- Home
- A-Z Publications
- Recent Advances in Computer Science and Communications
- Previous Issues
- Volume 17, Issue 8, 2024
Recent Advances in Computer Science and Communications - Volume 17, Issue 8, 2024
Volume 17, Issue 8, 2024
-
-
Study of Access Control Techniques on the Blockchain-enabled Secure Data Sharing Scheme in Edge Computing
Authors: Neha Mathur, Shweta Sinha, Rajesh K. Tyagi and Nishtha JatanaBackground: The pervasive adoption of edge computing is reshaping real-time big data analysis, smart city management, intelligent transportation, and various other domains. Its appeal lies in its distributed nature, decentralization, low latency, mobile support, and spatial awareness. However, this ubiquity exposes data to security threats, jeopardizing privacy and integrity. Consequently, access control assumes paramount importance in securing data sharing within edge computing and blockchain technologies. Methods: This research addresses this critical issue by conducting a comprehensive study on access control techniques within the context of edge computing and blockchain for secure data sharing. Our methodology commences with an exhaustive review of relevant articles, aiming to identify and expound upon gaps in existing research. Subsequently, we perform a meticulous analysis of access control methods, mechanisms, and performance metrics, seeking to establish a holistic understanding of the landscape. Results: The culmination of this research effort is a multifaceted contribution. We distill insights from a diverse range of access control schemes, shedding light on their nuances and effectiveness. Our analysis extends to evaluating the performance metrics vital for ensuring robust access control. Through this research, we also pinpoint critical research gaps within traditional access control methods, creating a foundation for innovative approaches to address the evolving challenges within edge computing and blockchain environments. Conclusion: In conclusion, this research venture paves the way for secure data sharing in edge computing and blockchain by offering a thorough examination of access control. The findings from this study are anticipated to guide future developments in access control techniques and facilitate the evolution of secure, privacy-conscious, and efficient data sharing practices in the dynamic landscape of digital technology.
-
-
-
Advancements in Data Augmentation and Transfer Learning: A Comprehensive Survey to Address Data Scarcity Challenges
Authors: Salma Fayaz, Syed Zubair Ahmad Shah, Nusrat Mohi ud din, Naillah Gul and Assif AssadDeep Learning (DL) models have demonstrated remarkable proficiency in image classification and recognition tasks, surpassing human capabilities. The observed enhancement in performance can be attributed to the utilization of extensive datasets. Nevertheless, DL models have huge data requirements. Widening the learning capability of such models from limited samples even today remains a challenge, given the intrinsic constraints of small datasets. The trifecta of challenges, encompassing limited labeled datasets, privacy, poor generalization performance, and the costliness of annotations, further compounds the difficulty in achieving robust model performance. Overcoming the challenge of expanding the learning capabilities of Deep Learning models with limited sample sizes remains a pressing concern even today. To address this critical issue, our study conducts a meticulous examination of established methodologies, such as Data Augmentation and Transfer Learning, which offer promising solutions to data scarcity dilemmas. Data Augmentation, a powerful technique, amplifies the size of small datasets through a diverse array of strategies. These encompass geometric transformations, kernel filter manipulations, neural style transfer amalgamation, random erasing, Generative Adversarial Networks, augmentations in feature space, and adversarial and meta- learning training paradigms. Furthermore, Transfer Learning emerges as a crucial tool, leveraging pre-trained models to facilitate knowledge transfer between models or enabling the retraining of models on analogous datasets. Through our comprehensive investigation, we provide profound insights into how the synergistic application of these two techniques can significantly enhance the performance of classification tasks, effectively magnifying scarce datasets. This augmentation in data availability not only addresses the immediate challenges posed by limited datasets but also unlocks the full potential of working with Big Data in a new era of possibilities in DL applications.
-
-
-
Diagnosis and Management System of Healthcare Resources for Pulmonary Cardio-vascular Diseases Based on Supervised Machine Learning
More LessIntroduction: The detection and management of diseases have always been critical and challenging tasks for healthcare professionals. This necessitates expensive human and material resources, resulting in prolonged treatment processes. In medicine, misdiagnosis and mismanagement can significantly contribute to mistreatment and resource loss. However, machine learning (ML) techniques have demonstrated the potential to surpass standard patient treatment procedures, aiding healthcare professionals in better disease management. Methods: In this project, the focus is on smart auscultation systems and resource management, employing Random Forest Regression (RFR). This system collects patients' physiological values (specifically, photoplethysmography techniques: PPG) as input and provides disease detection, treatment protocols, and staff assignments with greater precision. The aim is to enable early disease detection and shorten both staff and disease treatment durations. Result: Additionally, this system allows for a general diagnosis of the patient's condition, swiftly transitioning to a specific one if the initial auscultation detects a suspicious disease. Conclusion: Compared to the conventional system, it offers quicker diagnoses and satisfactory real-time patient sorting.
-
-
-
Target Signal Communication Detection of Black Flying UAVs Based on Deep Learning Algorithm
Authors: Yangbing Zheng and Xiaohan TuBackground: Unmanned aerial vehicles (UAVs) are being widely used in many fields, such as national economy, social development, national defense, and security. Currently, the number of registered UAVs in China is far less than that of flying UAVs-the frequent occurrence of unsafe incidents. Objective: The phenomenon of UAVs flying undeclared and unapproved has caused more serious troubles to social public order and people's production and life. Methods: In this paper, to assist the public security department in detecting the phenomenon of UAV black flying, our team conducts a series of research based on the deep learning YOLOv5 (You Only Look Once) algorithm. Results: Firstly, the Vision Transformer mechanism is integrated to enhance the robustness of the model. Secondly, depth-separable convolution is introduced to reduce parameter redundancy. Finally, the SimAM attention-free mechanism and CBAM attention-free mechanism are combined to enhance the attention of small target UAVs. Conclusion: Through the analysis of UAV targets in video surveillance, the rapid identification of black-flying UAVs can be realized, the monitoring and early warning ability of UAVs in a specific area can be improved, and the loss of life and property of people can be reduced or saved as much as possible.
-
-
-
An In-Depth Analysis of Collision Avoidance Path Planning Algorithms in Autonomous Vehicles
Authors: Keren L. Daniel and Ramesh Chandra PooniaPath planning is a way to define the motion of an autonomous surface vehicle (ASV) in any existing obstacle environment to enable the vehicle's movement by setting directions to avoid that can react to the obstacles in the vehicle's path. A good, planned path perceives the environment to the extent of uncertainty and tries to build or adapt its change in the path of motion. Efficient path planning algorithms are needed to alleviate deficiencies, that are to be modified using the deterministic path that leads the ASV to reach a goal or a desired location while finding optimal solution has become a challenge in the field of optimization along with a collision-free path, making path planning a critical thinker. The traditional algorithms have a lot of training and computation, making it difficult in a realistic environment. This review paper explores the different techniques available in path planning and collision avoidance of ASV in a dynamic environment. The objective of good path planning and collision avoidance for a dynamic environment is compared effectively with the existing obstacle’s movement of different vehicles. Different path planning technical approaches are compared with their performance and collision avoidance for unmanned vehicles in marine environments by early researchers. This paper gives us a clear idea for developing an effective path planning technique to overcome marine accidents in the dynamic ocean environment while choosing the shortest, obstacle-free path for Autonomous Surface Vehicles that can reduce risk and enhance the safety of unmanned vehicle movement in a harsh ocean environment.
-
-
-
A Thorough Review of Deep Learning in Autism Spectrum Disorder Detection: From Data to Diagnosis
Authors: Manjunath R. Lamani and Julian Benadit PernabasBackground: Autism Spectrum Disorder (ASD) is a multifaceted neurodevelopmental condition with significant heterogeneity in its clinical presentation. Timely and precise identification of ASD is crucial for effective intervention and assistance. Recent advances in deep learning techniques have shown promise in enhancing the accuracy of ASD detection. Objective: This comprehensive review aims to provide an overview of various deep learning methods employed in detecting ASD, utilizing diverse neuroimaging modalities. We analyze a range of studies that use resting-state functional Magnetic Resonance Imaging (rsfMRI), structural MRI (sMRI), task-based fMRI (tfMRI), and electroencephalography (EEG). This paper aims to assess the effectiveness of these techniques based on criteria such as accuracy, sensitivity, specificity, and computational efficiency. Methods: We systematically review studies investigating ASD detection using deep learning across different neuroimaging modalities. These studies utilize various preprocessing tools, atlases, feature extraction techniques, and classification algorithms. The performance metrics of interest include accuracy, sensitivity, specificity, precision, F1-score, recall, and area under the curve (AUC). Results: The review covers a wide range of studies, each with its own dataset and methodology. Notable findings include a study employing rsfMRI data from ABIDE that achieved an accuracy of 80% using LeNet. Another study using rsfMRI data from ABIDE-II achieved an impressive accuracy of 95.4% with the ASGCN deep learning model. Studies utilizing different modalities, such as EEG and sMRI, also reported high accuracies ranging from 74% to 95%. Conclusion: Deep learning-based approaches for ASD detection have demonstrated significant potential across multiple neuroimaging modalities. These methods offer a more objective and data-driven approach to diagnosis, potentially reducing the subjectivity associated with clinical evaluations. However, challenges remain, including the need for larger and more diverse datasets, model interpretability, and clinical validation. The field of deep learning in ASD diagnosis continues to evolve, holding promise for early and accurate identification of individuals with ASD, which is crucial for timely intervention and support.
-
-
-
Schema Extraction in NoSQL Databases: A Systematic Literature Review
Authors: Saad Belefqih, Ahmed Zellou and Mouna BerquedichIntroduction: Nowadays, NoSQL databases have taken on an increasingly important role in the storage of massive data within companies. Due to a common property called schema-less, NoSQL databases offer great flexibility, particularly for the storage of data in different formats. However, despite their success in data storage, schema-less databases are a major obstacle in areas requiring precise knowledge of this schema, especially in the field of data integration. Method: This study presents a Systematic Literature Review (SLR) to explore, evaluate, and discuss relevant existing research and endeavors using novel schema extraction approaches. Furthermore, we conducted this study using a well-defined methodology to examine and study the problem of schema extraction from NoSQL databases. Results: Our research results highlight and emphasize the scheme extraction approaches and provide knowledge to researchers and practitioners by proposing schema extraction approaches and their limitations, which contributes to inventing new, more efficient approaches. Conclusion: In our future work, inspired by the recent advances in quantum computing and the emergence of post-quantum cryptography (PQC), we aim to propose a schema extraction approach that blends cutting-edge technologies with a strong focus on database security.
-
-
-
An Energy-efficient Routing Protocol Based on Elephant Herding Optimization in MANET
Authors: A. Dinesh and B.P. S. VigneshBackground: A mobile ad hoc network (MANET) is a collection of self-organizing mobile nodes creating an ad hoc network without fixed infrastructure. Routing is a major issue in mobile networks that may reduce network performance due to frequent network topology changes. Routing protocols are so important in dynamic multi-hop networks that many studies have focused on the routing problem in MANETs. Methods: In this research work, a proposed ad hoc on-demand distance vector (AODV) with an elephant herding optimization (EHO) called AODVEHO is used as an optimal path selection method that creates a set of best paths between destination and source. Results: To validate the performance of proposed AODVEHO, AntHocNet, AODV, and designation sequence distance vector (DSDV). Various performance measures are considered to validate our proposed research work, such as packet delivery ratio (PDR), end-to-end delay (E2ED), and average energy consumption (AEC). Conclusion: Experimental results are indicated that the AODVEHO achieved a higher routing overhead (73 %), PDR (89.87 %), low E2ED rate (95.22 %), AEC (75.60 %), and dead nodes (75%) when compared to other routing schemes.
-