1
|
Rahman MM, Muniyandi RC, Sahran S, Usman OL, Moniruzzaman M. Restoring private autism dataset from sanitized database using an optimized key produced from enhanced combined PSO-GWO framework. Sci Rep 2024; 14:15763. [PMID: 38982129 PMCID: PMC11233581 DOI: 10.1038/s41598-024-66603-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/03/2024] [Accepted: 07/02/2024] [Indexed: 07/11/2024] Open
Abstract
The timely identification of autism spectrum disorder (ASD) in children is imperative to prevent potential challenges as they grow. When sharing data related to autism for an accurate diagnosis, safeguarding its security and privacy is a paramount concern to fend off unauthorized access, modification, or theft during transmission. Researchers have devised diverse security and privacy models or frameworks, most of which often leverage proprietary algorithms or adapt existing ones to address data leakage. However, conventional anonymization methods, although effective in the sanitization process, proved inadequate for the restoration process. Furthermore, despite numerous scholarly contributions aimed at refining the restoration process, the accuracy of restoration remains notably deficient. Based on the problems identified above, this paper presents a novel approach to data restoration for sanitized sensitive autism datasets with improved performance. In the prior study, we constructed an optimal key for the sanitization process utilizing the proposed Enhanced Combined PSO-GWO framework. This key was implemented to conceal sensitive autism data in the database, thus avoiding information leakage. In this research, the same key was employed during the data restoration process to enhance the accuracy of the original data recovery. Therefore, the study enhanced the restoration process for ASD data's security and privacy by utilizing an optimal key produced via the Enhanced Combined PSO-GWO framework. When compared to existing meta-heuristic algorithms, the simulation results from the autism data restoration experiments demonstrated highly competitive accuracies with 99.90%, 99.60%, 99.50%, 99.25%, and 99.70%, respectively. Among the four types of datasets used, this method outperforms other existing methods on the 30-month autism children dataset, mostly.
Collapse
Affiliation(s)
- Md Mokhlesur Rahman
- Centre for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 UKM, Bangi, Selangor, Malaysia.
| | - Ravie Chandren Muniyandi
- Centre for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 UKM, Bangi, Selangor, Malaysia
| | - Shahnorbanun Sahran
- Centre for Artificial Intelligence Technology, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 UKM, Bangi, Selangor, Malaysia
| | - Opeyemi Lateef Usman
- Centre for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 UKM, Bangi, Selangor, Malaysia
- Department of Computer Science, Tai Solarin University of Education, P.M.B. 2118, Ijagun, Ogun State, Nigeria
| | - Md Moniruzzaman
- Department of Electrical and Electronic Engineering, College of Engineering and Technology, International University of Business Agriculture and Technology, Uttara, Dhaka, 1230, Bangladesh
| |
Collapse
|
2
|
Nguyen DC, Ishikawa Y. On predicting annual output energy of 4-terminal perovskite/silicon tandem PV cells for building integrated photovoltaic application using machine learning. Heliyon 2023; 9:e18097. [PMID: 37539179 PMCID: PMC10395358 DOI: 10.1016/j.heliyon.2023.e18097] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/31/2023] [Revised: 07/04/2023] [Accepted: 07/06/2023] [Indexed: 08/05/2023] Open
Abstract
Building integrated photovoltaic (BIPV), based on tandem PV cells, is considered a new alternative for combining solar energy with buildings. Accurately predicting the BIPV-harvested annual output energy (E o u t , a n n u a l ) is crucial for evaluating the BIPV performance. Machine learning (ML) is a potential candidate for solving such a problem without the time-consuming process of experimental investigations. This contribution proposes an artificial neural network (ANN) to predict the E o u t , a n n u a l of 4-terminal perovskite/silicon (psk/Si) PV cells under realistic environmental conditions. The input variables of the proposed model consist of the input solar irradiance (P i n ), incident light's angle (A i n ), the PV module's temperature (T m o d ), the psk absorber's thickness (T h p s k ), and the psk absorber's bandgap (B p s k ). The input data were received from the simulated results. This work also evaluates the degree of importance of each input variable and optimizes the architecture of the ANN using the surrogate algorithm before predictions. The optimized ANN-3 (three hidden layers) model shows superior performance indicators, including a mean squared error of MSE = 0.02283, correlation coefficient R = 0.99999, and Willmott's index of agreement I w = 0.99999. Consequently, the predicted highest E o u t , a n n u a l at B p s k of 1.71 eV is 297.73, 115.01, 193.98, and 97.6 kWh/m2 for the rooftop, east, south, and west facades, respectively.
Collapse
Affiliation(s)
- Dong C. Nguyen
- College of Science and Engineering, Aoyama Gakuin University, Sagamihara, Kanagawa 252-5258, Japan
- Institute of Materials Science, Vietnam Academy of Science and Technology, 18 Hoang Quoc Viet, Cau Giay, Hanoi 100000, Viet Nam
| | - Yasuaki Ishikawa
- College of Science and Engineering, Aoyama Gakuin University, Sagamihara, Kanagawa 252-5258, Japan
| |
Collapse
|
3
|
Exploring different computational approaches for effective diagnosis of breast cancer. PROGRESS IN BIOPHYSICS AND MOLECULAR BIOLOGY 2023; 177:141-150. [PMID: 36509230 DOI: 10.1016/j.pbiomolbio.2022.11.004] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/25/2022] [Revised: 10/28/2022] [Accepted: 11/10/2022] [Indexed: 12/13/2022]
Abstract
Breast cancer has been identified as one among the top causes of female death worldwide. According to recent research, earlier detection plays an important role toward fortunate medicaments and thus, decreasing the mortality rate due to breast cancer among females. This review provides a fleeting summary involving traditional diagnostic procedures from the past and today, and also modern computational tools that have greatly aided in the identification of breast cancer. Computational techniques involving different algorithms such as Support vector machines, deep learning techniques and robotics are popular among the academicians for detection of breast cancer. They discovered that Convolutional neural network was a common option for categorization among such approaches. Deep learning techniques are evaluated using performance indicators such as accuracy, sensitivity, specificity, or measure. Furthermore, molecular docking, homology modeling and Molecular dynamics Simulation gives a road map for future discussions about developing improved early detection approaches that holds greater potential in increasing the survival rate of cancer patients. The different computational techniques can be a new dominion among researchers and combating the challenges associated with breast cancer.
Collapse
|
4
|
Albashish D. Ensemble of adapted convolutional neural networks (CNN) methods for classifying colon histopathological images. PeerJ Comput Sci 2022; 8:e1031. [PMID: 35875641 PMCID: PMC9299234 DOI: 10.7717/peerj-cs.1031] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/10/2022] [Accepted: 06/17/2022] [Indexed: 06/15/2023]
Abstract
Deep convolutional neural networks (CNN) manifest the potential for computer-aided diagnosis systems (CADs) by learning features directly from images rather than using traditional feature extraction methods. Nevertheless, due to the limited sample sizes and heterogeneity in tumor presentation in medical images, CNN models suffer from training issues, including training from scratch, which leads to overfitting. Alternatively, a pre-trained neural network's transfer learning (TL) is used to derive tumor knowledge from medical image datasets using CNN that were designed for non-medical activations, alleviating the need for large datasets. This study proposes two ensemble learning techniques: E-CNN (product rule) and E-CNN (majority voting). These techniques are based on the adaptation of the pretrained CNN models to classify colon cancer histopathology images into various classes. In these ensembles, the individuals are, initially, constructed by adapting pretrained DenseNet121, MobileNetV2, InceptionV3, and VGG16 models. The adaptation of these models is based on a block-wise fine-tuning policy, in which a set of dense and dropout layers of these pretrained models is joined to explore the variation in the histology images. Then, the models' decisions are fused via product rule and majority voting aggregation methods. The proposed model was validated against the standard pretrained models and the most recent works on two publicly available benchmark colon histopathological image datasets: Stoean (357 images) and Kather colorectal histology (5,000 images). The results were 97.20% and 91.28% accurate, respectively. The achieved results outperformed the state-of-the-art studies and confirmed that the proposed E-CNNs could be extended to be used in various medical image applications.
Collapse
Affiliation(s)
- Dheeb Albashish
- Computer Science Department/ Prince Abdullah bin Ghazi Faculty of Information and Communication Technology, Al-Balqa Applied University, Alsalt, Jordan
| |
Collapse
|
5
|
Enhancement of an Optimized Key for Database Sanitization to Ensure the Security and Privacy of an Autism Dataset. Symmetry (Basel) 2021. [DOI: 10.3390/sym13101912] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
Interrupting, altering, or stealing autism-related sensitive data by cyber attackers is a lucrative business which is increasing in prevalence on a daily basis. Enhancing the security and privacy of autism data while adhering to the symmetric encryption concept is a critical challenge in the field of information security. To identify autism perfectly and for its data protection, the security and privacy of these data are pivotal concerns when transmitting information over the Internet. Consequently, researchers utilize software or hardware disk encryption, data backup, Data Encryption Standard (DES), TripleDES, Advanced Encryption Standard (AES), Rivest Cipher 4 (RC4), and others. Moreover, several studies employ k-anonymity and query to address security concerns, but these necessitate a significant amount of time and computational resources. Here, we proposed the sanitization approach for autism data security and privacy. During this sanitization process, sensitive data are concealed, which avoids the leakage of sensitive information. An optimal key was generated based on our improved meta-heuristic algorithmic framework called Enhanced Combined PSO-GWO (Particle Swarm Optimization-Grey Wolf Optimization) framework. Finally, we compared our simulation results with traditional algorithms, and it achieved increased output effectively. Therefore, this finding shows that data security and privacy in autism can be improved by enhancing an optimal key used in the data sanitization process to prevent unauthorized access to and misuse of data.
Collapse
|
6
|
Rachmatullah MIC, Santoso J, Surendro K. Determining the number of hidden layer and hidden neuron of neural network for wind speed prediction. PeerJ Comput Sci 2021; 7:e724. [PMID: 34616896 PMCID: PMC8459779 DOI: 10.7717/peerj-cs.724] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/12/2021] [Accepted: 08/30/2021] [Indexed: 05/26/2023]
Abstract
Artificial neural network (ANN) is one of the techniques in artificial intelligence, which has been widely applied in many fields for prediction purposes, including wind speed prediction. The aims of this research is to determine the topology of neural network that are used to predict wind speed. Topology determination means finding the hidden layers number and the hidden neurons number for corresponding hidden layer in the neural network. The difference between this research and previous research is that the objective function of this research is regression, while the objective function of previous research is classification. Determination of the topology of the neural network using principal component analysis (PCA) and K-means clustering. PCA is used to determine the hidden layers number, while clustering is used to determine the hidden neurons number for corresponding hidden layer. The selected topology is then used to predict wind speed. Then the performance of topology determination using PCA and clustering is then compared with several other methods. The results of the experiment show that the performance of the neural network topology determined using PCA and clustering has better performance than the other methods being compared. Performance is determined based on the RMSE value, the smaller the RMSE value, the better the neural network performance. In future research, it is necessary to apply a correlation or relationship between input attribute and output attribute and then analyzed, prior to conducting PCA and clustering analysis.
Collapse
Affiliation(s)
| | - Judhi Santoso
- School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, West Java, Indonesia
| | - Kridanto Surendro
- School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, West Java, Indonesia
| |
Collapse
|