Browse Items (11810 total)
Sort by:
-
Imposter detection with canvas and WebGL using Machine learning.
Authentication offers a way to confirm the legitimacy of a user attempting to access any protected information that is hosted on the web as organizations are moving their applications online. It has long been believed that IP addresses and Cookies are the most reliable digital fingerprints used to authenticate and track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users. There are many new reliable digital fingerprints that can be used such as canvas and WebGL. The canvas and WebGL render the image which is dependent on the software and hardware of the system. In our work with the generated hash value value from canvas and WebGL we create a model using KNN to identify the imposters. The model has proved to be accurate in authentication of user with an accuracy of 89%. 2023 IEEE. -
Imprint of Fertiliser Policies on Farming Practices Evidence from the Top Five Consuming States
The policies related to the use of nitrogen fertilisers since independence are reviewed using primary and secondary databases to derive the present status of nitrogen, phosphorus, and potassium fertiliser use among farmers. Recommendations for increasing nitrogen use efficiency in agriculture for sustainability are provided. 2023 Economic and Political Weekly. All rights reserved. -
Improved Acceptance model: Unblocking Potential of Blockchain in Banking Space
Over the past ten years, blockchain has emerged as the new buzzword in the banking sector.The new technology is being adopted globally in many industries, including the business sector,because of its unique uses and features. However, no adoption model is available to help with this process.This research paper examines the new technology known as blockchain, which powers cryptocurrencies like Bitcoin and others. It looks at what blockchain technology is, how it works especially in the banking sector, and how it can change and upend the financial services sector. It outlines the features of the technology and discusses why these can have a significant effect on the financial industry as a whole in areas like identity services, payments, and settlements in addition to spawning new products based on things like 'smart contracts'. The adoption variables found in the literature study were used to gather, test, and evaluate the official papers that are currently available from regulatory organizations, practitioners, and research bodies. This study was able to classify adoption factors into three categories - supporting, impeding, and circumstantial - identify a new adoption factor, and determine the relative relevance of the factors. Consequently, an institutional adoption paradigm for blockchain technology in the banking sector is put out. In light of this, it is advised to conduct additional research on using the suggested model at banks using the new technology in order to assess its suitability. 2024 IEEE. -
Improved Bald Eagle Search for Optimal Allocation of D-STATCOM in Modern Electrical Distribution Networks with Emerging Loads
Currently, modern electrical distribution networks (EDNs) are experiencing high demand with emerging electric vehicle loads and are being planned for specific load requirements such as agricultural loads. In this connection, characterization and optimization of their performance become essential in planning studies. In this paper, optimal reactive power compensation using a distribution-static synchronous compensator (D-STATCOM) is proposed with the aim of loss reduction, voltage profile improvement and voltage stability enhancement different types of loads including agricultural and electric vehicle loads. A recent efficient meta-heuristic approach, improved bald eagle search (IBES), is implemented for solving the proposed optimization problem considering different operational and planning constraints. The simulation results are performed on IEEE 33-bus for different types of load modelling. The computational efficiency of IBES is compared with basic BES and other literature works. From the results, IBES has shown superior computational characteristics than all compared works. On the other hand, the optimal location and size of D-STATCOM caused significant loss reduction, voltage profile improvement and voltage stability enhancement for kinds of loads as experiencing in the modern EDNs 2022,International Journal of Intelligent Engineering and Systems.All Rights Reserved -
Improved Collaborative Filtering using Evolutionary Algorithm based Feature Extraction
International Journal of Computer Applications Vol.64,No.20, pp.20-26 ISSN No. 0975-8887 -
Improved Computer Vision-based Framework for Electronic Toll Collection
The world is moving towards artificial intelligence and automation because time is the most crucial asset in today's scenario. This paper proposes an automatic vehicle fingerprinting system that avoids long waiting times in toll plazas with the help of computer vision. The number plate recognition and vehicle re-identification focus on this research. Day/night IR cameras are used to get the images of the vehicle and its number plate. The VeRi776 datum, which contains real-world vehicle images, is used to facilitate the research of vehicle re-identification. The proposed framework employs Siamese model architecture to identify the attributes such as color, model, and type of vehicle. The Car License Plate Detection datum is used to evaluate the efficiency of the proposed license plate recognition system. An ensemble of image localization techniques using CNNs and application of the OCR model on the localized snapshot is used to recognize the vehicle's license plate. A combination of license plate recognition and vehicle re-identification techniques is used in the proposed framework to improve the efficiency of identifying vehicles in toll plazas 2022 IEEE. -
Improved Crypto Algorithm for High-Speed Internet of Things (IoT) Applications
Modern technologies focus on integrated systems based on the Internet of Things (IoT). IoT based devices are unified with various levels of high-speed internet communication, computation process, secure authentication and privacy policies. One of the significant demands of present IoT is focused on its secure high-speed communication. However, traditional authentication and secure communication find it very difficult to manage the current need for IoT applications. Therefore, the need for such a reliable high-speed IoT scheme must be addressed. This proposed title introduces an enhanced version of the Rijndael Cryptographic Algorithm (Advanced Encryption Standard AES) to obtain fast-speed IoT-based application transmission. Pipeline-based AES technique promises for the high-speed crypto process, and this secure algorithm targeted to fast-speed Field Programmable Gate Array (FPGA) hardware. Thus, high-speed AES crypto algorithms, along with FPGA hardware, will improve the efficiency of future IoT design. Our proposed method also shows the tradeoff between High-Speed communications along with various FPGA platforms. 2020, Springer Nature Switzerland AG. -
Improved Deep Learning Model for Detection and Classification of Pneumonia from X-Ray Images
Pneumonia is a severe respiratory disease that can lead to inflammation, fluid accumulation in lungs and breathing difficulties, which needs immediate and accurate diagnosis. Chest X-Ray images are a necessary tool to diagnose pneumonia because manual interpretation poses challenges, particularly for radiologists with less expertise. Artificial intelligence (AI), specifically Convolutional Neural Networks (CNNs), has become a significant in the field of pneumonia detection within chest X-Ray images in recent years. This research presents SarNet, a neural network model developed for the identification of pneumonia in chest X-Ray images. The study involved the compilation of dataset containing chest X-Ray images categorized as normal, pneumonia, and COVID-19 pneumonia cases, each accompanied by appropriate annotations. This dataset was employed as the basis for training and assessing SarNet's performance, underscoring its promise in transforming the diagnosis of pneumonia. SarNet proved highly effective, achieving good accuracy, sensitivity, and specificity compared to traditional diagnostic methods. The model's simplicity, with 41 layers, strikes a balance between depth and computational complexity, enhancing efficiency and ensuring accurate pneumonia detection. Furthermore, the study expanded its scope to include COVID-19 pneumonia detection. SarNet achieved an accuracy of 99.15% in binary classification and 94.9% in multiclass classification, including healthy, pneumonia, and COVID-19 pneumonia cases. -
Improved dhoa-fuzzy based load scheduling in iot cloud environment
Internet of things (IoT) has been significantly raised owing to the development of broadband access network, machine learning (ML), big data analytics (BDA), cloud computing (CC), and so on. The development of IoT technologies has resulted in a massive quantity of data due to the existence of several people linking through distinct physical components, indicating the status of the CC environment. In the IoT, load scheduling is realistic technique in distinct data center to guarantee the network suitability by falling the computer hardware and software catastrophe and with right utilize of resource. The ideal load balancer improves many factors of Quality of Service (QoS) like resource performance, scalability, response time, error tolerance, and efficiency. The scholar is assumed as load scheduling a vital problem in IoT environment. There are many techniques accessible to load scheduling in IoT environments.With this motivation, this paper presents an improved deer hunting optimization algorithm with Type II fuzzy logic (IDHOA-T2F) model for load scheduling in IoT environment. The goal of the IDHOA-T2F is to diminish the energy utilization of integrated circuit of IoT node and enhance the load scheduling in IoT environments. The IDHOA technique is derived by integrating the concepts of Nelder Mead (NM) with the DHOA. The proposed model also synthesized the T2L based on fuzzy logic (FL) systems to counterbalance the load distribution. The proposed model finds useful to improve the efficiency of IoT system. For validating the enhanced load scheduling performance of the IDHOA-T2F technique, a series of simulations take place to highlight the improved performance. The experimental outcomes demonstrate the capable outcome of the IDHOA-T2F technique over the recent techniques. 2022 Tech Science Press. All rights reserved. -
Improved diabetes disease prediction IWFO model using machine learning algorithms
Diabetic disease is the mostly affected and massive disease on a global level. Diagnosing the diabetic earlier will help the medicalist to give the improved and latest clinical treatment. The healthcare specialist unit uses many machine learning techniques, methodologies and tools for decision making in diabetic field. The machine learning techniques are utilized for the prediction of the diabetic diseases in the initial level. To eliminate such issues, optimized detection techniques are proposed. First of all, the training samples are increased using the sliding window protocol. Further, class imbalanced training data classes are balanced and resolved using the adaptive and gradient booster technique. Further, the diabetic feature selection process is improved by the Intensity Weighted Firefly Optimization firefly techniques (IWFO), in which irrelevant features are reduced based on the correlation between the features that deducts the unwanted features involved in the diabetic disease process. Then the feature transformation problem is faced by the PCA technique, which manages the several types of features. Finally, the improved and optimal hybrid random forest is applied into the normal and diabetes classes respectively. The proposed system predicts the diabetic disease efficiently and maximizes its precision of the prediction system. The present paper is compared with different classifiers to determine the efficiency of the work. Overall, the initiated system improved the present studies accuracy level. 2024 Author(s). -
Improved dragonfly optimizer for intrusion detection using deep clustering CNN-PSO classifier
With the rapid growth of internet based services and the data generated on these services are attracted by the attackers to intrude the networking services and information. Based on the characteristics of these intruders, many researchers attempted to aim to detect the intrusion with the help of automating process. Since, the large volume of data is generated and transferred through network, the security and performance are remained an issue. IDS (Intrusion Detection System) was developed to detect and prevent the intruders and secure the network systems. The performance and loss are still an issue because of the features space grows while detecting the intruders. In this paper, deep clustering based CNN have been used to detect the intruders with the help of Meta heuristic algorithms for feature selection and preprocessing. The proposed system includes three phases such as preprocessing, feature selection and classification. In the first phase, KDD dataset is preprocessed by using Binning normalization and Eigen-PCA based discretization method. In second phase, feature selection is performed by using Information Gain based Dragonfly Optimizer (IGDFO). Finally, Deep clustering based Convolutional Neural Network (CCNN) classifier optimized with Particle Swarm Optimization (PSO) identifies intrusion attacks efficiently. The clustering loss and network loss can be reduced with the optimization algorithm. We evaluate the proposed IDS model with the NSL-KDD dataset in terms of evaluation metrics. The experimental results show that proposed system achieves better performance compared with the existing system in terms of accuracy, precision, recall, f-measure and false detection rate. 2022 Tech Science Press. All rights reserved. -
Improved Feature Selection Method for the Identification of Soil Images Using Oscillating Spider Monkey Optimization
Precision agriculture is the process that uses information and communication technology for farming and cultivation to improve overall productivity, efficient utilization of resources. Soil prediction is one of the primary phases in precision agriculture, resulting in good quality crops. In general, farmers perform the soil prediction manually. However, the efficiency of soil prediction may be enhanced by using current digital technologies. One effective way to automate soil prediction is image processing techniques in which soil images may be analyzed to determine the soil. This paper presents an efficient image analysis technique to predict the soil. For the same, a robust feature selection technique has been incorporated in the image analysis of soil images. The developed feature selection technique uses a new oscillating spider monkey optimization algorithm (OSMO) for the selection of features that are relevant and non-redundant. The new oscillating spider monkey optimization algorithm increases precision and convergence behavior by using an oscillating perturbation rate. A set of standard benchmark functions was deployed to visualize the performance of the new optimization technique (OSMO), and results were compared based on mean and standard deviation. Furthermore, the soil prediction approach is validated on a soil dataset, having seven categories. The proposed feature selection method selects the 41% relevant features, which provide the highest accuracy of 82.25% with 2.85% increase. 2013 IEEE. -
Improved File Security System Using Multiple Image Steganography
Steganography is the process of hiding a secret message within an ordinary message extracting it at its destination. Image steganography is one of the most common and secure forms of steganography available today. Traditional steganography techniques use a single cover image to embed the secret data which has few security shortcomings. Therefore, batch steganography has been adopted which stores data on multiple images. In this paper, a novel approach is proposed for slicing the secret data and storing it on multiple cover images. In addition, retrieval of this secret data from the cover images on the destination side has also been discussed. The data slicing ensures secure transmission of the vital data making it merely impossible for the intruder to decrypt the data without the encrypting details. 2019 IEEE. -
Improved Henon Chaotic Map-based Progressive Block-based visual cryptography strategy for securing sensitive data in a cloud EHR system
The core objective of secret sharing concentrates on developing a novel technique that prevents the destruction and leakage of original data during the distribution and encoding processes. Progressive Visual Cryptography (VC) is considered for the potential over the traditional VC schemes since the former does not require and does not suffer from the limitations of requiring a minimum number of participants during the process of encryption and sharing. The chaotic map-based Progressive VC is superior in facilitating predominant secrecy under sharing and encryption. In this paper, an Improved Henon Chaotic Map-based Progressive Block-based VC (IHCMPBVC) scheme is proposed to prevent the leakage and destruction of sensitive information during an exchange and encryption. This proposed IHCMPBVC technique uses the merits of Henon and Lorentz maps for effective encryption since it introduces the option of deriving non-linear behavior that results in sequence generation that covers the complete range with proper distribution in order to minimize the degree of leaks in sharing. The simulation results of the proposed IHCMPBVC technique investigated using entropy, PSNR, and Mean Square Error were improved at an average rate of 27%, 23%, and 31%, predominant to the baseline VC approaches considered in the comparison. 2022 The Authors -
Improved image denoising with the integrated model of Gaussian filter and neighshrink SURE
Image denoising, being an important preprocessing stage in image processing, minimizes the noise interfering with the information content of the image. The denoising problems are addressed by various techniques starting from the Fourier transforms to wavelets. Because of the localized time frequency features and advantages of multi resolution capabilities, the wavelets have been extensively used in the denoising process. The development of algorithms for the wavelet thresholding or shrinkage strategies along with different filters have resulted in the betterment of image quality after the denoising. Even though the image denoising algorithm based on a combination of Gaussian and Bilateral filters, shows good performance but lacks in consistency with respect to the noise levels and also the type of images used. This paper discusses the advantages of NeighShrink SURE rule in developing an effective thresholding strategy, thereby proposing a improved denoising method incorporating the NeighShrink SURE rule along with combination of Gaussian filter model. The methodology employs the use of subband thresholding derived from the NeighShrink SURE rule. The outcome of the proposed method exhibits a comparatively improved performance in Peak Signal to Ratio (PSNR) and Image Quality Index (IQI) values of the test images. BEIESP. -
Improved Photocatalytic Activity of g-C3N4/ZnO: A PotentialDirect Z-Scheme Nanocomposite
In this study, a Z-scheme g-C3N4/ZnO nanocomposite was synthesized using exfoliation process, which was further characterized using XRD, FT-IR, UV-DRS, SEM-EDAX, PL, EIS, and TGA techniques. The properties of g-C3N4 were enhanced when fabricated with ZnO resulting in a better electron mobility, high redox potential, and excellent semiconducting properties. The performance of this heterostructure was evaluated by photocatalytic degradation of malachite green (MG) under visible light irradiation. The g-C3N4/ZnO heterostructure achieved a degradation of 84.3 % within 60 min under visible light irradiation. The degradation reaction follows a pseudo first-order kinetic model with a reaction rate constant of 0.0329 min?1. The nanocomposite demonstrated outstanding stability and recyclability. 2020 Wiley-VCH GmbH -
Improved Random Forest Algorithm for Cognitive Radio Networks' Distributed Channel and Resource Allocation Performance
Modified Random Forest (MRF) machine learning algorithm aimed at improving the distributed channel allocation and resource allocation performance in cognitive radio networks (CRNs). The purpose of this research is to enhance the efficiency and effectiveness of CRNs by optimizing the allocation of channels and resources. The proposed MRF algorithm is developed by adapting and modifying the random forest technique to address the specific challenges of CRN allocation. Experimental evaluations demonstrate that the MRF algorithm achieves higher accuracy and efficiency compared to existing routing techniques and channel allocation algorithms like ACO and PSO. It exhibits a high packet delivery ratio, increased throughput, and reduced delay in channel selection, thus improving the overall performance of CRNs.The implications of this research are twofold. On a theoretical level, this study contributes to the field by extending the capabilities of the random forest algorithm and adapting it to the domain of CRNs. The modified algorithm demonstrates the potential of machine learning techniques in addressing allocation challenges in wireless communication systems. The findings emphasize the importance of advanced algorithms in improving the efficiency and effectiveness of channel and resource allocation processes. 2023, Success Culture Press. All rights reserved. -
Improved reptile search algorithm with sequential assignment routing based false packet forwarding scheme for source location privacy protection on wireless sensor networks
Source Location Privacy (SLP) in Wireless Sensor Networks (WSNs) refers to a set of techniques and strategies used to safeguard the anonymity and confidentiality of the locations of sensor nodes (SNs) that are the source of transmitted data within the network. This protection is important in different WSN application areas like environmental monitoring, surveillance, and healthcare systems, where the revelation of the accurate location of SNs can pose security and privacy risks. Therefore, this study presents metaheuristics with sequential assignment routing based false packet forwarding scheme (MSAR-FPFS) for source location privacy protection (SLPP) on WSN. The contributions of the MSAR-FPFS method revolve around enhancing SLP protection in WSNs through the introduction of dual-routing, SAR technique with phantom nodes (PNs), and an optimization algorithm. In the presented MSAR-FPFS method, PNs are used for the rotation of dummy packets using the SAR technique, which helps to prevent the adversary from original data transmission. Next, the MSAR-FPFS technique uses an improved reptile search algorithm (IRSA) for the optimal selection of routes for real packet transmission. Moreover, the IRSA technique computes a fitness function (FF) comprising three parameters namely residual energy (RE), distance to BS (DBS), and node degree (ND). The experimental evaluation of the MSAR-FPFS system was investigated under different factors and the outputs show the promising achievement of the MSAR-FPFS system compared to other existing models. 2024-IOS Press. All rights reserved. -
Improved Security of the Data Communication in VANET Environment Using ASCII-ECC Algorithm
Now-a-days, with the augmenting accident statistics, the Vehicular Ad-hoc Networks (VANET) are turning out to be more popular, helping in prevention of accidents in addition to damage to the vehicles together with populace. In VANET, message can well be transmitted within a pre-stated region to attain systems safety and also improveits efficacy. Ensuring authenticity of messages is a challenge in such dynamic environment. Though few researchers worked on this, security level is very less. Hence enhanced communicationsecurity on the VANET environment utilizing the American Standard Code for Information Interchange centred Elliptic Curve Cryptography (ASCII-ECC) is proposedin this paper. The network design is definedinitially. Subsequently, the entire vehicles get registered to the Trusted Authority (TA); similarly, all vehicle users areregistered with their On-Board Unit (OBU). This is followed byMedian-centred K-Means (MKM) performs the cluster formation together with Cluster Head Selection (CHS). Next, TA takes care of the verification procedure. Modified Cockroach Swarm Optimization (MCSO) calculates the shortest path and the ASCII-ECC carries out the secure data communication if the vehicle is an authorized one. If not, TA sends the alert message for discarding the request. The system renders better performance when it was weighed against the top-notch methods. 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.