Browse Items (11855 total)
Sort by:
-
Innovative Method for Detecting Liver Cancer using Auto Encoder and Single Feed Forward Neural Network
Liver cancer ranks sixth among all cancers in frequency of incidence. A CT scan is the gold standard for diagnosis. These days, CT scan images of the liver and its tumor can be segmented using deep learning and Neural Network techniques. In this proposed approach to identifying cancer cells, it's focus on four important areas: To enhance a photo by taking out imperfections and unwanted details. An ostu method is used for this purpose. Specifically, this proposed approach to use the watershed segmentation technique for image segmentation, followed by feature extraction, in an effort to isolate the offending cancer cell. After finishing the model training with AE-ELM. To do this, Extreme Learning Machine incorporates an auto encoder. To achieve effective and supervised recognition, the network's strengths of Extreme Learning Machine (ELM) are thoroughly leveraged, including its few training parameters, quick learning speed, and robust generalization ability. The auto encoder-extreme learning machine (AE-ELM) network has been shown to have a respectable recognition impact when the sigmoid activation function is used and the number of hidden layer neurons is set to 1200. According to the results of this investigation, a method based on AE-ELM can be utilized to detect the liver tumor. As compared to the CNN and ELM models, this technique achieves superior accuracy (around 99.23%). 2023 IEEE. -
Weighted Mask Recurrent-Convolutional Neural Network based Plant Disease Detection using Leaf Images
Large losses in output, money, and quality/quantity of agricultural goods are incurred due to plant diseases. Seventy percent of India's GDP is tied to the agricultural sector, thus protecting plants from diseases is crucial. For this reason, it is important to keep an eye on plants from the moment they sprout. The usual approach for this omission is naked eye inspection, which is more time-consuming, costly, and requires significant skill. Thus, automating the method for detecting diseases is necessary to speed up this process. It is imperative that image processing methods be used in the creation of the illness detection system. Disease detection involves a number of processes, including Weighted Mask R-CNN, GLCM feature extraction, Multi-thresholding image pre-processing, and K means image segmentation classification. The weighted Mask R-CNN outperforms the standard RNN, the Mask R-CNN, and the CNN in terms of accuracy and recall in analytical trials by a significant margin. 2023 IEEE. -
Maximum Decision Support Regression-Based Advance Secure Data Encrypt Transmission for Healthcare Data Sharing in the Cloud Computing
The recent growth of cloud computing has led to most companies storing their data in the cloud and sharing it efficiently with authorized users. Health care is one of the initiatives to adopt cloud computing for services. Both patients and healthcare providers need to have access to patient health information. Healthcare data must be shared and maintained more securely. While transmitting health data from sender to receiver through intermediate nodes, intruders can create falsified data at intermediate nodes. Therefore, security is a primary concern when sharing sensitive medical data. It is thus challenging to share sensitive data in the cloud because of limitations in resource availability and concerns about data privacy. Healthcare records struggle to meet the needs of security, privacy, and other regulatory constraints. To address these difficulties, this novel proposes a machine learning-based Maximum Decision Support Regression (MDSR)-based Advanced Secure Data Encrypt Transmission (ASDET) approach for efficient data communication in cloud storage. Initially, the proposed method analyzed the node's trust, energy, delay, and mobility using Node Efficiency Hit Rate (NEHR) method. Then identify the efficient route using an Efficient Spider Optimization Scheme (ESOS) for healthcare data sharing. After that, MDSR analyzes the malicious node for efficient data transmission in the cloud. The proposed Advanced Secure Data Encrypt Transmission (ASDET) algorithm is used to encrypt the data. ASDET achieved 92% in security performance. The proposed simulation result produces better performance compared with PPDT and FAHP methods. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Secure IBS Scheme for Vehicular Ad Hoc Networks
Vehicular Ad hoc Networks (VANET) havedrastically grown in recent years since they provide a better and more secure driving experience. Due to its characteristics, it is vulnerable to many security attacks. Even though many authentication schemes are proposed, their overheads are high. Hence, this study proposes a new Identity-Based Signature (IBS) for authentication with privacy-preservation. It supports secure communications with additional security features. It requires less overhead since it uses XOR operations and one-way hash functions for the signing and verification process. When the proposed schemes performance is compared to the recent schemes, it is observed that the proposed approach is more efficient in computation and communication. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
PMFRO: Personalized Mens Fashion Recommendation Using Dynamic Ontological Models
There is a thriving need for an expert intelligent system for recommending fashion especially focusing on mens fashion. As it is an area which is neglected both in terms of fashion and modelling intelligent systems. So, in this paper the PMFRO framework for mens recommendation has been put forth which indicates the semantic similarity schemes with auxiliary knowledge and machine intelligence in a very systematic manner. The framework intelligently creates mapping of the preprocessed preferences and the user records and clicks with that of the items in the profile. So, this model aggregates community user profiles and also maps the mens fashion ontology using strategic semantic similarity schemes. Semantic similarity is evaluated using Lesk similarity and NPMI measures at several stages and instances with differential set thresholds and the dataset is classified using the feature control, machine learning bagging classifier which is an ensemble model in order to recommend the mens fashion. The PMFRO framework is an intelligent amalgamation and integration of auxiliary knowledge, strategic knowledge, user profile preferences as well as machine learning paradigms and semantic similarity models for recommending mens fashion and overall precision of 94.68% and FDR of 0.06 was achieved using the PMFRO model. 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Machine Learning Methods for Online Education Case
Online education has become a popular choice for learners of all ages and backgrounds due to its accessibility and flexibility. However, providing personalized learning experiences for a diverse range of students in online education can be challenging. Machine learning methods can be used to provide personalized learning experiences and improve student engagement in online education. In this case study, We're going to do some research on machine learning. methods in an online education platform. The platform provides courses in various subjects and is designed to be accessible to students from all over the world. The platform collects data on student behavior, such as the courses they enroll in, the time they spend on each course, and their performance on assignments and quizzes. We will explore several machine learning methods that can be applied to this data, including clustering, classification, and recommendation systems. Clustering algorithms can be used to group students based on their learning behavior and preferences, allowing instructors to provide personalized feedback and course recommendations. Classification algorithms can be used to predict student success in a particular course, allowing instructors to intervene and provide additional support if needed. Recommendation systems can be used to suggest courses to students based on their interests and past behavior. We will also discuss the potential benefits and challenges of using machine learning methods in online education. Benefits include increased student engagement, improved learning outcomes, and more efficient use of resources. Challenges include ensuring data privacy and security, preventing algorithmic bias, and maintaining transparency and fairness in the decision-making process. Overall, machine learning methods have the potential to transform online education by providing personalized learning experiences and improving student outcomes. By leveraging the vast amounts of data generated by online education platforms, we can create more effective and efficient learning experiences that meet the needs of students from diverse backgrounds and learning styles. 2023 IEEE. -
A Framework for Dress Code Monitoring System using Transfer Learning from Pre-Trained YOLOv4 Model
Maintaining a proper dress code in organizations or any environment is very important. It not only imbibes a sense of discipline but also reflects the personality and qualities of people as individuals. To follow this practice, some organizations like educational institutions and a few corporations have made it mandatory for the personnel to maintain proper attire as per their regulations. Manual checks are performed to adhere to the organizations' regulations which becomes tedious and erroneous most of the times. Having an automated system not only saves time but also there is very little scope of mistakes and errors. Taking this into context, the main aim and idea behind the project is to propose a model for detecting the dress code in such workplaces and educational institutions where the attire needs to be regularly monitored. The model detects Business Formals (Blazer, Shirt & Pants) worn by the personnel, for which CNN has been considered, along with YOLOv4, for performing the detection, due to its nature of giving the highest accuracy in comparison to the other object-detection models. Providing the Mean Average Precision of around 81%, it becomes evident that the model performs quite well in performing the detections. 2023 IEEE. -
Lightweight Anti DDoS Security Tool: Edge Level Filtering in SDN using P4
Software Defined Network (SDN) which has a promising future in satellite communication was first introduced as the solution to solve problems existing in the traditional network architecture. So far in SDN, mitigation strategies employed hardware installation or software solution which is heavily dependent on SDN controllers. The disadvantage of these approaches is the a) cost for implementation, b) intensive resource usage, and 3) costly optimization strategy necessary to enhance SDN performance. This research aims to fill the gap of the previously seen defense mechanism by enabling edge-level filtering without involving the control plane. By implementing filtering functions in edge switches, it can provide an efficient and effective defense layer in SDN network systems so that SDN switch can become the first line of defense against packet injection attacks. The proposed solution, Lightweight Anti-DDoS Software (LADS) focuses on lightweight workloads and provisioning of effective filtering mechanism to allow SDN switches to drop and block malicious packets sent by attackers. It utilizes Programming Protocol-independent Packet Processors (P4) programming language to create custom functionalities in SDN switches. P4 allows SDN switches to conduct host authentication and malicious packet filtering as well as blacklisting to isolate attackers. Simulation result proves that LADS efficiently manages malicious activities and maintains network performance during attacks at the data plane independent of SDN controller. 2023 IEEE. -
Simulation of the Electrical Control Unit (ECU) in Automated Electric Vehicles for Reliability and Safety Using On-Board Sensors and Internet of Things
The adaptation of the energy storage system (ESS) with high power and energy density remains a difficulty for electric vehicles (EVs), despite the increasing demand they are experiencing around the world. A lightweight, compact ESS is necessary to deliver the responsive performance and driving range that modern vehicles need. When planning for widespread use of EVs, it's important to give careful attention to the factors of ESS selection, sizing, and administration. One of the most promising future mobility alternatives is the hybrid electric vehicle (HEV), which offers improved fuel economy and lower pollution levels. As a result, one of the most pressing needs is for automakers to develop new technologies for vehicle design that might help lessen emissions and boost economy. The environmental impact of emissions from light-duty cars is growing in tandem with the annual increase in the number of such vehicles on the road. The usage of other modes of transportation, such as ships and planes, is on the rise, but road transportation will always be the most common. Electronic Control Units, or ECUs, have been increasingly commonplace in cars during the past few decades. Vehicle network multicore CPU scheduling is notoriously difficult. This study's findings consist of a straightforward power-sharing control approach for the HESS based on battery and UC, with the goal of extending the battery's useful life in a city environment. 2023 IEEE. -
Exploring Bio Signals for Smart Systems: An Investigation into the Acquisition and Processing Techniques
Bio signals play a vital role in terms of communication in the absence of normal communication. Bio signals were automatically evolved from the body whenever any actions took place. There are lots of different types of bio signal based research going on currently from several researchers. Signal acquisition, processing the signals and segmenting the signal were totally different from one technique to another. Placing electrodes and its standard measurements were varied. The signals gathered from each subject may be varied due to their involvement. Each and every trial of signals can generate different patterns. Each and every pattern generated from the activities also has a different meaning. In this study we planned to analyze the basic measurement techniques handled to record the bio signals like Electrooculogram. 2023 IEEE. -
Optimal Disassembly Sequence Generation Using Tool Information Matrix
Just as the assembly sequence plays an important role in the early part of the product, the disassembly sequence plays an important part in the final stage of the product. The disassembly sequence determines how efficiently the product can be recycled or it can be disassembled for maintenance purposes. In this study, the disassembly sequence is generated using the Tool Information Matrix (TIM) and the contact relations. In this study the feasible sequences are generated using the TIM and contact relations, afterward, the time required is considered as a fitness equation for generating the optimal disassembly sequence. The proposed methodology is applied to 10-part crankshaft assembly to test the performance in generating the optimal disassembly sequences. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Predicting Price Direction of Bitcoin based on Hybrid Model of LSTM and Dense Neural Network Approach
Bitcoin is a rapidly growing but extremely risky cryptocurrency. It marks a watershed moment in the history of cash. These days, digital currency is preferred to actual money. Bitcoin has decentralized authority and placed it in the hands of its users. Many people are joining the largest and most well-known Bitcoin mining pools as the risk of working alone is too great. In order to enhance their chances of creating the next block in the Bitcoins blockchain and decrease the mining reward volatility, users can band together to form Bitcoin pools. This tendency toward consolidation may also be seen in the rise of large-scale mining farms equipped with powerful mining resources and speedy processing capability. Because of the risk of a 51% assault, this pattern shows that Bitcoin's pure, decentralized protocol is moving toward greater centralization in its distribution network. Not to be overlooked is the resulting centralization of the bitcoin network as a result of cloud wallets making it simple for new users to join. Because of the easily hackable nature of Bitcoin technologies, this could lead to a wide range of security vulnerabilities. The proposed approach uses normalization and filling missing values in preprocessing, PCA for feature Extraction and finally training the model using LSTM-DNN Models. The proposed approach outperforms other two models such as CNN and DNN. 2023 IEEE. -
Drought PredictionA Comparative Analysis of Supervised Machine Learning Techniques
Drought is a natural phenomenon that puts many lives at risk. Over the last decades, the suicide rate of farmers in the agriculture sector has increased due to drought. Water shortage affects 40% of the world's population and is not to be taken lightly. Therefore, prediction of drought places a significant role in saving millions of lives on this planet. In this research work, six different supervised machine learning (SML) models namely support vector machine (SVM), K-nearest neighbor (KNN), decision tree (DT), convolutional neural networks (CNNs), long short-term memory (LSTM), and recurrent neural networks (RNNs) are compared and analyzed. Three dimensionality reduction techniques principal component analysis (PCA), linear discriminant analysis (LDA), and random forest (RF) are applied to enhance the performance of the SML models. During the experimental process, it is observed that RNN model yielded better accuracy of 88.97% with 11.26% performance enhancement using RF dimensionality reduction technique. The dataset has been modeled using RNN in such a way that each pattern is reliant on the preceding ones. Despite the greater dataset, the RNN model size did not expand, and the weights are observed to be shared between time steps. RNN also employed its internal memory to process the arbitrary series of inputs, which helped it outperform other SML models. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Efficient Method for Personality Prediction using Hybrid Method of Convolutional Neural Network and LSTM
Users' contributions and the emotions conveyed in status updates may prove invaluable to studies of human behavior and character. A number of other research have taken a similar approach, and the field itself is still growing. The goal of this proposed is to create a technique for deducing a user's personality traits based on their social media profiles. Among the many customer services now available on SNSs are media and recommendations of user involvement. The need to give internet users with more specialized and customized services that meet their specific requirements, which sometimes depend heavily on the users' inner personalities, is significant. However, there hasn't been much work done on the psychological analysis that's needed to deduce the user's inner nature from their outward activities. In this instance, LSTM-CNN was fed pre-processed and vectorized text documents. SNF is used for feature extraction. The proposed method employs CFS for the purpose of Feature Selection. Finally, LSTM-CNN was used to train the model. While CNN is good at extracting features that are independent of time, LSTM is better at capturing long-term dependencies. combination of features for personality prediction, the LSTM-CNN model is superior to the individual models. 2023 IEEE. -
X-Tract: Framework for Flexible Extraction of Features in Chest Radiographs for Disease Diagnosis Using Machine Learning
Various types of medical images are used as diagnostic tools for identifying pathologies in human bodies, and in this research, chest X-ray images are used as diagnostic tools. Several pre-built models are created by the participants of ImageNet competitions for non-medical images, and these models are also being used in medical image classification; for example, Khan et al. (Comput Methods Prog Biomed 196:105581, 2020) developed a model called Coronet and Narayan Das et al. (IRBM 1:16, 2020) proposed a deep transfer learning-based model. Instead of using the pre-built models, a different approach was taken to address this problem. A framework was created to extract the frequency and spatial domain-based features, along with the raw statistics of the images. The model proposed in this article using the SVM algorithm has reached accuracy levels ranging from 91% to 97% and sensitivity of 92% to 96% on various samples of test data of over 400 images. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Performance Analysis of Nonlinear Companding Techniques for PAPR Mitigation in 5G GFDM Systems
Generalized Frequency Division Multiplexing (GFDM) is a 5G waveform contender that offers asynchronous and non-orthogonal data transmission, featuring several advantages, some of them being low latency, reduced out-of-band (OOB) radiation and low adjacent channel leakage ratio. GFDM is a non-orthogonal multicarrier waveform which enables data transmission on a time frequency grid. However, like orthogonal frequency division multiplexing and many other multicarrier systems, high peak-to-average power ratio (PAPR) is one of the main problems in GFDM, which degrades the high-power amplifier (HPA) efficiency and distorts the transmitted signal, thereby affecting the bit error rate (BER) performance of the system. Hence, PAPR reduction is essential for improved system performance and enhanced efficiency. Nonlinear companding techniques are known to be one of the effective low complexity PAPR reduction techniques for multicarrier systems. In this paper, a GFDM system is evaluated using mu law companding, root companding and exponential companding techniques for efficient PAPR reduction. The PAPR and BER graphs are used to evaluate the proposed methods in the presence of an HPA. Simulations show that, out of these three techniques, exponential companding was found to provide a trade-off between the PAPR reduction and BER performance. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Impact of Perceived Social Support on Patient Empowerment: A Study of Online Patient Support Groups
Disease-specific online patient support groups have emerged predominantly in last 30years, and these are being visited by a large number of patents. These platforms obviously bring important benefits to the patients visiting them. An important variable is the perceived social support that patients feel they derive while interacting with healthcare providers and fellow patients over there. Patient empowerment is another variable, and which has been found to be a critical factor in overall well-being of patients. How does the perceived social support felt by patients visiting an online patient support group impact their perceived empowerment? This paper explores this question. Research design is associative, and for which the data has been procured online from the patients visiting online patient support groups. The questionnaire comprises of an independent variable (perceived social support) and a dependent variable (patient empowerment). Validated scales have been used. For analysis, a factor analysis was undertaken to reconfirm the validity of the scales. Thereafter, regression equation has been developed to measure the impact. Results show that the model obtained passes the fitness and the independent variable has a significant positive association with patient empowerment. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
A Systematic Review on the Identification and Classification of Patterns in Microservices
Determining patterns in monolithic systems to help improve the overall system development and maintenance has become quite commonplace. However, recognizing the patterns that have emerged (or are emerging) in cloud computing - especially with respect to microservices, is challenging. Although numerous patterns have been proposed through extensive research and implementation, the quality assessment tools that are currently available fall short when it comes to accurately recognizing patterns in microservices. It has been identified that a completely autonomous tool for the identification and classification of patterns in microservices has not been developed so far. Moreover, classification of services is an approach that has not been considered by researchers that are working in this field. This paper aims to perform a detailed systematic literature review that can help to explore the various possibilities of identifying and classifying the patterns in microservices. The article also briefly lists out a set of tools that is used in the industry for the implementation of patterns in microservices. 2023 IEEE. -
Advancements in Electronic Healthcare: A Bibliometric Analysis
Electronic healthcare has changed the traditional form of medical treatment. The integrated approach of interconnected devices had enhanced the process of record keeping and dissemination, benefitting Doctors, patients, and other stakeholders. This study aims to highlight the research carried out in the field of electronic healthcare from the year 2011 to 2020. Metadata of 821 publications from Scopus database was extracted and analyzed. VOS viewer was used to generate the network diagrams and link strengths. It was found that Harvard Medical School and European Commission were the top publication affiliation and funder, respectively. United Stated dominated with the maximum number of publications till 2017 but was surpassed by publications from India from 2018 onwards. Publications inclined toward Internet of things, network security, retrospective study, and authentication toward the end of this decade indicating the shift in trend for the future. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Whale Optimization Based Approach toCompress andFasten CNN forCrop Disease andSpecies Identification
In recent years deep learning and machine learning have been widely researched for image based recognition. This research proposes a simplified CNN with 3 layers for classification from 39 classes of crops and their diseases. It also evaluates the performance of pre-trained models such as VGG16 and ResNet50 using transfer learning. Similarly traditional Machine Learning algorithms have been trained and tested on the same dataset. The best accuracy using proposed CNN was 87.67% whereas VGG16 gave best accuracy of 91.51% among Convolution Neural Network models. Similarly Random Forest machine learning method gave best accuracy of 93.02% among Machine Learning models. Since the pre-trained models are having huge size hence in order to deploy these solutions on tiny edge devices compression is done using Whale Optimization. The maximum compesssion was obtained with VGG16 of 88.19% without loss in any performance. It also helped betterment of inference time of 44.13% for proposed CNN, 56.76% for VGG16 and 63.23% for ResNet50. 2023, Springer Nature Switzerland AG.