Applied DS and Smart Systems
Applied DS and Smart Systems
Edited by
Jaiteg Singh
S B Goyal
Naveen Kumar
© 2025 selection and editorial matter, Jaiteg Singh, S B Goyal, Rajesh Kumar Kaushal, Naveen Kumar and
Sukhjit Singh Sehra; individual chapters, the contributors
The right of Jaiteg Singh, S B Goyal, Rajesh Kumar Kaushal, Naveen Kumar and Sukhjit Singh Sehra to be
identified as the authors of the editorial material, and of the authors for their individual chapters, has been
asserted in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988.
The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative
Commons [Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND)] 4.0 license.
Any third party material in this book is not included in the OA Creative Commons license, unless indicated otherwise
in a credit line to the material. Please direct any permissions enquiries to the original rightsholder.
For permission to photocopy or use material electronically from this work, access www.copyright.com
or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. For works that are not available on CCC please contact [email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
DOI: 10.1201/9781003471059
Preface xx
Chapter 6 Development of an analytical model of drain current for junctionless GAA MOSFET
including source/drain resistance 43
Amrita Kumari, Jhuma Saha, Ashish Saini and Amit Kumar
Chapter 9 GAI in healthcare system: Transforming research in medicine and care for patients 63
Mahesh A., Angelin Rosy M., Vinodh Kumar M., Deepika P., Sakthidevi I. and
Sathish C.
Chapter 11 Blood bank mobile application of IoT-based android studio for COVID-19 76
Basetty Mallikarjuna, Sandeep Bhatia, Neha Goel, and Bharat Bhushan Naib
Chapter 12 Selection of effective parameters for optimizing software testing effort estimation 82
Vikas Chahar and Pradeep Kumar Bhatia
Chapter 14 An overview of wireless sensor networks applications, challenges and security attacks 98
N. Sharmila Banu, B.Vidhya and N.Mahendran
Chapter 15 Internet of health things-enabled monitoring of vital signs in hospitals of the future 108
Amit Sundas, Sumit Badotra, Gurpreet Singh and Amit Verma
Chapter 16 Artificial intelligence-based learning techniques for accurate prediction and classification
of colorectal cancer 114
Yogesh Kumar, Shapali Bansal, Ankush Jariyal and Apeksha Koul
Chapter 17 SLODS: Real-time smart lane detection and object detection system 120
Tanuja Satish Dhope, Pranav Chippalkatti, Sulakshana Patil, Vijaya Gopalrao Rajeshwarkar
and Jyoti Ramesh Gangane
Chapter 18 Computational task off-loading using deep Q-learning in mobile edge computing 129
Tanuja Satish Dhope, Tanmay Dikshit, Unnati Gupta and Kumar Kartik
Chapter 20 Issues with existing solutions for grievance redressal systems and mitigation approach using
blockchain network 140
Harish Kumar, Rajesh Kumar Kaushal and Naveen Kumar
Chapter 21 A systematic approach to implement hyperledger fabric for remote patient monitoring 147
Shilpi Garg, Rajesh Kumar Kaushal and Naveen Kumar
Chapter 22 Developing spell check and transliteration tools for Indian regional language – Kannada 152
Chandrika Prasad, Jagadish S. Kallimani, Geetha Reddy and Dhanashekar K.
Chapter 25 Exploring recession indicators: Analyzing social network platforms and newspapers textual
datasets 180
Nikita Mandlik, Kanishk Barhanpurkar, Harshad Bhandwaldar, S. B. Goyal, Anand Singh
Rajawat and Surabhi Rane
Chapter 26 NIRF rankings’ effects on private engineering colleges for improving India’s educational
system looked at using computational approaches 187
Ankita Mitra, Subir Gupta, P. K. Dutta, S. B. Goyal, Wan Md. Afnan Bin Wan Mahmood
and Baharu Bin Kemat
Chapter 28 Drowsiness detection in drivers: A machine learning approach using hough circle
classification algorithm for eye retina images 202
J. Viji Gripsy, N. A. Sheela Selvakumari, S. Sahul Hameed and M. Jamila Begam
Chapter 29 Optimizing congestion collision using effective rate control with data aggregation algorithm
in wireless sensor network 209
K. Deepa, C. Arunpriya and M. Sasikala
Chapter 30 DDoS attack detection methods, challenges and opportunities: A survey 215
Jaspreet Kaur and Gurjit Singh Bhathal
Chapter 32 Optimization techniques for wireless body area network routing protocols: Analysis and
comparison 226
Swati Goel, Kalpna Guleria and Surya Narayan Panda
Chapter 33 Securing the boundless network: A comprehensive analysis of threats and exploits in
software defined network 236
Shruti Keshari, Sunil Kumar, Pankaj Kumar Sharma and Sarvesh Tanwar
Chapter 34 A bibliometric analyses on emerging trends in communication disorder 246
Muskan Chawla, Surya Narayan Panda and Vikas Khullar
Chapter 35 Enhancing latency performance in fog computing through intelligent resource allocation
and Cuckoo search optimization 256
Meena Rani, Kalpna Guleria and Surya Narayan Panda
Chapter 36 Pediatric thyroid ultrasound image classification using deep learning: A review 264
Jatinder Kumar, Surya Narayan Panda and Devi Dayal
Chapter 37 Hybrid security of EMI using edge-based steganography and three-layered cryptography 278
Divya Sharma and Chander Prabha
Chapter 38 Efficient lung cancer detection in CT scans through GLCM analysis and hybrid classification 291
Shazia Shamas, Surya Narayan Panda and Ishu Sharma
Chapter 39 Newton Raphson method for root convergence of higher degree polynomials using big
number libraries 298
Taniya Hasija, K. R. Ramkumar, Bhupendra Singh, Amanpreet Kaur and Sudesh Kumar
Mittal
Chapter 42 Exploring Image Segmentation Approaches for Medical Image Analysis 322
Rupali Pathak, Hemant Makwana and Neha Sharma
Chapter 44 Integrating metaverse and blockchain for transparent and secure logistics management 334
A.U. Nwosu, S.B. Goyal, Anand Singh Rajawat, Baharu Bin Kemat and Wan Md Afnan
Bin Wan Mahmood
Chapter 45 A systematic study of multiple cardiac diseases by using algorithms of machine learning 343
Prachi Pundhir and Dhowmya Bhatt
Chapter 46 Forecasting mobile prices: Harnessing the power of machine learning algorithms 348
Parveen Badoni, Rahul Kumar, Parvez Rahi, Ajay Pal Singh Yadav and Siroj Kumar Singh
Chapter 49 Simulation-based evaluating AODV routing protocol using wireless networks 378
Bhupal Arya, Dr. Jogendra Kumar, Dr. Parag Jain, Preeti Saroj, Mrinalinee Singh and Yogesh
Kumar
Chapter 56 Liver segmentation using shape prior features with Chan-Vese model 430
Veerpal and Jyoti Rani
Chapter 58 Sales analysis: Coca-Cola sales analysis using data mining techniques for predictions and
efficient growth in sales 448
Siddique Ibrahim S. P., Pothuri Naga Sai Saketh, Gamidi Sanjay, Bhimavarapu Charan
Tej Reddy, Mesa Ravi Kanth and Selva Kumar S.
Chapter 59 Statistical analysis of consumer attitudes towards virtual influencers in the metaverse 458
Sheetal Soni and Usha Yadav
Chapter 60 Quantum dynamics-aided learning for secure integration of body area networks within the
metaverse cybersecurity framework 467
Anand Singh Rajawat, S. B. Goyal, Jaiteg Singh and Celestine Iwendi
Chapter 64 Adaptive resource allocation and optimization in cloud environments: Leveraging machine
learning for efficient computing 499
Anand Singh Rajawat, S. B. Goyal, Manoj Kumar and Varun Malik
Chapter 65 Quantum deep learning on driven trust-based routing framework for IoT in the metaverse
context 509
S. B. Goyal, Anand Singh Rajawat, Jaiteg Singh and Chawki Djeddi
Chapter 66 Advancing network security paradigms integrating quantum computing models for
enhanced protections 517
Anand Singh Rajawat, S. B. Goyal, Chaman Verma and Jaiteg Singh
Chapter 67 Optimizing 5G and beyond networks: A comprehensive study of fog, grid, soft, and
scalable computing models 529
S. B. Goyal, Anand Singh Rajawat, Jaiteg Singh and Tony Jan
Chapter 68 Smart protocol design: Integrating quantum computing models for enhanced efficiency and
security 537
S. B. Goyal, Sugam Sharma, Anand Singh Rajawat and Jaiteg Singh
Chapter 69 Efficient IIoT framework for mitigating Ethereum attacks in industrial applications using
supervised learning with quantum classifiers 544
S. B. Goyal, Anand Singh Rajawat, Ritu Shandilya and Varun Malik
Chapter 70 Quantum computing in the era of IoT: Revolutionizing data processing and security in
connected devices 552
S. B. Goyal, Sardar M. N. Islam, Anand Singh Rajawat and Jaiteg Singh
Chapter 71 A federated learning approach to classify depression using audio dataset 560
Chetna Gupta and Vikas Khullar
Chapter 72 Securing IOT CCTV: Advanced video encryption algorithm for enhanced data protection 565
Kawalpreet Kaur, Amanpreet Kaur, Vidhyotma Gandhi and Bhupendra Singh
Chapter 74 Review of techniques for diagnosis of Meibomian gland dysfunction using IR images 576
Deepika Sood, Anshu Singla and Sushil Narang
Chapter 78 Artificial intelligence and machine vision-based assessment of rice seed quality 603
Ridhi Jindal and S. K. Mittal
List of Figures
The Second International Conference on Applied Data Science and Smart Systems (ADSSS-2023) was held
on 15-16 December 2023 at Chitkara University, Punjab, India. This multidisciplinary conference focussed
on innovation and progressive practices in science, technology, and management. The conference successfully
brought together researchers, academicians, and practitioners across different domains such as artificial intel-
ligence and machine learning, software engineering, automation, data science, business computing, data com-
munication, and computer networks. The presenters shared their most recent research works that are critical
to contemporary business and societal landscape and encouraged the participants to devise solutions for real-
world challenges.
ADSSS-2023 featured an extensive selection of tracks, each delving into critical facets of applied data science
and smart systems. “Machine Learning Principles, Smart Solutions, and Business Strategies” provided insights
into the synergy between ML principles, innovative solutions, and strategic business applications. The track on
“AI and Deep Learning” explored the latest advancements and applications in artificial intelligence and deep
learning technologies. Addressing contemporary challenges, “Data Science Techniques for Handling Epidemic,
Pandemic” showcased the role of data science in managing health crises. “Deep Intelligence for Interdisciplinary
Research” facilitated discussions on the integration of deep intelligence across diverse research domains. The
track focusing on “Software Engineering and Automation” explored methodologies that enhance efficiency and
automate processes in the realm of software development. “Data Communication and Computer Networks”
shed light on evolving communication technologies, while “Computing in Business and Learning” addressed the
intersection of computing technologies with business strategies and educational practices. Finally, “Engineering
Mathematics and Physics” provided a platform for exploring the application of mathematical and physical prin-
ciples in various engineering disciplines. This diverse array of tracks collectively contributed to a comprehensive
exploration of applied data science, fostering interdisciplinary collaboration and offering valuable insights for
future research and advancements in the field.
ADSSS-2023 was honored to host eminent scientists and researchers from across the globe, whose insightful
keynote addresses enhanced participants’ knowledge. The keynotes covered diverse topics such as AI-Powered
Quantum Cryptography, the Role of Large Language Models in Scientific Research, and the Application of Deep
Gaussian Processes in Radio Map Construction and Localization. Beyond knowledge dissemination, the confer-
ence served as a dynamic platform for networking and collaboration among researchers, fostering the exchange
of ideas that may shape future research endeavours. We trust that every participant found the ADSSS-2023
experience to be both enriching and productive.
Editors
Dr. Rajesh Kumar Kaushal is a highly accomplished and dedicated researcher and
educator, boasting a robust background in Computer Science and Engineering, and
accumulating an extensive 19 years of experience in academia since 2004. Holding a
Ph.D. in Computer Science and Engineering from Chitkara University, Punjab, India,
he currently serves as a professor in the Department of Computer Applications and
actively contributing to research endeavors.
Dr. Kaushal’s prolific research output is evident through his involvement in more
than 60 patent filings, with one of them being published in the World Intellectual
Property Organization (WIPO) and 15 being granted. Additionally, he has taken
on the role of Project Manager in a DST-funded project titled “Smart and Portable
Intensive Care Unit,” supported by the Millennium Alliance (FICCI, USAID, UKAID, Facebook, World Bank,
and TDB DST). Furthermore, he served as a Co-Principal Investigator in another DST-funded project named
“Remote Vital Information and Surveillance System for Elderly and Disabled Persons,” under the Technology
Intervention of Disabled and Elderly (TIDE) scheme of the Ministry of Science & Technology, Government of
India. Presently he is working on another DST funded project named “Smart Ergonomic Portable Commode
Chair” under the DST TIDE scheme. He is also actively contributing the research community in the area of
Blockchain and Internet of Things and have published more than 55 research papers and all of them are either
indexed in SCOPUS or SCI.
Additionally, he serves as a visiting professor at Kasetsart University in Sakon Nakhon, Thailand, and actively
participates as a reviewer for the peer-reviewed journal “Technology, Knowledge & Learning.” Recognizing
his exceptional contributions to education, Dr. Kaushal has been honoured with the Teacher Excellence Award
twice, receiving the accolade in both 2017 and 2019 from Chitkara University, Punjab, India. In 2017, he
earned the Teacher Excellence Award in the category of “Most Enterprising,” and in 2019, the recognition was
bestowed upon him in the category of “Most Enterprising & Emerging Leader.”
Email: [email protected]
Abstract
With the help of AI-driven global talent prediction approaches, this research intends to propose a novel method for predict-
ing admissions to international graduate programs. Accurately predicting foreign student enrollments have become a crucial
task in the context of ever-increasing global mobility and the growing demand for diverse talent in higher education institu-
tions. Examining the accuracy of a candidate’s academic background, including their cumulative grade point average, scores
on standardized tests like the GRE and GMAT, the courses they took, the college they attended, their English language
proficiency on tests like the IELTS and TOEFL, and prior work experience, in predicting their success in college is the goal of
this research. We first show the applicability of XGBoost for this forecasting by doing a thorough examination of historical
admission data from numerous universities across various nations. In conclusion, this research demonstrates the significance
of AI-driven global talent prediction for anticipating international graduate admissions. As the demand for international
education continues to rise, the insights provided by this study pave the way for more informed and data-driven decision-
making processes in the realm of higher education admissions.
a
[email protected]
2 AI-driven global talent prediction
prediction tasks. Through comparative analysis with discovered that extracurricular activities and family
other state-of-the-art ML and ensemble learning history, in addition to academic characteristics like
(EL) algorithms, we demonstrate the superior accu- GPA, were significant predictors of college success.
racy, robustness, and interpretability of XGBoost Hillman et al. (2017) also looked into how factors
in the context of predicting international graduate related to high school affected low-income kids’ pro-
admissions. pensity to enroll in college. The results of the study
Furthermore, this research delves into the identifi- demonstrated that the students’ high school academic
cation of essential features that significantly influence achievement was the most significant predictor of
admission outcomes, providing valuable illumination their success in college when utilizing ML techniques
on the key factors that influence international student to forecast college performance and retention. They
enrollment decisions. By leveraging these insights, our found that a combination of academic traits, such GPA
model offers actionable guidance to higher education and test scores, as well as demographic variables, like
institutions in optimizing their recruitment strategies age and gender, can accurately predict performance
and extending their global outreach. in college (Yin et al., 2022). Afolabi et al. (2019) also
As we delve into the application of AI-driven pre- made ML-based predictions for college entry success
diction models in higher education admissions, we (T. Gera et al., 2021). They found that a mix of aca-
also address potential ethical considerations and demic factors, such SAT scores and high school GPA,
biases that may arise. Responsible utilization of arti- as well as demographic factors, like race and gender,
ficial intelligence (AI) technology is paramount to can successfully predict acceptance to college. Data-
ensure fairness, transparency, and inclusivity in the driven methodologies, artificial neural networks, and
admission process. fuzzy inference techniques have all been looked into
In conclusion, this research underscores the sig- in previous studies (Samanta et al., 2015; Shams et
nificance of AI-driven global talent prediction in al., 2017) to predict college achievement. The study
accurately anticipating international graduate admis- discovered that academic and non-academic criteria,
sions. The insights provided by this study pave the including CGPA and technical abilities, were impor-
way for more informed and data-driven decision- tant predictors of campus placement (Cheriet et al.,
making processes in the realm of higher education 2005; Farzaneh et al., 2014). Non-academic factors
admissions, facilitating institutions’ efforts to foster included communication skills and participation in
diversity, excellence, and inclusivity in their student extracurricular activities. Kanade et al. (2023) cre-
communities. ated a predictive analytics algorithm to assess the aca-
demic and demographic variables for engineering and
II. Related work technology admissions. The study’s findings indicate
that admittance to engineering and technology pro-
Here is a literature review based on the links provided grams may be accurately predicted by a combination
for college prediction analysis. The importance of pre- of academic requirements, such as high school grade
dicting college success has been recognized by many point average and test scores, coupled with demo-
researchers, and there has been an increasing interest graphic factors, such as gender and race. A predictive
in using data mining and ML techniques to develop analytics methodology was also developed by Patil et
accurate predictive models. In the research by Amin al. (2023) and colleagues to forecast campus place-
et al. (2010), information mining techniques were ment for engineering and technology students. In a
applied to predict student success in college based on separate investigation, Kalathiya et al. (2019) looked
demographic and academic data. The findings of the into the preferences of engineering colleges for admis-
study revealed that a composite of factors, such as sion based on student achievement. Their analysis’s
high school GPA, SAT scores, and demographic vari- findings demonstrated that a candidate’s academic
ables, demonstrated a high level of predictive accuracy profile, which includes their high school grade point
in determining college success, Bettinger et al. (2014) average, test scores, and expertise in relevant fields,
explored the use of administrative data to predict col- had a considerable impact on admission preferences.
lege graduation rates. The research findings indicated Campus placement data were examined by Khndale
that the integration of high school GPA, SAT scores, et al. (2019) using a supervised ML method. Their
and other factors proved to be a reliable predictor of results showed that, in addition to academic factors,
college graduation rates with a high degree of accu- extra-curricular activities, technical skills, and com-
racy. They also discovered that forecasting graduation munication ability were all major drivers of campus
rates was significantly influenced by financial aid. Yao placement. Collectively, these studies demonstrate
et al. (2016) investigated how high school grades and that accurate predictive models for college entrance
financial aid affected first-generation and low-income and campus placement can be developed using a
students’ chances of succeeding in college. They candidate’s academic background, which includes
Applied Data Science and Smart Systems 3
their high school grade point average, standard- procedures, such as LR, SVM, RM, and GB, among
ized test results, and topic knowledge. Data mining others. Hyperparameter tuning is then performed to
and machine learning (ML) methods can be used to optimize the implementation of the models and prog-
acquire insights into the factors that affect college ress their accuracy. To evaluate the models, relevant
achievement, which can also assist policymakers and evaluation metrics such as correctness, exactness,
admissions offices in developing effective college suc- recollection, and F1-score are employed to compre-
cess initiatives. hensively assess their performance. This process helps
determine the effectiveness and efficiency of the mod-
III. Objectives els in achieving the desired outcomes. Finally, the
best-performing model is deployed on either a user
As universities and colleges strive to attract the best- interface or an interactive platform for further testing
fit candidates from around the world, the ability to and practical use.
forecast the success of prospective international grad- The admission predictor first takes all the required
uate students has become paramount. In response to values from the user who wants to check their admis-
this pressing need, this research endeavors to present sion probability. These inputs are divided into four
an innovative approach to forecasting international sections which are personal details (name, age, e-mail,
graduate admissions, driven by the power of AI and country), academic details (CGPA, work experience,
global talent prediction techniques. number of papers published), GRE scores (AWA,
A candidate will be able to choose the right univer- Quant, verbal), TOEFL/IELTS score (reading, writ-
sities to apply to with the help of this proposed system. ing, listening, speaking). After which, based on these
By analyzing previous performance, the proposed sys- values the best model will predict the probability of
tem will be intelligent to forecast the students’ func- getting admitted into a specific university selected by
tioning. As proposed, the educational consultant will the user.
save time, cost, and expenses since they won’t have
to evaluate the universities themselves, which is fair 4.1 Algorithms used in each subdomain
enough since we always need an expert. Any candi-
date who is stressed and wants precise results will a. Logistic regression (LR)
benefit from increased accuracy. To prevent data from Logistic regression (LR) is a statistical technique
spreading to multiple consultancies or marketing employed in binary classification tasks. It estimates
agencies, data security will be a major concern. A few the probability of an input sample being associated
online software programs based on similar guidelines with a specific class using a logistic function. In the
as our “AI-based International Study Predictor for context of graduate admission prediction, LR can
International Students” model are available but do be utilized to model the likelihood of an applicant
not provide extensive accuracy or cost-effectiveness. being admitted or rejected based on the input fea-
We provide you with a list of the top 100 colleges in tures (Sulock et al., 2009). It enables the prediction of
the USA based on your profile evaluation. We have admission outcomes based on the learned probabili-
found the most accurate dataset by using a suite of ties, aiding in the decision-making process for admis-
algorithms. sion committees.
data point by finding the KNN in the feature space used in the context of graduate admission prediction
and assigning the label that appears most frequently to produce precise forecasts while quickly processing
among the k neighbors (Nunsina et al., 2020). In the and analyzing enormous volumes of data. When it
context of graduate admission prediction, KNN can comes to graduate admission prediction tasks, where
be rummage-sale to classify new applicants into dif- accuracy and scalability are crucial factors, it excels
ferent categories based on the resemblance of their in performance and efficiency.
features to those of the labeled samples. The value of k
is an important hyperparameter that can significantly h. AdaBoost (AB)
affect the performance of the KNN algorithm (R. Gill A well-known EL approach called AB iteratively
et al., 2020). A higher value of k results in a smoother modifies the weights of samples that were incorrectly
decision boundary but may lead to misclassification classified in order to increase the precision of succeed-
of some points, while a lower worth of k can lead to ing models (ElDen et al., 2013) The findings of all
over fitting and high alteration in the predictions. the models are combined to get the final projection.
When employed in the context of graduate admis-
d. Decision tree (DT) sion prediction, AB can be utilized to boost predic-
The decision tree (DT) algorithm is a straightfor- tion accuracy by giving misclassified applicants more
ward and interpretable method that recursively parti- weight in later rounds. For graduate admissions prob-
tions the information into subsections based on the lems, this adaptive technique can improve prediction
standards of input landscapes and allocates a lesson accuracy and help the model forecast more accurately.
label to each foliage node. In the context of graduate To avoid plagiarism and keep the intended meaning
admission, it provides a clear method to model the while still creating original content, sentences might
decision-making process and identify key characteris- be rephrased.
tics for prediction (Pandey et al., 2013). The DT is an
effective tool for prediction and explanation because i. Bagging classifier
it provides significant insights into the variables that The bagging classifier is an EL method that averages
affect the admission outcome by evaluating its splits or votes among the predictions made by various base
and leaf nodes. classifiers to get the final prediction. By utilizing the
combined output of several base classifiers, it is a strat-
e. Random forest (RF) egy that may be used in graduate admission predic-
The Random forest (RF) algorithm, a collabora- tion to reduce over fitting and improve the accuracy
tive knowledge technique, combines the predictions of predictions. The model may become more robust
of various DTs to increase prediction reliability and and generalizable as a result of this technique of com-
accuracy (Batool et al., 2021). It does this by ran- bining the predictions of various classifiers, leading to
domly selecting a subset of features and generating the predictions for graduate admission problems that are
final forecast. The accuracy of forecasts is increased in more precise. Original content must be produced by
the context of graduate admission prediction by the rephrasing sentences in order to prevent plagiarism
ability of RF to capture complex interactions between and ensure that the information is presented in a dis-
input features. tinctive manner.
compliance with ethical and legal considerations. generate results. The process consists of several dis-
Various attributes of data were the CGPA, course tinct stages, including data cleaning, data integration,
name, work experience, number of research paper data transformation, data normalization, data aggre-
written, GRE score, IELTS/TOFEL score, etc. The col- gation, and data analysis. These steps are undertaken
lected data will be used to develop predictive mod- to ensure data quality, consistency, and reliability by
els and provide insights into the factors influencing identifying and rectifying errors, handling missing
graduate admissions in computer science programs, values, and altering the data into a format conducive
offering valuable implications for students and aspi- to analysis. Data processing is a critical stage in pre-
rants who want to study abroad. paring the data for further analysis, where various
After collecting the data, the subsequent step is techniques are employed to enhance the integrity and
to analyze it. This step may involve using statistical usability of the data.
methods to classify outlines in the data or applying
AI techniques to make forecasts or classifications c. Aspect engineering
grounded on the data’s characteristics. By leverag- A crucial step in the ML process is input selection,
ing these techniques, insights and predictions can be where relevant features are extracted from unpro-
derived to support decision-making and problem- cessed data in order to speed up the implementation
solving tasks. It is essential to guide the analysis by of an AI model. Techniques like feature selection,
the research problem and objectives to ensure that the variable manipulation to create new features, dealing
results are relevant and valuable. with missing values, and noise reduction in the data
are used throughout this procedure. Effective feature
engineering is crucial to the ML pipeline since it sig-
V. Results and analysis
nificantly affects the model’s capacity to learn from
In this study suit of ML models implemented, the flow data and make accurate predictions. By strengthening
of the work is mentioned in Figure 1.1. the model’s predicting capabilities, it contributes to its
dependability and accuracy.
a. Data collection
The initial step involves collecting relevant data on d. Model selection
the different US-based institutions/universities. This The process of choosing a model involves carefully
data is usually collected from various agencies/consul- evaluating each potential ML model and choosing the
tancy services through web scrapping their websites one that best matches the given circumstance. Out of
like yocket, getmyuniversity, etc. Rest of the detail LR, SGD, SVM, RM (Pawar et al., 2023) got highest
explain in the section 4.2. accuracy with RM only which helps them in select-
ing the model. The precise issue being treated. The
b. Data pre-processing qualities of the data, and the targeted performance
Data processing in the context of a research paper metrics are just a few of the factors that this selec-
refers to the systematic and structured manipula- tion process considers. It requires a careful compari-
tion of raw data to extract meaningful insights and son and evaluation of the many models in order to
6 AI-driven global talent prediction
select the one that is most suited for the task in hand. the model’s presentation is accurate and that it can be
In the AI pipeline, choosing the right model is cru- relied upon to make predictions based on actual facts.
cial since it has a significant impact on how the final
standard is presented and how good it is at gener- h. Prediction
ating precise predictions or classifications. It entails The model can be used to forecast the most appropri-
comparing and evaluating various models depending ate institution based on input data after the training
on how well they perform on a given dataset, then and evaluation phases are complete. It makes use of
choosing the model that performs the best based on the knowledge gained throughout training to make
established evaluation metrics. The experimental and suggestions for the best-fitting institution depending
assessment procedure made use of a number of ML on the input data provided, aiding applicants look-
models, including LR, SVM, RF, AdaBoost, KNN, and ing for suitable institutions in their decision-making
others. Various models were taken into consideration processes. Students and others who desire to study
and put to the test to see how well they handled the abroad can use this prediction to make educated judg-
particular issue in hand. This required putting into ments regarding their admittance.
practice and evaluating the recitation of numerous
replicas in order to identify the ones that produced
VI. Discussion
good outcomes. Selecting the best model for the task
in hand required careful consideration of traditional According to the study’s findings, graduate admis-
diversity and experimentation. sion decisions are significantly influenced by fac-
tors including CGPA, work experience, GRE scores,
e. Model training research experience, and IELTS/TOFEL scores. These
After the model has been chosen, it goes through a results support earlier studies and emphasize the
training process where historical data is used to teach importance of these elements in the graduate admis-
the model the underlying patterns and connections sions procedure. The model created in this study can
between features and attributes. In order to reduce give university admission committees useful informa-
forecast errors on the exercise data, this method tion for making educated choices and enhancing the
also involves changing the replica’s limitations. The selection procedure for graduate programs. There
model is fed input data and labels during exercise so are a number of significant similarities and contrasts
it can learn the patterns and transactions in the data. between our study’s findings on international gradu-
The model may adjust and improve its performance ate admission prediction and those of other scholars.
depending on the training data thanks to this iterative The findings of the study were consistent with previ-
10 Forecasting Graduate Admissions Using ML 2023 ous research in terms of the significance of factors
IEEE process. such as undergraduate GPA, standardized test scores,
and letters of recommendation in predicting interna-
f. Tuning hyperparameters tional graduate admission outcomes. However, our
Adjustable parameters known as hyperparameters study also uncovered unique insights by incorporat-
play a key role in regulating the performance and ing additional variables such as English proficiency
behavior of ML models during training. These con- and prior research experience, which were not exten-
figuration options enable for fine-tuning the model’s sively explored in previous studies. Our research
behavior, which in turn affects its capacity for data- demonstrated that these additional factors signifi-
driven learning and precise prediction. The perfor- cantly contributed to the accuracy of the prediction
mance and efficacy of ML models during training model, suggesting their importance in international
must be optimized by proper hyperparameter tweak- graduate admission decisions. These differences high-
ing. Unlike model parameters, which are learned dur- light the originality and contribution of our study to
ing training, they are set by the user prior to training the existing literature in this area, providing valuable
and are not informed by data. Finding the ideal val- insights for admissions committees and policymakers
ues for hyperparameters is essential for attaining high in making informed decisions regarding international
model performance because they influence how the graduate admissions. Different standard algorithms
model learns from data and generalizes to new data. were experimented (LR, SVM, DT RF,KNN, etc.)
as well as more advanced and powerful algorithms
g. Model evaluation (XGBoost, AdaBoost, GB). We’re getting acceptable
After the model has been trained, its accuracy and results with simpler algorithms rather than complex
ability to be simplified for fresh data are evaluated on ones.
an independent test set. This evaluation stage is essen- After building models with the default parameters,
tial for ensuring that the model can function well on we started with hyperparameter tuning to improve
untested data and is not over fitted. It guarantees that the score even better. For this we choose bagging
Applied Data Science and Smart Systems 7
classifier which takes another algorithm as base esti- VII. Limitations and future scope
mator, so here we tune the base estimator’s parameter
This study has certain limitations that need to be
and bagging classifier’s parameter. Forecasting gradu-
acknowledged. Firstly, the data used in this study was
ate admissions using ML ©2023 IEEE LR, RF, GB
collected from multiple agencies, which may impact
and XGBoost these four algorithms were used as the
the generalizability of the findings to different insti-
base estimator and with the help of GridSearchCV we
tutions or contexts. It is important to note that the
tried different values (Figure 1.2). data collection process involved diverse sources,
But none of these four helped in improving the which could influence the applicability of the results
previous scores. Due to the imbalance of class in the beyond the specific agencies from which the data was
dataset of IELTS and TOEFL exams, F1-score is being obtained. Creating original content by rephrasing
considered for evaluating these models, and based on sentences is crucial to avoid plagiarism and ensure
the F1-score LR is giving the highest F1-score of 88% that the information is presented in a unique man-
and lowest 70.5% by SGD and all the other algo- ner. Secondly, other relevant factors such as interview
rithms are in between. Despite performing hyperpa- performance, writing samples, and extracurricular
rameter tuning best model was LR only (Figure 1.3). activities were not included in the analysis due to data
8 AI-driven global talent prediction
availability. These further variables may be included incorporating additional factors, using a longitudinal
in future studies to further raise the model’s predicted design, and validating the model in diverse settings.
accuracy. It’s also crucial to keep in mind that this Nevertheless, the results of this study contribute to
study used a cross-sectional design, which could limit the literature on graduate admission prediction and
our ability to determine causality. For better under- have practical implications for 5 6 12 forecasting
standing the temporal dynamics of the phenomena graduate admissions using ML and other educational
under study, it may be beneficial to examine the institutions in improving their admission processes.
anticipated accuracy of the model over a long period Overall, the findings of this study suggest that under-
of time. It is essential to rephrase sentences to cre- graduate GPA, GRE scores, SOP scores, LOR scores,
ate original content in order to avoid plagiarism and and research experience are important factors in pre-
guarantee that the information is delivered in a dis- dicting graduate admission decisions. By considering
tinctive and genuine way. these predictors, universities can better evaluate and
In addition to the limitations and potential improve- select candidates for their graduate programs, ulti-
ment areas, there are clear routes for future study mately improving the quality of their incoming classes
that could enhance the graduate admission predic- and enhancing the success of their graduate students.
tion model, particularly in the context of Internet of
Things (IoT) and federated learning. Federated learn- References
ing, a machine learning approach that enables many
institutions or organizations to cooperate develop Amin, DiVelez-Rendon, M., Segall, R. S., and Surry, D. W.
a common prediction model without sharing raw (2010). Predicting student success in college using
data mining techniques. J. Edu. Comp. Res., 43(3),
data, offers a tremendous potential. Since institutions
347–366. doi:10.2190/EC.43.3.
may be worried about preserving applicant privacy, Bettinger, E. P. and Baker, R. (2014). Predicting college
this strategy may be especially helpful for predicting graduation using administrative data: An exploratory
graduate acceptance. It is crucial to offer original and analysis. Center for Education Policy Analysis Work-
distinctive content in order to prevent plagiarism and ing Paper, 57. Retrieved from https://cepa.stanford.
ensure the accuracy of the information presented. edu/content/predicting-collegegraduation-using-ad-
Future research directions may include the use of ministrative-data-exploratoryanalysis.
federated learning approaches to build a prediction Yao, C. W. and Perna, L. W. (2016). Predicting college suc-
model for graduate admission using data from sev- cess for low-income and first-generation students: The
eral colleges while protecting the privacy and security role of high school performance and financial aid. Res.
of the data. Future studies might look into possible Higher Edu., 57(4), 395–421. doi:10.1007/s11162-
015-9373-3.
interactions between predictors, such as undergradu-
Hillman, N. W. and Frankenberg, E. L. (2017). Predict-
ate GPA, GRE scores, SOP scores, LOR scores, and ing college outcomes for low-income students:
research experience, to see if they have any bearing The role of high school academic and non-academ-
on graduate admission decisions. This could provide ic factors. Am. Edu. Res. J., 54(6), 1173–1203.
a deeper understanding of the complex interactions doi:10.3102/0002831217717957.
among different factors in the graduate admission Yin, Z., Qu, J., and Wang, X. (2022). Predicting college
process and further refine the predictive model. performance and retention using machine learning
techniques. Edu. Sci., 10(4), 90. doi:10.3390/educ-
sci10040090.
VIII. Conclusion Afolabi, O. O. and Egunjobi, O. O. (2019). Predicting col-
In summary, the current study utilized multiple clas- lege admission success using machine learning tech-
sification analysis to develop a predictive model for niques. Proc. World Cong. Engg. Comp. Sci., 1, 732–
graduate admission. Creating original content and 737. Retrieved from https://www.researchgate.net/
publication/337316071_Predicting_College_Admis-
avoiding verbatim replication of sentences is essen-
sion_Success_Using_Machine_Learning_Techniques.
tial to maintain academic integrity and prevent Samanta, S. K. and Pal, T. (2015). Predicting academic per-
plagiarism. The results showed CGPA, work experi- formance of college students using fuzzy inference
ence, GRE scores, and research experience, IELTS / system. Comp. Elec. Engg., 46, 56–66. doi:10.1016/j.
TOFEL scores were significant predictors of graduate compeleceng.2015.03.003.
admission decisions. The model had a good fit and Shams, S., Yang, W., and Wang, X. (2017). A data-driven
explained approximately 85.2% of the variance in approach for predicting college success: Model-
graduate admission outcomes. These findings provide ing student enrollment and graduation outcomes.
valuable insights for university admission committees Comp. Human Behav., 76, 1–14. doi:10.1016/j.chb.
to make informed decisions and enhance the selec- (2017).06.002.
tion process for graduate programs. Further research Gill, R. and Singh, J. (2020). A review of neuromarketing
techniques and emotion analysis classifiers for visual-
could expand on the limitations of this study by
Applied Data Science and Smart Systems 9
emotion mining. In 2020 9th International Confer- analyze android ransomware. Security and Communi-
ence System Modeling and Advancement in Research cation Networks. vol. 2021, Article ID 7035233, 22.
Trends (SMART). 103–108. IEEE, 2020.doi: 10.1109/ https://doi.org/10.1155/2021/7035233
SMART50582.2020.9337074 Andris, C., Cowen, D., and Wittenbach, J. Support vec-
Farzaneh, M. and Mozaffari, F. (2014). Predicting col- tor machine for spatial variation. Trans. GIS, 17(1),
lege performance using data mining techniques. Int. 41–61.
J. Inform. Edu. Technol., 4(1), 11–14. doi:10.7763/ Tulus, N. and Situmorang, Z. (2020). Analysis optimization
IJIET.2014.V4.338. K-nearest neighbor algorithm with certainty factor in
Cheriet, F. and Sakka, W. Y. (2007). Predicting academic determining student career. 2020 3rd Int. Conf. Mec.
success of college students using artificial neural net- Elec. Comp. Indus. Technol. (MECnIT), 306–310.
works. Int. J. Inform. Technol. Dec. Making, 6(4), doi: 10.1109/MECnIT48290.2020.9166669.
601–616. doi:10.1142/S0219622007002680. Pandey, M. and Sharma, (2013). A decision tree algorithm
Anuradha, K., Sachin, B., Shantanu, K., and Niraj Jain. pertaining to the student performance analysis and
(2023). Artificial intelligence and morality: A social prediction. Int. J. Comp. Appl., 61(13), 1–5.
responsibility. J. Intel. Stud. Bus., 13(1), https://doi. Batool, S., Rashid, J., Nisar, , Kim, J., Mahmood, T., and
org/10.37380/jisib.v13i1.992. Hussain, A. (2021). A random forest students’ per-
Patil, C. H., Meenal, J., Sachin, B., Patel, P. G, Mrunali, P., formance prediction (rfspp) model based on students’
and Vanshita, N., Anannya, S., and Dipti, P. (2023). demographic features. 2021 Mohammad Ali Jinnah
Handwritten English Character Recognition using University Int. Conf. Comput. (MAJICC), IEEE, 1–4.
CNN. Grenze Int. J. Engg. Technol. IJRAR September Saidani, O., Menzli, , Ksibi, A., Alturki, N., and Alluhaidan,
2018, 5(3), 2198–2204. (2022). Predicting student employability through the
Kalathiya, D., Padalkar, R., Shah, R., and Bhoite, S. (2019). internship context using gradient boosting models.
Engineering college admission preferences based on IEEE Acc., 10, 46472–46489.
student performance. Int. J. Comp. Appl. Technol. Asselman, A., Khaldi, M., and Aammou, S. (2021). Enhanc-
Res., 8(9), 379–384. ISSN: 2319-8656. doi:10.7753/ ing the prediction of student performance based on
IJCATR0809.1009. the machine learning XGBoost algorithm. Interact.
Khndale, S. and Bhoite, S. (2019). Campus placement ana- Learn. Environ., 1–20.
lyzer: Using supervised machine learning algorithms. ElDen, A. S., Moustafa, M. A., Harb, H. M., and Emara,
Int. J. Comp. Appl. Technol. Res., 8(9), 358–362. A. H. (2013). AdaBoost ensemble with simple genetic
ISSN: 2319-8656. doi:10.7753/IJCATR0809.1004. algorithm for student prediction model. Int. J. Comp.
Sulock, M. (2009). An Application of Binary Logistic Re- Sci. Inf. Technol., 5(2), 73.
gression to College Admissions Data. Montana: Mon- Pawar, D., Mahajan, A., and Bhoite, S. (2019). Wine qual-
tana State University. 1–39. ity prediction using machine learning algorithms. Int.
Gera, T., Singh, J., Mehbodniya, A., Webber, J. L., Shabaz, J. Comp. Appl. Technol. Res., 8(9), 385–388. ISSN:-
M., and Thakur, D. (2021). Dominant feature selec- 2319–8656.
tion and machine learning-based hybrid approach to
2 English accent detection using hidden Markov model
(HMM)
Babu Sallagundla, Kavya Sree Goginenia and Rishitha Chiluvuri
Velagapudi Ramakrishna Siddhartha Engineering College, Vijayawada, Andhra Pradesh, India
Abstract
Machine learning techniques are widely used for accent classification. Due to the accent, the pronunciation differs, and that
leads others to think of it as a different language. In this case, classifying the accents in a language helps identify it as a
specific language. This paper identifies the Indian, American, and British English accents. Initially, the model processes the
input speech signals, removes noise, and converts them into a format suitable for the Mel-Frequency Cepstral Coefficients
(MFCCs) processing. And then, the features are extracted using the MFCCs. These extracted features are used to train the
Hidden Markov Model (HMM) which uses labeled speech samples. The trained HMM model is tested and is used to predict
the accent of an input speech sample. Most researchers are using the Convolution Neural Network (CNN) for classification.
In order to improve the efficiency of the model, we are using HMM.
Keywords: Accent classification, Mel-Frequency Cepstral Coefficients (MFCCs), Hidden Markov Model (HMM)
[email protected]
a
Applied Data Science and Smart Systems 11
NLP is used in the study of how the computer experiments conducted in Bangladesh. It offers a
systems and human language interact. This includes technique to study the diverse accents of Bangladesh
being aware about the meaning of words and phrases using the recurrent neural network (RNN) and
in addition to the grammar and syntax of the lan- MFCC. By listening to people from different regions
guage. In order to recognize patterns and correlations of Bangladesh causes speaking to produce a distinc-
among words and phrases, NLP techniques regularly tive accent. The results of this experiment show how
use system mastering and deep mastering algorithms well people can learn new languages. Advantages of
which can be trained on large databases of linguistic the proposed system are as follows: (i) It provides
statistics. an accuracy of about 98.3% which is better than
other researches. (ii) The proposed method has been
1.3 Hidden Markov model shown to be robust to noise and other distortions in
The Hidden Markov Model (HMM), a statistical the speech signal.
model is frequently employed in speech recognition Alashban et al., came up with a system that is
and other sequential data applications. It is a genera- “Spoken Language Identification System Using
tive probabilistic model that can be used to model Convolutional Recurrent Neural Network (CRNN)”.
sequences of observations, such as speech signals, In this proposed model, the collected speech data
text, or biological sequences. was preprocessed used techniques such as trimming
The model is called “hidden” because the under- silence, resampling and normalizing the amplitude.
lying state of the system generating the sequence is Mel-Frequency Cepstral Coefficient is used for fea-
not directly observable. Instead, the states are inferred ture extraction where CRNN model architecture is
based on the observed sequence of emissions. The used. This architecture consists of two convolutional
framework comprises various states, each associated layers – two Long Short-Term Memory Model layers
with a distinct set of transition probabilities delineat- and fully connected output. The comparison is made
ing connections between states. Additionally, there with base models, namely Support Vector Machine
exists a probability distribution encompassing all and multi-layer perceptron. The report consists of
potential observations within the model. terms of accuracy and other evaluation metrics. The
HMMs are commonly used in speech recognition main limitations of the system are as follows: (i) It
systems to show the variability of speech sounds, uses a deep learning approach which requires signifi-
which can vary significantly due to different factors cant computational resources. (ii) They made use of
such as speaker, accent, and context. By modeling small dataset.
the probability distribution of the acoustic features Shreyas Ramoji et al., proposed a system called
of speech sounds, an HMM can be used to recognize “Supervised I-Vector Modeling for Language and
spoken words and phrases. Accent Recognition”. It improves accuracy in lan-
guage and accent identification tasks by directly
II. Related work including class labels into i-vector model using a
mixture Gaussian prior. The primary detection value
Z. S. Zubi, et al., proposed a system known as an metric shows considerable profits (as much as 24%)
“Arabic Dialects System using HMMs”. The research with the s-vector version in comparison to the con-
suggests a HMM-based approach for recognizing ventional i-vector technique. The key blessings of this
Arabic dialects. Mel-Frequency Cepstral Coefficients model are as follows: (i) Accuracy is high while com-
(MFCCs) which are extracted from the speech stream pared to different research studies where it gives a
and used to train HMM models for each dialect. mathematical formula. (ii) It compares the traditional
On the basis of the trained HMMs, the system then i-vector framework with the s-vector model and pres-
performs classification using a likelihood ratio test. ents an intensive examination of the latter. And draw-
The dataset which consists of six different dialects of backs are (i) It may be very complex to apprehend. (ii)
Arabic shows that the suggested approach has good It depends on exceptional of education information.
recognition accuracy. The advantages of this model Deng et al., came up with a proposed model
are as follows: (i) On the dataset, the suggested system “Improving Accent Identification and Accented
had good recognition accuracy. (ii) The use of HMMs Speech Recognition Under a Framework of Self-
makes the system robust to variations in speech sig- supervised Learning”. They used a technique called
nals, such as noise and channel distortion. Self-Supervised Contrastive Learning (SSCL). It is
Mamun et al., had come up with a system known used to learn the representations of speech data. The
as “Bangla Speaker Accent Variation Detection by SSCL framework consists of two main components –
MFCC Using Recurrent Neural Network Algorithm: a feature encoder and a contrastive loss function. They
A Distinct Approach”. They have outlined many have also used Automatic Speech Recognition (ASR)
types of regional language accent recognition model. It is used to learn representations as input
12 English accent detection using hidden Markov model (HMM)
features. The limitations of this model are as follows: IV. Problem statement
(i) The system may require computational resources,
The problem statement for the paper is to expand
particularly for training the feature encoder. (ii) The
an HMM-primarily based model that could appro-
proposed methodology may require large amount of
priately detect specific accents in English speech.
unlabeled speech data for learning feature encoder.
Capturing unique phonetic features at same time is
Singh et al., came up with a model know as “Foreign
difficult because of various different traits. However,
Accent Classification using Deep Neural Nets”. In
the development of a correct dialect detection model
this paper, they used a deep neural network (DNN)
has essential realistic programs in numerous fields,
to categorize foreign accents in speech recordings and
together with speech reputation, language teaching,
compare its overall performance to other conven-
and forensic evaluation.
tional techniques. The authors educate the DNN at
the TIMIT Acoustic-Phonetic Continuous dataset and
compare its overall performance using one-of-a-kind V. Proposed Model
class metrics. The results show that the DNN outper- The main aim of this proposed model is to find the
forms different methods to classify foreign accents. accents of English language. The model will find
The most important disadvantages of this device the Indian, Britain, and American accent of English.
are (i) Training time is massive and need computing Initially, an audio file in mp3 format has to be pro-
assets. (ii) Dataset does not include many accents. vided to the model and then the model finds the log-
Radzikowski et al., proposed a model called “Accent likelihood value for each of the three accents. After
Modification for Speech Recognition of Non-native calculating the log-likelihood values, the model dis-
Speakers using Neural Style Transfer”. In this model, plays the accent with high log-likelihood value.
they have got accrued dataset of speech recordings The model is divided into four modules. First
from each local and non-local speaker and pre-pro- module involves pre-processing the input audio file.
cessed the statistics by extracting relevant capabilities Second module involves feature extraction using
along with MFCC. Then they educated a DNN to MFCCs. Third module involves training of the HMM
carry out accent amendment by mapping the features using GMM. Forth module involves testing.
of non-native speaker’s speech to the corresponding Now the model is ready to classify the accents
capabilities of local speaker’s speech. Disadvantages into Indian, Britain, and American accent. Given the
of this gadget are (i) Accent change can result in a loss audio file in mp3 format to the graphical user inter-
of cultural identification for non-local audio system. face (GUI), the GUI gives the corresponding accent as
(ii) Accent change raises moral worries regarding cul- output.
tural and linguistic range.
Joseph et al., proposed a system known as 3.1. Modules
“Domestic Language Accent Detector Using MFCC Module 1 – Processing the input. In this module the
and GMM”. Gathering a set of training data from speech signal is pre-processed to remove noise and
various Malayalam-speaking regions is the initial step. converted into suitable format for further processing.
Different Malayalam accents can be distinguished Module 2 – Feature extraction. In this module,
using MFCCs. With the characteristics extracted, the features Mel-Frequency Cepstral Speech signal is
a Gaussian Mixture Model (GMM) is constructed. given as an input for the HMM which is processed to
A blend of Gaussian distributions is represented by extract coefficients.
the probabilistic GMM model. With the assist of Module 3 – Training the model. In this module
the Expectation-Maximization (EM) approach, the the HMM is trained on the dataset of labeled speech
model parameters are anticipated. The MFCC fea- samples. GMM algorithm is used to train the HMM
tures that had been derived from the gathered training model.
information are used to teach the GMM model. With Module 4 – Testing. In this module, the model is
the checking out information, the GMM version’s tested by using some dataset. And finally when the
accuracy is assessed. input is given, the output is generated.
Figure 2.1 shows the proposed model. The figure
III. Objectives shows first the input audio files in mp3 format of the
human. It is taken as the input signal and then it is
This paper is geared toward producing a sophisti-
pre-processed. It removes the noise if any present.
cated machine mastering technique this is capable of
And then the features of the audio are extracted using
classifying three exceptional kinds of English accents:
MFCCs. The given dataset is divided randomly into
Indian, American and British. Another objective is
training and testing datasets. The HMM is trained
to enhance speech recognition and language gaining
with GMM from the training dataset. And then the
knowledge.
Applied Data Science and Smart Systems 13
model is tested using testing dataset and accuracy is 7. Compute the log-likelihood of the test audio file
calculated. Finally, the model is ready. for each class HMM.
An audio file is given as input to the model. The 8. Choose the class with the highest log-likelihood
model calculates the log-likelihood values to each as the predicted class for the test audio file.
accent. The accent with more log-likelihood value is 9. Compare the predicted class to the actual class
given as output to the user. label for the test audio file to compute accuracy.
10. Repeat steps 2–5 for all test audio files.
3.2. Algorithms 11. Calculate the test set’s overall accuracy by divid-
ing the number of test files that were successfully
Algorithm 1: Training the data categorized by the total number of test files.
1. Start 12. Stop
2. Import all the required packages.
3. Set the number of classes and HMM states. Algorithm 3: GUI
4. Define the file paths to the data.
5. Define the function to extract features using MF- 1. Start
CCs from audio files. 2. Import all the required packages.
6. Define the function to pre-process the data by 3. Create a window with the required title.
computing the mean MFCCs for each audio file 4. Add a label asking the user to choose an audio
in a directory. file.
7. Define the training and testing ratios. 5. Now add the button correspondingly.
8. Split the data into training and testing sets for 6. Define a function that takes the input file from
each class. the user and shows the English accent in that file.
9. Train a Gaussian HMM for each class on the 7. In the function defined, pass the input audio file
training data using the HMMlearn library. to the model that is built earlier.
10. Stop 8. Display the English accent to the user.
9. Stop
Algorithm 2: Testing the data
VI. Result and analysis
1. Start
To examine the effectiveness of the proposed model
2. Import all the required packages.
in figuring out accents of the English language,
3. Create a sample data set from the test data set.
numerous audio files in mp3 format has been
4. Pre-process each file in the dataset that is split-
provided as input. The model successfully com-
ted.
puted the likelihood values for each of the three
5. Load the pre-trained HMM models for each
accents: Indian, British, and American accent. The
class.
log-likelihood values were then compared and the
6. For each test audio file, extract its MFCC fea-
accent with the highest log-likelihood value was
tures.
14 English accent detection using hidden Markov model (HMM)
Figure 2.7 shows the spectrogram representation visualizing and understanding the acoustic proper-
of the proposed model. The spectrogram presents a ties of different accents. It allows for a comprehensive
visual representation of the audio signals showing the analysis of the frequency bands and spectral charac-
frequency and depth components over time. This rep- teristics that contribute to accent variations.
resentation plays a crucial role in accent identification
as it offers valuable insights into the precise acoustic VII. Conclusion
patterns function of different accents. The spectro-
gram output represents a significant leap forward in In conclusion, the use of HMMs for English accent
the area of accent detection, contributing to improved detection is explored. Promising results are achieved
language understanding, cross-cultural communica- by utilizing HMMs to model the acoustic characteris-
tion, and the broader study of linguistic variations tics of different accent. Through the training process,
within English accents. a unique patterns and transitions present in various
Figure 2.8 provides a visual representation of the English accents is captured, thereby distinguishing
extracted MFCC features showing the distribution between them effectively.
and patterns of the coefficients for each audio sample. By leveraging HMMs, we have demonstrated the
The graph of MFCCs serves as a powerful tool for potential of this approach for accent detection. The
16 English accent detection using hidden Markov model (HMM)
HMM framework provides a robust and flexible Elizabeth, N., Steedman, M., and Goldwater, S. (2020). The
method for modeling temporal dependencies and cap- role of context in neural pitch accent detection in Eng-
turing the variability in speech signals. It has proven lish. arXiv preprint arXiv:2004.14846. Doi - https://
to be particularly suitable for accent classification doi.org/10.48550/arXiv.2004.14846
Al-Jumaili, Zaid, Tarek Bassiouny, Ahmad Alanezi, Wasiq
tasks due to its ability to handle sequential data.
Khan, Dhiya Al-Jumeily, and Abir Jaafar Hussain.
Although the work has yielded encouraging results,
(2022). Classification of Spoken English Accents Using
there is still ample room for improvement and fur- Deep Learning and Speech Analysis. In International
ther exploration in the field of English accent detec- Conference on Intelligent Computing Methodolo-
tion using HMMs. After uploading the audio files to gies. ICIC 2022. Lecture Notes in Computer Science.
the GUI, it predicts the accent. Our future work is to 13395, 277–287. Cham: Springer International Pub-
convert it into web application. It’s also been trying to lishing, 2022. doi: https://doi.org/10.1007/978-3-031-
improve the accuracy thereby to identify the language 13832-4_24
spoken in the audio file. China. (2022). Proceedings, Part III. Cham: Springer Inter-
national Publishing, 2022.
Guntur Radha, K., Krishnan, R., and Mittal, V. K. (2020). A
References system for automatic regional accent classification. In
Zubi, Z. S. and Idris, E. J. Arabic Dialects System using 2020 IEEE 17th India Council International Confer-
Hidden Markov Models (HMMs). WSEAS TRANS- ence (INDICON). 1–5.
ACTIONS ON COMPUTERS. 21. 304–315. doi: Veranika, M. et al. (2022). Language accent detection with
10.37394/23205.2022.21.37. CNN using sparse data from a crowd-sourced speech
Mamun, R. K., Abujar, S., Islam, R., Badruzzaman, K. B. archive. Math., 10(16), 2913.
M., and Hasan, M. (2020). Bangla speaker accent Sami, M. and Habbash, M. (2021). Study of the influence of
variation detection by MFCC using recurrent neural Arabic mother tongue on the English language using
network algorithm: A distinct approach. In: Saini, H., a hybrid artificial intelligence method. Interact. Learn.
Sayal, R., Buyya, R., Aliseri, G. (eds). Innovations in Environ., 1–14.
Computer Science and Engineering. Lecture Notes in Keith, G. (2023) . Accent adjustment based on spoken feed-
Networks and Systems, vol 103. Singapore: Springer. back. Tech. Disclos. Comm.
https://doi.org/10.1007/978-981-15-2043-3 59 Nugroho, K., Winarno, E., Zuliarso, E., and Sunardi.
Alashban, A. A., Qamhan, M. A., Meftah, A. H., Alotaibi, (2023). Multi-accent speaker detection using normal-
Y. A. (2022). Spoken language identification system ize feature MFCC neural network method. J. RESTI
using convolutional recurrent neural network. Appl. (Rekayasa Sistem Dan Teknologi Informasi), 7(4),
Sci., 12, 9181. https://doi.org/10.3390/app12189181. 832–836.
Ramoji, S. and Ganapathy, S. (2020). Supervised I-vector Lan, Y., Xie, T., and Lee, A. (2023). Portraying accent ste-
modeling for language and accent recognition. Comp. reotyping by second language speakers. PLoS ONE,
Speech Lang., 60, 101030. ISSN 0885-2308. https:// 18(6), e0287172.
doi.org/10.1016/j.csl.2019.101030. Klumpp, Philipp, Pooja Chitkara, Leda Sarı, Prashant Serai,
Keqi, D., Cao, S., and Ma, L. (2021). Improving accent Jilong Wu, Irina-Elena Veliche, Rongqing Huang, and
identification and accented speech recognition under a Qing He. (2023). Synthetic Cross-accent Data Aug-
framework of self-supervised learning. arXiv preprint mentation for Automatic Speech Recognition. arXiv
arXiv:2109.07349. preprint vol. arXiv:2303.00802 1–5. Doi: https://doi.
Utkarsh, S. et al. (2020). Foreign accent classification using org/10.48550/arXiv.2303.00802
deep neural nets. J. Intel. Fuzzy Sys., 38(5), 6347–6352. Dylan, W., Dev, S., and Nag, A. (2023). Hilbert-Huang-
Radzikowski, K., Wang, L., Yoshie, O. et al. (2021). Accent transform based features for accent classification of
modification for speech recognition of non-native non-native English speakers. 2023 34th Irish Sig. Sys.
speakers using neural style transfer. J. Audio Speech Conf. (ISSC). IEEE.
Music Proc., 11. https://doi.org/10.1186/s13636- 021- Margot, M. and Carson-Berndsen, J. (2023). Investigating
00199-3. Phoneme Similarity with Artificially Accented Speech.
Joseph, A. P. (2020). Domestic language accent detector us- In vol. Proceedings of the 20th SIGMORPHON
ing MFCC and GMM. Int. J. Appl. Engg. Res., 15(8), workshop on Computational Research in Phonetics,
800–803. Phonology, and Morphology, 49–57. doi: 10.18653/
Khanal, S., Johnson, M. T., Soleymanpour, M., and Bozorg, v1/2023.sigmorphon-1.6
N. (2021). Mispronunciation detection and diagno- Zuluaga-Gomez, J. et al. (2023). CommonAccent: Explor-
sis for Mandarin accented English 30 speech. 2021 ing large acoustic pretrained models for accent clas-
Int. Conf. Speech Technol. Human Comp. Dialog. sification based on common voice. arXiv preprint
(SpeD), Bucharest, Romania, 62–67. doi: 10.1109/ arXiv:2305.18283.
SpeD53181.2021.9587408. Carlos, F. and Polzehl, Y. (2023). Domain Adversarial Train-
Arya, R., Singh, J., Kumar, A. (2021). A survey of multi- ing for German Accented Speech Recognition. Ger-
disciplinary domains contributing to affective com- man Acoustics Society, 1413–1416.
puting. Comp. Sci. Rev., 40. https://doi.org/10.1016/j.
cosrev.2021.100399.
3 Study of exascale computing: Advancements, challenges,
and future directions
Neha Sharmaa, Sadhana Tiwari, Mahendra Singh Thakur, Reena Disawal
and Rupali Pathak
Prestige Institute of Engineering Management and Research, Indore, India
Abstract
Exascale computing is the high performance computing system that can measure quintillion calculations per second. It is
capable to perform the calculations of 1018 floating point operations (FLOPS) per second. It is the term given to the next
50–100 times increased speed over very fast super computers used today. High performance computing application helps
to simulate large scale application, machine learning, artificial intelligence, industrial IoT, weather forecasting, healthcare
industries and many more. The increased computational power will enable researchers to tackle more complex problems,
collects and analyze larger data sets, perform simulations with high accuracy and resolutions. Exascale computing has the
power to transform scientific research, spur innovation, and tackle complex issues that were previously computationally
impractical. This paper describes a brief description, architecture and various applications of exascale computing such as
healthcare, microbiome analysis, etc. This paper also presents the future and research aspects of exascale computing.
Keywords: High performance computing, exascale computing, super computers, parallel processing, data analytics, computer
architecture
[email protected]
n
18 Study of exascale computing: Advancements, challenges, and future directions
Table 3.1 Technological overview of exascale system
up to eight Dynamic Random Access Memory hardware. EC has various technical challenges such as
(DRAM) module which are connected through power consumption, memory management, parallel-
two channels per module. It includes silicon in- ism, fault tolerance, and scalability (John et al., 2011;
terposer base die with a memory controller and Pete et al., 2012; Judicael et al., 2015; Mahendra et
interconnected through-silicon via (TSVs) and al., 2020; Matthew et al. 2020). In literature, authors
microbumps. Double Data Rate (DDR) memo- Matthew et al. (2020), Maxwell et al. (2021), Francis
ries are generally off-chip dual-in line memory et al. (2020), John et al. (2011) have discussed vari-
modules means they are separated from CPU die. ous benefits, opportunities and challenges in EC.
HBM offers low latency and has high through- Fabrizio et al. (2019) reviewed the political and social
put as compared to DDR because it is close to aspects of exascale computing along with history of
the processor die. HPC architecture. Peter et al. (2013) and Martin et
al. (2019) have explained the requirement analysis of
II. Related work exascale based on cases use. Author has described ref-
erence architecture and technology-based architecture
Enormous research is going on HPC technology to of the process project in EC. Martin et al. (2019) have
improve the performance of high speed application. In proposed novel hardware designs and architectures
2018, exascale system was introduced which performs that can deliver exascale performance while maintain-
calculation of 1018 FLOPS (Matthew et al., 2020). ing energy efficiency and reliability. Peter et al. (2013),
Exascale system helps to simulate high speed applica- Martin et al. (2019) authors summarized the differ-
tions such as healthcare industry, industrial IoT, data ent challenges in operating system such as technical,
analytics and many more (Levent Gurel et al., 2018; business and social for exascale system. This includes
Tanmoy et al., 2019; Francis et al., 2020). Tanmoy research on resource management, job scheduling,
et al. (2019) described that how artificial intelligence power management, fault tolerance.
(AI), Big data and HPC helps to discover new drug
with reduce cost and minimize development cost.
III. Architecture of EC
Francis et al. (2020) explored the role of EC in dif-
ferent areas such as microbiome analysis, healthcare In view of the requirement of different industry, the
industry, chemistry and material applications, data architecture of exascale is divided in to three groups:
analysis and optimization applications, energy appli- virtualization, data and computing requirement (Peter
cation, earth and space science applications and many et al., 2013; Martin et al., 2019). The exascale com-
more. Tanmoy et al. (2019) explained how EC tech- puting architecture is shown in figure 3.1.
nique and AI helps to predict the cancer and tumor In virtualization layer, virtualization requirements
response in advance. Exascale computing enables are taken directly from the application basis of our
engineers and researchers to design, optimize, and test user communities-container support that provides
new products and technologies more efficiently and lightweight virtualization method similar to app
quickly. In his paper, L. Gurel et al. (2018) reviewed packages. Advantages of this technique are flexibil-
that contribution of EC in autonomous driving and ity, reliability, ease of deployment and maintenance.
how EC reduces the software complexity with available User applications require to be distributed across a
Applied Data Science and Smart Systems 19
devices collect enormous amounts of patient infor- These models can be expanded upon in order to
mation from sensors and data storage in the cloud. enhance pre-clinical drug testing and accelerate
The cloud provides large storage that is cheaper and cancer patients’ access to drug-based therapies.
requires high computing power that assists in the data 2. RAS (Rat sarcoma virus) pathway issue 2.
analysis process. In short, accelerating drug discovery 3. Planning for a treatment approach.
with AI, HPC and Big data (Francis et al., 2020):
In order to predict treatment response, compli-
• Current processes for drug discovery are time cated, indirect interactions between drug structures
consuming and expensive. and tumor structures are captured using supervised
• Cutting-edge technologies such as artificial intel- mechanical learning techniques to address drug
ligence, HPC and Big data will reshape method of responses. Using the history of past simulations, the
drug discovery (Tanmoy et al., 2019). RAS technique uses multi-tasking to search a large-
• Requires high computing hardware power results scale space to define the scope of a series of simu-
for the ability to model further drug progress be- lations. Machine learning (ML) models are used to
fore moving on to clinical trials. automatically read and compile millions of clinical
records in order to deal with the treatment approach.
B. Dynamic stochastic power grid Direct conclusions about are provided by ML models.
ExaSGD application is used to preserve the integrity Every issue calls for a distinct approach for to inte-
of power grids and address load imbalances. With the grate the learning, yet they are all supported by the
help of this programe, the grid’s real-time response same CANDLE environment.
optimization against probable disruption occurrences Python library, the runtime manager, and a set of
is created using models and algorithms. ExaSGD deep neural networks are all included in the CANDLE
serves power grid operators and planners and is based package. Tensor Flow, PyTorch, and deep neural
on exascale computing. networks that download and represent three issues
Power grids keep the supply and demand for are employed for exascale computing, with a run-
electricity in balance. Attacks on the grid, whether time supervisor organizing the distribution of work
physical or digital, can result in costly power grid throughout the HPC system. Performance features
components being permanently damaged or experi- include semi-automated uncertainty quantification,
encing large-scale blackouts. Load shedding is utilized large-scale search for hyper parameters, and auto-
to prevent generation-load imbalance and maintain matic search for best model performance.
the functionality of the power grid (Francis et al., Exascale challenges are represented in the urgent
2020). requirement to train many related models. Each test
Cyber-enabled control and sensing, plug-in stor- application’s demand results in cutting-edge models
age devices, censored elements, and smart meters that span the speculative space (which is not specific
managed automatically and remotely can all have an to the idea of an accurate medicine).
impact on how the electrical grid behaves. To avoid
generation and load shedding at the moment, load D. Microbiome analysis
shedding is employed. Using simulations, the ExaSGD Microbial species are important part of our ecosys-
tool offers additional ideal configurations for resolv- tem. They are influencing various domains such as
ing generation-load imbalance. This method enhances agricultural production, pharmaceutical and also
the electricity grid’s ability to recover from various used to make oils, medicines and other products. To
risks (Francis et al., 2020). study and gather information about the microbe’s
genome, sequence methods are used. In genome
C. Deep learning (DL) enabled the precise cure for sequencing, Metagenomics data are larger and more
cancer plentiful results in increased cost of computation. As
Project “CANDLE application” was started by the a solution, the ExaBiome application develops data
DOE and NCI (National Cancer Institute) of the NIH integration tools with high computing power (Francis
(National Institutes of Health). The goal of this proj- et al., 2020).
ect is to develop CANDLE (Cancer Learning Area), Metagenomics is a domain that explores functional
an amazing and in-depth learning environment for and structural details of the microbiome. Metagenome
exascale programs. Three key challenges are being integration, protein synthesis and signature-based
addressed by the CANDLE programe (Tanmoy et al., methods are three major computational problems
2019; Francis et al., 2020): faced in bioinformatics domain. ExaBiome attempts
to provide measurable tools for above stated prob-
1. Find a solution for the drug response issue and lems. Metagenome integration means capturing raw
create models for predicted drug responses. data sequences and generates long gene sequences
22 Study of exascale computing: Advancements, challenges, and future directions
and signature-based methods enable comparable and composition. The cornerstone for comprehending
effective metagenome analysis (Francis et al., 2020). engineering structures, materials, and energy science
MetaHipMer, a well-known metagenome compiler is structural strengths and heterogeneities, or con-
created by the ExaBiome team, scales thousands of formational mutations in macromolecules. Single-
computers in contemporary petascale-class architec- particle imaging (SPI) and X-ray scattering variation,
ture. Additionally, a sizable ecological database has which are non-crystalline based diffractive imaging
been created. To take advantage of the chance for techniques, may see and analyses these structural het-
enhanced node compatibility with memory structures, erogeneity and variations. This characteristic encour-
including GPUs, work is being done on measurable ages interest in the creation of X-ray free-electron
upgrades across nodes and node level improvements. lasers. Effective data processing, fragmentation pat-
With other collaborators, MetaHipMer exhibits terns, and reconstruction of 3D electron cones, how-
competitiveness. The second long-term compiler is ever, enable the visualization of structural changes
also being developed and has a significantly larger over time (Francis et al., 2020).
computer density, making it well suited to exascale The problem with ExaFEL is to devise an auto-
systems even though MetaHipMer is made for short matic analysis pipeline for single-part imaging using
reading data (Illumina) and is meant for long-term different techniques. This requires the reconstruction
data. HipMCL, the second code from ExaBiome, of a 3D cell structure from 2D separating images.
offers a way to measure proteins. The structure of This conversion is done by new Multi-Tiered Iterative
protein families in the billions of proteins may be seen Phasing (M-TIP) algorithm.
thanks to HipMCL, which has thousands of nodes. Diffraction images from distinct particles are gath-
These codes are based on typical compound patterns ered in SPI. The production of molecules (or atoms)
with flexible character unit (DNA or protein) algo- and cohesive areas (or comparable particles) under
rithm alignment, minimal layout, calculation, and specific operating circumstances is also assessed using
analysis of fixed-length strands, as well as a range these diffraction images. Since the shapes and condi-
of graphs and small matrix techniques. Metagenome tions of the particles in the image are unknown and
integration is core of the ExaBiome complicated chal- heavily contaminated by sound, determining prop-
lenge, but that capability will make it simpler for new erties using the SPI test is challenging. Additionally,
bioinformatics problems to emerge (Francis et al., the quantity of accessible particles typically places
2020). a cap on the number of viable images. To determine
the form, areas, and molecular structure from a single
E. Analysis of data for free electron laser particle’s data obtained utilizing structural barriers
X-ray diffraction is used by the Linac Coherent simultaneously, the M-TIP algorithm uses a duplicate
Light Source (LCLS) at the Stanford Linear guessing framework. Additionally, it aids in the com-
Accelerator Centre (SLAC) to model individual prehensive information extraction from single-parti-
atoms and molecules for crucial scientific activities. cle diffraction.
The representation of molecular structure revealed A quick response is necessary to direct the test,
by X-ray fragmentation in close to real time will ensure that enough data is gathered, and modify
need for previously unheard-of computer compres- the sample concentration to obtain a single particle
sion scales and bandwidth data techniques. Data rate. Together, exascale computing power and HPC
detector measurements in light sources have sub- processes can handle the analysis of the expanding
stantially increased; after LCLS-II-HE development data explosion. As a result, researchers will be able to
is complete, LCLS will grow its data by three orders analyses data quickly, respond quickly to test-quality
in magnitude by 2025. The ExaFEL programme data, and simultaneously decide on a three-dimen-
uses exascale computation to accelerate the process sional sample design.
of reconstructing molecular structures from X-ray
diffraction data from weeks to minutes (Francis et F. Autonomous car
al., 2020). Self-driving vehicle will generate and use a variety
Users of LCLS demand an integrated approach to of data to analyze various parameters such as loca-
data processing and scientific interpretation which tion, road condition, and passenger safety. To man-
calls for in-depth computer analysis. Exascale pro- age all the data, you need HPC (Levent Gurel et al.,
cessing capacity will be needed to meet demand for 2018).
real-time analysis of the data explosion which will The car is equipped with sensors, embedded com-
take about 10 minutes (Francis et al., 2020). puters, cameras, high-precision GPS and satellite,
Because of its high repetition rate and brightness, wireless network, 5G connectors to connect to the
LCLS can map individual molecules’ inherent fluc- internet. Autonomous car will exchange data with the
tuation in relation to flexibility and ascertain their management and control system and will sync with
Applied Data Science and Smart Systems 23
a large database that continuously provides real-time astronomy, materials research, and computational
information such as weather, traffic conditions, emer- biology (Francis et al., 2020).
gency alerts, etc.
Autonomous car will generate a large amount of B. Accelerated innovation
data and will send more than four terabytes of data EC enables engineers and scientists to swiftly and
per hour to the cloud. Exascale high performance efficiently build, optimize, and test new products and
computing and Big data are therefore capable of deliv- technologies. It enables rapid innovation in fields
ering the computing power required to use predictive including aerospace, automobile design, energy sys-
decision support systems to evaluate large amounts tems, and material research by allowing for the study
of data. of a broad design space. EC aids in the identification
of optimal designs, resulting in improved products
VI. Benefits of EC and solutions, by modeling and analyzing compli-
cated systems.
The speed of EC is 50 to 100 times faster than latest
supercomputer. Therefore, this kind of HPC applica- C. Advances in data analytics and AI
tion helps to simulate large scale application, ML and EC enables the processing and analysis of enormous
AI, etc. (Matthew et al., 2020; Maxwell et al., 2021). datasets in real-time, opening up new opportunities in
It is fast, and cost effective. As a result, intelligent data analytics and AI. It makes possible for DL and
storage capacity, computing power can be applied machine learning models to be more accurate and
in industries like health care, chemical, National effective, which advances fields like genomics, person-
Security, reducing pollution, and many more (Francis alized medicine, social network analysis, autonomous
et al., 2020). EC helps to minimize health issues, and systems, and recommendation systems (Tanmoy et al.,
proves the better quality of life by optimizing the 2019; Francis et al., 2020). EC facilitates the extrac-
transportation facilities. In short, EC has a number of tion of useful insights from enormous amounts of
advantages that could revolutionize fields including data, fostering innovation and decision-making.
engineering, society, and scientific study is shown in
Figure 3.3. Some advantages of exascale computing D. Cross-disciplinary collaboration
are: EC fosters cross-disciplinary cooperation among
scholars. Exascale systems’ computational capacity
A. Scientific discovery and resources can be used by scientists, engineers, and
EC enables scientists and researchers to run simula- subject-matter specialists to tackle challenging issues
tions and models at a scale and resolution that have that call for interdisciplinary solutions (R. Arya et
never been possible before. This may result in fresh al., 2021). Through information exchange and inte-
scientific understandings, discoveries, and a better grated problem-solving, this partnership may result
comprehension of intricate processes. Exascale simu- in advances in areas like fusion energy, drug devel-
lations can facilitate discoveries and speed up scien- opment, urban design, and computational social
tific development in areas including climate modeling, sciences.
E. Precision and realism et al., 2015; Mahendra et al., 2020; Matthew et al.,
EC allows for simulations and modeling with a level of 2020) are shown in Figure 3.4. These challenges are
accuracy and realism never before possible. Exascale as discussed in the following sections.
simulations deliver more precise results by including
complex interconnections and finer-grained details. A. Technical challenges
This improves decision-making processes, which Exascale system has identified four key challenges:
helps in better forecasts, and encourages the creation increased number of faults, power requirement mini-
of trustworthy and durable systems and technologies. mization, memory management and parallelism at
node level. These challenges are directly related to
F. Economic and social impact exascale OS/R (operating system and runtime soft-
EC holds the promise of fostering both societal and ware) layer. Hardware complexity, resources chal-
economic improvement. By quickening the pace of lenges within OS, programming model, design issues
product development cycles, enhancing efficiency, and are few more to handle.
cutting costs, it encourages innovation and supports
industries. By offering strong tools for modeling, i) Resilience
analysis, and optimization, EC also helps to address As the numbers of components are increasing
major issues like climate change, healthcare, and sus- on chip, the numbers of faults are also increases.
tainable energy. These faults cannot be protected by other error
detection and correction technique. Timely prop-
G. Advances in computation agation fault notification across large network in
EC promotes improvements in computational meth- limited bandwidth scenario is very difficult.
ods and algorithms. To efficiently utilize the pro- ii) Power management
cessing capacity of exascale computers, researchers It is one of the critical challenges of exascale
investigate novel algorithms, optimization techniques, system. It requires 20–30 MW to run any appli-
and parallel programming paradigms. Beyond exas- cation. Resources can be change at any time to
cale computing, these developments help other com- adopt power requirement.
puter platforms and allow for further development in iii) Memory hierarchy
HPC. New memory technology emphasizes on reduc-
ing the power cost while data are transferring be-
VII. Challenges in EC tween different nodes. In case of exascale system,
the OS provide more support to runtime and ap-
Exascale are facing different technical and social chal- plication management and as the complexity re-
lenges (John et al., 2011; Pete et al., 2012; Judicael duces the OS overheads.
Criteria Details
that are more sophisticated and complicated. This IX. Market analysis of EC
will open up new opportunities in fields includ-
Compound annual growth of EC is going to 6.3%
ing speech and image recognition, natural language
throughout the course of the forecast and it is expected
processing, robotics, autonomous cars, and recom-
that market growth will reach USD 50.3 billion by
mendation engines. Researchers will investigate new
2028. This growth is driven by the increasing demand
architectures and algorithms to take use of exascale
for HPC across industries such as healthcare, finance,
capabilities for more precise and effective machine
energy, weather forecasting, and scientific research.
learning.
EC is being actively embraced by numerous sectors
to solve challenging computational issues and gain a
E. Computational fluid dynamics
competitive edge. For the instance, it provides sophis-
Engineers will be able to model and optimize fluid
ticated simulations for drug discovery, genomics, and
flow in unprecedented detail thanks to exascale com-
personalized treatment in the healthcare industry. It
puting’s enormous impact on computational fluid
supports high-frequency trading, risk modeling, and
dynamics (CFD) simulations. This has uses in envi-
portfolio optimization in the financial sector. EC is also
ronmental engineering, energy systems, automotive
used by energy corporations for seismic imaging, res-
design, and aerospace. Higher resolution and more
ervoir modeling, and energy production optimization.
accurate simulation and analysis of complicated flow
EC is strategically important, and governments around
dynamics can result in better designs and more effec-
the world are actively promoting its development. To
tive systems.
speed up exascale computing research and deployment,
numerous nations, including the United States, China,
F. Quantum computing
Japan, and European nations, have started national ini-
EC has the potential to be extremely important for
tiatives and funding programmes. These programmes
the growth and development of quantum computing.
seek to promote governmental, academic, and com-
Exascale systems can be a great resource for expe-
mercial cooperation in order to progress technology
diting quantum research and applications because
and preserve competitiveness. Several companies and
they can provide the enormous processing capacity
organizations are leading the exascale computing such
that quantum simulators and quantum algorithms
as Hewlett Packard Enterprise, IBM, Intel, NVIDIA,
demand. This includes creating quantum-enabled
AMD, and Cray. Universities, research organizations,
algorithms for application in real-world situations,
and national laboratories all contribute significantly to
optimizing quantum algorithms, and simulating
the development of exascale computer systems.
quantum systems.
performance optimization, energy efficiency, resilience Gürel, Levent (2018). Towards Exascale Computing for Au-
and fault tolerance, Big data analytics, and applica- tonomous Driving. In 2018 International Workshop
tion-specific research. To fully utilize the capabilities of on Computing, Electromagnetics, and Machine Intel-
exascale systems, researchers are concentrating on cre- ligence (CEMi), 17–18. IEEE, 2018. doi: 10.1109/
CEMI.2018.8610529.
ating innovative hardware architectures, implementing
Beckman, P., Brightwell, R., de Supinski, B. R. et al. (2012).
efficient algorithms, investigating new programming
Exascale operating systems and runtime software
paradigms, and optimizing system performance.EC report. US Department of Engineering. https://doi.
has a bright future ahead of it. It will promote multi- org/10.2172/1471119.
disciplinary research collaboration, improve scientific Zounmevo, Judicael A., Swann Perarnau, Kamil Iskra, Ka-
discovery, enable advances in AI and data analytics, zutomo Yoshii, Roberto Gioiosa, Brian C. Van Es-
revolutionize fields like computational fluid dynamics sen, Maya B. Gokhale, and Edgar A. Leon. (2015).
and quantum computing, and ignite innovation across A container-based approach to OS specialization for
sectors. However, there are obstacles in the way of exascale computing. In 2015 IEEE International Con-
EC full potential. Power consumption, memory con- ference on Cloud Engineering, 359–364. IEEE, 2015.
straints, communication bottlenecks, and the com- doi: 10.1109/IC2E.2015.78.
Gao, Jiangang, Fang Zheng, Fengbin Qi, Yajun Ding, Hon-
plexity of programming for massively parallel systems
gliang Li, Hongsheng Lu, Wangquan He et al. (2021).
are issues that researchers and engineers must over-
Sunway supercomputer architecture towards exascale
come. Moreover, to overcome technical obstacles and computing: analysis and practice. Science China In-
assure the successful deployment of these potent sys- formation Sciences, 64(4): 141101. doi: https://doi.
tems, the development of EC necessitates close coop- org/10.1007/s11432-020-3104-7
eration between academics, industry, and government. Arya, R., Singh, J., and Kumar, A. (2021). A survey of multi-
disciplinary domains contributing to affective comput-
ing. Comp. Sci. Rev., 1–9. https://doi.org/10.1016/j.
References
cosrev.2021.100399
Huang, H., Li-Qian, Z., YuTong, L. et al. (2019). An effi- Chang, C. et al. (2023). Simulations in the era of exascale
cient real-time data collection framework on petascale computing. Nat. Rev. Mat., 8, 309–313. https://doi.
systems. Neurocomput., 361(7), 100–107. https://doi. org/10.1038/s41578-023-00540-6.
org/10.1016/j.neucom.2019.06.039. Vijayaraghavan, Thiruvengadam, Yasuko Eckert, Gabriel
Matthew, N. O., Sadiku, Awada, E., and Musain, S. M. H. Loh, Michael J. Schulte, Mike Ignatowski, Brad-
(2020). Exascale computing (Supercomputers): ford M. Beckmann, William C. Brantley et al. (2017).
An overview of challenges and benefits. J. Engg. Design and Analysis of an APU for Exascale Comput-
Appl. Sci., 15(9), 2094–2096. DOI: 10.36478/jeas- ing. In 2017 IEEE International Symposium on High
ci.2020.2094.2096. Performance Computer Architecture (HPCA), 85–96.
Gagliardi, F., Moreto, M., and Mateo Valero, M. O. (2019). IEEE, 2017. doi: 10.1109/HPCA.2017.42.
The international race towards Exascale in Europe. Shalf, J., Dosanjh, S., and Morrison, J. (2011). Exascale
CCF Trans. HPC, 1, 3–13. https://doi.org/10.1007/ computing technology challenges. High Perform.
s42514-019-00002-y. Comp. Comput. Sci. – VECPAR 2010: 9th Int.
Kogge, P. and Shalf, J. (2013). Exascale computing trends: Conf., 6449, 1–25. https://link.springer.com/chap-
Adjusting to the new normal or computer architec- ter/10.1007/978-3-642-19328-6_1.
ture. Comput. Sci. Engg., 15(6), 16–26. DOI: 10.1109/ Singh, Jaiteg, and Kawaljeet Singh. (2009). Statistically
MCSE.2013.95. Analyzing the Impact of AutomatedETL Testing on
Bobák, M., Hluchy, L., Belloum, A.S., Cushing, R., Meizner, the Data Quality of a DataWarehouse. International
J., Nowakowski, P., Tran, V., Habala, O., Maassen, J., Journal of Computer and electrical engineering. 1(4)
Somosköi, B. and Graziani, M. (2019). Reference ex- 488–495. DOI:10.7763/IJCEE.2009.V1.74
ascale architecture. In 2019 15th International Con- Don, Y. et al. (2022). Exascale image processing for next-
ference on eScience (eScience) 479–487. IEEE. doi: generation beamlines in advanced light sources. Nat.
10.1109/eScience.2019.00063. Rev. Phy., 4, 427–428. https://www.nature.com/ar-
Alexander, Francis, Ann Almgren, John Bell, Amitava Bhat- ticles/s42254-022-00465-z.
tacharjee, Jacqueline Chen, Phil Colella, David Dan- Verma, Mahendra K., Roshan Samuel, Soumyadeep Chat-
iel et al. (2020). Exascale applications: skin in the terjee, Shashwat Bhattacharya, and Ali Asad. (2020).
game. Philosophical Transactions of the Royal Soci- Challenges in fluid flow simulations using exascale
ety A 378(2166): 20190056. 1–31 doi: https://doi. computing. SN Computer Science., 1(3): 178 pp. 1-14.
org/10.1098/rsta.2019.0056. doi: https://doi.org/10.1007/s42979-020-00184-1
Bhattacharya, Tanmoy, Thomas Brettin, James H. Doro- Zimmerman, M. I. et al. (2021). SARS-CoV-2 simulations
show, Yvonne A. Evrard, Emily J. Greenspan, Amy L. go exascale to predict dramatic spike opening and
Gryshuk, Thuc T. Hoang et al. (2019). AI meets exas- cryptic pockets across the proteome. Nat. Chem., 13,
cale computing: advancing cancer research with large- 651–659. https://www.nature.com/articles/s41557-
scale high performance computing. Frontiers in oncol- 021-00707-0.
ogy, 9, 984. DOI: 10.3389/fonc.2019.00984.
4 Production of electricity from urine
Abhijeet Saxena1,a, Mamatha Sandhu2, S. N. Panda3 and
Kailash Panda4
1
Utkal University, Odisha, India
2,3
Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India
4
Laxmi Narayan College, Odisha, India
Abstract
The research work explores the possibility of utilizing urine, the most abundant waste on earth as an unconventional, yet,
plausible alternative to generate electricity. A groundbreaking two-phase method has been introduced that utilizes a urea
electrolytic cell to convert urine into electricity. In the initial phase, urea-rich water is broken down to extract Hydrogen,
which serves as the primary input for electricity generation in the subsequent phase. Our paper comprehensively examines
the technology employed in the urine powered generator, elucidates the intricacies of the process, and assesses the overall
efficiency of the integrated system, positioning it as a promising advancement for the future. Furthermore, a comparative
analysis is conducted against existing energy sources, shedding light on the environmental, economic, and technological
advantages of our approach.
Keywords: Clean energy, hydrogen economy, PEM fuel cell, electrolysis, urine, waste-to-energy, unconventional energy sources
[email protected]
a
Applied Data Science and Smart Systems 29
takes hydrogen as input, reacts with the oxygen in the Equation (1) defines the oxidation of urea at the
air to generate electricity. anode of the electrolytic cell. Equation (2) defines
the oxidation of Ni(OH)2 to NiOOH and the current
III. Proposed methodology produced during the electrolysis process. Equation (4)
demonstrates that a remarkably low potential of less
This section details the complete process into 2 phases; than 1.23 V is required for the electrolysis of water,
the extraction of hydrogen from urine (S. Yeasmin et and theoretically 70% hydrogen (Amanda K. et al.,
al., 2022) and its conversion into electricity. Phase 1 2015) is obtained. This implies that during the nitrate
– Urine is abundantly available. The prime element remediation of wastewater, nitrogen is generated from
of urine is urea, from which hydrogen [H], carbon the anode while hydrogen, a valuable constituent for
[C], nitrogen [N] and oxygen [O] can be extracted. the imminent hydrogen economy (Kar et al., 2022),
Regardless of technological advancements, there is is liberated at the cathode. In simple words, pure
still no technology that can convert urea to hydro- hydrogen (H2) can be collected at the cathode while at
gen. This proposed process could sustain not only anode the nitrogen can be collected along with traces
hydrogen resources but also do the de-nitrification of of oxygen as well as hydrogen (S. A. Grigoriev et al.,
urea-abundant water which is generally discharged 2006). Phase 2 – Owing to the flammable property
into rivers. The proposed system block diagram is as of hydrogen, the gas extracted in phase 1 need to be
shown in Figure 4.1. The electrolytic cell designed (T stored in a cylinder with safety valves on the inlet and
Gera et al., 2021) would use the proposed electro- outlet tubes for not allowing its reverse flow as dis-
chemical process (Kumar et al., 2018) for extracting cussed in (Langmi et al., 2022). The hydrogen from
hydrogen from urea (Amanda K. et al., 2015; Jinqi Li. the outlet tube of the cylinder is released into the PEM
et al., 2022) as shown in Figure 4.2. fuel cell as seen in Figure 4.3. In the PEM fuel cell,
Using above-described electrolytic cell along with the hydrogen reacts with the oxygen from the air to
inexpensive transition metal nickel, the electro-chem- release energy while forming water. Detailed working
ical oxidation of human urine, is represented in the of the PEM cell is as mentioned below (Tolga Taner et
following four equations: al., 2018), where the hydrogen molecule gets oxidized
(1)
(2)
(3)
and loses two electrons, as it passes through the mem- relatively little heat, and without producing any light.
brane. Thus, two ions of hydrogen are generated as Due to these characteristics, the reaction is not clas-
oxidation half-reaction at the anode as represented in sified as combustion. In PEM fuel cell as discussed
the Equation (5). in Yun Wang et al. (2022), considering the energy-
producing step only, i.e., by omitting other parts of
(5) the energy picture, then, electricity produced by it is
more environmentally friendly, than that produced by
The hydrogen ions H+, combines with oxygen (O2) coal-fired or nuclear power plant. The process does
while passing through the proton exchange mem- not emit any greenhouse gas or pollutants, or radioac-
brane, producing two electrons of water as reduc- tive waste. With hydrogen as the fuel in PEM fuel cell,
tion half-reaction at the cathode as represented in the the only chemical product released is water. The water
Equation (6). released by the fuel cell can be an added benefit for
the astronauts in the space station/shuttle who oth-
erwise must rely on moisture/water from respiration,
(6)
sweat and urine (Nehir Atasay et al., 2023), For per
mole of water formed, the overall reaction releases
The overall cell equation, as is with the gal-
286 kJ of energy. However, rather than being liber-
vanic cells, is given as total amount of half-reaction
ated in the form of heat, 40–60% of this energy is
equations:
converted to electric energy by the fuel cell. The con-
version proportion is much higher compared to 20%
(7) or less usable in case of internal combustion engine
for generating electricity from fossil fuels (Singla et
Two electrons (2e−) with two Hydrogen atoms al., 2021). The electricity produced from the phase
(2H+) thus cancel as represented in Equation (8): 2 of the entire system can be stored in a battery for
further use as per the requirements (as depicted in
(8) Figure 4.4).
The electrons flowing from the anode to the cath- IV. Comparison of results analysis
ode of a fuel cell move through an external circuit
to do work which is the whole point of the device. Table 4.1 shows the comparison of energy consump-
Thus, in a fuel cell, a movement of electron occurs tion between electrolysis (Panigrahy et al., 2022) of
from H2 to O2. This flow occurs with no flame, with water and urea, using Ni anodes, under lab conditions,
Applied Data Science and Smart Systems 31
Table 4.1 Comparison of electrolysis Table 4.2 Comparison of efficiency of PEM fuel cell
Electrolysis Energy (Wh/g) H2 cost (INR/kg) Efficiency of PEM Wattage (in KWh) H2 (in kg)
fuel cell (in %)
Urea 37.5 187.5
Water 53.6 268.0 100 33.33 1
60 20 1
60 1 0.05
based on cost of energy @ INR 5 per kWh. The com- follows: Urine is 95% water implies that 1 l of urine
parison is on two parameters: (a) Wattage per gram contains 0.95 l water. Further, 1 l of water weighs
of hydrogen (b) Cost of producing 1 kg of hydrogen. 1 kg implies 950 ml of water would weigh 950 g.
Illustration of unit economics of the system – For During electrolysis, 2 moles of water liberate 2 moles
evaluation of the energy unit (in terms of units of of hydrogen and 1 mole of oxygen. The molar mass
electricity consumed) economics of the system, i.e., of water being 18.015 g implies that 950 g of water
amount of hydrogen needed to produce electricity (J. is equivalent to 52.73 moles of water. Thus, 52.73
Singh et al., 2019) and subsequently, checking urine moles of hydrogen would be produced from 950 g
and energy required for the production of hydrogen of water (or 1 l of urine). Since, mass = molar mass *
(quantity that will produce 1 kWh of electricity). number of moles, and molar mass of hydrogen is 2.02
The total quantity of hydrogen to produce 1 kWh of g (approx.), the mass (of 52.73 moles of hydrogen) =
electricity is estimated in following two steps: One 52.73 * 2.02 = 106.5 g (rounded to the nearest tenth).
kg of hydrogen carries 33.33 kWh of energy and the Thus, 1 l of urine produces 106.5 g of hydrogen.
efficiency of the PEM cell is 60%. As discussed by Therefore, 50 g of hydrogen, consequently, would
O. Bilgin et al. (2015), many procedures are imple- require 0.470 l or 470 ml of urine, (say nearly half-
mented in hydrogen calculations. a-liter). Hence, to conclude, in order to get 1 KWh of
Hence, to generate 1 KWh of electricity, we energy as the output from the system, we need 1.875
need 0.05 kg or 50 g of hydrogen gas as shown in kWh and 450 ml of urine as input. The efficiency of
Table 4.2. The quantity of hydrogen is 50 g. Energy the system is 53.33%, which is higher than other
and urine required for producing 50 g of hydrogen, sources of power generation. Besides, 1 kg of hydro-
referring to the information in Table 4.1, we see that gen when used in fuel cell could drive vehicles up to
37.5 kWh of energy is required for the production 97–100 km (Oldenbroek et al., 2020). For a vehicle
of 1 kg of hydrogen. Hence, to generate hydrogen of running petrol or diesel, to cover the same distance,
50 g, it would need 1.8 kWh of input energy. The considering an ideal mileage 22 km/l, would consume
quantity of urine to produce 50 g of hydrogen is as around 4–4.5 l fossil fuel, This @ INR 72/l would cost
32 Production of electricity from urine
about INR 288–324. This would be INR100 more this landscape is a constraint that requires dem-
than the price for 1 kg of hydrogen. Hence, compared onstrating clear advantages.
to other sources of energy or of hydrogen itself, this • Energy return on investment (EROI): Evaluat-
PEM fuel cell process (I. Schimidhalter et al., 2021; ing the energy return on investment, considering
K. Ondrejicka et al., 2022) is economical and is made all energy inputs and outputs, is a constraint in
feasible on mass scale. When supplemented with determining the practicality and sustainability of
other renewable sources of energy (A. U. Rehman the urine-to-electricity system. A positive EROI is
et al., 2017; M. Sandhu et al., 2022; Rehman et necessary for long-term viability.
al., 2022), the system could become self-sustaining,
thereby decrease the dependency on paid sources of VI. Conclusion
electricity. Such system would save a considerable
amount of money. The article demonstrated the concept of producing
electricity from urine. Few comparisons theoreti-
cally prove the process to be not only plausible but
V. Challenges, pitfalls and constraints
economical too. With further research for making
Challenges this process commercially feasible, it would create a
• Technological feasibility: Implementing the pro- significant impact on the present and future demand
posed urine-to-electricity process efficiently and and supply scenarios of energy, paving ways for new
cost-effectively on a large scale is a complex chal- advancements in the field of energy and automobile. In
lenge, as laboratory conditions may differ signifi- a country like India where the majority of the popula-
cantly from real-world applications. tion face the perils of vehicle pollution, where most of
• Safety concerns: Handling and storing flammable the group housings and industrial setups use fossil fuel
hydrogen gas safely is a crucial challenge. Ad- electricity backups, this development has the potential
equate safety measures, such as pressure relief of providing a clean-energy and also counter the men-
valves and leak detection systems, must be in ace of human wastes. Sooner or later, mankind will
place to mitigate potential risks. approach times in near future, when the fossil fuels
• Economic viability: While the paper suggests eco- of the world would get exhausted thereby demand-
nomic feasibility, the true cost-effectiveness of ing a new source of energy for domestic, industrial
the process depends on factors like infrastructure and transportation uses. This proposed development
costs, energy efficiency, and market dynamics. A could be a proactive step in that direction. Last but
comprehensive economic analysis is essential to not least, we look forward to contributing something
address this challenge. very useful out of something considered useless. After
all, there is no such thing as waste in this ecosystem.
Pitfalls
• Long-term durability: Ensuring that the electro- References
lytic cells, PEM fuel cells, and other components
can withstand continuous operation over an ex- Sataksig. (2017). Eureka Green, (When will the Earth run
tended period is a potential pitfall. Unexpected out of Fossil Fuel) https://earthbuddies.net/when-will-
we-run-out-of-fossil-fuel/ [Online Resource].
wear and tear could affect the system’s reliability.
Adithya, B., James, H., and Charles, D. (2020). The clean
• Public acceptance: Convincing the public to em- energy imperative. Renew. Energy Fin., 2, 14–15.
brace the idea of using urine for electricity genera- Ajiboye, T. O., Ogunbiyi, O. D., Omotola, E. O., Adeyemi, W.
tion can be challenging due to the societal stigma J., Agboola, O. O., and Onwudiwe, D. C. (2022). Urine:
associated with waste materials. Overcoming this Useless or useful waste?, Results Engg., 16, 100522,
psychological barrier and fostering acceptance is a https://doi.org/10.1016/j.rineng.2022.100522.
potential pitfall in the adoption of the technology. Yeasmin, S., Ammanath, G., Onder, A., Yan, E., Yildiz, U.
H., Palaniappan, A., and Liedberg, B. (2022). Cur-
Constraints rent trends and challenges in point-of-care urinalysis
• Urine collection and processing: Building the nec- of biomarkers in trace amounts. TrAC Trend Anal.
essary infrastructure for collecting, transporting, Chem., 157, 116786.
Kumar, Kaushik, Zindani, Divya, and Davim. (2018). Elec-
and processing urine is a significant constraint. It
trochemical process advanced machining and manu-
requires substantial investment and adherence to facturing processes. Springer International Publishing,
sanitation and hygiene standards. 1, 105–122.
• Competition with existing technologies: The pro- Luther, A. K., Desloover, J., Fennell, D. E., and Rabaey, K.
posed urine-based energy generation system must (2015). Electrochemically driven extraction and re-
contend with established clean energy technolo- covery of ammonia from human urine. Water Res.,
gies, such as solar and wind power. Competing in 87, 367–377.
Applied Data Science and Smart Systems 33
Li, J., Zhang, J., and Yang, J.-H. (2022). Research progress Bilgin, O. (2015). Evaluation of hydrogen energy produc-
and applications of nickel-based catalysts for electro- tion of mining waste waters and pools. Int. Conf.
oxidation of urea. Int. J. Hyd. Energy, 47(12), 7693– Renew. Energy Res. Appl. (ICRERA), Palermo, Italy,
7712. https://doi.org/10.1016/j.ijhydene.2021.12.099. 557–561. doi: 10.1109/ICRERA.2015.7418475.
Sanjay K. K., Harichandan, S., and Roy, B. (2022). Biblio- Vincent, O., Smink, G., Salet, T., and van Wijk, Ad J. M.
metric analysis of the research on hydrogen economy: (2020). Fuel cell electric vehicle as a power plant:
An analysis of current findings and roadmap ahead. Techno-economic scenario analysis of a renewable in-
Int. J. Hyd. Energy, 47(20), 10803–10824. tegrated transportation and energy system for smart
Gera, Tanya, Jaiteg Singh, Abolfazl Mehbodniya, Julian L. cities in two climates. Appl. Sci. 10(1), 143. https://doi.
Webber, Mohammad Shabaz, and Deepak Thakur. org/10.3390/app10010143.
(2021). Dominant feature selection and machine Ondrejička, K., Putala, R., and Mikle, D. (2022). Fuel
learning-based hybrid approach to analyze android cells as backup power supply for production pro-
ransomware. Security and Communication Networks. cesses. Cybernet. Informat. (K&I), 1–6. doi: 10.1109/
vol. 2021, Article ID 7035233, 22 pages, 2021. https:// KI55792.2022.9925936.
doi.org/10.1155/2021/7035233 Schmidhalter, I., Aguirre, P. A., and Eva Aimo, C. (2021).
Grigoriev, S. A., Porembsky, V. I., Fateev, V. N. (2006). Pure Phenomenological modeling and optimization of the
hydrogen production by PEM electrolysis for hydro- sizing and operation of a proton exchange membrane
gen energy. Int. J. Hyd. Energy, 171–175. fuel cell. XIX Workshop Inform. Proc. Con. (RPIC),
Henrietta, L. W., Engelbrecht, N., Modisha, P. M., and 1–6. doi: 10.1109/RPIC53795.2021.9648520.
Bessarabov, D. (2022). Electrochemical power sourc- Sandhu, M. and Thakur, T. (2022). Harmonic reduc-
es: Fundamentals, systems, and applications. Hyd. tion in a microgrid using modified asymmetrical in-
Storage Elsevier, 455–486. verter for hybrid renewable applications. IEEE Int.
Taner, T. (2018). Introductory chapter: An overview of PEM Conf. Power Elec. Smart Grid Renew. Energy (PES-
fuel cell technology proton exchange membrane fuel GRE), Trivandrum, India, 1–6. doi: 10.1109/PES-
cell. Intech Open, 1–5. GRE52268.2022.9715962.
Wang, Y., Pang, Y., Xu, H., Martinez, A., and Chen, K. S. Singh, Jaiteg, Saravjeet Singh, Sukhjit Singh, and Hardeep
(2022). PEM fuel cell and electrolysis cell technologies Singh. (2019). Evaluating the performance of map
and hydrogen infrastructure development – A review. matching algorithms for navigation systems: an em-
Energy Environ. Sci., 6, 1–8. pirical study. Spatial Information Research. 27: 63–
Atasay, N., Atmanli, A., and Yilmaz, N. (2023). Liq- 74. doi: https://doi.org/10.1007/s41324-018-0214-y
uid cooling flow field design and thermal analysis Rehman, A. U., Zeb, S., Khan, H. U., Shah, S. S. U., and
of proton exchange membrane fuel cells for space Ullah, A. (2017). Design and operation of microgrid
applications. Int. J Energy Res., 16. https://doi. with renewable energy sources and energy storage sys-
org/10.1155/2023/7533993. tem: A case study. IEEE 3rd Int. Conf. Engg. Tech-
Singla, M. K., Nijhawan, P., and Oberoi, A. S. (2021). Hy- nol. Soc. Sci. (ICETSS), Bangkok, Thailand, 1–6. doi:
drogen fuel and fuel cell technology for cleaner future: 10.1109/ICETSS.2017.8324151.
A review. Environ. Sci. Pollut. Res., 28, 15607–15626. Abdul, R., Radulescu, M., Cismas,, L. M., Cismas,, C.-M.,
https://doi.org/10.1007/s11356-020-12231-8. Chandio, A. A., and Simoni, S. (2022). Renewable en-
Bharati, P., Narayan, K., and Ramachandra Rao, B. (2022). ergy, urbanization, fossil fuel consumption, and eco-
Green hydrogen production by water electrolysis: A nomic growth dilemma in Romania: Examining the
renewable energy perspective. Mat. Today: Proc., 67, short- and long-term impact. Energies, 15(19), 7180.
1310–1314. https://doi.org/10.3390/en15197180.
5 Deep learning-based finger vein recognition and security:
A review
Manpreet Kaura, Amandeep Verma and Puneet Jai Kaur
Information Technology, UIET, Punjab University, Chandigarh, India
Abstract
The recognition system implies development that passes through the various stages. The finger vein recognition (FVR) is the
lead over the other biological modalities like finger print, face iris, etc., this paper reviews the worked done in the area of
FVR. The pre-processing is needed to enhance the images for better results. The feature extraction module provides the col-
lection of the best features in the finger vein images, which is used for template generation. The template-based schemes are
in fact the best and most appropriate for security purpose because it only preserved the scrambled information rather than
the original features of the human beings. According to this review the convolutional neural network (CNN)-based models
are best for FVR but still there have been some challenges faced by it so those would be improved in the experimental work
of this review.
[email protected]
a
Applied Data Science and Smart Systems 35
Table 5.1 Comparison of different biometric modalities
hackers because the template used by the scheme is of sparse because all the training samples are based
in the form of plain data (Qin and El-yacoubi, 2017). on dictionary matrix. Thus, need was felt to optimize
The author proposed the FVR-DLRP to secure revo- the selection of dictionary data to improve the system
cable and to do efficient finger vein template genera- performance (Fang et al., 2022). Finger vein recog-
tion. Most of the traditional finger vein recognition nition was done with the use of oval PDCNN, this
systems have a shading and misalignment of finger was the advanced version of the PDKs. It provided the
vein problem. Need to pay the much more effort best performance, the first ten layers were from the
and time for extracting the features from the images MobileNet and all other layers from the SqueezeNet
which is a complicated and complex process in deep network could be compressed the network to achieve
CNN (Y. Liu et al., 2018). To improve these problems the higher performance (Li et al., 2023).
the researchers had proposed a robust CNN model The CNN models have improved the recognition
which had the error rate of 0.396 it was collected on performance for FVR. But this advancement has
a good quality dataset (Hong, Lee, and Park, 2017). needed to improve the feature extraction module and
All the publicly available datasets for finger vein have defense against security attacks, and the CNN models
the small images collection. are not lightweights.
Although, the CNN model used for the finger vein,
achieved higher accuracy yet it face the problem Security of FVR system
related to the training process (W. Liu et al., 2017). In the present time, the security of each system is at
The CNN model is successfully applied for the fin- major risk of losing the information and digital assets
ger vein identification process (Simonyan, 2019). The which are protected using the several security mecha-
light weight convolutional neural network (CNN) nisms. Certain things are to be kept in mind before
model was proposed to improve the small training choosing the bio-information in any application to
dataset problem by using the similarity measure net- enhance the security. First of all, it should be clear
work (Qin and El-yacoubi, 2018). The dense net was that, all the phases of technologies which are to be
proposed for finger vein recognition (FVR). This was used in the application must be safe in terms of data
used it remove the noise in the images and the two privacy and protection. Although biometric technol-
or more images were combined for recognition sys- ogy yet it faces various security attacks is considered
tem and also used for feature extraction. The system to be a secure system of real-world market.
has huge computational cost (Song, Kim, and Park,
2019). Although the all-available methods were tested Template protection for finger vein
on publicly available datasets but still these systems The template protection is the process of generating
had failed in the practical uses. Depth based separate the precise or related information from the images by
CNN model was developed to overcome this prob- feature extraction process (Kumar, 2019). This is the
lem. The system is simple but it still has weakness of unique precise information associated with the differ-
recognizing the less defined features of the images ent human beings. The template scheme is divided into
(Tang et al., 2019). The CNN-CO was based on the two categories: (a) Bio-cryptosystem (Kaur, Kumar,
local descriptor for pre-training the ImageNet model. and Singh, 2023). This combines the best feature of
Practically this system was best out of all the con- both the worlds i.e., cryptographic keying methods
ventional systems (Y. U. Lu, 2019). Finger vein-based and biometric schemes and (b) cancellable templates
authentication model was proposed by developing the (Manisha, 2020). In this field, the biometric template
lightweight Siamese network. When images were col- of a person is distorted in such a manner that the
lected the feature information got lost. The GCNet original data is not available to the intruder but still
and multi-scale feature was used during the process to identity recognition can be performed. The template
solve the faced problem. The system has been tested generation in the CNN models for higher accuracy for
over three publicly available datasets but the need FVR can be performed (Yin, Zhang, and Liu, 2021).
was felt to improve the feature extraction module by The template generation is shown in Figure 5.2.
changing the width and cardinality of the CNN net- The security to the templates of finger vein to provide
work (Fang, Ma, and Li, 2023). The parameters for
training and testing the network for data happen to
be complex due to the complex hidden structure of
the neural network. Although the result was 99.98%
but we need a light weight model for FVR (Wang and
Shi, 2022). The double-weighted group sparse rep-
resentation classification was developed to solve the
FVR. It had the lower accuracy than the other mod-
els and also took a long time to solve the coefficient Figure 5.2 Template generation
Applied Data Science and Smart Systems 37
the password based key derivation function has been state of the art does address various issues related to
used to derive the key named FVR-DLRP. To provide the finger vein pattern recognition for artificial neural
the information still remains even though the pass- network. The question arises as who can suggest good
word is cracked. But this system has lower accuracy matching for prob and gallery images for recognition
in terms of FAR rate, which leads to FAR attack and process and has also been advised to prepare and
it even has lower GAR rate (Y. Liu et al., 2018). generate the light weight model for finger vein (Yin,
Deep CNN with hard mining finger verification Zhang, and Liu, 2021).
scheme was proposed which achieved better perfor-
mance than achieved through commercial finger vein Security attacks
verification systems. This method also accelerates the On the other side, the restricted system is responsible
complete training process. The huge template size for security attacks. The attackers generate fake bio-
requires enormous amount of storage space (Huang metric template and modify it at different levels, the
et al., 2017). The Gabor filter was used, built a fin- finger vein faces various security attacks related prob-
ger vein authentication system based on the light- lems, from time-to-time various security methods and
weight CNN and supervised discrete hashing so as their patches for breaches (Tome and Vanoni, 2014)
to improve the finger vein images. Despite all these are introduced to amend the system.
steps, this method has decreased the template size Transferable deep convolutional network was
and surges the performance of finger vein verification. proposed to handle the presentation attack. The
The connection between training time and recogni- researcher has modified the system by adding seven
tion outcome was not thoroughly measured (Xie and layers to the existing Alex-Net to overcome the over
Kumar, 2019). The fusion based system was devel- fitting problem. The artifacts for the finger vein were
oped for fingerprint and the finger vein biological generated by using two different printers. The modi-
datasets. The feature level fusion was applied to this fied system is able to handle the PAD for finger vein.
system. The system has the higher matching perfor- The transferable deep learning neural network for the
mance and security of the data (Yang et al., 2018). finger vein has still to face video presentation attack
The BDD-based FVR system was based on the deep (Raghavendra et al., 2017). Another mechanism for
CNN. The system was combined with ML-ELM to security of the data template was developed but it is
form a FVR system that provides the protected pri- still facing security breaches during different process
vacy, and also provides the security to the template. like storing the template and matching the templates
In case of tempering by the intruders the template for finger vein. The FVR with the template-based pro-
performs the undoing operation independently. Then tection is able to handle the presentation attack but
the new template version is generated by user specific still has the problem related to the adversarial attack
keys (Yang et al., 2019). The weighted least squares (Ren et al., 2021). The survey provided by the Yimin
regression has been used to improve the template gen- Yin et al. (Yin, Zhang, and Liu, 2021), had suggested
eration. It minimizes the verification errors but this and elaborated all the security breaches in finger vein
was based on an assumption, but the template has CNN methods. The system has developed to handle
the very little distance in the intra-class for the same the impersonation attack and check the system for
image data (Qin, 2019). The cancelable biometric- authentication with minimum enrolment time. The
based scheme for CIRF, and proposed a low-rank MC-CLAHE method is used to process the images
approximation-based cancelable indexing scheme of finger vein prior to the CNN training process but
which was based on CIRF was introduced to solve the the system is only providing security to the database
problem of excessive computational overhead. Low- (Safie, Zarina, and Khalid, 2023). Various templates-
rank approximation of biometric images was used based CNN models are developed. It has been pro-
to speed up the calculation of CIRF and also used vided the moderate defense against security attacks.
the minimum spanning tree representation for low- But the security problem still remains exist in the
rank matrices in the Fourier domain. The researcher template based FVR systems. Table 5.3 has shown the
proved the reliability of the projected method in pro- most recently articles related to the CNN, Template
tecting related biological information (Murakami et and security of FVR.
al., 2019). The template protection scheme has been
proposed to align the images. The IoM hash is used to IV. Datasets
realize the required privacy and security for the FVR
(Kirchgasser et al., 2020). The security is provided Various datasets (Y. Lu et al., 2013) are always freely
to the template to solve the issue of the presentation available to the researchers to train and test the pre-
attack by CNN model but templates still faces adver- trained models for the CNN. The models learn the
sarial sample attack and does not have light weight features from the images in the dataset to train the sys-
feature extraction module (Ren et al., 2021). The tem, then the system based on this training recognizes
38 Deep learning-based finger vein recognition and security: A review
Table 5.3 Recent articles related to the CNN and template security of FVR
Deep CNN DS1, DS2 & DS3 EER - DS1=0.42%, Improvement IEEE International (Huang et
DS2= 1.41% & DS3= of vein pattern Conference al., 2017)
2.14% matching on Identity,
Security and
Behavior Analysis
(IEEE-2017)
Deep learning FV_NET64 GAR=91.2% Enhancement the Soft Computing (Y. Liu et
& random FAR=0.3% revocability of the (Springer-2018) al., 2018)
projection template
EP-DFT FVC2002 DB2, EER=0.45% Enhancement of Pattern Recognition (Yang et al.,
FVC2004 DB2, non-revocability of (Elesvier-2018) 2018)
FV-HMTD templates
CNN and Two session EER=0.0887 Reduced the Pattern (Xie and
supervised databases template size Recognition Letters Kumar,
discrete hashing (Elesvier-2019) 2019)
BDD-ML-ELM SDUMLA, CIR=93.09%, 98.70%, New non invertible IEEE Transactions (Yang et al.,
MMCBNU_6000 98.61%, respectively templates for on Industrial 2019)
& UTFVP (datasets) finger vein Informatics
(IEEE-2019)
Weighted HKPU & FV-USM EER=1.28, 1.43, Improvement in MDPI (Qin, 2019)
least square respectively (datasets) enrolment template (Information-2019)
regression for finger vein
Correlation- N Genuine template Fast and secure Pattern (Murakami
invariant identification=164.7 biometric Recognition Letters et al., 2019)
random identification 7 (Elesvier-2019)
filtering No leakage of
information of the
template
40 Deep learning-based finger vein recognition and security: A review
Self-attention FV-USM, Recall is best over Need to improve Infrared Physic (Fang, Ma,
mechanism MMCBNU_6000, SDUMLA= 0.9944 the feature and Technology and Li,
(SAC) Siamese SDUMLA-HMT F1 Score is best over extraction module (Elsevier Dec-2020) 2023)
network FV_USM=0.9925 by changing
EER is best over the width and
MMCBNU_6000= cardinality of the
0.0012 network models
RSA for SDMLA, Scheme A is best over The feature Knowledge Based (Ren et al.,
template MMCBNU_6000, HKPU=99.03% extraction method System (Elsevier 2021)
protection HKPU, FV-USM and is not lightweight May-2021)
using CNN Scheme B is best over and the system is
FV_USM=99.18% not able to handle
the adversarial
sample attack and
presentation attack
Survey on SDUMLA-HMT, Performance summary Need to generate the Computer Vision (Yin,
ANN for FV-USM, HKPU, of all CNN methods light weight models, and Pattern Zhang, and
finger vein MMCBNU_6000, for finger vein solve the problem Recognition Liu, 2021)
UTFVP, THU- of mismatching (Springer
FVFDT, SCUT, of gallery and Aug-2022)
IDIAP prob image,
dynamic finger vein
extraction
Double PolyU [], FV-USM, The system has best The sparse International (Fang et al.,
weighted SDUML-HMT performance over coefficient takes the Journal of Machine 2022)
group sparse FV_USM=97.0-95.88- long time, so that Learning and
representation 88.72% over three need to improve it Cybernetics
classification different variants of and improve the (Springer
models accuracy of the May-2022)
system
Multimodal CASIA-WebFace, 99.98% Model should be Sensors (MDPI (Wang and
approach SDUMLA-FV, lightweight Aug-2022) Shi, 2022)
based on CNN FV-USM
(RESNET,
AlexNet,
VGG-19)
MC-CLAHE FV-USM AUC=0.78–0.91 Security only International (Safie,
(CNN- provided to the Journal of Online Zarina,
AlexNet) database and Biomedical and Khalid,
Engineering (iJOE 2023)
2023)
N=Data not available.
Abstract
Fabrication of devices in deca nanometer regime suffers from several limitations as the devices are being scaled so that the
speed and transistor density can be increased. This has led to a series of innovative techniques by the industry as well as aca-
demia. Depletion regions formed in association with the p-n junctions is one of the restrictive factors in scaling short channel
devices in case of junction-based (JB) metal-oxide-semiconductor field-effect transistors (MOSFETs). This has led to several
short channel effects (SCEs). Recently, novel MOSFET structures have been developed that are devoid of p-n junctions and
have also been successfully fabricated. These devices are named “junctionless transistors (JLTs)”. MOSFETs employing
gate-all-around (GAA) architecture have been reported as an ultimate structure in silicon integrated circuits (ICs). In this
paper, we have developed an analytical drain current model for short channel GAA JLT, including source (S)/drain (D) series
resistance, which is also one of the important parameters when devices with short channel are fabricated. We have obtained
the potential distribution profile using Poisson’s equation. It was then used for obtaining the model for drain current. The
validation of the model has been obtained with both the simulation as well as experimental results. We have further analyzed
the effect of S/D resistance on the drain current for different device parameters.
a
[email protected]
44 Development of an analytical model of drain current for junctionless GAA MOSFET
II. Theoretical details voltage (VFB) of the device, a complete neutral chan-
nel is created and we reach flat band condition. The
GAA structures offer superior short-channel charac-
conduction and valence bands become flat and now
teristics owing to the excellent control the gate offers
we can say that the device is turned ON. An accumu-
over the channel in such structures. Due to the absence
lation layer is created at the surface on further increas-
of junctions in JLTs, there is no requirement of doping
ing the gate voltage and the negative charge carriers
concentration gradient and hence the problems asso-
get accumulated resulting in the flow of surface cur-
ciated with the junctions are eliminated. Such devices
rent along with the bulk current. Figure 6.2 depicts
are also reported to deliver improved driving current
the energy-band diagram of GAA JLT in different
and sub-threshold properties when combined with
regions of operation along with the device schematic.
GAA architecture. Figure 6.1 depicts the cross-section
For an n-type semiconductor, in the cylindrical
of such JL GAA MOSFET.
coordinate, the Poisson’s equation can be written as
Device physics
JLTs are characterized as devices that are strongly and
(1)
evenly doped throughout. This means the type of the
dopants and their concentration is same all over the
junction. For n-type devices, p+ polysilicon is used as
where, φ signifies the potential,
the gate material and n+ polysilicon is used for p-type
r represents the radial direction,
devices. This results in a difference of approximately
V is the applied voltage,
1 eV in the work function which causes the channel
Nd represents the concentration of dopant throughout
to deplete. To bring the channel out of depletion, gate
the source, drain and channel,
bias must be applied. The working principle of GAA
VT is thermal voltage, and
JLT is as follows.
εSi is the permittivity of Si.
When no gate voltage (VG) is applied, the channel
Neglecting depletion charge density and considering
is fully depleted and a negligible amount of current
only the mobile carrier’s density, the above equation
flows through the region between the S and D. In such
can be simplified (Trevisoli et al., 2012) as
a situation, the transistor is said to be in OFF con-
dition. This is the sub-threshold region of operation.
The valence band is completely filled while the con- (2)
duction band is empty. When the voltage applied at
the gate equals the device’s threshold voltage (VTH),
bulk current starts flowing along a thin neutral path,
which is a non-depleted region formed near the center
of the channel. The path gets widened on increasing
the gate voltage. This increases the current flowing
through it. This has been reflected in the energy band
diagram where it can be seen that the concentration of
positive charges in the valence band is reduced. When
the applied voltage at the gate is same as the flat-band
(3)
(4)
(5)
(6)
(7)
(8)
(9)
46 Development of an analytical model of drain current for junctionless GAA MOSFET
before going into final fabrication. This may save parameters of nanoscale strained silicon MOSFET-
time as well as resources. We have not taken quantum based CMOS inverters. Microelec. J., 55, 8–18.
mechanical effects into account which becomes sig- Subindu, K., Kumari, A., and Das, M. K. (2017). Model-
nificant in ultra scaled devices. ing gate-all-around Si/SiGe MOSFETs and circuits for
digital applications. J. Comput. Elec., 16, 47–60.
Amrita, K., Saini, A., Kumar, A., Kumar, V., and Kumar,
References M. (2023). Recent developments and challenges in
strained junctionless MOSFETs: A review. 2023 Int.
Rishu, C. and Yirak, M. G. (2023). Sensitivity investigation
Conf. Comput. Intel. Sustain. Engg. Sol. (CISES),
of junctionless gate-all-around silicon nanowire field-
118–122.
effect transistor-based hydrogen gas sensor. Silicon,
Haijun, L., Zhang, L., Zhu, Y., Lin, X., Yang, S., He, J., and
15(1), 609–621.
Chan, M. (2012). A junctionless nanowire transistor
Te-Kuang, C. (2012). A new quasi-2-D threshold voltage
with a dual-material gate. IEEE Trans. Elec. Dev.,
model for short-channel junctionless cylindrical sur-
59(7), 1829–1836.
rounding gate (JLCSG) MOSFETs. IEEE Trans. Elec.
Dong-Il, M., Choi, S.-J., Duarte, J. P., and Choi, Y.-K.
Dev., 59(11), 3127–3129.
(2013). Investigation of silicon nanowire gate-all-
Sung-Jin, C., Moon, D., Kim, S., Ahn, J.-H., Lee, J.-S., Kim,
around junctionless transistors built on a bulk sub-
J.-Y., and Choi, Y.-K. (2011). Nonvolatile memory by
strate. IEEE Trans. Elec. Dev., 60(4), 1355–1360.
all-around-gate junctionless transistor composed of
Sehra, S. S., Singh, J., Rai, H. S., and Anand, S. S. (2020).
silicon nanowire on bulk substrate. IEEE Elec. Dev.
Extending processing toolbox for assessing the logi-
Lett., 32(5), 602–604.
cal consistency of OpenStreetMap data. Trans. GIS,
Jean-Pierre, C. (2007). Multi-gate SOI MOSFETs. Micro-
24(1), 44–71. https://doi.org/10.1111/tgis.12587.
elec. Engg., 84(9–10), 2071–2076.
Pratikhya, R. and Nanda, U. (2022). A charge-based analyt-
Jean-Pierre, C., Lee, C.-W., Afzalian, A., Akhavan, N. D.,
ical model for gate all around junction-less field effect
Yan, R., Ferain, I., Razavi, P. et al. (2010). Nanow-
transistor including interface traps. ECS J. Solid State
ire transistors without junctions. Nat. Nanotechnol.,
Sci. Technol., 11(5), 051006.
5(3), 225–229.
Pushpapraj, S., Singh, N., Miao, J., Park, W.-T., and Kwong,
Duarte, J. P., Choi, S.-J., Moon, D., and Choi, Y.-K. (2011).
D.-L. (2011). Gate-all-around junctionless nanowire
A nonpiecewise model for long-channel junctionless
MOSFET with improved low-frequency noise behav-
cylindrical nanowire FETs. IEEE Elec. Dev. Lett.,
ior. IEEE Elec. Dev. Lett., 32(12), 1752–1754.
33(2), 155–157.
Billel, S., Rahi, S. B., and Labiod, S. (2022). Analytical com-
Philippe, G., Teramoto, A., and Ohmi, T. (2010). Modelling
pact model of nanowire junctionless gate-all-around
of the hole mobility in p-channel MOS transistors fab-
MOSFET implemented in verilog-A for circuit simula-
ricated on (1 1 0) oriented silicon wafers. Solid-State
tion. Silicon, 14(16), 10967–10976.
Elec., 54(4), 420–426.
Billel, S., Nafa, F., Upadhyay, A. K., Labiod, S., Rahi, S. B.,
Guangxi, H., Xiang, P., Ding, Z., Liu, R., Wang, L., and
Benlatreche, M. S., Akroum, H., Lakhdara, M., and
Tang, T.-A. (2014). Analytical models for electric po-
Yadav, R. (2023). Compact modeling of junction-
tential, threshold voltage, and subthreshold swing of
less gate-all-around MOSFET for circuit simulation:
junctionless surrounding-gate transistors. IEEE Trans.
Scope and challenges. Device Circuit Co-Design Is-
Elec. Dev., 61(3), 688–695.
sues in FETs, 57–78. CRC Press.
Chunsheng, J., Liang, R., Wang, J., and Xu, J. (2014). Ana-
Trevisoli, R. D., Doria, R. T., de Souza, M., Das, S., Ferain,
lytical short-channel behavior models of junctionless
I., and Pavanello, M. A. (2012). Surface-potential-
cylindrical surrounding-gate MOSFETs. 2014 Int.
based drain current analytical model for triple-gate
Symp. Next-Gen. Elec. (ISNE), 1–2. IEEE.
junctionless nanowire transistors. IEEE Trans. Elec.
David, J., Iniguez, B., Sune, J., Marsal, L. F., Pallares, J.,
Dev., 59(12), 3510–3518.
Roig, J., and Flores, D. (2004). Continuous analytic
Tsormpatzoglou, A., Tassis, D. H., Dimitriadis, C. A.,
IV model for surrounding-gate MOSFETs. IEEE Elec.
Ghibaudo, G., Pananakakis, G., and Clerc, R. (2009).
Dev. Lett., 25(8), 571–573.
A compact drain current model of short-channel cy-
Ye-Ram, K., Lee, S.-H., Sohn, C.-W., Choi, D.-Y., Sagong,
lindrical gate-all-around MOSFETs. Semicond. Sci.
H.-C., Kim, S., Jeong, E.-Y. et al. (2013). Simple S/D
Technol., 24(7), 075017.
series resistance extraction method optimized for
Juncheng, W., Du, G., Wei, K., Zhao, K., Zeng, L., Zhang,
nanowire FETs. IEEE Elec. Dev. Lett., 34(7), 828–
X., and Liu, X. (2014). Mixed-mode analysis of differ-
830.
ent mode silicon nanowire transistors-based inverter.
Alok, K., Gupta, T. K., Shrivastava, B. P., and Gupta, A.
IEEE Trans. Nanotechnol., 13(2), 362–367.
(2023). Impact of temperature variation on noise
Yu, Y. S. (2014). A unified analytical current model for
parameters and HCI degradation of recessed source/
N-and P-type accumulation-mode (junctionless) sur-
drain junctionless gate all around MOSFETs. Micro-
rounding-gate nanowire FETs. IEEE Trans. Elec. Dev.,
elec. J., 134, 105720.
61(8), 3007–3010.
Subindu, K., Kumari, A., and Das, M. K. (2016). Develop-
ment of a simulator for analyzing some performance
7 Crop recommendation using machine learning
Paramveer Kaura and Brahmaleen Kaur Sidhu
Department of Computer Science and Engineering, Punjabi University, Patiala, Punjab, India
Abstract
Agriculture serves as the cornerstone of India’s economic expansion, constituting the primary income source for a significant
proportion of its populace, encompassing both those directly engaged in agricultural activities and those who depend on it
indirectly for their livelihoods. Therefore, it is essential for farmers to make the correct option possible when cultivating any
crop so that the farmer can make maximum profit from the agriculture field. To make the agriculture sector profitable, one
of the technologies that may be used in this age of rapid technological improvement is known as machine learning (ML). In
this research paper, various ML algorithms, such as logistic regression (LR), decision trees (DT), LightGBM, and random
forest (RF), have been utilized to analyze a dataset. The primary objective is to predict the most suitable crop based on soil
attributes such as (nitrogen, phosphorous, potassium) NPK content, humidity, temperature, soil pH level, and rainfall. Out of
this random forest and LightGBM comes with great accuracy whereas decision tree and logistic regression have less accuracy.
In addition, ML algorithms will likely find applications in a variety of agricultural subfields in the near future, including the
diagnosis of plant diseases, the selection of soil types, and the forecasting of retail pricing.
Keywords: Machine learning, crop recommendation, decision tree, random forest, logistic regression, LightGBM
a
[email protected]
50 Crop recommendation using machine learning
this four, ML models are deployed to make accurate farmers’ crop management issues like crop selection,
crop recommendations. yield, and profit. Researchers employ decision trees,
Naive Byes, SVM, LR, RF, and Xgboost. Pradeepa
II. Related work Bandara et al. developed a crop recommendation sys-
tem for Sri Lanka (Bandara et al., 2020). The study
Pudumalar et al. (2016) addressed precision agricul- provides a theoretical as well as a conceptual plat-
ture. This study proposes an ensemble model with form for a recommendation system using Arduino
majority voting technique utilizing RT, Naïve Bayes, microcontrollers, ML approaches such as Naive
CHAID, and K-nearest neighbor (KNN) as learn- Bayes (multi-nomial) and SVM and unsupervised ML
ers to effectively and correctly suggest a crop for algorithms that are K-Means Clustering and Natural
site-specific parameters. The study (Kanaga Suba Language Processing (NLP) (sentiment analysis).
Raja et al., 2017) analyses historical data to predict Avinash Kumar et al. (2019) addressed crop selection
a farmer’s crop output and price. Sliding window and disease issues. SVMs classification model, deci-
non-linear regression predicts agricultural output sion tree model, and logistic regression model were
depending on rainfall, temperature, market prices, used to create this recommendation system.
land area, and crop yield. Zeel Doshi et al. (2018)
developed a soil dataset-based crop recommendation
III. Objectives
system for only four crops. The ensemble model uses
random forest (RF), Naive Bayes, and linear support The aim of the proposed work is to implement ML
vector machines base learners. The majority voting algorithms for developing crop recommendation sys-
technique is employed in the combination approach tem and it is based on chemical properties of soil and
because it is the most accurate. The author uses Big weather condition and to evaluate the proposed system.
Data analytics and ML to create an AgroConsultant,
an system that assists Indian farmers choose the best IV. Background techniques
crop based on sowing season, farm location, soil
properties, and environmental factors like tempera- A. Logistic regression
ture and rainfall (Doshi et al., 2018). Rainfall predic- It is a ML algorithm primarily applied to classifica-
tor, another approach created by academics, predicts tion problems, operates on the foundation of predic-
annual precipitation. The system uses DT, KNN, RF, tive analysis rooted in probability (Rymarczyk et al.,
and neural networks. 2019). Notably, the LR model adopts a more intricate
Shilpa Mangesh Pande et al. (2021) provide farm- cost function than linear regression. This cost func-
ers a simple yield projection tool. Farmers utilize a tion, often referred to as the “Sigmoid function” or
smartphone app to connect to the internet. GPS “logistic function,” replaces the linear function. Due
locates users. Enter location and soil type. ML sys- to the fundamental premise of logistic regression, the
tems can identify the most profitable crops and pre- output range of the cost function is inherently con-
dict agricultural yields for user-selected crops. SVM, fined to the interval [0, 1]. This constraint stems from
RF, MLR, ANN, and KNN are used to predict agri- the nature of logistic regression, where it inherently
cultural production. The research (A et al., 2021) models the probability of an event occurring, ren-
suggests a way to assist farmers pick crops by con- dering linear functions unsuitable for capturing its
sidering planting time, soil qualities including type of nuances and characteristics.
soil, pH value, and nutrient content, meteorological
aspects like rainfall, temperature, and state location. B. Decision tree
The suggested system has been developed using linear When it comes to representing models for use in
regression as well as neural network. Another study data classification, decision trees are among the most
(Gosai et al., 2021) forecasts the best crop based on popular approaches (Jijo and Abdulazeez, 2021). DT
N, P, K, pH of soil, humidity, temperature, and rain- stand as versatile assets in numerous domains, span-
fall. Decision trees, SVM, Nave Bayes, Support vec- ning machine learning, image processing, and pattern
tor machine, LR, RF, and XGBoost were utilized to recognition. Their core role revolves around the task
develop suggested system, and the maximum accu- of classification and, as a result, they find wide appli-
racy was of XGBoost. Distribution analysis, majority cation as classifiers within the field of data mining.
voting, correlation analysis and ensembling are used These decision trees are architecturally composed of
to create 22 crop recommendations (Kulkarni et al., interconnected nodes and branches, each node rep-
2018). A three-level technique solves crop recommen- resenting a collection of attributes within discrete
dations. Chhikara et al. (2022) propose a ML-based classification categories. Each branch within the tree
crop recommender system that can accurately fore- signifies a potential value associated with the respec-
cast the yield of 22 different crop types, addressing tive node. Decision trees earn considerable favor for
Applied Data Science and Smart Systems 51
C. Random forest
In the field of ML, random forest, a supervised learn-
ing technique, has demonstrated considerable success.
It’s versatile and can handle various tasks like classifi-
cation and prediction. What sets random forest apart
is that it operates like a team of decision trees collabo-
rating to solve problems. Rather than rely on a one
decision tree, it combines the results of many trees,
each trained on different parts of the data. This coop-
erative approach enhances accuracy. Essentially, the
more trees in this “forest,” the better the performance,
and it’s less prone to errors (Dabiri et al., 2022; Gera
et al., 2021).
D. LightGBM
Tree-based learning algorithms are at the foundation
of LightGBM, a gradient boosting framework (Tang
et al., 2020). It has the many benefits because of its
decentralized and efficient design such as increased
efficiency and accelerated training time. It uses less
memory and allows for multi-GPU and distributed
learning. LightGBM has ability to process large Figure 7.1 Flow chart of proposed methodology
amount of data as well as gives enhanced precision.
Abstract
Artificial Intelligence (AI) and sustainability are two sides of same coin. AI is a reliable ally in the fight for sustainability,
leading us to a brighter future. AI illuminates renewable energy, resource management, and eco-friendly decision-making by
analyzing large datasets. However, the energy usage and carbon footprint of AI models and AI sustainability are increasingly
under review. This research paper examines the environmental implications of AI models, focusing on ChatGPT, and empha-
sizes the necessity for sustainable AI development. Recent studies show that AI model creation and use significantly impact
the global carbon footprint due to energy, water, and carbon emissions. With its massive computational needs, ChatGPT con-
tributes to environmental issues. To tackle this dilemma, sustainable AI development must be promoted. Model compression,
quantization, and knowledge distillation improve AI energy efficiency. The use of renewable energy and the establishment
and enforcement of AI model energy efficiency requirements are equally crucial. ChatGPT and comparable models can be
environmentally friendly by using sustainable AI development methods. In this line, the objective of the present study is to
analyze the impact of the use of AI tools, specifically ChatGPT, on sustainability and environmental protection by analyzing
existing reports and studies on the environmental impact of artificial intelligence models.
Academicians, developers, politicians, institutions and organizations must work together to create rules and frameworks
for energy-efficient AI algorithms, renewable energy use, and responsible deployment. This study article concludes that AI
models’ energy usage and carbon footprint must be understood and reduced. By promoting sustainable practices, the AI
community may encourage a more environmentally sensitive and responsible approach to AI development, leading to a
greener future that meets global sustainability goals.
Keywords: Artificial intelligence, AI-language models, ChatGPT, environmental impact, carbon footprint, water footprint,
greenhouse gas emissions, energy consumption, sustainability, mitigation strategies
[email protected]
a
Applied Data Science and Smart Systems 55
models by addressing such challenges. Suggestions for significantly impacts business sustainability. Ray
the adoption of sustainable practices and the usage of (2023) asked ChatGPT how it will play a significant
renewable energy sources in all fields are part of the role in agricultural science and technology in future
study. This article addresses the environmental effect and got responses which may lead to the sustainable
of ChatGPT and offers suggestions for sustainable AI development of the farming sector.
development, but it also has certain restrictions and After refereeing a number of research papers and
opens up avenues for future exploration. articles published on ChatGPT and its application in
The study highlights the need to take into account various fields, it was found that individually many
the ecological implications of AI systems and the papers talk about the application of ChatGPT in vari-
demand for sustainable practices in creating and ous areas for sustainable development and extend-
implementing them. The last part includes the conclu- ing similar work, in this study, authors are trying to
sion and future prospects of the study. analyze the impact of the use of AI tools, specifically
ChatGPT, on sustainability and environmental pro-
II. Review of literature tection by analyzing existing reports and studies on
the environmental impact of artificial intelligence
In the contemporaneous literature available in the models.
field of information technology, numerous studies are
available that provide information about the chatbots,
III. ChatGPT and potential areas of concern
language models and IT platforms. This section pres-
ents the evolvement of research based on ChatGPT Kain (2023) stated that ChatGPT is an advanced
and its relation to sustainable development. language model developed by OpenAI and released
Zhu et al. (2023) raised concerns about environ- in November 2022. The acronym “ChatGPT” com-
mental issues due to the introduction of another natu- bines the terms “Chat”, which refers to the chatbot
ral language processing model, ChatGPT. They have functionality of the framework, and “GPT” stands for
used ten real-world examples to study the impact of “Generative Pre-trained Transformer” and it is a type
ChatGPT and its impact on the environment. Another of Large Language Model (LLM). ChatGPT is based
study by Khowaja et al. (2023) focused on an aspect on the core GPT models from OpenAI, GPT-3.5 and
of large language models which were ignored, includ- GPT-4, which provide conversational interaction
ing sustainability, privacy, digital divide and ethics (Lund et al., 2023).
(SPADE) and based on primary data and visualization, To generate intelligent and captivating text-based
they suggested that not only ChatGPT other models replies to user input, the latest AI conversation tool
should also undergo SPADE analysis. George (2023) takes advantage of the most recent advancements in
raised the issue of water consumption by ChatGPT. It machine learning as well as natural language process-
was found that the water consumption by AI models ing (NLP) (Bhaskar, 2022).
is relatively less than in other industries but it is still OpenAI launched in November 2022, ChatGPT
a matter of concern, and it should be further reduced revolutionized how people interact globally by pro-
by taking appropriate measures like improving energy ducing replies to common writing jobs in seconds.
efficiency, utilizing renewable energy sources, opti- Despite the fact that ChatGPT’s “outputs may be
mizing algorithms and implementing strategies to inaccurate, untruthful, and otherwise misleading at
conserve water. times”, as stated in its FAQs, the model’s speed and
Biswas (2023) integrated with ChatGPT to get adaptability make it widely applicable for simple
responses on the effect of ChatGPT on global warm- writing tasks, including cover letters, and many more
ing and analyzed the replies received. Biswas con- uncountable things.
cluded that ChatGPT can be used in various ways to ChatGPT does not directly impact the environ-
aid climate research, including model “parameteriza- ment because it is an AI language model. However,
tion, data analysis and interpretation, scenario gen- the infrastructure and data centers needed to support
eration, and model evaluation”. Sohail et al. (2023) ChatGPT, as well as the technology that enables it, may
reviewed 100 Scopus papers on ChatGPT and found have an impact on the environment. Such as training
that ChatGPT has applications in various fields like and operating complex language models like GPT-3
healthcare, marketing and financial services, software require a substantial amount of computer power,
engineering, academic and scientific writing, research which is why ChatGPT uses a lot of energy. If the
and education, environmental science, and natural energy required to power data centers and computer
language processing and its potential to address real- infrastructure comes from non-renewable sources, it
world problems. Vrontis et al. (2023) analyzed the may cause carbon emissions and environmental dam-
role of ChatGPT and skilled employees in business age (Teubner, 2023). Also, the energy needed to run
sustainability and found that leadership motivation AI models results in the emission of carbon dioxide
56 Environment and sustainability development: A ChatGPT perspective
and other greenhouse gases, which fuel global warm- ChatGPT’s 1 million users sent one request each day,
ing. The carbon footprint of ChatGPT and other AI ChatGPT would get the same number of requests per
systems depends on factors such as the energy source, day as BLOOM did at that time. At least based on the
cooling requirements, and hardware efficiency (An et volume of discussion about ChatGPT in traditional
al., 2023; Khattar et al., 2020). and social media platforms, ChatGPT handles far
ChatGPT needs a lot of processing and storage more daily requests than similar services. Although
power, which is often provided by big data centers. there is a great deal of ambiguity around this estimate
Massive amounts of water are used to cool these data since it is founded on some dubious presumptions,
centers, which leads to a water footprint. Apart from compared to in-depth analyses of BLOOM’s carbon
that, they also need various other materials like metals footprint, a comparable linguistic model, it seems
and minerals to build and maintain them (Qin, 2023). plausible.
As AI technology develops quickly and becomes obso- Figure 8.1 (Statista.com) shows the energy con-
lete, it may cause an increase in e-waste as outmoded sumed by AI models during training is significant, with
gear is discarded. E-waste poses environmental risks both GPT-3, the first version of the current edition of
due to improper disposal, as it often contains hazard- OpenAI’s popular ChatGPT, and Gopher requiring
ous and toxic elements (Khan, 2023). well over a thousand-megawatt hours of electricity.
Because this is solely for the training model, the over-
IV. ChatGPT’s: Creating carbon footprint all energy consumption of GPT-3 and other LLMs is
expected to be substantially greater. GPT-3, the great-
The phrase “carbon footprint” denotes the total est energy user, consumed nearly the equivalent of
quantity of “carbon dioxide (CO2)” pollutants gener- 200 Germans in 2022. While not enormous, it repre-
ated by a particular person or a company (such as a sents a significant usage of energy.
nation, business, building, etc.). Both immediate emis- While it is undeniable that training LLMs requires
sions from the energy generation that drives consumer a significant amount of energy, the energy sav-
products and services and further emissions from the ings are anticipated to be significant. Any AI model
burning of fossil fuels for industry, transportation, that improves operations by a fraction of a second
and heating make up this total. Additionally, meth- might save hours of shipping, liters of gasoline, or
ane, nitrous oxide, and chlorofluorocarbons (CFCs) hundreds of computations. Each consumes energy,
emissions are frequently taken into consideration and the total amount of energy saved by an LLM
when discussing a carbon footprint idea (An et al., may considerably outpace its energy cost. Mobile
2023; Euronews, 2023). phone carriers are an excellent example, with one-
Kain (2023) stated that the carbon footprint of third expecting AI to lower power usage by 10 per
creating ChatGPT isn’t public information, but if cent to 15 per cent. Given how much of the world
understood correctly, it is based on a GPT-3 variation. relies on mobile phones, this would be a significant
Estimates show that training GPT-3 consumed 1,287 energy saver. The CO2 emissions from training LLMs
MWh and generated 552 tons of CO2. are also significant, with GPT-3 emitting over 500
Mclean’s (2023) research paper stated that it is tons of CO2. This, too, might be drastically altered
most certainly considerably greater than that of GPT- depending on the sorts of energy generation that
3. The energy expenditures would increase if it had to cause the emissions. Most data center operators,
be rebuilt frequently in order to refresh its knowledge. for example, would want to have nuclear energy, a
The amount of carbon dioxide that ChatGPT is esti-
mated to produce annually is 8.4 tons, which is more
than twice as much as the annual emissions of a single
person. i.e., 4 tons.
ChatGPT’s daily emissions of 23.04 kg of CO2 per
day would add up to 414.72 kg CO2 during the course
of 18 days and on the contrary, Big Science Large
Open-science Open-access Multilingual Language
Model (BLOOM) (Luccioni, 2022) released 360
kg of CO2 during the course of 18 days. The differ-
ence between the two emission estimates can be due
to many things, including the varying carbon inten-
sities of the electricity (Jiafu, 2023) generated by Figure 8.1 Power usage for training large language
BLOOM and ChatGPT. It’s also crucial to remember models (LLMs) based on AI in 2023 (in megawatt
that BLOOM handled 230,768 requests in total over hours)
18 days, or 12,820 on average every day. If 1.2% of Source: Statista
Applied Data Science and Smart Systems 57
notably low-emission energy generator, play a big well over a thousand-megawatt hours of electricity.
role. Because this is solely for the training model, the over-
Figure 8.2 (Statista.com) shows how the develop- all energy consumption of GPT-3 and other large lan-
ing world is making the most aggressive efforts to guage models (LLMs) is expected to be substantially
reduce emissions from AI models used in organiza- greater.
tions. This covers enormous regions in India, Africa, Figure 8.4 (Statista.com) shows CO2 emissions
Latin America, and the Middle East, including a siz- from AI are significant compared to the average
able chunk of the planet and most of its inhabitants. human emission in 2022. GPT-3 training, not includ-
The proportion of organizations tackling emissions in ing the model that is now operating, produced more
those regions is approximately double that of North than a hundred individuals in a year. Training Gopher
America. North American and European organiza- was the equivalent of seventeen Americans’ emissions.
tions are taking fewer steps, which might be due to While the figure may appear considerable, it must be
the fact that the energy utilized to power this technol- seen from the perspective of potential emission reduc-
ogy on those continents is often greener than in the tions through more efficient business strategies.
developing world. It is observed from Figure 8.5 (Statista.com) that
Figure 8.3 (Statista.com) shows the energy con- the power consumption while training AI-based LLM
sumed by AI models during training is significant, with
both GPT-3, the first version of the current edition of
OpenAI’s popular ChatGPT, and Gopher requiring
Figure 8.3 Emissions when training AI-based large lan- Figure 8.5 Power consumption when training AI based
guage models (LLMs) in 2022 (in CO2 equivalent tons) large language models (LLMs)
58 Environment and sustainability development: A ChatGPT perspective
nevertheless, providers have a number of options for Figure 8.7 (Statista.com) shows that when AI tools
reducing their digital footprint. were employed, organizations in 2022 were primarily
Table 8.1 represents the steps that are effective in concerned with reducing their physical influence on
reducing the environmental impact of Chat GPT: the environment. This is most likely owing to such
These steps are effective in reducing the environ- enhanced efficiency simply translating to improved
mental impact of ChatGPT. However, their effective- corporate growth and expenses. Organizations priori-
ness depends on the specific circumstances of the data tize ethical product sourcing since it may sometimes
center where ChatGPT is located. Some solutions result in direct cost increases to manufacturing and
may be more feasible than others based on the loca- supply lines.
tion of the data center, the type of hardware used, and
other factors.
For example, optimizing the location of a data
center may not be feasible in all cases. Data centers
may be located in areas with limited access to cooler
climates or water sources. In these cases, alternative
cooling methods or improving energy efficiency may
be more feasible solutions (Mclean, 2023).
Choose required information The cost of training a model may be greatly decreased by utilizing just the necessary
data or by successfully adapting current models for a new purpose, making AI more
viable
Invest in green energy In order to decrease CO2 emissions, efforts are needed to increase the use of renewable
energy sources in data centers. Therefore, it is advisable and essential to rely on cloud
service providers to make sure that electricity is delivered from renewable energy
Reduce unnecessary Unnecessary computations should be reduced in order to lower the overall workload of
computations ChatGPT. By improving the model’s data processing methods and algorithms, this can
be accomplished. Less energy and water will be needed to power ChatGPT by reducing
the amount of computing that is not required
Monitoring and analyzing It’s crucial to routinely track and evaluate ChatGPT’s water usage. Data center
water consumption operators may use this to streamline their processes and find places where water usage
can be decreased
Advocate for greater The creation and maintenance of measurements and standards for assessing the energy
transparency efficiency of creating and implementing ML models is one approach to resolving this
problem (Henderson et al., 2020)
Optimize data center location Locate and promote areas with the potential to host greater amounts of renewable
energy and data centers with reduced carbon footprints
Prolonging life of AI models Increasing the longevity of AI technology and infrastructure through upkeep,
maintenance, and updates can cut down on the production of electronic waste. To
minimize environmental impact, it is also crucial to recycle and properly dispose of old
AI technology
Encourage environmental Environmental awareness is critical because it will help promote responsible AI
awareness industry practices that will open the door for “greener” AI. One tactic for doing this is
to emphasize the limitations of language models and to lessen the excitement around
novel, eye-catching AI systems like ChatGPT. We may actively support new lines of
inquiry that do not simply rely on creating more complicated ones (Zhu, 2023)
60 Environment and sustainability development: A ChatGPT perspective
models against human performance would provide nov. J., 1(2), 97–104. doi: https://doi.org/10.5281/
important insights into the relative sustainability of zenodo.7855594.
AI development. Collaborative working with busi- Jiafu, A. N., Wenzhi, D. I. N. G., and Chen, L. I. N. (2023).
ness stakeholders, AI developers, and environmen- Correspondence: ChatGPT: Tackle the growing car-
bon footprint of generative AI. Nature, 615(7953),
tal specialists would promote a multidisciplinary
586. doi:https://doi.org/10.1038/d41586-023-00843-
approach to comprehending and reducing the envi-
2.
ronmental effects of AI models. These collaborations Tanushree, K. (2023). Is ChatGPT harmful to the environ-
might make it easier for people to acquire informa- ment. Sigma Earth. https://sigmaearth.com/is-chatgpt-
tion, share expertise, and create sustainable practices harmful-to-the-environment/.
and norms. Mehreen, K. and Chaudhry, M. N. (2023). Artificial intel-
As time goes on carrying out longitudinal studies ligence and the future of impact assessment. Available
over a lengthy period of time, researchers will be able at SSRN 4519498. doi: http://dx.doi.org/10.2139/
to monitor changes in the environmental effect of AI ssrn.4519498.
models. In order to lessen the environmental impact Ali, K. S., Khuwaja, P., and Dev, K. (2023). ChatGPT needs
of AI models, this would assist to detect trends, tech- SPADE (Sustainability, PrivAcy, Digital divide, and
Ethics) evaluation: A review. arXiv preprint arX-
nological improvements, and viable mitigation tech-
iv:2305.03123. doi: https://doi.org/10.48550/arX-
niques. Adding case studies and field research to
iv.2305.03123.
secondary data analysis will offer insightful informa- Alexandra Sasha, L., Viguier, S., and Ligozat, A.-L. (2022).
tion on the precise environmental effects of AI mod- Estimating the carbon footprint of bloom, a 176b
els in various industries or applications. These studies parameter language model. arXiv preprint arX-
could concentrate on actual situations and take into iv:2211.02001.
account things like the setup of data centers, power Lund, B. D., Wang, T., Mannuru, N. R., Nie, B., Shimray, S.,
sources, and energy-saving techniques. and Wang, Z. (2023). ChatGPT and a new academic
reality: Artificial Intelligence-written research papers
and the ethics of the large language models in schol-
References arly publishing. J. Assoc. Inform. Sci. Technol., 74(5),
Gulzar, A., Ihsanullah, I., Naushad, M., and Sillanpää, M. 570–581. doi:https://doi.org/10.1002/asi.24750.
(2022). Applications of artificial intelligence in water Khattar, N., Singh, J., and Sidhu, J. (2020). An energy ef-
treatment for optimization and automation of adsorp- ficient and adaptive threshold VM consolidation
tion processes: Recent advances and prospects. Chem. framework for cloud environment. Wireless Personal
Engg. J. 427, 130011. doi:https://doi.org/10.1016/j. Comm., 113, 349–367.
cej.2021.130011. Sophie, M. (2023). The environmental impact of ChatGPT:
An, J., Ding, W., and Lin, C. (2023). ChatGPT: Tackle A call for sustainable practices in AI development.
the growing carbon footprint of generative AI. Na- Earth.org. https://earth.org/environmental-impact-
ture, 615(7953), 586. doi:https://doi.org/10.1038/ chatgpt/#:~:text=The/Environmental/Impact/of/Data/
d41586-023-00843-2. Centres&text=According/to/estimates/C/ChatGPT/
Priyanka, B. and Sharma, K. D. (2022). A critical insight emits.
into the role of artificial intelligence (AI) in tour- Kannan, N. (2023). AI-enabled water management sys-
ism and hospitality industries. Pacific Business Rev. tems: An analysis of system components and interde-
Int., 15(3), 76–85. https://www.researchgate.net/ pendencies for Wwater conservation. Eigenpub Rev.
publication/371110624_A_Critical_Insight_into_the_ Sci. Technol., 7(1), 105–124. https://studies.eigenpub.
Role_of_Artificial_Intelligence_AI_in_Tourism_and_ com/index.php/erst.
Hospitality_Industries. David, P., Gonzalez, J., Hölzle, U., Le, Q., Liang, C., Mun-
Biswas, S. S. (2023). Potential use of chatGPT in global guia, L.-M., Rothchild, D., So, D. R., Texier, M., and
warming. Ann. Biomed. Engg., 51(6), 1126–1127. Dean, J. (2022). The carbon footprint of machine
doi:https://doi.org/10.1007/s10439-023-03171-8. learning training will plateau, then shrink. Computer,
David, D. (2023). AI creates new environmental injus- 55(7), 18–28. doi: 10.1109/MC.2022.3148714.
tices, but there’s a fix. News. https://news.ucr.edu/ Chengwei, Q., Zhang, A, Zhang, Z., Chen, J., Yasunaga,
articles/2023/07/12/ai-creates-new- environmental- M., and Yang, D. (2023). Is ChatGPT a general-
injustices-theres-fix. purpose natural language processing task solv-
Euronews. (2023). Chat: What is the carbon footprint er?. arXiv preprint arXiv:2302.06476. doi:https://doi.
of generative AI models? Euronews. https://www. org/10.48550/arXiv.2302.0647.
euronews.com/next/2023/05/24/chatgpt-what- Partha Pratim, R. (2023). AI-Assisted Sustainable Farming:
is-the-carbon-footprint-of-generative-ai-mod- Harnessing the Power of ChatGPT in Modern Agri-
els#:~:text=Researchers%20estimated%20that%20 cultural Sciences and Technology. ACS Agricultural
creating%20GPT. Science & Technology. 460–462. Doi: https://doi.
George, A. S., George, A. S. H., and Martin, A. S. G. (2023). org/10.1021/acsagscitech.3c00145
The environmental impact of AI: A case study of wa- Preeti, S. and Priyanka, P. (2019). Climate change and sus-
ter consumption by Chat GPT. Partn. Univ. Int. In- tainable development: Special context to Paris agree-
62 Environment and sustainability development: A ChatGPT perspective
ment. Proc. Int. Conf. Sustain. Comput. Sci. Technol. Aimee, V. W. (2021). Sustainable AI: AI for sustainabil-
Manag. (SUSCOM). doi:http://dx.doi.org/10.2139/ ity and the sustainability of AI. Spring Link, 1(3),
ssrn.3356829. 213–218. doi:https://doi.org/10.1007/s43681-021-
Sohail, S. S., Farhat, F., Himeur, Y., Nadeem, M., Madsen, 00043-6.
D. Ø., Singh, Y., Atalla, S., and Mansoor, W. (2023). Demetris, V., Chaudhuri, R., and Chatterjee, S. (2023).
Decoding ChatGPT: A taxonomy of existing research, Role of ChatGPT and skilled workers for business
current challenges, and possible future directions. J. sustainability: Leadership motivation as the mod-
King Saud Univ. Comp. Inform. Sci.. 101675. doi: erator. Sustainability, 15(16), 12196. doi: https://doi.
https://doi.org/10.1016/j.jksuci.2023.101675. org/10.3390/su151612196.
Aman, S., Jain, S., Maity, R., and Desai, V. R. (2022). De- Pooja, Y. (2023). Explained: What is the water footprint
mystifying artificial intelligence amidst sustainable ag- of AI and how AI tools are raising environmental
ricultural water management. Curr. Dir. Water Scar. concerns. IndiaTimes. https://www.indiatimes.com/
Res., 7, 17–35. doi:https://doi.org/10.1016/B978-0- explainers/news/explained-what-is-the-water-foot-
323-91910-4.00002-9. print-of-ai-and-how-ai-tools-are-raising-environmen-
Timm, T., Flath, C. M., Weinhardt, C., van der Aalst, W., tal-concerns-603277.html.
and Hinz, O. (2023). Welcome to the era of chat- Jun-Jie, Z., Jiang, J., Yang, M., and Ren, Z. J. (2023).
gpt. The prospects of large language models. Busin. ChatGPT and environmental research. Envi-
Inform. Sys. Engg., 65(2), 95–101. doi: https://doi. ron. Sci. Technol. doi:https://pubs.acs.org/action/
org/10.1007/s12599-023-00795-x. showCitFormats?doi=10.1021/acs.est.3c01818.
9 GAI in healthcare system: Transforming research in
medicine and care for patients
Mahesh A.1,a, Angelin Rosy M.2, Vinodh Kumar M.3, Deepika P.4,
Sakthidevi I.5 and Sathish C.6
1,4
Sri Sairam College of Engineering, Karnataka, India
2,6
Er. Perumal Manimekalai College of Engineering, Tamilnadu, India
3
P.S.V College of Engineering and Technology, Tamilnadu, India
5
Adhiyamaan College of Engineering, Tamilnadu, India
Abstract
GAI also known as generative artificial intelligence, represents a category of artificial intelligence (AI) that possesses the
capability to produce novel content, encompassing images, written text, and music. Although it remains in its emerging
phases of advancement, this technology holds the promise of revolutionizing numerous sectors, ranging from healthcare and
finance to entertainment. The subject of GAI is rapidly developing and holds the capacity to transform the field of health-
care. The adoption of GAI technology has revolutionized the healthcare industry, transforming the way patients are treated
and medical research is conducted. This article explores the many potential applications of GAI in healthcare, including its
ability to improve diagnostic accuracy, optimize treatment, accelerate drug discovery, and enhance medical image analysis.
GAI, as demonstrated by advanced neural network algorithms like variational autoencoders (VAEs) and generative adver-
sarial networks (GANs) enables healthcare practitioners, medical analyst, technologist and scientists to generate realistic
and high-fidelity medical data. Using this technology, medical professionals can improve diagnosis accuracy by combining
varied information about patients, allowing for more robust and individualized treatment strategies. Furthermore, GAI aids
in the generation of realistic medical images, allowing medical practitioners to better grasp and interpret difficult illnesses.
In the field of drug exploration, GAI speeds up the process for determining possible compounds and molecules, saving time
and money over traditional methods. It investigates how GAI encourages interaction among human experts and artificially
intelligent machines, allowing medical practitioners to make better decisions. This complementary partnership takes use of
the capacity of artificial intelligence to analyze large datasets, detect trends, and recommend viable treatment paths, while
human knowledge provides the context-sensitive knowledge required for informed decision-making. Ethical concerns and
obstacles related with the application of GAI to medical procedures are also addressed, with an emphasis on the importance
of responsible application, data protection, and transparency. The healthcare sector aspires ready to bring in a new era of
distinctive effective and cost-effective treatment for patients and research in medicine by adopting the revolutionary potential
of GAI and managing its ethical consequences.
Keywords: Generative artificial intelligence, healthcare, generative adversarial networks, variational autoencoders, ethical
a
[email protected]
64 GAI in healthcare system: Transforming research in medicine and care for patients
generator improves over time at producing data that in the upcoming years thanks to the ongoing develop-
is accurate. ment of this technology (Singh et al., 2019; Jovanović
et al., 2022; Samant et al., 2022).
b. Variational autoencoders (VAEs)
VAEs are a type of neural network that can compress II. Evolution of GAI
data into a smaller, hidden space, and then decom-
press it back to the original data. The latent space is a The advent of GAI signifies resulted in substantial
space with fewer dimensions that captures the data’s advances in ML and AI. In the following sections,
basic characteristics. After learning to represent data a timeline of how generative AI has progressed is
in the space known as the latent space, the VAE can discussed.
be used to produce new data by sampling points from
the latent space and decoding these again into the a. Beginning principles (1950–1990s)
data that was originally collected space. During the early years of AI research, the underlying
principles of GAI were established. In domains such
c. Recurrent neural networks (RNNs) as natural language processing and music creation,
RNNs are a type of neural network system that is researchers investigated rule-based systems and sym-
capable of processing sequential data. As a result, bolic representations to generate content.
they are well-suited for generating text, music, and
other sorts of data with a periodic order. b. The rebirth of neural networks in the 2000s
The various approaches needed to build a GAI sys- The “deep learning revolution,” or the resurrection of
tem will vary depending on the application. GANs, artificial neural networks, was critical in the creation
for instance, are frequently used to produce images, of generative artificial intelligence. Neural networks
but VAEs are frequently used to generate text. The with deep learning revealed the ability to learn data
following are some of the steps involved in developing hierarchies, allowing for the development of higher-
a GAI system: level and more intricate outputs (Davies et al., 2021).
i. Data collection: The initial step involves gather- c. Variational autoencoders (VAEs) (2013)
ing an extensive array of data pertinent to the VAEs pioneered a probabilistic approach to genera-
intended application. For instance, if the goal is tive modeling. To construct a latent space represen-
to create cat photographs, the initial task entails tation of data, they incorporated aspects from both
amassing a dataset comprising images of cats. generative and recognition models. VAEs enabled
ii. Dataset pre-processing: Before the data can be seamless interpolation and manipulation of latent
employed for model training, it might necessitate space data points.
pre-processing. This step could encompass tasks
such as data cleansing, noise reduction, and nor- d. Generative adversarial networks (GANs) (2014)
malization. GANs, suggested by Ian Goodfellow and colleagues,
iii. Algorithm choice: Multiple models exist for con- represented a significant development in generative
structing a GAI system. The selection of an ap- AI. GANs are made up of the discriminator and gen-
propriate model hinges on the specific applica- erator, two distinct neural networks that compete
tion and the quantity of available data. with one another in a manner akin to a game. While
iv. Model training: The algorithm is subjected to a the discriminator seeks to distinguish between genu-
training process using a dataset. The duration of ine and produced data, the generation process aims to
this process can vary based on the dataset’s size provide data that is as realistic as possible.
and the desired precision of the model, some-
times spanning a considerable timeframe. e. Visualizing the future era (2014–current)
v. Generate fresh data: Following the completion During this period, GAN gained prominence due
of model training, it becomes feasible to employ to their ability to create high-resolution images that
the model for generating novel data. The ap- closely resemble authentic photographs. Renowned
proach employed in this process is contingent on GAN architectures like deep convolutional GAN
the specific framework being used and dictates (DCGAN), StyleGAN, and BigGAN elevated the
the manner in which the new data is crafted. caliber and diversity of the generated images to new
heights (Guo et al., 2022).
While GAI systems are currently in their nascent
stages of research, they hold immense potential to f. Text and language making (2015–current)
revolutionize various industries we may anticipate Progress in the realm of natural language process-
seeing more cutting-edge and significant uses of GAI ing and deep learning has yielded the creation of text
Applied Data Science and Smart Systems 65
and language generative frameworks. Innovations produce offensive content, or reproduce biases exist-
like long- short- term memory (LSTM) networks and ing in training data sparked debate over ethical imple-
transformers have empowered the generation of logi- mentation and mitigating techniques.
cally connected and contextually fitting textual con-
tent (Sathish et al., 2023). j. Ongoing exploration and advancement (current and
beyond)
g. Music and audio production (2016–current) Researchers are working on ways to improve the
Generative algorithms have been used to compose quality of generated content by making it more
music and synthesize audio. Melodies, harmonies, realistic, diverse, and controllable. Hybrid models
and even full music recordings have been generated that combine different GAI techniques are being
using recurrent neural networks along with differ- developed to improve the performance of models.
ent sequence-to-sequence algorithms. WaveGAN and Creative applications of GAI are being explored
other approaches have also showed promise in pro- in areas such as art, music, and video games.
ducing realistic signals for audio. Interdisciplinary collaborations between researchers
from different fields are helping to advance the state
h. Applications in healthcare and science (2010–cur- of GAI research.
rent) Advances in deep learning architectures, computa-
GAI has been used in healthcare since 2010s for a tional power, and the availability of massive datasets
variety of purposes, including image interpretation, have driven the development of GAI. As technologi-
drug development, and personalized medicine. GANs cal advancements continue, AI with generative capa-
and VAEs have found use in creating artificial medical bilities has the potential to impact a wide range of
images to improve diagnostic accuracy and expand persistence, from entertainment and art to health-
small datasets (Figure 9.1) (Rebecca Perkins et al., care and scientific research in this system (Cai et al.,
2022). 2019).
studied is the first step in building a generative AI sys- Autoregressive algorithms generate information
tem. In the following sections, the stages below out- throughout a sequential manner, projecting the next
line the general technique for developing a generative component based on prior components.
artificial intelligence system.
d. Functions of loss
a. Select a generative approach GANs – The generator and discriminator networks
Variational autoencoders, GANs, and autoregressive are adversarial trained. The discriminator strives to
models such as transformers are examples of genera- accurately classify both real and generated data, while
tive models that can be used. As per an individual the generator aims to diminish the discriminator’s
wish, he/she can choose the model that best fits the ability to distinguish genuine from generated data.
data which has to be developed (Figure 9.2). VAEs – To guarantee space of latent information is
well-structured, the model is trained using a combina-
b. Collection of data and pre-processing tion of reconstruction loss (how well the generated data
A wide and representative dataset of the type of data matches the original input) and a regularization term.
(as per wish) is compiled to generate (e.g., photo- Autoregressive models optimize the expected prob-
graphs, document, audio, etc.) (Hajarolasvadi et al., ability distribution over the next element using nega-
2019). tive log-likelihood loss.
The data is pre-processed to ensure that it remains
consistent and in the correct format for the mathemat- e. System training
ical framework of choice. This could include scaling The representation’s parameters are prepared infor-
photos, standardizing the values of pixels, represent- mally. The model is feed with real data (for GANs,
ing text, and so on. this is the discriminator’s input; for VAEs, this is the
input for encoding and reconstruction). Fake data
c. Design of architecture samples are generated and feed to the model.
The design of GANs comprises of a generating net- The loss for both the real and generated data is
work and a discriminator network. The genera- calculated and use back propagation to update the
tor generates samples of data, and a discriminator model’s parameters (Walczak et al., 2018).
attempts to differentiate between genuine and pro-
duced samples. f. The iteration process and refinement
The design for VAEs consists of an encoder net- Continuous training of a computational framework
work, a decoder network, and a latent space in involves multiple rounds of iterative adjustments
between. The encoder converts input data to a lower- to enhance its performance. To avoid over fitting,
dimensional latent space, from which the decoder keep an eye on the model’s results on the validation
produces data. information.
g. Assessing and further refinement fitting. Nearly 10% of the data is used to gauge the
To analyze the quality and diversity of the gener- effectiveness of the model.
ated samples, domain-specific metrics or judgment
by humans are used. To improve outcomes, tweak c. Pre-processing of data
hyper parameters, model architectural design, as well Pictures are resized to a common resolution. Scale
as training procedures as appropriate (Alam et al., pixel values to a standard range, such as 0 to 1. To
2018). boost dataset diversity, supplement data with rota-
tions, flips, and other transformations.
h. Development / The next generation
Following the training session, the generator’s results d. Selection of appropriate model
can be employed to produce new data samples by A convolutional neural network (CNN) architecture
supplying random deep space points (for VAEs) or is choose that is appropriate for image categorization
randomly generated noise vectors (for GANs). when selecting a model.
Creating generative AI models for healthcare that Chatbots for personalized medical care
are both efficient and secure by adhering to these thor- Medical chatbots can be developed by healthcare
ough material and methodology standards, which will institutions to give patients with tailored medical
also help to improve patient care and outcomes. It is information and suggestions. Babylon healthcare, for
kept in mind that successful development of health- illustration, has created a chatbot that uses GAI to ask
care AI necessitates a multi-disciplinary approach and patients about the symptoms they are experiencing
collaboration with healthcare professionals. and provide individualized medical recommendations.
capturing data, producing electronic health records, personalized patient care. However, the challenges
and reducing complex medical terminology for and ethical considerations inherent in integrating
patient comprehension (Figure 9.3). generative AI within healthcare must be thoroughly
deliberated upon. With ongoing exploration in addi-
VI. Challenges generative AI in healthcare tion improvement, potential for generative artifi-
cial intelligence to reshape healthcare and amplify
Although AI that regenerates has enormous potential patient well-being in the coming years remains
in healthcare, several problems must be overcome. substantial.
1
Govt College for Women, Shahzadpur (Ambala), Haryana, India
4
Govt College, Naraingarh (Ambala), Haryana, India
Abstract
This paper is the fuzzy analysis of a queue network model with the assumptions of pre-emptive priority discipline on biserial
subsystems and general arrival is on parallel subsystems. It is presupposed that service time and the interval between two
succeeding arrivals follow the Poisson distribution. Both arrivals and service costs are fuzzy in nature. Performance of the
purposed model evaluated by using L-R fuzzy numbers. L-R method is more flexible and simplest method for fuzzy analysis
as compared to other existing methods. Fuzzy triangular number and all classical formulae used to calculate fuzzy queue
characteristics. A numerical calculation well illustrated the results.
Keywords: Fuzzy number, priority, parallel channels, biserial server, L-R method
a
[email protected]
72 Fuzzy L-R analysis of queue network with priority
To solve the above equation, by applying L’ hos- = 1. And find the utilization factors at different servers
pital rule with conditions | Z1|=| Z2|=| Z3|=| in stochastic environment
Z4|=|Z5|=|Z6|=|Z7|=1 and H(Z1, Z2, Z3, Z4, Z5, Z6, Z7)
Applied Data Science and Smart Systems 73
Fuzzified model
With the conditions exist if γ1, γ2, γ3, γ4, γ5, γ6, γ7 ≤ 1
Let us represent approximate crisp parameters
IV. Numerical illustration in the form of fuzzy numbers as
For particular crisp values, we get then
Using Table 10.1, utilization factor and queue from stochastic environment results, the fuzzy utiliza-
length is tion factor and queue characteristics can be written as
74 Fuzzy L-R analysis of queue network with priority
VII. Results
Fuzzy lengths of queues • Utilization of first server by high priority cus-
tomers lies between 0.1504 and 0.8271. Utiliza-
tion factor and partial queue length’s maximum
allowed values are 0.3906 and 0.6410. Utiliza-
tion of first server by low priority customers lies
between 0.2061 and 1.5529. The partial queue
lengths and Utilization factor maximum allowed
Average waiting time
values are 1.6738 and 0.6260.
• Utilization of second server by high priority
customers lies between 0.1772 and 0.8717.
Utilization factor and partial queue length’s
maximum allowed values are 0.4167 and
VI. Numerical illustration 0.7144. Utilization of second server by low
Table 10.3 is the fuzzy L-R representations of fuzzy priority customers lies between 0.2695 and
triangular numbers from Table 10.2. 1.6776. Utilization factor and partial queue
Using these numerical values, we get L-R represen- length’s maximum allowed values are 0.7045
tations of traffic intensity at servers are, and 2.3841.
• Utilization of third server lies between 0.2679
and 1.2498. Utilization factor and partial queue
length’s maximum allowed values are 0.5555 and
1.2497.
• Utilization of fourth server lies between .084 and Mittal, Meenu, T. P. Singh, and Deepak Gupta. (2015).
1.2821. Utilization factor and the length of par- Threshold effect on a fuzzy queue model with batch
tial queue maximum potential values are 0.4 and arrival. Arya Bhatta Journal of Mathematics and In-
0.6. formatics. 7(1), 109–118.
Singh, T. P., Mittal, M., and Gupta, D. (2016). Modelling of
• Utilization of fifth server lies between 0.2153
a bulk queue system in triangular fuzzy numbers using
and 1.4258. Utilization factor and partial queue
α-cut. Int. J. IT Engg., 4(9), 72–79.
length’s maximum potential values are 0.6087 Devaraj and Jayalakshmi. (2012). A fuzzy approach to pri-
and 3.4984. ority queues. Int. J. Fuzzy Math. Sys., 2(4), 479–488.
Gupta, D., Sharma, S., and Gulati. (2011). On steady state
VIII. Conclusion behavior of a network queuing model with bi-serial
and parallel channels linked with a common server.
In the present work, based on L-R fuzzy arithmetic Comp. Engg. Intel. Sys., 2(2).
operations, priority queues have been analyzed by Seema, Gupta, D., and Sharma, S. (2013). Analysis of bise-
the L-R technique. This method is used to evaluate rial servers linked to a common server in fuzzy envi-
numerical values of various performances of queues ronment. Int. J. Comp. Sci. Math., 68(6), 26–32.
like traffic intensity and length of queues at different Sharma, S., Gupta, D., and Seema. (2015). Network Aanaly-
servers in fuzzy environment. Fuzzy L-R representa- sis of fuzzy bi-serial and parallel servers with a multi-
stage flow shop model. 21st Int. Cong. Model. Simul.
tion is more informative than basic classical methods
Gold Coast Australia, 697–703.
in stochastic environment. For this numerical calcu-
Kalpana. (2021). Evaluation of performance measures of
lation is used to authenticate the study. While using fuzzy queues with preemptive priority using different
same approximate crisp and fuzzy data, then deter- fuzzy numbers. Adv. Appl. Math. Sci., 20(11), 2975–
mine the outcomes in the event of precise numbers for 2985.
the fraction of both type customers high and low pri- Kalpana and Anusheela. (2018). Analysis of fuzzy non-pre-
ority using the first server are 39.06% and 75.68%, emptive priority queue using non-linear programming.
second server usage by high and low priority custom- Int. J. Math. Trends Technol. (IJMTT), 56(1), 71–80.
ers is 50% and 85.98%, third, fourth and fifth server Selvakumaria and Revathi (2021). Analysis of fuzzy non-
usage are 66.66%, 28.85% and 77.77%, respectively. preemptive priority queuing model with unequal ser-
Accessing these servers while dealing with ambiguous vice rate. Turkish J. Comp. Math. Edu., 12(5), 1457–
1460.
data is 39.06% and 62.60%, 41.67% and 70.45%,
Rita, W. and Robert. (2009). Application of fuzzy set theory
55.55%, 40% and 60.87%, respectively. Thus, from
to retrial queues. Int. J. Algorith. Comput. Math., 2(4),
results we can observe that utilization of 1st and 2nd 9–18.
server by high priority customers is approximate same Ritha, W. and Menon, S. B. (2011). Fuzzy n policy queues
but utilization of servers in stochastic environment by with infinite capacity. J. Phy. Sci., 15, 73–82.
low priority customers is high as compared to fuzzy Ning and Zhao. (2009). Analysis on random fuzzy queu-
environment. The usage of 4th sever in crisp data is ing systems with finite capacity. 9th Int. Conf. Elec.
28.85% and in fuzzy data is 40%. Thus, the study in Busin., 1–7.
future can be extended for more queuing models with Yang, W. and Li. (2010). Fuzzy analysis for the n-policy
batch arrival, priority arrivals on parallel subsystem queues with infinite capacity. Int. J. Inform. Manag.
and biserial servers instead of parallel subsystem. Sci., 21, 41–45.
Srinivasan. (2013). Fuzzy queuing model using DSW algo-
rithm. Int. J. Adv. Res. Math. Comp. Appl., 1(1), 1–6.
References Ritha, W. and Vinnarasi, J. S. (2017). Analysis of priority
queuing models: L-R method. Ann. Pure Appl. Math.,
Prade, (1980). An outline of fuzzy or possibilistic mod-
15(2), 271–276.
els for queuing systems. Wang P. P. and Chang S. K.
Mukeba, J. P., Mabela and Ulungu. (2015). Computing
(eds), Fuzzy Sets. Plenum Press. 147–153. https://doi.
fuzzy queuing performance measures by L-R method.
org/10.1007/978-1-4684-3848-2_13.
J. Fuzzy Sets Valued Anal., 1, 57–67.
Li and Lee. (1988). Analysis of fuzzy queues. Proc. NAFIPS,
Mukeba, J. P. (2016). Application of L-R method to single
158–162.
server fuzzy retrial queue with patient customers. J.
Li and Lee. (1989). Analysis of fuzzy queues. Comp.
Pure Appl. Math. Adv. Appl., 16(1), 43–59.
Math. Appl., 17(7), 1143–1147. http://dx.doi.
Saini, V., Gupta, D., and Tripathi, A. K. (2022). Analysis
org/10.1016/0898-1221(89)90044-8.
of heterogeneous feedback queue model in stochastic
Li, K. and Chen. (1999). Parametric programming to the
and in fuzzy environment using L-R method. Math.
analysis of fuzzy queues. Fuzzy Sets Sys., 107, 93–100.
Stat., 10(5), 918–924.
http:/dx.doi.org/10.1016/S0165- 0114(97)00295-9.
Singh, T. P., Kusum, and Gupta, D. (2010). On network
queue model centrally linked with common feedback
channel. J. Math. Sys. Sci. 6(2), 18–31.
11 Blood bank mobile application of IoT-based android
studio for COVID-19
Basetty Mallikarjuna1, Sandeep Bhatia2,a, Neha Goel3, and
Bharat Bhushan Naib4
1
Department of Information Technology, Institute of Aeronautical Engineering, Dundigal-500043, Tamil Nadu, India
2,4
School of Computing Science and Engineering, Galgotias University Greater Noida, Uttar Pradesh, India
3
Department of Electronics & Communication Engineering, RKGIT, Ghaziabad, India
Abstract
It is impossible to manufacture the blood, as it can be given by the donors. Blood bank retrieval information can be given
through the android studio application, but there is not much work on the integrated environment like IoT sensor connected
with android studio application development. This paper provides the IoT healthcare sensors connected to the android
studio mobile application development blood donors and blood receivers. The mobile application is most useful in an
emergency during the COVID-19 pandemic. This observational study gives the web-based application development and also
android-studio mobile application development for blood bank information retrieval system. The results are carried out in a
real-time environment and updated features of the blood bank mobile application.
Keywords: Internet of things, COVID-19, blood bank, mobile application, android studio
[email protected]
a
Applied Data Science and Smart Systems 77
Table 11.1 Frequency of occurring in different blood blood information management mobile application
groups (Fahim et al., 2016). which has its mobile search engine used to search for
blood donors and receivers from the registered appli-
S. No Approximate frequency of occurring blood type
cation. This study also provides that registered users
1 O +ve: 1 person might be among 3 persons send a notification to donors and receivers. The pro-
2 A +ve: 1 person might be among 3 persons posed application also has certain disadvantages, it
requires an internet connection and manages particu-
3 O -ve: 1 person might be among 15 persons
lar functions required for a large database.
4 A -ve: 1 person might be among 16 persons In this paper section 2 deals with the related work
5 B +ve: 1 person might be among 12 persons existing to differentiate the proposed methodology,
6 B -ve: 1 person might be among 67 persons section 3 deals with the methodology, section 4 pro-
7 AB +ve: 1 person might be among 29 persons vides the implementation, and section 5 deals with the
8 AB -ve: 1 person might be among 167 persons
conclusion followed by references.
The user can also search for the blood in any city by
clicking on the search button at the top and provid-
ing the details like which blood group the user wants
and in which city and it will show you the details if
anybody was there. The user can also become a donor
so the user can save any life by giving the blood group Figure 11.3 Snapshot of the API of android studio
and people can see who is given the blood in that city.
The activity is divided into several parts like login
activity to increase the security of the application.
Then the main activity tells about the people need-
ing the blood and also the activity where the user can
request the blood or become a donor. So, it’s a very
modern compact and the best application to over-
come a serious problem as shown in Figure 11.4.
One of the significant and important of this obser-
vational study is not alert the blood and also provides
the various healthcare issues of the registered users
during the COVID-19 pandemic.
V. Implementation
To create a simple android application project, to set
up the application for the following steps below:
File -> New -> Select New.
Fill in all the entries shown in the above Figure
11.3. Set the name and location of the project. Select
the language in which you want to code. After fill-
ing all the fields click on finish. Once the project is
Figure 11.4 GUI of new app
successfully created the screen will show as shown in
Figure 11.4.
There are some directories and files in the android pandemic. Here are some examples of how the appli-
project which we should be created before start- cation has been used in the fight against COVID-19:
ing our application as shown in Figure 11.5 and the
description of packages as shown in Table 11.2. • Blood donation and distribution in real-time
• Contactless donation
• Inventory management
VI. Applications of our work
• Emergency response
The android studio-based blood bank mobile appli- • Analysis of data to predict demand.
cation was created utilizing IoT-based technology • Remote health monitoring.
to handle COVID-19 difficulties, and it can have a • Donation of post-recovery blood plasma
variety of uses and advantages in the context of the • Community awareness and involvement
80 Blood bank mobile application of IoT-based android studio for COVID-19
conditions, lowering waste, and increasing overall in Computational Intelligence and Communication
effectiveness. Technology: Proceedings of CICT, 2019: 501–510.
Incorporating these future scopes would not only doi: https://doi.org/10.1007/978-981-15-1275-9_41.
increase the blood bank mobile application’s efficiency Mufaqih, Sukron, Abiyyu Fawwaz Kanz, Sahid Nur Rama-
dhan, and Ahmad Nurul Fajar. (2020). Blood Bank
and efficacy but will also make a major improvement
Information System Based on Cloud In Indonesia.
to healthcare services generally, which is especially
IOP Conf. Series: Journal of Physics: Conf. Series
important during pandemics like COVID-19. 1179(2019) 012028. 1–6.
Singh, Jaiteg, Gaurav Goyal, and Rupali Gill. (2020). Use of
References neurometrics to choose optimal advertisement meth-
od for omnichannel business. Enterprise Information
Al Bassam, N., Hussain, S. A., Al Qaraghuli, A., Khan,
Systems. 14(2): 243–265. doi: https://doi.org/10.1080
J., Sumesh, E. P., and Lavanya, V. (2021). IoT based
/17517575.2019.1640392
wearable device to monitor the signs of quarantined
Sultanul, A. and Taposi, S. (2021). Blood bank mobile ap-
remote patients of COVID-19. Informat. Med. Un-
plication. 1–39.
lock., 24, 100588.
Mahima, N., Nigam, C., and Chaurasia, N. (2019). m-Health:
Aderonke Anthonia, K., Adeniyi, A. E., Ogundokun, R. O.,
community-based android application for medical ser-
and Ochigbo, S. A. (2019). An android based blood bank
vices. Smart Healthcare Sys., 69–81. CRC Press.
information retrieval system. J. Blood Med., 119–125.
Pohandulkar, Surabhi, S., and Khandelwal, C. S. Blood
Aman, S., Shah, D., Shah, D., Chordiya, D., Doshi, N., and
bank app using raspberry PI (2018). 2018 Int. Conf.
Dwivedi, R. (2022). Blood bank management and in-
Comput. Tech. Elec. Mech. Sys. (CTEMS), 355–358.
ventory control database management system. Proce-
Reddy, C. K. K., Anisha, P. R., and Prasad, L. N. (2016). A
dia Comp. Sci., 198, 404–409.
novel approach for detecting the bone cancer and its
Priya, P., V. Saranya, S. Shabana, and Kavitha Subramani.
stage based on mean intensity and tumor size. Recent
(2014). The optimization of blood donor information
Res. Appl. Comp. Sci., 20(1), 162–171.
and management system by Technopedia. Interna-
Narasimha, P. and Munirathnam Naidu, M. (2013). Gain
tional Journal of Innovative Research in Science, En-
ratio as attribute selection measure in elegant decision
gineering and Technology. 3(1), 1–6.
tree to predict precipitation. 2013 8th EUROSIM
Muhammad, F., Cebe, H. I., Rasheed, J., and Kiani, F.
Cong. Model. Simul., 141–150.
(2016). mHealth: Blood donation application using
Tatale, Subhash, and V. Chandra Prakash. (2020). Enhanc-
android smartphone. 2016 Sixth Int. Conf. Dig. In-
ing acceptance test driven development model with
form. Comm. Technol. Appl. (DICTAP), 35–38.
combinatorial logic. International Journal of Ad-
Ayman, A., Mallikarjuna, B., Saudagar, A. K. J., Sharma, M.,
vanced Computer Science and Applications., 11(10),
and Poonia, R. C. (2022). Improvement of automatic
268–278.
glioma brain tumor detection using deep convolution-
Sastry, J. K. R. and Lakshmi Prasad, M. (2019). Testing
al neural networks. J. Comput. Biol., 29(6), 530–544.
embedded system through optimal mining technique
Krishna, P. V., Gurumoorthy, S., Obaidat, M. S., Mallikarjuna,
(OMT) based on multi-input domain. Int. J. Elec.
B., and Arun Kumar Reddy, D. (2019). Healthcare appli-
Comp. Engg., 9(3), 2141–2150.
cation development in mobile and cloud environments.
Prasad, M. L. and Sastry, J. K. R. (2018). Generation of
Internet of things Personal. Healthcare Sys., 93–103.
test cases using combinatorial methods based multi-
Archit, S., Mallikarjuna, B., Murtuza, M., and Tiwari, V.
output domain of an embedded system through the
(2021). Design and implementation of superstick for
process of optimal selection. Int. J. Pure Appl. Math.,
blind people using internet of things. 2021 3rd Int. Conf.
118(20), 181–189.
Adv. Comput. Comm. Con. Netw. (ICAC3N), 691–695.
Sandeep, B., Mallikarjuna, B., Gautam, D., Gupta, U., Ku-
Mallikarjuna, B., Sathish, K., Gitanjali, J., and Venkata
mar, S., and Verma, S. (2023). The Future IoT: The
Krishna, P. (2021). An efficient vote casting system
current generation 5G and next generation 6G and
with aadhar verification through blockchain. Int. J.
7G technologies. 2023 Int. Conf. Dev. Intel. Comput.
Sys. Sys. Engg., 11(3–4), 237–256.
Comm. Technol. (DICCT), 212–217.
Mallikarjuna, B. (2022). Feedback-based resource utili-
Ganai, P. T., Bag, A., Sable, A., Abdullah, K. H., Bhatia, S.,
zation for smart home automation in fog assistance
and Pant, B. (2022). A detailed investigation of imple-
IoT-based cloud. Res. Anthol. Cross-Dis. Des. Appl.
mentation of internet of things (IOT) in cyber security
Automat., 803–824.
in healthcare sector. 2022 2nd Int. Conf. Adv. Com-
Khan, Mohammad Asaduzzaman, Hasibur Rahaman, Iske-
put. Innov. Technol. Engg. (ICACITE), 1571–1575.
daheer Alam, Khayrul Alam, Sumon Mondal, and
Sandeep, B., Goel, N., and Verma, S. (2023). The current
Alimuzzaman Khan. (2021). Development of Applica-
generation 5G and evolution of 6G to 7G technolo-
tion to Find A Nearby Live Blood Donor Using the
gies: The future IoT. Handbook Res. Mac. Learn-En-
Updated Location e-Information. International Jour-
abled IoT Smart Appl. Across Indust., 456–478.
nal of Electrical Engineering and Applied Sciences
Sandeep, B., Goel, N., Ahlawat, V., Naib, B. B., and Singh, K.
(IJEEAS), 4(1), 17–21.
(2023). A comprehensive review of IoT reliability and
Modi, Nandini, and Jaiteg Singh. (2021). A review of various
its measures: Perspective analysis. Handbook Res. Mac.
state of art eye gaze estimation techniques. Advances
Learn-Enabled IoT Smart Appl. Across Indust., 365–384.
12 Selection of effective parameters for optimizing software
testing effort estimation
Vikas Chahara and Pradeep Kumar Bhatia
Guru Jambheshwar University of Science & Technology Hisar, India
Abstract
Software testing holds a significant role within the realm of software development. Its purpose is to bolster and elevate the
reliability and quality of software. This encompassing process involves several key steps, including estimating the required
testing effort, assembling an appropriate test team, formulating effective test cases, carrying out software execution using
these test cases, and meticulously analyzing the outcomes derived from these executions. Thus, precise software testing effort
estimation holds high significance and governs the overall cost of the software development. To support accurate estimation
of software testing effort, the paper presents a detailed analysis and categorization of various factors have great impact on
the software testing effort. The analysis shows that the parameters include various elements such as quality, stability, risk,
resources, etc., that have a significant impact on software testing effort. Thus, the paper contributes towards a platform for
extracting the basic information essential for supporting software testing effort estimation for successful project planning
and execution.
[email protected]
a
Applied Data Science and Smart Systems 83
ternal files, and external interfaces to determine defects, vulnerabilities, and inconsistencies in the
the complexity and size of a software system. software before it’s released to end-users (Sharma and
This metric is often used in software estimation, Kushwaha, 2011; Hidmi and Sakar, 2017; Brar et al.,
project management, and cost analysis. Math- 2022). The effort invested in software testing is influ-
ematically it can be expressed as: enced by several parameters that impact the complex-
ity and scope of the testing process (Bhattacharya,
(1) Srivastava, and Prasad, 2012; Jin and Jin, 2016b). The
relationship between software projects and software
where, β is fixed quotient of the software project, LOC testing can be understood in the following ways:
is total number of lines of codes to execute “n” num-
ber of functions under fρ number of function points. • Quality assurance: Software testing is essential for
ensuring the quality of the software product be-
• Fuzzified OOPS metrics: Object-oriented pro- ing developed within a software project. It helps
gramming systems (OOPS) metrics refer to identify defects, errors, and vulnerabilities in the
measurements used to evaluate the quality and software, allowing developers to address these is-
complexity of object-oriented software. Fuzzi- sues before the software is released to users
fied OOPS metrics involve applying fuzzy logic • Verification and validation: Software testing is
to these metrics to handle imprecise or uncertain a means of verifying that the software is being
data. Fuzzy logic allows for handling vagueness developed correctly (verification) and validating
in software quality attributes by assigning degrees that it meets the user’s needs (validation). It helps
of membership to different categories, providing confirm that the software aligns with the project’s
a more flexible and nuanced understanding of requirements and objectives
software complexity • Risk mitigation: Software projects inherently
• Cosmic function point (CFP)-based factor analy- involve risks, including the risk of defects or er-
sis and selection: Cosmic function points (CFP) rors. Effective testing helps mitigate these risks by
are a variation of traditional function points used catching and addressing issues early in the devel-
to measure the functional size of a software ap- opment process, reducing the chances of critical
plication based on its business functionality. Fac- failures after deployment
tor analysis and selection in the context of CFP • Iterative development: Many modern software
involves identifying and assigning appropriate development methodologies, such as Agile and
complexity factors to account for variations in DevOps, promote iterative and incremental de-
software projects. These factors help in adjust- velopment. Testing is performed throughout these
ing the functional size measurement to reflect the iterations to continuously assess the software’s
software’s unique characteristics progress and maintain its quality
• COCOMO analysis and new OOPS metrics: • Documentation: Software testing generates docu-
COCOMO (constructive cost model) is a soft- mentation about the software’s behavior, test cas-
ware cost estimation model used to predict the es, and results. This documentation is valuable for
effort, cost, and schedule required for software project managers, developers, and stakeholders to
development. It considers various factors like the track progress and make informed decisions
size of the project, development team experience, • Resource allocation: Software projects need to
and complexity. In the context of object-oriented allocate resources, including time and effort, for
programming, COCOMO can be used to esti- testing activities. The scope and depth of testing
mate effort based on new OOPS metrics, which depend on the project’s requirements and priori-
are measurements specific to object-oriented soft- ties
ware. These new metrics might include measures • Feedback loop: Testing provides feedback to the
of class complexity, coupling, cohesion, and other development team about the software’s perfor-
object-oriented design attributes. mance, functionality, and usability. This feedback
loop helps developers improve the software and
enhance user satisfaction
III. Software testing effort
• The discussion shows that the software testing is
Software testing effort refers to the resources, time, a critical aspect of software projects that ensures
and activities required to effectively test a software the quality, reliability, and functionality of the
application or system to ensure its quality, function- software being developed. It supports the overall
ality, and reliability (Nassif et al., 2019; Cibir and success of the project by identifying and address-
Ayyildiz, 2022). It’s an essential phase of the soft- ing issues, mitigating risks, and providing valu-
ware development life cycle that aims to identify able insights for continuous improvement.
86 Selection of effective parameters for optimizing software testing effort estimation
Table 12.1 Comparative analysis of existing studies
Badri, M., Toure, F., Predict unit testing Regression analysis Predictive model Limited sample size
and Lamontagne, L. effort levels of classes for testing effort
estimation
Bhattacharya, P., Estimate software test PSO (Particle swarm PSO-based estimation Requires tuning PSO
Srivastava, P. R., and effort optimization) of test effort parameters
Prasad, B.
Bluemke, I. and Review and summarize Survey and review Overview and Lack of original
Malanowska, A. testing effort categorization of research data
estimation techniques
Borade, J. G. and Provide an overview of Review of Overview of software Limited focus on
Khalkar, V. R. effort estimation estimation effort estimation specific estimation
techniques methods techniques
Liao, X. and Naseem, Review COCOMO Review of Overview of Limited focus on
A. models and extensions COCOMO models COCOMO models COCOMO models
and extensions
Satapathy, S. M., Early-stage software Random forest Early-stage effort Limited to use
Acharya, B. P., and effort estimation estimation with use case point-based
Rath, S. K. case points estimation
Sharma, A. and Develop metric suite Requirement Metric suite for early Limited validation of
Kushwaha, D. S. for testing estimation engineering estimation of testing the metric suite
document
Singh, V., Kumar, V., Select influential Fuzzy logic and Parameter selection for Limited to parameter
and Singh, V. B. testing parameters AHP-TOPSIS influencing testing selection
Srivastava, P. R., Estimate test effort Bat algorithm Test effort estimation Limited to bat
Bidwai, A., Khan, A., using bat algorithm based on bat algorithm algorithm
Rathore, K., Sharma,
R., and Yang, X. S.
Integration complexity When the systems are integrated with STE is governed by the extent
Software
effort
Automation Test automation initially require higher STE gradually decreases with
testing effort, however, eventually, the the passage of time
manual software testing effort gets
reduced with the passage of time
Skilled workforce The skilled testers may reduce the STE is directly proportional to
testing phase that otherwise may get the length of testing phase
prolonged when it lacks in skilled
testers
Time constraints Tight software project schedule limits STE is inversely proportional
the testing window and increases the to time constraint
software testing effort
Test data Availability of diverse test data is STE is inversely proportional
5 essential. The generation of test data to the availability of test data
needs additional effort that increase
the overall testing effort. Here, data
Resource Availability
Testing configuration Hard and complex software set-up STE is governed by the
configuration can increase software software set-up environment
testing effort during configuration and configuration
Testing tools Availability of suitable tools such as STE is governed by the
hardware, software network resources suitability of testing tools
Testing infrastructure
Multipliers: Developer skill, non-functional needs, the adjustments needed based on factors like ASLOC
platform familiarity, and other factors are reflected in and AT, as explained earlier. The COCOMO II model
multipliers. primarily relies on your estimation of the software
project’s size, measured in thousands of Source Lines
• RCPX – product reliability and complexity; of Code (KSLOC), to calculate the required effort in
• RUSE – the reuse required; terms of Person–Months (PM). In essence, the model’s
• PDIF – platform difficulty; effort estimation heavily depends on your assessment
• PREX – personnel experience; of the project’s scale, as quantified by the size of the
• PERS – personnel capability; codebase.
• SCED – required schedule;
• FCIL – the team support facilities. (5)
2) The reuse model Eaf stands for “Effort Adjustment Factor,” which
The reuse model is an approach in software devel- is derived from the cost drivers. The exponent E in
opment that focuses on leveraging existing software the formula is determined by the five scale drivers.
components, modules, or solutions to enhance effi- Estimation techniques, such as expert judgment, his-
ciency, reduce development time, and improve overall torical data analysis, and specialized software tools,
software quality. It centers on the idea that by reusing can aid in determining the effort required for the
well-tested and proven components, developers can reuse model. In essence, the reuse model’s estimation
avoid reinventing the wheel and instead build upon involves evaluating the integration effort, customiza-
established solutions. The reuse model encourages the tion needs, and associated activities when incorporat-
systematic identification, selection, and integration of ing existing components into a new project.
reusable assets to streamline the development process. With a holistic approach, taking into account the
intricacies of the software, the testing strategy, the
a. Reuse model estimation: team’s capabilities, and the project context, the paper
Estimating effort and resources for the reuse model contributes to provide foundation for the accurate
involves considering factors unique to integrating and testing effort estimation. Regular review and adjust-
adapting reusable components. This estimation model ment of estimates based on evolving project dynamics
uses Equation (3) to estimate the effort. further contribute to improved project planning and
successful software delivery.
(3) V. Conclusion
The paper presents a detailed analysis of various fac-
ASLOC stands for “Actual Source Lines of Code,” tors that are critical for accurate estimation of soft-
which represents the total number of lines of ware testing effort that plays a critical role in project
code that have been created for a software proj- planning and management. The paper delved into
ect. AT refers to the “Proportion of Automatically existing research presented by the research commu-
Generated Code,” indicating the fraction of code that nity in predicting software testing effort estimation.
is generated through automated tools or processes. The paper claims important contribution in laying
ATPROD represents “Engineers’ Productivity in Code down the foundation and preliminary factor analysis
Integration,” signifying how efficiently developers prior to estimating the testing effort for a software
integrate this code. If the estimation process is based project. The multifaceted nature of software projects
solely on manually written code, the estimated Lines necessitates a comprehensive approach to estimation,
of Code (LOC) can be determined using Equation (4). encompassing parameters such as project complexity,
size, requirements volatility, team expertise, and his-
torical data analysis. By considering these parameters,
(4)
organizations can enhance their ability to create more
reliable and realistic testing effort estimates. As the
ESLOC stands for “Estimated Source Lines of Code,” software development landscape continues to evolve,
which refers to the calculated number of lines of code the parameters influencing testing effort estimation
expected in a software project. The costs associated are subject to change with the passage of time and
with modifying reused code, understanding how to advancement of technology. Therefore, a proactive
integrate it, and making decisions about its reuse stance towards continuous improvement and adap-
are considered in determining the adaption adjust- tation is necessary. The collaboration between devel-
ment multiplier. This multiplier takes into account opment and testing teams, ongoing communication,
90 Selection of effective parameters for optimizing software testing effort estimation
and learning from each estimation cycle’s outcomes review. J. Comput., 3(5), 683–693. Available: http://
are crucial for refining the estimation process over www.cisjournal.org.
time. Altogether, a successful software testing effort Mensah, Solomon, Jacky Keung, Kwabena Ebo Bennin, and
estimation demands a harmonious blend of empiri- Michael Franklin Bosu. (2016). Multi-objective opti-
mization for software testing effort estimation. SEKE,
cal analysis, domain expertise, and technological
1–6. doi: 10.18293/SEKE2016-017
advancements. With fine-tuning of the parameters
Brar, P. S., Shah, B., Singh, J., Ali, F., and Kwak, D. (2022).
discussed in this paper, organizations can pave the Using modified technology acceptance model to eval-
way for more accurate STE estimations, leading to uate the adoption of a proposed IoT-based indoor
better resource allocation, project planning, and ulti- disaster management software tool by rescue work-
mately, the delivery of high-quality software systems. ers. Sensors, 22(5), 1866. https://doi.org/10.3390/
In future, the study can be followed for evaluating the s22051866.
effect of integrating concept of machine learning in Mohammed, N. M., Niazi, M., Alshayeb, M., and Mah-
STE estimation works. mood, S. (2017). Exploring software security ap-
proaches in software development lifecycle: A sys-
tematic mapping study. Comp. Stand. Interf., 50,
References 107–115. doi: 10.1016/J.CSI.2016.10.001.
Badri, M., Toure, F., and Lamontagne, L. (2015). Predict- Nassif, A. B., Azzeh, M., Idri, A., and Abran, A. (2019). Soft-
ing unit testing effort levels of classes: An exploratory ware development effort estimation using regression
study based on multinomial logistic regression model- fuzzy models. Computat. Intel. Neurosci., 2019.
ing. Proc. Comp. Sci., 62, 529–538. Rajamanickam, Leelavathi. (2016). Principles and Goals of
Bhattacharya, P., Srivastava, P. R., and Prasad, B. (2012). Software Testing. International Journal of Advanced
Software test effort estimation using particle swarm Engineering, Management and Science, 2(5): 239455.
optimization. Adv. Intel. Soft Comput., 132, 827–835. 427–430.
doi: 10.1007/978-3-642-27443-5_95/COVER. Satapathy, S. M., Acharya, B. P., and Rath, S. K. (2016). Ear-
Bluemke, I. and Malanowska, A. (2021). Software testing ly stage software effort estimation using random for-
effort estimation and related problems. ACM Comput. est technique based on use case points. IET Software,
Sur. (CSUR), 54(3). doi: 10.1145/3442694. 10(1), 10–17. doi: 10.1049/IET-SEN.2014.0122.
Borade, Jyoti G., and Vikas R. Khalkar. (2013). Software Sharma, A. and Kushwaha, D. S. (2011). A metric suite for
project effort and cost estimation techniques. Interna- early estimation of software testing effort using re-
tional Journal of Advanced Research in Computer Sci- quirement engineering document and its validation.
ence and Software Engineering, 3(8), 730–739. 2011 2nd Int. Conf. Comp. Comm. Technol., 373–
Cibir, E. and Ayyildiz, T. E. (2022). An empirical study on 378. doi: 10.1109/ICCCT.2011.6075150.
software test effort estimation for defense projects. Singh, V., Kumar, V., and Singh, V. B. (2023). A hybrid novel
IEEE Acc., 10, 48082–48087. doi: 10.1109/AC- fuzzy AHP-TOPSIS technique for selecting parame-
CESS.2022.3172326. ter-influencing testing in software development. Dec.
Singh, J., Goyal, G., and Gill, R. (2020). Use of neuro- Anal. J., 6, 100159. doi: 10.1016/J.DAJOUR.2022.
metrics to choose optimal advertisement method for 100159.
omnichannel business. Enterp. Inform. Sys., 14(2), Srivastava, P. R., Bidwai, A., Khan, A., Rathore, K., Shar-
243–265. https://doi.org/10.1080/17517575.2019.16 ma, R., and Yang, X. S. (2014). An empirical study
40392. of test effort estimation based on bat algorithm.
Hidmi, O. and Sakar, B. E. (2017). Software development ef- Int. J. Bio-Ins. Comput., 6(1), 57–70. doi: 10.1504/
fort estimation using ensemble machine learning. Int. IJBIC.2014.059966.
J. Comput. Commun. Instrum. Engg., 4(1), 143–147. Suri, R., Pushpa, and Harsha, S. (2015). Object oriented
Jin, C. and Jin, S. W. (2016). Parameter optimization of software testability (OOSTE) metrics analysis. Int. J.
software reliability growth model with S-shaped test- Comput. Appl. Technol., 4(5), 359–367.
ing-effort function using improved swarm intelligent Thakore, D. and Upadhyay, A. R. (2013). A framework to
optimization. Appl. Soft Comput., 40, 283–291. doi: analyze object-oriented software and quality assur-
10.1016/J.ASOC.2015.11.041. ance. Int. J. Inn. Technol. Explor. Engg. (IJITEE), 5,
Jin, C. and Jin, S.-W. (2016). Parameter optimization of 254–258.
software reliability growth model with S-shaped test- Trendowicz, J., Münch, J., and Jeffery, R. (2011). State of
ing-effort function using improved swarm intelligent the practice in software effort estimation: A survey
optimization. Appl. Soft Comput., 40, 283–291. and literature review. Lecture Notes – Comp. Sci.
Kaner, C., Falk, J., an Nguyen, H. Q. (1999). Testing com- (including subseries Lecture Notes in Artificial Intel-
puter software. John Wiley & Sons. ligence and Lecture Notes in Bioinformatics), 4980
Liao, X. and Naseem, A. (2012). Software models, exten- LNCS, 232–245. doi: 10.1007/978-3-642-22386-
sions and independent models in cocomo suite: A 0_18/COVER.
13 Automated detection of conjunctivitis using convolutional
neural network
Rajesh K. Bawa1 and Apeksha Koul2,a
1
Department of Computer Science, Punjabi University, Patiala, Punjab, India
2
Department of Computer Science and Engineering, Punjabi University, Patiala, Punjab, India
Abstract
Conjunctivitis, commonly referred to as “pink eye,” is a prevalent and contagious eye condition that affects millions world-
wide. Detecting conjunctivitis early and accurately is vital for timely intervention and effective management. Here, a convo-
lutional neural network (CNN) model has been customized to automate the detection of conjunctivitis using eye images. Our
dataset encompasses a diverse array of eye images, which include both healthy and conjunctivitis-affected cases. To tackle
the challenge of limited data, we employ data augmentation techniques to expand the dataset. After pre-processing and aug-
mentation, we curate a collection of 5135 eye images representing both pink-eye pathology and healthy states. Subsequently,
these augmented images undergo classification using the developed CNN model. During execution, the customized CNN
model obtains an impressive accuracy of 88.80%, with a loss of 0.25, and demonstrates precision, recall, and F1 scores of
0.50. The CNN model holds promise as an automated solution for conjunctivitis detection. Its accuracy and efficiency could
substantially support medical professionals in early diagnoses, facilitating timely treatment and curbing transmission rates.
a
[email protected]
92 Automated detection of conjunctivitis using convolutional neural network
B. Data pre-processing
The eye data collected are of different sizes which can
hamper the performance of the system, hence their
size have been reduced to (224×224), as shown in
Figure 13.5.
Later, the quality of the resized images have been
enhanced and the process starts with individual histo-
gram equalization on each color channel (blue, green,
and red) to enhance contrast by spreading pixel inten-
Figure 13.4 Number of images in the dataset sity distribution. This enriches visual appeal, making
dark and light areas distinct. Following this, unsharp
masking is applied. A blurred version of the enhanced
A. Dataset image is subtracted from the original, emphasizing
The dataset employed in this research has been care- high-frequency components like edges and details.
fully customized by gathering specific images that These components are then blended back into the
show pink eye from the eye diseases virus dataset vol- image, sharpening it and highlighting features. This
ume 1 (Kaggle, 2020). Moreover, a separate collection blend of techniques enhances contrast and sharpness,
of images depicting healthy eyes has been acquired resulting in an image with heightened visual appeal
from various reputable online sources, as shown in and clear details. The approach is demonstrated by
Figure 13.3. showcasing the original and enhanced images, as
A total of 356 .jiff images illustrating instances of shown in Figure 13.6.
pink eye were amassed for analysis. It is important to
mention that a small subset of these images was con- C. Data augmentation
sidered unsuitable and was manually excluded from It involves applying transformations to the original
the dataset, which ends up with the 265 number of images to diversify the dataset and improve model
images. Furthermore, an independent set of 130 .jpg training. Here, ImageDataGenerator() has been used
images featuring healthy eyes (Singh et al., 2019) was to perform rotation (within a range of -50 to +50
obtained for the purpose of comparison, as shown in degrees), horizontal flipping, and vertical flipping
Figure 13.4. generating 12 augmented images of single image (4
94 Automated detection of conjunctivitis using convolutional neural network
Table 13.1 Layered architecture of proposed CNN model
Metrics Formulae
Accuracy
Loss
Precision
Recall
F1 score
Hyper-parameters Values
Activation ReLu/Sigmoid
Optimizer Adam
Class mode Binary
Figure 13.9 Learning curves of CNN model
Batch_Size 32
Loss Binary cross entropy
Dropout rate 0.5 Table 13.5 Performance summary.
Epochs 10 Model Recall Precision F1 score
Similarly, the model has been also evaluated for consideration. The model’s performance may vary
binary class of the dataset i.e., for healthy eye and with factors like dataset size, diversity, and quality.
pink eye on the basis of precision, recall, and F1 score Over fitting remains a concern, especially if the data-
in Table 13.6. set is small or imbalanced.
Abstract
A wireless sensor network (WSN) is a key technology in the implementation of several applications, including light-duty data
streaming applications and straightforward event/phenomena monitoring systems. The energy-efficiency of wireless sensor
networks is a crucial issue in case of development and implementation. The goal of this effort is to increase the information
processing and routing process of energy efficiency. This research paper’s primary goal is to provide a complete review of
WSN. This article gives a broad overview of the WSN and some of its key features. This study also discusses several WSN
threats, WSN research obstacles, and WSN applications.
[email protected]
a
Applied Data Science and Smart Systems 99
a) Processing unit
This part often acts as the sensor node’s heart-
beat. Its internal microcontroller processes the
data that is sent to it. One or more of the mi-
crocontrollers that are most often used in sensor
nodes include the MSP 430, Intel Strong ARM,
and SA-1100. To store the instruction set, a flash
memory is also linked to this device. Figure 14.4 Applications areas of WSN
Applied Data Science and Smart Systems 103
for purposes like weather observation. If the price X. Mobile sinks in WSN: challenges
was reasonable overall for sensor networks, it would
Location Identification: To transmit the detected
be much more reasonable and successful for consum-
data, the sensor nodes require the availability of the
ers who demand careful consideration.
mobile actuator. The broadcast techniques are used
by mobile sinks to relay their position to network
Placement
nodes. Unfortunately, these methods need a signifi-
Node location in WSN could be a simple problem to
cant amount of resources to broadcast position data
tackle. Special strategies are required to position and
from the sink to the network on a regular basis. The
handle a broad spectrum of nodes in a relatively lim-
network requires a lot of message forwarding from
ited environment. In a highly sensitized region, 100 to
each node, which makes it difficult to use resources
10,000 of sensors have also been placed.
efficiently. By using an overhearing method, it takes
less broadcast messages to locate a mobile sink. The
Restrictions on strategy
mobile sink creates beacons with fresh position data
The creation of smaller, more affordable, and more
and transmits them to nearby access points. The access
effective devices is the main goal of wireless sensor
points that are in the mobile sink’s communication
design. The design of WSN will be influenced by a vari-
range receive the beacon and alter their message head-
ety of additional competitions. WSN has encountered
ers to point at the mobile sink. The remaining nodes
limited-restriction hardware and software approach
in the networks locate the mobile sink’s new position
paradigms (Tyagi and Kumar, 2013).
after hearing the changed header. Fewer fixed points
are used in the footprint-based technique. The sensor
IX. Clustering architecture in WSN nodes use fixed positions to determine the communi-
Clustering is the practice of assembling sensor nodes cation channel to the mobile sink. Nodes determine
that are geographically adjacent to one another their logical coordinates and the path to the mobile
(Gao et al., 2010; Gardašević et al., 2020), (Surya sink based on the fixed locations. The overhead
Engineering College & Institute of Electrical and caused by the location identification protocol should
Electronics Engineers, n.d.). A cluster head (CH) is a be maintained and considered to reduce the need for
node that manages a cluster and may start the cluster- retransmission of broadcast messages and extend net-
ing process. Cluster members are the residual nodes in work lifespan.
the cluster. These CM nodes will continually perceive Routing and mobile sink trajectory: The mobile sink
their surroundings and transmit data to the corre- trajectory is essential for the routing of sensed data.
sponding CH nodes. As all member nodes in a cluster In contrast to large-scale WSNs, a mobile sink may
are close to one another, the information they provide travel to each node in the net to collect the sensed
will also be redundant. In the majority of application data. Using special nodes that are fewer than the total
instances, sending this duplicate information to the number of nodes in the network, the random walks-
BS is unnecessary, and it also shortens the network’s based strategy decouples the mobile sink route from
lifespan. In order to create a single piece of infor- the sensor nodes. Movable sinks may roam around
mation, the CH nodes combine the data they have freely and collect data from a desired number of
obtained from the CMs. The BS will only be informed nodes (which act as a sub sinks or access points). By
of this one piece of information. In general, WSNs using position identification methods, sensor nodes
benefit from the clustering architectural paradigm in locate the mobile sink. In order to enhance the dura-
the following ways. tion of WSNs, the trajectory and routing path choices
are crucial. The mobile sink’s trajectory must guaran-
Conserving bandwidth: It occurs when a network is tee sink availability across the network with the least
grouped and nodes are logically segmented and con- amount of routing overhead.
nected to their respective groups. As a result, the clus- Transmission scheduling: The nodes in WSNs transfer
ters may share the same communication bandwidth the detected data to the mobile sink as soon as it enters
without encountering any interference. To prevent their communication range. WSNs are resource-con-
inter-cluster interferences, each cluster will have its strained networks that strive to cut down on energy
own spread code. use while distributing data to a mobile sink. Till the
Scalability: After the first deployment, new sets of mobile sink arrives at the nearest point in the commu-
nodes are included in the network to improve the nication range, the nodes will not be able to send their
accuracy level of the information. The newly added data according to the transmission scheduling scheme.
nodes may be readily accommodated using clustering
strategy as a new cluster or included in the available When more than one node recognizes the
groups during the process. mobile sink within its communication range, data
Applied Data Science and Smart Systems 105
Figure 14.6 Multiple nodes request for transmission Figure 14.8 Mobile sink revoke compromised node
channel at the same time and broadcast control messages to the network
transmission in WSNs with densely placed sensor Security: Because the sink is mobile, WSNs are vulner-
nodes becomes challenging. Data scheduling tech- able to a variety of attacks. For WSNs with mobile
niques addressed how the mobile sink in densely dis- sinks, conventional security techniques are insuf-
tributed WSNs, as depicted in Figure 14.5, chooses ficient (Abella et al., 2019). A mobile sink may be
the transmission channel. The mobile sink assigns a compromised to access the whole network. If WSNs
channel based on the measure of data to be trans- deploy numerous mobile sinks, seizing one will give
mitted and the node’s remaining power. Effective data the attacker access to a significant chunk of the net-
distribution in WSNs requires a distance and speed work. Two distinct key pools are generated by the
traveled – Finding a reasonable compromise between key management method, one for connecting sensor
efficient data aggregation and the network’s capacity nodes and access points and the other for connecting
to access the mobile sink is a difficult task. Mobile mobile sinks and access points. With the sink’s mobil-
sink must remain inside the sensor nodes’ communi- ity comes an increase in security complexity. Figure
cation range until the nodes have finished transmit- 14.5 depicts the case of an access point being taken
ting. The base station must respond quickly to WSN over and a duplicated mobile sink being brought into
applications in order to manage the regions of inter- the network by an attacker. Researchers need to pay
est. The mobile sink moves along the trajectory at a close attention to WSN security.
controlled speed thanks to transmission scheduling Upkeep of the network: The mobile sink’s privilege
and routing algorithms, forcing the sensor nodes to level must be set before to deployment in order to
transfer any observed data to the sink. To extend the allow the base station to manage the network. Figure
lifespan of the network, a trajectory with a minimal 14.6 illustrates how mobile sinks are utilized for node
trip distance and maximum network coverage must revocation as well as broadcasting private control
be chosen. The suggested model enhances the perfor- messages to the whole network during major security
mance in terms of the speed and distance that mobile threats.
sinks move.
106 An overview of wireless sensor networks applications, challenges and security attacks
The need for mobile sinks in WSNs is rapidly grow- XII. Conclusion
ing. The introduction of mobile sink in WSNs pres-
WSN is a key technology in the implementation of
ents further difficulties for networks. The difficulties
several applications, including light-duty data stream-
of implementing mobile sinks in WSNs are noted.
ing applications and straightforward event/phenom-
WSNs still experience resource depletion when using
ena monitoring systems. The energy-efficiency of
the current techniques (Figures 14.7 and 14.8).
wireless sensor networks is a crucial issue while devel-
oping and running them. The goal of this effort is to
XI. General basic features increase the information processing and routing pro-
A. Sensor network architecture cess’ energy efficiency. The primary goal of this work
Any of the following methods are used by sensors to is to provide a complete review on WSN.
send data to the base station.
References
• In a flat adhoc architecture, sensors work togeth-
Abella, C. S., Bonina, S., Cucuccio, A., D’Angelo, S., Gi-
er to send data to the access point, also known as ustolisi, G., Grasso, A. D., Imbruglia, A., Mauro, G.
the base station (AP or BS), and several hops are S., Nastasi, G. A. M., Palumbo, G., Pennisi, S., Sor-
used in the transmission process. bello, G., and Scuderi, A. (2019). Autonomous energy-
• Sensors are grouped into clusters in hierarchi- efficient wireless sensor network platform for home/
cal networks, and cluster heads are in charge office automation. IEEE Sens. J., 19(9), 3501–3512.
of gathering and aggregating data from sensors https://doi.org/10.1109/JSEN.2019.2892604.
and reporting to the access point. In hierarchi- Ahmad, Arshad, Ayaz Ullah, Chong Feng, Muzammil Khan,
cal networks, single-hop transmission to the BS Shahzad Ashraf, Muhammad Adnan, Shah Nazir, and
and multihop transmission between clusters are Habib Ullah Khan. (2020). Towards an improved
used. energy efficient and end-to-end secure protocol for
iot healthcare applications. Security and Commu-
• In a sensor network with mobile access, mobile
nication Networks. vol. 2020: 1–10. https://doi.
BS roaming the sensor field directly communi- org/10.1155/2020/8867792
cates with the sensors, and transmission from the Ahmed, G., Zhao, X., Fareed, M. M. S., Asif, M. R.,
sensors to BS is one-hop. and Raza, S. A. (2019). Data redundancy-control
energy-efficient multi-hop framework for wireless
B. Wireless sensor nodes sensor networks. Wire. Person. Comm., 108(4),
Motes are another name for sensor nodes. The mar- 2559–2583. https://doi.org/10.1007/s11277-019-
ket offers a wide variety of sensors. The following are 06538-0.
some of the sensor nodes in use right now: Ahmed, M., Salleh, M., and Channa, M. I. (2018). Rout-
ing protocols based on protocol operations for un-
University of California Los Angeles (UCLA) Wireless derwater wireless sensor network: A survey. Egyptian
Integrated Network Sensors (WINS) UCLA created Informat. J., 19(1), 57–62. https://doi.org/10.1016/j.
some of the low power wireless integrated micro sen- eij.2017.07.002.
Al Qundus, J., Dabbour, K., Gupta, S., Meissonier, R.,
sors that are utilized as sensor nodes. Using a 1 mW
and Paschke, A. (2022). Wireless sensor network for
transmitter, it provides wireless communication at a AI-based flood disaster detection. Ann. Oper. Res,
speed of 100 Kbps over a distance of 10 m. 319(1), 697–719. https://doi.org/10.1007/s10479-
UC Berkeley quotes: Crossbow’s Mica family con- 020-03754-x.
tains the members Mica, Mica2, Mica2Dot, and Alghamdi, T. A. (2020). Energy efficient protocol in wire-
MicaZ. With a 16 MHz CPU, 4 KB of RAM, 2 KB less sensor network: Optimized cluster head selection
of flash memory, and a data rate of up to 250 Kbps, model. Telecomm. Sys., 74(3), 331–345. https://doi.
MicaZ supports the IEEE 802.15.4 standard and org/10.1007/s11235-020-00659-9.
Ali, Ahmad, Yu Ming, Sagnik Chakraborty, and Saima
ZigBee protocols.
Iram. (2017). A comprehensive survey on real-time
AMPS from MIT: It is a low-end standalone guard- applications of WSN. Future internet. 9(4): 77 pp.1-
ing node that can also act as a fully complete node 22. https://doi.org/10.3390/fi9040077
for middle-end sensor networks or as a supporting Al-Turjman, F. (2019). Cognitive-node architecture and a de-
element in a higher-end sensor system. The institution ployment strategy for the future WSNs. Mobile Netw.
uses these motes for a variety of purposes. Appl., 24(5), 1663–1681. https://doi.org/10.1007/
s11036-017-0891-0.
Tiny node: 512 KB of external flash memory, 8 KB Behera, T. M., Mohapatra, S. K., Samal, U. C., Khan, M.
of RAM for programmes and data, and the TinyOS S., Daneshmand, M., and Gandomi, A. H. (2020).
operating system. Moreover, there are BTNode, I-SEP: An improved routing protocol for heteroge-
Imote, Iris Mote, TelosB, Wasp Mote, and others. neous WSN for IoT-based environmental monitoring.
Applied Data Science and Smart Systems 107
IEEE Internet of Things J., 7(1), 710–717. https://doi. for precision agriculture: A review. Sensors, 17(8), 1–45:
org/10.1109/JIOT.2019.2940988. 1781. doi: https://doi.org/10.3390/s17081781
Benayache, A., Bilami, A., Barkat, S., Lorenz, P., and Ta- Bajaj, Karan, Bhisham Sharma, and Raman Singh. (2020).
leb, H. (2019). MsM: A microservice middleware for Integration of WSN with IoT applications: a vision,
smart WSN-based IoT application. J. Netw. Comp. architecture, and future challenges. Integration of
Appl., 144, 138–154. https://doi.org/10.1016/j. WSN and IoT for Smart Cities. 79–102. doi: https://
jnca.2019.06.015. doi.org/10.1007/978-3-030-38516-3_5
Chaitra, M., and B. Sivakumar. (2017). Disaster debris de- Preeth, SK Sathya Lakshmi, R. Dhanalakshmi, R. Kumar,
tection and management system using wsn & iot.. and P. Mohamed Shakeel. (2018). An adaptive fuzzy
International Journal of Advanced Networking and rule based energy efficient clustering and immune-in-
Applications. 9(1): 3306–3310. spired routing protocol for WSN-assisted IoT system.
Díaz, S. E., Pérez, J. C., Mateos, A. C., Marinescu, M. C., Journal of Ambient Intelligence and Humanized Com-
and Guerra, B. B. (2011). A novel methodology for puting. vol. (2018): 1–13. https://doi.org/10.1007/
the monitoring of the agricultural production process s12652-018-1154-z
based on wireless sensor networks. Comp. Elec. Ag- Shahraki, A., Taherkordi, A., Haugen, O., and Eliassen, F.
ricul., 76(2), 252–265. https://doi.org/10.1016/j.com- (2021). A survey and future directions on clustering:
pag.2011.02.004. From WSNs to IoT and modern networking para-
Elappila, M., Chinara, S., and Parhi, D. R. (2018). Surviv- digms. IEEE Trans. Netw. Ser. Manag., 18(2), 2242–
able path routing in WSN for IoT applications. Pervas. 2274. https://doi.org/10.1109/TNSM.2020.3035315.
Mobile Comput., 43, 49–63. https://doi.org/10.1016/j. Shukla, A. and Tripathi, S. (2020). A multi-tier based cluster-
pmcj.2017.11.004. ing framework for scalable and energy efficient WSN-
Elappila, M., Chinara, S., and Parhi, D. R. (2020). Surviv- assisted IoT network. Wireless Netw., 26(5), 3471–
ability aware channel allocation in WSN for IoT ap- 3493. https://doi.org/10.1007/s11276-020-02277-4.
plications. Pervas. Mobile Comput., 61. https://doi. Khan, JavedAkhtar. (2019). —Multiple Cluster-Android
org/10.1016/j.pmcj.2019.101107. lock Patterns (MALPs) for Smart Phone Authentica-
Farhan, L., Shukur, S. T., Alissa, A. E., Alrweg, M., Raza, U., tion. In 2019 3rd International Conference on Com-
and Kharel, R. (2017). A survey on the challenges and puting Methodologies and Communication (ICCMC).
opportunities of the Internet of Things (IoT). Proc. 619–623. IEEE. doi: 10.1109/ICCMC.2019.8819635.
Int. Conf. Sens. Technol., ICST, 2017-December, 1–5. Sutagundar, A. V. and Manvi, S. S. (2013). Wheel based
https://doi.org/10.1109/ICSensT.2017.8304465. event triggered data aggregation and routing in wire-
Gao, Q., Zuo, Y., Zhang, J., and Peng, X. H. (2010). Improv- less sensor networks: Agent based approach. Wire.
ing energy efficiency in a wireless sensor network by Per. Comm., 71(1), 491–517. https://doi.org/10.1007/
combining cooperative MIMO with data aggregation. s11277-012-0825-x.
IEEE Trans. Vehicul. Technol., 59(8), 3956–3965. Tian, H., Shen, H., and Roughan, M. (2008). Maximizing
https://doi.org/10.1109/TVT.2010.2063719. networking lifetime in wireless sensor networks with
Gardašević, G., Katzis, K., Bajić, D., and Berbakov, L. regular topologies. Par. Distribut. Comput. Appl. Tech-
(2020). Emerging wireless sensor networks and in- nol., PDCAT Proc., 211–217. https://doi.org/10.1109/
ternet of things technologies—foundations of smart PDCAT.2008.29.
healthcare. Sensors (Switzerland), 20(13), 1–30. Tyagi, S. and Kumar, N. (2013). A systematic review on
https://doi.org/10.3390/s20133619. clustering and routing techniques based upon LEACH
Haseeb, Khalid, Ikram Ud Din, Ahmad Almogren, and Nav- protocol for wireless sensor networks. J. Netw. Comp.
eed Islam. (2020). An energy efficient and secure IoT- Appl. 36(2), 623–645. https://doi.org/10.1016/j.
based WSN framework: An application to smart ag- jnca.2012.12.001.
riculture. Sensors, 20(7): 2081 pp. 1–14. doi: https:// Weng, C. E. and Lai, T. W. (2013). An energy-efficient rout-
doi.org/10.3390/s20072081 ing algorithm based on relative identification and
Azzam, Riad, and Nabil Aouf. (2014). Embeded fusion of direction for wireless sensor networks. Wire. Per.
visual and acoustic for active acoustic source detec- Comm., 69(1), 253–268. https://doi.org/10.1007/
tion with SGGMM. In Proceedings ELMAR-2014. s11277-012-0571-0.
1–4. IEEE. doi: 10.1109/ELMAR.2014.6923352 Yu, X., Wu, P., Han, W., and Zhang, Z. (2013). A survey
Jaiswal, K. and Anand, V. (2020). EOMR: An energy-effi- on wireless sensor network infrastructure for agricul-
cient optimal multi-path routing protocol to improve ture. Comp. Stan. Interf., 35(1), 59–64. https://doi.
QoS in wireless sensor network for IoT applications. org/10.1016/j.csi.2012.05.001.
Wire. Pers. Comm., 111(4), 2493–2515. https://doi. Zhou, Z., Zhou, S., Cui, S., and Cui, J. H. (2008). Energy-
org/10.1007/s11277-019-07000-x. efficient cooperative communication in a clustered
Singh, J., Singh, S., Singh, S., and Singh, H. (2019). Evalu- wireless sensor network. IEEE Transac. Vehicular
ating the performance of map matching algorithms Technol., 57(6), 3618–3628. https://doi.org/10.1109/
for navigation systems: an empirical study. Spatial In- TVT.2008.918730.
form. Res., 27, 63–74. Zhu, C., Zheng, C., Shu, L., and Han, G. (2012). A survey
Jawad, Haider Mahmood, Rosdiadee Nordin, Sadik Kamel on coverage and connectivity issues in wireless sen-
Gharghan, Aqeel Mahmood Jawad, and Mahamod Is- sor networks. J. Netw. Comp. Appl., 35(2), 619–632.
mail. (2017). Energy-efficient wireless sensor networks https://doi.org/10.1016/j.jnca.2011.11.016.
15 Internet of health things-enabled monitoring of vital signs
in hospitals of the future
Amit Sundas1,a, Sumit Badotra2, Gurpreet Singh3 and Amit Verma4
1,3
Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India
2
School of Computer Engineering and Technology, Bennett University, Greater Noida, India
Department of Computer Science and Engineering, University Center for Research and Development, Chandigarh
4
Abstract
Vital signs and other extensive patient data are among the many types of information typically obtained by hand in hospitals
utilizing discrete medical equipment. It might be challenging for careers to integrate and analyze this information since it is
often kept in separate spreadsheets and not part of patients’ electronic health records. Connecting medical equipment via a
decentralized network such as the Internet is one way to get around these restrictions. By combining data from many sources,
we can more accurately assess a patient’s health and plan for preventative measures. In this study, we present the notion of
the internet of health things (IoHT) and conduct a broad landscape analysis of the methods that may be used to collect and
integrate data on vital signs in healthcare facilities. The potential use of intelligent algorithms is investigated, and common
heuristic techniques such weighted early warning score systems are addressed. In order to maximize efficiency, make the most
of available resources, and prevent unnecessary patient health decline, this article suggests potential avenues for merging pa-
tient data on hospital wards. It is stated that the IoHT paradigm will continue to provide better options for patient treatment
on hospital wards, and that a patient-centered approach is crucial.
Keywords: Machine learning, sepsis, vital sign, prediction, electronic health records
[email protected]
a
Applied Data Science and Smart Systems 109
II. Hospital treatment focused on the individual rules determine which vital signs are measured, which
patient is contentious.
Elliott and Coventry recommended eight vital signs
Patient-centered care (PCC) stands as a pivotal
(Rana et al., 2018), adding pain, consciousness, and
hospital quality indicator (Gultepe et al., 2013). The
urine output (Iyer et al., 2022). Patients lived longer
assessment of PCC hinges on factors such as patient
Table 15.1 defines, normalizes, and impacts eight vital
needs, effective provider communication, and the
indicators hospitals may monitor for patient health.
availability of services. From an information tech-
Monitoring vital signs raises challenges about how
nology (IT) perspective, PCC can be equated to the
frequently and what to report. Unlike Table 15.1, not
patient’s EHR. This differs significantly from vari-
all vitals may be obtained instantly.
ous enterprise resource planning (ERP) systems of
Pain assessment is subjective. WILDA verifies pain
the past, which primarily aimed to optimize work-
terms, intensity on a 0–10 scale, location, duration,
flow and procedural aspects (Bloch et al., 2019). In
aggravating factors, and pain-relieving variables
the context of PCC, hospital ward vital signs play a
(Sundas et al., 2021). The patient-caregiver WILDA
crucial role, serving as essential markers for identify-
method may use computerized data recording. Tablets
ing patient health concerns and their correlation with
and smartphones can capture patient data for EHRs.
other pertinent data.
Assessing consciousness requires patient-provider
communication. The Glasgow Coma scale measures
A. Vital signs monitoring
eye opening, verbal, and motor responses (Khan et
Patient-centered care improves hospital treatment
al., 2021). These assessments’ numerical outcomes
(Tang et al., 2020). Patient-centered care is measured
depend on patient reactions to stimuli.
by how well it meets patient needs, how fast clinicians
Electronically capturing these numbers may assist
communicate health data, and how readily patients
evaluate the patient’s neurological condition. Catheters
may get treatments. The EHRs are PCC medical
may automatically record urine output. Manual uri-
information systems. Thus, ERPs enhance workflow
nometers are still used (Sundas et al., 2021).
(Khan et al., 2014).
Hospital ward vital signs, vital signs used to high- B. Patient risk assessment
light patient health issues, and vital signs connected Hospital PCC examines vital signs regularly and more
to other data may describe PCC. Hospital nurses have often if concerns arise. Data and graded response tech-
measured the same vitals since 1900 (Sundas et al., niques lower risk. Monitoring and triggering define
2021). how frequently, what, and when to check in. Table
Blood pressure, temperature, heart rate, and respi- 15.2 outlines healthcare institution risk assessment
ration have oxygen saturation. To effectively assess a approaches. Check metric first (Liu et al., 2014). This
patient’s state, National Institute for Health and Care group uses MET (Medical Emergency Team) calling
Excellence (NICE) suggests monitoring oxygen satu- criteria. MET is determined by airway threats, respi-
ration in addition to the five vitals. Consider urine ratory or cardiac arrest, state alterations, and convul-
output, discomfort, and biochemical testing. Hospital sions (Singh et al., 2019; Sundas et al., 2021). Group
A pain scale is used to measure Pain of level The view from the patient The patient reports no pain
the patients’ pain intensity on the 0–10 pain scale (1–3
mild, 4–6 moderate, 7–10
severe)
The force multiplied by the Blood pressure Variables such as age, posture, 90/60–120/80 mmHg
period between heartbeats effort, sleep, slant, and
(systole) that blood exerts on confounding variables (such as
arteries White-Coat-Syndrome or anxiety)
How many times in 60 seconds Breathing rate Variables such as age, oxygen Breathing rate: 12–1/8/min
the chest moves up and down levels in the environment, pain and
anxiety levels, and physical effort
Estimates the quantity of oxygen SPO2 Workload, oxygen levels, and From 95% to 100%
in the blood by measuring the other confounding variables (such
saturation level of its peripheral as activity and pain intensity)
capillaries (SpO2)
110 Internet of health things-enabled monitoring of vital signs in hospitals of the future
Table 15.2 Methods, frameworks, and systems for assessing risk
EWS + MET, MEWS + PART intensity Combination Monitoring development, graded response, varying
sensitivity and specificity
Acceptable calling standards Single parameter Easy to use, but no improvement tracking
PART Multiple parameter high sensitivity and low specificity, yet it allows
progress tracking and progressive reaction
The worthing physiological scoring Aggregate scoring Allows development monitoring, progressive response,
system (EWS, MEWS, ViEWS) and high sensitivity and specificity, based on the score
2 needs one abnormal vital sign. PART (Prehospital Heuristics underpin all these methods. These meth-
Acuity Rating for Triage) calling requirements are an ods compare physiological measures to preset criteria,
example. The PART method measures respiration, resulting in many false positives. These examinations
heart rate, systolic blood pressure, consciousness, may employ artificial intelligence (AI) to better diag-
oxygen saturation, and urine output. nose the patient.
The third category of risk assessment focuses on
evaluating vital signs to detect early signs of health C. Health information recording
deterioration. The early warning score (EWS) was ini- The PCC programmers include physiological obser-
tially introduced as the scoring system. Notably, EWS vations at admission and throughout hospitaliza-
has gained widespread adoption in most UK hospitals tion. For this reason, healthcare workers employ
due to its endorsement by the NICE, and its proven EHR systems. Healthcare practitioners manage most
effectiveness (Khan et al., 2021). The EWS relies on EHRs. These systems solely monitor the patient’s cur-
calculated data, assessing a patient’s health by ana- rent healthcare provider. Combining data from sev-
lyzing multiple parameters at varying intervals. The eral EHR systems doesn’t provide a comprehensive
vital sign data needed for EWS can be entered into the patient EHR (Chen et al., 2016).
patient’s EHR either manually or automatically, and Personal health records (PHR) are one option for
this allows for continuous calculation and visualiza- achieving a holistic and unified picture of a patient’s
tion of the EWS score over time. The process of man- health. A PHR is an individual’s own representation
aging this data can be carried out using mechanical or of their health records, which may consist of separate
manual EWS devices, including paper-based systems. pieces of data or include data from several other sources.
The initial EWS score is computed based on vital Patients have full authority over their PHRs, including
signs such as systolic blood pressure, temperature, the ability to appoint a proxy or set access privileges.
heart rate, breathing rate, and level of awareness (Liu Involving patients in the management of their health
et al., 2014). Each vital sign is compared to estab- information improves collaboration and participation
lished norms to determine an individual score, with a in therapy (Sundas et al., 2021). Furthermore, the intro-
range of 0–6 for systolic blood pressure and 0–3 for duction of mobile devices and wearables drastically
the remaining parameters. The overall EWS score is alters the patient’s role in engaging with their PHR by
derived by summing up the scores for each vital sign enabling real-time monitoring of vital signs, supple-
and adding them to the respective norms. It’s worth menting health information, and allowing for more
noting that there exist several versions of the EWS. proactive intervention. The current tendency is for
One such variant is the modified early warning score patients to supplement their healthcare providers’ EHR
(MEWS), which incorporates urine output as the sixth data with data collected from their own wearables and
vital indicator. Additionally, the vitalpac early warning mobile devices (Sundas et al., 2022) (Figure 15.1).
score (ViEWS) offers a solution for bedside vital sign
monitoring using a PDA. Another system, the worth- III. Internet of health things
ing physiological scoring system, takes into account a
broader range of vital signs, including respiration rate, Since 1999, the IoT has grown into a worldwide
heart rate, arterial pressure, body temperature, oxy- sensor, wireless communication, and information
gen saturation, and level of awareness, in estimating a processing network. The IoT relies on smart items,
patient’s risk of adverse outcomes. These risk assess- which can transmit and analyze information to
ment methods in the third category combine the ease interact autonomously. Recent efforts to define, IoT
of use from the previous categories with the enhanced have included sensing environmental data, providing
sensitivity provided by the EWS and its variants. communication services, analytics, applications, and
Applied Data Science and Smart Systems 111
NFC, on the other hand, is a contactless proximity possible remedies. The increased complexity and vari-
communication technology that operates at close dis- ety of data has led to a rise in research on big data
tances, typically within approximately 4 cm in prac- analysis in healthcare. We focus on ML approaches
tice (though theoretically, it can work at distances of for data modeling. These approaches typically include
less than 10 cm). The proximity nature of NFC, cou- three steps: data collection, feature selection and
pled with its user-friendliness, makes it an excellent extraction, and learning (Li-wei et al., 2014).
choice for enabling communication between patients IoHT devices and other healthcare equipment with
and their medical data. registration and synchronization capabilities gather
Finally, low-power area networks like 6LoWPAN data. After pre-processing (filtering, standardizing, and
enable the delivery of IPv6 packets in wireless sensor aggregating), features (signal descriptive statistics, tem-
networks (WSNs), extending the reach of the IoT to poral and frequency domain characteristics) that dis-
the level of individual sensor nodes. IPv6’s scalability, criminate the patient’s health condition are identified
improved mobility features, and support for multiple and chosen. A classifier or regressor algorithm is taught
stakeholders’ management have enhanced the admin- to relate the data to health deterioration. Deep learn-
istration of smart objects. Consequently, 6LoWPAN ing uses algorithms to extract information from raw
is widely recognized as the foundational technol- data instead of hand-crafted qualities. After training,
ogy for the IoHT in a substantial body of literature the model may be used as a decision support system
(Baidillah et al., 2023). to evaluate a patient’s health or offer relevant actions.
B. IoHT with real-time health status tracking IV. Algorithms with intelligence for monitoring
The IoHT may help hospitals manage PCC and patient vital signs
data. Nurses manually take vital signs. Manual sphyg-
momanometers, stethoscopes, pain and consciousness Many ML algorithms incorporate critical factors to
questionnaires are employed. In these cases, a smart- enhance their predictive capabilities. Support vector
phone or tablet might help the caretaker by providing machines (SVMs), for instance, are capable of assess-
additional information or collecting data. Electronic ing patient risk by considering various indicators,
vital sign registration saves time and labor. including patient demographics, laboratory findings,
A WSN of wireless personal devices may collect and vital signs. SVMs can predict daily risk ratings for
vital indicators. IPv6 over 6LoWPAN is replacing patients and then aggregate these ratings to stratify
manufacturer specifications for linking smart health overall risk.
devices. Sundas et al., presented a multisensor pain In the healthcare domain, decision trees are com-
assessment approach. These sensors include acceler- monly used for disease classification, enabling the
ometers and GPS trackers for activity levels, micro- identification and categorization of different medi-
phones, and a computer’s capacity to interpret speech cal conditions. Medical research has increasingly
and facial expressions. The authors noted the abun- explored the use of individual neural networks (NN)
dance of smartphone and tablet pain measuring appli- and their integration with other approaches. Notably,
cations. Similar to Aung and colleagues’ technique, one of the early experiments applied long short-term
one may employ image processing to analyze eye memory (LSTM) recurrent neural networks (RNN)
movement, speech analysis to evaluate verbal replies, to detect patterns in EHR data. These NN are well-
and an accelerometer or gyroscope to evaluate motor suited for handling time series data, irregular sam-
responses to determine the patient’s awareness. BP, pling, and gaps in medical records.
temperature, HR, RR, and SpO2 may be monitored To address issues related to missing data, research-
using IoHT. Otero and colleagues recommended auto- ers have developed deep models incorporating gated
matic urine monitoring for severely unwell patients. recurrent units (GRU), which provide effective rep-
RFID, NFC, and Bluetooth can communicate sensor resentations for incomplete or intermittent data. The
data to smartphones. Smartphones convey this data application of RNN to medical data represents a bur-
to a fog or cloud middleware. Intelligent algorithms geoning area of research that continues to evolve and
for processing huge patient data requires further development (Li-wei et al., 2014).
The IoHT, high-throughput sequencing platforms
(genomics, proteomics, and metabolomics), real-time A. Deep learning techniques [11–15] are another op-
imaging, and point-of-care diagnostic devices have tion to consider
made health informatics a data-rich field. Environment NN with several nested layers and neurons lies at the
and social media may provide health information (Liu heart of these approaches (Iyer et al., 2022). Using a
et al., 2014). “Big data analysis” is the processing of large number of neurons enables the coverage of a great
massive amounts of vital sign data using sophisticated deal of raw data, and the option of cascading many
algorithms to identify health decline risks and predict layers enables the automated abstraction of a higher
Applied Data Science and Smart Systems 113
level, eliminating the need for human involvement patients with closed-loop alarm. IoT-enabled Smart
When applied to vital signs data, this function may help Healthcare Sys. Serv. Appl., 143–176.
extract potentially nuanced and obscure insights from Vistisen, S. T., Johnson, A. E. W., and Scheeren, T. W. L.
simple observation. Ravi and coworkers point to con- (2019). Predicting vital sign deterioration with artifi-
cial intelligence or machine learning. J. Clin. Monit.
volutional neural networks (CNNs) as the kind of deep
Comput., 33(6), 949–951.
learning having the most influence on health informatics
Singh, Jaiteg, and Nandini Modi. (2019). Use of information
at the moment (Bloch et al., 2019). CNN has been stud- modelling techniques to understand research trends in
ied extensively, but most of the time it’s used to analyze eye gaze estimation methods: An automated review. He-
photos of the human body for diagnosis. liyon, 5(12), 1–12.
Lujie, C., Dubrawski, A., Wang, D., Fiterau, M., Guillame-
V. Conclusion Bert, M., Bose, E., Kaynar, A. M. et al. (2016). Using
supervised machine learning to classify real alerts and
This review included vital sign monitoring and analy- artifact in online multi-signal vital sign monitoring
sis to the IoHT to predict patient health risks. The data. Crit. Care Med., 44(7), e456.
first portion of the review included the eight main Bloch, Eli, Tammy Rotem, Jonathan Cohen, Pierre Sing-
physiological observations: blood pressure, body tem- er, and Yehudit Aperstein. (2019). Machine learn-
perature, heart rate, respiration rate, oxygen satura- ing models for analysis of vital signs dynamics: a
case for sepsis onset prediction. Journal of health-
tion, pain, degree of consciousness, and urine output.
care engineering. vol. 2019. 1–12. https://doi.
The article highlighted the first five vital indicators
org/10.1155/2019/5930379
as most important. We then examined how hospitals Baidillah, Marlin Ramadhan, Pratondo Busono, and Riyanto
assess patients’ health risks using tracking and trigger- Riyanto. (2023). Mechanical ventilation intervention
ing systems. Most current approaches (typically EWS based on machine learning from vital signs monitor-
or versions thereof) are heuristics with hard-and-fast ing: A scoping review. Measurement Science and Tech-
thresholds, and just a fraction apply AI. The move nology. 34, 062001. Doi: 10.1088/1361-6501/acc11e
from EHRs to PHRs highlights the need of semantic Shengpu, T., Chappell, G. T., Mazzoli, A., Tewari, M., Choi,
interoperability in integrating and exchanging health- S. W., and Wiens, J. (2020). Predicting acute graft-ver-
care data. Today, vital signs may be collected using sus-host disease using machine learning and longitudi-
wearable devices with Bluetooth, NFC, RFID, or nal vital sign data from electronic health records. JCO
Clin. Cancer Inform., 4, 128–135.
UWB connections and gateways to connect hospital
Khan, M. I., Jan, M. A., Muhammad, Y., Do, D.-T., Ur
ward medical equipment. Next, ML processed cru-
Rehman, A., Mavromoustakis, C. X., and Pallis, E.
cial indicators. The IoHT notion introduces various (2021). Tracking vital signs of a patient using channel
issues, allowing for additional research and develop- state information and machine learning for a smart
ment. Prevention and individualization replace symp- healthcare system. Neural Comput. Appl., 1–15.
tom- and disease-focused therapy in the IoHT. This Liu, N. T., Holcomb, J. B., Wade, C. E., Darrah, M. I., and
vital sign monitoring system may help doctors pre- Salinas, J. (2014). Utility of vital signs, heart rate vari-
dict future treatments and interventions. Thus, IoHT ability and complexity, and machine learning for iden-
will improve ward-based patient care. This requires a tifying the need for lifesaving interventions in trauma
patient-centered approach. patients. Shock, 42(2), 108–114.
Li-wei, H. L., Mark, R. G., and Nemati, S. (2016). A model-
based machine learning approach to probing autonom-
References ic regulation from nonstationary vital-sign time series.
Gultepe, Eren, Jeffrey P. Green, and Hien Nguyen. (2013). IEEE J. Biomed. Health Informat., 22(1), 56–66.
From vital signs to clinical outcomes for. 1–11. doi: Li-wei, H. L., Nemati, S., Moody, G. B., Heldt, T., and
10.1136/amiajnl-2013-001815 Mark, R. G. (2014). Uncovering clinical significance
Amit, S., Badotra, S., Bharany, S., Almogren, A., Tag-ElDin, of vital sign dynamics in critical care. Comput. Car-
E. M., and Rehman, A. U. (2022). HealthGuard: An in- diol., 1141–1144.
telligent healthcare system security framework based Srikrishna, I., Zhao, L., Mohan, M. P., Jimeno, J., Siyal,
on machine learning. Sustainability, 14(19), 11934. M. Y., Alphones, A., and Karim, M. F. (2022). mm-
Amit, S., Badotra, S., Rani, S., and Gyaang, R. (2023). Wave radar-based vital signs monitoring and arrhyth-
Evaluation of autism spectrum disorder based on the mia detection using machine learning. Sensors, 22(9),
healthcare by using artificial intelligence strategies. J. 3106.
Sensors, 2023, 1–12. Rana, Soumya Prakash, Maitreyee Dey, Robert Brown,
Amit, S. and Panda, S. N. (2021). Real-time data communi- Hafeez Ur Siddiqui, and Sandra Dudley. (2018). Re-
cation with IoT sensors and things speak cloud. Wire. mote vital sign recognition through machine learning
Sen. Netw. Internet Things, 157–173. augmented UWB. 12th European Conference on An-
Amit, S., Badotra, S., Rani, S., and Gajare, C. M. (2022). tennas and Propagation (EuCAP 2018), London, UK,
WSN-and IoT-based smart surveillance systems for 1–5, doi: 10.1049/cp.2018.0978.
16 Artificial intelligence-based learning techniques for
accurate prediction and classification of colorectal cancer
Yogesh Kumar1,a, Shapali Bansal2, Ankush Jariyal3 and Apeksha Koul4
1
Department of CSE, School of Technology, Pandit Deendayal Energy University, Gandhi Nagar, Gujarat, India
2,3
Department of Computer Applications, USMS, Rayat Bahra University, Mohali, India
4
Department of Computer Science and Engineering, Punjbai University, Patiala, Punjab, India
Abstract
Colorectal cancer (CRC) is a prominent source of illness and death worldwide. Detection and precise diagnosis of CRC at an
early stage can significantly enhance patient outcomes. Artificial intelligence (AI) has yielded promising results in the detec-
tion and classifications of CRC. The application of machine learning (ML) algorithms, deep learning (DL), and computer-
assisted diagnosis systems are only a few of the most current advances in the use of AI techniques for CRC detection and
diagnosis that we discuss in this study. In the article, we also compared and evaluated the CRC detection work of various
researchers using various performance parameters such as accuracy and loss. We also examine the types and epidemiology of
CRC, which aids in the diagnosis of the numerous CRC cancer types. AI has the possible to substantially enhance the detec-
tion and diagnosis of cancer, leading to improved patient health and lower healthcare costs.
Key words: Colorectal cancer, artificial intelligence, epidemiology, deep learning, machine learning, computer-assisted diagnosis
[email protected]
a
Applied Data Science and Smart Systems 115
The paper is ordered in the following method: Table 16.1 Cases and deaths in the US 2020 due to CRC
Section 2 presents the types and epidemiology and
Age Cases Deaths
various types of CRC. Section 3 presents the con-
(years)
ventional and AI-based diagnosis method. Section 4 CRC Colon Rectum Colorectum
describes the current state-of-the-art techniques for
detecting CRC and highlights any gaps or limitations 0–49 17,930 11,540 6390 3640
in the existing methods. Whereas Section 5 defines the 50–64 50,010 32,290 17720 13,380
methodology and steps to follow the CRC detection 65+ 80.010 60,780 19,230 36,180
using deep learning (DL)-based approaches. Section
All ages 14,7950 10,4610 43,340 53,200
6 concludes the study and presents the significance of
learning models for CRC detection.
II. Types and epidemiology of CRC malignancies are combined and shown in the Table
(American Cancer Society 2020).
There are various types of CRC which are shown in
Table 16.1, along with its brief description and symp-
toms. The CRC can be broadly classified into two III. Diagnosis of CRC
main types: Conventional techniques: People who do physical
activities have been linked to a higher incidence of
Adenocarcinoma: It represents 96% of cases, this is rectal cancer but not colon cancer. According to the
the most prevalent kind of CRC. The cells that lining research, those who are physically active are at the
the inside of the colon and rectum are where adeno- risk of 25% of having distal and proximal colon
carcinoma develops. cancers compared to those who are not. Consuming
Carcinoid tumors: An uncommon form of colon can- aspirin and other non-steroid anti-inflammatory
cer that develop in the intestine’s hormone-producing medicines have also been shown to decrease the risk
cells. Less than 1% of CRCs are caused by them. There of CRC (Howard et al., 2008). Furthermore, other
are also several subtypes of adenocarcinoma of the medications, such as oral bisphosphonates, are used
colon and rectum, which are classified based on their for treating and preventing osteoporosis, which may
microscopic appearance and genetic characteristics. lessen the risk of CRC.
AI techniques: The increasing workload of the pathol-
CRC was rarely identified at least 10 years ago.
ogist in terms of more time and labor consumption
Having 9,00,000 deaths annually is considered the
has tried to incorporate the introduction of computa-
fourth most fatal malignancy globally. It is the most
tional-based pathology for CRC diagnosis. We know
prevalent cancer in men, accounting for 10% of all
that AI has changed the pathology sector. It has been
cases globally, followed by lung cancer (17.2%) and
used to inspect Whole-slide imaging (WSI) data which
prostate cancer (20.3%), and it is the second most
may provide a computer-aided diagnosis of tumors
common cancer in women, accounting for 9.4%
using medical image analysis and various learning
of all cases worldwide, trailing only breast cancer
models such as machine learning (ML) and DL (Cui
(30.9%) (Kanna et al., 2023). In the United States,
et al., 2021).
CRC is the third leading cause of cancer-related mor-
tality among men and women and the second leading Present investigation has demonstrated that AI
cause of cancer deaths among men and women com- plays a vital role to diagnose and treat CRC patients.
bined. It is estimated that 52,580 persons will perish It is a responsible for improving early screening effi-
by 2022 (Sisodia et al., 2023). For several decades, ciency and dramatically improving CRC patients’
the death rate from CRC (per 100,000 persons per 5-year survival rate after treatment. Since 2010, there
year) has decreased in both men and women. There has been a substantial increase in the study and appli-
are several possible explanations for this. One rea- cation of AI in medically assisted gastrointestinal dis-
son is that colorectal polyps are now being discov- ease diagnosis and therapy. AI can help doctors with
ered and removed more frequently through screening the qualitative diagnosis and stage of colon cancer,
before they can develop into malignancies, or cancers which is now reliant on colonoscopy and pathologi-
are being discovered sooner when they are simpler to cal biopsies (Wang et al., 2020).
cure. Furthermore, CRC treatments have improved The researchers, such as Takemura et al. (2012),
during the last few decades (Wolf et al., 2018). utilized narrow-band imaging (NBI) along with a sup-
Table 16.1 projects the number of cases and deaths port vector machine algorithm, a supervised machine
in the United States for 2020. Due to the misclassifica- learning algorithm to calculate extreme points at
tion of rectal cancer deaths as colon, deaths for both the margin. These extreme points were employed to
116 Artificial intelligence-based learning techniques for accurate prediction and classification
identify exceptional parameters on the boundary, histopathology images to review existing research
enabling the differentiation between neoplasia polyps on AI in CRC. According to the authors, DL algo-
and nonneoplasia polyps. The approach achieved a rithms in histopathology are capable of diagnosing,
detection accuracy of 97.8%. identifying the features of histological images related
This shows that an AI can reliably evaluate colo- to prognosis, predicting clinical-based molecular phe-
noscopy biopsies at a rate that is on par with a prac- notypes, and evaluating the specific components of
ticing pathologist. The progress of AI applications the tumor.
in the medical arena suggests that AI will eventually Similarly, (Mitsala et al., 2021) investigated the
be employed for the diagnostic of CRC despite the usefulness of AI systems in medical therapy and diag-
dearth of systematic research. nosis by yielding numerous outstanding outcomes.
They stated that AI-assisted procedures in routine
screening are a critical step in lowering CRC inci-
IV. Related work
dence rates. In this approach, many researchers have
Significant advances have been made by AI techniques used AI algorithms to identify and diagnose CRC, but
in the health arena to demonstrate clinical applica- they also confront significant challenges, as shown in
tion potential. As a result, (Davri et al., 2022) used Table 16.2. This section covers the work done by the
Zhang et al. 2019 1104 endoscopic CNN Accuracy: 86% Class imbalance
non-polyp images, AUC: 1
826 polyp images
Yamada et al. 2019 ImageNet dataset CNN Sensitivity: 97% The system performed
weak in order to detect
AUC: 0.98% lesions in the different
areas of the medical
image
Misawa et al. 2016 1079 narrow band CNN Specificity: 63.3% Unable to classify
imaging images Accuracy: 76.5% correctly because of the
limited dataset
Geetha et al. 2016 703 images Hand Sensitivity: 95% Model trained with
crafted LBP Specificity: 97% limited dataset
Ito et al. 2018 41 cases of colon CNN using Accuracy: 81.2% High cost, low efficiency
endoscopies yielded machine
190 pictures of colon learning
lesions algorithms
Yu et al. 2016 18 colonoscopy CNN Sensitivity: 71% Limited GPU memory,
videos specific length of video
clips were used
Figueiredo 2019 1680 cases of polyps SVM Sensitivity: 99% The model failed to
et al. and 1360 frames of Specificity: 85% evaluate the dimension of
healthy mucosa Accuracy: 91% colorectal polyp
Billah et al. 2017 14,000 still images CNN Prediction rate: Consumes more
98.6% processing time
Ozawa et al. 2020 16,418 images CNN Sensitivity: 92% Less number of training
Accuracy: 83% images were used
Urban et al. 2018 8,641 hand-labeled CNN Sensitivity: 90% The model failed to
images indicate the histology of
polyps
Tsai et al. 2009 CRC-VAL-HE-7K ResNet101 Accuracy: 98.81% Class imbalance issue
researchers to detect CRC using various ML and DL The research methodology for the proposal is men-
techniques along with the research gaps. tioned as under:
• Later, propose a novel hybrid deep learning model rectal cancer using high-resolution MRI. PLoS One,
for the early prediction of different types of CRC. 17(6), e0269931.
• In the end, accuracy, loss, recall, precision, F- Ho, C., Zitong, Z., Xiu, F. C., Jan, S., Sahil, A. S., Rajasa,
score, performance testing, etc., can be used to J., Kaveh, T. et al. (2022). A promising deep learning-
assistive algorithm for histopathological screening of
validate the proposed model’s implemented re-
colorectal cancer. Scientif. Reports, 12(1), 2222.
sults during both the training and testing phase.
Howard, R. A., Michal Freedman, D., Yikyung, P., Albert,
H., Arthur, S., and Michael, F. L. (2008). Physical ac-
VI. Conclusion tivity, sedentary behavior, and the risk of colon and
rectal cancer in the NIH-AARP diet and health study.
The study assists readers (physicians, analysts, doc- Can. causes Con., 19, 939–953.
tors, and so on) in identifying previously utilized Ito, N., Hiroshi, K., Hirotaka, N., Masaya, U., Hideaki,
strategies or algorithms used by the researchers to M., and Hisahiro, M. (2018). Endoscopic diagnostic
detect CRC. In this research, we first focus on the lim- support system for cT1b colorectal cancer using deep
itations of the researchers’ work, such as optimizing learning. Oncol., 96(1), 44–50.
the model and loss function and examine its ability Kanna, G. P., Jagadeesh Kumar, S. J. K., Parthasarathi, P.,
on the significant histopathological dataset. Later, an and Yogesh, K. (2023). A review on prediction and
AI-based model can be designed to assist end users prognosis of the prostate cancer and gleason grading
of prostatic carcinoma using deep transfer learning
in detecting anomalies such as polyps to enhance the
based approaches. Arch. Computat. Methods Engg.,
diagnosis of CRC in a short period. The suggested
1–20.
models can be verified further for real-time images to Koul, A., Rajesh, K. B., and Yogesh, K. (2023). Artificial in-
test its efficacy. telligence techniques to predict the airway disorders
illness: a systematic review. Arch. Computat. Methods
References Engg., 30(2), 831–864.
Koul, A., Yogesh, K., and Anish, G. (2022). A study on
American Cancer Society. (2020). Colorectal cancer facts & bladder cancer detection using AI-based learning tech-
figures 2020–2022. Published Online, 48. niques. 2022 2nd Int. Conf. Technol. Adv. Computat.
Billah, Mustain, Sajjad Waheed, and Mohammad Motiur Sci. (ICTACS), 600–604.
Rahman. (2017). An automatic gastrointestinal pol- Kumar, Y., Inderpreet, K., and Shakti, M. (2023). Food-
yp detection system in video endoscopy using fusion borne disease symptoms, diagnostics, and predictions
of color wavelet and convolutional neural network using artificial intelligence-based learning approaches:
features. International journal of biomedical imag- A systematic review. Arch. Computat. Methods Engg.,
ing. vol. 2017. 1–9. https://doi.org/10.1155/2017/ 1–26.
9545920 Kumar, Y., Surbhi, G., Ruchi, S., and Yu-Chen, H. (2021). A
Chaplot, N., Dhiraj, P., Yogesh, K., and Pushpendra Singh, systematic review of artificial intelligence techniques
S. (2023). A comprehensive analysis of artificial intel- in cancer prediction and diagnosis. Arch. Computat.
ligence techniques for the prediction and prognosis of Methods Engg., 1–28.
genetic disorders using various gene disorders. Arch. Misawa, M., Shin-ei, K., Yuichi, M., Hiroki, N., Shinichi,
Computat. Method Engg., 30(5), 3301–3323. K., Yasuharu, M., Toyoki, K. et al. (2016). Character-
Cui, M. and David, Y. Z. (2021). Artificial intelligence and ization of colorectal lesions using a computer-aided
computational pathology. Lab. Invest., 101(4), 412– diagnostic system for narrow-band imaging endocy-
422. toscopy. Gastroenterol., 150(7), 1531–1532.
Davri, A., Effrosyni, B., Theofilos, K., Georgios, N., Niko- Mitsala, A., Christos, T., Michail, P., Constantinos, S.,
laos, G., Alexandros, T. T., and Anna, B. (2022). Deep and Alexandra, K. T. (2021). Artificial intelligence in
learning on histopathological images for colorectal colorectal cancer screening, diagnosis and treatment.
cancer diagnosis: A systematic review. Diagnostics, A new era. Curr. Oncol., 28(3), 1581–1607.
12(4), 837. Ozawa, T., Soichiro, I., Mitsuhiro, F., Youichi, K., Satoki,
Fearon, E. R. (2011). Molecular genetics of colorectal can- S., and Tomohiro, T. (2020). Automated endoscopic
cer. Ann. Rev. Pathol. Mec. Dis., 6, 479–507. detection and classification of colorectal polyps using
Figueiredo, P. N., Isabel, N. F., Luís, P., Sunil, K., Yen-his, convolutional neural networks. Ther. Adv. Gastroen-
R. T., and Alexander, V. M. (2019). Polyp detection terol., 13, 1756284820910659.
with computer-aided diagnosis in white light colonos- Sisodia, P. S., Gaurav, K. A., Yogesh, K., and Neelam, C.
copy: comparison of three different methods. Endo. (2023). A review of deep transfer learning approaches
Int. Open, 7(02), E209–E215. for class-wise prediction of Alzheimer’s disease using
Geetha, K. and Rajan, C. (2016). Automatic colorectal pol- MRI images. Arch. Computat. Methods Engg., 30(4),
yp detection in colonoscopy video frames. Asian Pac. 2409–2429.
J. Can. Preven. APJCP, 17(11), 4869. Takemura, Y., Shigeto, Y., Shinji, T., Rie, K., Keiichi, O.,
Hamabe, A., Masayuki, I., Rena, K., Saeko, S., Koichi, O., Shiro, O., Toru, T. et al. (2012). Computer-aided sys-
Kenji, O., Emi, A. et al. (2022). Artificial intelligence– tem for predicting the histology of colorectal tumors
based technology for semi-automated segmentation of by using narrow-band imaging magnifying colonos-
Applied Data Science and Smart Systems 119
copy (with video). Gastrointes. Endoscop., 75(1), Colorectal cancer screening for average-risk adults:
179–185. 2018 guideline update from the American Cancer So-
Tsai, H.-L., Koung-Shing, C., Yu-Ho, H., Yu-Chung, S., ciety. CA Can. J. Clin., 68(4), 250–281.
Jeng-Yih, W., Chao-Hung, K., Chao-Wen, C., and Jaw- Yamada, M., Yutaka, S., Hitoshi, I., Masahiro, S., Shigemi,
Yuan, W. (2009). Predictive factors of early relapse in Y., Hiroko, K., Hiroyuki, T. et al. (2019). Development
UICC stage I–III colorectal cancer patients after cura- of a real-time endoscopic image diagnosis support sys-
tive resection. J. Surg. Oncol., 100(8), 736–743. tem using deep learning technology in colonoscopy.
Urban, G., Priyam, T., Talal, A., Mohit, M., Farid, J., Wil- Scientif. Reports, 9(1), 14465.
liam, K., and Pierre, B. (2018). Deep learning local- Yu, L., Hao, C., Qi, D., Jing, Q., and Pheng, A. H. (2016).
izes and identifies polyps in real time with 96% accu- Integrating online and offline three-dimensional deep
racy in screening colonoscopy. Gastroenterol. 155(4), learning for automated polyp detection in colonosco-
1069–1078. py videos. IEEE J. Biomed. Health Informat., 21(1),
Wang, Y., Xiaoyun, H., Hui, N., Jianhua, Z., Pengfei, C., 65–75.
and Chunlin, O. (2020). Application of artificial in- Zhang, X., Yang, Y., Yalan, W., and Qi, F. (2019). Detection
telligence to the diagnosis and therapy of colorectal of the BRAF V600E mutation in colorectal cancer by
cancer. Am. J. Can. Res., 10(11), 3575. NIR spectroscopy in conjunction with counter propa-
Wolf, A., Elizabeth, T. H. F., Timothy, R. C., Christopher, R. gation artificial neural network. Molecules, 24(12),
F., Carmen, E. G., Samuel, J. L., Ruth, E. et al. (2018). 2238.
17 SLODS: Real-time smart lane detection and object
detection system
Tanuja Satish Dhope1,a, Pranav Chippalkatti2, Sulakshana Patil3,
Vijaya Gopalrao Rajeshwarkar3 and Jyoti Ramesh Gangane4
1
Department of Electronics and Communication, Bharati Vidyapeeth (Deemed to be University) College of Engineer-
ing, Pune, Maharashtra, India
2
Department of Computer Science and Engineering, School of Computing, MIT Art, Design and Technology Univer-
sity, Pune, Maharashtra, India
3
Department of Electronics and Telecommunication, Sinhgad Institute of Technology, Lonavala, Pune, Maharashtra,
India
4
Department of Electronics and Telecommunication, Vishwaniketan’s Institute of Management Entrepreneurship and
Engineering Technology, India
Abstract
With the advances in technologies, autonomous cars/self-driving cars are now-a-days gaining more demand due to the in-
crement in mortality rate by road accidents caused due to human errors. Detecting obstacles on a road is one of the biggest
challenges in autonomous vehicle/self-driving navigation system. In this paper, we have proposed the real-time smart lane
detection and object detection system (SLODS) which captures the real-time road traffic using two cameras, one in the front
and the other one at the back of the car. The front one detects the lane while the other one detects if any other vehicle is ap-
proaching while changing the lanes, ensuring safe lane change. Region of interest (ROI) determines object and lane detection.
The performance of the edge detection algorithms like Roberts, Sobel, Prewitt’s, and Canny edge detectors, are evaluated
based on precision, recall, F1 score, and peak signal to noise ratio (PSNR) values. For PSNR, Canny is outperforming oth-
ers by the difference of -39dB with Sobel, -14 dB with Prewitt, and -48 dB. Further the proposed system also calculates the
speed of the approaching vehicle.
Keywords: Lane detection, edge detection, object detection, machine learning, Hough transform
[email protected]
a
Applied Data Science and Smart Systems 121
S. No. Vertex X Y
1 Rho 1
2 Beta π / 180
3 Minimum votes 15
threshold
4 Minimum line 7
Figure 17.3 Lane detection flowchart length
5 Maximum line 3
gap
β = angle between of x-axis along with vector. 6 Line thickness 1
A flowchart showing the sequence of events that
take place during lane detection is shown in Figure
17.3.
Steps for lane detection according to the Figure 17.1: 6. Applying Hough transform: Hough transform is
a technique to extract features from the image
1. Reading video and dividing into frames: The in- to analyze it. It is extensively used for image an-
put footage is recorded by a camera mounted alyzation based on shapes like rectangles, circles,
on the vehicle. The video input is then divided etc. It assumes all the white pixels of the image to
into frames (images) which are used to determine be the points and converts them into ρ-β plane.
lanes and boundaries on a laned road or high- ρ line connects polar coordinates to the origin
way. where the x-axis intersects the y-axis (Peerawat
2. Converting image into gray scale form: This is Mongkonyong et al., 2018) (Table 17. 2).
done to avoid recording unnecessary pixels. As a
result, far less information is collected and evalu- (2)
ated as compared to a colorful image.
3. Noise reduction using filter: The image produced Figures 17.4–17.8 gives a detailed idea of the step
after gray scale conversion is of poor quality. To 1–5 performed by the algorithms.
improve the accuracy of the recognized items,
noise filtration from the gray scaled image is B. Edge detection techniques
done before applying ML algorithm for object An edge is defined as an area of significant change
detection. in image intensity/contrast. Locating the areas with
4. Detecting edges: One of the topic’s cornerstones great intensity contrasts is called edge detection. Now
is edge detection. To detect a picture, the input it’s also possible that a certain pixel can accommo-
gray scaled image is exposed to the various edge date any variation and we can mistake it for an edge.
detectors (discussed in next section) after being Different situations can lead to this, for example, in
filtered (Zakir Hussain et al., 2015; Zhi Zhang et low light conditions or there can be noise that can
al., 2016; VanQuang Nguyena et al., 2018). This show all the characteristics of edge color segmentation.
gives us the power to modify the intensity of the
frames. B.1 Robert’s operator
5. Choosing region of interest (ROI): The area Robert’s operator (Zakir Hussain et al., 2015; Zhi
of the image in which the lane is detected and Zhang et al., 2016; VanQuang Nguyena et al., 2018)
placed in an area referred to as ROI. In our sys- is a type of an operator that works using cross prod-
tem ROI is taken as follows (Table 17.1). ucts to determine the grade of the detected image
Applied Data Science and Smart Systems 123
(3)
(4)
Figure 17.5 Frame gray scaling
(5)
Figure 17.6 Denoising Now we can also calculate the gradient direction
given by Equation 6
(6)
(7)
(8)
(9)
(10)
1 Low threshold 50
2 High threshold 150
Figure 17.12 Frame gray scaling
(11)
PSNR
Image Pixel Precision Recall F1 score (dB)
F1 PSNR
Table 17.4 Parameters for Robert operator Image Pixel Precision Recall score (dB)
Below is the comparison table for all detector’s that Canny outperforms for the various images in
algorithms for five images extracted from real time terms of other parameters also.
video. For lane detection, on an empty road, with a
The different edge detecting operators were tested straight lane, we apply Hough transform on the
based on various parameters like Precision, Recall, F1 detected edges using Canny edge detector. The lanes
score and PSNR values. Both Sobel and Prewitt edge on the road are detected and then highlighted using
detector were able to detect edges successfully, but the orange color markings (see Figure 17.16). Thus, even-
number of edges detected were far lower than Canny tually making it easier for the driver to navigate on
edge detection method (see Tables 17.5–17.7). For the road.
example, PSNR provided by Robert, Sobel, Prewitt, As soon as the incoming vehicle enters the specified
Canny is 66 dB, 40 dB, 70 dB and 82 dB for img ROI, the object detection algorithm starts detecting
1, respectively. Apart from low processing time, the the vehicle and it is finally bounded in a bounding
canny operator also displays a higher precision rate box (see Figure 17.17). Thus, the driver is alerted for
and better PSNR as compared to other operators. safe lane change.
Also, F1 score provided by Canny is 0.91 compared To detect the speed of oncoming vehicle ROI is
to others for img 1. Further Tables 17.5–17.7 indicate used. ROI has been set up as a distance up to 80 m
Applied Data Science and Smart Systems 127
References
Annual report on Road Accidents in India. (2020). Re-
trieved from https:// morth.nic.in/sites /default/files/
RA_2020.pdf.
Madhura, B., Tanuja, D., Akshay, V., and Dina, S. (2022).
Figure 17.17 Real time object detection Performance analysis of object classification system
for traffic objects using various SVM Kkernels. Adv.
Data Comput. Comm. Sec., 423–432, doi:https://doi.
org/10.1007/978-981-16-8403-6_39.
Table 17.8 Speed analysis
Sandipann, N., Pradnya, N. B., and Dhiraj, M. D. (2018). A
Object Distance (m) Speed (m/s) review of recent advances in lane detection and depar-
ture warning system. Pattern Recogn., 73, 216–234.
Object 1 70 35 doi:https://doi.org/ 10.1016/ j.patcog.2017.08.014.
Anuj, M., Constantine, P., and Tomaso, P. (2001). Exam-
Object 2 75 27.5
ple-based object detection in images by components.
Object 3 60 30 IEEE Trans. Pattern Anal. Mac. Intel., 23(4), 349–
Object 4 65 37.5 361. doi:https: //doi.org/ 10.1109/ 34.917571.
Bertozzi , M. and Broggi, A. (1998). GOLD: A parallel real-
Object 5 72 36
time stereo vision system for generic obstacle and lane
detection. IEEE Trans. Image Proc., 7(1), 62–81. doi:
https://doi.org/10.1109/ 83.650851.
Mukesh, T. and Rakesh, S. (2017). A review of detec-
which can be varied according to user requirement. tion and tracking of object from image and video
The speed at which the test vehicle is moving is 25 sequences. Int. J. Computat. Intel. Res., 13(5),
m/s. A time interval of 2 s has been chosen for a vehi- 745–765. https://www.ripublication.com/ijcir17/
cle to cover its distance (see Table 17.8). ijcirv13n5_07 .pdf.
William, N., Jack, L., Simon, G., and Jaco, V. (2005). A re-
view of recent results in multiple target tracking. Proc.
VI. Conclusion 4th Int. Sym. Image Sig. Proc. Anal., 3807–3812.
Four distinct edge detection algorithms are men- doi:https://doi.org/ 10.1109/ ISPA.2005. 195381.
tioned in the study for our proposed SLODS. PSNR Sunil, K., Vishwakarma, A., and Divakar, S. Y. (2015).
Values, Precision, Recall, and F1 Score were the Analysis of lane detection techniques using OpenCV.
2015 Ann. IEEE India Conf., 1–4. doi:https://doi.
metrics utilized to assess these approaches. These
org// 10.1109/ INDICON. 2015.7443166.
parameters were utilized in this study to assess the
Xu, Y. and Zhang, L. (2015). Research on lane detec-
performance of the edge detection approaches devel- tion technology based on Opencv. 3rd Int. Conf.
oped by Canny, Sobel, Prewitt, and Robert. After Mech. Engg. Intel. Sys., 994–997. doi: https://doi.
careful examination, we determined that the edge org//10.2991/icmeis-15.2015.187.
detection approach successfully detected the great- Zhong-Xun, W. and Wenqi, W. (2018). The research on edge
est number of edges for both vertical and horizontal detection algorithm of lane. EURASIP J. Image Video
edges. If we visualize images in Figure 17.9, we can Proc., 98, 1–9. doi: https://doi.org/10.1186/s13640-
clearly see that Robert, Prewitt and Sobel give a low- 018-0326-2.
quality image as output when compared to Canny. Xining, Y., Dezhi, G., Jianmin, D., and Lei, Y. (2011). Re-
The Canny method on the other hand can detect search on lane detection based on machine vision. Proc.
2011 Int. Conf. Informat. Cybernet. Comp. Engg.,
both weak and strong edges. The paper also men-
110, 539–547. doi: https://doi.org/10.1007/978-3-
tions a method to detect and track objects in an effi-
642-25185-6_69.
cient manner. It suggests selecting and then masking VanQuang, N., Heungsuk, K., SeoChang, J., and Kwang-
the ROI after gray scale conversion of the image. The suck, B. (2018). A study on real-time detection method
algorithm used in this paper was able to detect 96% of lane and vehicle for lane change assistant system
of all the vehicles in the image. The SLODS provides using vision system on highway. Engg. Sci. Technol.
accurate speed estimation of the oncoming vehicle as Int. J., 21(5), 822–833. doi: https://doi.org/ 10.1016/
well. j.jestch.2018.06.006.
128 SLODS: Real-time smart lane detection and object detection system
Singh, J., Singh, S., Singh, S., and Singh, H. (2019). Evaluat- transform. IOP Conf. Ser. Mat. Sci. Engg., 297(1),
ing the performance of map matching algorithms for 1–11. doi: https:///iopscience.iop.org/ article/ 10.1088
navigation systems: an empirical study. Spat. Inform. /1757-899X/297/1/012050.
Res., 27, 63–74. Assidiq, A. A., Khalifa, O. O., Islam, M. R., and Khan, S.
Hussain, Zakir, and Diwakar Agarwal. (2015). A com- (2008). Real time lane detection for autonomous ve-
parative analysis of edge detection techniques used in hicles. Int. Conf. Comp. Comm. Engg., 82–88. doi:
flame image processing. International Journal of Ad- https://doi.org/10.1109/ICCCE.2008.4580573.
vance Research In Science And Engineering IJARSE, Ziqiang, S. (2020). Vision based lane detection for self-
4, 3703–3711. driving car. 2020 IEEE Int Conf Adv. Elec. Engg.
Zhi, Z., Zhihai, H., Guitao, C., and Wenming, C. (2016). Comp. Appl., 635–638. doi: https://doi.org/10.1109/
Animal detection from highly cluttered natural AEECA49918.2020.9213624.
scenes using spatiotemporal object region pro- John, C. (1986). A computational approach to edge de-
posal sand patch verification. IEEE Trans. Mul- tection. IEEE Trans. Pat. Anal. Mac. Intel., 8(6),
timed., 18(10), 1–14. doi: https://doi.org/10.1109/ 679–698. doi: https:// doi.org /10.1109/TPAMI.1986.
TMM.2016.2594138. 4767851.
Peerawat, M., Chaiwat, N., Supakorn, S., and Masaki, Y.
(2018). Lane detection using randomized Hough
18 Computational task off-loading using deep Q-learning in
mobile edge computing
Tanuja Satish Dhopea, Tanmay Dikshit, Unnati Gupta and Kumar Kartik
Department of Electronics and Communication, Bharati Vidyapeeth (Deemed to be University) College of Engineering,
Pune, India
Abstract
Because of the growing proliferation of networked Inter of Things (IoT) devices and the demanding requirements of IoT
applications, existing cloud computing (CC) architectures have encountered significant challenges. A novel mobile edge com-
puting (MEC) can bring cloud computing capabilities to the edge network and support computationally expensive applica-
tions. By shifting local workloads to edge servers, it enhances the functionality of mobile devices and the user experience.
Computation off-loading (CO) is a crucial mobile edge computing technology to enhance the performance and minimize
the delay. In this paper, the deep Q-learning method has been utilized to make off-loading decisions whenever numerous
workloads are running concurrently on one user equipment (UE) or on a cellular network, for better resource management in
MEC. The suggested technique determines which tasks should be assigned to the edge server by examining the CPU utiliza-
tion needs for each task. This reduces the amount of power and execution time needed.
Keywords: Computation off-loading, edge server, mobile edge server, deep Q-learning
a
[email protected]
130 Computational task off-loading using deep Q-learning in mobile edge computing
connections to become severely congested if many best application approach while adhering to work-
application stations forcefully dump their processing flow applications deadline constraints. Numerous
resources to the edge node, which would dramatically experimental evaluations have been carried out to
slow down MEC (Gagandeep Kaur et al., 2021). A demonstrate the usefulness and efficiency of suggested
unified management system for CO and the accom- strategy.
panying wireless resource distribution in order to In MEC wireless networks, an Software Defined
benefit from compute off-loading is required (Khadija Networking (SDN) -based solution for off-loading
Akherfi et al., 2016). In section 2, this paper describes compute. Based on reinforcement learning, a solu-
the job off-loading research in MEC. The task off- tion to the energy conservation problem that consid-
loading system model is described in section 3 as local ers both incentives and penalties have been assessed
computing, edge computing, and the deep Q-learning (Nahida Kiran et al., 2020).
method. Section 4 elaborates on the results and charts Distributed off-loading method with deep rein-
for various task off-loading techniques. Finally con- forcement learning that allows mobile devices to
clusion is presented in section 5. make their off-loading decisions in a decentralized
way has been proposed. Simulation findings dem-
II. Related work onstrated that suggested technique may decrease the
ratio of dropped jobs and average latency when com-
In (Khadija Akherfi et al., 2016) many edge com- pared to numerous benchmark methods (Ming Tang
puting paradigms and their various applications, as et al., 2020). A multi-layer CO optimization frame-
well as the difficulties that academics and industry work appropriate for multi-user, multi-channel, and
professionals encounter in this fast-paced area has multi-server situations in MEC has been suggested.
been examined. Author suggested options, including Energy consumption and latency parameters are used
establishing a middleware-based design employing an for CO decision from the perspective of edge users.
optimizing off-loading mechanism, which might help Multi-objective decision-making technique has been
to improve the current frameworks and provide the proposed to decrease energy consumption and delay
mobile cloud computing (MCC) users more effective of the edge client (Nanliang Shan et al., 2020).
and adaptable solutions by conserving energy, speed-
ing up reaction times, and lowering execution costs. III. Methodology
Ke Zhang et al. (2016) has given an energy efficient
computation off-loading (EECO) method, which We took into account energy-sensitive UEs in this
combinedly optimizes the decisions of CO and alloca- paper, such as IoT devices and sensor nodes, which
tion of radio resources thereby minimizing the cost have low power requirements but are not delay-sen-
of system energy within the delay constraints in 5G sitive. We take into account N energy-sensitive UEs
heterogeneous networks. that are running concurrently on a server, and the
An energy-efficient caching (EEC) techniques for a server must choose which task from the task queue
backhaul capacity-limited cellular network to reduce needs to be done first in order to reduce the power
power consumption while meeting a cost limitation and execution time for each work. When a user device
for computation latency has been proposed (Zhaohui lacks the energy resources to complete the computa-
Luo et al., 2019; Gera et al., 2021). The numerical tion-intensive task locally, an edge server can step in.
findings demonstrate that 20% increase in delay effi- To make decisions on off-loading, we employ deep
ciency. The proposed method may be very close to the Q-learning algorithm. Based on the state and reward
ideal answer and far superior to the most likely out- of the Q function at state t, the Q-learning algorithm
come, i.e., the approximation bound. acts.
With the use of two time-optimized sequential
decision-making models and the optimal stopping A. Local computing
theory, author (Ibrahim Alghamdi et al., 2019) Let’s assume that E represents the energy needed for
address the issue of where to off-load from and when each User Equipment (UE) to operate locally n= num-
to do so. Real-world data sets are used to offer a ber of UE, pn =the power coefficient of energy used
performance evaluation, which is then contrasted for local computing per CPU cycle, cn= the CPU cycles
with baseline deterministic and stochastic models. desired for each bit in numbers, βn = the percentage of
The outcomes demonstrate that, in cases involving tasks computed locally, and Sn = the size of the com-
a single user and rival users, our technique optimizes putation task are all represented by the numbers n.
such decisions. Therefore, the amount of energy needed for UE to
Kai Peng et al. (2019) examine the multi-objective operate locally can be determined by discretion.
computation off-loading approach for workflow
applications (MCOWA) in MEC which discovers the (1)
Applied Data Science and Smart Systems 131
Parameters Value
Abstract
Drowsiness or tiredness is a leading cause of accidents on the road, posing a serious threat to safety. Many accidents can
be prevented if drowsy drivers can be alerted within time. Several drowsiness detection methods are available to observe
drivers’ alertness during their journey and alert them if they are distracted. These methods gauges drowsiness by looking for
signs like yawning, closed eyes, or unusual head movements. They also consider the driver’s physical condition and vehicle
behavior. This paper offers a comprehensive analysis of the existing drowsiness detection methods and a detailed review of
the common classification techniques. It first categorizes the current methods into those based on subjective, behavioral, ve-
hicular, and physiological parameters based. Finally, it examines the strengths and weaknesses of these various methods and
compares them. In conclusion, the paper summarizes the research findings from this comprehensive survey to guide other
researchers toward potential future work in this field.
[email protected]
a
Applied Data Science and Smart Systems 135
2.2.2 Mouth and Yawning analysis compared with those obtained from testing images to
Yawning, often a result of tiredness or boredom, determine the appropriate classification. The system
can signal a potential risk for drivers, suggesting computes the duration of closed eyes and identifies
they might doze off while driving. Techniques exist drowsiness if this duration surpasses a predefined
to gauge the extent of mouth widening, serving as a time. Furthermore, it evaluates various head move-
means to detect signs of yawning in drivers. ments such as left, right, forward, backward, and
Yan et al. (2016) proposed an effective method for tilting motions in both directions. To conduct this
monitoring driver fatigue using Yawning extraction. analysis, the video footage is divided into frames,
To begin, the method uses the support vector machine with the system examining head images and com-
(SVM) technique to extract the face region from paring their positions to determine head postures.
images, reducing associated costs. The method pro- Subsequently, it merges the duration of closed eyes
ceeds to locate the mouth: facial edges are detected with the assessment of head positions to ascertain
through an edge detection technique, followed by drowsiness. The methodology was tested using six
a vertical projection to determine the right and left videos simulating genuine driving conditions and the
boundaries in the lower face area. Then, a horizon- findings are displayed through a confusion matrix. It
tal projection helps identify the upper and lower achieved a 98% accuracy rate, proving more effective
mouth limits, defining the mouth’s localized region. than alternative detection methods.
For yawning detection, the system employs circular The main problem with vision-based approach
Hough transform (CHT) on mouth region images is lighting. Regular cameras struggle at night.
to spot wide-open mouths. An alert is generated if Furthermore, many methods have been tested using
a notable number of consecutive frames capture a data from drivers imitating drowsiness instead of
widely open mouth. The method’s effectiveness is com- using real videos capturing a driver naturally becom-
pared with various edge detectors like Sobel, Roberts, ing sleepy.
Prewitt, and Canny. The experiment utilizes six videos
simulating real driving conditions, and the results are 2.3 Vehicle-based measures
depicted in a confusion matrix. The proposed method Vehicle-based measures detect driver fatigue using
attains a 98% accuracy rate, surpassing the perfor- vehicular features, including steering wheel angle,
mance of all other edge detection techniques. steering wheel grip force, lane changing patterns, and
vehicle speed variability. These measures necessitate
2.2.3 Head position the installation of sensors on various vehicle compo-
The head’s position is another sign of tiredness and nents, such as the steering wheel, accelerator, or brake
drowsiness in drivers. When feeling drowsy, drivers pedal, among others. The signals produced by these
often tend to tilt, lower, or nod their heads, particu- sensors serve as the basis for evaluating the drowsi-
larly in the later stages of sleepiness. Several factors, ness levels of drivers.
including decreased muscle tone, reduced vigilance,
and brief periods of sleep, can cause these changes in 2.3.1 Lane detection
the head position. Monitoring head position is a nota- This approach checks the vehicle’s position with
bly effective method for identifying driver drowsiness, respect to the middle of the lane. It is also known as
given that it is relatively easy and inexpensive to mon- the standard deviation of lane position (SDLP). Katyal
itor. Moreover, the head position remains unaffected et al. (2014) proposed a driver’s drowsiness detection
by environmental elements like lighting or noise. system using lane and driver’s fatigue level. Hough
Teyeb et al. (2014) proposed a method for drowsy transform is used to detect lanes and canny edge
driver detection using eye closure and head postures. detection is applied over viola-jones to detect eyes and
The system begins by capturing video through a web- driver’s fatigue level. This information is then used to
cam and conducting following operations on each detect improper driving. Ingre et al. (2006) conducted
frame of the video. It employs the Viola-Jones method multiple experiments and concluded that KSS ratings
to identify the ROI, encompassing the face and eyes. are directly proportional to SDLP metrics.
Subsequently, the facial area is sub-divided into sec-
tions, and the Haar classifier is utilized to focus on 2.3.2 Steering wheel analysis
the upper segment, specifically targeting the region Steering wheel analysis (SWA) is a widely used
corresponding to the eyes for analysis. Following this, vehicle-based measure to detect driver drowsiness
identifying the eye state entails the utilization of a (Fairclough et al., 1999; Thiffault, 2003). An angle
Wavelet network, a neural network-based approach, sensor is attached on the steering wheel axis to collect
which is trained using image data. The learning pro- the data. Abnormal steering wheel reversals, steering
cess involves ascertaining coefficients from training correction periods, and a vehicle’s jerky motion indi-
images. These learned coefficients are subsequently cate fatigue and a drowsy driver. Li et al. (2017) uses
Applied Data Science and Smart Systems 137
SWA and proposed an online drowsiness detection apt for detecting drowsiness. Leveraging physiologi-
system to monitor the fatigue level of drivers under cal signals for drowsiness detection holds the poten-
natural conditions by extracting approximate entropy tial to mitigate the issue of false positives, which
features and using a decision classifier for detection. is a common challenge with existing approaches.
Zhenhai et al. (2017) proposed a solution by analyz- Furthermore, it enables timely alerts, thereby averting
ing the time series of the angular velocity of the steer- road accidents.
ing wheel. Fairclough and Graham (1999) proposed a
solution by checking the steering wheel’s reversals and 2.4.1 Electroencephalography (EEG)
small SWMs. They found that drowsy drivers make EEG measures the brain’s electrical activity by plac-
fewer steering wheel reversals than typical drivers. ing some electrodes on the head and forehead. The
Many studies have shown that vehicle-based mea- frequency of signals ranges from 1 to 50 Hz and
sures are not the best way to judge a driver’s drowsiness amplitude from 20 to 200 μV. Some frequency bands
and often lead to inaccurate results. Assessing driver are defined as alpha waves (8–12 Hz, 25–100 μV),
fatigue solely based on vehicle movement has limita- which measure relaxation; beta waves (faster than 13
tions, as the measurement metrics can be susceptible Hz and below 40 μV), which measure alertness; theta
to external influences like the road’s geometric attri- waves (4–7 Hz, 20–120 μV), which measure drowsi-
butes and prevailing weather conditions. Other factors ness; and delta waves (0.5–3.5 Hz, 75–200 μV) helps
can also affect these measures, such as road, traffic, to check if the subject is asleep.
lighting conditions, and driving under the influence of Several studies support the connection between
alcohol or other drugs. Steering wheel grip force on a EEG signals and driver behavior (Campagne et al.,
curvy mountain road differs significantly from that of 2004; Akin et al., 2008; Liu et al., 2010; Lin et al.,
a straight highway. Furthermore, the driver’s grip can 2012; Lin et al., 2013). Changes in the alpha frequency
vary with road conditions. Driver may not grip the band, where the power decreases, and an increase in
steering with that pressure on a busy road with which the theta frequency band are indicative of drowsiness.
he grips the steering on an empty expressway. Akin et al. (2008) observed that combining EEG and
EMG signals is more successful in detecting drowsi-
2.4 Physiological measures ness compared to using either signal alone.
As drivers experience fatigue, they may observe a
subtle swaying of their heads, and there is an elevated 2.4.2 Electrocardiography (ECG)
risk of the vehicle deviating from the center of the The ECG method records the heart’s electrical activity
lane. Previously discussed methods for detecting this by positioning electrodes on the chest, arms, and legs,
behavior, such as behavior-based and vehicle-based, capturing the small electrical signals generated with
possess limitations, primarily because they can only each heartbeat.
detect fatigue after the driver has already entered a Tsuchida et al. (2009) research claims that heart
drowsy state. rate variability (HRV) can be used to detect driver
However, it is worth noting that physiological sig- fatigue and drowsiness. As drivers get tired, their
nals undergo discernible changes early in the onset parasympathetic activity decreases, and their sympa-
of drowsiness. Hence, physiological signals are more thetic activity increases. This causes a notable shift in
138 A comprehensive analysis of driver drowsiness detection techniques
cardiac rhythm from a high-frequency range of 0.15– Table 19.1 List of various work done on driver drowsiness
0.4 Hz to a lower frequency range of 0.04–0.15 Hz. detection.
Several studies have explored driver fatigue and
S. Measure Method Algorithm Accuracy
drowsiness detection using photo plethysmogram No. used (%)
(PPG) and electrocardiogram (ECG) wavelet spec-
trum analysis. Tsuchida et al. (2009), Arun et al. 1 Behavioral Eye-blink Viola Jones 94
(2012), Lee et al. (2014), reporting an average predic- rate
tion accuracy of 96% in their experimental findings. 2 Behavioral Yawning SVM 98
analysis
2.4.3 Electromyography (EMG) 3 Behavioral Head Viola Jones 98
EMG measures the electrical activity of muscles and position with Haar
is commonly obtained from the chin (Hostens, 2005). classifier
When a muscle contracts, it sends electrical signals to 4 Physiological PPG and 96
the brain. ECG
Katsis et al. (2004) observed up to 20% frequency 5 Physiological, EOG Haar 80
decrease and up to 50% amplitude increase after behavioral with eye classifier
movement
monotonous driving tasks and used them to indicate
fatigue and drowsiness. Balasubramanian et al. (2007) 6 Physiological, Heart PERCLOS 96
behavioral rate with
also had similar observations in EMG from shoulder eyelid
and neck muscles during 15 min of simulated driving. closure
ratio
2.4.4 Electrooculography (EOG)
EOG measures the electrical potential difference
between the human eye’s front (cornea) and back (ret-
elucidated, and their advantages and drawbacks are
ina). It’s one of the primary functions is to gauge the
considered. Nonetheless, certain gaps have been pin-
amplitude and the direction of eye movements, which
pointed in the existing literature, such as the need to
is applicable in detecting driver drowsiness (Shuvan et
evaluate current techniques in real time. This is par-
al., 2009). The electric potential difference between the
ticularly crucial in dynamic driving conditions and
retina and cornea generates an electrical field which is
diverse environmental factors, presenting opportuni-
measured using EOG sensors and determines eyes ori-
ties for refinement and enhancement. A comparative
entation. By employing a disposable Ag–Cl electrode
analysis reveals that no single method achieves abso-
on each eye’s outer corner and a third electrode at
lute accuracy, although techniques relying on physi-
the forehead’s center, the system observes horizontal
ological parameters tend to yield more precise results
eye movements (Shuvan et al., 2009). These electrodes
than others. A combination of these methods, includ-
assist in identifying behavioral patterns such as rapid
ing physiological, vehicular, or behavioral measures,
eye movements (REM) and slow eye movements
can address the limitations present in each technique
(SEM), contributing to drowsiness detection in driv-
when used individually (Table 19.1).
ers (Lal et al., 2001; Sharma et al., 2020).
Khushaba et al. (2010) and Kukreja et al. (2022)
discovered that EOG alone could not produce accu- References
rate results compared to EEG alone for detecting Sales Statistics | Www.Oica.Net. (n.d.). Accessed September
drowsiness. Chieh et al. (2005) monitored eye move- 17, 2023. https://www.oica.net/category/sales-statistics/.
ment using EOG rather than a video-based eye moni- World Health Organization: WHO. (2022). Road Traffic
tor and achieved 80% accuracy. Injuries. 2022. https://www.who.int/news-room/fact-
sheets/detail/road%09traffic-injuries.
National Highway Traffic Safety Administration. (n.d.). Ac-
III. Result and discussion cessed September 17, 2023. https://crashstats.nhtsa.
The issue of driver drowsiness represents a significant dot.gov/#!/.
threat to road safety. Detecting driver drowsiness and McKernon, S. (2009). A literature review on driver fatigue
promptly issuing alerts is essential to avert a substan- among drivers in the general public. Land Transport,
New Zealand. 1–62.
tial number of road accidents. The primary objective
Liu, C. C., Simon, G. H., and Michael, G. L. (2009). Predict-
of this systematic review is to explore the most cur-
ing driver drowsiness using vehicle measures: Recent
rent advancements in drowsiness detection systems. insights and future challenges. J. Safety Res., 40(4),
This review examines drowsiness detection methods 239–245.
based on subjective, behavioral, vehicular, and physi- Brown, T., John, L., Chris, S., Dary, F., and Anthony, M.
ological parameters. These methods are thoroughly (2014). Assessing the feasibility of vehicle-based
Applied Data Science and Smart Systems 139
sensors to detect drowsy driving. No. DOT HS 811 ness prediction system by using a self-organizing neu-
886. ral fuzzy system. IEEE Trans. Circuit. Sys. I Reg. Pa-
Sigari, M.-H., Muhammad-Reza, P., Mohsen, S., and Mah- pers, 59(9), 2044–2055.
mood, F. (2014). A review on driver face monitoring Liu, J., Chong, Z., and Chongxun, Z. (2010). EEG-based
systems for fatigue and distraction detection. Int. J. estimation of mental fatigue by using KPCA–HMM
Adv. Sci. Technol., 64, 73–100. and complexity parameters. Biomed. Sig. Proc. Con.,
Mittal, A., Kanika, K., Sarina, D., and Manvjeet, K. (2016). 5(2), 124–130.
Head movement-based driver drowsiness detection: Campagne, A., Thierry, P., and Alain, M. (2004). Correlation
A review of state-of-art techniques. 2016 IEEE Int. between driving errors and vigilance level: influence of
Conf. Engg. Technol. (ICETECH), 903–908. the driver’s age. Physiol. Behav., 80(4), 515–524.
Sanjaya, K. H., Soomin, L., and Tetsuo, K. (2016). Review Lin, C.-T., Kuan-Chih, H., Chun-Hsiang, C., Li-Wei, K., and
on the application of physiological and biomechanical Tzyy-Ping. J. (2013). Can arousing feedback rectify
measurement methods in driving fatigue detection. J. lapses in driving? Prediction from EEG power spectra.
Mechat. Elec. Power Vehicul. Technol., 7(1), 35–48. J. Neural Engg., 10(5), 056024.
Sahayadhas, A., Kenneth, S., and Murugappan, M. (2013). Tsuchida, A., Md Shoaib, B., and Koji, O. (2009). Estima-
Drowsiness detection during different times of day us- tion of drowsiness level based on eyelid closure and
ing multiple features. Aus. Phy. Engg Sci. Med., 36, heart rate variability. 2009 Ann. Int. Conf. IEEE
243–250. Engg. Med. Biol. Soc., 2543–2546.
Kang, H.-B. (2013). Various approaches for driver and driv- Arun, S., Kenneth, S., and Murugappan, M. (2012). Hypo-
ing behavior monitoring: A review. Proc. IEEE Int. vigilance detection using energy of electrocardiogram
Conf. Comp. Vis. Workshops, 616–623. signals. Journal of scientific & Industrial Research.
Rahman, A., Mehreen, S., and Aliya, K. (2015). Real time 71(12), 794–799.
drowsiness detection using eye blink monitoring. 2015 Lee, B.-G., Jae-Hee, P., Chuan-Chin, P., and Wan-Young, C.
Nat. Softw. Engg. Conf. (NSEC), 1–7. (2014). Mobile-based kernel-fuzzy-c-means-wavelet
Yan, C., Frans, C., Yong, Y., Xiaosong, Y., and Bailing, Z. for driver fatigue prediction with cloud computing.
(2016). Video-based classification of driving behavior Sensors 2014 IEEE, 1236–1239.
using a hierarchical classification system with mul- Hostens, I. and Herman, R. (2005). Assessment of muscle
tiple features. Int. J. Pat. Recogn. Artif. Intel., 30(05), fatigue in low level monotonous task performance
1650010. during car driving. J. Electromyograp. Kinesiol., 15(3),
Teyeb, I., Olfa, J., Mourad, Z., and Chokri, B. A. (2014). 266–274.
A novel approach for drowsy driver detection using Katsis, C. D., Ntouvas, N. E., Bafas, C. G., and Fotiadis, D.
head posture estimation and eyes recognition system I. (2004). Assessment of muscle fatigue during driving
based on wavelet network. IISA 2014 5th Int. Conf. using surface EMG. In Proceedings of the IASTED in-
Inform. Intel. Sys. Appl., 379–384. ternational conference on biomedical engineering, vol.
Katyal, Y., Suhas, A., and Shipra, D. (2014). Safe driving by 262. doi: 10.2316/Journal.216.2004.2.417-112
detecting lane discipline and driver drowsiness. 2014 Balasubramanian, V. and Adalarasu, K. (2007). EMG-based
IEEE Int. Conf. Adv. Comm. Con. Comput. Technol., analysis of change in muscle activity during simulated
1008–1012. driving. J. Bodywork Mov. Ther., 11(2), 151–158.
Ingre, M., Torbjörn, Å., Björn, P., Anna, A., and Göran, K. Hu, S. and Gangtie, Z. (2009). Driver drowsiness detection
(2006). Subjective sleepiness, simulated driving per- with eyelid related parameters by support vector ma-
formance and blink duration: examining individual chine. Exp. Sys. Appl., 36(4), 7651–7658.
differences. J. Sleep Res., 15(1), 47–53. Lal, S. K. L. and Ashley, C. (2001). A critical review of the
Fairclough, S. H. and Graham, R. (1999). Impairment of driv- psychophysiology of driver fatigue. Biol. Psychol.,
ing performance caused by sleep deprivation or alcohol: 55(3), 173–194.
a comparative study. Human Factors, 41(1), 118–128. Khushaba, R. N., Sarath, K., Sara, L., and Gamini, D.
Thiffault, P. and Jacques, B. (2003). Monotony of road en- (2010). Driver drowsiness classification using fuzzy
vironment and driver fatigue: a simulator study. Acc. wavelet-packet-based feature-extraction algorithm.
Anal. Preven., 35(3), 381–391. IEEE Trans. Biomed. Engg., 58(1), 121–131.
Li, Z., Shengbo, E. L., Renjie, L., Bo, C., and Jinliang, S. Kukreja, V. and Sakshi. (2022). Machine learning models
(2017). Online detection of driver fatigue using steer- for mathematical symbol recognition: A stem to stern
ing wheel angles for real driving conditions. Sensors, literature analysis. Multimedia Tools Appl., 81(20),
17(3), 495. 28651–28687.
Zhenhai, G., Le, D., Hu, H., Yu, Z., and Wu, X. (2017). Driv- Chieh, T. C., Mohd, M. M., Aini, H., Seyed, F. H., and
er drowsiness detection based on time series analysis Burhanuddin, Y. M. (2005). Development of vehicle
of steering wheel angular velocity. 2017 9th Int. Conf. driver drowsiness detection system using electroocu-
Meas. Technol. Mech. Autom. (ICMTMA), 99–101. logram (EOG). 2005 1st Int. Conf. Comp. Comm. Sig.
Akin, M., Muhammed, B. K., Necmettin, S., and Muhittin, Proc. Special Track Biomed. Engg., 165–168.
B. (2008). Estimating vigilance level by using EEG and Sharma, R. and Vinay, K. (2022). Segmentation and multi-
EMG signals. Neural Comput. Appl., 17, 227–236. layer perceptron: An intelligent multi-classification
Lin, F.-C., Li-Wei, K., Chun-Hsiang, C., Tung-Ping, S., and model for sugarcane disease detection. 2022 Int. Conf.
Chin-Teng, L. (2012). Generalized EEG-based drowsi- Dec. Aid Sci. Appl. (DASA), 1265–1269.
20 Issues with existing solutions for grievance redressal
systems and mitigation approach using blockchain
network
Harish Kumar, Rajesh Kumar Kaushala and Naveen Kumar
Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India
Abstract
Grievance redressal has always been vital for any organization to maintain a good work environment for its stakeholders.
Some organizations follow online portals, websites, or mobile applications to register grievances to provide more privacy to
the complainant’s identity. However, online platforms provide better solutions to the existing manual methods for grievance
redressal. Still, there are a lot of issues and challenges associated with them. This research has comprehensively analyzed the
existing grievance redressal systems to identify and discuss all the challenges. After comprehensive analysis, it is found that
presently there are several issues such as delayed response, opaque processes, biases, complexity and accessibility issues, lack
of personalization, and other privacy and security concerns associated with existing grievance redressal methods. To address
all these issues this study is proposing a blockchain-based solution for grievance redressal systems. The proposed solution
will be a blockchain-based web and mobile application that consists of multiple entities such as complainants, redressal
committee, and higher authorities. This system will provide the necessary privacy and confidentiality to the complainants
through the immutable distributed ledger technology and auditability of the entire process with complete transparency.
[email protected]
a
Applied Data Science and Smart Systems 141
Research objectives
The primary objective of this research article is to
investigate the challenges faced by existing grievance
redressal systems and explore how blockchain tech-
nology can mitigate these issues. To achieve this, the
following research goals will be pursued:
IV. Methodology
The research work is conducted using a prisma
approach in order to ensure its conclusion. A stan-
dardized methodology encompassing the stages of
planning, execution, and reporting was implemented.
The sections that follow outline the procedural phases
of the approach employed in this study. The initial
stage involves the formulation of search keywords.
The subsequent stage is conducting a search for sys-
tems designed to address grievances, (Figure 20.1)
online portals dedicated to grievance redressal, and
research papers pertaining to blockchain technology,
utilizing certain keywords. The purpose of utilizing
certain keywords is to effectively distinguish between Figure 20.2 Structure of grievances redressal system
research articles that are relevant and those that are
irrelevant. In the third phase, an analysis is conducted
on the operational characteristics of online portals. of a proficient and impactful method for addressing
This examination involves the identification of short- grievances is an essential requirement for any orga-
comings in current solutions and the subsequent nization or institution to demonstrate responsibility
proposal of blockchain technology as a fundamental and accountability (Tripathi, Srivastava, and Singh,
remedy for the aforementioned concerns within this 2021). The workflow of the traditional grievances
industry (Figure 20.2). redressal system is shown in Figure 20.2.
Grievances may emerge at several levels within an
organization, including educational institutions such
V. Related work
as universities and schools. When any individuals per-
A complaint is typically characterized as a form of ceive that their rights, needs, or expectations have not
communication, whether spoken or written that been adequately fulfilled. This issue becomes highly
articulates dissatisfaction with a particular course delicate when it pertains to the students of an aca-
of conduct or neglect, or with the quality of service demic institution, given that students are the most
provided by an organization. The implementation vulnerable individuals in this context. Frequently,
142 Issues with existing solutions for grievance redressal systems
individuals encounter difficulties in effectively com- have encompassed the crucial features which are
municating their concerns and encounter challenges required for an effective and efficient system, such as
in receiving adequate help from relevant authorities at immutability, transparency, auditability, and distrib-
different stages of their academic progression within uted storage to mitigate the risk of a single point of
the institution (Prajapat, Sabharwal, and Wadhwani, failure within the system.
2018). In a research article, the authors (Magner, Table 20.1 exhibits a comprehensive literature
1995) have examined a particular case wherein a sub- assessment of the existing solution for grievance
stantial group of students collectively endorsed and redressal on the basis of the key features of an effec-
submitted a petition alleging substandard teaching by tive and efficient system.
their teacher, citing an inability to effectively deliver The authors Prajapat, Sabharwal, and Wadhwani
the curriculum in accordance with the updated edu- (2018) in their study have proposed an automated
cational framework. The authors (Miklas and Kleiner, system for grievance registration and redressal, but it
2003) discussed the case of a foreign university where follows a very basic architecture and it is still human-
a group of female students registered a complaint dependent to forward the complaint at almost every
against their professor for harassment. stage, and due to that resolution to the student griev-
Many researchers proposed a variety of theoreti- ance may be delayed, the privacy of the user’s identity
cal frameworks, prototypes, online solutions, mobile is not preserved, security of sensitive data is not men-
applications, and web portals utilizing diverse tech- tioned and covered, due to centralized system archi-
nologies such as artificial intelligence and machine tecture, tampering with the data may be possible,
learning (ML) techniques to manage grievance and due to weak architecture it cannot be implemented
redressal processes. However, none of these proposals at larger scale. The authors Kandhari and Mohinani
(2014) have designed a mobile application for the citi- In the event of prolonged inactivity, the system auto-
zens to register their municipal services-related griev- matically elevates the complaint’s status to the supe-
ances. The application enables the users to register rior officer and District Magistrate through an email
their complaints along with the image of problems notification, providing an update on the registered
and location coordinates. The author Kormpho et al. complaint. The authors Shettigar et al. (2021) in a
(2018) proposed a solution that involves the devel- separate study proposed a blockchain-based solution
opment of a mobile application and a chatbot that for a grievances management system for college stu-
allows end-users to effectively register their concerns. dents, being a blockchain-based solution, it provides
Additionally, an innovative web-based solution is all the inherent features of blockchain but the most
provided for the organization to address these issues, important phase, which is implementation, is miss-
with the added benefit of preventing duplicate com- ing. The proposed solution uses the permissioned
plaints. The authors Palanissamy and Kesavamoorthy blockchain hyperledger fabric framework. In another
(2019) in their proposed solution comprise a widely study, the researchers Jha, Sonawane, and others
used online application for addressing grievances. (2022) presented a proposal for the development
This approach employs a multi-step negotiation pro- of a web portal designed specifically for students to
cess to identify and resolve issues. Which depends on register their complaints across different categories.
human involvement at each level. However, the pro- This portal offers transparency and monitoring capa-
posed method provides an easy user interface but is bilities, allowing the tracking of complaint statuses
deficient in key attributes such as tamper-proofing, at any given stage. Additionally, the authors suggest
immutability, privacy, and transparency, all of which the incorporation of ML and artificial intelligence
are of utmost significance when dealing with sensitive (AI) techniques to identify and address instances of
information. offensive language and complaints that propagate
In another study, the authors Aravindhan et al. misinformation on sensitive subjects such as racism,
(2020) developed a web-based solution that relies gender, and religion.
on human intervention at various stages to address In another study, authors Musa et al. (2021) have
complaints. However, this dependence on human proposed a centralized web portal to handle the stu-
involvement can potentially lead to delays in resolv- dents’ grievances at the university level, where stu-
ing student grievances. Furthermore, the preservation dents can register their academic and non-academic
of user identification and the protection of sensitive related grievances. Another govt. of India, initiative
data are not well-addressed or discussed. The poten- Rana et al. (2016) has introduced an online portal
tial for data tampering exists due to the central- for Indian citizens, where they can register their com-
ized system architecture, and the proposed solution plaints against any central or state govt. departments,
is not feasible for larger-scale implementation due sub-departments, or any public service-providing
to its inherent weaknesses in architecture. The sole agencies.
advantageous aspect of the suggested solution is to The Director of Public Grievances, The Department
the incorporation of a web interface into the preex- of Administrative Reforms and Public Grievances has
isting manual system. The researchers Laxmaiah and implemented a web-based portal to address and mon-
Mahesh (2020) of the study developed an automated itor public grievances. This portal is interconnected
and intelligent mobile application for the citizens to with all ministries and departments of the Indian gov-
register their grievances, the mobile application uses ernment as well as state governments. It allows citi-
ML techniques to segregate the types of complaints zens to access the portal through a mobile application
and automatically forward them to the concerned and register their grievances about any service pro-
department of an official without any delay, most of vided by the Indian government or state government.
the phases of this system is totally automated without Additionally, the portal offers transparency to users
any human dependency or intervention, researchers by enabling them to track the progress of their griev-
use cloud vision server and geo-coding and reverse ances using a unique registration number (DARPG,
geo-coding to label and identify the problem location 2023). The success of online portals for grievance
without any human involvement. It also provides the redressal systems has been comprehensively assessed
user’s accounts and their registered grievances and and analyzed by the authors Rana et al. (2015) in a
also provides the tracking information about the reg- separate study. This evaluation was conducted using
istered complaints. an E-government-based IS success model, which
In another study, the authors Hingorani et al. was constructed utilizing existing IS success models.
(2020) proposed a police complaint system by utiliz- Multiple hypotheses were examined and supported
ing blockchain technology in the development of web by empirical evidence, indicating that the implemen-
and mobile applications. It enables complainants to tation of the online public grievances redressal system
conveniently register and monitor their complaints. is likely to be highly effective. However, it is important
144 Issues with existing solutions for grievance redressal systems
Delayed resolutions
The effectiveness of conventional methods for
addressing grievances is often hampered by lengthy
and extended procedures for resolving disputes. It can
result in extended suffering for the aggrieved parties,
especially in cases where time-sensitive issues are at
stake. Delays can also increase tensions, and conflicts
which aggravate disputes, hence emphasizing the sig-
nificance of quick resolution.
Figure 20.3 Publication trends in existing solutions on
grievances redressal system
Susceptibility to manipulation
Several grievance redressal systems exhibit vulnerabil-
to note that despite the convenience and accessibility ity to manipulation, stemming from either unethical
offered by the online portal for registering grievances, practices or organizational inefficiency. This suscep-
the privacy and security of user data remain signifi- tibility undermines the justice of the system and may
cant concerns. discourage individuals from seeking resolution for
The researchers Alawneh, Al-Refai, and Batiha their issues early.
(2013) in their study investigated the factors that
influence user satisfaction with Jordan’s e-govern- Lack of accountability
ment services portal. The research paper outlines five Accountability counted as a key component of an effi-
primary criteria that have the potential to influence cient grievance redressal system. However, in several
the level of satisfaction among Jordanian individu- cases, it proves to be quite a challenge to ensure that
als with the portal. These factors encompass security the individuals or entities involved are held liable for
and privacy, trust, accessibility, awareness of public their actions. The absence of accountability can give
services, and the quality of public services. The study rise to a culture of freedom, wherein instances of mis-
presents significant findings derived from the analysis conduct remain unaddressed.
of survey data, emphasizing the importance of com-
prehending these factors to enhance the design and Inadequate data security
functionality of e-government portals. It also provides The rising dependence on online platforms for the
recommendations for practitioners and policy-mak- resolution of grievances has led to increased attention
ers to effectively improve user experience and cater on data security. The occurrence of breaches and data
to the needs of citizens. The outcomes of this study leaks can result in significant implications, such as the
underscore the shortcomings of the current system for disclosure of confidential data and a decline of confi-
addressing issues. dence in the system.
The literature review indicates that most of the
studies have implemented a centralized solution, few VII. Proposed system
articles only discuss the theoretical models, and few
have done the analysis of the effectiveness of the exist- The main purpose of this study is to investigate the
ing centralized solution, and the blockchain-based existing literature and identify the issues with the
studies are merely proposing a theoretical model. As existing solutions and propose an effective and effi-
per the reviewed literature, Figure 20.3 illustrates the cient system for grievance redressal which will cover
publication trends observed in published articles in all the issues identified during the literature review
this domain. of the existing solutions. The proposed system will
be an online web/mobile application that will use a
blockchain framework to provide distributed stor-
VI. Issues identified with existing grs age and provide immutability and full auditability.
Lack of transparency The structure of the proposed system is shown in
One of the significant challenges in existing grievance Figure 20.4.
redressal procedures is the absence of openness. In
several instances, people are often uninformed of the VIII. Result and discussion
status of their grievances, the procedures involved in
decision-making, and the eventual outcome. The lack The conventional methods of addressing grievances
of transparency can result in feelings of dissatisfaction, are considered to be inadequate due to their limited
Applied Data Science and Smart Systems 145
effectiveness in delivering crucial elements necessary IX. Conclusion and future work
for an efficient solution, such as transparency, immu-
Blockchain can provide transparency, immutability,
tability, privacy, quick redressal, security, and audit-
and a distributed storage facility and its integration
ability. The prevailing approach in online grievance
with various sectors can improve the existing services.
management solutions relies on a centrally managed
This article explores the limitations and issues of the
server system, rendering them more vulnerable to
present grievance redressal procedures. Although some
potential removal or tampering of data. Conversely,
of the online portals provide some sort of privacy and
the implementation of a decentralized grievance
transparency but they fail to provide immutability and
redressal system may hinder these efforts due to the
solution to a single point of failure. While identifying
widespread availability of all grievances across every
the limitations of the existing grievances redressal sys-
peer within the network.
tem this study proposes blockchain technology as a
During the literature review on the traditional and
mitigation approach to all the identified issues with
other online solutions for the grievances redressal sys-
the existing solutions. Blockchain-powered systems
tem, some important issues are identified. This exhib-
offer benefits like increased transparency, record pres-
its that there is a strong requirement for an efficient
ervation, and decentralized trust mechanisms.
grievance redressal system that should be both trans-
The findings of our investigation indicate that the
parent and tamper-proof and operate on a distributed
adoption of a blockchain-powered grievance redressal
peer-to-peer network which eliminates any potential
system presents numerous benefits, such as increased
instances of ignorance and abuse of power by higher-
transparency, the preservation of unalterable records,
level officials.
and the utilization of decentralized trust mechanisms.
Our proposed system extends the security, pri-
Through the utilization of smart contracts and cryp-
vacy, and other key features of the online portal by
tographic methodologies, blockchain technology has
adding blockchain technology, which provides all
the potential to enable a secure and effective mecha-
the inherent features of blockchain such as immu-
nism for addressing grievances. However, scalability,
tability, auditability, transparency, and distributed
privacy, and regulatory constraints are crucial and
ledger storage which mitigate the single point of
that can be managed with the selection of an appro-
failure of a centralized system and auditability fea-
priate blockchain framework.
ture enable the authorized user to check the com-
plete transaction history, and transparency feature
of blockchain allows the users to get updates about References
every change/transaction made to the registered Aggarwal, A., Ran Singh, D., and Kamrunnisha, N. (2018).
complaint. Impact of structural empowerment on organizational
146 Issues with existing solutions for grievance redressal systems
commitment: The mediating role of women’s psycho- Laxmaiah, M. and Mahesh, K. (2020). An intelligent public
logical empowerment. Vision, 22(3), 284–294. grievance reporting system-IReport. ICCCE 2020 Proc.
Alawneh, A., Al-Refai, H., and Batiha, K. (2013). Mea- 3rd Int. Conf. Comm. Cyber Phy. Engg., 197–207.
suring user satisfaction from e-government services: Magner, D. K. (1995). Mid-semester removal of Professor
Lessons from Jordan. Gov. Inform. Quart., 30(3), Roils University of Montana. Chron. Higher Edu., A25.
277–288. Miklas, E. J. and Brian, H. K. (2003). New developments
Aravindhan, K., Periyakaruppan, K., Aswini, K., Vaishnavi, concerning academic grievances. Manag. Res. News,
S., and Yamini, L. (2020). Web portal for effective stu- 26(2/3/4), 141–147.
dent grievance support system. 2020 6th Int. Conf. Musa, W. M. W., Azahari, A. A., Noorimah, M., and Suhaily,
Adv. Comput. Comm. Sys. (ICACCS), 1463–1465. M. A. M. (2021). E-justice: Students’ complaints made
Bhadouria, L. S. and others. (2021). Online complaint man- easy. SEARCH J. Media Comm. Res. (SEARCH), 1.
agement system. Turkish J. Comp. Math. Edu. (TUR- Oguntosin, V., Oluwadurotimi, M., Adoghe, A., Abdulka-
COMAT), 12(6), 5144–5150. reem, A., and Adeyemi, G. (2021). Development of a
DARPG. (2023). Centralized public grievance redress and web-based complaint management platform for a Uni-
monitoring system. https://pgportal.gov.in/Home/ versity community. J. Engg. Sci. Technol. Rev., 14(1),
AboutUs. 150–159.
Denny, J., Ramya, C., Sweta, R. L., Srija Reddy, A., and Sa- Palanissamy, A. and Kesavamoorthy, R. (2019). Automated
hithya, V. (2021). A Web Portal for Student Grievance dispute resolution system (ADRS) – A proposed ini-
Support System. International Research Journal of tial framework for digital justice in online consumer
Engineering and Technology. 8(5), 1261–1263. transactions in India. Proc. Comp. Sci., 165, 224–231.
Hingorani, I., Rushabh, K., Deepika, P., and Nataasha, R. Prajapat, S., Vaibhav, S., and Varun, W. (2018). A prototype
(2020). Police complaint management system using for grievance redressal system. Proc. Int. Conf. Recent
blockchain technology. 2020 3rd Int. Conf. Intel. Sus- Adv. Comp. Comm. ICRAC 2017, 41–49.
tain. Sys. (ICISS), 1214–1219. Rana, N. P., Yogesh, K. D., Michael, D. W., and Banita, L.
Jattan, S., Vineeth, K., Akhilesh, R., Rachith, R. N., and Sne- (2015). Examining the success of the online public
ha, N. S. (2020). Smart complaint redressal system us- grievance redressal systems: An extension of the IS
ing Ethereum blockchain. 2020 IEEE Int. Conf. Dis- success model. Inform. Sys. Manag., 32(1), 39–59.
tribut. Comput. VLSI Elec. Cir. Robot. (DISCOVER), Rana, N. P., Yogesh, K. D., Michael, D. W., and Vishanth, W.
224–229. (2016). Adoption of online public grievance redressal
Jha, S., Pankaj, S., and others. (2022). Smart student system in India: Toward developing a unified view.
grievance redressal system with foul language detec- Comp. Human Behav., 59, 265–282.
tion. 2022 8th Int. Conf. Adv. Comp. Comm. Sys. Shahnawaz, M., Prashant, S., Prabhat, K., and Anuradha, K.
(ICACCS), 1, 187–192. (2020). Grievance redressal system. Int. J. Data Min.
Kandhari, V. K. and Keertika, D. M. (2014). GPS based com- Big Data, 1(1), 1–4.
plaint redressal system. 2014 IEEE Global Human. Shettigar, R., Nishant, D., Ketan, I., Farhan, A., and Ram-
Technol. Conf. South Asia Satel. (GHTC-SAS), 51–56. krushna, C. M. (2021). Blockchain-based grievance
Kormpho, P., Panida, L., Narut, P., and Siripen, P. (2018). management system. Evol. Computat. Intel. Front.
Smart complaint management system. 2018 Seventh Intel. Comput. Theory Appl. (FICTA 2020), 1,
ICT Int. Student Project Conf. (ICT-ISPC), 1–6. 211–222.
Kumar, A., Sharad, S., Nitin, G., Aman, S., Xiaochun, C., Tripathi, U. N., Amit Kumar, S., and Bhanu P. S. (2021). Ef-
and Parminder, S. (2021). Secure and energy-efficient fectiveness of online grievance redressal and manage-
smart building architecture with emerging technology ment system: A case study of IGNOU learners. Ind. J.
IoT. Comp. Comm., 176, 207–217. Edu. Technol., 3(2), 92.
21 A systematic approach to implement hyperledger fabric
for remote patient monitoring
Shilpi Garg, Rajesh Kumar Kaushala and Naveen Kumar
Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India
Abstract
The integration of blockchain technology, particularly hyperledger fabric, into the domain of remote patient monitor-
ing, presents a new era that has the potential to greatly improve healthcare systems. This research paper introduces a
methodical strategy for integrating hyperledger fabric into remote patient monitoring systems. It provides a structure that
efficiently addresses key challenges pertaining to data security, privacy, and interoperability. This study aims to establish a
methodology for remote patient monitoring environments by carefully analyzing the distinctive requirements and constraints
associated with these types of environments. The methodology encompasses various key phases, including network configu-
ration, smart contract design and sensitive data management specifically tailored to healthcare contexts. In addition, the
study explores practical methods of implementation and conducts performance evaluation of the suggested strategy using
minifab and hyperledger explorer, respectively. This analysis provides valuable insights into the effectiveness and efficiency
of the approach in safeguarding the privacy and security of patient information. Through an examination of the mutually
beneficial capabilities of hyperledger fabric and remote patient monitoring, this study makes a valuable contribution to the
advancement of healthcare systems that are both secure and efficient.
Keywords: Hyperledger fabric, remote patient monitoring, blockchain, hyperledger explorer, minifab
a
[email protected]
148 A systematic approach to implement hyperledger fabric for remote patient monitoring
et al., 2020; Tanwar, Parekh, and Evans, 2020). The sibility of transmitting information among net-
technology was developed within the framework of work participants while upholding data integrity.
the “Hyperledger Foundation”, an organization led Additionally, it enables the establishment of spe-
by IBM. It possesses several notable features, such as cific criteria or permissions to encapsulate the
the ability to create private data collections, strong transmitted data. In situations where maintain-
security measures for Docker containers, a flexible ing the confidentiality of particular information
programming framework, and a consensus model that is crucial, the option exists to create a separate
can be adjusted based on the host nodes. Hyperledger channel distinct from the rest, accessible only
fabric consists of various major components includ- to select organizations. This feature underscores
ing peers, orderer, chaincode, membership service the potential for multiple blockchains to coexist
provider (MSP), channels, and fabric certificate within the same network, as a channel essentially
authority (CA). Figure 21.1 illustrates the transaction operates as an independent blockchain.
flow diagram of the hyperledger fabric (Pongnumkul, • Certification authorities (CAs) are a fundamental
Siripanpornchana, and Thajchayapong, 2017; component of public key infrastructures (PKIs)
Performance, Group, and others, 2018; Jennath, and have been assigned with ensuring the distri-
Anoop, and Asharaf, 2020; Woznica and Kedziora, bution of digital certificates. The primary func-
2022). tion of this layer is to verify the identities of the
Peer refers to the individual nodes that comprise parties or actors involved in the communication,
the network organizations. The aforementioned ensuring that they are indeed who they claim to
pieces are responsible for providing information to be. Websites commonly possess a digital certifi-
the ordering nodes within the network, enabling them cate that is issued by a reputable CA in order to
to configure the blocks that are being transacted. authenticate the trustworthiness of the visited
Orderer: One of the pivotal components within the website.
network, the orderer assumes a critical role in config- • The membership service provider (MSP) is re-
uring blocks according to specified criteria and dis- sponsible for gathering all cryptographic tech-
tributing them to their respective peers. These peers niques employed for network interaction. It is
can be affiliated with one or multiple organizations, imperative for every organization to own a man-
necessitating the attainment of a consensus agreement aged security provider (MSP) that encompasses
as per the network’s requirements. All transactions its cryptographic data, including keys and the CA
related to network configuration flow through the responsible for issuing its certificates. The cre-
orderer. Additionally, these computing entities enforce dentials are utilized by clients for the purpose of
fundamental access control for channels, determining authenticating their transactions, while peers em-
who has read and write privileges and the authority ploy them to authenticate the outcomes of trans-
to configure them. action processing, specifically endorsements.
• Chaincode, often referred to as smart contracts
• Channel functions as a communication medium within the context of hyperledger fabric, serves
among network participants. In this context, it as the mechanism through which contractual
serves as a mechanism for conducting private agreements are implemented. A smart contract
communications, ensuring data isolation and refers to a block of code that is triggered by an
confidentiality. This layer takes on the respon- external client application, operating outside
Applied Data Science and Smart Systems 149
the blockchain network. Its purpose is to over- comprising a network of peers. Language java is uti-
see the manipulation and control of a collection lized for the purpose of writing chaincode. Figure 21.3
of key-value pairs inside the present state of the is a screenshot of spec.yaml file that is a configuration
network, accomplished through the execution of file about the network used by minifab. Table 21.1
transactions. Smart contracts are encapsulated
and distributed as chaincode. Subsequently, the
chaincode is deployed onto the peers and subse-
quently defined and utilized within one or many
channels.
III. Implementation
In order to effectively handle the patient data it is
necessary to establish a correlation between the vari-
ous components of the fabric and the demands of the
RPM-based EHR systems. All medical centers func-
tion as entities inside a fabric network. The patient
data has been regarded as valuable resources stored
within the ledger. Currently, patient records consist
of a limited number of categories, encompassing
personal and medical information such as age, resi- Figure 21.3 Spec.yaml file for network
dence, allergies, symptoms, therapy, follow-up, and
so on. When a physician administers medication to a
Table 21.1 Process to build up the minifab network.
patient, they will have access to the patient’s medical
history data, which assists them in determining the Steps Command Description
most suitable type of medical care. Figure 21.2 illus-
1 minifab netup -s Start the network
trate the system architecture. couchdb -e true -i by adding hospital1.
The medical database is utilized to establish a 2.4.8 -o hospital1. health.com as a
repository of transactions within the proposed sys- health.com current organization
tem. The orderer and peer nodes are executed within 2 minifab create -c Create the
the Docker container. Hyperledger fabric framework healthchannel channel named as
is designed to be configured with a minimum of two healthchannel
organizations-hospital1 and hospital2. Every organi- 3 minifab join -c Network will join the
zation will be assigned to a single peer node, a chan- healthchannel healthchannel
nel, and an orderer node within the ordering service. 4 minifab Update the anchor
Each peer node within the network possesses a dupli- anchorupdate peer node
cate of the ledger. A chaincode is developed with the 5 minifab profilegen -c Generate the profiles
purpose of facilitating access to the two organizations healthchannel for healthchannel
Abstract
Kannada is one of the major regional languages of Karnataka, a prominent state of India. The text processing tasks are very
important and highly required for the development of the language in this digital world. Spell checking is one of the needs
in creating an effective document. Even though one can find several tools on the internet, it allows you to type or paste the
Kannada text on the text editor and submit the text then the result will appear on the another editor. The proposed work de-
lineates on developing an efficient interactive spell checking and transliteration tools for the Kannada language based on the
Blooms filter algorithm, Symspell technique and International Phonetic Alphabet (IPA) representation. This work carried out
with an intention to provide handy text processing tools to the public. The proposed work has been tested on several datasets
and found to be useful with more than 85% and 87.29% accuracy for both spell check and transliteration tools, respectively.
Keywords: Blooms filter, Symspell algorithm, Levenshtein distance, transliteration, International Phonetic Alphabet, candi-
date words
[email protected]
a
Applied Data Science and Smart Systems 153
language, regardless of the writing system used. The more effort into creating a real-word spell checker
IPA includes symbols for consonants, vowels, and that incorporates additional language principles.
other sounds, as well as diacritic marks that indicate A spell check tool using Levenshtein’s edit distance
variations in pronunciation, such as stress and tone. algorithm, rule-based algorithm, Soundex algorithm,
While IPA-based transliteration can be more precise and LSTM (Long- Short-Term Memory) model is
than other methods, it can also be more complex developed for Tamil language (Sampath et al., 2022).
and time-consuming, especially for those who are The model handles three categories of errors with a
not familiar with the IPA. Additionally, not all lan- good performance of 95.67%.
guages have a one-to-one correspondence between A Telugu spell-checker’s innovative concept and
their sounds and IPA symbols, which can lead to some implementation are presented in (Parameshwari et
ambiguity in transliteration. Despite these challenges, al., 2012). The core of Telugu spell-checking is mor-
IPA-based transliteration remains a valuable tool for phological validation using a morphological analyzer.
those who need to work with multiple languages and Along with issues affecting orthography and morphol-
writing systems. ogy, difficulties associated with Telugu document spell
In the proposed work, both dictionary and translit- checking are examined. On these lines, a spell-checker
eration tools are developed, the implementation part has been created. The spelling checker’s architecture
will focus more on these two models. and algorithm, which is based on Sandhi splitter and
morphological analysis principles, are described.
Related work Additionally, it contains tables of spelling variations
gleaned from Telugu’s spatiotemporal dialects.
A comprehensive survey is done on various languages A common approach used to develop a spell check
to understand the methodology/ technique used by tool is minimum edit distance algorithm (Patil et al.,
researchers. 2021). By carrying out numerous operations including
The researchers have explored methodologies character replacement, insertion, and deletion, it fixes
(Randhawa et al., 2014) used for developing spell spelling mistakes. The proposed work focuses on cor-
check tool for various Indian regional languages recting the errors for Marathi text and it works better
including the performance analysis. This helps a for short words with a good accuracy of 85.5%.
researcher to understand the pros and cons of avail- The challenges associated with multi-lingual
able techniques. A spell checker tool on Bangla is speech recognition and propose solutions to address
explored in (Chaudhuri et al., 2002). Researchers these challenges in the Indian context are explored in
have handled the errors based on the phonetic in two (Manjunath et al., 2019; Khattar et al., 2020). The
stages using phonetically similar character error cor- proposed model contributes to the advancement of
rection and reversed word dictionary and error cor- speech technology in the context of Indian languages,
rection. Experiment is conducted on three million which is crucial for enabling effective communication
words which are arranged in Trie data structure and and technology access for the diverse linguistic popu-
obtained satisfied results. lation in India.
Speech recognition is explored in (Priya et al., Both forward and backward transliteration of
2022), authors have used novel Automatic Speech Punjabi names was performed between Gurmukhi
Recognition system for seven low-resource languages and English Roman scripts using an n-gram language
based on deep sequence modeling with an enhanced model (Goyal et al., 2022). Over one million paral-
spell checker. The researchers have obtained word lel entities of person names in both scripts were used
error rate (WER) of 0.62 using recurrent neural as the training corpus. The study created extensive
network-gated recurrent unit (RNN-GRU) and the English-to-Punjabi and Punjabi-to-English n-gram
transformer-based INDIC Bidirectional Encoder pre- databases, comprising more than 10 million n-grams
sentations significantly enhance performance by 10% with multiple script mappings. Categorizing n-grams
and lower the average WER to 0.52. into starting, middle, and ending n-grams was essen-
A spell check tool is explored on Dawurootsuwa tial due to variations in pronunciation based on let-
which is one of the Ethiopian languages (Arya et al., ter placement in words. The transliteration process
2021; Gamu et al., 2023), it has poor dataset. The involved searching for the longest matching n-gram
root words in this study were built using the Hunspell in the database, recursively splitting the string until a
dictionary format and consisted of 5,000 total root match was found, and then merging the transliterated
words, more than 2,500 morphological rules, and strings to produce the final output.
3,156 unique terms for testing. total spell error detec- The challenges of speech recognition and spell cor-
tion performance was 90.4%, and total spell error rection in low-resource Indian language are discussed
repair performance was 79.31%, according to the in the work did by Priya et al. (2022). The authors
experimental results. Additionally, we are putting propose a solution using Indic BERT. A multi-lingual
154 Developing spell check and transliteration tools for Indian regional language – Kannada
transformer-based language model, the model per- regular keyboard (English language keyboard)
forms speech recognition and spell correction for the and can check the correct Kannada words on the
text written in Tamil, Telugu, and Kannada languages. editor.
By leveraging the power of transfer learning, the
authors demonstrate the effectiveness of Indic BERT Methodology
in improving the accuracy of speech recognition and
spell correction tasks in these languages. The general steps to develop a spell-checking tool in
Kannada speech corpus for automatic speech rec- Kannada language is as follows:
ognition system based on phoneme (Praveen et al.,
2022) is developed for Kannada corpus. The authors • Corpus collection: Gather a large collection of
describe the methodology employed in creating the correctly spelled Kannada text. This can include
corpus, which includes collecting speech samples books, articles, websites, and other reliable sourc-
from native Kannada speakers and annotating them es written in Kannada.
with phoneme-level transcriptions. The resulting • Corpus pre-processing: Clean and preprocess the
corpus serves as a valuable resource for researchers collected corpus data by removing any unwanted
and practitioners working on Kannada speech recog- characters, punctuation marks, and special sym-
nition, enabling the development and evaluation of bols. Normalize the text to ensure consistent rep-
accurate and efficient speech recognition models for resentation.
this language. • Tokenization: Split the pre-processed text into in-
A convolutional neural network-based speech rec- dividual words or tokens. This step helps in ana-
ognition model for Kannada Language is demon- lyzing and processing each word separately.
strated in work by Rudregowda et al. (2020). The • Build a dictionary: Create a dictionary of correct-
authors propose a methodology for visual speech ly spelled Kannada words based on the tokenized
recognition in Kannada. The findings of this study corpus. This dictionary will serve as the reference
contribute to the advancement of speech recognition for spell-checking.
technology for Kannada, which could have signifi- • Error generation: Generate a set of common
cant implications for speech-based applications in the spelling errors that occur in Kannada. This can
Kannada-speaking community. include typos, phonetic errors, and other com-
mon mistakes made by Kannada speakers.
• Spell-checking algorithm: Implement a spell-
Scope of the work
checking algorithm that compares each word in
From the survey, it is found extensive research work the input text with the words in the dictionary.
has not carried out in this domain. There is a lot of The algorithm should identify potential spelling
scope in this area. Summary of the survey is as fol- errors and suggest corrections based on the clos-
lows: After analyzing the survey, it is found that est matching words in the dictionary.
• User interface: Develop a user-friendly inter-
• In Kannada languages, minimum work has been face where users can input their text for spell-
carried out in spell check and transliteration do- checking and receive suggestions for correc-
main. tions. This can be a web-based interface or an
• Getting the proper Kannada datasets for training application.
and testing is not an easy task. • Testing and refinement: Test the spell-checking
• There is no open-source optical recognition tool tool with a variety of Kannada texts, including
available to convert pdf to word which is required different genres and writing styles. Collect user
for the text processing. feedback and refine the algorithm and user inter-
face based on the feedback received.
Objectives • Continuous improvement: Maintain and update
the spell-checking tool by periodically updating
From the survey, it is noted that, in Kannada language the dictionary with new words and refining the
there is a lot of scope with respect to transliteration error generation algorithms to improve accuracy
and not many research articles are published. We have and coverage.
contributed in this domain by
It is worth noting that building a robust and
• Developing a spell check tool with the possible accurate spell-checking tool requires a considerable
features amount of linguistic expertise and computational
• Designing a transliteration tool for Kannada lan- resources. Collaborating with Kannada language
guage, where the user can type Kannada using experts or researchers in natural language processing
Applied Data Science and Smart Systems 155
(NLP) would be beneficial in ensuring the effective- • Initialize a bit array of the specified size and set
ness of the tool. all bits to 0.
• Calculate the optimal number of hash functions
Dictionary-based spell checking tool based on the desired false positive probability
and the size of the dataset.
A huge dataset of 7 lakh is collected and in that • Create a list of hash functions using different seed
125,000 words are identified as unique words. These values.
words can have spelled in many ways all those mis-
spelled forms of these unique words are tabulated in a The following Figure 22.1 shows the architecture
dictionary which is used for error correction of the proposed model:
In this proposed model a user interface is devel-
oped such that it accepts the Kannada document or • Insert elements into the Bloom filter.
an editor is provided for the user to start typing the • For each element in the Kannada dataset, apply
Kannada articles. each hash function to generate hash values.
After the user uploads the document, two possible • Set the corresponding bits in the Bloom filter’s bit
scenarios can unfold. Firstly, a routine can be imple- array to 1 for each generated hash value.
mented to exhibit the precise contents of the docu- • Search for an element in the Bloom filter
ment within the designated text area. Secondly, all • Given a query element, apply each hash function
the words present in the document are divided into to generate hash values.
tokens, and the unique tokens are subsequently sub- • Check if the corresponding bits in the Bloom filter’s
jected to processing by Blooms filter. bit array are set to 1 for each generated hash value.
Here are the steps for implementing a Bloom filter • If any of the bits are not set to 1, the element is
searching algorithm for a Kannada dataset: definitely not present in the dataset.
• If all bits are set to 1, the element is probably pres-
• Create a Bloom filter: ent in the dataset (there is a false positive prob-
• Specify the desired size of the Bloom filter and the ability). Figures 22.2 and 22.3 shows the result of
number of hash functions to use. the search operation using Bloom filter.
deletions required to transform word1 into the given dataset. Similarly, the term fail in the graph
an empty string. refers to the percentage of failure in predicting the
7. Calculate the Levenshtein distance wrong words.
• Iterate through the characters of word1 From the Table 22.2 and the graph in Figure 22.5,
(from i=1 to m) and word2 (from j=1 to n). it is clear that for a small dataset like 10 words it
• If word1[i-1] is equal to word2[j-1] (i.e., the works pretty well with 90% accuracy. As we increase
characters are the same), the cost of the cur- the dataset it performs better, for 1 lakh of words
rent operation is 0. Set dp[i][j] to the value the accuracy is still better with 87%. Frequency of
of dp[i-1][j-1]. the words in the dictionary and different forms of
• If word1[i-1] is different from word2[j-1], grammatical words for a given word has an impact
we have three possible operations: on the performance of the model. If the data-
• Insertion: Calculate the cost of inserting set has more wrong words, then it will learn and
word2[j-1] into word1 at position i. Set dp[i] perform the prediction better. Figures 22.6–22.9
[j] to dp[i][j-1] + 1.
• Deletion: Calculate the cost of deleting
word1[i-1] from word1. Set dp[i][j] to dp[i- Table 22.1 Dataset details.
1][j] + 1.
• Substitution: Calculate the cost of substitut- Dataset Files
ing word1[i-1] with word2[j-1]. Set dp[i][j]
Articles 1026
to dp[i-1][j-1] + 1.
• Choose the minimum cost among the three Stories 51
possible operations and assign it to dp[i][j]. Wikipedia dataset 201
• Output: Grammar data 3
• The final Levenshtein distance is stored in
Dataset Content Size
dp[m][n], representing the minimum num-
ber of edits required to transform word1 Words 726,654
into word2.
Unique Words 179,863
The following Figure 22.4 demonstrates the results of
searching a word in a dictionary using Bloom filter.
Table 22.2 Performance analysis.
Results S.No. Number of words Accuracy in %
The proposed work with complete user interface is
1 10 90
uploaded on a website and released to the public. The
website is designed by taking requirements from the 2 100 91
users working from various domains. Initially the 3 1000 89
model is tested with 7 lakh words and later with dif- 4 10,000 85
ferent set of words. Tables 22.1 and 22.2 shows the 5 100,000 87
dataset type, size and the accuracy of the model. The
graph in Figure 22.5 shows the performance of the
model. In the graph, the term pass refers to the accu-
racy of the model in predicting the wrong words for
Snapshots
Train 75,557
Validation 25,185
Test 25,185
Figure 22.7 Identifying wrong words (underlined in
red)
English to IPA translation
The model is built using IPA to transliterate words
written in English to Kannada language. The dataset
used has 125,927 unique words. It is represented as
each English word and all its IPA translations. The
Figure 22.10 demonstrates the abstract view of this
work.
The following are the steps involved in the
translation:
Data pre-processing
The input data is initially in the raw state, converting
the dataset into a pair of English words and their cor-
responding IPA translations is done in the preprocess-
ing stage by removing unwanted text like numbers
Figure 22.8 Selecting the wrong words with options
and the special symbols since these do not require any
translations.
The English words and IPA translations are
Kannada transliteration tool tokenized, and the unique characters in both sets are
This section describes the implementation details of extracted. The input sequences are padded to a fixed
transliteration which translates text from English to length to ensure uniformity. The dataset details are
Kannada. shown in the Table 22.3.
Applied Data Science and Smart Systems 159
Model architecture
Character BERT is a specialized variant of the BERT
model that operates at the character level, making
it suitable for tasks such as phonetic transcription.
When translating English words to IPA transcrip-
tions, character BERT learns the relationship between
input characters and their corresponding IPA sym-
bols. The process begins by encoding each English
word into individual characters and converting them
into numerical representations using a character
vocabulary.
The model architecture of character BERT con-
sists of a multi-layer bidirectional transformer that
captures contextual information from both the left
and right contexts of each character. Prior to fine-
tuning, Character BERT undergoes pre-training on
large-scale unlabeled data, where it learns to predict
masked characters based on the context provided by
surrounding characters. Figure 22.11 Character BERT embedding
During fine-tuning, the model is trained on a par-
allel dataset of English words and their IPA tran-
scriptions, enabling it to encode the input characters
and predict the correct IPA transcriptions using the
learned contextual information. In inference, given an
English word, the characters are tokenized, encoded,
and passed through the fine-tuned character BERT
model. The model generates a sequence of numeri-
cal representations that can be decoded using the IPA
vocabulary, yielding the corresponding IPA transcrip-
tion. Character BERT’s strength lies in its ability to
capture fine-grained information from individual
characters, enabling accurate and context-aware IPA
transcriptions for English words (Figure 22.11).
Model training
• The model is trained using the compiled model
with the RMSprop optimizer and categorical Figure 22.12(b) Mapping consonants to its IPA rep-
cross-entropy loss function. resentation
• The training is performed by providing the en-
coder input (English word sequence) and decoder
input (IPA translation sequence) to predict the de- • The generated IPA translations are outputted for
coder output (next IPA character) as shown in the evaluation or further processing.
Figures 22.12a and b.
• The model is trained on a training set and vali- After the IPA translation is generated, using the
dated on a separate validation set. IPA-Kannada mapping we map each IPA symbol
160 Developing spell check and transliteration tools for Indian regional language – Kannada
to a corresponding Kannada alphabet as shown in Table 22.4 Sample transliterations of Kannada words
the Figure 22.13. The pseudo code is given by the
following: English word IPA translation Transliteration
Conclusion
The proposed work incorporates both dictionary
based spell checking tool and transliteration. Spell
checking tool is based on dictionary and the per-
formance of the model mainly based on the volume
of the dictionary. As long as the dictionary is grow-
ing the performance starts improving. This is not an
effective nature instead if the model understands the
rules of the grammar, the model doesn’t depend on
the words in the dictionary. This is the planned work
in the future.
Kannada transliteration tool is a productive one
since it is based on the rules of the Kannada gram-
mar still more feature can be added to it in future and
released for public use.
References
Randhawa, Er, Sumreet, K., and Saroa, Er C. S. (2014).
Study of spell checking techniques and available spell
checkers in regional languages: a survey. Int. J. Tech-
Figure 22.13 Mapping consonants to its IPA nol. Res. Engg., 2(3), 148–151.
Applied Data Science and Smart Systems 161
Chaudhuri, B. B. (2002). Towards Indian language spell- Goyal, K. D., Muhammad, R. A., Vishal, G., and Yasir, S.
checker design. Lang. Engg. Conf., 2002 Proc., 139– (2022). Forward-backward transliteration of Punjabi
146. Gurmukhi script using n-gram language model. ACM
Priya, M. C., Shunmuga, D., Karthika, R., Ashok Kumar, Trans. Asian Low-Res. Lang. Inform. Proc., 22(2),
L., and Lovelyn Rose, S. (2022). Multilingual low re- 1–24.
source Indian language speech recognition and spell Manjunath, K. E., Dinesh Babu, J., Sreenivasa Rao, K., and
correction using Indic BERT. Sa-dhana-, 47(4), 227. Ramasubramanian, V. (2019). Development and anal-
Gamu, D. T. and Michael, M. W. (2023). Morphology-based ysis of multilingual phone recognition systems using
spell checker for Dawurootsuwa language. Scientif. Indian languages. Int. J. Speech Technol., 22, 157–168.
Prog., 2023. Arya, R., Singh, J., and Kumar, A. (2021). A survey of
Sampath, A. and Varadhaganapathy, S. (2023). Hybrid multidisciplinary domains contributing to affective
Tamil spell checker with combined character splitting. computing. Comp. Sci. Rev., 40, 100399, https://doi.
Concur. Computat. Prac. Exp., 35(1), e7440. org/10.1016/j.cosrev.2021.100399.
Patil, K. T., Bhavsar, R. P., and Pawar, B. V. (2021). Spell- Prakash, A. and Hema, A. M. (2022). Exploring the role of
ing checking and error corrector system for Marathi language families for building Indic speech synthesis-
language text using minimum edit distance algorithm. ers. IEEE/ACM Trans. Audio Speech Lang. Proc., 31,
Adv. Comput. Data Sci. 5th Int. Conf. ICACDS 2021, 734–747.
Nashik, India, April 23–24, 2021, Revised Selected Priya, M. C., Shunmuga, D., Karthika, R., Ashok Kumar,
Papers, Part I 5, 102–111. Springer International Pub- L., and Lovelyn Rose, S. (2022). Multilingual low re-
lishing, 2021. source Indian language speech recognition and spell
Priyadarshani, H. S., Rajapaksha, M. D. W., Ranasing- correction using Indic BERT. Sa-dhana-, 47(4), 227.
he, M. M. S. P., Kengatharaiyer, S., and Dias, G. V. Praveen, N. and Shashidhar, K. (2022). Phoneme based
(2019). Statistical machine learning for translitera- Kannada speech corpus for automatic speech recogni-
tion: Transliterating names between Sinhala, Tamil tion system. 2022 IEEE Int. Conf. Distribut. Comput.
and English. 2019 Int Conf. Asian Lang. Proc. Elec. Cir. Elec. (ICDCECE), 1–5.
(IALP), 244–249. Rudregowda, S., Sudarshan Patil, K., Gururaj, H. L., Vi-
Khattar, N., Singh, J., and Sidhu, J. (2020). An energy effi- nayakumar, R., and Moez, K. (2023). Visual speech
cient and adaptive threshold VM consolidation frame- recognition for Kannada language using VGG16 con-
work for cloud environment. Wire. Per. Comm., 113, volutional neural network. Acoustics, 5(1), 343–353.
349–367.
23 Real-time identification of traffic actors using YOLOv7
Pavan Kumar Polagania, Lakshmi Priyanka Siddib and Vani Pujitha M.c
Velagapudi Ramakrishna Siddhartha Engineering College, Vijayawada, India
Abstract
Real-time traffic object detection is a key topic in computer vision, especially for improving traffic safety and management. This
research describes a novel strategy for detecting traffic actors in real-time using YOLOv7, a cutting-edge deep learning system.
Traditional computer vision algorithms, such as Single Shot Detector, R-CNN, and older versions of You Only Look Once
(YOLO), frequently exhibit slow response times and poor accuracy in high-traffic areas.YOLOv7, an advanced object detec-
tion method based on convolutional neural networks (CNNs), is used in the proposed approach to address these difficulties
straight on. YOLOv7 not only achieves real-time object detection, but also greatly increases accuracy by removing superfluous
candidate boxes and employing a non-maximum suppression module to choose the best bounding boxes from overlapping
ones. Furthermore, the spatial pyramid pooling block improves accuracy by enhancing the network’s receptive field without in-
troducing additional parameters. In this study, we demonstrate the performance of our model under various driving scenarios,
including clear and cloudy skies, varying lighting, occlusions, and noisy input data. This model detects traffic participants such
as automobiles, pedestrians, cyclists, and traffic signs, which contributes to improved traffic safety and management.
offering distinct strengths and weaknesses, thereby Advantage: Enhanced intention recognition through
enriching the diverse landscape of solutions within human skeletal characteristics.
this domain. Disadvantage: Increased computational complex-
The method described in this study relies around the ity and longer training times due to multiple model
use of the Fast-Yolo-Rec method, which expertly bal- usage.
ances accuracy and speed. Its key goals are trajectory
classification via long- short-term memory (LSTM)- DFF-Net, which was introduced in this study, is
based recurrent networks and position prediction intended to detect real-world traffic items on rail-
via SSAM-YOLO and LSSN. The optical flow-based ways. It is divided into two parts: previous detection
detection method is critical in establishing the direc- and object detection. To initialize the system and
tion and speed of individual pixels inside a picture. restrict the search space for object detection, the pre-
An interesting method is used to speed up process- vious detection module employs VGG-16 pre-trained
ing. Odd frames of input images are designated for on ImageNet. The object detection module seeks to
detection, while even frames are committed to predic- recognize and predict the kinds of objects contained
tion, considerably increasing overall speed (Zarei et within the prior boxes (Li et al., 2020).
al., 2022).
Advantage: DFF-Net excels at increasing detection
Advantage: Fast-Yolo-Rec excels in rapid and cost- accuracy and effectively addressing class imbalance in
effective vehicle detection. railway object detection.
Disadvantage: However, it demands substantial com- Disadvantage: However, when compared to YOLO, a
putational resources for handling real-time data. one stage object detector, DFF-Net has a slower total
In this study, methodology introduces the SEF-Net speed.
framework, which is made up of three modules.
Stable bottom feature extraction (SBM), Lightweight The authors obtained a large dataset spanning
feature extraction (LFM), and Enhanced adaptive fea- numerous traffic incidents such as accidents, conges-
ture fusion module (EAM). SBM improves precision tion, and vehicle breakdowns in this study. They used
in tiny object detection by expanding convolutional a pre-trained Mask-SpyNet model for video-based
channels, which is especially beneficial for small object detection and post-processing to identify and
objects. Furthermore, attention enhancement blocks categorize traffic occurrences (Ye et al., 2021).
encode geographic and channel-specific semantic
Advantage: This novel approach considerably
information, which improves item detection and
enhances nighttime traffic event identification, hence
placement (Ye et al., 2022).
improving motorway traffic management safety and
Advantage: (1) This approach swiftly identifies car efficiency.
locations at a lower computational cost compared
Disadvantage: However, there are evaluation con-
to other high-speed detectors without necessitating
straints, and the method’s performance may be altered
additional processing. (2) SBM significantly enhances
by changing lighting circumstances.
precision for small object detection, outperforming
YOLOv4 in multi-detection capability. DLT-Net, the suggested technique in this study, is a
Disadvantage: Handling and analyzing large volumes unified neural network built for self-driving cars. Using
of real-time data demand substantial computational common features, it detects drivable zones, lane lines,
resources. and traffic objects all at once. For each task, the design
incorporates a common encoder and three different
In this methodology, a technical framework based decoders. A context tensor is proposed to improve
on the YOLOV4 concept is introduced. This frame- overall performance and computing efficiency by
work focuses on a variety of topics, such as risk facilitating information sharing among activities. DLT-
assessment, object detection, and intent recognition. Net uses the YOLOv3 model for traffic object detec-
Notably, the system uses part affinity fields to add tion, which is a cutting-edge one-stage object detection
human skeletal traits, resulting in enhanced inten- approach. Extensive studies on the BDD dataset show
tion recognition. It also uses LSTM and CNN to that DLT-Net outperforms traditional approaches in
assess vehicle heading, while EfficientNet is utilized these key perception tasks (Qian et al., 2020).
to estimate potentially harmful cars. Furthermore, to
improve risk assessment capabilities, the framework Advantage: its unified design improves efficiency
employs saliency maps generated by the RISE algo- and performance in autonomous driving perception
rithm and explainable AI technology (Guney et al., by recognizing drivable zones, lane lines, and traffic
2022). objects all at the same time.
164 Real-time identification of traffic actors using YOLOv7
Disadvantage: Complex scenarios, such as identifying scenarios. Figure 23.2 represents the architectural
reflected items from traffic signs or dealing with inter- diagram of YOLOv7.
rupted lane lines, may pose difficulties.
Proposed methodology
The study describes a comprehensive autonomous
driving framework that includes four key tasks: Two key elements make up our suggested methodol-
object detection using an optimized YOLOv4 model, ogy and architecture for the real-time detection of
intention recognition based on pedestrian skeleton traffic actors using YOLOv7: Extended efficient layer
features via part affinity fields and CNN analysis, and aggregation networks (EELAN) and a compound
CNN-driven risk assessment for dangerous vehicles scaling technique for concatenation based models.
and traffic light recognition. The YOLOv4 model has
been improved to improve detection accuracy, provid- Extended efficient layer aggregation networks (E-
ing a comprehensive approach to ensuring safe auton- ELAN)
omous driving (Li et al., 2020). Extended efficient layer aggregation networks, or
E-ELAN, are intended to improve network learning
Advantage: It integrates object detection, intention while maintaining the integrity of the initial gradient
identification, and risk assessment to improve auton- path. Expand, shuffle, and merge cardinality tech-
omous driving safety. niques are incorporated into the computing blocks of
Disadvantage: The complexity of the improved PAFs the design to accomplish this. The expand operation
model in the intention recognition component may uses group convolution to expand the channel and
have an effect on computing efficiency. cardinality of the computing blocks. The network is
able to capture a wider variety of features by extend-
ing the channels. Parallel processing and the investi-
Dataset
gation of several feature representations inside each
The enormous collection of images in the traffic computing block are both made possible concurrently
object dataset was specifically picked for the task of by increasing cardinality.
identifying and classifying traffic objects. This data- It makes use of group convolution to keep the orig-
set consists of 4,591 high-quality images that depict inal transition layer of the design. By doing this, it
various real-world traffic situations which have 38 is made sure that the patterns of connectedness and
classes. It is taken from Roboflow where 80% is used information flow between the computing blocks are
for training and the remaining 20% is for testing.
Here, Figure 23.1 represents a sample training image
from the dataset.
Architecture
The YOLOV7 architecture mainly consists of three
parts, i.e., backbone, neck, and head. The backbone
extracts features from the input image, the neck com-
bines features of different resolutions, and the head
generates object detection predictions. This modu-
lar design enables YOLOv7 to efficiently process
input data and accurately detect objects in real-time
Figure 23.1 A sample image from the dataset Figure 23.2 Architecture diagram of YOLOv7
Applied Data Science and Smart Systems 165
maintained. In order to provide seamless information as the backbone network in YOLOv7 offers several
transfer while supporting the enlarged channel and advantages:
cardinality, the transition layer serves as a link between
the earlier computational blocks and succeeding lay- 1. Accuracy: ResNet50 has a strong track record of
ers. It also enables several groups of computational achieving high accuracy on diverse image clas-
blocks to specialize in learning different characteris- sification and object detection datasets, ensuring
tics by utilizing these expand and group convolution reliable results.
procedures. The network can capture and distinguish 2. Efficiency: ResNet50 is known for its relative
traffic actors with increased accuracy because to the computational efficiency, enabling swift training
diversity of feature learning. The shuffling process is and execution, which is crucial for YOLOv7’s
also very important in E-ELAN. According to a pre- real-time object detection design.
determined group parameter, it divides the feature 3. Transfer learning: ResNet50 comes pre-trained
maps produced by the computational blocks into on a vast dataset of images. This pre-training
various groups. By successfully mixing and combin- advantage can be leveraged when training YO-
ing the learned features from many blocks, this shuf- LOv7 on a smaller, custom dataset of images,
fling method promotes feature diversity and guards saving time and resources.
against over-reliance on a single set of computational 4. In summary, ResNet50 is a favorable choice for
blocks. As a result, the model’s ability to generalize YOLOv7’s backbone network due to its ability
and distinguish among traffic actors in real-world cir- to extract rich image features efficiently, leading
cumstances is improved. The E-ELAN process ends to accurate results in object detection tasks.
with the merge cardinality procedure. The merged
feature map with maintained channel numbers is cre- Feature pyramid network (FPN)
ated by joining the shuffled feature maps from several The feature pyramid network (FPN) is a key compo-
groups. nent of the YOLOv7 model. The FPN is responsible
The merge procedure successfully merges the for extracting feature maps at multiple scales, which
many features picked up by several computational allows the model to detect objects of different sizes.
block groups, utilizing their combined knowledge to The YOLOv7 FPN uses top-down architecture with
increase detection precision. EELAN improves the lateral connections. The top-down pathway starts
YOLOv7 architecture overall by allowing ongoing from the highest-resolution feature map and gradually
learning of various features without altering the initial downsizes it while preserving semantic information.
gradient path. Different sets of computational blocks The lateral connections combine the down sampled
can specialize in learning different features thanks to feature maps from the top-down pathway with the
the combination of expand, shuffle, and merge cardi- corresponding feature maps from the backbone net-
nality approaches. work. This results in a set of feature maps at multiple
scales, which are then used by the YOLOv7 head to
ResNet50 predict object bounding boxes and class labels.
ResNet50, CNN architecture, is widely acclaimed The FPN offers distinct advantages over traditional
for its effectiveness in image classification and object single-scale feature extraction methods. Firstly, it
detection tasks. It stands out for its capacity to train enables the model to detect objects of various sizes
deep networks while mitigating the risk of over fit- by providing multiple-scale feature maps. Secondly,
ting. Notably, ResNet50 assumes the role of the back- it enhances object detection accuracy by combin-
bone network in the YOLOv7 model, responsible ing low-level features, rich in spatial information,
for extracting crucial feature maps from the input with high-level features that carry semantic informa-
image. These feature maps serve as the foundation for tion. Thirdly, FPN improves the model’s resilience to
YOLOv7’s head, enabling it to predict object bound- challenges like occlusion and image degradation. In
ing boxes and class labels. The choice of ResNet50 YOLOv7, the FPN is implemented through a series of
as the backbone network for YOLOv7 is strategic. convolutional layers. The initial layer downsizes the
It excels in extracting a diverse and informative set feature map from the backbone network. Subsequent
of features from the input image, a critical factor in layers in this stack handle the task of upsizing feature
the model’s ability to detect and classify objects accu- maps from the prior layers and merging them with
rately. Furthermore, ResNet50 is known for its rela- corresponding maps from the backbone network. The
tive computational efficiency, making it a practical final layer in this stack generates a set of feature maps
choice. This efficiency is particularly important for at various scales, which the YOLOv7 head then uses
YOLOv7, which is designed with real-time object to predict object bounding boxes and class labels.
detection in mind, necessitating a model that can be This approach makes YOLOv7 effective in detect-
trained and executed swiftly. The use of ResNet50 ing objects of different sizes, enhancing accuracy,
166 Real-time identification of traffic actors using YOLOv7
and robustness in the presence of image challenges. RPN classification scores. Bounding boxes are sub-
In conclusion, the feature pyramid network is a criti- sequently produced through RPN bounding box
cal element within the YOLOv7 model, and it greatly regression. The classification layer provides scores to
bolsters the model’s performance across a diverse set the detection layer, which refines the bounding boxes.
of object detection tasks. Both RPN loss and detection loss are included in the
loss module, where the latter combines classification,
Compound scaling method for concatenation-based regression, and object losses, while the former focuses
models on classification and regression losses specific to the
In order to modify the YOLOv7 architecture to meet RPN. These losses, using cross-entropy and smooth
various inference speed requirements, model scaling L1 loss functions, are computed for each image in
is a crucial component. Scaling concatenation-based the batch. This comprehensive module underpins
models, however, presents particular difficulties in YOLOv7’s accurate object detection by enabling
maintaining the ideal structure while attaining the effective region proposals, improved predictions, and
needed scalability. In light of these difficulties, we optimized model training.
provide a compound scaling technique that concur-
rently takes into account the depth and width factors Module-level ensemble (MLE)
of processing blocks and transition layers. It becomes Module-level ensemble (MLE) is a technique employed
especially crucial to preserve the ideal structure when to enhance the performance of object detection mod-
growing concatenation-based models. Performance els by fusing outputs from various modules. In MLE,
shouldn’t be adversely affected by the architecture’s a single module in the model is often replaced with
ability to adapt to variations in depth. In order to multiple parallel modules. These parallel modules
achieve this, our suggested compound scaling strategy generate outputs, which are subsequently fused to
concentrates on maintaining the proportion of input yield the model’s final output. Within the YOLOv7
to output channels while scaling. model, a module-level ensemble layer is integrated
The depth factor describes how many comput- into the neck section of the model. This neck portion
ing units are stacked inside the design. Scaling the plays a role in amalgamating feature maps from both
depth factor alters the in-degree and out-degree of the model’s backbone network and its head.
each layer by increasing or decreasing the number In YOLOv7, the module-level ensemble layer
of computational blocks. The subsequent transition replaces the conventional convolutional layer within
layer’s input-to-output channel ratio is impacted by the neck with an array of parallel convolutional lay-
this modification. To avoid hardware consumption ers. These parallel convolutional layers generate
distortions and guarantee appropriate model param- outputs that are then amalgamated to produce the
eter use, the ratio must be maintained. In addition, final feature maps utilized by the model’s head. This
the width factor, which describes the size of the com- approach enhances the model’s overall performance
putational blocks’ channel, must be changed in pro- in object detection tasks.
portion to variations in depth. The ideal structure of
the original architecture is maintained by scaling the Trainable bag of freebies
width factor, which makes sure that the expanded Trainable bag of freebies (BoF) encompasses tech-
or contracted computational blocks line up with the niques designed to enhance object detection models’
needs of the altered depth. performance without increasing the training cost.
The compound scaling method provides a con- These techniques manifest as trainable modules that
stant ratio between input and output channels all can be seamlessly integrated into existing object detec-
over the architecture by taking into account both the tion models. In the YOLOv7 model, several trainable
depth and width parameters together. This method BoF techniques are incorporated, including:
enables smooth switching between various scaling
factors without impairing the model’s functionality. 1. Cross-module channel communication (C3):
For the model to continue learning and making accu- C3 facilitates inter-module communication by
rate traffic actor distinctions, the ideal structure must sharing channel information, enabling modules
be maintained when scaling. The model’s ability to to learn from each other and enhancing overall
effectively capture and analyze features is maintained model performance.
by the compound scaling strategy, enabling accurate 2. Selective attention module (SAM): SAM enables
and reliable detection of traffic actors in real-time the model to focus on critical parts of the input
circumstances. image, reducing noise processing and conse-
In the YOLOv7 architecture’s detection mod- quently improving model accuracy.
ule, the region proposal network (RPN) generates 3. Efficient channel attention (ECA): ECA em-
anchors based on size and evaluates those using powers the model to discern the significance of
Applied Data Science and Smart Systems 167
In essence, higher average precision (AP) or mean aver- find precision, denoting the proportion of retrieved
age precision (mAP) values indicate superior model instances that are indeed relevant.
performance. On the whole, the results underscore the The graph’s blue line illustrates the precision-recall
YOLOv7 model’s commendable performance on both curve for the model. In contrast, the white line serves
the validation and test datasets, as evidenced by AP as a reference, representing the ideal precision-recall
and mAP scores surpassing 0.5 for all five object cat- curve where precision consistently equals 1. This
egories. Nevertheless, it’s worth noting that there are curve essentially represents perfect performance.
variations in performance across diverse metrics and The [email protected], prominently displayed at the graph’s
object types. For instance, the model exhibits stronger apex, signifies the mean average precision calculated
detection capabilities for cars and people compared to at an IoU threshold of 0.5. It’s a widely used met-
bicycles and motorcycles. ric for assessing the performance of object detection
In Figure 23.4, the x-axis represents recall, which models. A higher [email protected] value is indicative of a
signifies the proportion of all relevant instances suc- more effective model. Examining the precision-recall
cessfully retrieved by the model. On the y-axis, you’ll curve, it becomes evident that the model achieves a
Applied Data Science and Smart Systems 169
high recall while maintaining relatively high preci- Table 23.1 Overview of confusion matrix.
sion. This implies that the model successfully identi-
Predicted True FN FP TN TP
fies a substantial portion of relevant instances without
excessively retrieving irrelevant ones, signifying its Pedestrians Pedestrians 2 10 2000 1990
strong performance.
Vehicles Vehicles 5 5 1995 1990
The [email protected] score of 0.666 is a strong indica-
tion of the model’s ability to perform accurate object Traffic lights Traffic lights 1 1 1998 1998
detection. In Figure 23.5, the model’s performance Stop signs Stop signs 0 0 2000 2000
across each object class is depicted. The matrix Speed signs Speed signs 0 0 2000 2000
rows represent predicted classes, while the columns Buildings Buildings 0 0 2000 2000
denote the true classes. Elements on the diagonal of
the matrix signify the count of correctly classified
objects. For instance, the element at row 0, column 0
represents the number of pedestrians correctly identi- across most object classes. However, it does reveal a
fied as pedestrians. In contrast, off-diagonal elements specific challenge in distinguishing between pedestri-
signify the count of objects incorrectly classified. For ans and vehicles. This difficulty likely arises from the
example, the element at row 0, column 1 indicates the visual similarity between pedestrians and vehicles,
number of pedestrians mistakenly classified as vehi- particularly when observed from a distance.
cles. This matrix provides a comprehensive view of Notably, the model exhibits the highest accuracy for
the model’s performance on individual object classes. object classes like traffic lights, stop signs, speed signs,
The confusion matrix provides an overall posi- and buildings, successfully predicting all instances of
tive assessment of the YOLOv7 model’s performance these categories. In contrast, the model’s accuracy for
170 Real-time identification of traffic actors using YOLOv7
References
Ammar, A., Koubaa, A., Ahmed, M., Saad, A., and Benjdira,
B. (2021). Vehicle detection from aerial images using
deep learning: A comparative study. Electronics, 10(7),
820. https://doi.org/10.3390/electronics10070820.
Bello, I., William, F., Xianzhi, D., Ekin, D. C., Aravind,
S., Tsung-Yi, L., Jonathon, S., and Barret, Z. (2021).
Figure 23.7 (a) & (b) represents the predicted images Revisiting ResNets: Improved training and scaling
generated by the model for the sample input images strategies. Adv. Neural Inform. Proc. Sys. (NeurIPS),
34.
Bochkovskiy, A., Chien-Yao, W., and HongYuan, M. L.
pedestrians and vehicles is comparatively lower. It (2020). YOLOv4: Optimal speed and accuracy of ob-
made incorrect predictions, identifying 10 pedestrians ject detection. arXiv preprint arXiv:2004.10934.
Cao, Y., Thomas, A. G., Jean Yee, H. Y., and Pengyi, Y.
as vehicles and 5 vehicles as pedestrians. These dis-
(2020). Ensemble deep learning in bioinformatics.
crepancies indicate a specific area where the model’s Nat. Mac. Intel., 2(9), 500–508.
performance might benefit from further refinement. Chen, K., Weiyao, L., Jianguo, L., John, S., Ji, W., and Junni,
Bounding boxes are drawn on the input image or Z. (2020). AP loss for accurate one-stage object de-
frame by the algorithm to visually depict the observed tection. IEEE Trans. Pat. Anal. Mac. Intel. (TPAMI),
traffic actors and offer spatial information. These 43(11), 3782–3798.
bounding boxes provide precise information about the Diwan, Tausif, G. Anirudh, and Jitendra V. Tembhurne.
location and size of the discovered items. Figure 23.6 (2023). Object detection using YOLO: Challenges, ar-
illustrates the sample input images provided to the chitectural successors, datasets and applications. mul-
model for prediction. Figure 23.7 shows the sample timedia Tools and Applications. 82(6): 9243-9275.
output images generated by the model based on the He, K., Zhang, X., Ren, S., and Sun, J. (2014). Spatial pyra-
mid pooling in deep convolutional networks for visual
given input images.
recognition. Edited by D. Fleet, T. Pajdla, B. Schiele,
and T. Tuytelaars. (Cham), Lecture Notes in Comput-
Conclusion and future work er Science, 8691. https://doi.org/10.1007/978-3-319-
10590–12.
In conclusion, the YOLOv7 architecture’s integration Hsu, W.-Y. and Lin, W.-Y. (2021). Ratio-and-scale-aware
of the additional modules (CBS, Mosaic, and ACmix) YOLO for pedestrian detection. IEEE Trans. Im-
and the backbone network (ResNet-50) has shown age Proc., 30, 934–947. https://doi.org/10.1109/
promising results in the area of automotive vision. TIP.2020.3039574.
The enhanced model collects contextual informa- Li, Y., Hanxiang, W., Minh Dang, L., Tan, N. N., Dongil, H.,
tion, performs multi task detection and classification, Ahyun, L., Insung, J., and Hyeonjoon, M. (2020). A
and extracts features using cross-modal and deep deep learning-based hybrid framework for object de-
CNN. The object classification, object identification, tection and recognition in autonomous driving. IEEE
and image captioning performance analyses have Acc., 8, 194228–194239. https://doi.org/10.1109/AC-
CESS.2020.3033289.
provided insightful information about the strengths
Lorencık, D. and Zolotova, I. (2018). Object recogni-
and limitations of the model. The performance study tion in traffic monitoring systems. (Kosice, Slova-
revealed competitive item detection accuracy with
Applied Data Science and Smart Systems 171
kia), 277–282. https://doi.org/10.1109/DISA.2018. Yamashita, R., et al. (2018). Convolutional neural net-
8490634. works: An overview and application in radiology.
Mo, Xianglun, Chuanpeng Sun, Chenyu Zhang, Jinpeng Insights Imag., 9, 611–629. https://doi.org/ 10.1007/
Tian, and Zhushuai Shao. (2022). Research on Ex- s13244-018-0639-9.
pressway Traffic Event Detection at Night Based on Ye, T., Xi, Z., Yi, Z., and Jie, L. (2021). Railway traffic ob-
Mask-SpyNet. IEEE Access 10 (2022): 6905369062. ject detection using differential feature fusion convo-
Qian, Y., Dolan, J. M., and Yang, M. (2020). DLT-Net: Joint lution neural network. IEEE Trans. Intel. Transport.
detection of drivable areas, lane lines, and traffic ob- Sys., 22(3), 1375–1387. https://doi.org/10.1109/
jects. IEEE Trans. Intel. Transport. Sys., 21(11), 4670– TITS.2020.2969993.
4679. https://doi.org/10.1109/TITS.2019. 2943777. Ye, T., Zongyang, Z., Shouan, W., Fuqiang, Z., and Xiaozhi,
Reddy, A. Sai Bharadwaj, and D. Sujitha Juliet. (2019). G. (2022). A stable lightweight and adaptive feature
Transfer learning with ResNet-50 for malaria cell- enhanced convolution neural network for efficient
image classification. In 2019 International Conference railway transit object detection. IEEE Trans. Intel.
on Communication and Signal Processing (ICCSP), Transport. Sys., 23(10), 17952–17965. https://doi.
0945–0949. IEEE. org/10.1109/TITS.3156267.
Woo, Sanghyun, Jongchan Park, Joon-Young Lee, and In So Zarei, N., Payman, M., and Mohammadreza, S. (2022).
Kweon. (2018). Cbam: Convolutional block attention Fast-Yolo-Rec: Incorporating Yolo-base detection
module. In Proceedings of the European conference on and recurrent-base prediction networks for fast ve-
computer vision (ECCV), 3–19. hicle detection in consecutive images. IEEE Acc., 10,
Xue, Z., Xu, R., Bai, D., and Lin, H. (2023). YOLO-Tea: 120592–120605. https://doi.org/10.1109/ACC ESS.
A tea disease detection model improved by YO- 2022.3221942.
LOv5. Forests, 14(2), 415. https://doi.org/10.3390/
f14020415.
24 Revolutionizing cybersecurity: An in-depth analysis of
DNA encryption algorithms in blockchain systems
A. U. Nwosu1, S. B. Goyal2,a, Anand Singh Rajawat3, Baharu Bin Kemat4
and Wan Md Afnan Bin Wan Mahmood5
City University, Petaling Jaya, 46100, Malaysia
1,2,4,5
3
School of Computer Science & Engineering, Sandip University, Nashik, Maharastra, India
Abstract
The rapid advancement of technology has increased the need for robust cybersecurity measures to protect sensitive data
and ensure secure transactions in the digital world. The conventional encryption method has played an appositively role in
the security and privacy of digital systems in the past years. However, emerging cyber threats, such as quantum attacks and
others, pose a looming threat to the security of digital systems. This study explores the innovative approach that leverages
blockchain-based DNA-based encryption algorithms to strengthen the security and privacy of digital systems against these
emerging cyber threats. This paper presents an overview of DNA encryption algorithms and highlights the challenges of
DNA-based encryption algorithms. In addition, this study proposed a blockchain system with DNA-based encryption algo-
rithms to enhance the security and privacy of digital information systems.
Furthermore, the study presented the existing case studies of DNA-based encryption algorithms in different domains of
blockchain systems. Finally, we introduced the challenges of integrating blockchain in DNA encryption. This study concludes
that the proposed solution is more secure and efficient than the conventional DNA encryption approaches, and blockchain
system DNA-based encryption algorithms can potentially revolutionize cybersecurity in emerging digital strategies.
[email protected]
a
Applied Data Science and Smart Systems 173
e) The comparative analysis shows that the pro- tion in living organisms. Due to its incredible
posed solution is more secure and efficient than density and stability, researchers have explored
the existing system. its potential as a data storage medium. Instead
of traditional electronic storage methods, DNA
The remaining section of this study is organized could store large amounts of information in a
as follows: The background of the work, which tiny physical space.
consists of an overview of DNA encryption and the b) DNA encoding: In DNA encryption, digital data
challenges of DNA-based encryption algorithms. (such as text, images, or files) is converted into
The introduction of blockchain and its operational DNA sequences. This encoding process involves
bases. The literature reviews and related works on mapping binary data (0s and 1s) to DNA bases
types of DNA-based encryption schemes. In addi- (adenine, cytosine, guanine, and thymine). Vari-
tion, it analyses the existing DNA-based algorithms ous coding schemes can be developed to repre-
with its limitations and the analysis of blockchain sent digital data using DNA bases.
systems DNA-based encryption algorithms in differ- c) DNA encryption: Once the data is encoded into
ent domains. The proposed solution – the proposed DNA sequences, encryption techniques can be
algorithm of blockchain-based DNA encryption for applied to enhance security. Traditional crypto-
improved security of digital systems. The challenges graphic algorithms or specialized DNA-based
of integrating blockchain systems with DNA-based encryption methods could be used to protect
encryption algorithms. The case studies of existing the encoded information. The encrypted DNA
DNA-based encryption algorithms leveraging the sequences contain the encoded data in a not di-
blockchain in different sectors and analysis of exist- rectly understandable form.
ing and DNA-based encryption algorithms. Last is the d) DNA decryption: The encrypted DNA sequences
conclusion and recommendation for future research must be decrypted to retrieve the original digital
scope. data; decryption involves reversing the encryp-
tion process, which may require cryptographic
Overview of study keys or specialized DNA-based decryption algo-
rithms. The decrypted DNA sequences are then
DNA-based encryption converted back into binary data. Figure 24.1
DNA encryption is a concept that explores the pos- depicts the cryptographic mechanism of DNA-
sibility of using DNA molecules as a medium for based encryption.
storing and securing digital information (Roy et al.,
2020). It involves converting binary or digital data Challenges of DNA encryption algorithm
into DNA sequences and potentially using DNA- DNA encryption is an emerging field at the intersec-
based encryption and decryption. Here is an overview tion of biotechnology and information security. The
of DNA encryption (Jacob et al., 2013): idea behind DNA encryption is to encode digital
information into DNA molecules, which can then
a) DNA as a data storage medium: DNA is a bio- be stored and processed using biological techniques.
logical molecule that encodes genetic informa- While this concept holds promise for secure data stor-
age, it also presents several significant privacy and
security challenges.
Data integrity: DNA can degrade over time, and envi- The basis of blockchain technology operations is
ronmental factors can impact the stability of DNA- discussed (Swan, 2015; Christidis, 2016).
encoded data. Ensuring the long-term integrity of the
data is a challenge. Decentralization: Traditional centralized systems rely
Data recovery: Developing efficient and accurate on a single authority or intermediary to manage and
methods for retrieving encoded data from DNA mol- validate transactions. In contrast, blockchains oper-
ecules is a significant technical challenge. Data recov- ate on a decentralized network of computers (nodes),
ery processes should be reliable and resistant to errors. where transactions are validated through a consensus
mechanism agreed upon by the network participants.
Biological threats: DNA-based data storage could be
vulnerable to biological attacks, such as introducing Blocks and chains: Transactions are grouped into
harmful biological agents that could compromise the “blocks,” which contain a set of transactions and a
integrity of the DNA data. unique identifier (hash) of the previous block. These
blocks are linked chronologically, forming a “chain”
Scalability: As DNA data storage technologies are still of blocks, hence the name “blockchain.”
in the early stages of development, scalability remains
a concern. Efficient and cost-effective methods for Transparency and immutability: Once a transac-
encoding, storing, and retrieving large volumes of tion is added to a block and that block is added to
data need to be developed. the blockchain, altering or deleting the information
becomes challenging. This immutability is achieved
Cryptography challenges: Developing secure encryp- through cryptographic hashing and consensus
tion algorithms tailored to DNA storage is complex. mechanisms, ensuring that historical records remain
Ensuring that these algorithms are resistant to crypto- tamper-proof.
graphic attacks is essential.
Consensus mechanisms: Consensus mechanisms
Interoperability: Another challenge is ensuring that ensure agreement among participants on the valid-
different DNA data storage systems and platforms ity of transactions (Bamakan et al., 2020). The most
can communicate and exchange data securely. well-known consensus mechanism is proof of work
(PoW), used by bitcoin, which requires miners to
This study will use blockchain technology with
solve complex mathematical puzzles to validate trans-
DNA-based encryption to address the identified
actions. Other mechanisms like proof of stake (PoS),
challenges.
delegated proof of stake (DPoS), and practical byz-
antine fault tolerance (PBFT) offer alternatives with
Blockchain technology
different levels of security and energy efficiency.
Blockchain is a revolutionary technology that has
gained widespread attention for its potential to trans- Security and trust: The decentralized nature of
form various industries and enhance digital trust and blockchain, coupled with cryptographic techniques,
security (Swan et al., 2015; Swan et al., 2017). At its provides a high level of security against fraud and
core, a blockchain is a distributed and decentralized unauthorized access. Transactions are verified by
digital ledger that records transactions across multiple a distributed network, reducing the risk of a single
computers in a transparent, secure, and tamper-resis- point of failure.
tant manner. Figure 24.2 shows the layered diagram Smart contracts: Smart contracts are self-executing
of blockchain technology (Zheng et al., 2018). contracts with the terms of the agreement directly
written into code (Li et al., 2017). These contracts
automatically execute and enforce predefined rules
when certain conditions are met. Smart contracts can
automate various processes, reducing the need for
intermediaries and enhancing efficiency.
Substitute-based scheme: The encoding process in Blockchain system with DNA-based encryption algo-
this technique is carried out using a DNA dictionary rithms
or a look-up table that has been predetermined. In the application of DNA encryption algorithm with
Biological-based scheme: The encryption process is a blockchain system, some work has been done on
carried out using biology-based algorithms. They are this domain on different domains. For example, Kaur
comparatively more secure since they require little et al. (2023) proposed a blockchain-based system
human involvement. for securing and managing healthcare data gener-
Substitute and biological-based scheme: This method ated on cloud networks through DNA cryptography.
performs the encryption using mathematical and bio- Ramaiah et al. (2021) and Arya et al. (2021) designed
logical procedures. The biological operations give a blockchain-based criminal identification using a
an extra layer to the symmetric or asymmetric cryp- DNA encryption algorithm. Table 24.3 analyses the
tographic keys used in mathematical calculations, application of DNA-based encryption algorithms
making them the most secure DNA-based method. with blockchain systems in different domains.
Table 24.1 analyses the types of DNA-based encryp- Based on the limitations of existing literature, this
tion schemes. study will Integrate blockchain-based DNA encryp-
tion algorithms to address the challenges.
Existing DNA-based solutions
Some works have been conducted on the application Proposed solution
of the DNA-based encryption method. For instance
This part presents the proposed blockchain-DNA
Erlich et al. (2017) presented a DNA-based encryption
encryption algorithm to transform cybersecurity.
known as a fountain. This project optimizes digital
data encoding into DNA sequences to enhance data
recovery. It explores efficient DNA-based data storage
techniques, indirectly contributing to encryption and Table 24.2 Analysis of DNA-based encryption solutions
data security. Nandy and Banerjee (2021) presented
a DNA-based image encryption algorithm. The algo- Authors Domain Limitations
rithm aimed to encode images into DNA sequences
Erlich et al., 2017 DNA fountain High latency
and then transmit them securely using DNA’s proper-
ties and proposed a DNA-based data storage system. Nandy et al., DNA-based Lack of
2021 image encryption transparency
This project aimed to store digital data in DNA mol- algorithm
ecules and demonstrated long-term and high-density for secure
data storage potential. Namasudra et al. (2020) pre- transmission
sented a DNA solution. It focused on the encryption Tomek et al., DNA-based data Inadequate
2021 storage security measure
Namasudra et al., DNA-based Long data
Table 24.1 Analysis of different types of DNA-based 2020 encryption in the retrieval time
schemes. cloud computing
environment
Authors Types of DNA- Limitations
based schemes
Jain et al., Substitution- They are highly Table 24.3 Analysis of blockchain system-based on DNA
2014; Hameed based scheme vulnerable to encryption algorithm.
et al., 2018 statistical attacks
Ning, et al., Biological-based It involves higher Authors Domain Limitations
2009; Dhawan scheme computation and is
et al., 2012 time-consuming Kaur et al., 2023 Healthcare Low throughput
Singh et Biological and It involves complex Ramaiah et al., Lack privacy
al., 2017; substitute-based and rigorous 2021
Sukumar et scheme mathematical
al., 2018; calculations Alshamrani et al., IoT Higher latency
Pujari et al., 2021
2018 Liang et al., 2023 Inadequate security
176 Revolutionizing cybersecurity: An in-depth analysis of DNA encryption algorithms
Table 24.4 Case Studies on the integration of blockchain system with DNA based encryption algorithm.
Chernomoretz et al., DNA-based forensic and legal Blockchain was used to store DNA evidence, maintaining
2020 applications using blockchain its integrity and provenance securely. DNA encryption
further protects sensitive genetic information, ensuring only
authorized parties can access the evidence
Kaur et al., 2023 DNA-based secured management Healthcare providers deployed blockchain with DNA
of PHR using blockchain encryption to securely store and share personal health
records. DNA data were encrypted and stored on the
blockchain, ensuring the confidentiality and integrity of
sensitive health information
Ramaiah et al., 2021 DNA-based identity verification DNA samples were used for identity verification on a
using blockchain blockchain. Individuals authenticate themselves by providing
a DNA sample, which is then encrypted and stored on the
blockchain, enhancing security for digital identities
Chernomoretz et al., DNA-based genomic data The blockchain’s decentralized and immutable nature enables
2020 privacy and ownership using individuals to retain ownership and control over their
blockchain genomic data. The encrypted DNA sequences were stored on
the blockchain, and individuals could grant specific access
permissions to researchers, doctors, or institutions. Smart
contracts facilitated data sharing while ensuring privacy and
allowing data owners to revoke access anytime
Liang et al., 2023 DNA-based pharmaceutical Blockchain establishes an auditable and tamper-proof record
research and intellectual property of research milestones: the DNA sequences and intellectual
using blockchain property. The DNA encryption algorithms safeguard
proprietary genetic information while allowing secure
collaboration between different parties. Smart contracts
automate royalty distribution and licensing agreements,
reducing disputes and enhancing stakeholder trust.
178 Revolutionizing cybersecurity: An in-depth analysis of DNA encryption algorithms