Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
37 result(s) for "Khadidos, Adil O."
Sort by:
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques.
Ensemble machine learning framework for predicting maternal health risk during pregnancy
Maternal health risks can cause a range of complications for women during pregnancy. High blood pressure, abnormal glucose levels, depression, anxiety, and other maternal health conditions can all lead to pregnancy complications. Proper identification and monitoring of risk factors can assist to reduce pregnancy complications. The primary goal of this research is to use real-world datasets to identify and predict Maternal Health Risk (MHR) factors. As a result, we developed and implemented the Quad-Ensemble Machine Learning framework to predict Maternal Health Risk Classification (QEML-MHRC). The methodology used a vacxsriety of Machine Learning (ML) models, which then integrated with four ensemble ML techniques to improve prediction. The dataset collected from various maternity hospitals and clinics subjected to nineteen training and testing tests. According to the exploratory data analysis, the most significant risk factors for pregnant women include high blood pressure, low blood pressure, and high blood sugar levels. The study proposed a novel approach to dealing with high-risk factors linked to maternal health. Dealing with class-specific performance elaborated further to properly understand the distinction between high, low, and medium risks. All tests yielded outstanding results when predicting the amount of risk during pregnancy. In terms of class performance, the dataset associated with the “HR” class outperformed the others, predicting 90% correctly. GBT with ensemble stacking outperformed and demonstrated remarkable performance for all evaluation measure (0.86) across all classes in the dataset. The key success of the models used in this work is the ability to measure model performance using a class-wise distribution. The proposed approach can help medical experts assess maternal health risks, saving lives and preventing complications throughout pregnancy. The prediction approach presented in this study can detect high-risk pregnancies early on, allowing for timely intervention and treatment. This study’s development and findings have the potential to raise public awareness of maternal health issues.
Integrating swin transfer with attention mechanism based hybrid deep learning driven automated human activity recognition for enhanced disability assistance
The challenge of providing independent living for elderly and disabled individuals is a critical societal concern. Accurate human activity recognition (HAR) is core to allow the development of context-aware applications that involve the identification and understanding of human behaviour, for example, monitoring elderly or disabled people who live alone. HAR performed using ambient sensors, such as cameras or wearable devices, has gained prominence due to its wide-ranging applications in healthcare, surveillance, smart environments, and security. However, choosing an appropriate AI model for precisely interpreting intrinsic human activities remains a key challenge in the field. And, it is beneficial for people with disabilities or the elderly to live independently. Currently, the methods of artificial intelligence (AI) for activity recognition, an optimal application area, and the form of data acquisition devices make the selections more complex. Different researchers applied deep learning (DL) techniques in HAR. At present, DL has achieved remarkable results in developing high-level ideas from composite data in various fields like HAR. In this study, a Hybrid Deep Learning with an Attention Mechanism for Automatic Human Activity Recognition Using Swin Transformer (HDLAM-AHARST) model is proposed. The aim is to design an intelligent HAR system to assist individuals with disabilities by enabling accurate and real-time monitoring for improved quality of life. Initially, the Gabor filter (GF) method is utilized in the image pre-processing step to eliminate noise and enhance image quality. Furthermore, the Swin Transformer (SwinT) method is utilized for the feature extraction process to identify and transform relevant information from data. Moreover, the hybridization of a convolutional neural network and a long short-term memory with an attention mechanism (C-LSTM-A) is employed for the HAR classification process. Finally, the hyperparameter selection for the C-LSTM-A model is performed by using the Lyrebird Optimisation Algorithm (LOA) method. The experimentation of the HDLAM-AHARST technique is performed under the HAR image dataset. The comparison study of the HDLAM-AHARST technique illustrated an accuracy rate of 98.91% over existing methods.
Sliding principal component and dynamic reward reinforcement learning based IIoT attack detection
The Internet of Things (IoT) involves the gathering of all those devices that connect to the Internet with the purpose of collecting and sharing data. The application of IoT in the different sectors, including health, industry has also picked up the threads to augment over the past few years. The IoT and, by integrity, the IIoT, are found to be highly susceptible to different types of threats and attacks owing to the networks nature that in turn leads to even poor outcomes (i.e., increasing error rate). Hence, it is critical to design attack detection systems that can provide the security of IIoT networks. To overcome this research work of IIoT attack detection in large amount of evolutions is failed to determine the certain attacks resulting in a minimum detection performance, reinforcement learning-based attack detection method called sliding principal component and dynamic reward reinforcement learning (SPC–DRRL) for detecting various IIoT network attacks is introduced. In the first stage of this research methodology, preprocessing of raw TON_IoT dataset is performed by employing min–max normalization scaling function to obtain normalized values with same scale. Next, with the processed sample data as output, to extract data from multi-sources (i.e., different service profiles from the dataset), a robust log likelihood sliding principal component-based feature extraction algorithm is applied with an arbitrary size sliding window to extract computationally-efficient features. Finally, dynamic reward reinforcement learning-based IIoT attack detection model is presented to control the error rate involved in the design. Here, with the design of dynamic reward function and introducing incident repository that not only generates the reward function in an arbitrary fashion but also stores the action results in the incident repository for the next training, therefore reducing the attack detection error rate. Moreover, an IIoT attack detection system based on SPC–DRRL is constructed. Finally, we verify the algorithm on the ToN_IoT dataset of University of New South Wales Australia. The experimental results show that the IIoT attack detection time and overhead along with the error rate are reduced considerably with higher accuracy than that of traditional reinforcement learning methods.
Enhancing lung cancer detection through integrated deep learning and transformer models
Lung cancer has been stated as one of the prevalent killers of cancer up to this present time and this clearly underlines the rationale for early diagnosis to enhance life expectancy of patients afflicted with the condition. The reasons behind the usage of the transformer and deep learning classifiers for the detection of lung cancer include accuracy, robustness along with the capability to handle and evaluate large data sets and much more. Such models can be more complex and can help to utilize multiple modalities of data to give extensive information that will be critical in ascertaining the right diagnosis at the right time. However, the existing works encounter several limitations including reliance on large annotated data, overfitting, high computation complexity, and interpretability. Third, the issue of the stability of these models’ performance when applied to actual clinical datasets is still an open question; this is an even bigger issue that will greatly reduce the actual utilization of these models in clinical practice. To tackle these, we develop a novel Cancer Nexus Synergy (CanNS), which applies of A. Swin-Transformer UNet (SwiNet) Model for segmentation, Xception-LSTM GAN (XLG) CancerNet for classification, and Devilish Levy Optimization (DevLO) for fine-tuning parameters. This paper breaks new ground in that the presented elements are incorporated in a manner that co-operatively elevates the diagnostic capabilities while at the same time being computationally light and resilient. These are SwiNet for segmented analysis, XLG CancerNet for precise classification of the cases, and DevLO that optimizes the parameters of the lung cancer detection system, making the system more sensible and efficient. The performance outcomes indicate that the CanNS framework enhances the detection’s accuracy, sensitivity, and specificity compared to the previous approaches.
Diagnostic behavior analysis of profuse data intrusions in cyber physical systems using adversarial learning techniques
In this paper we propose Cyber Physical Systems (CPS) framework to mitigate intrusions in the existing dataset by constructing a distinctive system model with an analytical framework. With the exponential growth of data network topologies, the prevalence of CPS facing various sorts of invasions is evident across all data management strategies. Therefore, it is imperative to eradicate any data associated with invasions, as it may inflict significant harm on other users. The analytical framework for CPS is designed to distinguish between true and false data samples and to assess the failure rate of each data sample set. The primary contribution of the created system model, which incorporates a learning technique, is to reduce data loss, hence eliminating all incursions under conditions of minimal loss through the use of generators and discriminators. Furthermore, the integrated framework is evaluated in real-time, and simulations are conducted, demonstrating that the simulated results are significantly more effective in reducing failure rates, data losses, and state count durations. The simulated outcomes are also contrasted with existing methodologies that do not incorporate learning methods. The comparative simulated results for the suggested method indicate an only 1% data loss, allowing for implementation in real-time situations without data integrity issues, achieving an average of 97% efficacy.
Synthetic healthcare data utility with biometric pattern recognition using adversarial networks
This research examines the significance of privacy of synthetic data in healthcare and biomedicine by an analysis of actual data. The significance of authentic health care data necessitates the secure transmission of such data exclusively to authorized users. Therefore, to minimise the reliance on actual data, synthetic data is developed by incorporating diverse biometric pattern representations, necessitating a distinct setup with adversarial scenarios. Furthermore, to improve the quality of synthetic data, a deep convolutional adversarial network is examined under several operational modes. Furthermore, a distinct conditional metric is employed in this instance to avert the loss of synthetic data, so ensuring consistent transmissions. The system model is developed by examining numerous parameters associated with matching, classification losses, biometric privacy, information leakage, data relocations, and deformations, which are merged with a corresponding adversarial framework. To validate the results of the integrated system model, four scenarios and two case studies are examined, demonstrating that successful data creation can be achieved artificially with minimal losses of 5%.
Comparative analysis of deep learning models for crack detection in buildings
Life-time of the buildings is generally challenged by the act of nature. In-spite of the fact that the constructions provide minimum guarantee on quality and durability, certain mismatch in the composition of the materials, stress on the building, and chemical or physical imbalance of the materials, lead to surface crack. Cracks are also generated due to the shuffle of climatic conditions, which leads to the contraction and expansion of the building surfaces, and other damages. The guarantee on building safety and serviceability depends on how these buildings are successfully assessed and maintained. The development of Artificial Intelligence (AI) techniques, provide favourable solutions in-order to handle, manage and solve building cracks, through analysis using deep image neural network models, that perform classification of the building with crack images. As a result, a critical challenge for many civil engineering applications is the precise, quick, and automated identification of cracks on structural surfaces is addressed with the solutions provided by the deep image neural networks. In this research, we tackle the research gap and data scarcity by developing and curating a novel deep learning image processing for detecting cracks in brickwork. We also train and validate several deep learning models to classify brickwork images as either cracked or normal. The dataset of the proposed work contains 24,000 images which are classified through binary classes. These classes are generated for crack and non-crack images. The various parameters such as Batch size, Pooling, Activation functions Learning-rate, Kernel-Size, Normalization, and Optimizers are used for the evaluation of the model. The proposed work performs a comparative analysis of four deep image models such as Inception V3, VGG-16, RESNET-50 VGG-19, Inception ResNetV2 and CNN-RES MLP. With the analysis of all these models, the Inception V3 provides the best of all with the accuracy value of 99.98%. The InceptionV3 tops the Precision value of 99.99% and RESNET-50 tops the Recall value of 99.98%. The IncpetionV2 provided the best of the Region of Convergence value of 0.9999 which is the best among all the models for reliable and stable performance.
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Ensuring the privacy and trustworthiness of smart city—Internet of Things (IoT) networks have recently remained the central problem. Cyborg intelligence is one of the most popular and advanced technologies suitable for securing smart city networks against cyber threats. Various machine learning and deep learning-based cyborg intelligence mechanisms have been developed to protect smart city networks by ensuring property, security, and privacy. However, it limits the critical problems of high time complexity, computational cost, difficulty to understand, and reduced level of security. Therefore, the proposed work intends to implement a group of novel methodologies for developing an effective Cyborg intelligence security model to secure smart city systems. Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. Then, the Conjugate Self-Organizing Migration (CSOM) optimization algorithm is deployed to select the most relevant features to train the classifier, which also supports increased detection accuracy. Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. The original contribution of this work is to develop a novel Cyborg intelligence framework for protecting smart city networks from modern cyber-threats. In this system, a combination of unique and intelligent mechanisms are implemented to ensure the security of smart city networks. It includes QIDI for data filtering, CSOM for feature optimization and dimensionality reduction, and RMML for categorizing the type of intrusion. By using these methodologies, the overall attack detection performance and efficiency have been greatly increased in the proposed cyborg model. Here, the main reason of using CSOM methodology is to increase the learning speed and prediction performance of the classifier while detecting intrusions from the smart city networks. Moreover, the CSOM provides the optimized set of features for improving the training and testing operations of classifier with high accuracy and efficiency. Among other methodologies, the CSOM has the unique characteristics of increased searching efficiency, high convergence, and fast processing speed. During the evaluation, the different types of cyber-threat datasets are considered for testing and validation, and the results are compared with the recent state-of-the-art model approaches.
Personalized learning in hybrid education
The process of teaching and learning during the pandemic has been evolving globally, with many institutions transforming their approaches to enhance the teaching and learning experience. Despite the presence of improved frameworks due to the varied learning capabilities of students, it remains quite challenging to analyse individual characteristic features. Consequently, this research provides clear insights into the integration of the Personalised Learning Approach (PLA) to foster effective interaction with students. However, many existing methods suggest different techniques for evaluating learners in a hybrid mode, where obtaining clear data sets can be difficult. In the teaching and learning approach, if the defined data set from experts is clear, decisions regarding the learning characteristics of students can be made in a shorter period. In the proposed method the PLA framework categorizes learners into four engagement-based clusters using a three-dimensional sensor model and machine learning classifiers. A dual-controller mechanism (master-slave) dynamically adjusts communication intervals and optimizes video transmission, reducing latency and packet loss. The methodology is validated using MATLAB-based simulations with a dataset of 1,700–5,000 learners, analyzing throughput, delay, packet loss, and cost efficiency. The test results clearly demonstrate that the PLA outperforms the conventional method, not only with the parameters mentioned above but also in terms of cost-effectiveness using master and slave controllers.