- Home
- A-Z Publications
- Recent Advances in Computer Science and Communications
- Fast Track Listing
Recent Advances in Computer Science and Communications - Online First
Description text for Online First listing goes here...
25 results
-
-
Deep Neural Network Framework for Predicting Cardiovascular Diseases from ECG Signals
Authors: Tanishq Soni, Deepali Gupta, Mudita Uppal, Sapna Juneja, Yonis Gulzar and Kayhan Zrar GhafoorAvailable online: 30 December 2024More LessIntroductionCardio Vascular Disease (CVD), a primary cause of death worldwide, includes a variety of heart-related disorders like heart failure, arrhythmias, and coronary artery disease (CAD), where plaque buildup narrows the heart muscle's blood vessels and causes angina or heart attacks. Genetics, congenital anomalies, bad diet, lack of exercise, smoking, and chronic diseases including hypertension and diabetes can cause cardiac disease.
MethodThe symptoms can range from chest pain and shortness of breath to exhaustion and palpitations and diagnosis usually involves a medical history, physical examination, and electrocardiograms (ECGs), and stress testing. Lifestyle adjustments, medicines, angioplasty, and bypass grafts or heart transplants are possible treatments. Preventive measures include healthy living, risk factor management, and frequent checkups, which are few measures, whereas advanced algorithms can analyze massive volumes of ECG and MRI data to find patterns and anomalies that humans may overlook.
ResultsThe deep learning models increase arrhythmia, coronary artery disease, and heart failure diagnosis accuracy and speed. They enable predictive analytics, early intervention, and personalized treatment programs, increasing cardiac care results. The proposed DNN model consists of a 3-layer architecture having input, hidden, and output layers. In the hidden layer, 2 layers, namely, the dense layer and batch normalization layer are added to enhance its accuracy.
ConclusionThree different optimizers namely Adam, AdaGrad, and AdaDelta are tested on 50 epochs and 32 batch sizes for predicting cardiovascular disease. Adam optimizer has the highest accuracy of 85% using the proposed deep neural network.
-
-
-
Lightweight Research on Fatigue Driving Face Detection Based on YOLOv8
Authors: Yin Lifeng and Ding ZiyuanAvailable online: 23 December 2024More LessIntroductionWith the rapid development of society, motor vehicles have become one of the main means of transportation. However, as the number of motor vehicles continues to increase, traffic safety accidents also continue to appear, bringing serious threats to people's lives, and property safety. Fatigue driving is one of the important causes of traffic safety accidents.
MethodTo address this problem, a target detection algorithm called VA-YOLO is designed to improve the speed and accuracy of facial recognition for fatigue checking. The algorithm employs a lightweight backbone network, VanillaNet, instead of the traditional backbone network, which reduces the computational and parametric quantities of the model. The SE attention mechanism is also introduced to enhance the model's attention to the target features, which further improves the accuracy of target detection. Finally, in terms of the bounding box regression loss function, the SIoU loss function is used to reduce the error.
ResultThe experimental results show that, compared toYolov8n, the VA-YOLO algorithm improves the accuracy by 1.3% while the number of parameters decreases by 30%.
ConclusionThis shows that the VA-YOLO algorithm has a significant advantage in realizing the balance between the number of parameters and accuracy, which is important for improving the speed and accuracy of fatigue driving detection.
-
-
-
Advanced Digital Technologies for Promoting Indian Culture and Tourism through Cinema
Available online: 23 December 2024More LessCulture and Tourism are two mainly interrelated elements that contribute a lot to achieving Sustainable Development for any developing country especially India, which has an extremely rich historical and cultural background. Tourism Industry is the fastest growing sector in a local economy creating several job opportunities which ultimately raise the standard of living of people which further raises the consumption level of goods and services, resulting in a rise in the Gross Domestic Product (GDP) of a country. However, various studies pointed out major promotional strategies concerning tourism and culture but an amalgamated promotional approach for both was still missing. With this motivation, the current study aims at providing an amalgamated promotional approach in assimilation with the latest Industry 4.0 technologies such as Artificial Intelligence (AI), Machine Learning (ML), Big Data, Blockchain, Virtual Reality (VR), Digital Twin and Metaverse to the Indian tourism industry by reviewing prior research studies. The findings of the current study are establishing an online future travel demands forecasting system, an online tourists’ destination personalized recommendation system, an online tourist’s review analysis recommendation system, and an online destination image recommendation system and provide the practical design for it through 1+5 Architectural Views Model and by applying several ML algorithms such as CNN, BPNN, SVM, Collaborative Filtering, K-means Clustering, API Emotion, and Naïve Bayes algorithms. Finally, this study has discussed challenges and suggested vital recommendations for future work with the assimilation of Industry 4.0 technologies.
-
-
-
Field Pest Detection via Pyramid Vision Transformer and Prime Sample Attention
Available online: 10 December 2024More LessBackgroundPest detection plays a crucial role in smart agriculture; it is one of the primary factors that significantly impact crop yield and quality. Objective: In actual field environments, pests often appear as dense and small objects, which pose a great challenge to field pest detection. Therefore, this paper addresses the problem of dense small pest detection.
MethodsWe combine a pyramid vision transformer and prime sample attention (named PVT-PSA) to design an effective pest detection model. Firstly, a pyramid vision transformer is adopted to extract pest feature information. Pyramid vision transformer fuses multi-scale pest features through pyramid structure and can capture context information of small pests, which is conducive to the feature expression of small pests. Then, we design prime sample attention to guide the selection of pest samples in the model training process to alleviate the occlusion effect between dense pests and enhance the overall pest detection accuracy.
ResultsThe effectiveness of each module is verified by the ablation experiment. According to the comparison experiment, the detection and inference performance of the PVT-PSA is better than the other eleven detectors in field pest detection. Finally, we deploy the PVT- PSA model on a terrestrial robot based on the Jetson TX2 motherboard for field pest detection.
ConclusionThe pyramid vision transformer is utilized to extract relevant features of pests. Additionally, prime sample attention is employed to identify key samples that aid in effectively training the pest detection models. The model deployment further demonstrates the practicality and effectiveness of our proposed approach in smart agriculture applications.
-
-
-
Comprehensive Analysis of Oversampling Techniques for Addressing Class Imbalance Employing Machine Learning Models
Authors: Shivani Rana, Rakesh Kanji and Shruti JainAvailable online: 10 December 2024More LessBackgroundUnbalanced datasets present a significant challenge in machine learning, often leading to biased models that favor the majority class. Recent oversampling techniques like SMOTE, Borderline SMOTE, and ADASYN attempt to mitigate these issues. This study investigates these techniques in conjunction with machine learning models like SVM, Decision Tree, and Logistic Regression. The results reveal critical challenges such as noise amplification and overfitting, which we address by refining the oversampling approaches to improve model performance and generalization.
AimIn order to address this challenge of unbalanced datasets, the minority class is oversampled to accommodate the majority class. Oversampling techniques such SMOTE (Synthetic Minority Oversampling Technique), Borderline SMOTE and ADASYN (Adaptive Synthetic Sampling) are used in this work.
ObjectiveTo perform the comprehensive analysis of various oversampling methods for taking acre of class imbalance issue using ML methods.
MethodThe proposed methodology uses BERT technique which removes the pre-processing step. Various proposed oversampling techniques in the literature are used for balancing the data, followed by feature extraction followed by text classification using ML algorithms. Experiments are performed using ML classification algorithms like Decision tree (DT), Logistic regression (LR), Support vector machine (SVM) and Random forest (RF) for categorizing the data.
ResultThe results show improvement corresponding SVM using Borderline SMOTE, resulting in an accuracy of 71.9% and MCC value of 0.53.
ConclusionThe suggested method assists in the evolution of fairer and more effective ML models by addressing this basic issue of class imbalance.
-
-
-
A Survey on the Communication of UAVs with Charging and Control Stations
Available online: 09 December 2024More LessUnmanned Aerial Vehicles (UAVs) have a history of over a century of deployment, but in recent decades, they have progressed at a staggering rate. Nowadays, UAVs are used by a large number of civil and military applications. The communication functionality of a UAV with external systems for control and charging is strongly connected with evolving technologies and services. This leads to an increased number of alternatives when designing UAV communications. This review presents the information needed for choosing an efficient communication system between UAVs and two important elements, the Ground Control Station (GCS) and the Charging Station (CS). GCS is responsible for monitoring and controlling the UAV’s units, while CS is used for the formal charging of the UAV. This study aimed at collecting, classifying, and evaluating all of the necessary information in order to obtain the final decision about the kind of communication that is most efficient for a target UAV application. The features of the telemetry open-source protocols are presented for the UAV-GCS communication and evaluated according to the needs of the most significant application domains. Communication between UAVs and CSs is classified depending on the existence of an intermediate server and analyzed considering telemetry protocols and application domains. Communication algorithms are evaluated in terms of time and energy efficiency. Lastly, for the most significant application domains, the most suitable algorithms are matched.
-
-
-
The Inverse-Consistent Deformable MRI Registration Method Based on the Improved UNet Model and Similarity Attention
Authors: Tianqi Cheng, Lei Wang, Yaolong Han, Shilong Liu, Chunyu Yan, Yanqing Sun, Shanliang Yang and Bin LiAvailable online: 09 December 2024More LessIntroductionDeformable image registration is an essential task in medical image analysis. The UNet model, or the model with the U-shaped structure, has been popularly proposed in deep learning-based registration methods. However, they easily lose the important similarity information in the up-sampling stage, and these methods usually ignore the inherent inverse consistency of the transformation between a pair of images. Furthermore, the traditional smoothing constraints used in the existing methods can only partially ensure the folding of the deformation field.
MethodAn inverse consistent deformable medical image registration network(ICSANet) based on the inverse consistency constraint and the similarity-based local attention is developed. A new UNet network is constructed by introducing similarity-based local attention to focus on the spatial correspondence in the high-similarity space. A novel inverse consistency constraint is proposed, and the objective function of the new form is presented with the combination of the traditional constraint conditions. Experiment: The performance of the proposed method is compared with the typical registration models, such as the VoxelMorph, PVT, nnFormer, and TransMorph-diff model, on the brain IXI and OASIS datasets.
ResultExperimental results on the brain MRI datasets show that the images can be deformed symmetrically until two distorted images are well matched. The quantitative comparison and visual analysis indicate that the proposed method performs better, and the Dice index can be improved by at least 12% with only 10% parameters.
ConclusionThis paper presents a new medical image registration network, ICSANet. By introducing a similarity attention gate, it accurately captures high-similarity spatial correspondences between source and target images, resulting in better registration performance.
-
-
-
A Comprehensive Survey on Cyber-Physical System Security in the Internet of Things (IoT): Addressing and Solutions
Authors: G. Murugan, C. Padmaja, R. Sindhuja, Pallavi Yarde, Guduri Chitanya, Kalyan Devappa Bamane and M. SudhakarAvailable online: 04 November 2024More LessBackgroundCyber-Physical Systems (CPSs) integrate computing, control, and communication technologies, bridging cyberspace and the physical world to enhance critical infrastructure and safety-critical systems. Existing surveys often address CPS security from a single perspective, necessitating a more comprehensive approach.
MethodsThis paper presents a thorough review of CPS security from three perspectives: the physical domain, the cyber domain, and the cyber-physical domain. We examine attacks on physical components like sensors, cyber-attacks targeting CPSs, and integrated cyber-physical attacks. For each domain, we analyse corresponding detection and defence mechanisms.
ResultsOur review reveals that CPSs face significant security threats across all domains. In the physical domain, attacks on sensors can disrupt system operations, but various defences are available. In the cyber domain, CPSs are vulnerable to malware, hacking, and denial-of-service attacks, with several detection and defence strategies in place. The cyber-physical domain highlights complex threats where cyber-attacks cause physical damage, requiring comprehensive security approaches.
ConclusionBy examining CPS security from multiple perspectives, this review provides a holistic understanding of current threats and defence mechanisms. It identifies future research directions to enhance CPS security, aiming to better protect critical infrastructure against evolving cyber threats.
-
-
-
A Deep Learning Framework with Learning without Forgetting for Intelligent Surveillance in IoT-enabled Home Environments in Smart Cities
Authors: Surjeet Dalal, Neeraj Dahiya, Amit Verma, Neetu Faujdar, Sarita Rathee, Vivek Jaglan, Uma Rani and Dac-Nhuong LeAvailable online: 04 November 2024More LessBackgroundInternet of Things (IoT) technology in smart urban homes has revolutionised sophisticated monitoring. This progress uses interconnected devices and systems to improve security, resource management, and resident safety. Smart cities use technology to improve efficiency, sustainability, and quality. Internet of Things-enabled intelligent monitoring technologies are key to this goal.
ObjectivesIntelligent monitoring in IoT-enabled homes in smart cities improves security, convenience, and quality of life from advanced technologies. Using live monitoring and risk identification tools to quickly discover and resolve security breaches and suspicious activity to protect citizens. Intelligent devices allow homeowners to remotely control lighting, security locks, and surveillance cameras. Using advanced technologies to regulate heating, cooling, and lighting based on occupancy and usage.
MethodThis study introduces a deep learning architecture that uses LwF (Learning without Forgetting) to keep patterns while absorbing new data. The authors use IoT devices to collect and analyse data in real-time for monitoring and surveillance. They use sophisticated data pre-processing to handle IoT devices' massive data. The authors train the deep learning model with historical and real-time data and cross-validation to ensure resilience.
ResultThe proposed model has been validated on two different Robloflow datasets of 7382 images. The proposed model gains an accuracy level of 98.27%. The proposed Yolo-LwF model outperforms both the original Yolo and LwF models in terms of detection speed and adaptive learning.
ConclusionBy raising the bar for intelligent monitoring solutions in smart cities, the suggested system is ideal for real-time, adaptive surveillance in IoT-enabled households. By embracing adaptability and knowledge retention, authors envision heightened security and safety levels in urban settings.
-
-
-
Real Time Object Detection Algorithm in Foggy Weather Based on WVIT-YOLO Model
Authors: Huiying Zhang, Qinghua Zhang, Yifei Gong, Feifan Yao and Pan XiaoAvailable online: 04 November 2024More LessIntroductionTo address the challenges of low visibility, object recognition difficulties, and low detection accuracy in foggy weather, this paper introduces the WViT-YOLO real-time fog detection model, built on the YOLOv5 framework. The NVIT-Net backbone network, incorporating NTB and NCB modules, enhances the model's ability to extract both global and local features from images.
MethodAn efficient convolutional C3_DSConv module is designed and integrated with channel attention mechanisms and ShuffleAttention at each upsampling stage, improving the model's computational speed and its ability to detect small and blurry objects. The Wise-IOU loss function is utilized during the prediction stage to enhance the model's convergence efficiency.
ResultExperimental results on the publicly available RTTS dataset for vehicle detection in foggy conditions demonstrate that the WViT-YOLO model achieves a 3.2% increase in precision, a 9.5% rise in recall, and an 8.6% improvement in mAP50 compared to the baseline model. Furthermore, WViT-YOLO shows a 9.5% and 8.6% mAP50 improvement over YOLOv7 and YOLOv8, respectively. For detecting small and blurry objects in foggy conditions, the model demonstrates approximately a 5% improvement over the benchmark, significantly enhancing the detection network's generalization ability under foggy conditions.
ConclusionThis advancement is crucial for improving vehicle safety in such weather. The code is available at https://github.com/QinghuaZhang1/mode.
-
-
-
Smart Health Monitoring Approach to Diagnose Attention-Deficit Hyperactivity Disorderbased on Real-Time Activity and Heart Rate Variability using Boosting Models
Authors: Amandeep Kaur, Kuldeep Singh, Prabhpreet Kaur, Bhanu Priya, Gajendra Kumar and Abhishek SharmaAvailable online: 04 November 2024More LessIntroductionAttention-Deficit Hyperactivity Disorder (ADHD) is a prevalent chronic mental health condition that significantly impacts the psychological and physical well-being of millions of adolescents. Early detection and accurate diagnosis are crucial for effective treatment and mitigating the disorder's adverse effects. Despite extensive research efforts, current methods often fall short in simultaneously accounting for daily motor activity and heart rate variability in ADHD detection.
MethodAddressing these gaps, this paper introduces a histogram-based gradient-boosting classifier for analyzing real-time activity and heart-rate variability data to automate ADHD diagnosis. By extracting twelve key features from the data and selecting the most significant ones with the extra tree model, we evaluate these features using various classifiers, including histogram-based gradient boosting, light gradient boosting machine, extreme gradient boosting, gradient boosting, and adaptive boosting.
ResultsThe histogram-based gradient-boosting model, validated through ten-fold cross-validation, outperforms other classifiers with an accuracy of 99.12%, an F1 measure of 99.12%, and a sensitivity of 99.13%. Additionally, it achieves a specificity of 99.1%, an AUC of 0.9995, and a minimal FDR of 0.88%. These results demonstrate that the proposed approach offers a highly effective and precise solution for automated ADHD diagnosis.
ConclusionThe implications of these findings suggest that integrating real-time activity and heart-rate variability data into diagnostic processes can significantly enhance the accuracy and efficiency of ADHD assessment, potentially leading to earlier and more reliable diagnoses, improved patient outcomes, and more tailored treatment strategies.
-
-
-
Jamming Attacks Detection Based on IGWO for Optimization of Fast Correlation-Based Feature extraction in Wireless Communication
Authors: Zinah Jaffar Mohammed Ameen, Hala A. Naman and Alza Abduljabbar MahmoodAvailable online: 25 October 2024More LessBackgroundWireless networks are essential communication technologies that prevent cable installation prices and burdens. Because of this technology's pervasive usage, wireless network safety is a significant problem. Owing to distributed and open wireless medium aspects, attackers might use different jamming methods to exploit physical and MAC layer protocol vulnerabilities. In addition, jamming attacks require to be accurately grouped so that suitable countermeasures can be considered. Given the potential severity of such attacks, precisely identifying and classifying them is critical for implementing effective responses. The motivation for this paper is the need to improve the detection and categorization of jamming signals using modern machine learning algorithms, consequently enhancing wireless network security and reliability.
ObjectiveIn this paper, we compare some machine learning models' efficiency for diagnosing jamming signals.
MethodsSuch algorithms refer to support vector machine (SVM) and k-nearest neighbors (KNN). We checked the signal features that recognize jamming signals. After the jamming attack model, the developed grey wolf optimizer version known as IGWO (improved grey wolf optimizer) has been discussed for feature extraction of software usability. Four separate metrics were employed as features to detect jamming attacks in order to evaluate the machine learning models. This novel feature extraction method is crucial for improving the accuracy of jamming detection.
ResultsThe measurements of these parameters were gathered through a simulation of a real setting. And generated a large dataset using these parameters.
ConclusionThe simulation results illustrate that the KNN algorithm based on jamming detection could diagnose jammers having a minimal likelihood of false alarms and a high level of accuracy.
-
-
-
Malignancy Detection in Lung and Colon Histopathology Images by Transfer Learning with Class Selective Image Processing
Available online: 23 October 2024More LessAims & BackgroundDue to its ferocity, enormous metastatic potential, and variability, cancer is responsible for a disproportionately high number of deaths. Cancers of the lung and colon are two of the most common forms of the disease in both sexes worldwide. The excellence of treatment and the endurance rate for cancer patients can be greatly improved with early and precise diagnosis.
Objectives & MethodologyWe suggest a computationally efficient and highly accurate strategy for the rapid and precise diagnosis of lung and colon cancers as a substitute for the standard approaches now in use. The training and validation procedures in this work made use of an enormous dataset consisting of lung and colon histopathology pictures. There are 25,000 Histopathological Images (HIs) in the dataset, split evenly among 5 categories (mostly lung and colon tissues). Before training it on the dataset, a pretrained neural network (AlexNet) had its four layers fine-tuned.
ResultsThe study enhances malignancy detection in lung and colon histopathology images by applying transfer learning with class-selective image processing. Instead of enhancing the entire dataset, a targeted contrast enrichment was applied to images from the underperforming class, improving the model's accuracy from 92.3% to 99.2% while reducing computational overhead. CONCLUSION: This approach stands out by emphasizing class-specific enhancements, leading to significant performance gains. The results meet or exceed established CAD metrics for breast cancer histological images, demonstrating the method's efficiency and effectiveness.
-
-
-
Utilizing AspectJ for Defense Against Evasive Malware Attacks in Android System
Authors: Ketaki Pattani, Sunil Gautam, Mamoon Rashid, Mohd Zuhair and Ahsan RizviAvailable online: 18 October 2024More LessIntroductionMobile devices have become an integral part of our digital lives, facilitating various tasks and storing a treasure trove of sensitive information. However, as more people utilize mobile devices, sophisticated cyber threats are emerging to elude traditional security measures.
MethodThe use of evasion techniques by malicious actors presents a significant challenge to mobile security, necessitating creative solutions. In this work, we investigate the potential critical role that the aspect-oriented programming paradigm AspectJ can play in strengthening mobile security against evasion attempts. Evasion techniques cover a wide range of tactics, including runtime manipulation, code obfuscation, and unauthorized data access.
ResultsThese tactics usually aim to bypass detection and avoid security measures. In order to address the aforementioned issues, this paper uses AspectJ to give developers a flexible and dynamic way to add aspects to their coding structures so they can monitor, intercept, and respond to evasive actions. It illustrates how AspectJ can improve mobile security and counteract the long-lasting risks that evasion techniques present in a dynamic threat landscape.
ConclusionConsequently, this work proposes a novel defense mechanism incorporating AspectJ into a significant paradigm of security against evasion with 91.33% accuracy and demonstrates the successful detection of evasive attacks.
-
-
-
CNN-Based Integrated Framework for Enhanced Diabetic Retinopathy Detection
Authors: R Chitra, Anusha Bamini A M, S Punitha, Thompson Stephan and Sheshikala MarthaAvailable online: 16 October 2024More LessDiabetic retinopathy (DR) is an ocular condition that adversely affects the retinal region of the eye. Without early detection, this disease can progress to irreversible blindness, particularly in individuals with diabetes. The manifestation of DR correlates with the stage of diabetes, categorized into five distinct stages: 0, 1, 2, 3, and 4. Noteworthy, symptoms characterize each stage during DR analysis. Machine Learning (ML) serves as a crucial tool for identifying intricate patterns within dataset inputs. Given its complexity and time-intensive nature, ML approaches have become integral in existing processes. In this study, diverse filtering techniques are applied to facilitate image filtration. Leveraging a Convolutional Neural Network (CNN), the detection of DR is executed based on its stages, with a specific focus on highlighting the regions affected by infection. The experimentation involves DR fundus color images, constituting a dataset of 1000 color fundus images. To enhance the proposed approach's performance, a Gabor filtering technique is incorporated, resulting in notably superior outcomes in terms of performance metrics.
-
-
-
Biofuels Policy as the Indian Strategy to Achieve the 2030 Sustainable Development Goal 7: Targets, Progress, and Barriers
Authors: Michel Mutabaruka, Manmeet Kaur, Sanjay Singla, Purushottam Sharma, Gurpreet Kaur and Gagandeep SinghAvailable online: 16 October 2024More LessIntroductionThe use of 20% blended biofuels to fossil fuels is one of the important targets of the Government of India to address the impacts of Climate Change, energy-related environmental pollution, and illnesses due to air pollution.
MethodThe National Policy on Biofuels 2018 (NPB 2018) is in place to boost the emerging production of biofuels and, therefore, respond to different international agreements, including the Sustainable Development Goals (SDGs) and the Paris Agreement. Hence, this article examined the production of biofuels in India in line with Agenda 2030 to project the share to be taken by biofuels as its contribution to the country’s energy needs.
ResultThe results were compromising; it was observed that the data from 2000 up to 2017 were not on the side of realizing the targets of production and consumption of biofuels in India, whereas the data from 2018 up to now showed a hope of achieving 2030 set goal of E20 petrol in 2025-26, and E5 diesel in 2030. It was clear that the production of bioethanol was boosting compared to its sibling biodiesel, and renewable energy will continue to have a hard take a good share in the total annual energy used in India.
ConclusionIt is recommended to share data between different stakeholders to promote more research, as the low performance in achieving the targets was due to poor communication and missing technology, rather than the lack of feedstock or unavailability of production facilities.
-
-
-
Data Security and Privacy Preservation in Cloud-Based IoT Technologies: an Analysis of Risks and the Creation of Robust Countermeasures
Authors: Mayank Pathak, Kamta Nath Mishra and Satya Prakash SinghAvailable online: 16 October 2024More LessThe Internet of Things (IoT) is a revolutionary technology being used in many different industries to improve productivity, automation, and comfort of the user in the cloud and distributed computing settings. Cloud computing is essential because it makes data management and storage more effective by automatically storing and examining the enormous amounts of data generated by Internet of Things applications. End users, companies, and government data are consequently migrating to the cloud at an increasing rate. A survey of the literature, however, reveals a variety of issues, including data integrity, confidentiality, authentication, and threat identification, that must be resolved to improve data security and privacy. To effectively address contemporary data security concerns, the existing approaches need to be improved. Ensuring secure end-to-end data transmission in a cloud-IoT situation requires innovative and dependable protocol architecture. New technologies that address some of the issues related to cloud data include edge computing, fog, blockchain, and machine learning. This paper provides a thorough examination of security risks, classifying them and suggesting possible defenses to safeguard cloud-IoT data. It also highlights innovative approaches, such as blockchain technology and machine learning, applied to privacy and data security. The paper also explores existing issues with respect to data privacy and security in today's cloud-IoT environments. It suggests possible future directions, including the need for end-user authentication, enhanced security, and procedures for recovering data in the event of an attack.
-
-
-
Machine Learning Empowered Breast Cancer Diagnosis: Insights from Coimbra Dataset Analysis
Authors: Manish Tiwari, Nagendra Singh, Arvind Mewada and Mohd. Aquib AnsariAvailable online: 11 October 2024More LessAimThe aim of this work is to succinctly communicate the key aspects of a research study on breast cancer. This includes highlighting the global impact and prevalence of breast cancer, emphasizing the challenges of early diagnosis, discussing the potential of technological advancements, and showcasing the role of machine learning algorithms in the context of liver cancer diagnosis.
BackgroundCancer, notably breast cancer, represents a global health challenge, claiming a significant toll with 12.5% of new cancer cases annually. The prevalence of breast cancer among women worldwide is alarming, resulting in 2.26 million incidents and the unfortunate loss of 685,000 lives.
ObjectiveThis article focuses on the critical aspect of early breast cancer diagnosis, acknowledging its heightened difficulty in developing nations compared to developed counterparts. The potential for advancements in technology to serve as a beacon of hope lies in early identification and timely treatment, offering salvation to numerous women and significantly elevating survival chances.
MethodIn this intricate landscape, machine learning algorithms, particularly in diagnosing liver cancer at its nascent stages, emerge as instrumental tools. The study employs the latest Coimbra dataset, encompassing nine key attributes and a binary classification attribute, with values 1 and 2 signifying benign and malignant cases, respectively.
ResultSupervised machine learning algorithms, including Bayes net, multilayer perceptron, IBK, random committee, and random tree, are meticulously applied. Certain models exhibit superior accuracy, precision, recall, and performance, positioning them as promising cornerstones for breast cancer analysis.
ConclusionThis structured abstract highlights the urgent need for effective screening and prevention strategies, emphasizing the potential of advanced technology and machine learning algorithms to play a pivotal role in the early detection and analysis of breast cancer, offering hope for improved outcomes and survival rates.
-
-
-
Analysis and Classification of Medical Images Using Deep Learning Algorithms
Authors: Chouchene Karima, Nadjla Bourbia, Kamel Messaoudi and El-Bay BourennaneAvailable online: 10 October 2024More LessIntroductionNowadays, Artificial intelligence and machine learning have emerged as a powerful tool for the analysis of medical images such as MRI scans. This technology holds significant potential to improve diagnostic services and accelerate medical advances by facilitating clinical decision-making.
MethodIn this work, we developed a Convolutional Neural Network (CNN) model specifically designed for the classification of medical images. Using a selected database, the model achieved a classification accuracy of 92%. To further improve the performance, we leveraged the pre-trained VGG16 model, which increased the classification accuracy to 100%. Additionally, we preprocessed the MRI images using the Roboflow platform and then developed YOLOv5 models for the detection of tumors, infections, and cancerous lesions.
ResultThe results demonstrate a localization accuracy of 50.41% for these medical conditions.
ConclusionThis research highlights the value of AI-driven approaches in enhancing medical image analysis and their potential to support more accurate diagnoses and accelerate advancements in healthcare.
-
-
-
Comparative Analysis of Different Transport Layer Protocol Techniques Incognitive Network
Authors: Ajay Kumar and Naveen HemrajaniAvailable online: 09 October 2024More LessMost of the networks employ TCP protocol for transmission control in transport mechanism. Although it offers numerous services such as reliability, end-to-end delivery, secure transmission of data, and so on to applications functioning across the World Wide Web, TCP needs to have effective congestion management techniques in order to handle traffic with a lot of data. Still, TCP have poor performance during data transmission in the network. The network community continues conducting research to develop a method that should provide a fair and effective transmission bandwidth distribution. Numerous congestion control strategies have been developed based on previous research in this area. This work discusses, identifies, compares, and analyses the behaviour of a few network congestion control strategies to determine their benefits and limitations. The widely known network simulator ns2 is employed for the simulation. The performance metrics for QTCP, TCP new Reno, TCP- Hybla, L-TCP and RL-TCP are throughput, average delay, PDR, packet loss, average jitter, latency and fairness are considered. The RL-TCP exhibits superior performance in multiple measures when it is compared to alternative TCP protocols, as indicated by simulation results. These metrics encompass throughput, average delay, packet delivery ratio (PDR), packet loss, jitter, latency, and fairness. Furthermore, several TCP protocols, such as L-TCP, TCP-Hybla, QTCP, and TCP-New Reno, have undergone evaluation, uncovering disparities in their individual performance attributes. Nevertheless, the RL-TCP regularly demonstrates superior performance in all aspects.
-
-
-
AI Chatbots in Fintech Sector: A Study Towards Technological Convergence
Authors: Chandni Bansal, Ajay Kumar, Namrata Dogra, Gaydaa AlZohbi and Chand PrakashAvailable online: 09 October 2024More LessThe Fintech industry, particularly banks, has witnessed a profound transformation with the integration of Artificial Intelligence chatbots, redefining customer experience and engagement. As Fintech firms increasingly integrate AI chatbots into their platforms, understanding customer perceptions becomes paramount for strategic decision-making and sustained success. To unravel the complexities of this convergence, a holistic examination is needed, encompassing not only the technological aspects but also the strategic dimensions that underpin competitive advantage. In this context, the role of intellectual property, particularly patents, emerges as a critical factor shaping the innovation landscape. This research aims to comprehensively investigate customers' perceptions towards AI chatbots in the Fintech industry, with a specific focus on technological convergence. The study seeks to analyze the impact of cutting-edge AI chatbot technologies, including those protected by patents, on user attitudes and overall customer experience within the dynamic fintech landscape. This study provides a comprehensive review of 40 empirical studies on AI chatbots in the fintech industry, particularly the banking sector, featuring patented innovations using the PRISMA methodology. Study outcomes illustrate emerging themes related to consumer behavior and response to financial chatbots in terms of acceptance and adoption intention. Additionally, four key factors that influence how people perceive, anticipate, and engage with fintech chatbots, namely satisfaction, trust, anthropomorphism, and privacy are explored. In conclusion, the finance industry's effective integration and broad use of AI chatbots is dependent on the convergence of four factors: satisfaction, privacy, trust, and anthropomorphism. Current study offers a strong basis for analysing and resolving the obstacles to AI chatbot acceptance and deployment in the financial sector by addressing all these elements extensively. This exploration of technological convergence in fintech industry by analyzing customers' behavior and response to financial chatbots not only contributes to a comprehensive understanding of its intricacies but also serves as a foundation for development and deployment of user-centric fintech chatbots.
-
-
-
Applying Polynomials for Developing Post Quantum Cryptography Algorithms to Secure Online Information - An Initial Hypothesis
Authors: Taniya Hasija, K. R. Ramkumar, Bhupendra Singh, Amanpreet Kaur and Sudesh Kumar MittalAvailable online: 04 October 2024More LessIn the contemporary era, a vast array of applications employs encryption techniques to ensure the safeguarding and privacy of data. Quantum computers are expected to threaten conventional security methods and two existing approaches, namely Shor's and Grover's algorithms, are expediting the process of breaking both asymmetric and symmetric key classical algorithms. The objective of this article is to explore the possibilities of creating a new polynomial based encryption algorithm that can be both classically and quantum safe. Polynomial reconstruction problem is considered as a nondeterministic polynomial time hard problem (NP hard), and the degree of the polynomials provide the usage of scalable key lengths. The primary contribution of this study is the proposal of a novel encryption and decryption technique that employs polynomials and various polynomial interpolations, specifically designed for optimal performance in the context of a block cipher. This study also explores various root convergence techniques and provides algorithmic insights, working principles and the implementation of these techniques, which can potentially be utilized in the design of a proposed block-cipher symmetric cryptography algorithm. From the implementation, comparison and analysis of Durand Kernal, Laguerre and Aberth Ehrlich methods, it is evident that Laguerre method is performing better than other root finding approaches. The present study introduces a novel approach in the field of polynomial-based cryptography algorithms within the floating-point domain, thereby offering a promising solution for enhancing the security of future communication systems.
-
-
-
A Policy Configured Resource Management Scheme for Ahns Using LR-KMA and WD-BMO
Available online: 03 October 2024More LessIntroductionA critical technique that provides quality service for users by solving the conflicts between severe spectrum scarcity and the explosive growth of traffic is Cognitive Radio Ad Hoc Networks (CRAHNs). Nevertheless, a critical challenge is the coexistence of primary and secondary users for reasonable resource allocation to satisfy system performance. Many approaches have been developed to allocate resources efficiently; however, they possess some existing limitations, such as abnormal traffic networks, user collisions, and high data transmission error rates.
MethodSo, to overcome such limitations, this paper proposes an efficient policy-configured reinforcement learning-based Ad Hoc Network (AHN) model. The system begins with modeling the Cognitive Radio (CR) network in which the nodes are initialized and clustered using the Link Reliability K-Means clustering Algorithm (LR-KMA) method to derive the optimal policy configuration for the network. Then, to sense the available spectrum and divide it into several bands, spectrum sensing using Coherent Based Detection (CBD) and signal source prediction using the Parzen-Rosenblatt Window-based Restricted Boltzmann Machine (PRW-RBM) were performed.
ResultNext, the suitable bands are selected in the learning model using the Weibull Distribution-based Blue Monkey Optimization (WD-BMO) technique for the resource allocation process. The experimental outcomes were ultimately analyzed to evaluate the proposed resource allocation model's performance in CRAHNs. The LR-KMA algorithm showed 1.5% higher clustering efficiency than traditional methods, while PRW-RBM achieved 1.07% higher classification accuracy.
ConclusionThe optimal resource allocation strategy, WD-BMO, led to lower Normalized Objective Values (NOV) compared to existing methods.
-
-
-
One Pseudo-satellite/GNSS Combined Indoor and Outdoor Fusion Positioning Method Based on Carrier Phase Measurement
Authors: Xiaobo Zhao, Ronghua Hao and Xuefei BaiAvailable online: 25 September 2024More LessBackgroundIn order to realize seamless indoor and outdoor positioning, the positioning results of multiple positioning methods are taken into consideration, and a seamless indoor and outdoor positioning method that ignores the differences in indoor and outdoor environments is required now.
ObjectiveThe implementation of Pseudo satellite/GNSS combined indoor and outdoor fusion positioning for seamless indoor and outdoor environment positioning.
MethodsAn adaptive federated filter is needed for this environment, which can dynamically adjust the information allocation parameters and measurement noise of the sub-filters in the federated filters based on positioning data. It adopts multi-sensor fusion filter to design a seamless indoor and outdoor positioning method. Different positioning data is fused through federated filtering, ultimately seamless indoor and outdoor positioning is realized.
ResultsThis algorithm achieves a fixed ambiguity pseudo satellite/GNSS accuracy of better than 0.15 meters in low-density buildings where there are more than 7 GNSS satellites. When there are fewer than 4 GNSS satellites and the positions is severely obstructed, GNSS alone cannot realize the position, but with the support of pseudo satellites, the accuracy of position can be better than 0.3m. Even without GNSS and only 4 pseudo satellites, the accuracy of position can still be better than 0.5 m.
ConclusionThe relevant experimental results indicate that the method proposed can be used for practical applications of indoor and outdoor fusion positioning.
-
-
-
Flood Mapping and Damage Analysis Using Multispectral Sentinel-2 Satellite Imagery and Machine Learning Techniques
Authors: Rashmi Saini, Shivam Rawat, Suraj Singh and Prabhakar SemwalAvailable online: 15 July 2024More LessBackgroundFloods are among the deadliest natural calamities, devastating ecosystems and human lives worldwide. In India, Bihar is a state grappling with economic hardships and faces severe agricultural devastation due to recurring floods, destroying crops and natural resources, which significantly impacts local farmers. This research addresses the critical need to deeply understand the flood dynamics of selected study areas.
ObjectiveThis research presents a case study that focuses on leveraging Remote Sensing tools and Machine Learning techniques for comprehensive flood mapping and damage analysis in Gopalganj District, Bihar, India, using remote sensing data. More specifically, this research presents three major objectives: (i) Flood damage mapping and change analysis before and after the flood using the Sentinel-2 satellite dataset, (ii) Evaluation of the impact of integrating spectral indices on the accuracy of classification, (iii) Identification of most robust predictor spectral indices for the classification.
MethodsThe Sentinel-2 satellite dataset encompasses 13 bands with resolutions of 10m, 20m, and 60m. Here, four spectral bands (NIR, Red, Green, and Blue) with the finest resolution of 10m have been selected for this study. These bands are integrated with four spectral indices, namely Normalized Difference Water Index (NDWI), MNDWI (Modified NDWI), Normalized Difference Vegetation Index (NDVI), and Soil Adjusted Vegetation Index (SAVI). Two ML classifiers, namely Support Vector Machine (SVM) and Random Forest (RF) have been employed for pixel-based supervised classification.
ResultsResults have shown that RF outperformed and worked well in extracting water bodies and flood-damaged areas effectively. The results demonstrated that RF obtained (Overall Accuracy (OA)= 89.54% and kappa value (ka) = 0.872) and SVM reported (OA= 87.69%, ka= 0.849) for pre-crisis data, whereas, for post-crisis, RF reported (OA=91.54%, ka = 0.897), SVM reported (OA= 89.77%, ka= 0.875).
ConclusionIt was reported that the integration of spectral indices improved the OA by +3.41% and +2.86% using RF and SVM, respectively. The results of this study demonstrated that the waterbody area increased from 12.72 to 88.23 km2, as shown by the RF classifier. The variable importance computation results indicated that MNDWI is the most important predictor variable, followed by NDWI. This study recommends the use of these two predictor variables for flood mapping.
-