness of the proposed system in terms of accuracy and F1-score for the detection of various types of attacking scenarios.
-
-
-
Performance Analysis of Cooperative Spectrum Sensing using Empirical Mode Decomposition and Artificial Neural Network in Wireless Regional Area Network
Authors: Sharad Jain, Ashwani Kumar Yadav, Raj Kumar and Vaishali YadavBackground: Radio spectrum is natural and the most precious means in wireless communication systems. Optimal spectrum utilization is a key concern for today's cutting-edge wireless communication networks. The impending problem of the lack of available spectrum has prompted the development of a new idea called “Cognitive Radio” (CR). Cooperative spectrum sensing (CSS) is utilized to improve the detection performance of the system. Several fusion algorithms of decision-making are proposed for sensing the licensed user, but they do not work well under low signal-to-noise ratio (SNR). Objectives: To address the issue of poor detection performance under low SNR, Empirical mode decomposition (EMD) and artificial neural network (ANN) based CSS under Rayleigh multipath fading channel in IEEE 802.22 wireless regional area network (WRAN) is proposed in this paper. Method: In this work, we propose the use of ANN as a fusion center. First, the received signal's energy is calculated using EMD. The computed energy, SNR, and false alarm probability are combined to form a data set of 2048 samples. They are utilized to train Levenberg- Marquardt back propagation training algorithm-based feed-forward neural network (FFNN). Using this trained network, CSS in WRAN is simulated under Rayleigh multipath fading. Results: Simulation results show that the proposed CSS method based on EMD-ANN outperforms the standard fast Fourier transform (FFT) and EMD detection-based cooperative spectrum sensing with a hard "OR" fusion at low SNR. With Pf =0.01, 100% detection accuracy with proposed techniques is obtained at SNR= -22dB. Conclusion: The findings show that the suggested approach outperforms EMD and FFT based energy detection scheme-based traditional CSS in low SNR environments.
-
-
-
A Distorted Light Field Image Correction Method Based on Improved Hough Transform
Authors: Ruihua Zhang and Shubo BiIntroduction: In using a camera to take photos, due to environmental limitations, uneven lighting can cause uneven distribution of the image light field, resulting in distortion of the image background and target, blurring of details, and distorted light field images. Method: In view of this, research is conducted on the correction of distorted light field images based on the Hough transform. First, the improved Hough transform is utilized to locate the four coordinates, the matrix information of the normal image is applied to calculate the corresponding parameter amount, and then the low-frequency part of the image spectrum is removed. Finally, it uses the Gaussian function for difference, inputs the original data, and gets the correction result of the distorted light field image. Result: The research results indicate that in the practical application of the distorted light field image correction algorithm based on the Hough transform, the improved Hough transform algorithm is superior to the traditional one. Conclusion: In comparative experiments, the research algorithm outperforms the other three algorithms, with an average color restoration of 93.76% and an average signal-to-noise ratio of 54.22dB. The superiority of the research algorithm has been verified, indicating that the research method can perfectly correct distorted light field images and achieve good correction results.
-
-
-
Research on Internet of Medical Things: Systematic Review, Research Trends and Challenges
Authors: Dinesh Anand, Avinash Kaur and Manpreet SinghIntroduction: Remote data exchange operations in healthcare are observed, consulted, monitored and treated by the Internet of Medical Things (IoMT). It is an extension of the Internet of Things (IoT). Method: At the growing stage of IoT, IoMT is speedily drawing researchers’ interest due to its extensive use in healthcare systems. Smaller and lower-priced wireless devices with various communication protocols have led to the formation of IoMT. Healthcare data is exchanged through wireless communication with IoMT. The margining of IoMT and healthcare can yield multiple benefits in terms of: better quality of life, care services and developing solution/s at low cost. In this article, a systematic literature review has been conducted on IoMT. Results: Authors have thoroughly investigated the different versions of healthcare 1.0, 2.0, 3.0 and 4.0 as proposed by the healthcare industry. Furthermore, the taxonomy of IoMT has been designed and compared with existing surveys. Conclusion: This survey is unique and stands different from the point of view of existing surveys. It supports the future of IoMT researchers to bring new insight to their researches.
-