1
|
Yan L, Webber JL, Mehbodniya A, Moorthy B, Sivamani S, Nazir S, Shabaz M. Distributed optimization of heterogeneous UAV cluster PID controller based on machine learning. COMPUTERS & ELECTRICAL ENGINEERING 2022. [DOI: 10.1016/j.compeleceng.2022.108059] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
|
2
|
Tandon A, Guha SK, Rashid J, Kim J, Gahlan M, Shabaz M, Anjum N. Graph based CNN Algorithm to Detect Spammer Activity Over Social Media. IETE JOURNAL OF RESEARCH 2022. [DOI: 10.1080/03772063.2022.2061610] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
|
3
|
Modular unmanned aerial vehicle platform design: Multi-objective evolutionary system method. COMPUTERS & ELECTRICAL ENGINEERING 2022. [DOI: 10.1016/j.compeleceng.2022.107838] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
|
4
|
Murugesan G, Ahmed TI, Shabaz M, Bhola J, Omarov B, Swaminathan R, Sammy F, Sumi SA. Assessment of Mental Workload by Visual Motor Activity among Control Group and Patient Suffering from Depressive Disorder. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:8555489. [PMID: 35401736 PMCID: PMC8989570 DOI: 10.1155/2022/8555489] [Citation(s) in RCA: 7] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/03/2022] [Revised: 03/01/2022] [Accepted: 03/08/2022] [Indexed: 02/07/2023]
Abstract
Major depressive disorder (MDD) is a mood state that is not usually associated with vision problems. Recent research has found that the inhibitory neurotransmitter GABA levels in the occipital brain have dropped. Aim. The aim of the research is to evaluate mental workload by single channel electroencephalogram (EEG) approach through visual-motor activity and comparison of parameter among depressive disorder patient and in control group. Method. Two tests of a visual-motor task similar to reflect drawings were performed in this study to compare the visual information processing of patients with depression to that of a placebo group. The current study looks into the accuracy of monitoring cognitive burden with single-channel portable EEG equipment. Results. The alteration of frontal brain movement in reaction to fluctuations in cognitive burden stages generated through various vasomotor function was examined. By applying a computerised oculomotor activity analogous to reflector image diagram, we found that the complexity of the path to be drawn was more important than the real time required accomplishing the job in determining perceived difficulty in depressive disorder patients. The overall perceived difficulty of the exercise is positively linked with EEG activity measured from the motor cortex region at the start of every experiment test. The average rating for task completion for depression patients and in control group observed and no statistical significance association reported between rating scale and time spent on each trial (p=1.43) for control group while the normalised perceived difficulty rating had 0.512, 0.623, and 0.821 correlations with the length of the pathway, the integer of inclination in the pathway, and the time spent to complete every experiment test, respectively (p < 0.0001) among depression patients. The findings imply that alterations in comparative cognitive burden levels during an oculomotor activity considerably modify frontal EEG spectrum. Conclusion. Patients with depression perceived the optical illusion in the arrays as weaker, resulting in a little bigger disparity than individuals who were not diagnosed with depression. This discovery provided light on the prospect of adopting a user-friendly mobile EEG technology to assess mental workload in everyday life.
Collapse
|
5
|
Mehbodniya A, Webber JL, Neware R, Arslan F, Pamba RV, Shabaz M. Modified Lamport Merkle Digital Signature blockchain framework for authentication of internet of things healthcare data. EXPERT SYSTEMS 2022. [DOI: 10.1111/exsy.12978] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]
|
6
|
A Secure Two-Factor Authentication Framework in Cloud Computing. SECURITY AND COMMUNICATION NETWORKS 2022. [DOI: 10.1155/2022/7540891] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
Abstract
Cloud computing technology has brought tremendous evaluation in the arena of IT (information technology). This technology paves the path of starting business with lowest investment by availing infrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS) pay per uses model. Cloud computing services can be quickly and easily provisioned and discharged with minimum efforts and service provider (SP) relationship. Cloud computing characteristics such as on demand self-service, broad network access, resource pooling, and rapid elasticity lead the demand of computing. Despite these features, this platform is free to security issues and attacks specifically in terms of communication because of unsecure authentication and privacy. However, strong user authentication procedure impedes illegal access to the SP which is the principal requirement for securing cloud computing ecosystem. In this regard, we attempt to propose possible counter measures for the cloud ecosystem. Hence, this paper presented a novel one way hash and nonce-based two-factor secure authentication scheme with traditional user IDs, password, and OTP verification procedure that resist brute force attack, session and account hijacking attack, MITM attacks, and replay attacks.
Collapse
|
7
|
Intrusion Detection System for Industrial Internet of Things Based on Deep Reinforcement Learning. WIRELESS COMMUNICATIONS AND MOBILE COMPUTING 2022. [DOI: 10.1155/2022/9023719] [Citation(s) in RCA: 6] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
Abstract
The Industrial Internet of Things has grown significantly in recent years. While implementing industrial digitalization, automation, and intelligence introduced a slew of cyber risks, the complex and varied industrial Internet of Things environment provided a new attack surface for network attackers. As a result, conventional intrusion detection technology cannot satisfy the network threat discovery requirements in today’s Industrial Internet of Things environment. In this research, the authors have used reinforcement learning rather than supervised and unsupervised learning, because it could very well improve the decision-making ability of the learning process by integrating abstract thinking of complete understanding, using deep knowledge to perform simple and nonlinear transformations of large-scale original input data into higher-level abstract expressions, and using learning algorithm or learning based on feedback signals, in the lack of guiding knowledge, which is based on the trial-and-error learning model, from the interaction with the environment to find the best good solution. In this respect, this article presents a near-end strategy optimization method for the Industrial Internet of Things intrusion detection system based on a deep reinforcement learning algorithm. This method combines deep learning’s observation capability with reinforcement learning’s decision-making capability to enable efficient detection of different kinds of cyberassaults on the Industrial Internet of Things. In this manuscript, the DRL-IDS intrusion detection system is built on a feature selection method based on LightGBM, which efficiently selects the most attractive feature set from industrial Internet of Things data; when paired with deep learning algorithms, it effectively detects intrusions. To begin, the application is based on GBM’s feature selection algorithm, which extracts the most compelling feature set from Industrial Internet of Things data; then, in conjunction with the deep learning algorithm, the hidden layer of the multilayer perception network is used as the shared network structure for the value network and strategic network in the PPO2 algorithm; and finally, the intrusion detection model is constructed using the PPO2 algorithm and ReLU (R). Numerous tests conducted on a publicly available data set of the Industrial Internet of Things demonstrate that the suggested intrusion detection system detects 99 percent of different kinds of network assaults on the Industrial Internet of Things. Additionally, the accuracy rate is 0.9%. The accuracy, precision, recall rate, F1 score, and other performance indicators are superior to those of the existing intrusion detection system, which is based on deep learning models such as LSTM, CNN, and RNN, as well as deep reinforcement learning models such as DDQN and DQN.
Collapse
|
8
|
Research on digital media animation control technology based on recurrent neural network using speech technology. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT 2022. [DOI: 10.1007/s13198-021-01540-x] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
|
9
|
Abstract
The history of data stored can be used to forecast potential patterns and help companies make competitive decisions to increase their success and benefits. Many analysts look at healthcare sector data to identify and forecast illnesses in order to benefit patients and physicians in a variety of ways. This study is concerned with the diagnosis and estimation of heart disease. Heart disease is one of the most dangerous illnesses for humans, leading to death all over the world. Many different groups of researchers have used knowledge exploration methods in diverse fields to forecast heart disease and have shown acceptable degrees of precision. There were no real-time methods for analyzing and forecasting heart disease in its early stages. For the prediction of heart disease, decision trees are used to analyze various training and evaluation datasets. Classification algorithms such as Naive Bayes, ID3, C4.5, and SVM are being investigated. The UCI machinery heart disease data set is used in experimental studies.
Collapse
|
10
|
Liu W, Shabaz M, Garg U. Moving Target Depth Information Extraction Based on Nonlinear Strategy Network. JOURNAL OF INTERCONNECTION NETWORKS 2022. [DOI: 10.1142/s0219265921480066] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]
Abstract
To improve the effect of depth information extraction of moving targets in the network, a nonlinear strategy-oriented method is proposed. With the advancement of science and technology, especially in wireless networks, a large amount of data is provided to people every hour of every day. Hence, it can increase the demand for data analysis tools. Nonlinear system modeling by using rough set theory to extract valuable information from large amounts of information, and then through the analytic hierarchy process (ahp) to determine the effect of input factors, then use particle swarm optimization algorithm (PSO) to find the accurate function, and USES the adaptive and population catastrophe and vaccine algorithm to make it to the local optimum, to achieve the aim of the complex. The experimental results show that, compared with M2 and M1 for 30 groups of samples, the model obtained by using M2 has a better fitting effect on the actual curve. The error of M2 is within ±3%, and the error of M1 is within ±6%, and the error is relatively large. The accuracy of the proposed method is higher than that of the neural network method, which proves that the nonlinear strategy is effective in the actual target depth information extraction.
Collapse
|
11
|
Yan W, Shabaz M, Rakhra M. Research on Nonlinear Distorted Image Recognition Based on Artificial Neural Network Algorithm. JOURNAL OF INTERCONNECTION NETWORKS 2022. [DOI: 10.1142/s0219265921480029] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]
Abstract
To study nonlinear distortion image recognition technology. Through the study of neural networks, an image recognition model based on BP neural network is proposed: An improved algorithm for driving quantity factor. According to the established neural network model, 10 commonly used images of Arabic numeral characters are recognized. The effectiveness of the model is verified by experiments with the extracted feature parameters of the target image. The results show that 38 of the 40 distorted images with noise can be correctly identified and 2 of them can be incorrectly identified by the single-stage recognition network, and the recognition rate reaches 95%; the recognition rate of cascade network reaches 100%. Therefore, the BP network which drives the number term can accelerate the training time of the network and improve the recognition efficiency of the system.
Collapse
|
12
|
Abstract
Agriculture is critical to human life. Agriculture provides a means of subsistence for a sizable portion of the world’s population. Additionally, it provides a large number of work opportunities for inhabitants. Many farmers prefer traditional farming approaches, which result in low yields. Agriculture and related industries are vital to the economy’s long-term growth and development. The primary issues in agricultural production include decision-making, crop selection, and supporting systems for crop yield enhancement. Agriculture forecasting is influenced by natural variables such as temperature, soil fertility, water volume, water quality, season, and crop prices. Growing advancements in agricultural automation have resulted in a flood of tools and apps for rapid knowledge acquisition. Mobile devices are rapidly being used by everyone, including farmers. This paper presents a framework for smart crop tracking and monitoring. Sensors, Internet of Things cameras, mobile applications, and big data analytics are all covered. The hardware consists of an Arduino Uno, a variety of sensors, and a Wi-Fi module. This strategy would result in the most effective use of energy and the smallest amount of agricultural waste possible.
Collapse
|
13
|
Huang X, Sharma A, Shabaz M. Biomechanical research for running motion based on dynamic analysis of human multi-rigid body model. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT 2022. [DOI: 10.1007/s13198-021-01563-4] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
|
14
|
Ramalingam P, Mehbodniya A, Webber JL, Shabaz M, Gopalakrishnan L. Telemetry Data Compression Algorithm Using Balanced Recurrent Neural Network and Deep Learning. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:4886586. [PMID: 35047035 PMCID: PMC8763529 DOI: 10.1155/2022/4886586] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/01/2021] [Revised: 12/10/2021] [Accepted: 12/17/2021] [Indexed: 02/07/2023]
Abstract
Telemetric information is great in size, requiring extra room and transmission time. There is a significant obstruction of storing or sending telemetric information. Lossless data compression (LDC) algorithms have evolved to process telemetric data effectively and efficiently with a high compression ratio and a short processing time. Telemetric information can be packed to control the extra room and association data transmission. In spite of the fact that different examinations on the pressure of telemetric information have been conducted, the idea of telemetric information makes pressure incredibly troublesome. The purpose of this study is to offer a subsampled and balanced recurrent neural lossless data compression (SB-RNLDC) approach for increasing the compression rate while decreasing the compression time. This is accomplished through the development of two models: one for subsampled averaged telemetry data preprocessing and another for BRN-LDC. Subsampling and averaging are conducted at the preprocessing stage using an adjustable sampling factor. A balanced compression interval (BCI) is used to encode the data depending on the probability measurement during the LDC stage. The aim of this research work is to compare differential compression techniques directly. The final output demonstrates that the balancing-based LDC can reduce compression time and finally improve dependability. The final experimental results show that the model proposed can enhance the computing capabilities in data compression compared to the existing methodologies.
Collapse
|
15
|
G M, Ahmed TI, Bhola J, Shabaz M, Singla J, Rakhra M, More S, Samori IA. Fuzzy Logic-Based Systems for the Diagnosis of Chronic Kidney Disease. BIOMED RESEARCH INTERNATIONAL 2022; 2022:2653665. [PMID: 35360514 PMCID: PMC8964165 DOI: 10.1155/2022/2653665] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/01/2022] [Revised: 03/02/2022] [Accepted: 03/08/2022] [Indexed: 02/07/2023]
Abstract
Kidney failure occurs whenever the kidney stops to operate properly and would be unable to cleanse or refine the bloodstream as it should. Chronic kidney disease (CKD) is a potentially fatal consequence. If this condition is diagnosed early, its progression can be delayed. There are various factors that increase the likelihood of developing kidney failure. As a consequence, in order to detect this potentially fatal condition early on, these risk factors must be checked on a regular basis before the individual's health deteriorates. Furthermore, it lowers the cost of therapy. The chronic kidney or renal disease will be recognized in this work utilizing fuzzy and adaptive neural fuzzy inference systems. The fundamental purpose of this initiative is to enhance the precision of medical diagnostics used to diagnose illnesses. Nephron functioning, glucose levels, systolic and diastolic blood pressure, maturity level, weight and height, and smoking are all elements to consider while developing a fuzzy and adaptable neural fuzzy inference system. The output variable describes a specific patient's stage of chronic renal disease based on input factors such as stage 1, stage 2, stage 3, stage 4, and stage 5. The outcome will show the present stage of a patient's kidney. As a result, these methods can assist specialists in determining the stage of chronic renal disease. MATLAB software is used to create the fuzzy and neural fuzzy inference systems.
Collapse
|
16
|
Ajaz F, Naseem M, Sharma S, Shabaz M, Dhiman G. COVID-19: Challenges and its Technological Solutions using IoT. Curr Med Imaging 2022; 18:113-123. [PMID: 33588738 DOI: 10.2174/1573405617666210215143503] [Citation(s) in RCA: 13] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/24/2020] [Revised: 12/13/2020] [Accepted: 01/06/2021] [Indexed: 02/07/2023]
Abstract
COVID-19 is a global pandemic that has affected many countries in a short span of time. People worldwide are susceptible to this deadly disease. To control the prevailing havoc of coronavirus, researchers are adopting techniques like plasma therapy, proning, medicines, etc. To stop the rapid spread of COVID-19, contact tracing is one of the important ways to check the infected people. This paper explains the various challenges people and health practitioners are facing due to COVID-19. In this paper, various ways with which the impact of COVID-19 can be controlled using IoT technology have been discussed. A six-layer architecture of IoT solutions for containing the deadly COVID-19 has been proposed. In addition to this, the role of machine learning techniques for diagnosing COVID-19 has been discussed in this paper, and a quick explanation of the unmanned aerial vehicle (UAVs) applications for contact tracing has also been specified. From the study conducted, it is evident that IoT solutions can be used in various ways for restricting the impact of COVID-19. Furthermore, IoT can be used in the healthcare sector to assure people's safety and good health with minimal costs.
Collapse
|
17
|
Bhola J, Shabaz M, Dhiman G, Vimal S, Subbulakshmi P, Soni SK. Performance Evaluation of Multilayer Clustering Network Using Distributed Energy Efficient Clustering with Enhanced Threshold Protocol. WIRELESS PERSONAL COMMUNICATIONS 2022; 126:2175-2189. [PMID: 34456513 PMCID: PMC8380017 DOI: 10.1007/s11277-021-08780-x] [Citation(s) in RCA: 10] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Accepted: 08/04/2021] [Indexed: 02/07/2023]
Abstract
In this research, pure deterministic system has been established by a new Distributed Energy Efficient Clustering Protocol with Enhanced Threshold (DEECET) by clustering sensor nodes to originate the wireless sensor network. The DEECET is very dynamic, highly distributive, self-confessed and much energy efficient as compared to most of the other existing protocols. The MATLAB simulation provides aim proved result by means of energy dissipation being emulated in the networks lifespan for homogeneous as well as heterogeneous sensor network, which when contrasted for other traditional protocols. An enhanced result has been obtained for equitable energy dissipation for systematized networks using DEECET.
Collapse
|
18
|
Mehbodniya A, Webber JL, Shabaz M, Mohafez H, Yadav K. Machine Learning Technique to Detect Sybil Attack on IoT Based Sensor Network. IETE JOURNAL OF RESEARCH 2021. [DOI: 10.1080/03772063.2021.2000509] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
|
19
|
Requirements for the Optimal Design for the Metasystematic Sustainability of Digital Double-Form Systems. MATHEMATICAL PROBLEMS IN ENGINEERING 2021. [DOI: 10.1155/2021/2423750] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
Abstract
The United Nations defined tenable progress as a development that responds to the demands of the current without adjusting the capacity of further generations to fulfil their own requirements; this is a fundamental idea in this article. This study recognizes three aspects, financial, social, and environmental sustainability, although its emphasis is on the latter. An electronic copy is sometimes characterized a physical thing, a real counterpart, and the data, which indicates the presence of a connector and block for effective and efficient data transmission. This article offers a systematic literature review on the sustainability of designed technology-based systems. This article also introduces the major requirements which can be helpful in designing optimal design for sustainability of a digital double-form system. Many articles on DT have also been chosen since they referenced the studied SLRs and were deemed to be significant for the objectives of this study. Selected and analysed for papers revealed so many flaws and challenges: the boons of are not clear; DTs throughout the result the wheel of life of the DTs is not adequately surveyed; DTs can contribute to cost reduction or to support decision-making is unclear; Internet practice should be improved and better integrated Moreover, it has not been feasible from our study to locate a publication which solely discusses DTs in relation with situational sustainability.
Collapse
|
20
|
Retrospection of the Optimization Model for Designing the Power Train of a Formula Student Race Car. SCIENTIFIC PROGRAMMING 2021. [DOI: 10.1155/2021/9465702] [Citation(s) in RCA: 12] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
Abstract
This article describes the power train design specifics in Formula student race vehicles used in the famed SAE India championship. To facilitate the physical validation of the design of the power train system of a formula student race car category vehicle engine of 610 cc displacement bike engine (KTM 390 model), a detailed design has been proposed with an approach of easing manufacturing and assembly along with full-scale prototype manufacturing. Many procedures must be followed while selecting a power train, such as engine displacement, fuel type, cooling type, throttle actuation, and creating the gear system to obtain the needed power and torque under various loading situations. Keeping the rules in mind, a well-suited engine was selected for the race track and transmission train was selected which gives the maximum performance. Based on the requirement, a power train was designed with all considerations we need to follow. Aside from torque and power, we designed an air intake with fuel efficiency in mind. Wireless sensors and cloud computing were used to monitor transmission characteristics such as transmission temperature management and vibration. The current study describes the design of an air intake manifold with a maximum restrictor diameter of 20 mm.
Collapse
|
21
|
Godara J, Batra I, Aron R, Shabaz M. Ensemble Classification Approach for Sarcasm Detection. Behav Neurol 2021; 2021:9731519. [PMID: 34853618 PMCID: PMC8629652 DOI: 10.1155/2021/9731519] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/04/2021] [Revised: 10/25/2021] [Accepted: 11/01/2021] [Indexed: 02/07/2023] Open
Abstract
Cognitive science is a technology which focuses on analyzing the human brain using the application of DM. The databases are utilized to gather and store the large volume of data. The authenticated information is extracted using measures. This research work is based on detecting the sarcasm from the text data. This research work introduces a scheme to detect sarcasm based on PCA algorithm, K-means algorithm, and ensemble classification. The four ensemble classifiers are designed with the objective of detecting the sarcasm. The first ensemble classification algorithm (SKD) is the combination of SVM, KNN, and decision tree. In the second ensemble classifier (SLD), SVM, logistic regression, and decision tree classifiers are combined for the sarcasm detection. In the third ensemble model (MLD), MLP, logistic regression, and decision tree are combined, and the last one (SLM) is the combination of MLP, logistic regression, and SVM. The proposed model is implemented in Python and tested on five datasets of different sizes. The performance of the models is tested with regard to various metrics.
Collapse
|
22
|
The Identification Nanoparticle Sensor Using Back Propagation Neural Network Optimized by Genetic Algorithm. JOURNAL OF SENSORS 2021. [DOI: 10.1155/2021/7548329] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
Abstract
This study draws attention towards the application of identification nanoparticle (NPs) sensor based on back propagation (BP) neural network optimized by genetic algorithm (GA) in the early diagnosis of cancer cells. In this study, the traditional and optimized BP neural networks are compared in terms of error between the actual value and the predictive value, and they are further applied to the NP sensor for early diagnosis of cancer cells. The results show that the root mean square (RMS) and mean absolute error (MAE) of the optimized BP neural network are comparatively much smaller than the traditional ones. The particle size of silicon-coated fluorescent NPs is about 105 nm, and the relative fluorescence intensity of silicon-coated fluorescent NPs decreases slightly, maintaining the accuracy value above 80%. In the fluorescence imaging, it is found that there is obvious green fluorescence on the surface of the cancer cells, and the cancer cells still emit bright green fluorescence under the dark-field conditions. In this study, a phenolic resin polymer CMK-2 with a large surface area is successfully combined with Au. NPs with good dielectric property and bioaffinity are selectively bonded to the modified electrode through a sulfur-gold bond to prepare NP sensor. The sensor shows good stability, selectivity, and anti-interference property, providing a new method for the detection of early cancer cells.
Collapse
|
23
|
Zhan X, Mu ZH, Kumar R, Shabaz M. Research on speed sensor fusion of urban rail transit train speed ranging based on deep learning. NONLINEAR ENGINEERING 2021. [DOI: 10.1515/nleng-2021-0028] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
Abstract
Abstract
The speed sensor fusion of urban rail transit train speed ranging based on deep learning builds a user-friendly structure but it in-turn increases the risk of traffic that significantly challenges its safety and transportation efficacy. In order to improve the operation safety and transportation efficiency of urban rail transit trains, a train speed ranging system based on embedded multi-sensor information is proposed in this article. The status information of the train is acquired by the axle speed sensor and the Doppler radar speed sensor; however, the query transponder collects the status information of the train, and is used in the embedded system. Various other modules like adaptive correction, idling/sliding detection and compensation of speed transition/sliding are used in the proposed methodology to reduce the vehicle speed positioning errors due to factors such as wheel wear, idling, sliding, and environment. The results show that the running time of the train is 1000s, the output period of the axle speed sensor is 0.005s and the accelerometer output period is 0.01s. The output cycle of doppler radar is observed to be 0.1s, the output cycle of the transponder is 1s and the fusion period of the main filter is observed as 1s. The train speed ranging system of the embedded multi-sensor information fusion system proposed in this article can effectively improve the accuracy of the train speed positioning.
Collapse
|
24
|
Dominant Feature Selection and Machine Learning-Based Hybrid Approach to Analyze Android Ransomware. SECURITY AND COMMUNICATION NETWORKS 2021. [DOI: 10.1155/2021/7035233] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
Abstract
Ransomware is a special malware designed to extort money in return for unlocking the device and personal data files. Smartphone users store their personal as well as official data on these devices. Ransomware attackers found it bewitching for their financial benefits. The financial losses due to ransomware attacks are increasing rapidly. Recent studies witness that out of 87% reported cyber-attacks, 41% are due to ransomware attacks. The inability of application-signature-based solutions to detect unknown malware has inspired many researchers to build automated classification models using machine learning algorithms. Advanced malware is capable of delaying malicious actions on sensing the emulated environment and hence posing a challenge to dynamic monitoring of applications also. Existing hybrid approaches utilize a variety of features combination for detection and analysis. The rapidly changing nature and distribution strategies are possible reasons behind the deteriorated performance of primitive ransomware detection techniques. The limitations of existing studies include ambiguity in selecting the features set. Increasing the feature set may lead to freedom of adept attackers against learning algorithms. In this work, we intend to propose a hybrid approach to identify and mitigate Android ransomware. This study employs a novel dominant feature selection algorithm to extract the dominant feature set. The experimental results show that our proposed model can differentiate between clean and ransomware with improved precision. Our proposed hybrid solution confirms an accuracy of 99.85% with zero false positives while considering 60 prominent features. Further, it also justifies the feature selection algorithm used. The comparison of the proposed method with the existing frameworks indicates its better performance.
Collapse
|
25
|
Zhou Y, Hu X, Shabaz M. Application and innovation of digital media technology in visual design. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT 2021. [DOI: 10.1007/s13198-021-01470-8] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
|