Browse Items (11855 total)
Sort by:
-
Nine Level Quadra Boost Inverter with Modified Level Shifted Pulse Width Modulation Technique
This research initiatives to introduce a switched capacitor based nine level boost inverter (SC-9LBI) powered by modified level shifted pulse width modulation (PWM) technique. The SC-9LBI equipped with single DC source along with three capacitors and eight controlled switches to develop nine level inverter output voltage. The suggested inverter configuration has the ability of boosting the inverter input voltage into 1:4 ratio. Also, this research involves modified level shifted PWM technique to enhance the quality of inverter output voltage. The effectiveness of the NLMLI is assessed through parameters such as harmonic distortion, peak voltage, and output voltage root mean square value (rms). Simulation studies have been conducted using MATLAB/Simulink to evaluate the proposed inverter's performance. 2024 IEEE. -
A Novel Preprocessing Technique to Aid the Detection of Infected Areas of CT Images in COVID-19 Patients Artificial Intelligence (AI) for Communication Systems
An innovative preprocessing method for discerning infected areas in CT images of COVID-19 is described in this abstract. The methodology being suggested exploits the capabilities of artificial intelligence (AI) to improve disease detection communication systems. By employing sophisticated AI algorithms to preprocess CT images, the method seeks to increase the precision and effectiveness of COVID-19-associated area detection. The incorporation of artificial intelligence (AI) into communication systems facilitates enhanced image analysis, resulting in improved diagnostic capabilities and treatment strategizing. The study's findings demonstrate the potential of preprocessing techniques powered by artificial intelligence in augmenting communication systems with the aim of enhancing healthcare outcomes. 2024 IEEE. -
A Hybrid Evolutionary Deep Learning Model Integrating Multi-Modal Data for Optimizing Ovarian Cancer Diagnosis
This research intends to enhance ovarian cancer detection by the combination of state-of-the-art machine learning algorithms with extensive multi-modal datasets. The Convolutional Neural Network (CNN), K-Nearest Neighbors (KNN), and VGG16 models were thoroughly assessed, displaying remarkable precision, recall, F1 scores, and overall accuracy. Notably, VGG16 emerged as a strong performance with a precision of 0.97, recall of 0.96, F1 score of 0.97, and accuracy reaching 98.65%. The addition of confusion matrices enables a thorough insight on each model's classification performance. Leveraging multiple datasets, spanning CT and MRI scans with demographic and biographical facts, promotes the holistic knowledge of ovarian cancer features. While the suggested Hybrid Evolutionary Deep Learning Model was not deployed in this work, the results underscore the potential for its development in future research. These discoveries signify a huge leap forward in early detection capabilities and individualized treatment techniques for ovarian cancer patients. As technology and medicine combine, this study tracks a road for breakthrough diagnostic approaches, empowering clinicians and encouraging favourable results in the continuing struggle against ovarian cancer. 2024 IEEE. -
Machine Learning's Transformative Role in Human Activity Recognition Analysis
Human action recognition (HAR) is a burgeoning field of computer vision that seeks to automatically understand and classify the intricate movements performed by humans. From the graceful leaps of a ballerina to the decisive strides of a surgeon, HAR aims to decipher the language of motion, unlocking a plethora of potential applications. This abstract delves into the core of HAR, highlighting its key challenges and promising avenues for advancement. We begin by outlining the various modalities used for action recognition, such as RGB videos, depth sensors, and skeletal data, each offering unique perspectives on the human form. Next, we delve into the diverse set of algorithms employed for HAR, ranging from traditional machine learning techniques to the burgeoning realm of deep learning. We explore the strengths and limitations of each approach, emphasizing the crucial role of feature extraction and model selection in achieving accurate recognition. Challenges in Human Action Recognition (HAR), such as intra-class variations, inter-class similarities, and environmental factors. Ongoing efforts include robust feature development and contextual integration. The paper envisions HAR's future impact on healthcare, robotics, video surveillance, and augmented reality, presenting an invitation to explore the transformative world of human action recognition and its potential to enhance our interaction with technology. 2024 IEEE. -
Wideband Compact Two-Element Millimeter Wave MIMO Antenna for Communication Systems
This article presents the wide band two-element MIMO antenna with an I-shaped decoupling structure in the ground plane. It is to enhance the isolation on the MIMO antenna. The dimension is 7.5 17.5 mm2. The measured bandwidth is 2 GHz (22.25-24.25 GHz) with a maximum gain of 4.5 dBi and bidirectional radiation. MIMO antenna satisfies three diversity metrics. 2024 IEEE. -
Theoretical Framework for Integrating IoT and Explainable AI in a Smart Home Intrusion Detection System
Using IoT devices in smart homes brings benefits and security dangers. This study extensively examines various intrusion detection methods within smart home environments. It also suggests a novel hybrid intrusion detection theoretical framework integrating IoT data with Explainable Artificial Intelligence (XAI) approaches. Using information from multiple IoT devices, including motion sensors, door/window sensors, cameras, and temperature sensors, our theoretical framework can create a comprehensive image of the home environment. By effectively detecting new threats, it offers anomaly detection utilizing unsupervised learning approaches to discover potential breaches without tagged data. 2024 IEEE. -
Detecting Deepfake Voices Using a Novel Method for Authenticity Verification in Voice-Based Communication
The widespread use of deepfake technology in recent years has given rise to grave worries about the alteration of audio-visual material. The integrity of voice-based communication is particularly vulnerable to the threat posed by deepfake voice synthesis. The development of cutting-edge methods for the identification of deepfake voices is examined in this paper, which also offers a thorough analysis of current approaches, their advantages, and disadvantages. The research presents a novel method for detecting deepfakes in voice recordings that uses signal processing, machine learning, and audio analysis to separate synthetic voices from authentic voices. By achieving superior accuracy in differentiating between real and deepfake voices, and proposed method supplies a strong barrier against the misuse of voice synthesis technology for malicious purposes, also go over the research some of the possible uses for this technology, like voice authentication system security and social media platform content moderation. The paper's insights will support continued efforts to strengthen the authenticity of voice communication in the digital age and reduce the risks associated with deepfake voice synthesis. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Epilepsy Detection Using Supervised Learning Algorithms
In the current scenario, people are suffering and isolated by themselves by seizure detection and prediction in epilepsy. Also, it is highly essential that it needs to be identified through wearable devices. Researchers discussed this issue and outlined future developments in this field, suggesting that Machine Learning (ML) techniques could radically change how we diagnose and manage patients with epilepsy. However, as data availability has increased, Deep Learning (DL) techniques have become the most cutting-edge approach to adopt and use with wearable devices. On the other hand, large amounts of data are needed to train DL models, making overfitting problematic. DL models are created with open-source toolboxes and Python, allowing researchers to create automated systems and broaden computational accessibility. This work thoroughly overviews deep learning (DL) methods and neuroimaging modalities for automated epileptic seizure identification. It covers several MRI and EEG techniques for epileptic seizure diagnosis and treatment programmes designed to treat these seizures. The study also covers the difficulties in precise detection, the benefits and drawbacks of DL-based strategies, potential DL models and upcoming research in this area. 2024 IEEE. -
Full Reference Image Quality Assessment (FR-IQA) of Pre-processed Structural Magnetic Resonance Images
Deep learning-based Artificial Intelligence algorithms have surpassed human-level performance in many fields including medicine. Specifically in diagnosis using radiology images, deep neural networks empowered AI to excel by educating intricate nonlinear relationships which is a core part of the complicated radiology problems. However, these models require a massive amount of quality data for training. The accuracy of the deep learning model is based on the amount of training data and the quality of the trained data being fed. So, preprocessing the data from different capturing devices is inevitable. This study aimed to highlight some of the image quality metrics that can be used to quantify the efficiency of the chosen preprocessing pipeline. By quantifying the result of each preprocess step, the user can choose an optimal set of preprocesses that can greatly improve the image quality, leading to a high and accurate diagnosis through a deep learning model. Thus, this study detailed how the full reference image quality metrics can be used to validate the performance of sMRI preprocess tasks. 2024 IEEE. -
Durability Studies and Stress Strain Characteristics of hooked end steel fiber reinforced ambient cured geopolymer concrete
For conventional concrete, the use of fibers has proven to improve the strength properties of the material. However, in the case of ambient cured geopolymer concrete, there are limited studies that explore the application of fibers, in particular, the use of hooked end steel fibers. Further, it is important to study the durability properties of geopolymer concrete with fibers, since it will influence the service life of the structures in practice. Therefore, in the present study, fiber-reinforced geopolymer concrete was synthesized using fly ash, GGBS, hooked end steel fibers, and alkaline solution made with Na2SiO3 and NaOH. The percentage of steel fibers varied in the range of 0.5% to 2% with an increment of 0.5% by volume fraction of the binder. The precursor materials were characterized using techniques such as X-ray fluorescence (XRF), X-ray diffraction (XRD), and scanning electron microscope (SEM). Durability studies like water absorption, drying shrinkage, sulphate attack were studied. In addition, the elastic constants were determined through stress strain behaviour of geopolymer concrete in uniaxial compression. The results of the experimental study showed that the addition of hooked end steel fibers influences the strength of geopolymer concrete up to an optimal percentage, which was found to be 1%. Furthermore, in terms of durability properties, the addition of fibers exhibited better results in terms of resistance to water absorption and chemical attack, and this was validated by the microstructural studies, where the specimens with hooked end steel fibers revealed much denser hardened geopolymer matrix when compared to the mixes without fibers. Published under licence by IOP Publishing Ltd. -
English to Hindi Translation System Using Hybrid Techniques
Good communication is critical for overcoming cultural and linguistic divides in today's internationalized society. An essential communication component is the Translation of written materials, primarily academic papers, from one language into another. This abstract focuses on the research involved in translating academic publications from Hindi to English. Translating Hindi academic papers into English is naturally hard due to the significant linguistic and cultural differences between the two languages. The proposed work provided an analytical analysis of various models used in language translation, including the seq-to-seq model, MT5, and LSTM, with the help of BLEU score, Learning rate, and average loss. MT5 model outshines others in terms of an average loss of 4.75; meanwhile, LSTM has an average loss of 5.56, and the seq-to-seq model has an average loss of 6.09, implying weaker Translation. 2024 IEEE. -
Integrated Automated Attendance System with RFID, Wi-Fi, and Visual Recognition Technology for Enhanced Classroom Security and Precise Monitoring
The integrated automated smart attendance system utilizes RFID, Wi-Fi, and visual recognition technologies to elevate classroom security and ensure precise monitoring of attendance records. It consolidates cutting-edge components such as RFID tags, ESP8266 Wi-Fi modules, ESP-32 CAM modules, solenoid locks, servo motors, and PIR sensors to devise a strong remedy. RFID technology enables accurate attendance tracking by assigning tags to students and faculty members. The Wi-Fi and visual recognition components enhance the system's functionalities, facilitating wireless connectivity, instantaneous data transfer, and validation of identities. Solenoid locks and servo motors ensure controlled access, responding to validated attendance records. PIR sensors detect motion, contrasting between genuine presence and proximity. The paper's methodology delineates the necessary hardware and software requirements, procedures for system initialization, testing phases, establishment of server connectivity, implementation of access control mechanisms, and formulation of end-of-session protocols. It highlights the successful integration and validation of hardware components, backend connectivity, identity confirmation, attendance recording, data encryption, and session termination procedures. The research aims to modernize attendance tracking in educational settings, improving efficiency, accuracy, and security while appreciating the need for further adaptation to suit diverse educational environments for broader adoption and sustained advancement. 2024 IEEE. -
Cached-N-Proxy: An Intelligent Proxy Algorithm for Preventing Insider Email Threats to Mail Servers
Insider threats are serious security risks that come from people who work for or are contracted by an organization, such as partners, employees, or contractors. These people use their authorized access to commit hostile acts against the infrastructure, data, or assets of the company. Serious ramifications could result from these dangers, such as financial losses, reputational harm, data breaches, and possible threats to national security. Enterprises must strengthen their defenses with strong intrusion detection and prevention systems because of the growing attack surface for insider threats caused by the increasing adoption of digital technology and remote work habits. Organizations must use a combination of preventive strategies and detection mechanisms, such as privileged access management (PAM), role-based access control, data loss prevention (DLP) techniques, two-factor authentication, and thorough insider threat awareness training, to effectively combat insider threats. 2024 IEEE. -
Predicting Song Popularity Using Data Analysis
In today's music landscape, predicting a song's success is crucial for musicians, record labels, and streaming platforms. This paper introduces a methodology for estimating popularity using Spotify data, termed the 'Proxy Popularity Score.' Three models - Random Forest, LightGBM Regressor, and XGBoost Regressor - are utilized for prediction. Performance metrics including mean absolute error, mean squared error, root mean squared error, and R-squared error are employed to evaluate model accuracy. Correlation values of 99.85%, 99.87%, and 99.84% are achieved for XGBoost, LightGBM, and Random Forest respectively. The study concludes with a ranking of songs based on predicted popularity scores. 2024 IEEE. -
Blockchain-Enabled Smart Contracts in Agriculture: Enhancing Trust and Efficiency
This study explores the important role of blockchain technology in the transformation of agriculture and presents a new way to integrate chatbots and smart contracts to solve the problem of persistence. Leverage the decentralized structure and security of the blockchain to increase traceability, transparency and fairness in agricultural product prices. A user-friendly chatbot built in Python using Tkinter that acts as a bridge between farmers and the Ethereum-based blockchain pricing algorithm. Smart contracts used in Solidity dynamically adjust crop prices based on the weather in real time, making it possible for prices to react and adjust. Simulations and tests in Ganache validate the proposed method, confirming its economic value and effectiveness in many agricultural cultures. This study delves into analytics, including latency and production time, to demonstrate the benefits of the blockchain model in creating transparent, farmer-centric and region-specific crop prices. The importance of this research is to support continuous change in agricultural technology, paving the way for the introduction of appropriate and fair prices. According to the amendment, the integration of advanced machine learning, further integration and collaboration with agricultural stakeholders should be developed in the future. This work sets a good path for agriculture, promoting transparency, fairness and quick access to the best crop prices, thus ensuring security and agricultural technology. 2024 IEEE. -
Deep Insights into 3D Face Reconstruction from Blurred 2D Inputs: A Comprehensive Framework
This framework outlines a multi-stage methodology for 3D face reconstruction driven by advancements in deep learning. The process involves image preprocessing with deblurring techniques and subsequent feature extraction using CNNs alongside traditional methods. Deep learning adapts to diverse image challenges, ensuring accuracy in 3D reconstructions. In medical imaging, the proficiency of 3D CNNs and GANs shines in extracting structures from MRI and CT scans. Post-processing steps encompass mesh smoothing and texture mapping for enhanced visual quality. Evaluation metrics (MAE, RMSE, IoU) guarantee the precision of depth estimations. Applications of deep learning span across CNNs, 3DMM, GANs, and networks for landmark detection and dense correspondence. Challenges include optimizing eye reconstruction, expanding applications, and addressing concerns related to data quality, privacy, and hardware requirements. 2024 IEEE. -
A Feature Selection Study on the Bot-IoT Dataset Using Ensemble Classification Techniques
IoT is an emerging giant in the field of technol- ogy, taking over traditional systems, providing interconnected- ness, convenience, efficiency, and automation, making our lives unimaginably better. However, security for these IoT systems is challenging, especially due to their interconnectedness, making them vulnerable to various cyber threats. The rising tide of IoT botnets, especially, presents a unique challenge. This has urgently increased the need for Intrusion Detection research. Modern Intrusion Detection approaches often employ Machine Learning for effective results. Feature Selection is extremely important while creating Machine Learning Classification models to avoid overfitting and poor performance. This paper focuses on running a Feature Selection study on the Bot-IoT dataset provided by UNSW to increase the accuracy of a ML model. The paper tests 5 types of Feature Selection methods, from Filter- based, Wrapper-based and Embedded methods, combined with two distinct ensemble classifiers: Random Forest + Adaboost and XGBoost. Each combination is tested with the dataset, and the accuracy is compared to find the most effective and versatile feature selection method that can assist both Stacking and Voting- type Ensemble classifiers. The results show that Karl Pearson can provide the best accuracy when applied to both Ensemble Classifiers. 2024 IEEE. -
Detection of DoS Attacks Using Machine Learning Based Intrusion Detection System
Conventional intrusion detection systems are not always sufficient due to the increasing sophistication and frequency of Denial-of-Service (DoS) attacks. This work presents a novel solution to this problem by leveraging machine learning techniques to increase the precision and efficacy of real-time intrusion detection. The system keeps a careful eye on network traffic patterns, looking for any irregularities that would point to a denial-of-service attack. An Intrusion Detection System (IDS) that utilizes machine learning technologies - specifically, neural networks and support vector machines - allows for real-time adaptation to new attack patterns. A combination of rigorous simulations and real-world testing provides empirical support for the IDS's quick detection and mitigation of DoS threats. This initiative makes a major contribution to the development of cybersecurity defenses. 2024 IEEE. -
A Hybrid Approach for Predictive Maintenance Monitoring of Aircraft Engines
The realm of aircraft maintenance involves predictive maintenance, which utilizes historical data and machine parts' performance to anticipate the need for maintenance activities. The primary focus of this paper is to delve into the application of predictive maintenance of aircraft gas turbine engines. Our methodology involves assigning a randomly chosen deterioration value and monitoring the change in flow and efficiency over time. By carefully analyzing these factors, we can deduce whether the engines are at fault and whether their condition will deteriorate further. The ultimate objective is to identify potential engine malfunctions early to prevent future accidents. Recent years have witnessed the emergence of multiple machine learning and deep learning algorithms to predict the Remaining Useful Life (RUL) of engines. The precision and accuracy of these algorithms in assessing the performance of aircraft engines are pretty promising. We have incorporated a hybrid model on various time series cycles to enhance their efficacy further. Employing data collected from 21 sensors, we can predict the remaining useful life of the turbine engines with greater precision and accuracy. 2024 IEEE. -
Delay Minimization Technique to improve the efficiency of Parameter Optimized Hysteretic Current Controlled Parallel Hybrid ETPA in Mobile Communication
This paper proposes a delay minimization technique to improve the efficiency of a parameter-optimized hysteretic current-controlled parallel hybrid envelope tracking power amplifier (etpa). In a hysteretic current-controlled hybrid topology, a linear amplifier operates parallel with a hysteretic current-controlled switching converter. Block level simulation of etpa is performed using the simulink tool. The traditional parameter optimization technique is first implemented, and its limitation is analysed. The proposed delay minimization technique helps to overcome the limitation of the traditional approach and has been proven to be valid for any input frequency. The proposed technique offers an efficiency improvement of 14.9% compared to the traditional technique for an input frequency of 20mhz and provides an average efficiency improvement of 6.26% for an input frequency range of 2mhz to 60mhz. 2024 IEEE.