Browse Items (2150 total)
Sort by:
-
Hybrid Deep Learning Cloud Intrusion Detection
The scalability and flexibility that cloud computing provides, organisations can readily adapt their resources to meet demand without having to make significant upfront expenditures in hardware infrastructure. Three main types of computing services are provided to people worldwide via the Internet. Increased performance and resource access are two benefits that come with using cloud computing, but there is also an increased chance of attack. As a result of this research, intrusion detection systems that can process massive amounts of data packets, analyse them, and produce reports using knowledge and behaviour analysis were created. Convolution Neural Network Algorithm encrypts data as it's being transmitted end-to-end and is stored in the cloud, providing an extra degree of security. Data protection in the cloud is improved by intrusion detection. This study uses a model to show how data is encrypted and decrypted, of an algorithm and describes the defences against attacks. When assessing the performance of the suggested system, it's critical to consider the time and memory needed to encrypt and decrypt big text files. Additionally, the security of the cloud has been investigated and contrasted with various encoding techniques now in use. 2024 IEEE. -
Investigation of Brain Tumor Recognition and Classification using Deep Learning in Medical Image Processing
A brain tumour is the growth of brain cells that are abnormal, some of which may progress into cancer. Magnetic Resonance Imaging (MRI) scans are the method used most frequently to detect brain tumours. The brain's abnormal tissue growth can be seen on the MRI images, which reveal. Deep learning and machine learning techniques are employed to identify brain tumours in a number of research publications. It only takes a very short amount of time to predict a brain tumour when these algorithms are applied to MRI images, and the increased accuracy makes patient treatment simpler. Thanks to these forecasts, the radiologist can make quick decisions. The suggested approach employs deep learning, a convolution neural network (CNN), an artificial neural network (ANN), a self-defined neural network, andthe existence of brain tumor. 2022 IEEE. -
A Shortest Path Problem for Drug Delivery Using Domination and Eccentricity
The concept of domination was first introduced in by Ore in 1962. With this, the study of domination gained importance and has been vigorously studied since then. The idea about eccentricity for vertices in a graph was given by Buckley and Harary in 1990. This paper combined the ideas about domination and eccentricity and provides the observation obtained during the study. Most of the basic ideas about domination and eccentricity has been covered and also a comparative study between these two has been stated along with problem of drug transportation through networks. These ideas can be further used to solve the real-world problems which uses concepts of domination and eccentricity like for example drug delivery game theory problems, routing problem, assignment problem and many more. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Android security issues and solutions
Android operating system uses the permission-based model which allows Android applications to access user information, system information, device information and external resources of Smartphone. The developer needs to declare the permissions for the Android application. The user needs to accept these permissions for successful installation of an Android application. These permissions are declarations. At the time of installation, if the permissions are allowed by the user, the app can access resources and information anytime. It need not re-request for permissions again. Android OS is susceptible to various security attacks due to its weakness in security. This paper tells about the misuse of app permissions using Shared User ID, how two-factor authentications fail due to inappropriate and improper usage of app permissions using spyware, data theft in Android applications, security breaches or attacks in Android and analysis of Android, iOS and Windows operating system regarding its security. 2017 IEEE. -
Artificial Intelligence Based Enhanced Virtual Mouse Hand Gesture Tracking Using Yolo Algorithm
Virtual mouse technology has revolutionized human computer interaction, allowing users to interact with digital environments without physical peripherals. The concept traces back to the late 1970s, and over the years, it has evolved with significant advancements in computer vision, motion tracking, and gesture recognition technologies. In recent times, machine learning techniques, particularly YOLOv8, have been integrated into virtual mouse technology, enabling accurate and swift detection of virtual objects and surfaces. This advancement enhances seamless interaction, intuitive hand gestures, and personalized virtual reality experiences tailored to individual user preferences. The proposed model, EHT (Enhanced Hand Tracking), leverages the power of YOLOv8 to address the limitations of existing models, such as Mediapipe. EHT achieves higher accuracy in hand tracking, real-Time hand gesture recognition, and improved multi-user interactions. It adapts to users' unique gestures over time, delivering a more natural and immersive computing experience with accuracy rates exceeding those of Mediapipe. For instance, across multiple sample datasets, EHT consistently outperformed Mediapipe in hand tracking accuracy. In Sample Dataset 1, EHT demonstrated an accuracy of 98.3% compared to Mediapipe's 95.65%. Similarly, in Sample Dataset 2, EHT achieved an accuracy of 99.35%, surpassing Mediapipe's 94.63%. Even in Sample Dataset 3, EHT maintained its superiority with an accuracy of 98.54 %, whereas Mediapipe achieved 98.26%. The successful implementation of EHT requires a custom dataset and optimization techniques to ensure efficiency on virtual reality hardware. EHT model is anticipated redefining how users interact with digital environments, unlocking new possibilities for intuitive and immersive computing experiences. 2023 IEEE. -
Professional chat application based on natural language processing
There has been an emerging trend of a vast number of chat applications which are present in the recent years to help people to connect with each other across different mediums, like Hike, WhatsApp, Telegram, etc. The proposed network-based android chat application used for chatting purpose with remote clients or users connected to the internet, and it will not let the user send inappropriate messages. This paper proposes the mechanism of creating professional chat application that will not permit the user to send inappropriate or improper messages to the participants by incorporating base level implementation of natural language processing (NLP). Before sending the messages to the user, the typed message evaluated to find any inappropriate terms in the message that may include vulgar words, etc., using natural language processing. The user can build an own dictionary which contains vulgar or irrelevant terms. After pre-processing steps of removal of punctuations, numbers, conversion of text to lower case and NLP concepts of removing stop words, stemming, tokenization, named entity recognition and parts of speech tagging, it gives keywords from the user typed message. These derived keywords compared with the terms in the dictionary to analyze the sentiment of the message. If the context of the message is negative, then the user not permitted to send the message. 2018 IEEE. -
Hybrid short term load forecasting using ARIMA-SVM
In order to perform a stable and reliable operation of the power system network, short term load forecasting is vital. High forecasting accuracy and speed are the two most important requirements of short-term load forecasting. It is important to analyze the load characteristics and to identify the main factors affecting the load. ARIMA method is most commonly used, as it predict the load purely based on the historical loads and no other assumptions are considered. Therefore there is a need for Outlier detection and correction method as the prediction is based on historical data, the historical data may contain some abnormal or missing values called outliers. Also the load demand is influenced by several other external factors such as temperature, day of the week etc., the Artificial Intelligence techniques will incorporate these external factors which improves the accuracy further. In this paper a hybrid model ARIMA-SVM is used to predict the hourly demand. ARIMA is used to predict the demand after correcting the outliers using Percentage Error (PE) method and its deviation is corrected using SVM. Main objective of this method is to reduce the Mean Absolute percentage Error (MAPE) by introducing a hybrid method employing with outlier detection technique. The historical load data of 2014-2015 from a utility system of southern region is taken for the study. It is observed that the MAPE error got reduced and its convergence speed increased. 2017 IEEE. -
Design and Development of Terahertz Medical Screening Devices
This paper highlights the prospect of design and development of a terahertz medical screening system, giving an overview of existing devices, systems, for THz spectroscopy and imaging of biological samples (e.g., cell, tissue imaging or screening). Considering the non-ionizing nature of THz waves along with its reasonable soft-tissue sensitivity, terahertz instrumentation has opened up possibilities for medical screening devices. Some THz imaging systems presently use raster scanning for calculation of image region of interest. Here, a particular system is proposed as a medical screening device and factors like signal-to-noise ratio, image resolution, image contrast, etc., have been described and correlated with relevant clinical results for exploring possible prospects in medical applications of terahertz waves. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Assessment of composite materials on encrypted secret message in image steganography using RSA algorithm
The use of the internet in this modern era is increased many fold. The communications between different peers take place in digital form. While sharing the messages between different recipients, the confidentiality of the messages is very important. For creating the high level of security while sharing the secret messages, the cryptographic algorithms are introduced along with steganography. Image Steganography is a methodology used to hide the messages inside of the cover image. Initially, the secret information is encrypted by using the RSA Algorithm. Then the encrypted secret information is hidden in the Least Significant Bit (LSB) of the different components of the color image in such a way that the original quality of the image to be minimized. The recipient of the message is able to retrieve the encrypted secret message from the LSB bit of stego_image and then the cipher text is converted into original plain text by using the RSA algorithm. The proposed algorithm verified and analysed its performance against the different combinations of key pairs. 2021 Elsevier Ltd. All rights reserved. -
Enhancing the confidentiality of text embedding using image steganography in spatial domain
Rapid growth in technological development, the use of the internet has grown many folds. Along with it, the sharing of privacy information in networks creates ownership issues. In order to create a high level of security for sharing private information, the concept of steganography is introduced along with encryption based invisible watermarking techniques. The proposed system hides the encrypted private messages by using onetime pad which follows the concept LSB algorithm in spatial domain. The system combines steganography and encryption for enhancing the confidentiality of the intended messages. At first, the private information of the user is encrypted by using the onetime pad algorithm. Then the encrypted text is hidden the Least Significant Bit (LSB) of the different components of the color image in such a way that as to minimize the perceived loss of quality of the cover image. The beneficiary of the message is able to retrieve the hidden back and from the stego-image and extract the cipher text and find the plaintext from using the onetime pad algorithm. The proposed algorithm will be tested and analysed against three different hiding positions of color image components. 2021 American Institute of Physics Inc.. All rights reserved. -
Role of Data Science in the Field of Genomics and Basic Analysis of Raw Genomic Data Using Python
The application of genomics in identifying the nature and cause of diseases has predominantly increased in this decade. This field of study in life sciences combined with new technologies, revealed an outbreak of certain large amounts of genomic sequences. Analysis of such huge data in an appropriate way will ensure accurate prediction of disease which helps to adopt preventive mechanisms which can ultimately improve the human quality of life. In order to achieve this, efficient comprehensive analysis tools and storage mechanisms for handling the enormous genomic data is essential. This research work gives an insight into the application of data science in genomics with a demonstration using Python. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Comparative Analysis of Prediction Algorithms for Heart Diseases
Cardiovascular diseases (CVDs) are the leading source of demises universally: More individuals perish yearly from heart disease than due to any other reason. An estimated 17.9 million humans died from CVDs in 2016, constituting 31% of all global deaths. [1] Such high rates of death due to heart diseases have to cease. This idea can be accelerated by the prediction of risk of CVDs. If a person can be medicated much earlier, before they have any symptoms that can be far more beneficial in averting sickness. The paper strives to communicate this issue of heart diseases employing various prediction models and optimizing them for better outcomes. The accuracy of each algorithm guides to a relative enquiry of these prediction models, forming a solid base for further research, finer prognosis and detection of diabetes. 2021, Springer Nature Singapore Pte Ltd. -
Tool wear and tool life estimation based on linear regression learning
Tools have remained an integral part of the society without which stimulation of certain aspects of human evolution would not have been possible. In recent times the modern tools are used in the manufacturing of high precision components. We know that the accuracy and surface finish of these components can be achieved only by the usage of accurate tools. Sharp edged tools may loosen their sharpness due to repeated usage and machining parameters. Hence to address this issue we propose a system to monitor tool wear by using the captured image of cutting tool tip. We used vision system since it is the primitive method of predicting tool wear and two main machining parameters feed rate and depth of cut. The image of flank wear cutting edge at tool tip is captured by examining under profile projector. The system uses linear regression model to calculate tool wear which is mapped onto continuous 2-D coordinates with feed rate and depth of cut as axis from a captured digital image. Thus the proposed intelligent system uses profile projector and digital image processing methods to estimate tool wear continuously and predictively like humans rather than using strict rules. By estimating tool wear continuously the machine can better perform and machine components accurately by using the resultant values of feed rate and depth of cut as a threshold which are arrived as a result. 2015 IEEE. -
Analysing the Influence of Activation Functions in CNN models for Effective Malware Classification
With the advancement of information technology, malware has become a persistent cyber security concern that targets computer systems, smart devices, and wide networks. Due to flaws in performance accuracy, analysis type, and malware classification methodologies that miss unsuspected malware attacks, malware classification has thus always been a significant concern and a challenging subject. Using the Malimg dataset, which has 9349 samples from 25 different families, this study classifies malware using a deep learning algorithm called a convolution neural network and evaluating the accuracy using a number of activation functions in this study. The proposed CNN model for malware classification achieves a high accuracy rate without the need for complex feature engineering. The model achieved the highest accuracy of 96.93% when using the Rectified Linear Unit (ReLU) activation functions whereas Leaky Relu gives accuracy of 96.76%, Pre relu gives 96.36%, ELU gives 95.72% and tanh gives accuracy of 95.58%. 2024 IEEE. -
Investigating the Use of Natural Language Processing in Electronic Medical Record
Natural language processing (NLP) implemented in digital scientific records (EMRs) can substantially enhance the nice and efficiency of affected person care. The purpose of NLP implemented in EMRs is to extract applicable facts from affected persons' notes written in a human language together with English. This information can then be stored in a suitable structured form for further evaluation and records mining. NLP has been carried out in the clinical field for the reason that Fifties as a green approach for retrieving textual content-based data and reading interactions among affected persons and healthcare professionals. With the arrival of electronic facts, NLP has come to be extra extensively applied for the diffusion of purposes, inclusive of automatic coding, scientific choice aid, and medical doctor order access. This summary makes a of exploring the usage of NLP in EMRs. The scope of this research consists of an evaluate of present NLP technologies and their software in EMRs. It additionally outlines a number of the present-day demanding situations inside the use of NLP for clinical information and shows capability answers. Finally, the potential applications of NLP-driven EMRs are discussed, inclusive of making use of in-health practitioner order entry, scientific choice assistance, and population health control. 2024 IEEE. -
Food calorie estimation using convolutional neural network
The modern world healthy body depends on the number of calories consumed, hence monitoring calorie intake is necessary to maintain good health. At the point when your Body Mass Index is somewhere in between from 25 to 29. It implies that you are conveying overabundance weight. Assuming your BMI is more than 30, it implies you have obesity. To get in shape or keep up the solid weight individuals needs to monitor the calorie they take. The existing system calorie estimation is to be happened manually. The proposed model is to provide unique solution for measuring calorie by using deep learning algorithm. The food calorie calculation is very important in medical field. Because this food calorie is provide good health condition. This measurement is taken from food image in different objects that is fruits and vegetables. This measurement is taken with the help of neural network. The tensor flow is one of the best methods to classify the machine learning method. This method is implementing to calculate the food calorie with the help of Convolutional Neural Network. The input of this calculated model is taken an image of food. The food calorie value is calculated the proposed CNN model with the help of food object detection. The primary parameter of the result is taken by volume error estimation and secondary parameter is calorie error estimation. The volume error estimation is gradually reduced by 20%. That indicates the proposed CNN model is providing higher accuracy level compare to existing model. 2021 IEEE. -
The world of communication & computing platform in research perspective: Opportunities and challenges
Computing paradigms are introduced for solving complex problems by analyzing, designing and implementing by complex systems. Computing can be defined as the effective use of computer or computer technology to solve tasks that are goal oriented. Computing is used in development of producing scientific studies, building intelligent systems, channeling different media for communication. Over the last few years, internet became so popular which lead to the increase in computer processing capacity, data storage and communication with one another. Computing has evolved from one technology to another in its field and formed a robust framework over the years. In this paper a survey on different computing paradigms like evergreen computing is cloud computing, to deal with basic scheduling is grid computing, for multi task handing is parallel computing, to handle smart phone data's that is mobile computing, cluster computing, and distributed computing is carried out. These technologies improved the way computing functions and made it easier to the computer world. The applications and research issues of the most of the computing paradigms are discussed in this article. The recent research issues in computing platform are scheduling and security. The scheduling is dealing with data processing from one computing platform to other computing device. Security is one of the important research issues. 2021 IEEE. -
Optimizing Kidney Ultrasound images through Pre-Processing Filters
Medical image processing and analysis have greatly advanced in the past decade, significantly contributing to the diagnosis of various diseases.However, It is crucial to address the need for effective data management in the medical field due to the significant rise in data generation and storage. It necessitates the exploration of compression methods as a means of achieving efficient data handling. Consideration should be given to image processing approaches to minimize redundancy. Ultrasound imaging has gained importance in recent years, but the presence of artifacts in ultrasound images has complicated diagnoses. An evaluation has been performed to identify appropriate Pre-processing techniques for kidney images before extracting kidney features. Observing the sensitivity and calculating the PSNR and MSE of the filtered image are used to assess the applied methods. The results indicate that the median filter is ideal for image quality enhancement, while the Sobel filter is highly effective in detecting kidney edges. 2023 IEEE. -
Transforming Pediatric Healthcare with CKD using AI: A Systematic Mapping
Artificial intelligence has been used on a much larger scale, from self-driving cars to biometrics. The daily lifestyle of civilization has changed dramatically due to scientific growth. AI has been pushed to a wide range of applications rather than limited to certain areas and has benefited the health industry, resulting in improved outcomes. Heuristics, support vector machines, artificial neural networks, and natural language processing are some of the AI approaches employed. Kidney diseases and treatment can be challenging, especially when working with youngsters. Children with Chronic Kidney Disease (CKD) experience a wide range of symptoms classified as either transitory or nosologic. Some of its traits influence not only during childhood but also during adulthood in the long run. This study will focus on strategies utilized to identify, predict, and categorize the impacts of pediatric kidney disorders in terms of aetiology, clinical features, and medicines that might assist children in transition to adulthood smoothly. 2023 IEEE. -
The Preservative Technology in the Inventory Model for the Deteriorating Items with Weibull Deterioration Rate
An EOQ model for perishable items is presented in this study. The deterioration rate is controlled by preservative technology. This technology only enhances the life of perishable items. So, retailers invested in this technology to get extra revenue. The Weibull deterioration rate is considered for the ramp type demand. Shortages consider partially backlogged, and discount is provided to loyal customers. The concavity of the profit function is discussed analytically. Numerical examples support the solution procedure; then, Sensitivity analysis is applied to accomplish the most sensitive variable. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.