1
|
Garg S, Nayyar A, Buradi A, Shadangi KP, Sharma P, Bora BJ, Jain A, Asif Shah M. A novel investigation using thermal modeling and optimization of waste pyrolysis reactor using finite element analysis and response surface methodology. Sci Rep 2023; 13:10931. [PMID: 37414808 PMCID: PMC10325990 DOI: 10.1038/s41598-023-37793-8] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/08/2023] [Accepted: 06/27/2023] [Indexed: 07/08/2023] [Imported: 08/29/2023] Open
Abstract
The influence of humans on the environment is growing drastically and is pervasive. If this trend continues for a longer time, it can cost humankind, social and economic challenges. Keeping this situation in mind, renewable energy has paved the way as our saviour. This shift will not only help in reducing pollution but will also provide immense opportunities for the youth to work. This work discusses about various waste management strategies and discusses the pyrolysis process in details. Simulations were done keeping pyrolysis as the base process and by varying parameters like feeds and reactor materials. Different feeds were chosen like Low-Density Polyethylene (LDPE), wheat straw, pinewood, and a mixture of Polystyrene (PS), Polyethylene (PE), and Polypropylene (PP). Different reactor materials were considered namely, stainless steel AISI 202, AISI 302, AISI 304, and AISI 405. AISI stands for American Iron and Steel Institute. AISI is used to signify some standard grades of alloy steel bars. Thermal stress and thermal strain values and temperature contours were obtained using simulation software called Fusion 360. These values were plotted against temperature using graphing software called Origin. It was observed that these values increased with increasing temperature. LDPE got the lowest values for stress and stainless steel AISI 304 came out to be the most feasible material for pyrolysis reactor having the ability to withstand high thermal stresses. RSM was effectively used to generate a robust prognostic model with high efficiency, R2 (0.9924-0.9931), and low RMSE (0.236 to 0.347). Optimization based on desirability identified the operating parameters as 354 °C temperature and LDPE feedstock. The best thermal stress and strain responses at these ideal parameters were 1719.67 MPa and 0.0095, respectively.
Collapse
|
2
|
Jain R, Kumar A, Nayyar A, Dewan K, Garg R, Raman S, Ganguly S. Explaining sentiment analysis results on social media texts through visualization. MULTIMEDIA TOOLS AND APPLICATIONS 2023; 82:22613-22629. [PMID: 36747895 PMCID: PMC9892668 DOI: 10.1007/s11042-023-14432-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/30/2021] [Revised: 02/23/2022] [Accepted: 01/22/2023] [Indexed: 06/01/2023] [Imported: 08/29/2023]
Abstract
Today, Artificial Intelligence is achieving prodigious real-time performance, thanks to growing computational data and power capacities. However, there is little knowledge about what system results convey; thus, they are at risk of being susceptible to bias, and with the roots of Artificial Intelligence ("AI") in almost every territory, even a minuscule bias can result in excessive damage. Efforts towards making AI interpretable have been made to address fairness, accountability, and transparency concerns. This paper proposes two unique methods to understand the system's decisions aided by visualizing the results. For this study, interpretability has been implemented on Natural Language Processing-based sentiment analysis using data from various social media sites like Twitter, Facebook, and Reddit. With Valence Aware Dictionary for Sentiment Reasoning ("VADER"), heatmaps are generated, which account for visual justification of the result, increasing comprehensibility. Furthermore, Locally Interpretable Model-Agnostic Explanations ("LIME") have been used to provide in-depth insight into the predictions. It has been found experimentally that the proposed system can surpass several contemporary systems designed to attempt interpretability.
Collapse
|
3
|
Singh A, Gutub A, Nayyar A, Khan MK. Redefining food safety traceability system through blockchain: findings, challenges and open issues. MULTIMEDIA TOOLS AND APPLICATIONS 2022; 82:21243-21277. [PMID: 36276604 PMCID: PMC9579543 DOI: 10.1007/s11042-022-14006-4] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 04/21/2022] [Revised: 08/02/2022] [Accepted: 09/12/2022] [Indexed: 05/27/2023] [Imported: 08/29/2023]
Abstract
In the last few decades, there has been an increase in food safety and traceability issues. To prevent accidents and misconduct, it became essential to establish Food Safety Traceability System (FSTS) to trace the food from producer to consumer. The traceability systems can help track food in supply chains from farms to retail. Numerous technologies such as Radio Frequency Identification (RFID), sensor networks, and data mining have been integrated into traditional food supply chain systems to remove unsafe food products from the chain. But, these are not adequate for the current supply chain market. The emerging technology of blockchain can overcome safety and tracking issues. This can be possible with the help of blockchain features like transparent, decentralized, distributed, and immutable. Most of the previous works missed the discussion of the systematic process and technology involved in implementing the FSTS using blockchain. In this paper, we have discussed an organized state of research of the existing FSTS using blockchain. This survey paper aims to outline a detailed analysis of blockchain technology, FSTS using blockchain, consensus algorithms, security attacks, and solutions. Several survey papers and solutions based on blockchain are included in this research paper. Also, this work discusses some of the open research issues related to FSTS.
Collapse
|
4
|
Tayal A, Gupta J, Solanki A, Bisht K, Nayyar A, Masud M. DL-CNN-based approach with image processing techniques for diagnosis of retinal diseases. MULTIMEDIA SYSTEMS 2022; 28:1417-1438. [DOI: 10.1007/s00530-021-00769-7] [Citation(s) in RCA: 13] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/15/2020] [Accepted: 02/24/2021] [Indexed: 08/29/2023] [Imported: 08/29/2023]
|
5
|
Loukil S, Fourati LC, Nayyar A, Chee KWA. Analysis of LoRaWAN 1.0 and 1.1 Protocols Security Mechanisms. SENSORS (BASEL, SWITZERLAND) 2022; 22:3717. [PMID: 35632125 PMCID: PMC9142980 DOI: 10.3390/s22103717] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 03/24/2022] [Revised: 04/30/2022] [Accepted: 05/08/2022] [Indexed: 06/15/2023] [Imported: 08/29/2023]
Abstract
LoRaWAN is a low power wide area network (LPWAN) technology protocol introduced by the LoRa Alliance in 2015. It was designed for its namesake features: long range, low power, low data rate, and wide area networks. Over the years, several proposals on protocol specifications have addressed various challenges in LoRaWAN, focusing on its architecture and security issues. All of these specifications must coexist, giving rise to the compatibility issues impacting the sustainability of this technology. This paper studies the compatibility issues in LoRaWAN protocols. First, we detail the different protocol specifications already disclosed by the LoRa Alliance in two major versions, v1.0 and v1.1. This is done through presenting two scenarios where we discuss the communication and security mechanisms. In the first scenario, we describe how an end node (ED) and network server (NS) implementing LoRaWAN v1.0 generate session security keys and exchange messages for v1.0. In the second scenario, we describe how an ED v1.1 and an NS v1.1 communicate after generating security session keys. Next, we highlight the compatibility issues between the components implementing the two different LoRaWAN Specifications (mainly v1.0 and v1.1). Next, we present two new scenarios (scenarios 3 and 4) interchanging the ED and NS versions. In scenario three, we detail how an ED implementing LoRaWAN v1.1 communicates with an NS v1.0. Conversely, in scenario four, we explain how an ED v1.0 and an NS v1.1 communicate. In all these four scenarios, we highlight the concerns with security mechanism: show security session keys are generated and how integrity and confidentiality are guaranteed in LoRaWAN. At the end, we present a comparative table of these four compatibility scenarios.
Collapse
|
6
|
Borwankar S, Verma JP, Jain R, Nayyar A. Improvise approach for respiratory pathologies classification with multilayer convolutional neural networks. MULTIMEDIA TOOLS AND APPLICATIONS 2022; 81:39185-39205. [PMID: 35505670 PMCID: PMC9047583 DOI: 10.1007/s11042-022-12958-1] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/28/2021] [Revised: 02/16/2022] [Accepted: 03/09/2022] [Indexed: 06/01/2023] [Imported: 08/29/2023]
Abstract
Every respiratory-related checkup includes audio samples collected from the individual, collected through different tools (sonograph, stethoscope). This audio is analyzed to identify pathology, which requires time and effort. The research work proposed in this paper aims at easing the task with deep learning by the diagnosis of lung-related pathologies using Convolutional Neural Network (CNN) with the help of transformed features from the audio samples. International Conference on Biomedical and Health Informatics (ICBHI) corpus dataset was used for lung sound. Here a novel approach is proposed to pre-process the data and pass it through a newly proposed CNN architecture. The combination of pre-processing steps MFCC, Melspectrogram, and Chroma CENS with CNN improvise the performance of the proposed system, which helps to make an accurate diagnosis of lung sounds. The comparative analysis shows how the proposed approach performs better with previous state-of-the-art research approaches. It also shows that there is no need for a wheeze or a crackle to be present in the lung sound to carry out the classification of respiratory pathologies.
Collapse
|
7
|
Tripathy HK, Mishra S, Suman S, Nayyar A, Sahoo KS. Smart COVID-shield: an IoT driven reliable and automated prototype model for COVID-19 symptoms tracking. COMPUTING 2022; 104:1233-1254. [PMCID: PMC8763441 DOI: 10.1007/s00607-021-01039-0] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/19/2021] [Accepted: 11/28/2021] [Indexed: 06/01/2023] [Imported: 08/29/2023]
Abstract
IoT technology is revolutionizing healthcare and is transforming it into more personalized healthcare. In the context of COVID-19 pandemic, IoT`s intervention can help to detect its spread. This research proposes an effective “Smart COVID-Shield” that is capable of automatically detecting prevalent symptoms like fever and coughing along with ensuring social distancing norms are properly followed. It comprises three modules which include Cough Detect Module (CDM) for dry cough detection, Temperature Detect module (TDM) for high-temperature monitoring, and Distance Compute Module (DCM) to track social distancing norm violator. The device comprises a combination of a lightweight fabric suspender worn around shoulders and a flexible belt wrapped around the waist. The suspender is equipped with a passive infrared (PIR) sensor and temperature sensor to monitor persistent coughing patterns and high body temperature and the ultra-sonic sensor verify 6 feet distance for tracking an individual's social distancing norms. The developed model is implemented in an aluminum factory to verify its effectiveness. Results obtained were promising and reliable when compared to conventional manual procedures. The model accurately reported when body temperature rises. It outperformed thermal gun as it accurately recorded a mean of only 4.65 candidates with higher body temperature as compared to 8.59% with the thermal gun. A significant reduction of 3.61% on social distance violators was observed. Besides this, the latency delay of 10.32 s was manageable with the participant count of over 800 which makes it scalable.
Collapse
|
8
|
Truong TV, Nayyar A, Masud M. A novel air quality monitoring and improvement system based on wireless sensor and actuator networks using LoRa communication. PeerJ Comput Sci 2021; 7:e711. [PMID: 34616890 PMCID: PMC8459792 DOI: 10.7717/peerj-cs.711] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/09/2021] [Accepted: 08/21/2021] [Indexed: 06/13/2023] [Imported: 08/29/2023]
Abstract
In this paper, we study the air quality monitoring and improvement system based on wireless sensor and actuator network using LoRa communication. The proposed system is divided into two parts, indoor cluster and outdoor cluster, managed by a Dragino LoRa gateway. Each indoor sensor node can receive information about the temperature, humidity, air quality, dust concentration in the air and transmit them to the gateway. The outdoor sensor nodes have the same functionality, add the ability to use solar power, and are waterproof. The full-duplex relay LoRa modules which are embedded FreeRTOS are arranged to forward information from the nodes they manage to the gateway via uplink LoRa. The gateway collects and processes all of the system information and makes decisions to control the actuator to improve the air quality through the downlink LoRa. We build data management and analysis online software based on The Things Network and TagoIO platform. The system can operate with a coverage of 8.5 km, where optimal distances are established between sensor nodes and relay nodes and between relay nodes and gateways at 4.5 km and 4 km, respectively. Experimental results observed that the packet loss rate in real-time is less than 0.1% prove the effectiveness of the proposed system.
Collapse
|
9
|
Bhoi A, Nayak RP, Bhoi SK, Sethi S, Panda SK, Sahoo KS, Nayyar A. IoT-IIRS: Internet of Things based intelligent-irrigation recommendation system using machine learning approach for efficient water usage. PeerJ Comput Sci 2021; 7:e578. [PMID: 34239972 PMCID: PMC8237332 DOI: 10.7717/peerj-cs.578] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/17/2020] [Accepted: 05/13/2021] [Indexed: 06/13/2023] [Imported: 08/29/2023]
Abstract
In the traditional irrigation process, a huge amount of water consumption is required which leads to water wastage. To reduce the wasting of water for this tedious task, an intelligent irrigation system is urgently needed. The era of machine learning (ML) and the Internet of Things (IoT) brings it is a great advantage of building an intelligent system that performs this task automatically with minimal human effort. In this study, an IoT enabled ML-trained recommendation system is proposed for efficient water usage with the nominal intervention of farmers. IoT devices are deployed in the crop field to precisely collect the ground and environmental details. The gathered data are forwarded and stored in a cloud-based server, which applies ML approaches to analyze data and suggest irrigation to the farmer. To make the system robust and adaptive, an inbuilt feedback mechanism is added to this recommendation system. The experimentation, reveals that the proposed system performs quite well on our own collected dataset and National Institute of Technology (NIT) Raipur crop dataset.
Collapse
|
10
|
Sobti P, Nayyar A, Niharika, Nagrath P. EnsemV3X: a novel ensembled deep learning architecture for multi-label scene classification. PeerJ Comput Sci 2021; 7:e557. [PMID: 34141887 PMCID: PMC8176534 DOI: 10.7717/peerj-cs.557] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/21/2020] [Accepted: 05/01/2021] [Indexed: 06/12/2023] [Imported: 08/29/2023]
Abstract
Convolutional neural network is widely used to perform the task of image classification, including pretraining, followed by fine-tuning whereby features are adapted to perform the target task, on ImageNet. ImageNet is a large database consisting of 15 million images belonging to 22,000 categories. Images collected from the Web are labeled using Amazon Mechanical Turk crowd-sourcing tool by human labelers. ImageNet is useful for transfer learning because of the sheer volume of its dataset and the number of object classes available. Transfer learning using pretrained models is useful because it helps to build computer vision models in an accurate and inexpensive manner. Models that have been pretrained on substantial datasets are used and repurposed for our requirements. Scene recognition is a widely used application of computer vision in many communities and industries, such as tourism. This study aims to show multilabel scene classification using five architectures, namely, VGG16, VGG19, ResNet50, InceptionV3, and Xception using ImageNet weights available in the Keras library. The performance of different architectures is comprehensively compared in the study. Finally, EnsemV3X is presented in this study. The proposed model with reduced number of parameters is superior to state-of-of-the-art models Inception and Xception because it demonstrates an accuracy of 91%.
Collapse
|
11
|
Lee C, Kang SG, Nayyar A. Location-proximity-based clustering method for peer-to-peer multimedia streaming services with multiple sources. MULTIMEDIA TOOLS AND APPLICATIONS 2021; 81:23051-23090. [PMID: 34025208 PMCID: PMC8132743 DOI: 10.1007/s11042-021-10985-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/16/2020] [Revised: 01/31/2021] [Accepted: 04/30/2021] [Indexed: 06/12/2023] [Imported: 08/29/2023]
Abstract
Social distancing to reduce the spread of coronavirus disease 2019 (COVID-19) made a huge increase in the global OTT market, and OTT service providers get millions of new subscribers. Recently OTT service providers are extending their service to video broadcasting. As a one type of video broadcasting, this paper covers multimedia streaming with multiple sources. Multimedia streaming with multiple sources has multiple sources, and receivers can select one specific source to watch the video from the source. Sources include cameras capturing different angles of same event or location, cameras in geographical locations, etc. For delivering video to rapidly increasing number of users, multimedia streaming with multiple sources system needs efficient and scalable delivery method. Tree-based Peer-to-peer (P2P) networking has been investigated as the delivery solution of multimedia streaming with multiple sources, and set-top boxes or mobile apps of OTT service can be used as peers connecting the subscriber of OTT service. However, the scalability of the tree-based P2P networking is limited by the out-degree of a tree that branches linearly with the number of users. Hence, this study proposes clustering peers based on the location proximity of the peers to enhance the scalability of the P2P multimedia streaming with multiple sources. By clustering peers, one or more peers can be grouped into a virtual peer with an aggregated uplink/downlink capacity. This paper describes P2P multimedia streaming with multiple sources and algorithms for the proposed clustering method. Two applications which are one-view multiparty video conferencing and multi-view video streaming are introduced, and considerations for applying the proposed method to the applications are also discussed. The experimental results show that location-proximity-based clustering is effective in achieving a scalable P2P multimedia streaming with multiple sources by reducing the out-degree of a tree for the introduced applications. The proposed clustering leads improvement in the maximum achievable video bit rate, the average viewing video bit rate, and perceived delay.
Collapse
|
12
|
Shekhawat SS, Sharma H, Kumar S, Nayyar A, Qureshi B. bSSA: Binary Salp Swarm Algorithm With Hybrid Data Transformation for Feature Selection. IEEE ACCESS 2021; 9:14867-14882. [DOI: 10.1109/access.2021.3049547] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 08/29/2023] [Imported: 08/29/2023]
|
13
|
Chugh A, Sharma VK, Kumar S, Nayyar A, Qureshi B, Bhatia MK, Jain C. Spider Monkey Crow Optimization Algorithm With Deep Learning for Sentiment Classification and Information Retrieval. IEEE ACCESS 2021; 9:24249-24262. [DOI: 10.1109/access.2021.3055507] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 08/29/2023] [Imported: 08/29/2023]
|
14
|
Krishnamurthi R, Kumar A, Gopinathan D, Nayyar A, Qureshi B. An Overview of IoT Sensor Data Processing, Fusion, and Analysis Techniques. SENSORS (BASEL, SWITZERLAND) 2020; 20:E6076. [PMID: 33114594 PMCID: PMC7663157 DOI: 10.3390/s20216076] [Citation(s) in RCA: 55] [Impact Index Per Article: 13.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/21/2020] [Revised: 10/21/2020] [Accepted: 10/22/2020] [Indexed: 11/16/2022] [Imported: 08/29/2023]
Abstract
In the recent era of the Internet of Things, the dominant role of sensors and the Internet provides a solution to a wide variety of real-life problems. Such applications include smart city, smart healthcare systems, smart building, smart transport and smart environment. However, the real-time IoT sensor data include several challenges, such as a deluge of unclean sensor data and a high resource-consumption cost. As such, this paper addresses how to process IoT sensor data, fusion with other data sources, and analyses to produce knowledgeable insight into hidden data patterns for rapid decision-making. This paper addresses the data processing techniques such as data denoising, data outlier detection, missing data imputation and data aggregation. Further, it elaborates on the necessity of data fusion and various data fusion methods such as direct fusion, associated feature extraction, and identity declaration data fusion. This paper also aims to address data analysis integration with emerging technologies, such as cloud computing, fog computing and edge computing, towards various challenges in IoT sensor network and sensor data analysis. In summary, this paper is the first of its kind to present a complete overview of IoT sensor data processing, fusion and analysis techniques.
Collapse
|
15
|
CT-RPL: Cluster Tree Based Routing Protocol to Maximize the Lifetime of Internet of Things. SENSORS 2020; 20:s20205858. [PMID: 33081218 PMCID: PMC7589141 DOI: 10.3390/s20205858] [Citation(s) in RCA: 13] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/09/2020] [Revised: 10/09/2020] [Accepted: 10/14/2020] [Indexed: 11/17/2022] [Imported: 08/29/2023]
Abstract
Energy conservation is one of the most critical challenges in the Internet of Things (IoT). IoT devices are incredibly resource-constrained and possess miniature power sources, small memory, and limited processing ability. Clustering is a popular method to avoid duplicate data transfer from the participant node to the destination. The selection of the cluster head (CH) plays a crucial role in gathering and aggregating the data from the cluster members and forwarding the data to the sink node. The inefficient CH selection causes packet failures during the data transfer and early battery depletion nearer to the sink. This paper proposes a cluster tree-based routing protocol (CT-RPL) to increase the life span of the network and avoid the data traffic among the network nodes. The CT-RPL involves three processes, namely cluster formation, cluster head selection, and route establishment. The cluster is formed based on the Euclidean distance. The CH selection is accomplished using a game theoretic approach. Finally, the route is established using the metrics residual energy ratio (RER), queue utilization (QU), and expected transmission count (ETX). The simulation is carried out by using a COOJA simulator. The efficiency of a CT-RPL is compared with the Routing Protocol for Low Power and Lossy Networks (RPL) and energy-efficient heterogeneous ring clustering routing (E2HRC-RPL), which reduces the traffic load and decreases the packet loss ratio. Thus, the CT-RPL enhances the lifetime of the network by 30–40% and the packet delivery ratio by 5–10%.
Collapse
|
16
|
Ahlawat S, Choudhary A, Nayyar A, Singh S, Yoon B. Improved Handwritten Digit Recognition Using Convolutional Neural Networks (CNN). SENSORS (BASEL, SWITZERLAND) 2020; 20:E3344. [PMID: 32545702 PMCID: PMC7349603 DOI: 10.3390/s20123344] [Citation(s) in RCA: 76] [Impact Index Per Article: 19.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/25/2020] [Revised: 06/09/2020] [Accepted: 06/09/2020] [Indexed: 11/16/2022] [Imported: 08/29/2023]
Abstract
Traditional systems of handwriting recognition have relied on handcrafted features and a large amount of prior knowledge. Training an Optical character recognition (OCR) system based on these prerequisites is a challenging task. Research in the handwriting recognition field is focused around deep learning techniques and has achieved breakthrough performance in the last few years. Still, the rapid growth in the amount of handwritten data and the availability of massive processing power demands improvement in recognition accuracy and deserves further investigation. Convolutional neural networks (CNNs) are very effective in perceiving the structure of handwritten characters/words in ways that help in automatic extraction of distinct features and make CNN the most suitable approach for solving handwriting recognition problems. Our aim in the proposed work is to explore the various design options like number of layers, stride size, receptive field, kernel size, padding and dilution for CNN-based handwritten digit recognition. In addition, we aim to evaluate various SGD optimization algorithms in improving the performance of handwritten digit recognition. A network's recognition accuracy increases by incorporating ensemble architecture. Here, our objective is to achieve comparable accuracy by using a pure CNN architecture without ensemble architecture, as ensemble architectures introduce increased computational cost and high testing complexity. Thus, a CNN architecture is proposed in order to achieve accuracy even better than that of ensemble architectures, along with reduced operational complexity and cost. Moreover, we also present an appropriate combination of learning parameters in designing a CNN that leads us to reach a new absolute record in classifying MNIST handwritten digits. We carried out extensive experiments and achieved a recognition accuracy of 99.87% for a MNIST dataset.
Collapse
|
17
|
Ganesan R, Raajini XM, Nayyar A, Sanjeevikumar P, Hossain E, Ertas AH. BOLD: Bio-Inspired Optimized Leader Election for Multiple Drones. SENSORS 2020; 20:s20113134. [PMID: 32492971 PMCID: PMC7308907 DOI: 10.3390/s20113134] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/10/2020] [Revised: 05/27/2020] [Accepted: 05/28/2020] [Indexed: 11/16/2022] [Imported: 08/29/2023]
Abstract
Over the past few years, unmanned aerial vehicles (UAV) or drones have been used for many applications. In certain applications like surveillance and emergency rescue operations, multiple drones work as a network to achieve the target in which any one of the drones will act as the master or coordinator to communicate, monitor, and control other drones. Hence, drones are energy-constrained; there is a need for effective coordination among them in terms of decision making and communication between drones and base stations during these critical situations. This paper focuses on providing an efficient approach for the election of the cluster head dynamically, which heads the other drones in the network. The main objective of the paper is to provide an effective solution to elect the cluster head among multi drones at different periods based on the various physical constraints of drones. The elected cluster head acts as the decision-maker and assigns tasks to other drones. In a case where the cluster head fails, then the next eligible drone is re-elected as the leader. Hence, an optimally distributed solution proposed is called Bio-Inspired Optimized Leader Election for Multiple Drones (BOLD), which is based on two AI-based optimization techniques. The simulation results of BOLD compared with the existing Particle Swarm Optimization-Cluster head election (PSO-C) in terms of network lifetime and energy consumption, and from the results, it has been proven that the lifetime of drones with the BOLD algorithm is 15% higher than the drones with PSO-C algorithm.
Collapse
|
18
|
Khan NA, Jhanjhi N, Brohi SN, Usmani RSA, Nayyar A. Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs). COMPUTER COMMUNICATIONS 2020; 157:434-443. [DOI: 10.1016/j.comcom.2020.04.049] [Citation(s) in RCA: 14] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 08/29/2023] [Imported: 08/29/2023]
|
19
|
Kumar A, Krishnamurthi R, Nayyar A, Sharma K, Grover V, Hossain E. A Novel Smart Healthcare Design, Simulation, and Implementation Using Healthcare 4.0 Processes. IEEE ACCESS 2020; 8:118433-118471. [DOI: 10.1109/access.2020.3004790] [Citation(s) in RCA: 26] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 08/29/2023] [Imported: 08/29/2023]
|
20
|
Menaria VK, Jain SC, Raju N, Kumari R, Nayyar A, Hosain E. NLFFT: A Novel Fault Tolerance Model Using Artificial Intelligence to Improve Performance in Wireless Sensor Networks. IEEE ACCESS 2020; 8:149231-149254. [DOI: 10.1109/access.2020.3015985] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 08/29/2023] [Imported: 08/29/2023]
|
21
|
Authentication Protocol for Cloud Databases Using Blockchain Mechanism. SENSORS 2019; 19:s19204444. [PMID: 31615014 PMCID: PMC6832710 DOI: 10.3390/s19204444] [Citation(s) in RCA: 35] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/13/2019] [Revised: 10/09/2019] [Accepted: 10/10/2019] [Indexed: 12/03/2022] [Imported: 08/29/2023]
Abstract
Cloud computing has made the software development process fast and flexible but on the other hand it has contributed to increasing security attacks. Employees who manage the data in cloud companies may face insider attack, affecting their reputation. They have the advantage of accessing the user data by interacting with the authentication mechanism. The primary aim of this research paper is to provide a novel secure authentication mechanism by using Blockchain technology for cloud databases. Blockchain makes it difficult to change user login credentials details in the user authentication process by an insider. The insider is not able to access the user authentication data due to the distributed ledger-based authentication scheme. Activity of insider can be traced and cannot be changed. Both insider and outsider user’s are authenticated using individual IDs and signatures. Furthermore, the user access control on the cloud database is also authenticated. The algorithm and theorem of the proposed mechanism have been given to demonstrate the applicability and correctness.The proposed mechanism is tested on the Scyther formal system tool against denial of service, impersonation, offline guessing, and no replay attacks. Scyther results show that the proposed methodology is secure cum robust.
Collapse
|
22
|
Nayyar A, Puri V, Suseendran G. Artificial Bee Colony Optimization—Population-Based Meta-Heuristic Swarm Intelligence Technique. DATA MANAGEMENT, ANALYTICS AND INNOVATION 2019:513-525. [DOI: 10.1007/978-981-13-1274-8_38] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 08/29/2023] [Imported: 08/29/2023]
|
23
|
Alzubi J, Nayyar A, Kumar A. Machine Learning from Theory to Algorithms: An Overview. JOURNAL OF PHYSICS: CONFERENCE SERIES 2018; 1142:012012. [DOI: 10.1088/1742-6596/1142/1/012012] [Citation(s) in RCA: 58] [Impact Index Per Article: 9.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 08/29/2023] [Imported: 08/29/2023]
|