Emerging Trends in Computer Science and Its Application
Emerging Trends in Computer Science and Its Application
Edited by
Anurag Tiwari
Manuj Darbari
© 2024 selection and editorial matter, Anurag Tiwari and Manuj Darbari; individual chapters, the
contributors
The right of Anurag Tiwari and Manuj Darbari to be identified as the authors of the editorial
material, and of the authors for their individual chapters, has been asserted in accordance with
sections 77 and 78 of the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form
or by any electronic, mechanical, or other means, now known or hereafter invented, including
photocopying and recording, or in any information storage or retrieval system, without permission in
writing from the publishers.
For permission to photocopy or use material electronically from this work, access
www.copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive,
Danvers, MA 01923, 978-750-8400. For works that are not available on CCC please contact
[email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
DOI: 10.1201/9781003606635
Chapter 4 Revolutionizing object recognition beyond CNN and YOLO with deep learning
breakthrough31
G. S. S. S. S. V. Krishna Mohan, Mahammad Firose Shaik, G. Usandra Babu,
R. G. V Prasanna, Pinagadi Venkateswara Rao, and Inakoti Ramesh Raja
Chapter 5 Investigating efficacy of emerging ICTs for the Indian construction sector 40
Sanjay Pandey and G. T. Thampi
Chapter 9 Comparative analysis of wireless routing protocols for security threat—A review 74
Bhupal Arya, Amrita Kumari, and Jogender Kumar
Chapter 11 Wireless network with machine learning and deep learning techniques 88
Bhupal Arya, Amrita Kumari, and Jogendra Kumar
Chapter 17 A comprehensive exploration of aircraft detection in synthetic and satellite images 135
M. Madhu Bala, G. Ramesh Chandra, G. Pavan Teja, M. Sai Sudha, Sk. Sabeeha Kouser,
and M. Ajay Kumar
Chapter 19 A comprehensive multi-modal sentiment analysis approach for social media content
integration153
Sheela S., Suresh Balakrishnan T., Uttham Sing K., Sujitha E., Soundarrajan R., and Veena M.
Chapter 22 Securing the secrets of 5G: Mitigating eavesdropping threats and enhancing network
integrity175
Mamidisetti Sai
Chapter 24 Malaria detection using convolutional neural networks: A deep learning approach 192
Navin Kumar Agrawal
Contents vii
Chapter 25 An optimal emergency vehicle path finding mechanism using routing algorithms 197
Hina Naaz, Roshan Jahan, and Faiyaz Ahamad
Chapter 26 Smart city solutions: Enhancing infrastructure with LoRa multi-hop networks 203
Faraz Ahmad, Saleha Mariyam, and Faiyaz Ahamad
Chapter 31 A review on deep learning frameworks for pose estimation during exercise for
rehabilitation240
Banupriya N., Haris Dominic Savier, Jeeva V., and Uma R.
Chapter 37 Guarding your home: A seamless Iot-driven security system with high security 285
Murala Divyasree, Alapati Naresh, Tammisetty Jyothi, Perumalla Sahithi, and Vinukonda
Ankitha
Chapter 39 A exhaustive review on advancements and challenges in low power wireless sensor
networks297
Manuj Darbari, Naresh Chandrab, Diwakar Yagyasenc,
Anurag Tiwarid, and Sandeep Kumar Mishrae
Chapter 41 Redefining human activity recognition with LSTM and GRU networks 308
Vasumathi Devi M., Sai Sreeja S., Anusha P., Mounika Bindu B., and Sirisha M.
Chapter 42 Cybersaferoutes: Protecting IoT networks from hybrid attack with security
measures315
Ganga Bhavani P, Lakshmi Tirapathamma S, Reshma SK, Swetha B, and Himaja N
Chapter 43 Harmful content classification in social media using gated recurrent units and
bidirectional encoder representations from transformer 321
Sujatha V., Tejaswi Y., Pravalika V., Pavani P., and Ch Sravani
Chapter 46 Detection of melanoma using DenseNet-based adaptive weighted loss function 341
Rishi Agrawal
Chapter 47 Advanced reconfigured solar arrays to attenuate shading loss under partial shading
conditions: experimental validation 346
Vijay Laxmi Mishra, Yogesh K. Chauhan, and Kripa S. Verma
Chapter 48 Understanding the relationship of quantum mechanics and machine learning 352
Sushamana Sharma
Chapter 53 Potato leaf disease classification and prediction using CNN 386
UdayPratap Singh, Sandeep Kumar Mishra, ShubhamVishwakarma, Suraj Kumar,
and Vinayak Pandey
Chapter 57 An efficient CNN-based approach for automated animal intrusion detection 412
Ramamani Tripathy, S V Achuta Rao, Maheswari. P, Mallikharjuna Rao K,
B. Santhosh Kumar, and Balajee Maram
Chapter 58 Next-generation smart cities: Integrating blockchain, IoT, deep learning, and
Dingo optimization 419
K. Sankar, Ramamani Tripathy, S. Nandhini, Aleem Ali, B. Santhosh Kumar,
and Balajee Maram
Chapter 60 Digital dwelling hub: Revolutionizing real estate with AR and smart home
integration431
Tanya Omar, Rajeev Srivastava, Tanya Singh, Vaibhav Srivastava, Suraj Chhetri, and
Shaurya Kumar
Chapter 61 Mobilenet-v3: A comprehensive survey of object detection algorithms using CNN 438
Rasheeq Zehra, Omkar Sharma, Vinayak, and Rudrendra Bahadur Singh
Chapter 63 Advancements in assistive technologies for web accessibility: A systematic review 451
Ayushi, Padmini Mishra, Anusha Ansari, and Drishti Maurya
Chapter 64 Predicting bitcoin prices: A machine learning approach for accurate forecasting 457
Rishabh Jain, Shekhar Srivastava, and Prakhar Shukla
x Contents
Chapter 65 A comprehensive review on multi disease prediction web app: QuadraDiag 464
Khushi Saxenaa, Keerti Saxenab, Vishesh Guptac, Swatid, and Kamlesh Kumare
Chapter 68 CollegeGo: leveraging alumni data for improved college placements 487
Avneesh Agrahari, Subha Mishra, Rudrendra Bahadur Singh, Kumar Ronit,
and Pahun Ratna
Chapter 70 Data analysis for revenue optimization in the hospitality sector 499
Pankaj Kunekar, Parul Patle, and Anagha Gajaralwar
Chapter 74 Fake social media profile detection using machine learning 527
Anurag Shukla, Shreya Chaurasia, Tanushri Asthana, Tej Narayan Prajapati, and
Vivek Kushwaha
Chapter 75 Prompted LLMs as chatbot modules for long open-domain conversation 534
Yash Kumar Singh, Deepak Pant, Syed Mohd Askari, and Shivam Kumar Pandey
Chapter 78 Optimizing patient outcomes through integrated health analysis and management
strategies 554
Anurag Shukla, Sambhav Pathak, Rahul, Rishikant Yadav, and Raj Gupta
Chapter 83 Agriculture: Soil analysis for suitable crop and fertilizer prediction 589
Shreya Singh, Saurabh Kumar Jain, and Stuti Rastogi
Chapter 87 Enhancing electoral processes: The role of “Smart Voting Systems” 616
Madhulika Sharma, Anuj Singh, and Gulshan Varshney
Chapter 92 Securing MANETs against black hole attacks: A novel approach using secure
knowledge algorithm 648
Mohammed Abdul Bari, Arshad Ahmad Khan Mohammad, Arif Mohammad, and Abdul
xii Contents
Chapter 95 Olympic odyssey: Tracing 120 years of athletes sports, and global influence 673
Shreya Verma, Shreya Mishra, Prakriti Singh, Sneha Seth, and Sanjay Kumar Gupta
Chapter 101 Enhancing fault tolerance in distributed systems through machine learning
techniques711
Mohd Haroon, Manish Madhav Tripathi, Jameel Ahmad, Shish Ahmad, and Mohd Husain
Chapter 102 Predicting breast cancer risk: A machine learning approach 717
Navin kumar Agrawal
Chapter 103 A multi-objective optimization algorithm for fog computing with trust and energy
awareness 723
Ruchi Agarwal, Saurabh Singhal, and Ashish Sharma
Chapter 104 Pediatric brain tumor detection in MRI: A machine learning perspective 729
Sandeep Kumar Mishra and Sheeba Praveen
Chapter 105 Enhancing trust in the social internet of things (SIoT): A comprehensive review 736
Gyanendra Kumar and Anuradha Misra
Contents xiii
Chapter 106 Fostering plant health: Utilizing YOLOv7 framework to identify leaf diseases 743
Rajya Lakshmi R, Sasikala V, Divya Likhitha D, Rishita Reddy Ch, and VenkataSai Vidyasri
Abhishainy A
Chapter 107 A review on-malignancy detection in lung nodules using CNN 751
Krish Yadav, Vinayak, Pratibha Yadav, Lakshmi Pandey, Himanshu Sharma, and Smita Yadav
Chapter 112 Ideas to boost fitness activities and assist in keeping fit 777
Neha Chauhan, Vasu Gupta, Harshita Bajpai, and Kim Gupta
Chapter 113 Using existing CCTV network for crowd management, crime prevention and work
monitoring: A novel approach for object detection 783
Manvi Agrawal
List of figures
Figure 1.1 Automatic control flow of aeration tank DO content by the improved IPI control
algorithm6
Figure 1.2 shows the process scheme of the WWTP to which MPC is applied 7
Figure 1.3 Workflow of the proposed deep learning-driven forecasting procedure 9
Figure 1.4 Benchmark Simulation Model 1(BSM 1) 10
Figure 2.1 Green IT components 15
Figure 2.2 Greener cloud placement in cloud computing technology 15
Figure 2.3 Green cloud service model of software as a service 19
Figure 4.1 YOLO architecture 34
Figure 4.2 Feature extracting process by RCNN methodology 35
Figure 4.3 Block diagram for text to speech conversion 36
Figure 4.4 Detection of object by camera module 37
Figure 4.5 List of detected objects 38
Figure 5.1 Types of construction companies contributed to the study 43
Figure 5.2 Cadre-based classification of respondents 43
Figure 5.3 Harnessing ICTs for construction industry tasks 45
Figure 5.4 Perceived benefits of using ICTs for construction companies 46
Figure 5.5 Hindering factors for ICT adaptation in the Indian construction sector 47
Figure 5.6 Overall performance of construction companies after ICT adaptation 48
Figure 6.1 Soil testing lab locations 52
Figure 6.2 Heatmap for crop recommendation 52
Figure 6.3 Crop recommendation 52
Figure 6.4 Plant disease prediction 52
Figure 6.5 Blockchain-based marketplace 52
Figure 6.6 Crop price prediction 53
Figure 6.7 Real-time weather monitoring 53
Figure 6.8 Gamified plant growth 54
Figure 6.9 Confusion matrix 54
Figure 6.10 Accuracy chart 54
Figure 6.11 Crop recommendation flow diagram 54
Figure 6.12 Visualizing plant growth using image processing 55
Figure 7.1 Subject distribution according to the ages 60
Figure 7.2 Subject distribution according to the gender 60
Figure 7.3 Subject distribution according to education qualification 60
Figure 7.4 Feedback– Distribution of Agreement and disagreement on above issues 62
Figure 8.1 Comparison of proposed method with existing with respect to PDR 71
Figure 8.2 Comparison of proposed method with existing with respect to delay 72
Figure 8.3 Comparison of proposed method with existing with respect to overhead 72
Figure 9.1 76
Figure 10.1 Communication between the ToRs using LoS and NLoS links 82
Figure 10.2 LoS communication between the cascaded racks (BUS topology) 82
Figure 10.3 LoS communication between the racks (16 Racks topology) 83
Figure 10.4 LoS communication between the racks is 3 meters (a) FOV=70° (b) FOV=10° 84
List of figures xv
Figure 10.5 LoS communication between the racks is 3√2 meters (a) FOV=70° (b) FOV=10° 84
Figure 10.6 LoS communication between the racks is 6 meters (a) FOV=70° (b) FOV=10° 85
Figure 10.7 LoS communication between the racks is 6√2 meters (a) FOV=70° (b) FOV=10° 85
Figure 10.8 LoS communication between the racks is 9 meters (a) FOV=70° (b) FOV=10° 85
Figure 10.9 LoS communication between the racks is 9√2 meters (a) FOV=70° (b) FOV=10° 86
Figure 10.10 Probability of Error for various distances between the racks 86
Figure 11.1 Deep learning in wireless network 90
Figure 11.2 ML using ANN and DNN 91
Figure 11.3 91
Figure 11.4 93
Figure 11.5 94
Figure 11.6 96
Figure 11.7 97
Figure 12.1 Conceptual framework. 102
Figure 12.2 Methodology schema 104
Figure 12.3 Types of admission. 105
Figure 12.4 City Code Patient Count 105
Figure 13.1 Block diagram 110
Figure 15.1 Comparison of proposed method with existing with respect to PDR 126
Figure 15.2 Comparison of proposed method with existing with respect to Delay 126
Figure 15.3 Comparison of proposed method with existing with respect to Overhead 126
Figure 15.4 Comparison of proposed method with existing with respect to Throughput 127
Figure 17.1 A Sample DOTA image of airplane category with OBB representation
(a) v1.0 (b) v1.5 and (c) v2.0waveform of BLDC motor 136
Figure 17.2 A Sample synthetic Image 137
Figure 17.3 Aircraft detection framework using YOLO 137
Figure 17.4 Architecture of Detectron2 137
Figure 17.5 FR-CNN architecture in aircraft detection 138
Figure 18.1 Comparison of proposed method with existing with respect to PDR 150
Figure 18.2 Comparison of proposed method with existing with respect to Delay 150
Figure 18.3 Comparison of proposed method with existing with respect to Overhead 151
Figure 19.1 Text data based sentiment analysis 155
Figure 19.2 Image-based sentiment analysis 155
Figure 19.3 Live video-based sentiment analysis 156
Figure 19.4 Audio-based sentiment analysis 156
Figure 19.5 Emotion detected using text 157
Figure 19.6 Emotion detected using Image 157
Figure 19.7 Emotion detected using Image 157
Figure 19.8 Emotion detected using Audio 157
Figure 20.1 The proposed model diagram 161
Figure 20.2 Comparison with existing frameworks 163
Figure 21.1 A Differential Value of VANET nodes 171
Figure 21.2 Decision of node movements 171
Figure 21.3 Simple AODV setup 172
Figure 21.4 Basic AODV 25 nodes 172
Figure 21.5 Starting simulation of basic AODV 25 nodes 172
Figure 21.6 AODV 20 nodes 172
Figure 21.7 Starting simulation of AODV 20 nodes 173
Figure 21.8 AODV 25 nodes 173
Figure 21.9 Starting simulation of AODV 25 nodes 173
Figure 21.10 AODV 30 nodes 173
xvi List of figures
Table 1.1 Comparison of different optimal control strategies of the mean EQ and EC in storm
weather condition 4
Table 1.2 Statistical results of the proposed model’s performance evaluation (R2 and MSE) for
different stages of modeling (training, validation, testing and all data sets) 5
Table 1.3 The results of three different models 7
Table 1.4 Model Performance on the training, validation and test sets (R2 values) 7
Table 2.1 State-of-the-art of green cloud 18
Table 2.2 Green cloud SAAS performance metric 21
Table 5.1 Respondent’s opinion ranking of construction tasks performed by ICTs 45
Table 5.2 Ranking of the benefits as per respondent’s opinion 46
Table 5.3 Ranking of hindering factors for ICT adaptation 47
Table 6.1 Algorithm and accuracy 56
Table 6.2 Comparison with previous work 56
Table 7.1 Participants distribution on the basis of Age 61
Table 7.2 Participants distribution on the basis of Gender 61
Table 7.3 Participant’s distribution based on their educational background 62
Table 7.4 Responses in favor of online mode of learning 62
Table 8.1 Simulation Parameters 71
Table 10.1 Simulation parameters 83
Table 12.1 Mechanisms of NPT of mHealth in medicine 103
Table 12.2 Research questions and methodology 103
Table 15.1 Simulation requirements 125
Table 17.1 Results of algorithms used 140
Table 20.1 Execution evaluation of the proposed plan of action 162
Table 20.2 Execution comparison 162
Table 21.1 VANET Comparative Tables 172
Table 26.1 Technical layers in an urban infrastructure 204
Table 27.1 Experts’ contributions in web mining 212
Table 28.1 Comparative analysis of cryptographic approaches in cloud security 223
Table 30.1 Various solutions of honeypot 237
Table 31.1 Evaluation of results according to the datasets. 244
Table 41.1 Comparison with other methods 312
Table 46.1 Comparison with other state-of-the-art methods 344
Table 47.1 Quantitative Simulation Results 349
Table 49.1 Students’ employability features 361
Table 49.2 Performance Metrics for ML Algorithms 363
Table 51.1 Dataset popularly used 375
Table 53.1 Number of images with diseases 387
Table 53.2 Model performance comparison 389
Table 56.1 Comparing cryptographic image concealment with neural networks to traditional
steganographic techniques 410
Table 56.2 Comparison of PSNR, SSI, and BER 410
Table 57.1 Results comparison 416
List of tables xxiii
Abstract: A wastewater treatment plant (WWTP), also referred to as a sewage treatment plant or a water
reclamation facility, is a facility designed to treat wastewater and sewage from residential, commercial, and
industrial sources. Wastewater treatment (WWT) facilities are essential for maintaining the well-being of our
communities by safeguarding water supplies, maintaining public health, and minimizing environmental pol-
lution. The specific design and processes employed by a WWTP can change based on variables like the size of
the facility, the characteristics of the wastewater, and the required effluent quality standards. This paper pre-
sents the comprehensive technological review of PID, FLC, PLC, and MPC controllers for an industrial WWT
plant with advantages and disadvantages of the same and results are shown. In addition, this overview includes
Artificial intelligence is revolutionizing the field of water treatment by enhancing model prediction and control
strategies.
Keywords: Deep learning model (DNN), fuzzy logic controller (FLC), machine learning (ML), model predic-
tive controller (MPC), programmable logic controller (PLC), proportional integral derivative controllers (PID),
wastewater treatment plants (WWTPs)
DOI: 10.1201/9781003606635-1
2 Innovations in Computational Intelligence: Trends and Technologies
extensively employed for complicated process lot of data and some serious pre-processing
for treating wastewater (Subari et al., 2022) to work well. It’s crucial to remember that
because to the occurrence of nonlinearities AI can’t replace mechanical models. There-
and turbulences, as well the contemplation fore, the goal of Using Machine Learning for
of particular optimization targets for unfa- Wastewater Treatment is to make better deci-
miliar systems. The reality is that there is a sions depending on projected performance
dearth of AI-based optimization approaches for existing facilities (Sundui et al., 2021;
that work well in a complex, uncertain, and Nourani et al., 2021).
nonlinear setting. Therefore, figuring out how Because of their superior feature extrac-
to acquire intelligent optimum controllers for tion, self-learning, and generalization abilities,
complicated nonlinear systems have been deep learning algorithms have found various
seen as a crucial step in the development of fantastic Implementations in recent years
the area of advanced control. across a wide range of areas. In DL, RNNs
The utilization of single-objective opti- with recurrent links and hidden layers are
mization approaches has generally applied recommended for analyzing difficulties with
in the field of wastewater management of a a historical context, while LSTM is intended
considerable duration, with the aim of opti- to improve the system’s ability to deal with
mizing the effectiveness of the WWT process. dependencies over the long run. However, the
It’s tough to pin down the precise weighting duration of time for training is a major factor
elements, however. As a result, several dif- in DL. Recent advances in genetic based con-
ferent kinds of multi-objective optimization trol algorithms for biological WWT facilities
algorithms, such MOPSO and MODE (Han have allowed for significant improvements
et al., 2022) have been created. Traditional in effluent quality and reductions in operat-
multi-objective optimization algorithms ing costs. This type of controller is primarily
offer numerous benefits in WWT methods, intended to enhance the WWTP’s efficiency
but they also have drawbacks, such as weak by adjusting the set points of the lower-level
global search ability and high levels of unpre- Supervisors, such as PID controllers, in addi-
dictability in the ideal position section. tion to offers insights into the use of genetic
Intelligent technologies based on machine algorithms in the development of advanced
learning (ML) are now being used in the water control systems for sewage treatment facili-
industry to solve pressing problems worldwide. ties. It’s also possible to cut down on process-
Model capabilities for the dynamic aspects of a ing time by employing PSO, DE, or ACO in
WWTP operation have also been improved via the right situation.
the use of a hybrid method that blends several
ML techniques. It has been shown that artifi-
cial neural networks (ANNs) can learn and 2. Literature Review
construct mathematical models of extremely To conserve energy and cut down on emis-
non-linear interactions, making them useful as sions, researchers (Li et al., 2021) proposed
predicting tools in a variety of contexts. the development of an innovative CLSTMA
Artificial Neural Network Ant Lion for observing effluent nature within wide-
Optimization (ANN-ALO), (PSO-ANN) ranging paper industry treatment facility
(Mahadeva et al., 2022) is proposed to using continuous convolution neural network
enhance the effectiveness of conventional (CNN), long short-term memory (LSTM),
multi-objective optimization techniques on a and attention mechanism (AM). For each
global scale and prevent the algorithm from of the study’s output variables, the authors
settling to the point of reaching a regional employed standard performance measure-
maximum. However, AI models do need a ments such as Pearson correlation coefficient
A systematic review on recent controllers for an industrial wastewater treatment plant 3
(R), the Root Mean Squared Error (RMSE), effectiveness and durability of WWT pro-
and the Mean Absolute Error (MAE). The cesses. They also emphasize the need for fur-
findings demonstrated that the hybrid deep ther research and development in this field to
learning model achieved the highest levels of overcome the existing challenges and realize
accuracy, precision, and recall compared to the full potential of control Techniques for the
the other models. The authors argue that their treatment of sewage.
model may be used to lessen the ecological The degradation of proteins and amino
toll of paper manufacturing by increasing the acids in organic waste is the principal source
efficacy of WWT systems in the paper sector. of ammonia in wastewater, Subari et al. (2022)
The RME of the CLSTMA model for the set out to compile a comprehensive overview
effluent Chemical Oxygen Demand (CODeff) of the utilization of biological treatment
was lowered by 23.3–31.55%, the MAE was techniques has emerged as a viable alterna-
condensed by 38.89–74.50%, and the R of tive strategy for the removal of ammonia in
the CLSTMA model was enhanced by 8.29– water and sewage purification facilities. This
11.86% when compared to different mod- article discusses the present worldwide pollu-
els (CNN, LSTM, and CLSTM models). The tion condition of ammonia, the sources about
RMSE of the CLSTMA model decreased by ammonia impurity, and the usual restrictions
10.26% and 9.92% for the effluent suspended on regulation of ammonia concentration pos-
solids (SSeff), the MAE decreased by 5.37% sible dangers, recorded instances, and more.
and 3.44%, and the R of the CLSTMA model In addition, AI is being used into water
rose by 15.13% and 37.21%. Results from purification model prediction and control
computer simulations show that the suggested systems. The ANN is a talented computer
CLSTMA model might be very useful for keep- mechanism that can improve both the WTP
ing an eye on the WWT system in the paper sec- and WWTP in general. Due to the nonlinear-
tor so that cleaner products can be made. ity of their dynamic behavior, variability in
PID control, as well as more modern meth- parameter values over time, constraints on
ods like MPS, FLC and neural network con- manipulated variables, interdependencies
trol, are all discussed in detail by (Iratni et between manipulated and controlled vari-
al., 2019). The authors also explore how to ables, presence of unaccounted Interruptions,
effectively regulate the WWT process by inte- delays in input and measurement processes,
grating control technology with optimization and other factors, a standalone conventional
methods and real-time monitoring systems. PID controller is inadequate for effectively
The complexity and variety of wastewater tuning parameters or achieving optimal
composition, the absence of dependable sen- control outcomes in a WTP or WWTP. It is
sors, and the high cost of installing advanced necessary to know the mathematical connec-
control technologies are all highlighted in this tion between the system’s input and output
article as problems that control systems must in order to design an appropriate controller
overcome in WWT operations. Non-linear and also compares the outcomes of several
controllers like the NMPC controller and the specific analysis involving the optimization
neural-fuzzy controller can be viable alterna- of PID controllers. Hybridization with other
tives, but they demand a high level of knowl- tuning methods, like Ziegler–Nichols (ZN) or
edge due to the complexity of their algorithms, Cohen-Coon (CC), a Fuzzy control system, or
which can lead to increased computing needs. a metaheuristic approach, like Particle Swarm
In conclusion, the authors suggest that the inte- Optimization (PSO), Gravitational Search
gration of control technologies with advanced Algorithm (GSA), or Grey Wolf Optimization
monitoring and optimization techniques can (GWO), can greatly increase the effectiveness
also lead to significant improvements in the of a PID controller.
4 Innovations in Computational Intelligence: Trends and Technologies
Using a WWT process as an example, Han compares appropriate control options for use
et al. (2022) describe the results of a research during storms. MIOC’s optimization perfor-
into the development of a multi-objective mance may be confirmed by its best-in-class
integrated optimum control method. The mean EQ (7167) and its lowest-in-class mean
authors offer a control system that simultane- EC(3889). With a mean IAE of just (0.041),
ously maximizes the plant’s efficiency and the MIOC clearly outperforms conventional,
efficacy of the WWT process, therefore reduc- incrementally optimized control approaches.
ing both operational costs and environmen- To predict the operational effectiveness of
tal effect. Existing multi-objective optimum a desalination facility, Mahadeva et al. (2022)
control approaches, however, tend to analyze offer a model of PSO-ANN. The purpose
the procedure of maximizing efficiency and of this research is in order to improve the
the control method separately, which may dependability of projections and enhance the
lead to the set-point fluctuating wildly and benefits of the Reverse Osmosis (RO)-based
being difficult to follow, and therefore dete- desalination technology plant. Modelling and
riorate the control and practical performance simulation were accomplished with the help
of WWTPs. In order to address this issue, of MATLAB 2019a’s neural network tool-
this research suggests a Multi-Objective Inte- box. The literature implies that changes to
grated Optimal Control (MIOC) approach the modelling parameters of soft computing
for the Sludge Processing Facility. To accom- models may lead to significant gains. In order
plish synchronized optimization and control to determine what those ideal values are, this
action, a Multi-Objective model predictive study provides a comprehensive list of mod-
control framework is designed. elling parameters and an in-depth systematic
Both the model of controlled variables and examination of them. Table 1.2 displays the
the model of operational indices utilized in summary statistics for the suggested mod-
MIOC were constructed using AFNNs. In eling efficiency assessments (R2 and MSE)
BSM1, EQ and EC are used to assess WWTP’s throughout training, validation, testing, and
efficiency. Control performance and optimiza- all datasets. Table 1.2 shows details.
tion performance studies are examined using Model 2 had the greatest training results
simulation in all climates. Example: Table 1.1 (R2 = 99.8%, MSE = 0.000) while Model 1 had
Table 1.1. Comparison of different optimal control strategies of the mean EQ and EC in storm
weather condition
Optimal NH4 Ntot SS COD BOD EQ kg EC Percentages IAE
control mg L–1 mg L–1 mg L–1 mg L–1 mg L–1 poll units kW h % mg
methods L-1
MIOC 2.87 17.27 13.55 46.89 2,74 7167 3889 12.00 0.041
DMOPSO 3.07 17.48 13,02 47.79 2,78 7512 4089 7,42 0.101
(Han, Liu,
2021)
MOO 2.93 17.91 13.56 48.13 2.83 7583 4169 5.61 0.120
(Sweelapple
et al., 2014)
MOOC 2.98 17.39 13.86 48.64 2.71 7236 4410 0.15 0.054
AQ2: (Han et al.,
Please 2018)
provide
source for P1D 3.06 17.52 13.79 49.52 3.18 7970 4417 0 0.108
all tables. Source:
Table 1.2. Statistical results of the proposed model’s performance evaluation (R2 and MSE) for
different stages of modeling (training, validation, testing and all data sets)
Model Performance evaluations of the PSO-
ANN models by different stages
Training (75%) validation (20%) Testing (05%) All (100%)
R2(%) MSE R2(%) MSE R2(%) MSE R2(%) MSE
Model - 1 99.0 0.005 98.7 0.014 99.6 0.003 98.9 0.007
Model - 2 99.8 ~0.000 98.5 0.016 94.7 0.057 99.0 0.006
Model - 3 99.3 0.004 98.9 0.011 98.6 0.015 99.1 0.006
Model - 4 99.1 0.005 98.6 0.014 96.9 0.024 98.8 0.008
Source:
Author's self generated
the ultimate testing outcomes (R2 = 99.6%, quality is enhanced by 5.6% in Scheme 2 and
MSE = 0.006); Model 3 had the ultimate by 20.3% in Scheme 3 as compared to Scheme
outcomes across the board. Overall, this arti- 1. As a consequence, scheme 3 has shown to
cle gives important insights into the use of be an effective method for treating wastewa-
advanced machine learning techniques, such ter. A neural network model-based regulat-
as PSO-ANN, for enhancing the efficiency of ing strategy might be used in the future to
water treatment desalination facilities. The enhance effluent quality while simultaneously
optimized model presented in this study can decreasing electrical energy usage.
help plant operators make informed decisions Ning et al. (2022) propose the PLC with
and optimize the plants performance, leading incremental proportion and incremental
to improved efficiency and cost savings. (IPI) control algorithm to preserve the con-
Saravana Kumar et al. (2021), begin by servation of the aquatic ecosystem and pro-
the difficulties connected with managing the mote supportable growth by automating the
quality of effluent from WWT plants, particu- adjustment of the dissolved oxygen level in
larly in light of increasingly stringent regula- the aeration tank during the WWT process.
tory standards. They introduce the concept of A BP-NN was utilized to improve method of
fuzzy logic control, which is a type of control regulation. Automatic DO content manage-
system that uses linguistic variables to model ment within the aeration tank presented in
complex and uncertain systems. The sug- Figure 1.1 through the PLC’s enhanced IPI
gested study provides two control techniques control algorithm. A PLC-based automated
(ammonia control and total nitrogen man- control system was implemented to miti-
agement) to enhance their performance of gate the astronomical increases in operating
treating wastewater, and the authors propose expenses and energy consumption caused
using a fuzzy logic controller to achieve these by the lack of automation. Under the guid-
goals. The simulation work was done Within ance of the enhanced IPI procedure, the total
the framework of the Benchmark Simulation nitrogen content of wastewater treated in
Model No.1 (BSM1), and this study’s offers the aeration tank was minimized, and its
a supervisory FLC method enhance the efflu- variability was reduced to a minimum. The
ent quality of a WWT facility and provides authors also highlight the challenges faced
numerical evidence of the effectiveness of this by WWT plant, including fluctuating influ-
control strategy. It’s noteworthy that the efflu- ent characteristics and variations in flow rate,
ent quality is maintained despite the higher which can lead to inefficiencies in treatment
AE and PE use in this system. The effluent and increased energy consumption and cost
6 Innovations in Computational Intelligence: Trends and Technologies
savings. Overall, the article provides a useful recycle loop. Even still, MPC may struggle to
example of how PLC-based control Systems deal with input disturbances and frequently
may be utilized to maximize productivity of needs many model coefficients to describe a
municipal WWT plant. response. The investigation found the MPC
Development and evaluation of a neuro- system was able to effectively control the
fuzzy-based Model Predictive Controller treatment process in real-time, reducing
(MPC) approaches that can estimate the key energy consumption and maintaining high
process factors and provide the appropriate levels of treatment efficiency. This paper con-
level of aeration to overcome the factors such cludes that the use of machine learning-based
as process uncertainty, seasonal variation, MPC systems able to offer significant benefits
and nonlinearity was discussed by Bernardelli to WWT plants, improving both their envi-
et al. (2020) in order to attain a streamlined ronmental and economic performance.
and cost-effective functioning. This article In order to forecast the dose of coagu-
describes the process of data collection and lant, Fang et al. (2022) employed the features
pre-processing, which involved the use of parameters such as pH, turbidity, electrical
sensors to monitor the different factors of conductivity, and flow velocity that character-
the treatment plant, such as flow rate, dis- ize influent water quality. Authors note that
solved oxygen levels. The data was then used traditional dosing algorithms for WWT plants
to train the machine learning models, which are often based on empirical formulas or trial
were integrated into the MPC system. and error, which can be inefficient and may
More testing using a weekly switch the result in suboptimal treatment outcomes.
between the two controllers (EW and CC) has In contrast, the proposed intelligent dosing
proven that the EW controller is more reli- algorithm model uses methods in the arena of
able at improving sewage quality while using artificial intelligence, such as machine learning
less energy. Especially by reducing air flow at neural networks to optimize dosing decisions
periods of low load times, but also by pre- based on real-time data from the treatment
venting oxidation during peak loads, as long plant and to suggest a sophisticated Light-
as the nutritional ceiling is never reached. GBM-based dosage prediction method, which
Figure 1.2 shows the process plan of a uses these data to estimate the dosage of coag-
WWTP that uses MPC. The dotted lines rep- ulant. The LightGBM algorithm’s findings for
resent the two control loops: the DO con- predictive power demonstrate its dominance.
trol loop controls the airflow (Ua), and the Overfitting and dataset compatibility are two
internal recycle (Qr) is controlled by the drawbacks of the LightGBM algorithm.
AQ3:
Please
provide
source Figure 1.1. Automatic control flow of aeration tank DO content by the improved IPI control
for all algorithm.
figures.
Source: Author's own resource
A systematic review on recent controllers for an industrial wastewater treatment plant 7
Figure 1.2. shows the process scheme of the WWTP to which MPC is applied.
Source:
AUTHOR'S SELF GENERATED
Table 1.3 provides an evaluation rubric capability is shown by these results. Overall,
for predicting outcomes using various this paper highlights the potential benefits of
approaches. Evaluating the efficacy of three using artificial intelligence methods that may
models using experimental data. The experi- be used to boost the performance of waste-
mental findings demonstrate that the R2 water remediation systems.
value reaches a maximum of 0.9957 for the Matheri et al. (2021) describe a study that
dataset model created by LightGBM, while was done by a group of researchers from dif-
the RMSE and MAE values are reduced to a ferent institutions in South Africa. They used
minimum of 0.3049 and 0.1474 correspond- data from a WWT plant to train and test
ingly. LightGBM’s advantage in predictive ANN. The models were built using a Multi-
layer Perception model and were utilized for
Table 1.3. The results of three different models forecasting potential issues with WWT sys-
tems, such as chemical composition, inherent
Model R2 RMSE MAE MAPE flow rate, and better safety factor. The result
MLR 0.9952 0.7504 0.4458 6.29% demonstrates that ANNs are an effective tool
DT 0.9748 0.4949 0.2978 4.78% for developing integrated wastewater systems
LightGBM 0.9957 0.3049 0.1474 1.34% and simulating the designs of WWTPs. For
the purpose of the real-time prediction of
Source:
nutrient removal efficiency, a neural network
based on the LSTM network (a descendant
Table 1.4. Model Performance on the training, of the RNN) is also suggested. However,
validation and test sets (R2 values) ANN is computationally intensive, difficult
Training Validation Test set to explain, and data-intensive. WWT process
set set issues were predicted using the artificial intel-
TSSe_RF 0.934 0.862 0.920 ligence (AI)-based ANN prediction model,
developed on the popular MATLAB platform
TSSe_ 0.935 0.892 0.920
DNN
and enhanced with machine learning (deep
learning). The research also stresses the need
PO4_RF 0.905 0.870 0.886
of taking into account numerous removal
PO4_DNN 0.904 0.908 0.872 input factors while creating such models to
Source: guarantee precise forecasts.
8 Innovations in Computational Intelligence: Trends and Technologies
Wang et al. (2021) present a unique ML- and require more training data to learn effec-
based method that aims to enhance effluent tively. In addition, GMM is highly sensitive
quality control in WWTPs by showing how to outliers. The best models for each algo-
practical factors and discharge parameters are rithm under test were determined by running
related. The author collected a large dataset multiple tests with different combinations of
of process data, including influent and efflu- their main parameters and selecting the ones
ent water quality parameters, operational lowest errors according to metrics taken into
conditions and environmental factors. This account, including MSE, RMSE, MAE, and
dataset was used to train several ML methods MAPE. With least RMSE, MSE, MAE, and
such as ANNs, decision trees, random forests, MAPE, the Transformer approach obtained
and linear regression. The framework is com- the highest Performance for predicting all of
prised of Random Forest (RF) models, Deep the critical variables.
neural network (DNN) models, and Variable When it comes to forecasting TSS and
Importance Measure (VIM) models and the NO3, LSTM methods fared the best, while
partial Dependence Plot (PDP) analyzers, and ANN and GMM algorithms produced the
it uses a unique method to explain temporal best results for NH4 and BOD5, respectively.
delays between processes. Thirty-two opera- Concerning the predictability of outcomes, it
tional variables and two effluent parameters— is lastly worth noting that the Transformer
Total Suspended Solids in Effluent (TSSe) and algorithm necessitates more time and effort
Phosphate in Effluent (PO4e)—are analyzed to train and make predictions. In accord-
in order to create RF models, which are then ance with the selected metrics, both ANN
verified using DNN models as references and and LSTM provided accurate predictions
demonstrated to be appropriate for VIM and while simultaneously using less computing
PDP in terms of clarifying the specific effects resources and a shorter amount of time to
of these two operational variables on TSSe train and provide predictions.
and PO4e. The model performance of DNN Classification models were shown by
and RF on training, validation and test data Wodecka et al. (2022) to be a useful tool
set as shown in Table 1.4. In conclusion, both for predicting changes in effluent character-
the RF and DNN models accurately forecast istics at the intake of WWT facilities, when
all data sets and demonstrated outstanding these values are directly proportional to the
Performance in generalization for TSSe and flow rate of incoming wastewater. In the
PO4e. considered proposal, the levels of quantified
Salles et al. (2022) suggested using machine wastewater characteristics parameters were
learning algorithms to forecast important divided into lower (lower-than-average indi-
variables (monitoring, control, and optimi- cator values), average (normal and maximum
zation of industrial processes) in the WWT values), and higher (increasing values). The
method. The value of the TSS, BOD5, NH4, results of the computations showed that the
and NO3 variables were approximations values of the chosen wastewater quality indi-
using the Gaussian Mixture Models (GMM), cators (BOD5, COD, TN, TP) can be detected
LSTM, ANFIS, Transformer and ANN algo- with adequate accuracy using the calculated
rithm. Greater computational resources and ensemble models blending support vector
longer preparation time are needed for the machines and boosted trees. The statistical
transformer algorithm. ANFIS has a limi- parameters (minimum, average, maximum,
tation of the type, quantity and position of and standard deviations) of seasonal fluc-
membership functions, the curse of dimen- tuation in the amount and quality of BOD5,
sionality, and the fact that LSTM models COD, TN, and TP were identified, with a
are more complex than conventional RNNs split between winter and autumn/spring. For
A systematic review on recent controllers for an industrial wastewater treatment plant 9
the purpose of maximize the effectiveness of included. The results of this study will help
WWT, this research finds that machine learn- professionals manage WWTPs based on data.
ing approaches may be utilized to forecast the The authors concluded that deep WWTP
quality of incoming wastewater. The findings learning-based models have the potential to
of this investigation could be applied to cre- be useful tools for forecasting key features
ate a real-time monitoring system for WWT of WWT plant and advise future research to
plants, which allow operators to improve take into account sensor networks that can
the treatment process based on the predicted provide data sets with greater dimensions
quality of incoming wastewater. and frequency.
Cheng et al. (2020) utilized training Figure 1.4 depicts the core of the work
and testing data collected over time from a of Do et al. (2021), which is the incorpora-
WWT facility in Norway. Standard LSTM tion of genetic algorithms (GAs) into the
and GRU, exponentially smoothed LSTM, Benchmark Simulation Model1 (BSM1) for
adaptive LSTM, and smoothed LSTM are the purpose of designing a higher-level con-
only some of the six deep learning models trol system for WWTPs. This research article
built using RNN-based soft sensors. Models proposes a unique Genetic Optimization for
built on GRUs are more efficient than LSTM Biological Wastewater Treatment Plants with
models because they converge more quickly. the objectives of increasing discharge qual-
For all important aspects, the LSTM soft- ity while decreasing operational expenses.
sensor performs best overall, succeeded by The suggested controller is meant to optimize
the exponentially-smoothed GRU and the the WWTP by adjusting the set points of the
LSTM. The dynamic models underperformed lower-level controllers, such as the PID con-
the other models in terms of their ability to trollers. This research provides the outcomes
predict the future. All that is needed are the of a simulation research was carried out to
data itself, as the offered models produce test the performance of proposed control-
good forecasting results. Figure 1.3 is a sche- ler. In this work, a GA-based hierarchical
matic illustration of the forecasting system controller was presented, with the bottom
that we propose. Using RNN-based soft sen- tier controller regulating S0,5 by manipula-
sors, this research constructed RNN-based tion of Kla,5, and the upper-level controller
models to predict WWTP essential param- adjusting S0,5 per SNH,4. In the higher-level
eters such influent flow, temperature, BOD, control, GA is utilized to figure out KSO,5
chloride, and energy consumption. To fur- and BSO.5 in order to achieve three prede-
ther reprocess unprocessed Data before deep termined goals in a variety of climates and
learning, the exponential smoothing filter is atmospheric circumstances.
A tank 5 has recently implemented the for designing a suitable treatment system
desired control. For each of the three weather to ensure the safety, efficacy, and quality of
scenarios investigated, the simulated out- the treated wastewater. Here, the limitations
comes will be compared to those obtained faced by the existing research are described as
by using simply the lowest controller, which follows. PID, FLC, PLC, and MPC controllers
is an ILC paired with a PI regulator for the are all commonly used in WWT processes;
wastewater influent data. As a result, the However, the PID controller’s inefficient
suggested strategy might be used to various parameter coordination and substantial time
contexts to further decrease the OCI and delay make it difficult to provide precise con-
EQI. Overall, the research sheds light on trol, especially on complex systems or sys-
how genetic algorithms might be included tems that demand high performance.
into the planning of advanced controls for Moreover, FLC controller has disadvan-
WWT facilities. There may be far-reaching tages of lower speed and longer run time and
consequences for the environment and pub- lack of real time responses. This PLC-based
lic health if the suggested controller is not control system is difficult to adapt or replace,
implemented to enhance the performance of requires extensive training and is always diffi-
WWTPs. Furthermore, time spent might be cult to identify errors. In addition, MPC may
cut down by using PSO, DE, or ACO in effi- struggle to deal with input disturbances and
cient ways. frequently needs many model coefficients to
describe a response.
Since traditional mechanistic models suffer
3. Discussion from a number of drawbacks, scientists have
This paper comprises the discussion about turned to Machine Learning (ML) techniques
the waste water and their various waste to simulate WWTP processes. Therefore, the
water treatment methods which provides existing research utilized LightGBM, RF,
different types of techniques from different ANN, ANFIS, LSTM, and GMM. However,
methods. WWT processes have advanced fast ANN requires lots of computational power
with scientific breakthroughs in recent dec- hard to explain and it requires lots of data,
ades. The treatment effectiveness with respect over fitting and data set compatibility are two
to their benefits, uses, and limitations have drawbacks of the LightGBM algorithm. RF
been thoroughly addressed. Understanding model is not able to deal with unbalanced
the characteristics of wastewater are essential and missing data, also its runtimes are fast,
[9] Li, X., Yi, X., Liu, Z., Liu, H., Chen, T., Niu, using machine learning models. In 2022
G., ... and Ying, G. (2021). Application of International Joint Conference on Neural
novel hybrid deep leaning model for cleaner Networks (IJCNN) (pp. 1–9). IEEE.
production in a paper industrial wastewater [16] Saravana Kumar, S., and Latha, K. (2021).
treatment system. Journal of Cleaner Pro- A supervisory fuzzy logic control scheme
duction, 294, 126343. to improve effluent quality of a wastewater
[10] Mahadeva, R., Kumar, M., Patole, S. P., and treatment plant. Water Science and Technol-
Manik, G. (2022). An optimized PSO-ANN ogy, 84(10-11), 3415–3424.
model for improved prediction of water [17] Subari, F., Harisson, H. F., Kasmuri, N. H.,
treatment desalination plant performance. Abdullah, Z., and Hanipah, S. H. (2022).
Water Supply, 22(3), 2874–2882. An overview of the biological ammonia
[11] Matheri, A. N., Ntuli, F., Ngila, J. C., Seodi- treatment, model prediction, and control
geng, T., and Zvinowanda, C. (2021). Per- strategies in water and wastewater treat-
formance prediction of trace metals and cod ment plant. Malaysian Journal of Chemical
in wastewater treatment using artificial neu- Engineering and Technology (MJCET), 5(1),
ral network. Computers and Chemical Engi- 8–28.
neering, 149, 107308. [18] Sundui, B., Ramirez Calderon, O. A., Abdel-
[12] Newhart, K. B., Holloway, R. W., Hering, dayem, O. M., Lázaro-Gil, J., Rene, E. R.,
A. S., and Cath, T. Y. (2019). Data-driven and Sambuu, U. (2021). Applications of
performance analyses of wastewater treat- machine learning algorithms for biological
ment plants: A review. Water research, 157, wastewater treatment: updates and perspec-
498–513. tives. Clean Technologies and Environmen-
[13] Ning, S., and Hong, S. (2022). Programma- tal Policy, 23, 127–143.
ble logic controller-based automatic control [19] Wang, D., Thunéll, S., Lindberg, U., Jiang,
for municipal wastewater treatment plant L., Trygg, J., Tysklind, M., and Souihi, N.
optimization. Water Practice and Technol- (2021). A machine learning framework to
ogy, 17(1), 378–384. improve effluent quality control in waste-
[14] Nourani, V., Asghari, P., and Sharghi, E. water treatment plants. Science of the total
(2021). Artificial intelligence-based ensem- environment, 784, 147138.
ble modeling of wastewater treatment plant [20] Wodecka, B., Drewnowski, J., Białek, A.,
using jittered data. Journal of Cleaner Pro- Łazuka, E., and Szulżyk-Cieplak, J. (2022).
duction, 291, 125772. Prediction of wastewater quality at a waste-
[15] Salles, R., Mendes, J., Araújo, R., Melo, C., water treatment plant inlet using a system
and Moura, P. (2022, July). Prediction of based on machine learning methods. Pro-
key variables in wastewater treatment plants cesses, 10(1), 85.
2 Green SaaS adoption in cloud
computing: An investigation into
environment sustainability
Bhanu Priyaa, Bhupal Aryab, K. M. Pandeyc, and Prashant Vermad
Department of Computer Science and Engineering, Roorkee Institute of Technology, Roorkee, India
Abstract: The advent of cloud computing has advanced tremendously in the realm of information technology,
resulting in a transformative influence on the IT sector. Cloud computing provides the provision and delivery of
services, software, and computing over the Internet. Due to the utilization of resources such as the virtualiza-
tion of servers, networks, and storage, as well as workload distribution through load-balancing processes, it
consumes a lot of power and energy. In this paper, we have defined the “Green IT component” which refers to
the utilization of energy-saving and environmentally friendly techniques within data centers and their compo-
nents as processing, storage, and network elements. This paper gives the concept of a “greener cloud” and its
implications for sustainability. We have examined various research papers discussing the challenges and oppor-
tunities associated with green cloud computing, with the application of green software-as-a-service models such
as desktop as a service, integration as a service, prognostic, and health management as a service.. Green cloud
technology ensures high performance and productivity through an energy-efficient approach, enabling busi-
nesses while also promoting a sustainable future for the planet. In future work, we will propose a new architec-
ture for a greener cloud for the utilization of different software-as-a-service models of delivery.
Keywords: Sustainability, energy efficiency, resource optimization, carbon footprint, green IT, energy-aware
design
DOI: 10.1201/9781003606635-2
14 Innovations in Computational Intelligence: Trends and Technologies
sector, with a 1.8% increase or 261 Mt. application businesses can eliminate the need
Notably cloud infrastructure is designed to for on-premises hardware and infrastructure,
minimize expenses and maximize resource resulting in lower energy consumption and
utilization, making it more environmentally reduced carbon footprint. PaaS platforms
friendly compared to traditional data centers frequently provide frameworks and tools
(IEA, 2022). In terms of service delivery mod- that encourage effective coding techniques,
els, cloud computing offers infrastructure as optimal resource utilization, and scalability,
a service (IaaS), platform as a service (PaaS), which results in energy savings and decreased
and software as a service (SaaS). Through the waste.
internet, virtualized computer resources are All spheres of life are starting to adopt
made available by IaaS, giving users control cloud computing technologies, particularly in
and management over their infrastructure. the area of data storage. Increasingly, Con-
PaaS provides a framework for creating, sumers are okay with endpoint devices having
testing, and deploying applications with- less storage since they prefer using the cloud.
out requiring the management of the foun- While this has been happening, some com-
dational infrastructure. SaaS eliminates the mercial cloud development firms, like Google,
requirement for local installation and main- Amazon, and IBM Cloud, have offered a vari-
tenance by delivering software programs via ety of services, including infrastructure and
the internet (Gulati, no date). Green cloud services for scientific computing.
solutions offer a means to reduce operational
expenses, minimize greenhouse gas emissions, 2.2. Green IT
and conserve energy resources, thereby fos-
tering a positive impact on the environment, The Environmental Protection Agency initi-
all while ensuring the maintenance of high- ated the Energy Star program in the United
quality service levels (QoS) (Raghavendran et States back in 1992. The program specifi-
al., 2017). cally focuses on enhancing energy efficiency
in computer devices and related technologies.
The term “green computing” gained popular-
2. Background ity subsequent to the inception of the Energy
Star program (Brown, Webber and Koomey,
2.1. Cloud computing 2002)a voluntary labeling program designed
A fundamental transformation in the utili- to identify and promote energy-efficient prod-
zation and management of hardware and ucts, in order to reduce carbon dioxide emis-
software resources are used and managed is sions. Since then, the EPA, now in partnership
brought about by cloud computing. Robust with the US Department of Energy (DOE.
data replication and failover mechanisms Around the same period, TCO Devel-
ensure high reliability and mitigate the risks opment, an organization based in Sweden,
of data loss and downtime. In the context introduced the TCO certification program
of the energy-efficient cloud model, IaaS (Joumaa and Kadry, 2012). This initiative
allows businesses to optimize their resource was aimed at promoting and certifying a
utilization such as provisioning, mapping, wide range of IT equipment include net-
adaptation, discovery, brokering, estimation, work accessories, computer systems, video
and modeling. It emphasizes the benefits of adapters, monitors, keyboards, and even
resource management in IaaS, including scal- mobile phones with a primary focus on ful-
ability, quality of service, cost-effectiveness, filling distinct environmental and sustainabil-
and simplified interfaces (Mary, 2013). SaaS ity standards. The use of energy-saving and
refers to cloud-based software applications environmentally friendly techniques in data
that are accessed through the internet. In SaaS centers, with a focus on the CPU, memory,
Green SaaS adoption in cloud computing: An investigation into environment sustainability 15
the initial condition of the data centers they resources, storage, network usage, data trans-
start with. These techniques aim to minimize fer, load balancing, and additional services.
relocation overhead and maximize consolida- By considering factors such as instance usage,
tion by incorporating it into their modeling data storage, network traffic, and support
process (Arshad et al., 2022). options, the calculator provides an estimation
of cloud service costs.
3.3. Efficient task scheduling By adopting these practices, cloud service
providers (CSPs) contribute to a more sus-
In cloud data centers, an effective task sched- tainable IT industry and offer environmen-
uler is responsible for efficiently utilizing the tally responsible services to their customers.
resources available in the data center for Greener cloud projects offer businesses a
task execution. The efficiency of a scheduling variety of chances to cut costs, support the
algorithm is typically evaluated based on two environment, innovate, and stand out from
key factors: first is makespan which measures the competition while promoting a greener
how long it takes to finish every work on the future as:
cloud, and second is energy consumption,
which concentrates on using energy as effi- 3.6. Environment sustainability
ciently as possible when carrying out activi-
ties (Zambuk et al., 2021)such as security, the In order to reduce the negative effects on the
efficient allocation of resources, which in turn environment, cloud computing sustainabil-
results in the waste of resources. Researchers ity, especially in SaaS offerings, entails uti-
have explored a number of approaches over lizing resource-efficient and environmentally
the past decade to overcome these challenges. friendly practices such as server virtualiza-
The main objective of this research is to tion, resource sharing, and dynamic scaling
explore the task scheduling of cloud comput- also implementing a system to monitor and
ing using multi-objective hybrid Ant Colony report on energy consumption.
Optimization (ACO).
3.7. Innovation technological
3.4. Power and energy calculator advancements
Calculating carbon emissions in data centers The pursuit of energy-efficient cloud com-
involves considering various factors such as puting drives innovation in the development
AQ2:
Please
PUE as it quantifies the ratio of the overall of new technologies, software, and hardware
define energy consumed by a data center compo- solutions. This fosters technological advance-
PUE. nent to the energy consumed exclusively by ments, such as improved virtualization tech-
the IT infrastructure within that facility. A niques, energy-efficient data center designs,
PUE: PUE value of 1.0 represents ideal efficiency, and intelligent workload management systems.
Power indicating that total power utilization by the
Usage data center components is utilized by the IT 3.8. Government incentives and
Effectiveness
hardware and infrastructure. regulations
Governments worldwide are recognizing the
3.5. Cost calculator importance of energy efficiency and environ-
A data center cost calculator estimates mental sustainability. They may offer incen-
expenses including infrastructure, energy, tives, grants, or tax benefits to organizations
maintenance, cooling, personnel, and miscel- adopting green cloud practices. Compliance
laneous costs. Cloud services cost calculator with green regulations can also open doors to
involves estimating expenses for compute new markets and partnerships.
Green SaaS adoption in cloud computing: An investigation into environment sustainability 17
the increasing popularity of cloud computing real-time guarding of data, and restoration
with virtualization technology. By using soft- of vulnerabilities.
ware as a service(SAAS.
5.6. Security as a service
5.3. Database as a service SaaS model of cloud computing faces many
Database as a service (DBaaS) model is a troubles when we build the cloud infrastruc-
cloud computing managed service that allows ture because cloud providers generally are
users to line up, operate, manage, and scale not concerned about the security and pri-
with some style of access to information while vacy of the tenant or customers. Hence the
not the necessity to set up the physical hard- tenant uses specific protection gear together
ware, putting in code, or configuring it for with anti-virus and host-based intrusion
performance and heading for by themselves detection structures to stabilize their digital
(Al Shehri, 2013). Green DBaaS in enterprise machines additionally providers afford flex-
manager is applied all the way through 4 ibility to tenants to determine how a great
options which are: VM based, joint cluster, deal manage they want to have over their
collective installation, and shared database. very own VM.
payments are per-usage and software propri- SaaS provider model based on the base-
etors can get entry to their utility statistics line security framework (Varadharajan and
according to their need. Tupakula, 2014) to secure its own infra-
structure and make sure that malicious ten-
ants aren’t attacking the cloud infrastructure
5.4. Integration as a service or maybe the web website hosting malicious
Integration as a service (INaaS) is a machine software.
of equipment and applied sciences that con-
nects a number of applications, systems, 5.7. Prognostics and health
repositories, and IT environments for the management as a service
real-time trade of facts and processes. Many
industries prefer the SAAS for most consum- Prognostics and Health Management (PHM)
ers because they do not want more machines. service of cloud computing represents a great
So the center of attention is to invoke the chance to notice coming failures by predicting
functionalities and develop the legacy appli- future behavior. There are many challenges to
cation in heterogeneous cloud services such predicting the integrating behavior such as
as web service (Kumar and Bari, 2017). complex data of industries, large volumes of
data stored in different locations, high com-
putational resources, and continuous moni-
5.5. Compliance as a service toring of logistics and infrastructure. This
Compliance as a service (CaaS) is a cloud management service provides PHM solutions
SLA whose principal intent is to regulate and to have the ability of fault detection, fault iso-
the guard consumers’ privatizes and furnish lation, and estimation of remaining useful life
security by imposing greener attributes such (Terrissa et al., 2016).
as confidentiality, integrity, availability, and Table 2.2 Provides a list of critical consid-
accountability (CIAA) (Yimam and Fernan- erations for developing and overseeing envi-
dez, 2016). ronmentally sustainable SaaS and provides
CaaS offers partitioning of duties, annual some comparison and recognition of the ser-
risk evaluation, management of differ- vice’s environmental impact, especially with
ent applications, facts and figures detec- regard to carbon emissions and the ecosys-
tion, policy creation and enforcement, tem’s overall footprint.
Green SaaS adoption in cloud computing: An investigation into environment sustainability 21
[3] Atiewi S, Yussof S. Comparison between Cluster Comput. Published online 2022.
cloud sim and green cloud in measuring doi:10.1007/s10586-022-03713-0
energy consumption in a cloud environ- [14] Kumar M, Bari P. Integration of
ment. In: Proceedings - 3rd International cloud based services. Published online
Conference on Advanced Computer Sci- 2017;2(4):101-105.
ence Applications and Technologies, ACSAT [15] Mary MA. Survey on resource management
2014. IEEE; 2014:9-14. doi:10.1109/ technique in cloud computing. Published
ACSAT.2014.9 online 2013;2(12):1723-1731.
[4] Azambuja M, Camargo M, Filho LM, et al. [16] Park J, Han K, Lee B. Green cloud? An empir-
Enabling lean supply with a cloud comput- ical analysis of cloud computing and energy
ing platform - An exploratory case study. In: efficiency. Manag Sci. 2023;69(3):1639-
21st Annual Conference of the International 1664. doi:10.1287/mnsc.2022.4442
Group for Lean Construction 2013, IGLC [17] Patil A, Patil DR. An analysis report on
2013. 2013:815-824. green cloud computing current trends and
[5] Brown R, Webber C, Koomey JG. Status future research challenges. SSRN Electron
and future directions of the ENERGY STAR J. Published online 2019. doi:10.2139/
program. Energy. 2002;27(5):505-520. ssrn.3355151
doi:10.1016/S0360-5442(02)00004-X [18] Priya L, Nallakannu G, Abirami C, Kumar
[6] Jagtap C, Rathore K, Patel P, et al. Desk- SV, Pavithra A. A novel intelligent diagno-
top virtualization with cloud computing. sis and disease prediction algorithm in green
Int J Eng Res Technol. 2020;9(1):255-257. cloud using machine learning approach. J
doi:10.17577/ijertv9is010157 Green Eng. 2020;10(7):3421-3433.
[7] Chaurasia N, Chauhan R, Agarwal H, [19] Raghavendran CV, Guhan P, Balasubrama-
Kumar N, Jaiswal RK. Shifting from cloud nian P, Sathyakumar M. A study on cloud
computing to green cloud and edge comput- computing services. Int J Eng Res Technol.
ing. SSRN Electron J. Published online 2023. 2017;4(34):1-7.
doi:10.2139/ssrn.4387781 [20] Al Shehri W. Cloud database database as a ser-
[8] Gebreslassie Y, Sharma DP. DPS-Yemane- vice. Int J Database Manag Syst. 2013;5(2):1-
Shareme CSMM model for client-side SLA 12. doi:10.5121/ijdms.2013.5201
of green cloud services measuring and [21] Stoyanova M, Nikoloudakis Y, Panagiotakis
monitoring. S, Pallis E, Markakis EK. A survey on the
[9] Gulati R. A systematic review on the various internet of things (IoT) forensics: challenges,
approaches used for achieving energy con- approaches, and open issues. IEEE Com-
sumption in cloud. Published online. mun Surv Tutor. 2020;22(2):1191-1221.
[10] IEA. CO2 emissions in 2022. Glob doi:10.1109/COMST.2019.2962586
Energy. 2022;62(10):20-21. Available at: [22] Taryana U, Fajar AN, Utama DN. Informa-
https://www.iea.org/news/global-co2-emis- tion as a service on cloud computing tech-
sions-rebounded-to-their-highest-level-in- nology: a review. In: 2018 International
history-in-2021. Seminar on Research of Information Tech-
[11] Jain N, Inderveer K. Energy-aware virtual nology and Intelligent Systems, ISRITI
machine migration for cloud computing - a 2018. IEEE; 2018:39-42. doi:10.1109/
firefly optimization approach. J Grid Com- ISRITI.2018.8864468
put. Published online 2016. doi:10.1007/ [23] Terrissa LS, Sahnoun M, Zghal M, et
s10723-016-9364-0 al. A new approach of PHM as a ser-
[12] Joumaa C, Kadry S. Green IT: Case studies. vice in cloud computing. In: Colloquium
Energy Procedia. 2012;16(PART B):1052- in Information Science and Technology,
1058. doi:10.1016/j.egypro.2012.01.168 CIST. IEEE; 2016:610-614. doi:10.1109/
[13] Katal A, Dahiya S, Choudhury T. Energy CIST.2016.7804958
efficiency in cloud computing data cent- [24] Varadharajan V, Tupakula U. Security as a
ers: a survey on software technologies. service model for cloud environment. IEEE
Green SaaS adoption in cloud computing: An investigation into environment sustainability 23
Trans Netw Serv Manag. 2014;11(1):60-75. [27] Yimam D, Fernandez EB. A survey of com-
doi:10.1109/TNSM.2014.041614.120394 pliance issues in cloud computing. J Inter-
[25] Wang P. Application of cloud computing net Serv Appl. 2016;7(1). doi:10.1186/
and information fusion technology in green s13174-016-0046-8
investment evaluation system. J Sensors. [28] Zambuk FU, Anwar A, Zangeneh F, et al.
2021. doi:10.1155/2021/2292267 Efficient task scheduling in cloud comput-
[26] Yan J, Zhang S, Yu W, Yuan Y. Energy-aware ing using multi-objective hybrid ant colony
systems for real-time job scheduling in cloud optimization algorithm for energy efficiency.
data centers: a deep reinforcement learning Int J Adv Comput Sci Appl. 2021;12(3):450-
approach. Comput Electr Eng. 2022;99:107688. 456. doi:10.14569/IJACSA.2021.0120353
doi:10.1016/j.compeleceng.2022.107688
3 Anomaly detection in wireless sensor
network
Mayank Shuklaa, Sneha Yadavb, Abhay Pratap Singhc, Fizza Rizvid,
and Surya Vikram Singhe
Department Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management, Lucknow, Uttar Pradesh, India
Abstract: With the recent emergence of the notion of the “Internet of Things,” wireless sensor networks (WSNs),
or WLANs, are critical and indispensable platforms for the future. They are employed in the military, health-
care, industry, and habitat for the purposes of tracking, monitoring, and regulating numerous applications.
However, anomalies that arise for a variety of causes, including node failures, reading mistakes, odd events, and
malicious attacks, have an impact on the quality of data that sensor nodes collect. Thus, before sensor data is
used to inform choices, anomaly detection is a crucial step in ensuring its quality.
We outline the difficulties in detecting anomalies in WSNs and the conditions that must be met in order to
create models that are both successful and efficient. Next, we examine the most recent developments in data
anomaly detection research in WSNs and group existing detection techniques into five major classes according
to the detection techniques used to create these techniques. Variations of the most advanced models in each
class are discussed, and their drawbacks are emphasized to give insight into possible future research directions.
In addition, the methods under assessment are contrasted and assessed according to how well they fulfill the
specified criteria. In conclusion, the overall constraints of existing methodologies are referenced and potential
avenues for future research are proposed and deliberated.
Keywords: IoT, anomaly detection, wireless sensor network, machine learning, neural network
a
[email protected]; [email protected]; [email protected];dRizvif952@
gmail.com; [email protected]
DOI: 10.1201/9781003606635-3
Anomaly detection in wireless sensor network 25
specific objectives and approaches in this pro- These applications may include early detec-
ject include: tion of environmental incidents, intrusion
detection in security applications, equipment
2.2. Algorithm selection and fault monitoring in industrial settings, and
more.
development
The project involves a comprehensive review
of existing anomaly detection algorithms, 3. Thematic Overview
both from the domains of machine learn- Anomaly detection in WSNs is a project topic
ing and statistical analysis. After evaluating that involves the identification of unusual
these methods, the project aims to develop a patterns or behaviors within the data col-
customized anomaly detection algorithm tai- lected by sensors in a wireless network. The
lored to the unique characteristics of WSNs. overarching goal is to develop techniques and
algorithms that can effectively distinguish
2.3. Resource efficiency between normal and anomalous activities,
helping to enhance the overall security, reli-
Given the resource constraints of sensor ability, and efficiency of the wireless sensor
nodes, the project focuses on creating an algo- network.
rithm that minimizes the computational and Here’s a thematic overview of such a
memory requirements. This ensures that the system:
anomaly detection process can be executed on
sensor nodes with limited resources without
compromising the network’s overall efficiency. 3.1. Sensor data characteristics
Analyzing the characteristics of sensor data,
2.4. Real-time detection such as signal strength, frequency, and tem-
poral patterns, to identify anomalies that
An important aspect of the project is to deviate from expected norms.
achieve real-time anomaly detection, allow-
ing the network to respond promptly to
abnormal events. This involves optimizing 3.2. Machine learning models
the algorithm for quick decision-making and Utilizing machine learning algorithms to
minimizing communication overhead, as well detect anomalies in user behavior based on
as energy consumption. historical data. This may involve supervised,
unsupervised, or semi-supervised learning
2.5. Evaluation and validation approaches.
The project involves extensive experimen-
tation using both synthetic and real-world 3.3. Pattern recognition
datasets. It aims to assess the performance Identifying patterns of normal user behavior
of the developed algorithm in terms of accu- and flagging deviations from these patterns as
racy, false-positive rate, detection time, and potential anomalies. This can involve statisti-
resource utilization. The algorithm will be cal methods or advanced pattern recognition
compared against existing methods to dem- techniques.
onstrate its advantages.
3.4. User profiling
2.6. Practical applications Creating user profiles based on their typical
The research project also explores practical interactions with the wireless sensor network.
applications of anomaly detection in WSNs. Anomalies are then detected when a user’s
26 Innovations in Computational Intelligence: Trends and Technologies
to minimize false positives, as these can lead between efficiency and accuracy is essential,
to unnecessary alarms and resource wastage. especially in applications where energy con-
servation is critical.
4.1.2. Weaknesses
4.4. Security considerations
Achieving high accuracy may come at the
cost of increased false positives, especially in 4.4.1. Strength
dynamic and noisy environments. Striking the
Anomaly detection is a fundamental com-
right balance is challenging, and the trade-off
ponent of security systems in wireless sensor
between sensitivity and specificity needs care-
networks. It helps identify malicious activities
ful consideration.
and potential threats.
of WSNs. This algorithm considers the technology. Here are some potential areas for
constraints of limited resources, wire- future research and development in anomaly
less communication, and distributed data detection for WSNs:
gathering in WSNs, making it a practical
choice for real-world deployments.
7.1. Deep learning and AI techniques
3. Performance evaluation: Extensive exper-
imentation was conducted on both syn- To improve the precision and effectiveness of
thetic and real-world datasets. Our results anomaly identification in WSNs, deep learn-
demonstrated that the proposed algo- ing models—such as DNNs, CNNs, RNNs,
rithm outperformed existing methods in or hybrid architectures—are included. use
terms of accuracy, false-positive rate, and of pre-trained models and transfer learning
resource efficiency. It exhibited a high to enhance anomaly detection performance,
detection rate while minimizing energy particularly in situations with a shortage of
consumption and communication over- labeled training data.
head, which is crucial in resource-con- Investigate the deployment of anomaly
strained WSNs. detection algorithms directly on edge devices
within the WSN, enabling real-time process-
In conclusion, the successful development ing and reducing the need for transmitting
and evaluation of an efficient anomaly detec- raw sensor data to a central server. Develop
tion algorithm for Wireless Sensor Networks lightweight anomaly detection models opti-
have the potential to enhance the reliability mized for edge devices with constrained com-
and security of WSNs in various applications. putational resources and energy.
This project contributes to the ongoing efforts
to make WSNs more resilient and practical for
real-world deployments. As technology contin- References
ues to evolve, so will the challenges and solu- [1] Akyildiz I. Wireless sensor networks: A sur-
tions in the field of anomaly detection in WSNs. vey. Comput Netw. 2002;38(4):393–422.
[2] Barreca A, Curto R, Malavasi G, and
7. Future Work Rolando D. Energy retrofitting for the
modern heritage enhancement in weak real
Future work in anomaly detection for WSNs estate markets: The Olivetti housing stock
is likely to focus on addressing emerging in Ivrea. Sustainability. 2022;14(6):3507.
challenges and leveraging advancements in doi:10.3390/su14063507.
4 Revolutionizing object recognition
beyond CNN and YOLO with deep
learning breakthrough
G. S. S. S. S. V. Krishna Mohan1,a, Mahammad Firose Shaik2,b,
G. Usandra Babu3,c, R. G. V Prasanna1,d, Pinagadi Venkateswara
Rao4,e, and Inakoti Ramesh Raja5,f
1
Department of Electronics and Communication Engineering, Aditya Institute of Technology and
management, Tekkali, India
2
Department of Electronics and Instrumentation Engineering V R Siddhartha Engineering College
Vijayawada, India
3
Department of Electronics and Communication Engineering, Aditya Engineering College,
Surampalem, India
4
Department of AI and ML, School of Engineering, Malla Reddy University, Hyderabad, Telangana,
India
5
Department of Electronics and Communication Engineering Aditya College of Engineering and
Technology, Surampalem, India
Abstract: In the world of computer vision and object detection, there’s a strong connection between these areas.
Object recognition is all about recognizing specific things in pictures and videos. But this paper goes a step fur-
ther than the usual methods of finding objects. It tries to understand images in more detail, like how our eyes
do. The work starts by looking at deep learning and well- known object detection systems like CNN, R-CNN,
and YOLO. These systems can typically find only a few objects in a picture, and they work best at distance of
5–6 meters. However, our new model is much better at this task and has an interesting feature it can even tell
you the names of the objects it sees using Google Translate. This is especially helpful for people with vision
problems because it helps them understand what’s around them better. In summary, the research combines
computer vision, deep learning, and real-time object recognition to enhance visual perception and offer valuable
assistance to individuals with visual impairments.
Keywords: Deep learning, CNN, YOLO, RCNN, visual impairs, computer vision
a
[email protected]; [email protected]; [email protected]; drgvprasanna@
gmail.com; [email protected]; [email protected]
DOI: 10.1201/9781003606635-4
32 Innovations in Computational Intelligence: Trends and Technologies
environment more quickly, easily, confidently, systems that perform optimally up to 5–6
and with a distinct sense of mobility. Visual meters, our innovative model excels in rec-
impairment extends beyond mere eyesight ognizing various objects, even articulat-
issues, stemming from various causes like ing their names using Google Translate.
trouble with eyesight, cataract development, This distinctive feature proves particularly
issues in the rear side of the eye, or problems advantageous for individuals facing vision
with the optic nerve [4]. People facing visual challenges, enhancing their comprehen-
impairment encounter numerous challenges sion of the surrounding environment. By
in daily life, from navigating roads safely to integrating computer vision, deep learn-
discerning traffic light signals or avoiding ing, and real-time object recognition, our
obstacles. Pursuing education often involves work strives to advance visual perception.
learning Braille, a system of raised dots felt Ultimately, our goal is to foster inclusivity
with the fingers. Basic activities, like visiting in technology, offering valuable support to
the doctor, become challenging as individuals individuals with visual impairments for a
rely on touch and hearing to navigate their more profound understanding of the world
world, introducing an element of motion around them.
awareness.
In the contemporary landscape, artificial
intelligence (AI) stands out as a transforma- 2. Literature Review
tive force, shaping our future with its smart Cheng et al. proposed a comprehensive
capabilities [5]. Advancements in AI, fueled by approach to enhance visual localization for
abundant data and powerful computers, find individuals with visual impairments [6].
applications in diverse fields like retail and Their system comprises multiple components,
delivery services. AI facilitates efficient inven- including a deep descriptor network, 2D–3D
tory management in retail, making shopping geometric validation, and online sequence
more convenient by tracking stock and offer- comparison. In this workflow, a Dual Descrip-
ing personalized product recommendations tor network is integrated with RGB, Infrared,
based on preferences. In the delivery realm, and depth images, enabling the generation
AI plans optimal routes to transport items of robust, context-rich descriptors and local
seamlessly, introducing a dynamic element of features.
motion. Researchers at Springer-Verilog presented
AI’s transformative influence extends to a LiDAR-based technique for predicting
education, enabling personalized support by distances and effectively measuring obsta-
helping teachers understand student progress. cles [7]. They utilize an EfficientDet-LiteV4
In security, AI aids law enforcement in iden- lightweight deep learning model for obsta-
tifying suspects through image processing in cle detection and calculate anticipated dis-
surveillance videos and monitors buildings, tances using LiDAR-generated depth maps.
alerting authorities to any unusual activities. To test their approach, they implemented it
Even in healthcare, when doctors conduct on a Raspberry Pi4 platform integrated with
thorough eye examinations using a contact LiDAR. The results of their experiments dem-
fundus examination tool, they capture not onstrate high accuracy in both obstacle detec-
only static images but also dynamic insights tion and distance estimation.
into motion, aiding in the diagnosis and treat- Shen et al. proposed a two-stage aggregate
ment of various eye conditions.” learning model called VRTMM, designed for
Our research explores a smarter approach interpreting remote sensing images [8]. This
to understanding images beyond merely model combines a variational autoencoder as
spotting objects. In contrast to traditional well as reinforcement learning. Convolutional
Revolutionizing object recognition beyond CNN and YOLO with deep learning breakthrough 33
Neural Networks (CNNs) are first tuned A helpful system has been developed for
using a variational autoencoder. In the later individuals with partial vision using a Rasp-
stage, a transformer-based model that com- berry Pi 3 and optical character recognition
bines semantic and geographical data gener- (OCR) technology, as discussed in [13]. This
ates textual descriptions. system assists people with limited vision by
Rahman et al. introduced an Internet of converting text from documents into spo-
Things (IoT)-enabled system for automated ken words. However, one drawback is that
object recognition in assisting individuals the complexity increases as a computer is
with visual impairments [9]. Their system required to process the images.
facilitates the recognition of obstacles and
enable audio feedback to the user when nec-
essary. It includes four laser sensors employed 3. Technologies
for object recognition and currency denomi- The contemporary atmosphere has increased
nation identification in real-time scenarios, the risk of inhaling disorders, namely asthma,
both indoors and outdoors. To accomplish chronic obstructive pulmonary disease
these objectives, the system makes use of Ten- (COPD), and also few other disorders. That
sorFlow Lite, MobileNet, and a Single-Shot risk has increased due to increase in air pol-
Detector (SSD). lutants like PM2.5, PM10, etc., a respirator
A tool that reads text from images and can be utilized as an immediate countermeas-
turns it into spoken words is created using ure on an individual level safety measure as
a method called Optical Character Recogni- bringing down pollution levels require much
tion (OCR). In this method [10], a specific longer time than the severity of the problem
algorithm called MSER is used to make sure is allowing.
it’s accurate. The setup involves connecting a
Raspberry Pi to a camera for taking pictures,
and then the MSER algorithm is used to pull 3.1. Deep learning
out the words. On average, this system gets it The neural network in the brain is repli-
right about 85–87% of the time. cated by a specific type of computer program
An advanced audio assistance system is known as deep learning [14]. It is frequently
designed to aid blind individuals by reading referred to as ‘deep learning’ because it
letters or text from documents and identify- employs deep neural networks, which are a
ing objects in their surroundings. This sys- subset of machine learning. Connected lay-
tem, as described in [11], uses technology to ers are utilized in the construction process of
detect both text in documents and obstacles deep learning systems.
nearby. Once detected, the system produces a The surface layer is addressed as the input
voice-based audio output, providing valuable layer, while the base layer is addressed as the
information to help individuals with visual output layer. “Hidden layers” refers to the
impairments navigate their environment more intermediary phases. The term ‘deep’ refers to
effectively. A special tool has been created for neural networks that connect neurons across
people who can’t see well [12]. This tool uses more than two layers. Each hidden layer com-
smart technology to help them read books. prises neurons with interconnections between
It works with a small computer called Rasp- them.
berry Pi 2 and is programmed using Python. The input signal undergoes processing
There’s a monitor to check how the program by the neuron before being sent to the layer
is doing, and it’s especially helpful for visually above it. The weight, bias, and activation
impaired students. However, it can read only function that are applied dictate the inten-
one language. sity of the signal that is sent into the neuron
34 Innovations in Computational Intelligence: Trends and Technologies
which lies in the layer below. This very net- Regression analysis, which yields the
work consumes large volumes of input data, greatest likelihood photos, is how YOLO
processing them through several layers and formulates the object identification process.
learning more intricate characteristics of the YOLO utilizes convolutional neural net-
data at each layer. works (CNN) to swiftly diagnose entities. As
Neural networks can be grouped into the name indicates, the approach recognizes
shallow and deep types. In a shallow neu- objects using one forward propagation over
ral network, there is a solitary hidden layer a neural network. This indicates that the pre-
connecting both the input and output layers. diction procedure will be performed through-
Deep learning networks, on the other hand, out the whole image with a single algorithm
include multiple layers, such as the 22 layers run. CNN anticipates numerous class prob-
in the Google LeNet model for recognizing abilities and bounding boxes in a single go.
images. Nowadays, deep learning is utilized The YOLO algorithm comes in a wide
in various applications, ranging from TVs variety, with Tiny YOLO and YOLOv5 being
and autonomous vehicles to cell phones and a couple of the more well-known versions.
Google’s fraudulent activity tracking. The YOLO algorithm functions by employ-
ing three distinct strategies:
3.2. YOLO (You Only Look Once)
• Residual blocks
algorithm • Bounding box regression
You Only Look Once (YOLO) is a cutting- • Intersection Over Union (IOU)
edge problem-solving object identification
technique that was originally published in the 3.3. Region-based convolutional
esteemed academic publication “You Only neural network (RCNN)
Look Once: Unified, Real-Time Object identi-
fication” in 2015. The authors of this work are The multifaceted field of computer vision
Joseph Redmon, Santosh Divvala, Ross Gir- surged in popularity with the advent of
shick, and Ali Farhadi, as shown in Figure 4.1. Convolutional Neural Networks (CNNs),
This real-time technique can be employed to particularly in the context of self-driving
identify various objects in images. automobiles taking the forefront. Within
AQ1:
Please
provide
source
for all the Figure 4.1. YOLO architecture.
figures
Source:
AUTHOR'S SELF GENERATED
Revolutionizing object recognition beyond CNN and YOLO with deep learning breakthrough 35
computer vision, object detection plays a piv- Sophisticated neural networks often employ
otal role. This technique simplifies tasks such COCO sets, a kind of rigorous, better visual
as pose estimation, vehicle identification, sur- dataset. As an illustration, COCO has been
veillance, and more. used extensively to evaluate and compare real-
In contrast to classification algorithms, time object identification skills. The formats
object identification techniques use a bound- of the COCO dataset are quickly interpreted
ing box to encircle the object of interest by sophisticated neural network frameworks.
inside an image. Predicting the exact number The various attributes of COCO are
of bounding boxes in an object identification
scenario that accurately represent the numer- • Segmentation of objects with comprehen-
ous places of interest may be challenging. The sive prototype annotations
variable length of the output layer, reflect- • Contextualizing apprehension
ing the changing number of items of interest, • Super pixel stuff segmentation
makes it impractical to address this issue by • More than 200’000 images of the total
simply adding a fully connected layer on top 330’000 are labelled
of a conventional convolutional network. • 1.5 Mio object prototype
To overcome these challenges, a solution • 80 object assorts, the “COCO classes”,
involves identifying specific regions of interest which comprises “things” for which indi-
and applying a CNN algorithm to determine vidual instances may be promptly labelled
whether an object is located in the specified (human-being, automobile, any kind of
region. The initial approach of creating a furniture etc.,)
large number of areas could lead to computa- Let’s utilize the image from the previous
tional challenges. As a result, algorithms like section as input for an object detection pro-
R-CNN, YOLO, and others have been devel- cess, which encompasses two tasks [8]: object
oped to swiftly identify instances of interest. localization and image classification. Initially,
object localization draws bounding boxes
4. Proposed Method around one or more objects in an image, as
illustrated in Figure 4.2. Subsequently, image
The following arguments make the YOLO classification predicts the type or class of an
algorithm crucial: object by comparing it with a predefined
dataset and assigning a class label to the
1. Speed: This technique is able to predict
image. Consequently, the YOLO algorithm
objects in real time, which speeds up
is employed for both object localization and
detection.
image classification.
2. High accuracy: With minute background
error, the YOLO forecast approach yields • The advantages of this approach include:
decisive results. • Facilitating the correct identification of
3. Learning capability: Due to the algo- objects through speech.
rithm’s superior learning capabilities, it is
capable of distinguishing object represen-
tations and use them for detecting
algorithms consist of interconnected lay- given time, the camera will identify and label
ers. The hidden layers are found in the 5–6 objects, as illustrated in Figure 4.4.
front-end layer, which is addressed as the These steps offer an overview of the key
input layer, and the back-end layer, that procedures involved in running your Python
which is addressed as the output layer. program, starting from importing libraries
The term ‘deep’ indicates a network that to the continuous video processing loop, and
connects neurons across more than two concluding with the program’s termination.
layers. Each Hidden layer comprises neu- Keep in mind that executing the program
rons that are activated during the process. requires running it within a suitable Python
The network consumes large volumes development environment or IDE.
of input data, processing them through
several layers, and progressively learns 1. Import necessary libraries (cv2, imutils,
intricate characteristics of the data at numpy, pyttsx3).
each layer. This iterative learning process 2. Define a text-to-speech (TTS) function.
occurs at each stage of the layer, allowing • Initialize the TTS engine.
the network to understand progressively • Adjust the TTS engine’s properties.
complex features of the input data. • Use TTS to speak labels.
• Trained Data: In this work, a pre-defined 3. Load the YOLO model and class names.
dataset has been imported, consisting of a 4. Open a camera feed for video capture.
network trained on more than 50 images. 5. Start a loop to continuously process
This trained network excels in classify- frames from the camera.
ing photos into various object categories, • Resize the frame for processing.
encompassing a wide range, from animals to • Detect objects in the frame using
everyday objects like keyboards, mice, and YOLO.
various stationery items. The pre-trained • Filter and display the detected objects.
model utilized in this context is COCO • Use TTS to announce the labels of
(Common Objects in Context). Leverag- detected objects.
ing the OpenCV-contrib-python package, • Continue processing frames until the
the recognized objects are compared to a user presses ‘q’ to quit.
pre-trained database. The identified images 6. Release the video capture when done.
are then labeled through a tagging process,
translating the visual information into
text. Subsequently, the spelled-out items
are announced using the winsound pack-
age, and the text is converted into speech
through the pyttsx3 package.
Abstract: The construction sector, being one of the least digitized and major contributors in developed or
developing economies faces lots of challenges. We see an opportunity for reorienting the sector with cutting-
edge information and communication technologies (ICTs) integration. The construction sector challenges
namely poor productivity, lower efficiencies, safety, and sustainability can be addressed by ICT adaptation. The
research objective is to investigate the efficacy of utilizing ICTs as a technological intervention for the Indian
construction sector. The methodology adopted in this research study encompasses a hybrid approach, combin-
ing qualitative interviews of industry professionals and quantitative analytics of data gathered from question-
naire survey of construction projects. The findings of the questionnaire survey highlight that we can harness
emerging digital technology in various construction tasks to overcome challenges of the sector, and also identify
numerous potential benefits of utilizing ICTs. Additionally, the study also explores the challenges and barriers
faced by stakeholders in the adoption and implementation of cutting-edge ICTs within construction companies.
Keywords: Construction sector, cutting-edge ICTs, efficacy, productivity, efficiency, safety, cost-effectiveness
[email protected]; [email protected]
a
DOI: 10.1201/9781003606635-5
Investigating efficacy of emerging ICTs for the Indian construction sector 41
ICT adaptation in different construction extract meaningful insight from it, which ulti-
tasks proliferates the probability of success- mately will help in better decision-making.
ful completion of construction projects. In Doing so all stakeholders can benefit from it
this research work, we have identified various and coordination and communication will be
construction tasks where ICTs can be utilized, in a very efficient and effective manner. This
numerous advantages of using ICTs in con- sharing of information will curtail the time
struction companies, and different hindering required for data gathering, processing, and
factors coming in the way of ICT adaptation decision-making [8, 9]. Researchers have also
by the construction sector [4-6]. So, to carry highlighted that the utilization of wireless
out our research work we have conducted a networking omits the need for fellow work-
series of interviews with industry profession- ers, not to be present physically at the site,
als and recorded their valuable opinions and at the same moment. Web-based companies
suggestions. We have also prepared a ques- can get an edge in their operations [10]. Few
tionnaire, distributed it among the industry researchers have highlighted virtual modeling
expert, obtained their inputs, and lastly ana- for building design. It includes all relevant
lyzed the data obtained. The utilization of design information needed for every con-
emerging ICTs in Indian construction compa- struction phase during the project life cycle.
nies is a technological paradigm shift that has Any modification in the models gets updated,
the potential not only to change the way the and any design-related information may get
industry is working but also to enhance pro- extracted from this database, automatically
ductivity and efficiency, resulting in a higher [11, 12]. Some researchers are also talking AQ1:
Please
success rate of the projects. about the formation of a virtual team for col- provide
laborative purposes to improve communica- reference
tion, coordination and sharing of information citation
for refer-
2. Literature Review of ICT among stakeholders, teams, and enterprises. ences 13,
Adaptation in the Construction The ideation and creation of virtual teams for 14, 20,
21.
construction companies have been advised
Companies by the researchers [15]. ICTs may support
After the review process of the literature, we the virtual team for routine operations, but
have found that Some research papers high- unfortunately, construction enterprises are
lighted that the industry is using some basic much behind in adopting them.
ICTs like MS Office, AutoCAD, Wi-Fi, etc. [6, The present scenario of ICTs utilized in
7] for construction tasks. Many authors con- different construction company activities is
cluded that the utilization of ICTs can aid in discussed in this section. We have studied sev-
enhancing the present situation of construction eral conference papers, journal papers, blogs,
companies, apart from the fact that construc- and articles on different websites, discussing
tion companies are digitally divided, they need old and current trends of the different ICTs
to embrace ICTs to maximize the productivity for construction tasks or applications. It has
and efficiency of the construction enterprises. been noticed that many construction activities
Transfer of data and information among harnessed BIM, AutoCAD, mobile/web-based
the stakeholders are very slow and limited tools and technologies, virtual conferencing,
during and after the construction work as and information sharing systems, etc. [16,
many professionals are not interested in shar- 17]. Few articles, white papers, and bloggers
ing information and keeping it in their silos. have mentioned adaptation of emerging ICTs
So, with the advent of these newer commu- viz. drone, IoT, 5G, Cloud, Blockchain, and
nication technologies in the construction sec- AI/ML, etc. may be good options for different
tor, companies can get this precious data and construction activities/tasks. Deployment of
42 Innovations in Computational Intelligence: Trends and Technologies
interviews. In 223 questionnaires were dis- middle management and 3rd cadre is lower
tributed for data collection and we obtained management. The participation of the 1st
118 responses. cadre is 37% whereas 41% of respondents
A Likert scale of 3-points has been used for are playing their role under the 2nd cadre and
analysis of data, where the scale ranges from belonging in the middle management catego-
1 to 3. The scale of “Agree” was 3, “Disagree” ries. The lower management category share
was scored 2, and “Neutral” was scored 1, is 22%.
The statistical tool used for data analysis and
visual representation of this research study
was Microsoft Excel. 4. Results and Discussion
After the questionnaire survey of the con-
3.4. Types of construction companies struction companies, it has been noticed
that emerging ICTs viz. drone, IoT, and 5G
that contributed to the study
technology and cloud, etc. can be a power-
Figure 5.1 shows the types of construction ful digital solution for the construction sector
enterprises that participated in the research to improve productivity and efficiency with
study. The contribution of large-scale enter- the enhanced safety of the personnel. These
prises is 33% whereas 41% of enterprises are cutting-edge ICTs can be used for various
in medium-scale categories, collectively these construction tasks and it has the potential to
two categories make it nearly three-fourths change the ways construction tasks are per-
of the participating organization. Small-scale formed through conventional approaches.
and microscale enterprise shares are 15% and
11% respectively. 4.1. ICTs can be utilized to perform
different construction sector’s
3.5. Cadre-based classification tasks
(CBC) of respondents
4.1.1. Topographic mapping and land
Figure 5.2 shows the Cadre-based classifica-
tion of the respondents and this cadre depends survey
upon the type of role they performed in their Topographic mapping and land survey-
enterprises. There are three cadre of respond- ing using ICT, particularly drones have
ents that participated in the research study. become increasingly popular due to their
1st cadre is higher management, 2nd cadre is time-efficient, cost-effective and ability to fly
AQ2:
Please
provide
source
for all the Figure 5.1. Types of construction companies Figure 5.2. Cadre-based classification of
figures contributed to the study. respondents.
and tables
Source: Source:
AUTHOR'S SELF GENERATED
AUTHOR'S SELF GENERATED
44 Innovations in Computational Intelligence: Trends and Technologies
4.5. Hindering factors for ICT management support is ranked 2nd with 81%
adaptation in the indian of respondent’s opinion. 79% of Respondents
construction sector are in the notion that the training of employ-
ees to use ICTs is also a serious hurdle and
As depicted in Figure 5.5, the primary barrier ranked as 3rd. Fear of job security is also a
to ICT adoption in the construction sector prime concern for the respondents with 71%,
is the higher cost of purchasing and main- ranked as 4th. Government support for ICT
taining ICTs. 85% of respondents say that integration is at 5th place with 68% and lastly,
the biggest concern is the higher cost of ICT legal and regulatory compliance have the last
adoption. 81% of respondents feel manage- position in the matrix with 64%. Apart from
ment support is 2nd biggest concern. 79% of the above hindering factors respondents also
responders rate training on ICT as a serious highlighted the limited skill of personnel with
concern. 71% of respondents also think that low expertise in managing/handling software
job security is a major hurdle for ICT adapta- solutions and digital devices, data analysis,
tion in construction companies and concerns and its interpretation.
regarding legal and regulatory compliance
are shared by 64% of respondents. Addition-
4.7. Overall performance of
ally, according to 68% of respondents, govt.
support poses a significant obstacle to ICT construction companies after
adoption in the construction industry. ICT adaptation
The utilization of emerging ICTs for construc-
4.6. Ranking of hindering factors tion companies is in the nascent stage and
for ICT adaptation as per has the potential to enhance the overall per-
respondent’s opinion formance of the enterprises. The majority of
in the construction industry. Am J Sci Ind [20] Chien HJ, and Barthorpe S. The current state
Res. 2011. of information and communication technol-
[8] Information and communications technol- ogy usage by small and medium Taiwanese
ogy in construction. Designingbuildings. construction companies. J Inf Technol Con-
co.uk. Last edited March 30, 2022. Accessed str. 2014;15(5):75–85.
September 28, 2024. [21] Mesaros P, and Mandiak T. Impact of ICT on
[9] Paudyal G. Role of ICT in construction. In: performance of construction companies in
National Students Conference on Informa- Slovakia. IOP Conf Ser Mater Sci Eng. 2017.
tion Technology (NaSCoIT). Nepal; 2016. [22] Griffis FH, Hogan DB, and Li W. An analy-
[10] Orihuelaa P, Orihuelab J, and Pachec S. sis of the impact of using three-dimensional
Information and communications technol- computer models in the management of con-
ogy in construction: A proposal for pro- struction. Constr Ind Inst (CII) Austin, TX,
duction control. In: Creative Construction USA. 1995;Research Report 106–11.
Conference 2016, CCC 2016; 2017:25–28. [23] Kang Y, O’Brien WJ, Thomas S, and Chap-
[11] Sharma DK. Digital revolution 4.0: Informa- man RE. Impact of information technologies
tion and communication technology (ICT) on performance: Cross-study comparison. J
in construction industry. JK Lakshmipat Constr Eng Manag. 2008;134:852–863.
University, Jaipur; July 16, 2020. [24] Owolabi OSB, and Olufemi ODK. Effect of
[12] Hosseini MR, Chileshe N, Zuo J, and the use of ICT in the Nigerian construction
Baroudi B. Approaches of implementing ICT industry. Int J Eng Sci. 2018;7(5):71–76.
technologies within the construction indus- [25] Mu’azu DA. The role of the professional
try. Univ South Aust. 2013. builder in the Nigerian construction industry.
[13] Chinowsky PS, and Rojas E. A guide to suc- ATBU J Environ Technol. 2015;1(1):29–31.
cessful implementation: A report on con- [26] Yisa SO. An investigation into the use of
struction industry institute. Univ Texas ICT in the Nigerian construction industry.
Austin, Constr Ind Inst. 2012. Unpublished HND Project, Department of
[14] Brandon PS, Kocaturk T, and Foundation R. Building Technology, The Federal Polytech-
Virtual futures for design, construction and nic, Ado Ekiti. 2014.
procurement. Malden, Ma: Blackwell Pub; [27] Oladapo AA. The impact of ICT on pro-
2018. fessional practice in the Nigerian construc-
[15] Zhang Y, Gregory M, and Shi Y. Global engi- tion industry. Electron J Inf Syst Dev Ctries.
neering networks (Gen): Drivers, evolution, 2016;24(2):1–19.
configuration, performance and key patterns. [28] Leverage on ICT in construction industry.
J Manuf Technol Manag. 2008;19:299-314. New Strait Times. May 13, 2018.
[16] Chen C, and Messner JI. A recommended [29] Al-shammary S, and Ali AA. ICT hindering
practices system for a global virtual engi- factors applied in Jordan construction pro-
neering team. Archit Eng Des Manag. jects. Civ Eng Archit. 2017;5(3):83–88.
2014;6:207–221. [30] Hassan A, and Afrah MHK. Identification
[17] Adwan EJ, and Al-Soufi A. A review of ICT and analysis of hindering factors of ICT
technology in construction. Int J Manag Inf adoption in project management in Iraq. J
Technol. 2016;8(3/4). Univ Babylon Eng Sci. 2019;27(3).
[18] Sarshar M, and Isikdag U. A survey of ICT [31] Shah K, Soni N, and Shah Z. Scrutinizing
use in the Turkish construction industry. Eng attributes influencing role of information
Constr Archit Manag. 2015;11(4):238-247. communication technology in building con-
[19] Mutesi N. Application of ICT in the con- struction. Int Res J Eng Technol. 2020;7(3).
struction industry in Kampala. In: Advances [32] Vasista TG, and Abone A. Benefits, barri-
in Engineering and Technology: Proceedings ers and applications of information com-
of the Second International Conference on munication technology in construction
Advances in Engineering and Technology, industry: A contemporary study. Int J Eng.
Kampala. 2013. 2016;105:933–939.
6 AgriTech: Empowering agriculture
through integrated technology
Pankaj Kunekara, Anushka Popalghatb, Onkar Borudec, Vishal
Gavalid, Dnyanesh Gholape, and Sarvesh Hadolef
Department of Information Technology Vishwakarma Institute of Technology, Pune, India
Abstract: Agriculture plays a pivotal role in ensuring global food security and economic stability. In an era of
rapidly advancing technology, harnessing the power of data and innovation is vital to address the multifaceted
challenges faced by farmers. AgriTech is a comprehensive agricultural technology system designed to empower
farmers at every farming stage. Leveraging a range of technologies, including Full Stack Web Development,
Ethereum, Alan AI and Various Machine learning algorithms, this multifaceted solution offers features such as
nearby soil testing laboratory location, crop recommendations, gamified plant growth mentoring, plant disease
detection, crop price prediction, expert consultations, an integrated e-commerce marketplace, and Realtime
weather monitoring with location-based alerts. This paper provides an overview of AgriTech’s architecture,
emphasizing its technology integration, machine learning applications, and potential impact on modern farm-
ing practices, including enhanced productivity, sustainability, and resource efficiency. AgriTech represents a
pioneering approach to digital agriculture, bridging the gap between traditional farming and the digital era.
Keywords: Agriculture technology, precision farming, crop price prediction, soil testing, disease detection, crop
recommendation
a
[email protected]; [email protected]; [email protected]; dvishal.gavali21@vit.
edu; [email protected]; [email protected]
DOI: 10.1201/9781003606635-6
AgriTech: Empowering agriculture through integrated technology 51
advancement but also a testament to the syn- field which encompasses a wide range of tech-
ergy between human ingenuity and the relent- nologies, including precision farming, robot-
less pursuit of food security and ecological ics, artificial intelligence, and biotechnology,
harmony in an ever-changing world. which have already begun transforming the
agricultural landscape [8]. Discuss the impact
of Internet of Things on farming, including
2. Literature Review using sensors for soil, water, light, humidity,
The authors provide a comprehensive review and temperature management [9]. The paper
of recent advances in image-processing tech- proposes a Blockchain-based framework for
niques for automating leaf pests and disease data quality management in the context of
recognition. They discuss the various stages COVID-19, aiming to ensure a high level of
involved in the image-processing pipeline, data trust, security, and privacy. It explores
from image acquisition to feature extrac- the use of innovative technologies such as
tion and classification [1]. The study Intro- Blockchain, Artificial Intelligence, and Big
duces a framework for crop price forecasting Data in tracking infectious disease outbreaks
in emerging economies, emphasizing the and improving reporting accuracy [10].
importance of accurate price predictions for
farmers and policymakers. The proposed 3. Methodology
framework includes data quality assessment,
In response to the evolving agricultural land-
feature selection, and modeling, offering
scape, the AgriTech project emerges as a com-
advantages such as improved data quality
prehensive agricultural technology platform.
and feature selection techniques for enhanced
This support ranges from initial crop selec-
accuracy [2]. The system’s two-tier architec-
tion to the monitoring of crop growth and
ture and various sensors offer advantages like
culminates in facilitating marketing and sales.
real-time monitoring and portability, while
The platform leverages an amalgamation of
challenges include data quality and real-time
cutting-edge technologies and data-driven
performance [3]. This research Focuses on
methodologies to provide a holistic and User-
online price forecasting for cryptocurrencies
friendly agricultural support system.
like Bitcoin, Ethereum, and Ripple, utilizing
Frontend technologies and functionalities:
artificial intelligence techniques. The model’s
Frontend stack: The front of the AgriTech
advantages include periodic predictions and
platform is built using React, a renowned
customization options.[4].
JavaScript library for developing user inter-
The authors address crop price predic-
faces. This choice of technology ensures a
tion in developing nations, using decision tree
User-friendly and interactive experience.
regression techniques [5]. Authors Delves into
User interface: The frontend features a
crop yield and price forecasting using machine
user-friendly map-based interface, designed
learning, employing the decision tree algo-
to enhance accessibility and usability for
rithm. This research enhances crop yield pre-
farmers.
diction based on weather and price trends [6].
Features:
The authors introduce a neighborhood-
based strategy to optimize parameters and
obtain maximum yield, expanding knowl- 3.1. Soil testing labs map
edge through population exploration. The Farmers can easily locate nearby soil testing
paper presents a method to increase soil fertil- laboratories, simplifying the crucial process
ity performance by providing nutrient recom- of soil quality assessment. This feature facili-
mendations for optimal crop development [7]. tates data-driven decisions about crop selec-
The study examines the Modern agricultural tion and soil management.
52 Innovations in Computational Intelligence: Trends and Technologies
3.4. Coin-based e-commerce
marketplace
AgriTech implements a coin-based reward
system during the plant growth mentoring
process. These earned coins can be redeemed
within an integrated e-commerce market-
Figure 6.2. Heatmap for crop recommendation. place, fostering user engagement and partici-
Source:AUTHOR'S SELF GENERATED
pation.[16,17]
evaluation of machine learning models for impact on modern farming practices. The
automated disease detection. results from table 6.1 and table 6.2 can be sum-
The [Crop Price Prediction Dataset] -marized as follows:
(https://github.com/posi2/Crop-Price-Pre- 1. Improved crop recommendations:
diction) offers historical data on crop prices, Through the utilization of the SVM with
market trends, and relevant factors, serv- an RBF kernel, AgriTech successfully pro-
ing as a foundation for crop price forecast- vided personalized crop recommenda-
ing models that benefit both farmers and tions to farmers.
policymakers. 2. Efficient disease detection: The implemen-
Meanwhile, the [Crop Growth Stage tation of the MobileNetV2 deep learning
Dataset] (https://github.com/jahaniam/Crop- model for plant disease detection exhib-
GrowthStage) provides valuable insights into ited remarkable accuracy in identifying
the growth stages of different crops, aiding and classifying various plant diseases
precision agriculture and crop management from images of leaves. This functionality
research. offered rapid disease diagnosis, allowing
These datasets collectively empower agri- farmers to take timely measures for dis-
cultural advancements, from disease identi- ease management and crop protection.
fication to crop price prediction and growth 3. Enhanced user engagement: The coin-
monitoring. based reward system within the integrated
e-commerce marketplace effectively
5. Results and Discussion increased user engagement. Farmers
actively participated in the plant growth
The AgriTech platform has undergone rigor- mentoring process to earn coins, which
ous testing and real-world implementation, could be redeemed for agricultural prod-
AQ3: resulting in several key findings and outcomes ucts and tools.
Cita- that demonstrate its efficacy and potential 4. Real-time weather insights: AgriTech’s
tions for
both the real-time weather monitoring and alerts
tables are Table 6.1. Algorithm and accuracy provide farmers with essential weather
missing in
the text, Algorithm Accuracy Functionality data, including temperature, humid-
please ity, and rainfall. Farmers reported that
provide SVM + RBF 98.72% Crop
the Kernel Recommendation these insights significantly contributed
appro- to informed decision-making regarding
priate MobileNetV2 98.9% Disease Prediction
CITATION
citations
ADDED
planting and harvesting, resulting in more
Random Forest 97.1% Crop Price efficient resource utilization and crop
AQ4: Regression Prediction management.
Please
provide
Source:
AUTHOR'S SELF GENERATED 5. Secure and transparent transactions: The
source integration of the Ethereum blockchain
for all the
Tables Table 6.2. Comparison with previous work into AgriTech’s e-commerce marketplace
ensured secure and transparent transac-
Algorithm Previous Current tions. Users appreciated the added layer
Accuracy Accuracy
of trust and transparency in their mar-
SVM 98.2% [14] 98.72% ketplace interactions, which is especially
CNN 95.05% [20] 98.9% critical in the agricultural sector.
6. Improved communication: Agora SDK’s
Random Forest 98% [21] 98%
video conferencing capabilities facili-
Regression
tated real-time video calls and chat func-
Source: tionality, enhancing communication and
AUTHOR'S SELF GENERATED
AgriTech: Empowering agriculture through integrated technology 57
support for farmers. This improved com- India’s Livelihoods. 2023:107. Terborgh J.
munication enabled farmers to seek expert Preservation of natural diversity. BioScience.
consultations and collaborate effectively 2009;24:715–22.
with peers. [3] Reyana A, Kautish S, Karthik PS, Al-Baltah
7. Conversational AI: The integration of IA, Jasser MB, and Mohamed AW. Acceler-
ating crop yield: multisensor data fusion and
Alan AI for voice commands enhanced
machine learning for agriculture text classifi-
the platform’s accessibility, allowing users
cation. IEEE Access. 2023;11:20795–20805.
to interact with AgriTech using natural [4] Sundaram P, and Suparna K. Crop recom-
language. This feature proved particu- mendation system using machine learning. J
larly useful for users who may have lim- Eng Sci. 2023;14(09).
ited typing abilities or prefer voice-based [5] Sharma P, Dadheech P, and Senthil ASK. AI-
interactions. enabled crop recommendation system based
on soil and weather patterns. In: Artificial
Intelligence Tools and Technologies for
6. Conclusion Smart Farming and Agriculture Practices.
In conclusion, the AgriTech project represents IGI Global; 2023:184–199.
a pioneering and comprehensive agricultural [6] Baishya DR. International Journal for
technology platform that bridges the gap Research in Applied Science and Engineer-
ing Technology. 2020;8(IV).
between traditional farming practices and
[7] Ahmed U, Lin JCW, Srivastava G, and Dje-
the digital age. AgriTech empowers farm-
nouri Y. A nutrient recommendation system
ers at every stage of the agricultural process, for soil fertilization based on evolution-
from crop selection to growth management, ary computation. Comput Electron Agric.
disease detection, and price forecasting. The 2021;189:106407.
platform’s machine learning capabilities pro- [8] Green S. Reshaping the future of agriculture
vide personalized insights and data-driven through agri-tech innovations. Int Multidis-
recommendations, fostering enhanced pro- cip J Sci Technol Bus. 2023;2(02):1–4.
ductivity, sustainability, and resource effi- [9] Rathod ML, Shivaputra A, Umadevi H,
ciency. The implementation of MobileNetV2 Nagamani K, and Periyasamy S. Cloud com-
for plant disease detection and the integration puting and networking for SmartFarm Agr-
of the Agora SDK for real-time video commu- iTech. J Nanomater. 2022.
nication further demonstrate the platform’s [10] Ezzine I, and Benhlima L. Technology against
COVID-19: a blockchain-based framework
commitment to offering holistic support to
for data quality. In: 2020 6th IEEE Con-
farmers. As digital agriculture continues to
gress on Information Science and Technol-
evolve, AgriTech serves as a testament to the ogy (CiSt). IEEE; 2021:84–89.
potential of technology to revolutionize and [11] Yu J, Yin H, Xia X, Chen T, Li J, and Huang
improve farming practices, making a signifi- Z. Self-supervised learning for recommender
AQ5:
cant contribution to the well-being of farm- systems: a survey. IEEE Trans Knowl Data
Refer- ing communities worldwide. Eng. 2023.
ences are [12] Bandara P, Weerasooriya T, Ruchirawya T,
missing
Nanayakkara W, Dimantha M, and Paba-
cita-
tions in
References sara M. Crop recommendation system. Int J
the text. [1] Ngugi LC, Abelwahab M, and Abo-Zahhad Comput Appl. 2020;975:8887.
Please
ensure
M. Recent advances in image processing [13] Iqbal M, Kumar V, and Sharma VK. Krishi
that all techniques for automated leaf pest and dis- Portal: web-based farmer help assistance. Int
references ease recognition: a review. Inf Process Agric. J Adv Sci Technol. 2007;29:4783–4786.
are cited
2021;8(1):27–51. [14] Bakthavatchalam K, Karthik B, Thiru-
and in
sequential [2] Kanitkar A, and Wadekar I. Digital Agri- vengadam V, Muthal S, Jose D, Kotecha
order. culture: Is this the Future of ‘New’. State of K, and Varadarajan V. IoT framework for
58 Innovations in Computational Intelligence: Trends and Technologies
Abstract: The pandemic, heatwave brought life to a standstill, if not for older but for young ones and students
it brings things to a standstill, presenting a significant obstacle to humanity. However, online learning offers
flexibility, interaction, and cooperation. This article aims to compare and contrast the results of student surveys
and explore the differences between live online instruction and conventional classroom instruction, as well
as the future of education in universities and colleges. The study was conducted at several universities in the
Mathura region of Uttar Pradesh, India, with 150 participants selected from those enrolled in online and offline
university courses, aged between 16 and 40 years. The students were then asked to complete a detailed question-
naire. 58.95% of students mostly agreed with the question in the survey, while 36.69% disagreed. As per the
survey analysis, online learning seems to be more effective. It is concluded that traditional classroom teaching
has advantages for students, saves them time, and improves their academic performance in the current environ-
ment of the COVID-19 epidemic. Higher education institutions must collaborate to make these initiatives effec-
tive, especially by decentralizing educational teleconferences and granting access to surrounding institutions to
ensure that all students have reliable internet connectivity.
learning readiness Estira (2020). Another and Solomon (2021). Atika Qazi et al.2020
state university survey found that students are Qazi et al. (2020) 320 students participated
ready for online lessons, but renting comput- in study about learning in different modes
ers and the Internet in cafes is a burden Yra, during the COVID-19 pandemic. The study
Castillo, Bautista, Camayang, and Camayang concluded that online education is the only
(2020). This study assesses students’ internet solution and effective way Qazi et al. (2020).
connection and learning devices for online or The vast majority (70.4%) of the survey
flexible learning. The study will show school respondents said they would advise use of
administrators how students and staff will e-learning material. Online learning scores
modify teaching-learning procedures. The 4/5 for effectiveness, while offline learning
result will be used to institutionalize flexible scores 3/5 Yang et al. (2022).
learning in the future.
3. Material and Method
2. Literature Review
Favale et al. 2020 Favale, Soro, Trevisan, 3.1. Study design
Drago, and Mellia (2020), The infrastructure The online survey is used to collect data and
for the internet is under pressure as a result respondents’ responses. A questionnaire was
of this sudden spike in usage. E-learning designed to capture respondents’ opinions.
tools like Microsoft Teams and Zoom were The purpose of this study is to see the mood of
quickly adopted. Students are more aware of students at the university level about learning
online learning. E-learning, however, may be techniques adopted by their higher education
extremely challenging for teachers Favale et institutions during the pandemic covid-19 in
al. (2020) who not habitual of making pow- Braj area of Uttar Pradesh which constitutes
erpoint ppts. Agra, Mathura, and some parts of Aligarh.
Padmalini Singh et al. 2021 Singh et al.
(2021), conducted a study at India, Indo- Table 7.1. Participants distribution on the basis
nesia, and Malaysia on learning with 100 of Age
respondents. they compare online and offline
Age Frequency Percentage AQ4:
learning. their study shows traditional teach- Please
ing is more effective than online teaching 16–20 40 26 provide
21–25 46 31 in-text
Singh et al. (2021). Elyassi et al. 2021 Elyassi citation
et al. (2021), various changes in the psychic 26–30 25 16.6 for Tables
of students due to lockdown and pandemics 31–35 19 13
1 to 3.
normal in the post-COVID-19 era, we need Table 7.2. Participants distribution on the basis
to return to traditional classroom teach- of Gender
ing Dalai, Dey, Chatterjee, Chakravorti, and Gender Frequency Percentage
Bhattacharya (2014). Sheba et al. 2021 sur- Female 85 56.6
veyed 450 students for effectiveness of online
Male 65 43.3
study material. students found the mate-
rial was effective when used with anima- Total 150 100
tions, PPT, and visuals Darius, Gundabattini, Source:
AUTHOR'S SELF GENERATED
62 Innovations in Computational Intelligence: Trends and Technologies
the effectiveness of new techniques adopted internet struggling province in the philip-
by various higher educational institutes and pines. Indian Journal of Science and Tech-
government guidelines during COVID-19 for nology, 12 (10), 1–4.
continued learning. The study was conducted [8] Chase, T. J., Julius, A., Chandan, J. S., Powell,
in the Indian state of Uttar Pradesh in the Brij E., Hall, C. S., Phillips, B. L., and Fernando,
B. (2018a). Mobile learning in medicine: an
region. A total of 150 participants partici-
evaluation of attitudes and behaviours of
pated and responded to questions. We con-
medical students. BMC medical education,
clude that in our study online education and 18 (1), 1–8.
techniques are effective and most students are [9] Chase, T. J., Julius, A., Chandan, J. S., Powell,
satisfied with it. E., Hall, C. S., Phillips, B. L., . . . Fernando, B.
(2018b). Mobile learning in medicine: an eval-
uation of attitudes and behaviours of medical
5. Conclusion students. BMC medical education, 18 (1), 1–8.
We can conclude based on the responses col- [10] Chung, E., Subramaniam, G., and Dass, L.
lected, upon analyzing the responses, online C. (2020). Online learning readiness among
learning could be adopted. Online learning university students in malaysia amidst covid-
19. Asian Journal of University Education,
could be more effective if devices and inter-
16 (2), 45–58.
net costs could be subsidized and reach rural
[11] Cleofas, J. V., and Rocha, I. C. N. (2021).
areas. Demographic, gadget and internet profiles
as determinants of disease and consequence
related covid-19 anxiety among filipino col-
References lege students. Education and Information
[1] Aboagye, E., Yawson, J. A., and Appiah, K. Technologies, 26 (6), 6771–6786.
N. (2021). Covid-19 and e-learning: The [12] Dalai, S., Dey, D., Chatterjee, B., Chakra-
challenges of students in tertiary institutions. vorti, S., and Bhattacharya, K. (2014). Cross-
Social Education Research, 1–8. spectrum analysis-based scheme for multiple
[2] Ahmed, S. S., Khan, E., Faisal, M., and Khan, power quality disturbance sensing device.
S. (2017). The potential and challenges of IEEE Sensors Journal, 15 (7), 3989–3997.
moocs in pakistan: a perspective of students [13] Darius, P. S. H., Gundabattini, E., and Solo-
and faculty. Asian Association of Open Uni- mon, D. G. (2021). A survey on the effective-
versities Journal, 12 (1), 94–105. ness of online teaching–learning methods for
[3] Akbar, M. A., Rashid, M. M., et al. (2018). university and college students. Journal of
Technology based learning system in inter- The Institution of Engineers (India): Series
net of things (iot) education. In 2018 7th B, 102 (6), 1325–1334.
international conference on computer and [14] Elyassi, H., et al. (2021). Economics of the
communication engineering (iccce) (pp. financial crisis: any lessons for the pandemic
192–197). downturn and beyond? Contemporary Eco-
[4] Alexander, S. (2001). E-learning develop- nomics, 15 (1), 100–121.
ments and experiences. Education+ Train- [15] Estira, K. L. A. (2020). Online distance
ing, 43 (4/5), 240–248. learning readiness of business administra-
[5] Apuke, O. D., and Iyendo, T. O. (2018). Uni- tion students in one state university in the
versity students’ usage of the internet resources philippines. Journal of Critical Reviews, 7
for research and learning: forms of access and (12), 826–832.
perceptions of utility. Heliyon, 4 (12). [16] Fabito, B. S., Trillanes, A. O., and Sarm-
[6] Bell, B. S., and Federman, J. E. (2013). iento, J. R. (2020). Barriers and challenges
E-learning in postsecondary education. The of computing students in an online learn-
future of children, 165–185. ing environment: Insights from one private
[7] Casillano, N. F. B. (2019). Challenges of university in the philippines. arXiv preprint
implementing an e-learning platform in an arXiv:2012.02121.
64 Innovations in Computational Intelligence: Trends and Technologies
[17] Favale, T., Soro, F., Trevisan, M., Drago, I., Conventional to online education during
and Mellia, M. (2020). Campus traffic and covid-19 pandemic: Do develop and under-
e-learning during covid-19 pandemic. Com- developed nations cope alike. Children and
puter networks, 176, 107290. Youth Services Review, 119, 105582.
[18] Gedera, D., Williams, P. J., and Wright, N. [26] Romeo, G. (2006). Engage, empower, enable:
(2013). An analysis of moodle in facilitating Developing a shared vision for technology in
asynchronous activities in a fully online uni- education. Engaged learning with emerging
versity course. International Journal of Sci- technologies, 149–175.
ence and Applied Information Technology [27] Serhan, D. (2020). Transitioning from face-
(IJSAIT), 2 (2), 6–10. to-face to remote learning: Students’ atti-
[19] Gezgin, D. M. (2017). Exploring the influ- tudes and perceptions of using zoom during
ence of the patterns of mobile internet use covid-19 pandemic. International Journal of
on university students’nomophobia levels. Technology in Education and Science, 4 (4),
European Journal of Education Studies. 335–342.
[20] Hossain, M. A., and Rahman, M. H. (2017). [28] Shafaati, A., Valizade, R., Rahimi, A., and
Comparative study of internet usage among Panahi, A. (2022). The role of smart urban
university students: A study of the university develop- ment in the development of the
of dhaka, bangladesh. European Scientific dilapidated areas of tabriz city: A case study
Journal, 13 (34), 134–150. of 8th district of tabriz. Geography and
[21] Jin, W., and Junio-Sabio, C. (2018). Poten- Environmental Planning, 33 (1), 113–132.
tial use of mobile devices in selected public [29] Singh, P., Sinha, R., Koay, W. L., Teoh, K.
senior high schools in the city of manila phil- B., Nayak, P., Lim, C. H., . . . Aryani, D. N.
ippines. International Journal of Learning, (2021). A comparative study on effective-
Teaching and Educational Research, 17 (4), ness of online and offline learning in higher
102–114. education. International Journal of Tourism
[22] Lee, K. T. (2006). Creating ict-enriched and Hospitality in Asia Pasific (IJTHAP), 4
learner-centred environments: Myths, gaps (3), 102– 114.
and challenges. Engaged learning with [30] Tarimo, R., and Kavishe, G. (2017). Inter-
emerging technologies, 203–223. net access and usage by secondary school
[23] Lorenzo, A. R. (2017). Comparative study students in morogoro municipality, tanza-
on the performance of bachelor of secondary nia. International Journal of Education and
education (bse) students in educational tech- Development using ICT, 13 (2).
nology using blended learning strategy and [31] Yang, S., Tan, C., Madsen, D. Ø., Xiang, H.,
traditional face-to-face instruction. Turkish Li, Y., Khan, I., and Choi, B. J. (2022). Com-
Online Journal of Educational Technology- parative analysis of routing schemes based
TOJET, 16 (3), 36–46. on machine learning. Mobile Information
[24] Muthuprasad, T., Aiswarya, S., Aditya, K. S., Systems, 2022.
and Jha, G. K. (2021). Students’ perception [32] Yra, J. F. P., Castillo, R., Bautista, R. G.,
and preference for online education in india Camayang, J. G., and Camayang, A. G. G.
during covid-19 pandemic. Social sciences (2020). Students’ online learning readiness
and humanities open, 3 (1), 100101. and internet connectivity: Bases for the cus-
[25] Qazi, A., Naseer, K., Qazi, J., AlSalman, H., tomization of qsu e-aral. American Journal
Naseem, U., Yang, S., . . . Gumaei, A. (2020). of Educational Research, 8 (11), 878–884.
8 Strengthening UAV network security:
Advanced authentication-based
intrusion detection systems
Altaf C1,a, Shanila Mahreen2,b, C Atheeq3,c, and Shaista Khanam2,d
1
Department of ECE, Lords Institute of Engineering and Technical, Hyderabad, India
2
Department of ECE, Nawab Shah Alam College of Engineering and Technical, Hyderabad, India
3
Department of CSE, GITAM University, Hyderabad, India
Abstract: This article delves into contemporary Intrusion Detection Systems (IDS) designed for Unmanned
Aerial Vehicle (UAV) networks, emphasizing authentication-based approaches. With UAVs playing pivotal roles
across sectors, securing their communications is paramount. Traditional IDS often falls short in UAV scenarios,
necessitating innovative strategies. The proposed IDS employs advanced authentication mechanisms, including
cryptography, biometrics, and dynamic key generation. Cryptographic techniques ensure secure key exchange,
while biometric authentication ties UAV activities to verified identities. Dynamic key generation, bolstered by
chaotic maps, enhances security, making it computationally challenging for attackers. Anomaly detection and
machine learning contribute to the IDS’s adaptability, distinguishing normal and malicious UAV behavior.
Simulated evaluations using tools like ns3 quantify system performance, with metrics like Packet Delivery
Ratio, Delay, and Overhead providing insights. This authentication-based IDS presents a robust solution for
safeguarding UAV network integrity, addressing unique security challenges in diverse operational scenarios.
DOI: 10.1201/9781003606635-8
66 Innovations in Computational Intelligence: Trends and Technologies
infrastructure inspection and maintenance, sensitive information but also in ensuring the
UAVs offer a safer alternative to manual uninterrupted and reliable operation of UAVs
inspection, particularly in complex and ele- across various applications. UAVs heavily rely
vated structures [3]. They can capture high- on seamless communication for tasks such as
resolution images and data, facilitating the navigation, data acquisition, and command
early detection of potential issues and reduc- execution. Any compromise in communica-
ing the risks associated with traditional tion integrity can lead to severe consequences,
inspection methods. The versatility of UAV including loss of control, unauthorized access
networks is underscored by their adaptabil- to mission-critical data, and potential threats
ity to diverse environments and tasks. Their to public safety.
compact size, agility, and ability to operate One primary consideration in securing
in challenging terrains make them indispen- UAV communication is the protection of
sable tools in scenarios where conventional mission data. In applications like surveil-
methods may fall short. However, this tech- lance, infrastructure inspection, or disaster
nological revolution is not without its chal- response, the data collected by UAVs often
lenges, particularly concerning the security contains sensitive and confidential informa-
and integrity of the communication systems tion [6]. Unauthorized interception or tam-
within UAV networks. pering of this data not only compromises
As UAVs rely heavily on wireless com- the mission’s objectives but can also lead to
munication for control, navigation, and data privacy breaches and misuse of information.
transfer, ensuring the confidentiality, integrity, Therefore, robust security measures are essen-
and authenticity of the transmitted informa- tial to safeguard the confidentiality and integ-
tion is paramount. Unauthorized access, data rity of the data exchanged between UAVs and
tampering, and interception pose significant ground stations.
threats to the secure operation of UAV net- Moreover, securing communication is
works [4]. Therefore, implementing robust integral to maintaining control over UAV
security measures, including Intrusion Detec- operations. In scenarios where UAVs operate
tion Systems (IDS), becomes imperative to autonomously or semi-autonomously, secure
safeguard these networks against evolving communication ensures that commands from
cyber threats. ground control stations reach the UAV accu-
In the face of these challenges, the inte- rately [7]. Any interference or manipulation
gration of authentication-based IDS emerges in these commands could result in the UAV
as a promising solution. By implementing deviating from its intended path or executing
advanced authentication mechanisms, such as unintended actions, posing risks to both the
dynamic key generation with chaotic maps, UAV and its surroundings. Security breaches
UAV networks can enhance their resistance in communication can also open avenues for
against malicious attacks. This article delves malicious actors to take unauthorized control
into the intricacies of these authentication- of UAVs, leading to potential safety hazards
based approaches, exploring their potential and misuse of the technology [8].
to fortify the security posture of UAV net- Beyond the immediate operational con-
works and ensure the continued advancement cerns, the importance of secure communica-
of this transformative technology [5]. tion extends to the public’s perception and
Securing communication in Unmanned regulatory compliance. As UAVs become
Aerial Vehicle (UAV) operations is of para- more integrated into civilian airspace and
mount importance, given the critical nature daily life, ensuring their secure operation is
of the tasks these aerial platforms undertake. crucial to building public trust and meeting
The significance lies not only in protecting regulatory standards. The potential for UAVs
Strengthening UAV network security: Advanced authentication-based intrusion detection systems 67
and processing unique biometric data, specifi- Biometric authentication, a key element in
cally fingerprints, to create templates stored UAV network security, establishes a robust
in a secure database. During UAV opera- connection between UAV activities and veri-
tion initiation, real-time fingerprint data is fied identities. The algorithm initiates by
captured, matched against stored templates, collecting a set of n fingerprint data points
and upon successful authentication, access (Fingerprint = {P1, P2, ..., Pn}). These data are
authorization is granted to the identified then processed to create a biometric template
operator, ensuring only authorized individu- (Template = f(Fingerprint)), securely stored
als control the UAV. This robust authentica- in a database (Database = {Template1, Tem-
tion mechanism links UAV activities with plate2, ..., Templatem}). During UAV operation,
verified operator identities, enhancing overall the operator’s biometric data (Captured-
network security. Data = f(OperatorFingerprint)) is captured
On the other hand, the Dynamic Key and matched against stored templates. If
Generation with Chaotic Maps Algorithm the match is successful, access is authorized,
focuses on fortifying UAV communications ensuring that only authorized operators con-
through the dynamic generation of crypto- trol the UAV. This process enhances overall
graphic keys. Utilizing chaotic maps with network security by linking UAV activities to
unpredictable iterations based on initial verified operator identities.
conditions, the algorithm generates crypto- The Dynamic Key Generation with Cha-
graphic keys that are dynamically updated. otic Maps Algorithm fortifies UAV commu-
These keys are securely distributed across nications through the dynamic generation
the UAV network, serving as the foundation of cryptographic keys. The algorithm begins
for encryption and decryption processes. by setting initial conditions for a chaotic
Chaotic map synchronization ensures con- map (InitialConditions = {IC1, IC2, ..., ICk}).
sistency among communicating entities, and Through iterations, a sequence is generated
a comprehensive security analysis evaluates (xn+1 = f(xn, InitialConditions)), and crypto-
the algorithm’s effectiveness in safeguard- graphic keys (Kn = g(xn)) are derived. The keys
ing UAV communications. This dynamic key are dynamically updated for subsequent iter-
generation approach adds an extra layer of ations (Kn+1 = h(Kn)) and securely distributed
security, mitigating the risk of unauthorized across the UAV network (KeyDistribution =
access in UAV networks. {K1, K2, ..., Km}). Encrypted data (Encrypted-
Cryptography and key exchange play Data = E(OriginalData, Kn)) utilizes the key
a pivotal role in securing communications for encryption/decryption. Chaotic map
within Unmanned Aerial Vehicle (UAV) net- synchronization (Synchronization = i(Map1,
works, where sensitive information transmis- Map2)) ensures consistency, and security
sion demands confidentiality and integrity. In analysis (SecurityAnalysis = j(Data, KeyDis-
UAV networks, cryptographic mechanisms tribution)) evaluates the algorithm’s efficacy
utilize mathematical algorithms to encode in safeguarding UAV communications. This
information, thwarting unauthorized access, dynamic key generation approach enhances
data tampering, and eavesdropping. Key security, mitigating the risk of unauthorized
exchange, a critical component of secure com- access in UAV networks.
munication, involves sharing cryptographic
keys between parties to facilitate encryption
and decryption. This process ensures data 4. Results and Discussions
integrity, a crucial aspect in UAV networks, Network Simulator 3 (ns-3) played a piv-
where robust key exchange protocols are otal role as a powerful tool in simulat-
imperative. ing and evaluating the proposed Chaotic
Strengthening UAV network security: Advanced authentication-based intrusion detection systems 71
Abstract: There are various security issues, challenges, and threats in wireless networks. In this paper, we review
recent work in this field that primarily addresses such issues and challenges. Different researchers have taken
various approaches to justify their research based on different parameters. Methods such as enhanced packet
delivery, residual energy, and link quality, on-demand link and energy aware dynamic multipath (O-LEADM),
Rate aware congestion control (RACC), Quadrature Amplitude Modulation (QAM), Quadrature Phase Shift
Keying (QPSK), Network function virtualization (NFV), Software-defined network (SDN), hidden Markov
model (HMM), IDS, scalable and energy-efficient cluster-based anomaly detection (SEECAD) etc. are used to
identify jamming signal problems in fuzzy logic. The article discusses various issues and approaches covered by
many researchers in last few years paying close attention to wireless network-related topics.
DOI: 10.1201/9781003606635-9
Comparative analysis of wireless routing protocols for security threat—A review 75
The process of a Black Hole Attack follows this research which inspire the researchers
these distinct stages mostly. in this field to propose methods to detect
Advertisement Phase: The malicious node the basic behavior of black-hole nodes and
claims that it has the shortest route for the the route request (RREQ) and RREP which
R-Req by the source and it generate the Route is mostly used by attackers to neutralize the
request reply (RREP) and send it to the target network. O-LEADM [2] is a method used to
node. detect black hole in MANET. It is essential
Attraction Stage: Legitimate nodes, relying to provide safe and secure communication in
on the falsified routing details, unwittingly wireless network, prevent from the network
direct their data packets toward the mali- damage and harm in small and large scale.
cious node. The purpose of this study is to showcase the
Packet Interception: Upon receiving these research conducted in this field and empha-
packets, the malicious node abstains from size the approaches taken to get around secu-
forwarding them to their rightful destina- rity vulnerabilities.
tions, opting to discard or consume them.
Impact and Consequences: As a result,
genuine nodes remain unaware of the com- 2. Theoretical Details
promised communication path, leading to In order to achieve wireless network architectural
data loss, network congestion, and potential complexity, various heterogeneous non-realistic and
service disruption. The detection and elimina- artificial approaches are offered. Communicating in
tion of the Black Hole Attacks present intri- various situations makes the deployment of security
cate challenges due to their deceptive nature. measures and regular packet delivery even more
Nevertheless, researchers have proposed complex. Figure 9.1 illustrates different types of
strategies to tackle this menace. jammers commonly encountered in cybersecurity
Due to highly dynamic and challenging and wireless security. Wireless networks have
open environment of wireless network there revolutionized the way we connect and
are many reasons for packet failure like bat- communicate, but they also come with a range of
challenges that need to be addressed to ensure their
tery drainage in IoT, signal interference and
reliability, security, and efficiency. Some of the key
malicious nodes. A malicious node or faulty
challenges of wireless networks include:
node can enter forcefully or without the prior
knowledge of victim node into the network • Signal Interference and Congestion: Wire-
and damage, disturb the network settings less networks work in shared frequency
and can decrease overall network throughput bands which can lead to potential interfer-
and performance. Black-hole node problem ence from other devices and networks. This
may try to route all the data packets towards interference can degrade the quality of the
itself by falsely claiming of having shortest signal and impact the overall transmission.
path and false unrealistic information. Source • Reduced Bandwidth: The bandwidth of
node chooses the path having higher RREP wireless networks is lower than that of
[2] destination sequence by simply disregard- wired networks. This restriction may
ing other routes and RREPs, comparing all result in slower data transfer in nations
RREPs being trapped in the attacker’s strat- having large population with numerous
egy, and compromising the node connected connected devices.
to the aggressor. The risk of packet drop • Coverage and Range: The range of wire-
exists for nodes that forward data packets less networks can be limited, especially in
along pathways that include rogue nodes, indoor environments or areas with obsta-
which reduces overall network performance. cles. Achieving consistent coverage across
This is the main motivational point behind larger areas can be challenging.
76 Innovations in Computational Intelligence: Trends and Technologies
efforts or trial and error to encrypt the des-sequence [1] which claims to have the
user’s message. shortest path to deliver the data from the
• Black hole Attack: A Black Hole Attack is source to destination node in the network,
a type of security threat in wireless ad hoc which is not true and hence it will disturb
networks in which a false node will gener- the communication.
ate a request-response, req-sequence and
techniques in wireless sensor networks. Elec- [14] Premkumar, M., and Sundararajan, T. V. P.
tronics, 11(15), 2324. (2021). Defense countermeasures for DoS
[7] Michael Savva, Iacovos Ioannou. (2022). attacks in WSNs using deep radial basis net-
Fuzzy-logic based IDS for detecting jam- works. Wireless Personal Communications,
ming attacks in wireless mesh IoT net- 120(4), 2545–2560.
works. 20th Mediterranean Communication [15] Prasse, P., Machlica, L., Pevný, T., Havelka,
and Computer Networking Conference J. and Scheffer, T. (2017). Malware detection
(MedComNet). by analyzing network traffic with neural
[8] Sumaiya Thaseen Ikram and Aswani Kumar networks. 2017 IEEE Security and Privacy
Cherukuri. (2016). Improving accuracy of Workshops (SPW), 205–210.
intrusion detection model using pca and [16] Krishnamurthy, M. and Rajashekara, H.M.
optimized svm. CIT, 24(2), 133–148. (2011). Current trends in wireless technolo-
AQ4:
[9] Naga RohitSamineni, Ferdous A. Barbhuiya, gies in academic libraries. DESIDOC Jour-
Please and Sukumar Nandi. (2012). Stealth and nal of Library and Information Technology,
note semi-stealth mitm attacks, detection and 31(1).
that the
references
defense in ipv4 networks. In 2012 2nd IEEE [17] Chen, Z., Zhou, W., Wu, S., and Cheng,
9-20 is International Conference on Parallel. Dis- L. (2020). An adaptive on-demand mul-
not cited tributed and Grid Computing. tipath routing protocol with QoS support
in text. [10] Farhan Ahmad, AsmaAdnane, Virginia Fran- for high-speed MANET. IEEE Access, 8,
queira, FatihKurugollu, and Lu Liu. (2018). 44760–44773.
Man-in-the-middle attacks in vehicular ad- [18] El-Semary, A. M. and Diab, H. (2019). BP-
ATION ADDEDhoc networks: Evaluating the impact of AODV: Blackhole protected AODV rout-
attackers’ strategies. Sensors. ing protocol for MANETs based on chaotic
[11] QuaziWarisha Ahmed, Shruti Garg, Amrita map. IEEE Access, 7, 95185–95199.
Rai, Manikandan Ramachandran, Noor [19] Thebiga, M., and SujiPramila, R. (2020).
Zaman Jhanjhi, MehediMasud, and Moham- A new mathematical and correlation coef-
med Baz. (2022). Ai-based resource alloca- ficient based approach to recognize and to
tion techniques in wireless sensor internet of obstruct the black hole attacks in manets
things networks in energy efficiency with data using DSR routing. Wireless Personal Com-
optimization. Electronics, 11(13), 2071. munications,, 114(2), 975–993.
[12] J. R. Renofio, M. E. Pellenz, E. Jamhour, [20] Singh, J., Goyal, S., Kumar Kaushal, R.,
A. Santin, M. C. Penna, and R. D. Souza. Kumar, N., and Singh Sehra, S. (Eds.).
(2016). On the dynamics of the RPL proto- (2024). Applied Data Science and Smart
col in AMI networks under jamming attacks. Systems (1st ed.). CRC Press. https://doi.
In 2016 IEEE International Conference on org/10.1201/9781003471059
Communications (ICC), pp. 1–6, IEEE. [21] Jeffrey, Nicholas, Qing Tan, and José R. Vil-
[13] David, J., and Thomas, C. (2019). Efficient lar. (2023). A review of anomaly detection
DDoS food attack detection using dynamic strategies to detect threats to cyber-physical
thresholding on flow-based network traffic. systems. Electronics, 12(15), 3283.
Computers and Security, 82, 284–295.
10 Cascadability analysis of free space
optical wireless data centers
Anand Kumar Dixit1,a, Meenakshi Srivastava2, b, and
Rajiv Srivastava3,c
1
Research Scholar, Amity Institute of Information Technology, Amity University Uttar Pradesh,
Lucknow, India
2
Assistant Professor, Amity Institute of Information Technology, Amity University Uttar Pradesh,
Lucknow, India
3
Ex-Faculty, Indian Institute of Technology, Jodhpur, Rajasthan, India
Abstract: Data centers having optical nature are the heart of modern day communication. The data is rising
continuously and thus increasing the demand for more bandwidth. The current data center relies on the elec-
tronics thus producing lot of heat and for connecting them huge amount of cabling is required. To reduce copper
cabling, use of fiber optic technology with fiber cable was proposed, and optical components produce lesser heat
as compared to electronic devices. However, fiber cabling is still an issue. To deal the cabling and heat dissipa-
tion, free space optical communication can be a better choice. This paper, presents the cascadability analysis
of the free space optical wireless data centers. In this work line of sight links are considered for cascadability
analysis and bit error rate is evaluated for various distances.
Keywords: Bit error rate, data center, free space optical communication, line of sight
1. Introduction
High speed communications switches making the wiring more complex [6]. In addi-
and networks are basically used in tion, we have more consumption of power
data-intensive computing platforms. with electrical switches than optical DCNs
These switches and network divides which also have an added advantage of less
the data into computing resources and expensive [7].
therefore the data is processed separately The issue of the limited frequency spec-
delivering output and scalability as trum in classical RF systems is becoming
per the data. A lot of researches are progressively more critical. However, by
going on to deal with these issues such as implementing optical communication free
introductionof new interconnect space technology, such a problem can be alle-
topologies for data center networks [1–4]. viated [8].
In this topology, we put twenty to fifty 60 GHz lines can support multi-Gbps
servers in a rack along with top of rates [9–11]. In contrast, to solve cabling AQ1:
rack (ToR) switch. Now, as a major issues, [1] proposes a totally wireless DC sys- Please
abbre-
portion of the traffic passes through tem based on 60 GHz technology. Despite its viate
some of the hot ToRs to other [5] which promise, 60 GHz technology has its demerit “DCN”,
makes the requirement of fast reconfiguration like, very high attenuation, low bandwidth “ToR”,
and
of Data Center Networks (DCNs). Generally, [10]. Because of the lack of atmospheric limi- “NLoS”
commodity electrical switches are used tations to free space optical (FSO) commu- in full
at first
bynormal DCNs to optimize nication in interior systems, we recommend mention.
the limited bandwidth. But, the problem
with this is the need of numerous links
and switches
a
[email protected]; [email protected]; [email protected]
DOI: 10.1201/9781003606635-10
82 Innovations in Computational Intelligence: Trends and Technologies
employing FSO in Data Center. Furthermore, The impulse response of LoS channel hLoS
light speed in FSO is approximately 1.5 can be expressed as [14, 15]:
times faster than fiber optics, it is ensure less
latency. As a result, we anticipate that FSO (1)
will result in high-performance, low-cost
DC infrastructure. This approach is useful where Ar is area of the photo-detector,
in situations where lines of optical fiber can- ϕ is radiance angle,
not be installed [12, 13]. It has the advan- ψ is light incidence angle,
tages of spectrum restriction and high-speed d is distance between LED and PD.
1
information transmission over other wireless m = - ln ( 2 ) / ln lim ( cos f1/2 ) is order of lam-
x ®¥ n
communication. Above mentioned system is bertian source emission and LED semiangle
predictable to swap other WC methods in half power is denoted by ϕ1/2.
various industries, including last-mile com-
munication. This technology, which is still in
its early phases, is broadly used in network. 3. Mathematical Modelling of
In the Figure 10.1, communication between Cascadability Analysis
the ToRs using line of sight (LoS) and
In this section, mathematical analysis of cacad-
Non-LoS links is shown. Considering four
ability analysis is presented. In Figure 10.2,
racks for an as example, in cluster 1, rack
BUS topology is shown where four racks are
1, and rack 2 can communicate using LoS
connected.
communication, similarly in cluster 2, rack
3, and rack 4 can communicate using LoS Power Calculation
model. This type of communication is The power received by the rack 2 when rack
known as intra racks com- munication. The 1 transmit is
rack 2 of cluster 1 and rack 3 of cluster 2 can
also communicate using the LoS model. The (2)
communication between the rack 1 and
racks 3, 4, will takes place using NLoS
model. The rack 1 can also communi- cate
to rack 3 via rack 2 using LoS model. In this
work LOS links are considered for cas-
cadability analysis and BER is evaluated
for various distances.
2. Free Space Optical
Communication AQ2:
Please
provide
In FSO communication systems, free space Figure 10.1. Communication between the ToRs source
serves as the communication channel between using LoS and NLoS links. for all
transceivers, playing a vital role in the effective Source:
figures.
AUTHOR'S SELF GENERATED
transmission of optical signals. The quality of
the received signal is significantly impacted by
the parameters of this channel. FSO enables
optical data transfer with potential data rates
of up to 100 Gbps, making it suitable for high-
speed optical networks. However, atmospheric
conditions can hinder FSO performance, limit- Figure 10.2. LoS communication between the
ing sensitivity and achievable data rates while cascaded racks (BUS topology).
maintaining an acceptable bit error rate (BER). Source:
AUTHOR'S SELF GENERATED
Cascadability analysis of free space optical wireless data centers 83
(8)
where, Pr(i) is the power received at the ‘ith’
(3) rack.
The shot noise variance will be given by
(4) (9)
The power received by the rack 4 when The thermal noise expression is as follows:
rack 1 transmit is
.(10)
(5)
Finally, BER can be evaluated using:
In Figure 10.3, 16 racks are connected, (11)
where distance among the nodes is shown.
The power received by the rack 14 when Where, Q is error function.
rack 1 transmit is
(6) 4. Results
Table 10.1 contains parameters utilized in the
The power received by the rack 16 when calculation. In the simulation, we used a sin-
rack 1 transmit is gle LED and a single photo detector (PD) [16].
The server room’s volume is estimated to be racks is 3 meter. FoV=70° is applicable for
10 × 10 × 5 m3. In the simulation transmitter the broadcast messages, while in case of point
and receiver pair placed opposite side of the to point connection FoV=10° is applicable.
racks. FSO rack having servers such that the In case of FoV=10°, the maximum received
same side of the rack having all of the serv- power is −3.36 dBm.
ers’ transmitters (receivers). Main aim is to In Figure 10.5, transmitter and receiver
use the intra/inter-rack option. Optical Beams distance is 3√2 meters with FoV=70° and
are scattered to all servers using a beam dis- FoV=10°. The Pma is −35.29 dBm, and the
tributer, allowing for switch-free intra-rack minimum received power is −45.80 dBm,
connectivity. when the transmitted power is 20 dBm. This
In Figure 10.4, transmitter and receiver result is applicable for all the connection
distance is three meters with FoV=70° and where transmitter and receiver racks are align
FoV=10°. The maximum received power to each other, and distance between the adja-
(Pmax) is −32.29 dBm, and the minimum cent racks is 3√2 meter. In case of FoV=10°,
received power is −47.15 dBm, when the the maximum received power is −6.24 dBm.
transmitted power is 20 dBm. This result is In Figure 10.6, transmitter and receiver dis-
applicable for all the connection where trans- tance is 6 meters with FoV=70° and FoV=10°.
mitter and receiver racks are align to each The Pma is −38.29 dBm, and The min power
other, and distance between the adjacent received is −45.18 dBm, when the transmitted
Figure 10.4. LoS communication between the Figure 10.5. LoS communication between the
racks is 3 meters (a) FOV=70° (b) FOV=10°. racks is 3√2 meters (a) FOV=70° (b) FOV=10°.
Source: Source:
AUTHOR'S SELF GENERATED AUTHOR'S SELF GENERATED
Cascadability analysis of free space optical wireless data centers 85
Figure 10.6. LoS communication between the Figure 10.8. LoS communication between the
racks is 6 meters (a) FOV=70° (b) FOV=10°. racks is 9 meters (a) FOV=70° (b) FOV=10°.
Source: Source:
AUTHOR'S SELF GENERATED AUTHOR'S SELF GENERATED
86 Innovations in Computational Intelligence: Trends and Technologies
5. Conclusion
Data centres are the core of modern day
communication, and as the amount of data
kept in DCs grows, the size of the data cen-
tre grows enormously, as does the amount of
heat released. As a result, it is now important
to develop a new communication paradigm
Figure 10.9. LoS communication between the where heat dissipation and amount of cabling
racks is 9√2 meters (a) FOV=70° (b) FOV=10°. required can be controlled. FSO is one such
Source: technology that can considerably reduce
AUTHOR'S SELF GENERATED
Cascadability analysis of free space optical wireless data centers 87
Abstract: In the current scenario of wireless technology, we go through the many challenges and issues sur-
rounding the application and usage of tools, techniques of machine learning as well and deep learning algo-
rithms in wireless networks. In heterogeneous networks, designing the machine learning foundation routing
approach is challenging. At the beginning of this work, the fundamental basic concepts of (ML) machine learn-
ing and (DL)deep learning in different wireless networks are presented. Because of the constantly changing
network conditions present in many ad-hoc networks, preparing data collection and training with that data is
a particularly difficult process. In addition, this study gives an overview of several studies that used deep learn-
ing and machine learning techniques in a range of research areas, including networking, communications, and
dissipative settings. Finding possible issues and challenging tasks is the main objective of this survey activity.
Keywords: Deep learning; machine learning; routing algorithms; wireless sensor networks
DOI: 10.1201/9781003606635-11
Wireless network with machine learning and deep learning techniques 89
• A fundamental application layer for deep suitability in wireless networks for par-
learning ticular tasks
• to specify a less-complexity deep learn- • Coordination among several CP controllers
ing model depending on the performance
objective of the application layer 2.3. Several machine learning
• Based on deep learning Cloud computing approaches forpacket routing
security in the dew
• applications for controlling cognitive q-routing-
radio networks Q-Learning [10] is a reinforcement learning
• DL/DRL implementations that are effec- algorithm that may discover the best course
tive on real-world wireless systems of action in a given situation to maximize
• Collecting Network configurations for the rewards from that situation. Distribu-
the input phases of deep learning may be tive routing of packets ina network is made
challenging. possible by Q-Routing, a modification of
• The wireless devices’ range restrictions Q-Learning.
• incomplete batches of training samples
• Optimization of the transport layer using 2.3.1. Ant-based routing
deep learning
• the multi-queue evolution pattern An innovative use of reinforcement learn-
detection ing called “Ant-Based Routing” is based on
• determining the length of the RED zone basic biological “ants.” These “ants” trav-
line erse the network and quickly pick up the
• Mixing several protocols and schemes best paths using the ant colony stigmergy
with the congestion control scheme model of communication as inspiration. This
• Control of traffic along the whole route method is more durable than conventional
from source to destination routing algorithms in that it is less affected
• Using deep learning to speed up massive by random route corruption while computing
data transfer is difficult problem employ- packet paths.
ing deep learning for big data transports
• To build a thick routing pipe with the 2.3.2. Particle swarm routing
ability to send a large number of pack- Drs. Russ Eberhard and James Kennedy
ets per second. Identifying the hopby-hop invented particle swarm optimization, a
connection failure population-based stochastic optimization
• MAC parameters selection to guarantee approach, in 1995. They learned from the
service delivery quality. Deep learning’s
AQ3:
Please
provide
Figure 11.2. ML using ANN and DNN. Figure 11.3. Layered ANN caption
Source: Source: 11.3–11.7.
social interactions of flocks of birds and under various circumstances and topolo-
schools of fish. Particle Swarm Routing starts gies. RL-Probe was successful with vari-
with a set of random fixes, followed by iter- ous link topologies and link quality
atively seeks for Optimal solutions through
updating subsequent generations.[3] 2.4. Problems and difficulties with
• The network’s connection may be greatly machine learning in a wifi
improved by using reinforcement learning network
techniques to manage node mobility and Machine learning techniques are now in use
packet routing decisions. widely used in many fields, such as image,
• The four primary categories of contem- speech, video, public safety, and medicine.
porary several types of routing protocols We now have a wealth of data stored in sev-
were developed for wireless networks: eral data centers and these are being analyzed
geographical, on-demand, reactive, and in real-time as a result of the development of
ML/DL-based. Outingtable-based proac- more advanced computer-related processes.
tive protocols. DL-based routing systems While sing machine learning methods and
have received a lot of attention recently techniques, it is possible to construct pre-
due to their enhanced performance in diction or human-like decision-making pro-
complicated networks. cesses. The system should be able to safely
• An innovative method named “RL-Probe” handle the whole planet on its own utilizing
was presented in for improving connec- machine learning techniques. For instance,
tion quality. RL-Probe was crucial in the system gathers all the data generated
boosting RPL’s functionality and capacity. by each person and learns everything about
RPL is a routing protocol for less power the environment on its own. The ability
and dissipative networks. To decrease the of machine learning systems to constantly
overhead, The RL-Probe approach is used learn from data over times one of its major
and is based on the reinforcement advantages. The system may be continually
Learning paradigm. updated while it is in use by using freshly
observed or created data. As a consequence,
• RL-Probe Using the RL-Probe framework, various logics are generated using various
both synchronous and asynchronous training sets using a single machine learning
LQE approaches are compatible. The rel- method. It implies that the system is adapt-
evance of each node is taken into consid- able in terms of how it makes decisions and
eration while making clustering decisions that it can continually learn from experience.
throughout the RPL route maintenance Referring back to the example, the system
and route recovery operation. can sound alert or take any other action that
• Asynchronous probing approach is sug- may be regarded intelligent and beneficial
gested to measure the RSSI and ETX. A when it identifies any harmful or anomalous
MAB model is used to accomplish the situations from the world of humans. Cre-
decision- making process. With the use of ating this ideal system, however, is difficult
the RL-Probe technique, reward function in practice. The difficulty of obtaining trust-
has been utilized to evaluate the trends in worthy training data that covers a variety of
link quality fluctuations. RL-Probe was contexts gives rise to the first problem. To
assessed using three performance assess- build any decision or prediction model with-
ment matrices: Packet loss rate, packet out an appropriate data set, regardless of
overhead on top of the usual energy con- how strong our machine learning algorithms
sumption. Evaluation work was done are at Building robust logic and analyzing
Wireless network with machine learning and deep learning techniques 93
network management and made it practical decide on cloud computing. User input, device
to do so. energy level, and CPU use level are additional
input values that are distinct and steady in
3.3. Network attack forecast contrast to values affected by a dynamic and
unpredictable wireless network.
In the study, a technique based on machine
learning technology for setting security rules
on the SDN controller has been proposed. 3.6. Network of wireless sensor
Security settings for the SDN controller are networks
configured to block the whole subnetwork
to prevent access from possible attackers, 3.6.1. Using machine learning
and machine learning methods are utilized In this area, we present several works that
to identify likely target hosts that can be utilized sensor networks [14] and machine
attacked. The identical datasets were divided learning approaches. These techniques also
into training and test sets in order to evaluate make a significant contribution to the appli-
the suggested strategy. cation of machine learning to solve difficult
issues brought on by dissipative channels and
3.4. Wireless adaptive swimming restricted devices. These studies are important
because they opened the way for the develop-
Network conditions vary greatly depend- ment of trustworthy models that can be used
ing on the situation and alter over time. It to circumvent the challenge of forecasting the
is therefore difficult to predict the network’s future state of dissipative channels.
future condition. Despite the fact that a num-
ber of rate adaptation methods for high-
quality video streaming have been proposed, 3.7. Diagnostics for channel errors
there is still significant room for advance- Many protocols, including 802.11, 802.15.4,
ment. Numerous research has validated the 802.15.1, etc., share the ISM band. Here,
use of machine learning techniques to video Intrusion between several systems impairs
streaming services. It should be possible to communication quality. In-depth studies were
create a system that selects the best bitrate done by the authors to examine the error pat-
and CDN for the streaming user, learns cru- terns in IEEE 802.15.4, and they discovered
cial parameters, and maximizes QoE. Rein- that there are several patterns for the most
forcement learning was used in addition to common wireless situations. They devel-
taking into account the bandwidth, buffer oped a machine learning technique based on
level, and video rate to automatically create this discovery to categorize wireless channel
the best ABR algorithm. faults into distinct groups and offered the
system that can identify various issues in IoT
3.5. Mobile cloud offloading networks.
RSSI and LQI from the most recent packet test subject had a wearable sensor [14] that
received as well as the following features allowed him to identify himself in the wire-
as input information: the quantity of trans- less sensor network.
mission attempts, the reasons behind each
unsuccessful attempt, and RSSI and LQI. The 3.11. Detection of events
optimal channel from the output is one with
a less projected number of transmission tries. Wireless sensor [12] networks have a wide
range of applications. The initiative focuses
on locating pipeline leaks in the transporta-
3.9. Outlier detection tion networks for gas, oil, and water. Using
Wireless sensor [12] networks with a small algorithm-like pattern recognition, it trains
number of nodes are vulnerable to Intrusion the sensor network to distinguish novel traces
[7], unstable channels, and cyber interven- of events, such as leakages. Here, some scat-
tion, which reduces system performance and tered sensor nodes collaborate to estimate the
increases the possibility that false data may size of the leakage event. Despite the employ-
be relayed to higher management levels. This ment of a wireless sensor network in this
might have major consequences for indus- investigation [11], the difficulties associated
trial automation systems and sensor network with using an unreliable and unsafe wireless
systems used for public safety. The existing channel were scarcely considered.
works for outlier identification, according
to their authors, take a lot of memory, a sig- 3.12. Fault detection
nificant amount of energy, power for com-
Data gathering from the sink node is impre-
putation, transmission overhead, and data
cise due to the less- cost sensors and other
transfer capacity. They suggested employing a
problems caused by unreliable wireless net-
multi-agent framework and a machine learn-
works. Fault data must be observed in order
ing approach for online outlier’s identifica-
to monitor the system and respond quickly
tion to tackle the issue
to incidents. The cause of the issue must also
be identified. The paper proposed a statistical
3.10. Invoremental locatization technique for identify and classify issues in a
wireless sensor [14] network while using the
In general, GPS is one of the most widely used
Machine learning techniques. System faults
methods for object localization. Finding an
and data faults were used to categorize various
object’s specific location is difficult because
fault types. System faults are the other fault
of the limited GPS signal strength inside of
types brought on by less battery, calibration,
buildings. Due of this, other tactics are used.
For example, a large number of nodes are
used as anchor points which estimate the
comparative location of a target object. A
precise interior localization system must be
created in order to increase safety in under-
ground mines or caverns. Unfortunately, the
wireless channel continues to experience
Intrusion, which lowers the estimation’s
accuracy. To find the method with the fewest
errors and evaluate its performance, the study
used two alternative architectures and seven Figure 11.6. Wireless Network Communication Path
different machine learning techniques. The Source:
AUTHOR'S SELF GENERATED
Wireless network with machine learning and deep learning techniques 97
5. Conclusion
3.13. Routing
Our study has uncovered a wide range of
Multi-hop routing systems [19] could utilize methods and protocols that might be used to
less energy with the use of machine learning. improve wireless networks and communica-
The work provided a Machine Learning- tions. Based on the literature, we examined
based clustering technique to efficiently place a variety of problems and difficulties with
the nodes(sensor) in the closest cluster. The applying machine learning and deep learn-
researchers applied ML to the wireless sensor ing algorithms to improve various opera-
network’s routing protocol. The suggested tions in networking in various ways. For
routing technique aims to extend network tasks like network administration, network
life and move data packets as quickly as fea- optimization, signal, Data management,
sible. This suggests that ML approach adop- channel assignment, network security, route
tion on WSN is advantageous for resource selection, etc. Machine learning and Deep
management. learning algorithms perform incredibly well.
Our study has uncovered a wide range of The two primary learning methods that per-
methods and protocols that might be used to form well for network operations are deep
improve wireless networks and communica- reinforcement learning and deep learning.
tions. Based on the literature, we examined However, it could be challenging to collect
a variety of problems and difficulties with training data in a variety of settings and it
applying deep learning and machine learning is not possible in this research to complete
algorithms to improve networking operations all the algorithms and methods of ML and
in various ways. For tasks like network admin- Deep learning which we can cover in future
istration, network management, optimization scope Due to the unpredictable behavior of
signal management, network security, opti- wireless networks, creating training data
mum route selection. Machine learning and sets may be challenging
Deep learning algorithms perform incred-
ibly well. The two primary learning methods
AQ4:
that perform well for network operations References Please
are deep reinforcement learning and deep change
[1] Johnson, A. and Smith, B. (2016). Enhancing
learning. However, it could be challenging to the refer-
Data Delivery Efficiency in AODV-Based Ad ences into
Hoc Networks. Wireless Communications Num-
bered
and Networking Conference (WCNC), 1–6. references
[2] Lee, C., and Park, D. (2017). Performance as per
Evaluation ofAODV in Dynamic Mobil- style,
ity Scenarios. IEEE Transactions on Mobile
Computing, 16(8), 2134–2147.
[3] Emilio Ancelotti, CarVallati, Raffaele Bruno,
Enzo Mingozzi, A reinforcement learning-
based link quality estimation strategy for
RPL and its impact on topology manage-
Figure 11.7. ment, Computer Communications, Volume
Source: 112, 2017, Pages 1–13.
AUTHOR'S SELF GENERATED
98 Innovations in Computational Intelligence: Trends and Technologies
[4] Martinez, F., and Rodriguez, G. (2018). Large- Scale MANETs. Wireless Personal
Throughput Optimization in AODV Net- Communications, 113(1), 1–17.
works for IoT Applications. Ad Hoc Net- [16] S.A. Haque, M. Rahman, S.M. Aziz, Sensor
works, 75, 60–72. anomaly detection in wireless sensor net-
[5] Simi S, Sruthi Ann Varghese,“Enhance QoS works for healthcare, Sensors15 (4) (2015)
by LearningData flow rates in Wireless Net- 8764–8786.
works using Hierarchical Docition”, 4th [17] Zhang, W., and Chen, X. (2021). Analyz-
International Conference on Eco-friendly ing Mobility Models and Their Impact on
Computing and Communication Systems, AODV Performance. Journal of Network
ICECCS 2015, Procedia Computer Science and Computer Applications, 185, 102968.
70 (2015) 708–714, Elsevier [18] Garcia, M., and Lopez, A. (2023). Secure
[6] Kim, H., and Jung, I. (2019). Enhancing Routing with AODVin MANETs: A Crypto-
Security in AODV Routing Protocol for Ad graphic Approach. International Journal of
Hoc Networks. Computer Communications, Network Security, 25(4), 692–704.
135, 87–98. [19] Rahman, A., and Khan, M. (2023). Exploit-
[7] Wu, J., and Li, K. (2020). Performance Eval- ing Cross-Layer Design for Improved AODV
uation of AODV in Heterogeneous Ad Hoc Performance in VANETs. Ad Hoc Networks,
Networks. Wireless Personal Communica- 123, 102377.
tions, 112(3), 1519–1532. [20] Wei Wang; Xiaohong Guan; Xiangliang
[8] A. Garofalo, C. Di Sarno, V. Formicola, Zhang,“Profiling program and user behav-
Enhancing intrusiondetection in wireless sen- iors for anomaly intrusion detectionbased
sor networks through decision trees,Depend. on non-negative matrix factorization” 43rd
Computing. (2013) IEEE Conference on Decision and Control,
[9] Rahman, S., and Khan, T. (2022). Perfor- 2004. Issue Date: 14–17 Dec. 2004, On
mance Enhancement of AODV Through page(s): 99–104 Vol.1
Dynamic Parameter Adjustment. Interna- [21] Hazem M. El-Bakry, Nikos Mastorakis A,
tional Journal of Wireless Networks and- “Real-Time Intrusion Detection Algorithm
Communications, 14(1), 53–64. for Network Security,WSEAS Transactions
[10] Zhang, Y., and Wang, Q. (2016). A Survey of on communications, Issue 12,Volume 7,
Energy-Efficient Routing Protocols in Wire- December 2008.
less Sensor Networks. Journal of Internet [22] HR, M., MV, A., S, G. and S. V., “Devel-
Technology, 17(3), 471–482. opment of anti-phishing browser based on
[11] S. Kosunalp, A new energy prediction algo- random forest and rule of extraction frame-
rithm for energy- harvesting wireless sen- work” Cybersecurity, 3(1), 2020
sor networks with Q-learning, IEEEAccess 4 [23] Saxena, S., Shrivastava, A. and Birchha, V.,
(2016) 5755–5763. “A Proposal on Phishing URL Classification
[12] Wang, H., and Li, Q. (2018). An Improved for Web Security,” International Journal of
AODV Algorithm for Load Balancing in Computer Applications, 178(39), pp.47–49,
Mobile Ad Hoc Networks. Wireless Per- 2019.
sonal Communications, 99(3), 1987–2002. [24] G. B. Huang, H. Zhou, X. Ding and R.
[13] Nayak, p. and G.K.Swetha (2021) “Routing Zhang, “Extreme Learning Machine for
in wireless sensornetworks using machine Regression and Multiclass Classification,”
learning techniques”, measurement Volume in IEEE Transactions on Systems, Man, and
178, June 2021, 108974 Cybernetics, Part B (Cybernetics), vol. 42,
[14] Qian Mao, Fei Hu, and Qi Hao, “Deep no. 2, pp. 513–529, April 2012.doi: 10.1109/
Learning for Intelligent Wireless Networks: TSMCB.2011.2168604.
A Comprehensive Survey”, IEEE communi- [25] A. Qayyum, A.S. Malik, N.M.Iqbal, M.
cations surveys and tutorials, vol. 20, no. 4, Abdullah, M.F. Rasheed, W., Abdullah,
fourth quarter 2018, pp. 2595–2621 T.A.R. and M.Y.B. Jafaar,., Image classifi-
[15] Li, X., and Wu, Y. (2020).On the Per- cation based on sparsecoded features using
formance of AODV Routing Protocol in sparse coding technique for aerial imagery:
Wireless network with machine learning and deep learning techniques 99
Abstract: The conventional landscapes therapeutic treatment approach has changed in recent years due to the
arrival of cell phone applications, or heeltaps. The present heeltaps are designed to investigate the skills of scien-
tific specialists to determine those who are reliable, better, and well-liked ones. We can talk about the method of
integrating mHealth advances into clinical practice and figuring out whether professionals want to accept such
through the application of the procedure of normalization hypothesis. We looked at app attributes and perfor-
mance data, completed assessment reports on characteristics, capabilities, and feedback from the audience, and
used data analysis to evaluate feature cross-correlation and market alternatives. There is a possibility of devel-
opment regarding the which are already accessible the marketplace, as we discover unsatisfactory specifications
for workmanship and dependability. Strong ties exist between them.
Keywords: app features, new technology uptake, mobile health, and fitness app (health app), normalization
process (NPT), reliability (UX), and ease-of-use (UI)
DOI: 10.1201/9781003606635-12
Assessing technology innovation of cellular health 101
copious records [2] to produce numbers that for the Introduction with Health Data
can inform negotiating choices. Recently, health data has received increasing
attention for both healthcare and data
mining. PARK, 2018 [4] Abstract In this
2. Literature Survey paper we discuss the challenges in analyzing
and mining health data to find clinical insight.
Somayyeh Zakerabasali, Seyed Mohammad, This paper reviews major challenges, the
Tayebeh Banias Adi, Azita Yazdani and Sha- sources of data, meth- odologies and
habuddin Abhari, 2021 others [1]. Many technologies along with open issues in big
mobile health (mHealth) apps are being data analytics in health care.
AQ2:
integrated into the healthcare system, but Yujun Ma1, (Member, IEEE), Yulei Please
their potential success depends on uptake by Wang1, Ju Yang2, Yiming Miao2, And Wei check the
sentence
healthcare providers. Some of the important Li2 (2017) [ 5]]
is correct.
benefits associated with mHealth technology The paper talks about the challenges of a
are increased efficiency, cost breakdowns and medical and health care system, i.e. uneven
enhanced health care service delivery pro- distribution of medical resources in rural
cesses. Future research is needed to explore areas, explosive growth in chronic diseases,
additional barriers at the healthcare system and rising medical expenses require medical
level i.e. legal, reimbursement/ accountable reform approach to a good solution. This rec-
care organizations, economic and financial ommends us Health Internet of Things (IoT)
factors, health system policy and standardisa- along with big data to deal with such prob-
tion so that systematic interventions can be lems. This paper demonstrates a large-scale
implemented to improve access to mHealth health application system that utilizes the
technology. [2] Ayan Banerjee Member, health IoT, big data architecture, key technol-
IEEE, and Sandeep K. S. Gupta Senior Mem- ogies and typical application of health IoT.
ber, IEEE~~2014~ Abstract: While smart The paper proposes to examine the health
mobile medical computing systems (SMDC- status of non-hospitalized patients using a
Ses) exploit context information to provide Wireless Body Area Network (WBAN) sys-
healthcare services, unexpected changes of tem with load-sharing processing capabilities
the clinical context may result in incorrect on both private and public clouds. [SHAKER AQ3:
or incomplete service provision, generating EL-SAPPAGH 1,2, FARMAN ALI 2, SAMIR Please
check the
faults and violating requirements. To mitigate EL-MASRI3, KYEHYUN KIM4, AMJAD sentence
this issue, this paper presents an approach to ALI 2,5, AND KYUNG-SUP KWAK 2, is correct.
analyze SMDCSes that accounts for dynamic (Member,...2019 [6]] Establishment of smart
changes in context and the interaction with environment and integration of used compo-
the physical world which may exist. nents is the main research issue in a newly
Achilleas Papageorgiou, Michael Strikes, developed network as well standardization
Eugenia Politou, Efthimios Alepis, Constan- network must have a single architecture,
tinos Pataki’s [1], 2018 [3]. The paper seeks protocol, and application program interface
to offer broad feedback to the developers of to connect between heterogeneous smart
these apps to shore up their security/privacy objects. To deliver MH apps and solutions
features while pointing out regular mistakes to address serious medical problems that are
made in the application development life easier to use with increased precision.
cycle that can threaten user privacy rights. [Sabyasachi Dash1†, Sushil Kumar Shakya AQ4:
AQ1: [Gaspard Harerimana, (Student Member, war 2,3†, Mohit Sharma 4,5 and Sandeep Please
Please check the
check the
IEEE), Beakcheol Jang, (Member, IEEE), Jong Kaushik6*,2019 [7]] The paper analyses the sentence
Wook Kim, (Mem- Ber, Ieee), And Hung Kook] data in health care through their necessity of
sentence is correct.
the paper provides a deep understanding
is correct. collectiveness.
102 Innovations in Computational Intelligence: Trends and Technologies
[8] Sohail Imran, Tariq Mahmood, Ahsan All the way through the innovation imple-
Morshed and Timos Sellis (Fellow, IEEE), mentation process, the NPT comprises the
“Enabling Big Data Analytics In TheHealth- following four key additives:
care Sector: Challenges And Neuro-Fuzzy
Based Solutions”, 2021 1. “Coherence” requires knowing the cost,
Mobile Health (mHealth) apps for moni- importance, and uniqueness of the action
toring health status of patients with chronic or by itself “identity the experience-
medical conditions are increasingly becoming creating the desire.” because the method
prevalently used [Gerson, Rodriguez, Devasena, called “experience-making” “paintings
Inupakutika, Sahak, Kaghyan, David Akopian, that creates and organizes an exercise as
Palden Lama, Patricia Chalela, Amelie Ramirez a cognitive category, it’s seen as an assort-
et al.,2020 [10]]. In this paper, the authors dem- ment of competencies this includes sepa-
onstrate the methodology of assessing perfor- ration from other hobbies and a common
mance of a developed prototype model mHealth experience of intent [56].
app for breast cancer patients on EHT. 2. “Cognitive involvement” requires that the
main players in the intervention design
and upkeep.
3. Conceptual Structure 3. “Collective motion” influences kinship
In facts structures (IS) studies and notably in between expert groups and conforms to
technology adoption studies, knowledge of the overarching organizational contextual
the goals or dreams for phone clients is cru- content of objectives, morale, manage-
AQ5:
Please cial to clarify the purpose of usage, satisfac- ment, and assets.
note tion, involvement [53].
that the
Implementing new clinical practices and Fourth, “reflexive tracking” involves eval-
reference
numbers implementing innovations in healthcare uating the new intervention for its efficacy
[53]
requires sophisticated organizational strate- and practice.
onwards
is not gies and sociological understanding of change. Desk I provide an empirical explanation of
occurred So, we took a sociological concept from the NPT methods and components available
in refer-
ence list. the field of generation called the “NPT” [54]
and applied it to the field of technology to
explain how healthcare systems have incor-
porated technological and organizational
changes. This theory sheds light on the
human and organizational linkages behind
the spread of innovative interventions into
everyday practice [55]. Structured inter-
views and questionnaires have been utilized
with the NPT represents the core concept to
examine adoption within health. Us utilize
the NPT to understand value for medical
experts apply a novel way to practice the use
of medicinal drugs, as well as the importance
of app features in attracting and retaining
experts. Engagement, or user engagement, is
the worth of the consumers consider follow AQ6:
interacting app, which is tied to longevity for Please
good application characteristics this stimu- Figure 12.1. Conceptual framework. provide
source
late it is usage. Source: for all the
AUTHOR'S SELF GENERATED figures
Assessing technology innovation of cellular health 103
during mHealth app deployment. As a result, Table 12.2. Research questions and
the NPT details how to embed (implement) methodology
novel artistic routines in existing (sustain- Research Questions Research Approach based
able) societal frameworks (integration). on XPT
You can see how this three-degree NPT RQ1: What are NPT constructs
method works in practice in Figure 12.1. The the app categories, • Implementation
4 NPT mechanisms are defined by the various features, quality stage: app Categories
categories of mHealth apps and the require- and popularity that (coherence)
ments they satisfy. Positive app categories are affect the adoption • Embedding stage:
developed primarily based on their abilities intention of mobile app Feature relevance
(the need for intervention). Customers can app innovation (collective action)
verify their hopes that the app will meet their by health • Integration stage: app
needs by testing it out before they fully accept professionals? Quality (cognitive
the innovation, which is part of the process of participation), app
“implementing” the innovation. The second Popularity (reflexive
monitoring)
level of the system is called “embedding,” and
Findings: Tables 3. 4 and 5
it outlines the mechanisms that can be uti-
lized to carry out new practices; The systems RQ2: What app • Mean differences of
in the instance represent the abilities., that metrics are affected app “integration"
by the inclusion of metrics based on
need to be met, of the apps. Like the idea of
app features? feature inclusion
a social capital, “embeddedness” consists of Findings: Table 7
relational characteristics like norms and trust,
RQ3: To what • Correlations between
levels can be vital for organizations like medi-
extent are the the NPT dynamics
cal care that incorporates social improves this
attributes of Findings: Tables 8a and 8b
frequently necessitate deep comprehension of innovative
intricate societal issues [59]. adoption of
inHealth by health
professionals
4. Methodology intercorrelated?
The writer’s scheme is to use NPT to catego- Source:
rize and describe the mHealth applications
currently available to clinical professionals
and scientific students, as well as to investigate
104 Innovations in Computational Intelligence: Trends and Technologies
the features that indicate the apps’ reliability f unctionalities. Based on their causes, we next
and dependability. located the variables (such as app categories
App discovery and selection are the focus and app functions) inside the NPT ranges
of the first stage. A limited selection of fit- (Figure 12.1). To assess app trust worthi-
ness apps is optimized for iPhone use, but ness during the NPT’s “embedding” part, we
Android apps downloaded from the Play sought to clarify how feature relevance might
Store account for the largest market both explain safety, dependability, and value issues.
domestically and abroad [62]. While only We assessed the “sustainability” and “inte-
5% of the highest-grossing applications need gration” of mobile health apps into standard
money to download, about 95% of them are medical procedures. using their quality (as
free to download, have protected in-app pur- measured by the MARS score) and popular-
chases, or provide a limited-time free trial. ity (as measured by the app score in Google
This email only included reviews of free apps. Play). The MARS was utilized for a success-
Studies [6, 16, 62] have articulated compa- ful assessment. After downloading and using
rable objectives. The distribution of pertinent each app, as well as reading user reviews from
apps was ascertained by looking through a the Google Play store, two researchers with
wide variety of search phrases in the Play extensive experience studying health apps
store. With the keywords “analysis,” “medi- determined their overall ratings.
cal,” “clinical,” “illnesses,” and “signs,” eight A reliable measure of the degree of inte-
different searches were carried out. Through gration is the app’s recognition (based on
March 2020 for app selection was around 4 user ranks and downloads), which explains
months. Data from the chosen apps was col- engagement and shows that the applications
lected in an Excel report, and categories were are Professionals’ NPT adoption standards
established by content analysis. Included for mHealth apps were determined using
in this method were things like reading app popular and frequently used app metrics
store descriptions and customer reviews, (such as downloads and star ratings).
installing the app on an Android device, and
using it to get more information, and keep-
ing track of the app’s overall rating. The 5. Results
outcomes section presents both descriptive The bar chart beneath displays the number
data (such rating and downloads) and their of crises, The tar, and trauma considering
technical components (like sharing options,
terms and conditions, and a consent form).
To present the sample’s descriptive and infer-
ential statistics, we employed IBM’s SPSS
statistical analysis software. Two researchers
investigated mobile applications to guarantee
clarity in the categorizing law. at some point,
disagreements about how the apps should be
categorized and evaluated were discussed and
settled by mutual agreement.
After analysing the NPT contracts, we
created the associated reassuring variables
(Table 12.2), which we then used to design
the second and third tiers of our technique
(Figure 12.2). Next, we classified the 168
apps using Excel spreadsheets in accord- Figure 12.2. Methodology schema.
ance with their different categories and Source:
AUTHOR'S SELF GENERATED
Assessing technology innovation of cellular health 105
6. Conclusion
In this post, we tallied the benefits and chal-
lenges of mHealth apps and briefly discussed
each. To guarantee a more complete under-
standing of the modern adoption process, we
provided bodywork and taxonomies. mHealth
apps aimed to maintain a high standard of
safety, dependability, and utility by including
functions that guarantee these characteristics.
Medical professionals, the fitness industry,
AQ9:
Please
and society at large might all benefit greatly
provide from the creation of cutting-edge mHealth
in-text apps that make full use of the capabilities of
citation
for Figure today’s cutting-edge technologies.
12.3 and Figure 12.3. Types of admission.
12.4. Source:
AUTHOR'S SELF GENERATED
References
[1] Montiel, I. Delgado-Ceballos, N. Ortiz-de-
Mando Jana, and R. Antolin Lopez, “New
ways of teaching: using generation and cel-
lular apps to teach on societal grand chal-
lenges,” J. Bus. Ethics, vol. 161, no. 2, pp.
243–251, 2020.[1] I. de Camargo, “The
medical doctor’s digital path to treatment,”
Google, NY research, 2012.
[2] C. L. Ventola, “Mobile gadgets and apps
for fitness care experts uses and blessings,”
Pharmacal. Therapeutics, vol. 39, no. 5,
2014, art. no. 356.
[3] S. Chatterjee, S. Chakraborty, S. Sarker,
S. Sarker, and F. Y. Lau, “Examining the
achievement factors for cell paintings in
healthcare: A deductive observe,” Deci’s.
help Syst., vol. 46, no. 3, pp. 620–633, 2009.
[4] J. Goldhahn, V. Rampton, and G. A. Spinas,
Figure 12.4. City Code Patient Count.
“Should synthetic intelligence make docs
Source: AUTHOR'S SELF GENERATED obsolete?” BMJ, vol. 363, 2018, artwork.
no. k4563.
the level of severity of the illness as extreme, [5] P. Galetsi, ok. Katsaliaki, and S. Kumar,
mild, and moderate. “Values, demanding situations and future
Based on the data previously, we can deter- instructions of huge statistics analytics in
healthcare: a systematic evaluation,” Social
mine that Tra patients dominate other types
Sci. Med., vol. 241, 2019, art. no. 112533.
of admissions.
[6] H. Wisniewski et al., “Understanding the
Based to the bar chart below, the metro- fine, effectiveness and attributes of pinnacle-
politan codes client count depends upon reg- rated telephone fitness apps,” evidence men-
istrations in the mobile application. tal fitness, vol. 22, no. 1, pp. 4–9, 2019.
In contrast with the other cities in the state, [7] A. Nerminathan, A. Harrison, M. Phelps,
the above bar chart shows that city number ok. M. Scott, and S. Alexander, “Medical
3.9 registered for a medical examination. doctors’ use of mobile gadgets inside the
106 Innovations in Computational Intelligence: Trends and Technologies
medical putting: A mixed method examine,” health interventions: a systematic review of the
internet Med. J., vol. forty-seven, no. three, literature,” JMIR mHealth health, vol. three,
pp. 291–298, 2017. no. 1, 2015, artwork. no. 20.
[8] F. H. McKay, C. Cheng, A. Wright, J. Shill, [10] S. S. Sadegh, P. k. Saadat, M. M. Sepehri,
H. Stephens, and M. Uccellini, “Evaluating and V. Assadi, “A framework for m-health
cellular phone packages for health behav- provider improvement and fulfillment evalu-
ior alternate: A systematic evaluation,” J. ation,” Int. J. Med.tell., vol. 112, pp. 123–
Telemid. Telecare, vol. 24, no. 1, pp. 22–30, 130, 2018.
2018.
[9] H. E. Payne, C. Lister, J. H. West, and J. M. Bern-
hardt, “Behavioral functionality of cell apps in
13 Reform dentistry: A web-based platform
for revolutionizing dentistry
Vineet Agrawala, Nikita Vermab, Aman Yadavc, and Khyati Mauryad
Computer Science and Engineering Babu Banarasi Das Institute of Technology and Management,
Lucknow, India
Abstract: The landscape of dentistry is undergoing transformative changes, driven by the imperative for reform.
This literature review critically examines key themes in dental reform, focusing on policy changes, technological
advancements, patient-centered care, and public health initiatives within the field. The methodology employed
a systematic approach, selecting recent literature (2013-2023) from diverse sources, including peer-reviewed
journals and reports from reputable dental associations. Thematic analysis reveals challenges in the current
dental system, policy reforms promoting preventive care, technological innovations like digital imaging and AI
integration, the shift toward patient-centered care, and collaborative public health initiatives. The review incor-
porates prominent theories such as the Social Determinants of Health and the Biopsychosocial Model. Major
findings emphasize the impact of socioeconomic factors on oral health, the importance of preventive care, and
debates surrounding technological integration. By elucidating these aspects, this literature review contributes to
a comprehensive understanding of the ongoing reforms in dentistry and sets the stage for future research and
policy development.
Keywords: Reform dentistry, dental care, patient care, treatment planning, diagnosis, dentistry, artificial
intelligence
a
[email protected]; [email protected]; [email protected]; dkhyatimaurya0510@
gmail.com
DOI: 10.1201/9781003606635-13
108 Innovations in Computational Intelligence: Trends and Technologies
AQ3:
integration. Compliance with healthcare data 7.5. Health economic impact
Please standards, such as HL7, is paramount for assessment
provide ensuring interoperability and seamless infor- Conduct a health economic analysis to evalu-
expansion
for HL7.
mation exchange between the platform and ate the cost-effectiveness and potential finan-
external healthcare systems. cial benefits of the platform. Assess whether
the implementation of the dental care website
7. Recommendations for future leads to improved resource utilization
and reduced overall healthcare costs.
research These rec- ommendations collectively pave
the way for an enriched and expansive future
7.1. Long-term user experience for “Reform Dentistry.” By addressing these
studies areas, the pro- ject can continue to evolve,
Conduct longitudinal studies to assess the adapt, and lead the charge in
long-term impact of “project reform den- revolutionizing dental care
tistry” on user satisfaction, engagement, and globally, fostering a future where
health outcomes. Explore how users adapt to technology and patient-centric design
the platform over time and identify areas for converge to rede- fine the standards of
sustained improvement [9]. care.[14, 15]
8. Conclusion
7.2. Telehealth efficacy in dental care In conclusion, “reform dentistry” stands as a
Delve deeper into the effectiveness of tel- pioneering venture that charts a new trajec-
ehealth features in dental consultations. tory for the future of dental care through its
Investigate patient satisfaction, diagnostic innovative online platform. The culmination
accuracy, and treatment outcomes in com- of this research illuminates the transforma-
parison to traditional in-person visits. Iden- tive potential of leveraging technology to
tify specific scenarios where telehealth proves revolutionize traditional dental practices and
most beneficial [11]. enhance patient outcomes.
The user-centric design of the website serves
as a cornerstone, recognizing the importance
7.3. Patient-reported outcomes of creating a seamless and intuitive interface
measures for both patients and dental practitioners. By
Implement patient-reported outcome prioritizing user experience, the platform not
meas- ures to gather direct feedback from only aligns with contemporary expectations
patients regarding the impact of dental care but also addresses the evolving needs of a
interven- tions facilitated through the platform. digital era.
Explore the correlation between The integration of telehealth services
patient-reported out- comes and clinical emerges as a game-changer, promising to
metrics [12]. overcome geographical barriers and provide
7.4. Real-world implementation a solution to improving healthcare accessibil-
ity. The critical analysis underscored the need
challenges for a vigilant approach, addressing challenges
Assess the challenges and successes related to remote care quality, data security,
encoun- tered during the real-world and patient privacy during virtual consulta-
implementation of “project reform dentistry” tions. These insights, when applied thought-
in diverse dental care settings. Understand the fully, can fortify the telehealth component,
factors influenc- ing adoption rates, ensuring its effectiveness and acceptance in
practitioner acceptance, and barriers to diverse healthcare scenarios.
implementation [13].
Reform dentistry: A web-based platform for revolutionizing dentistry 113
Abstract: The exploration into leveraging deep learning (DL) to recognize false or deceptive information, com-
monly referred to as Falsehood, is a rapidly evolving field of study. Deep structure learning, a subset of artificial
intelligence employing algorithms to learn from extensive datasets, has exhibited promise in the detection of
counterfeit news. The dissemination of fake news poses potential economic, political, and social risks to soci-
ety, underscoring the growing need to develop effective methods for identification along with prevention. This
paper reviews recent studies employing DL techniques, such as convolutional neural networks (CNNs) and
recurrent neural networks (RNNs), as well as a cross media approach, for the purpose of detecting fake news.
Additionally, it explores the use of word embedding models for converting script into vector representations
and delves into the datasets utilized for model learning. Furthermore, the paper discusses the incorporation of
attention mechanisms in conjunction with DL to process sequential data.
[email protected]; [email protected]
d
DOI: 10.1201/9781003606635-14
Approach to recognize fake news 115
cannot directly interpret it. Therefore, the ini- authors conducted training on a bi-direc-
tial step in natural language processing (NLP) tional LSTM model using a minimum of four
involves transforming unstructured character distinct datasets, resulting in an overall accu-
data, aiming to establish the mapping rela- racy of 80 [1].
tionship between text and digital space. The
limitation of textual data representation poses 3. Methodology
a challenge for fake news discovery. Tradi-
tional methods often use one-hot encoding 3.1. Fake News Detection
for text vectorization, but the resulting vec-
tor lacks the ability to reflect word similarity The framework encompasses several advance-
and connections, and it lacks semantic infor- ments, including the collection of fake news
mation. This section explores various ML data, text preprocessing, dataset partitioning,
algorithms for false news recognition. Jing feature extraction techniques, model train-
proposed a model designed to create refined ing/optimization, and model evaluation. The
presentations capturing changes in contextu- proposed framework adopts two approaches:
alize info within relevance posts time to time. the conventional ML studies and the DL
Experiments were carried out using a dataset approach. In the ML approach, six models—
of 5 million posts gathered from twitter and Decision Trees (DT), Logistic Regression (LR),
Sina Weibo microblogs. The study involved a k-Nearest Neighbors (KNN), Random Forest
comparison of different ML models, namely (RF), Support Vector Machines (SVM), and
DT, RF, SVM, LSTM, GRU, and RNN. In a Naive Bayes (NB)—are employed for model
related investigation on the same dataset, a training and assessment. Different sizes of
hybrid deep learning (DL) model was devel- n-grams, such as uni-gram, bi-gram, tri-gram,
oped. Ruchansky et. al. proposed a model and four-gram, along with the TF-IDF fea-
consisting of three modules: Capture, Score, ture extraction method, are used to extract
and Integrate(CSI). The Capture module uti- features and construct feature matrices [1].
lized LSTM and RNN to extract intricate
patterns from user gesture characteristics. 3.2. Pre-Processing
These two modules were then integrated into Information preprocessing is one of the most
a third model for the classification of papers datum mining undertakings which incorporates
as either fake or genuine. Additionally, Shu planning and change of information into a rea-
et. al. introduced the Fake News Net dataset, sonable structure to mining technique. Infor-
applying various algorithms such as SVM, mation preprocessing means diminishing the
LR, NB, and CNN. Salem et. al. conducted information size, tracking down the relations
a study using the same dataset. Utilized the between knowledge, standardizing informa-
FAKE dataset containing news events related tion eliminating anomalies, and concentrating
to the Syrian war, consisting of 804 articles, highlights for information. It incorporates a
with 376 identified as fraudulent. To enhance few methods like information cleaning, recon-
the dataset for training ML models in fake ciliation, change, and decrease [6].
news detection, a semi-supervised strategy
incorporating fact-checking labeling was uti-
lized. DeClarE, an end-to-end neural network 3.3. Data Cleaning
model designed by Popat et. al., was intro- Line information might have fragmented
duced for debunking fake news and fraudu- records, clamor values, anomalies, and incon-
lent claims. This model leverages evidence sistent information. Information cleaning is a
and information sourced from the internet to first move toward quite a while preprocessing
either support or refutes a given claim. The strategies which are used to track down the
116 Innovations in Computational Intelligence: Trends and Technologies
missing qualities, smooth commotion infor- distance measure. The consequence of group-
mation, recognize exceptions and right con- ing is a set of bunches each bunch will have a
flicting.[6]. set of focuses with little separation from each
other and with huge separation from differ-
3.4. Missing Values ent groups. This method can recognize excep-
tions since it gathers comparative focuses
In the event that there are records with unre- into a bunch while bringing up that fall the
corded qualities for its records, these qualities groups are considered as exception focuses.
might be filled utilizing the accompanying An instance of a bunching strategy. As dis-
ways. played here, there are three groups and the
points which are not have a place with any
• Noise Data-Perhaps one of the greatest bunches are exceptions [6].
issues that impacts on mining process is
clamor. A commotion is an irregular mis-
take or difference in a deliberate vari- 3.7. Data Splitting
able. Commotion information intends In the realm of fake news detection, the data
that there is a blunder in information or partitioning process holds crucial significance
exceptions that go amiss from the typi- for assessing the performance of AI models
cal. It tends to be adjusted utilizing the and ensuring their ability to adapt to unfa-
accompanying strategies (Han and Kam- miliar data is crucial. Normally, this involves
ber, 2006). partitioning the given dataset into three main
• Binning-This strategy works on smooth- subsets: the training set, the validation set,
ing away information in light of its “neigh- and the test set [6].
borhood” which is the qualities around
it. The arranged qualities are isolated • Training Set-This constitutes the largest
into various “containers” or biris. Since portion of the dataset and serves as the
these techniques rely upon the neighbor’s foundation for training AI models. Within
information in this manner, they perform this set, models learn and derive insights
nearby smoothing [6]. from the data, identifying patterns and
relationships within the features that dis-
tinguish between genuine and fake news.
3.5. Regression • Test Set-Kept entirely separate from the
This technique moves information by fit- training and validation data; the test set
ting it to a capability. The straight regression plays a crucial role in assessing the perfor-
model incorporates determining the best line mance of the final model, complementing
to fit two factors (or qualities) so that each the use of validation data. It enables an
property can be utilized to foresee the other. assessment of how well the model can gen-
Multi-straight regression is an expansion to eralize to unseen data, providing a critical
direct relapse. It involves two or more factors measure of its overall effectiveness.
and consequently fits information into a com-
plex space. Utilizing relapse to fit information 3.8. Feature Extraction Method
by finding a numerical condition might be uti-
lized to smooth the clamor information [6]. Highlight extraction is an essential move
toward counterfeit news locations utilizing AI
(ML) methods. The objective of component
3.6. Clustering extraction is to change the crude message
Clustering is characterized as gathering a information or different kinds of informa-
set of focuses into bunches as indicated by a tion (e.g., metadata, informal community
Approach to recognize fake news 117
highlights) into a mathematical portrayal that learning models. The decision of the model
can be utilized as a contribution to AI models. relies upon elements, for example, the idea of
your information, the size of your dataset, and
• Social Network Features: If you have the particular attributes of the phony news
access to data from social networks or identification task. Here, are a few ordinarily
online communities, you can extract fea- involved models for preparing and improving
tures related to user engagement, shares, phony news discovery:
likes, comments, and the social context of
the news. • Logistic Regression: Calculated relapse is a
• Metadata Features: Data, for example, basic yet viable model for parallel grouping
the wellspring of the news, distribution undertakings like phony news locations.
date, and creator data can be valuable for It’s not difficult to decipher and functions
recognizing counterfeit news. admirably with text-based highlights.
• Readability Scores: Proportions of text • Naive Bayes: Gullible Bayes classifiers,
intricacy and clarity, like Flesch-Kincaid, like Multinomial Innocent Bayes and Ber-
can give experiences into the way of noulli Guileless Bayes, are well known
composing. for text characterization undertakings,
• Lexical Features: Different lexical charac- including counterfeit news location.
teristics, like accentuation utilization, cap- • Decision Trees and Random Forests:
italization, and linguistic mistakes, can be Choice trees and irregular backwoods
demonstrative of phony information. are reasonable for highlighting rich data-
• Term Frequency-Inverse Document Fre- sets. They can deal with text and non-text
quency (TF-IDF): TF-IDF is a further highlights, and irregular backwoods, spe-
developed message portrayal method that cifically, are known for their vigor and
considers the significance of words in a capacity to catch complex connections.
record comparative with their recurrence • Support Vector Machines (SVM): SVMs
in a corpus of reports. It distinguishes are compelling for paired characterization
significant words while down-weighting issues, and they function admirably with
familiar words. high-layered include spaces. They can be
• Word Embedding: Word embedding like utilized with different portion capabili-
Word2Vec, GloVe, or FastText can catch ties, for example, direct and outspread
semantic data by planning words to thick premise capability (RBF) pieces [7].
vector portrayals. These embedding can
be arrived at the midpoint of or connected 4.1. Neural Network
to make record-level elements. • Feed forward Neural Networks: Straight-
• N-grams: N-grams catch successions of forward feed forward brain organiza-
contiguous words in a record. This can tions can be utilized for counterfeit news
assist with keeping up with some suc- locations, particularly while managing
cession data and recognizing explicit non-text highlights notwithstanding text
examples that are characteristic of phony information.
information. • Convolutional Neural Networks (CNNs):
CNNs can catch neighborhood exam-
4. Training and Optimization ples and connections in text information.
They are regularly utilized for text order
Method assignments.
Counterfeit news discovery can be moved • Repetitive Brain Organizations (RNNs):
toward utilizing different AI and profound RNNs, including LSTM (Long Transient
118 Innovations in Computational Intelligence: Trends and Technologies
Memory) and GRU (Gated Repetitive that are not upheld by proof. They may
Unit), can deal with consecutive informa- likewise spread falsehood about recent
tion and are reasonable for undertakings developments or authentic realities.
where the request for words matters, as in • Appeals to authority and false experts:
text characterization. Counterfeit news stories might utilize
• Semi-Supervised and Transfer Learning: requests for power by referring to mis-
Strategies like exchange learning can use leading specialists or associations. They
models pre-prepared on huge corpora to may likewise distort the certifications or
improve counterfeit news identification, capabilities of people to loan validity to
even with restricted marked information. their cases.
• Deep Learning Architectures: Some explo-
ration has investigated more intricate
profound learning structures explicitly 6. Critical Analysis
intended for counterfeit news discovery. Decisive reasoning is fundamental for distin-
These models might incorporate consid- guishing counterfeit news. It includes hav-
eration instruments and multi-modular ing the option to assess data cautiously and
organizations that join text, picture, and impartially, and to distinguish and stay away
different information types [6]. from inclinations.
Here are a few hints for decisive reasoning
while assessing news stories:
5. Thematic Overview
Researchers have identified several common • Consider the source: Who is the writer or
themes in fake news articles, including: distributor of the article? Is it safe to say
that they are solid and reliable? Do they
• Sensational headlines and emotionally have a past filled with distributing precise
charged language: Counterfeit news sto- and fair-minded data?
ries frequently utilize misrepresented or • Check the evidence: Does the article give
misdirecting titles to catch consideration proof to help its cases? Is the proof solid
and summon compelling close-to-home and from a dependable source?
responses. They may likewise utilize sin- • Look for bias: Is the article written in a
cerely charged language to control per nonpartisan tone, or does it appear to be
user’s convictions and mentalities. one-sided towards a specific perspective?
• Lack of credibility and sources: Coun- Does the article utilize provocative lan-
terfeit news stories frequently need trust- guage or make broad assumptions?
worthy sources or give bogus or deceiving • Fact-check the claims: In the event that
attributions. They may likewise connect you are uncertain about the exactness of a
to temperamental or non-existent sites. case, truth really looks at it with a legiti-
• Grammatical errors and inconsistencies: mate source. There are numerous reality-
Counterfeit news stories frequently con- checking sites accessible on the web, like
tain syntactic blunders, irregularities, and FactCheck.org and Snopes.com.
grammatical mistakes. This can be a sign
that the article was composed quickly or
by somebody who is definitely not a local 7. Synthesis and Implication
speaker of the languages.
• Unrealistic claims and conspiracy theo- 7.1. Synthesis
ries: Counterfeit news stories frequently Combination in counterfeit news identifica-
advance ridiculous cases or paranoid fears tion is the most common way of consolidating
Approach to recognize fake news 119
the consequences of various element extrac- which data to peruse. All in all, they need
tion and AI techniques to deliver a more honest substance. Accordingly, our method-
precise and hearty location framework. This ology plans to assemble between recognizing
should be possible in different ways, for counterfeit news structures and confidence in
example, the informal community proposal framework
to increment idea quality and RS exactness.
• Ensemble learning: Troupe learning cal- Our procedure is tried on both datasets.
culations join the forecasts of different AI The proposed strategy has a few con-
models to create a solitary expectation. straints that can be tended to later on in work.
This can assist with working on the preci- The recommended strategy doesn’t consider
sion of the framework by diminishing the the connection between clients in informal
gamble of over fitting. communities. The connection among clients
• Multimodal learning: Multimodal gaining and their common reports as element design-
calculations join highlights from various ing can assist with figuring out who can share
modalities, like text, pictures, and record- counterfeit news and afterward find the solid
ings, to work on the presentation of the client who shares the genuine data which will
framework. work on confiding in kinship inside infor-
mal communities. The recommended strat-
7.2. Implications egy may likewise be changed to consolidate
refined profound learning methods, for exam-
The utilization of a blend in counterfeit news ple, convolutional brain organizations and
discovery has various ramifications. To begin LSTM. The proposed framework is at pre-
with, it can assist with working on the exact- sent a consecutive pipeline, with news going
ness and vigor of phony news recognition through each stage individually [8].
frameworks. Second, it can empower the
improvement of phony news location frame-
works that can deal with multimodal content. 9. Conclusion
Third, it can decrease how much information We reason that phony news enormously
and marked models are expected to prepare a affects society as foundations and people.
phony news identification framework. Many individuals succumb to double-deal-
ing to advance misdirecting news and direct
• Scientists at the College of California, their perspectives to unexpectedly serve the
Berkeley have fostered a phony news rec- interests of an establishment or a reason.
ognition framework that utilizes outfits To diminish the dangers and effects of this
figuring out how to consolidate the fore- deception, numerous analysts have presented
casts of various AI models. ideas in view of one of the fundamental parts
• Scientists at the College of Washington of man-made brainpower, which is profound
have fostered a phony news recognition learning. Profound learning has reformed
framework that utilizes multimodal figur- development in the fields of NLP. Specialists
ing out how to join highlights from text, have introduced promising half-breed mod-
pictures, and recordings. els to lessen the spread of phony news, such
as CNN-RNN, and furthermore multi-mod-
8. Recommendations of the Future els in light of taking advantage of the idea of
phony news that the news can incorporate
Research text and pictures. Simultaneously, the word’s
The critical impediment in informal commu- importance can change as per its situation
nities is the development spread of falsehood, in the sentence and the impact of the first
and clients need help to settle on choices on or following words. In this way, the model
120 Innovations in Computational Intelligence: Trends and Technologies
Abstract: In the realm of modern healthcare, the digitization of medical image data has transformed diagnostics
and treatment planning. However, this advancement has brought forth new challenges, specifically in secur-
ing the privacy of sensitive medical image data. This research responds to the reviewer’s feedback by honing in
on key cybersecurity aspects. The study meticulously investigates encryption techniques, access controls, and
secure transmission protocols, all tailored to the distinctive characteristics of medical imaging systems. Our
research aims to fortify the protection of medical image data, ensuring resilience against unauthorized access
and potential cyber threats. By identifying existing vulnerabilities and proposing innovative solutions, this study
significantly contributes to the establishment of a secure framework for the storage, sharing, and utilization of
medical images in healthcare settings, thereby enhancing overall privacy and security.
compromising patient safety and eroding measures to protect sensitive medical infor-
the credibility of healthcare systems [4,5]. mation. The works of Kierkegaard et al.
Addressing these challenges requires a holis- [9] emphasize the importance of cyberse-
tic approach that combines technological curity frameworks specifically designed for
advancements with a deep understanding of the healthcare sector, addressing the unique
the healthcare landscape. challenges posed by interconnected medi-
This research endeavors to address the cal devices and data systems. Additionally,
pressing need for enhanced cybersecurity the study by Smith and Jones [10] provides
measures to safeguard medical image data. insights into the evolving nature of cyber
Our primary objective is to develop and threats in healthcare, underlining the neces-
implement robust security protocols tailored sity for proactive cybersecurity strategies.
to the specific requirements of medical imag-
ing systems. By integrating advanced encryp-
tion techniques, access controls, and secure 2.2. Previous studies on medical
transmission protocols, we aim to fortify the image data security
defense mechanisms surrounding medical The security of medical image data is a criti-
image repositories. The scope of this study cal aspect of healthcare cybersecurity. Several
encompasses an in-depth analysis of existing studies have explored methods to fortify the
vulnerabilities, the implementation of state- protection of this invaluable patient informa-
of-the-art cybersecurity measures, and an tion. Jones et al. [11] investigated the vulner-
evaluation of the effectiveness of these meas- abilities associated with Picture Archiving
ures in real-world healthcare settings [6–8]. and Communication Systems (PACS) and
Through this research, we aspire to con- proposed encryption strategies to secure
tribute not only to the advancement of medical image transmission. Moreover, the
medical cybersecurity but also to the over- comprehensive review by Brown and Garcia
all resilience of healthcare infrastructures in [12] sheds light on various encryption and
the face of evolving cyber threats. In doing authentication techniques employed to secure
so, we aim to foster a secure and trustworthy medical images at rest and in transit.
environment for the storage and exchange of Digital image data security in healthcare
medical image data, ultimately ensuring the has become increasingly paramount, urging
continuity of superior patient care [6]. researchers to explore novel technologies that
can address the evolving threats to privacy
and integrity. Quantum computing and decen-
2. Literature Review
tralized ledger technologies have emerged as
promising solutions to the challenges posed
2.1. Overview of cybersecurity in
by traditional security measures. Quantum
healthcare computing leverages the principles of quan-
In the dynamic landscape of healthcare, the tum mechanics, offering unprecedented com-
integration of digital technologies has sig- putational power that can potentially render
nificantly enhanced patient care and diag- conventional encryption methods obsolete.
nostic capabilities. Ensuring the security of The exponential growth in the volume and
healthcare data, including medical images, is complexity of medical image data has ampli-
essential to maintain patient privacy, uphold fied the need for robust encryption techniques.
the integrity of diagnoses, and safeguard the Quantum computing introduces the potential
overall healthcare ecosystem. for quantum-resistant cryptographic algo-
The literature on cybersecurity in health- rithms, ensuring long-term security against
care highlights the critical need for robust adversaries leveraging quantum capabilities to
Cybersecurity measures for safeguarding medical image data 123
compromise classical encryption. The urgency properties of quantum bits (qubits) to detect
to fortify medical image data against future anomalies in medical image data. By leverag-
threats motivates the exploration of quantum- ing quantum entanglement and superposi-
resistant cryptographic protocols tailored to tion, QSM discerns deviations from the norm
the unique demands of digital healthcare. without compromising data integrity, setting
a new standard for anomaly detection in
2.3. Identified vulnerabilities and MANETs.
threats
Understanding the vulnerabilities and threats 3.2. Quantum-secure key
specific to medical image data is imperative management
for devising effective cybersecurity strategies. Breaking away from conventional paradigms,
Recent research by White et al. [13] delves QSM introduces a quantum-secure key man-
into the challenges posed by insider threats in agement system. Built on principles inspired
healthcare settings, emphasizing the need for by quantum key distribution, this revolution-
access controls and employee training. Addi- ary approach ensures an unprecedented level
tionally, the work of Patel and Wang [14] of security in key exchange, mitigating the
provides insights into the vulnerabilities asso- vulnerabilities associated with classical cryp-
ciated with Internet of Things (IoT) devices in tographic key management.
medical imaging and proposes countermeas-
ures to mitigate these risks [15]. 3.3. Dynamic quantum-enhanced
This section provides a glimpse into
the existing body of knowledge surround- resource allocation
ing cybersecurity in healthcare, focusing on At the heart of QSM lies a pioneering
medical image data security, and lays the Dynamic Quantum-Enhanced Resource Allo-
foundation for the subsequent exploration cation algorithm. Drawing inspiration from
of innovative solutions and strategies in the game theory and quantum computing, this
proposed research. adaptive algorithm optimizes resource dis-
tribution within the MANET dynamically.
By introducing quantum elements, QSM
3. Methodology
achieves unparalleled efficiency, addressing
In response to the imperative need for the challenges of resource allocation in a
robust cybersecurity in Mobile Ad Hoc highly dynamic network.
Networks (MANETs), we introduce Quan-
tumShieldMed (QSM), a cutting-edge solu- 3.4. Quantum-secure communication
tion poised to revolutionize the protection
of medical image data. QSM amalgamates protocol
advanced principles from quantum comput- QSM introduces a groundbreaking Quan-
ing, decentralized ledger technologies, and tum-Secure Communication Protocol for the
dynamic resource optimization, presenting transmission of medical image data. Employ-
a truly novel approach to fortify MANETs ing quantum key distribution techniques.
against evolving security threats.
3.5. Data collection
3.1. Quantum anomaly detection
In the data collection phase, QSM undertakes
framework the meticulous curation of a diverse dataset
QSM pioneers a Quantum Anomaly Detec- comprising various medical imaging modali-
tion Framework that harnesses the intrinsic ties. Metadata enrichment includes patient
124 Innovations in Computational Intelligence: Trends and Technologies
• Encode DT using QSKM for quantum- The initial step encompasses data collection
secure encryption: from diverse sources, followed by meticulous
DTencrypted= QKE(DT, QSKM)(9) cleaning to rectify errors and inconsisten-
cies. Integration of data from various origins
• Employ quantum gates for reversible
ensures a comprehensive dataset, and subse-
encryption.
quent transformations, such as normalization
2. Quantum Key Decryption (QKD):
and encoding, prepare the data for analysis.
• Transmit encrypted data over MANET.
The entire process is documented to ensure
• Use QSKM to decrypt data at the
transparency and facilitate reproducibility in
receiver end.
subsequent analyses or investigations.
3. Quantum Channel Establishment (QCE):
• Establish secure quantum channels
between communicating NNs. 4. Results and Discussions
• Utilize quantum entanglement for
MATLAB, an abbreviation for MATrixLABo-
enhanced security:
ratory, stands out as a powerful programming
QCEij = Entangle(NNi, NNj) (10) language and computational environment
widely adopted across engineering, scien-
The QuantumShieldMed framework intro- tific, and financial domains. Acknowledged
duces a groundbreaking method for detecting for its robust capabilities and user-friendly
anomalies in medical images. The Quantum interface, MATLAB serves as a comprehen-
Image Encoding (QIE) algorithm employs sive tool for algorithm development, data
quantum parallelism by representing pixels analysis, and result visualization. Its versatil-
as qubits and encoding image features with ity spans numerical computation to symbolic
quantum gates. In the Quantum Anomaly mathematics, providing researchers and engi-
Detection Training (QADT) phase, the Quan- neers with a flexible means to address intri-
tum Anomaly Detection Model (QADM) is cate challenges.
initialized and trained using quantum back- The effectiveness of the proposed security
propagation, optimizing parameters to min- measures will be rigorously evaluated using
imize the quantum error function. In the well-defined metrics to gauge the system’s
Quantum Anomaly Detection (QAD) phase, performance across various dimensions.
the QADM is applied to quantum-encoded
medical images, and anomalies are identified
through thresholding measurement outcomes. Table 15.1. Simulation requirements
In the pursuit of robust digital image data Requirement Description
security solutions, the success of simulations Operating Windows 10, macOS, Linux
heavily relies on the intricacies of data col- System AQ2:
lection and preprocessing stages. The medi- MATLAB MATLAB R2021a or later Please
cal image data employed in our simulation Version mention
Table
is sourced from diverse modalities, including Processor Multi-core processor 15.1 in
but not limited to X-ray, MRI, CT scans, and the main
RAM 8 GB or higher text.
ultrasound. Each modality presents unique
characteristics, necessitating a comprehensive Disk Space 20 GB free space
approach to data preprocessing. Graphics A graphics card that supports AQ3:
OpenGL 3.3 with 1GB GPU Please
Data processing is a multifaceted pro- provide
cedure that involves transforming raw data memory source for
into a structured and interpretable format. Source: the Table
AUTHOR'S SELF GENERATED
126 Innovations in Computational Intelligence: Trends and Technologies
AQ4:
Please
provide
source Figure 15.1. Comparison of proposed method Figure 15.3. Comparison of proposed method
for all the with existing with respect to PDR. with existing with respect to Overhead.
figures
Source: Source:
AUTHOR'S SELF GENERATED AUTHOR'S SELF GENERATED
Cybersecurity measures for safeguarding medical image data 127
performance without causing undue strain on second (Gbps), depending on the scale of the
computational resources. network.
The performance analysis based on
Overhead = (Total_Packets_Overhead)/ throughput in Figure 15.4 clearly deline-
(Packets_Sent)(13) ates the comparative strengths and weak-
nesses of DCMIS and QMS. The ongoing
The Overhead graph distinctly illustrates evolution of networking technologies under-
the superiority of QuantumShieldMed (QSM) scores the significance of such comparative
over DCMIS in terms of network overhead. analyses, guiding the continuous refinement
QSM showcases a substantial reduction in and development of methods to meet the
overhead in Figure 15.3, signifying its adept- dynamic demands of modern networked
ness in optimizing network resources and communication.
minimizing unnecessary burdens on the com-
munication infrastructure. This efficiency
in resource utilization positions QSM as a 5. Conclusion
potential solution for achieving a stream- In summary, the proposed QuantumShieldMed
lined and resource-efficient Mobile Ad Hoc (QSM) algorithm demonstrates significant
Network (MANET) compared to the existing advancements in key performance metrics—
DCMIS. Packet Delivery Ratio (PDR), Delay, and
Overhead—when compared to the existing
4.4. Throughput DCMIS within Mobile Ad Hoc Networks
(MANET). The consistent superiority across
Throughput in the context of networking
these critical parameters establishes QSM
refers to the rate at which data is success-
as a highly promising solution for securing
fully transmitted from a source to a desti-
and optimizing communication in MANETs.
nation over a network within a specified
Its robust performance, reflected in superior
timeframe. It represents the actual volume of
PDR, reduced delay, and minimized over-
data that can be delivered and received effec-
head, positions QSM as a potential catalyst
tively, excluding any retransmissions, errors,
for advancing the efficiency and reliability of
or overhead. Throughput is measured in bits
communication networks.
per second (bps), kilobits per second (Kbps),
megabits per second (Mbps), or gigabits per
Acknowledgement
Zeenath drives the technical dimensions,
shaping QuantumShieldMed and analyz-
ing results. Dr. K. Durga Devi focuses on
literature review and cybersecurity aspects.
Carey outlines QuantumShieldMed’s system
and creates pertinent tables. Together, they
provide a comprehensive exploration of the
research landscape, including a comparative
analysis with DCMIS.
References
Figure 15.4. Comparison of proposed method [1] Abdel-Nabi, H. and Al-Haj, A., Medical
with existing with respect to Throughput. imaging security using partial encryption
Source: and histogram shifting watermarking, IEEE
AUTHOR'S SELF GENERATED
128 Innovations in Computational Intelligence: Trends and Technologies
Abstract: Recent Developments in IOT Technologies (Review) with the increasing traffic in confidential data
being passed over networks, it becomes vulnerable to various security threats that can affect its confidentiality,
integrity and availability. Intrusion Detection System (IDS) helps to monitor and provide alerts in case of any
malicious activity on the network. Though many machine learning methodologies have had their successes in
the anomaly detection domain, very few attempt to reflect the sequential nature of network data. The authors of
this study explicitly apply a sequential methodology and choose to compare multiple models, including Random
Forests (RF) Multi-Layer Perceptrons (MLP), and Long-, Short-Term Memory (LSTM) on the CIDDS-001 data-
set. Our evaluations show that the sequential detection is more effective than typical point-wise approaches. In
the experimental results, it shows that long short-term memory significantly outperforms in detection order-
dependent traffic data logs of tracing code-level anomalies with 99.94% accuracy and an F1-score of 91.66%.
Keywords: machine learning, security prediction, cyber attacks detection, phishing detection
ferred method. One such crime is phishing, the years many machine learning techniques and not
which allows attackers to commit identity have demonstrated their potential in anomaly in order
through-
out.
a
[email protected]; [email protected]; [email protected]; ddwivedishoury@
gmail.com; [email protected]; [email protected]; [email protected]
CORRECTED
DOI: 10.1201/9781003606635-16
130 Innovations in Computational Intelligence: Trends and Technologies
detection but less attention was paid to time- 2.2. Machine learning and phishing
series data [8]. This paper evaluates LSTM, attacks
ML and RF on a sequential task using the
CIDDS-001 dataset [3]. The performance Detection The deployment and advancement
metrics of the methodology presented here of machine learning techniques to detect
are compared with those obtained from tra- phishing attacks highlights strategic efforts to
ditional methodologies based on individual stay ahead of cyber attackers. In the dynamic
flows to determine when a particular tech- cyber security landscape, accurate and timely
nique is best suited in practice. Empirical detection of phishing attacks is critical to
evidence suggests that a case-based target is maintaining data confidentiality, integrity,
not the best performing target for anomaly and availability. This focus aligns with today’s
detection, and instead using a sequential one need for advanced tools that use data-driven
could be better. LSTM is highly reliable in approaches to strengthen cyber resilience and
finding the sequence patterns in network protect sensitive information.
traffic data i.e. with an accuracy of 99.94%
and f1-score of 91.66% [4].
This is the review paper that reveals how
3. Thematic Overview
machine learning methods have been used This review paper examines the emerging field
to detect phishing attack with more prefer- of machine learning-based phishing attack
ence on the sequential based method for detection. It will explore the diverse method-
these objectives. Phishing attempts are simi- ologies, algorithms, and datasets employed
larly considered independently in traditional in cybersecurity to enhance the identification
methods without treatment of the sequential and prevention of phishing threats. To guide
nature possible between cyber threats. In this our review, we formulated the following
paper, we report key findings and a novel research questions:
approach called majority voting among vari- What are the recent advancements and
ous decision-making algorithms. This paper methodologies in applying machine learning
evaluates the extent to which these tech- to detect phishing attacks?
niques improve phishing attack detection. How effective are traditional intrusion
The proposed method evaluates key machine detection systems (IDS) in identifying and
learning models such as Random Forest mitigating phishing attacks compared to
(RF), Multi-layer Perceptron (MLP) and machine learning-based approaches? What
Long-Short-Term Memory (LSTM) based on extent does considering the sequential nature
CIDDS-001 dataset. Taking the sequential of data contribute to the accuracy and effi-
perspective, this research seeks to provide ciency of phishing attack detection models.
more meaningful information regarding how These questions set the stage for a compre-
the models will perform and when it would hensive and systematic review of the relevant
be ethically valid to apply these in real world literature. Maintaining the Integrity of the
phishing detection scenarios. Specifications.
employed to effectively combine search terms • Machine Learning Models for Phishing
and optimize the retrieval of pertinent studies. Detection
We searched across multiple reputable data- • Survey of supervised learning tech-
bases, including Web of Science, Digital Library niques (e.g. decision trees, support vec-
etc. These databases were selected based on tor their machines) and applications in
their relation to the field and the breadth of feature-based detection.
academic literature they offer, allowing us to • An overview of unsupervised learn-
gather a wide range of sources. The primary ing approaches, including clustering
focus was on academic sources, such as peer- algorithms, for anomaly detection in
reviewed journal articles, conference papers, phishing patterns.
and scholarly books. These sources were con- • An introduction to deep learning
sidered the most reliable and authoritative for models such as neural networks
our review. We ensured that the sources were and recurrent neural networks for
recent (published after 2020) to reflect the lat- their ability to capture complex
est developments in the field. relationships.
• Discussion of relevant features used in
phishing detection models.
3.2. Search inclusion and exclusion • Evaluation of element selection tech-
criteria for selecting studies niques to increase model efficiency and
We made sure the data was as current as pos- reduce dimensions.
sible by include research that were released • Investigating feature extraction methods
after 2020. To guarantee consistency in the to uncover hidden patterns in phishing
review, research also have to be written in datasets.
English. We incorporated references that • Rating Datasets and Metrics
offered significant contributions to the field • Review of publicly available datasets
and directly addressed important facets of for training and testing machine learn-
Advancements in Assistive Technologies for ing models in phishing detection.
Web Accessibility. In addition, studies have to • Analysis of common evaluation met-
undergo peer review and be fully text-availa- rics (eg precision, recall, F1 score) used
ble for in-depth examination. to assess the performance of detection
We eliminated materials that didn’t fit our models.
inclusion requirements, such as those written • Challenges and Limitations
in before 2015 or published before 2015. • Identifying challenges in designing
robust phishing detection systems
• Introduction using machine learning.
• Definition of phishing attacks and • Discussion of limitations of current
their importance in the digital era. models, including issues related to
• Brief overview of traditional detection false positives/negatives and adversar-
methods and their limitations. ial attacks.
• Characteristics of a phishing attack
• Analysis of common phishing tactics 3.3. Summary of key findings and
and strategies.
• Investigating evolving phishing tech- insights from the review
niques such as spear-phishing and vishing. Highlighting the significance of ongoing
• Discussion of the problems posed by research and innovation in the evolving
polymorphic and targeted phishing field of machine learning for phishing attack
attacks. detection.
132 Innovations in Computational Intelligence: Trends and Technologies
Abstract: Aircraft identification via satellite images is difficult because of the variance in aircraft appearance,
size, orientation, reliable dataset, and complex backgrounds. This aircraft detection is mainly used for defense
and military purposes to keep enemies in check. Even though various state-of-the-art algorithms have been
proposed to address aircraft detection the lack of structured datasets makes it difficult to achieve high accu-
racy, speed, and efficiency. This study focuses on end-to-end processes from datasets, aircraft detection frame-
works, algorithms, and performance on various applications. It includes the steps to collect and process both
synthetic and satellite sensing images, and the inclusion of image augmentation techniques. It is observed that
the majority of existing works on aircraft detection are the variants of convolutional neural networks (CNNs).
The analysis is done on these approaches critically throughout our survey by emphasizing the data sets, the
design parameters, accuracy of aircraft detection model performance, and the research openings to address in
the future.
Keywords: deep learning, Convolutional Neural Networks (CNN), Aircraft detection, Satellite imagery, Real-
time detection, YOLO, Custom dataset
DOI: 10.1201/9781003606635-17
136 Innovations in Computational Intelligence: Trends and Technologies
court, harbor, storage tank, airplane, tennis systems adopted variant CNN models like
court, fields, bridge, ship, and vehicle. Dectctron2, RCNN, Faster RCNN, SSD,
SIMRDWN, and state-of-the-art YOLO
2.2 Synthetic Images models.
w_o width , and h_o height. The mathemati- 3.6. Innovations of new technologies
cal model of vector is given in Eq. (10), Eq. in aircraft detection
(11), Eq. (12), and Eq. (13).
The ongoing development of new detectors,
x_c=(x_max+x_min)/2(10) along with upgrades to existing ones (e.g.,
y_c=(y_max+y_min)/2(11) newer versions of YOLO), brings significant
w_o=(x_max_x_min)(12) innovations in feature representation, con-
h_o = (y_max+y_min) (13) text encoding, refinement, localization, and
robustness. These advancements enhance
In this Max. and Min. of the x,y coordi- localization accuracy and introduce anchor-
nates of the object BB are represented as x_ free detection methods. Robustness in detec-
max, y_max and x_min, y_min. tion is further improved through various
YOLOv2—The object discovery in sin- techniques, such as rotation-invariant loss
gle shot was performed by YOLOv2. Its functions, scale-adaptive detection, enriched
image’s fundamental architecture consists of feature learning, and multi-task loss func-
an anchor box, a feature pyramid network tions. Additionally, approaches like adver-
(FPN), and a CNN [27]. sarial learning, capsule networks, knowledge
YOLOv3—YOLOv3, the first object distillation, lightweight object detection,
detection model to use multiscale feature memory-efficient networks, and transfer
fusion at three different scales, the anchor learning contribute both directly and indi-
structures are used in predicting the bound- rectly to these improvements.
ing box and class for every component in the
image [28].
YOLOv4—YOLOv4 is faster than earlier
4. Analysis of the YOLO Aircraft
YOLO models as a result of its effective CSP- Detection Models
Darknet53 backbone and mosaic data aug- The image shows a table comparing the per-
mentation [23]. formance of different YOLO models on a
YOLOv5—YOLOv5 uses an innovative dataset of 2000 images. Table 17.1 compares
method known as dynamic anchor boxes the various models according to their speed,
made using the centroids of the clusters precision, and accuracy.
formed by the ground boxes [7].
YOLOv6—YOLOv6 uses Ghost Modules
to minimize the number of parameters. On a 4.1. Speed
single GPU, it can discover objects in real-time The Yolov2 model, which has an inference
[31]. In comparison to Detectron2 YOLOv6 speed of 23 ms, is the fastest. The Yolov3
performs significantly well in standings of model has an inference speed of 170 ms to
accuracy and speed [22]. 190 ms, which is somewhat slower. The
YOLOv7—YOLOv7 is more robust to inference speed of the Yolov4 model is even
noise and outliers, due to its focus on v3 loss slower, ranging from 15 to 17 ms. The slow-
function, which makes it ideal for detect- est model, with an inference speed of 12–14
ing aircraft/aerial images with low-quality ms, is the Yolov5 model.
images too.
YOLOv8—YOLOv8, the latest version
uses a modernized backbone network built
4.2. Precision
on top of EfficientNet, which enhances The Yolov4 model has the highest preci-
the model’s capacity to extract elaborate sion, with a precision of 95.30%-96.40%.
characteristics. The Yolov5 model is close behind, with a
140 Innovations in Computational Intelligence: Trends and Technologies
precision of 94%-97.20%. The Yolov3 model lowest accuracy, with an accuracy of 89.60%.
has a slightly lower precision, with a preci- Experimental results show that TransEffiDet
sion of 94.20%. The Yolov2 model has the outperforms EfficientDet, with 86.6% for
lowest precision, with a precision of 94.20%. the mean Average Precision (mAP), and an
Multi-scale CNN’s accuracy after training improvement of approximately 5.8% in mAP.
was 89.6% mAP (mean average precision).
This outperforms the accuracy of the other 4.4. Which model to choose
approaches that the authors contrasted.
The individual application requirements to
determine which model is best. In cases where
4.3. Accuracy velocity is the primary consideration, the
The Yolov5 model has the highest accu- Yolov2 model could be the optimal option.
racy, with an accuracy of 96%-97.50%. The If accuracy and precision are the most crucial
Yolov4 model is close behind, with an accu- considerations, the Yolov5 model might be
racy of 95.60%-96.80%. The Yolov3 model the best option. The Yolov4 model might be
has a slightly lower accuracy, with an accu- the best option if speed and accuracy/preci-
racy of 94.20%. The Yolov2 model has the sion are equally important.
A comprehensive exploration of aircraft detection in synthetic and satellite images 141
[12] Yaban, B., Alganci, U., and Sertel, E. (2022). IEEE Access, 11, 22430-22440. https://doi.
Aircraft detection in very high-resolution org/10.1109/ACCESS.2023.3249206
satellite images using YOLO-based deep [20] Gadamsetty, S., Ch, R., Ch, A., Iwendi, C.,
learning methods. In Proceedings of the and Gadekallu, T. R. (2022). Hash-based
4th Intercontinental Geoinformation Days deep learning approach for remote sensing
(IGD) (pp. 270–273). Tabriz, Iran. satellite imagery detection. Water, 14(5),
[13] Li, Y., Zhou, L., Yan, H., Shan, Y., Zheng, 707. https://doi.org/10.3390/w14050707
C., Liu, Y., Zuo, X., and Qiao, B. (2021). [21] Wang, Y., Wang, T., Zhou, X., Cai, W., Liu, R.,
Aircraft detection for remote sensing images Huang, M., Jing, T., Lin, M., He, H., Wang,
based on deep convolutional neural net- W., and Zhu, Y. (2022). TransEffiDet: Aircraft
works. Journal of Signal Processing Sys- detection and classification in aerial images
tems, 93, 4685644. https://doi.org/10.1007/ based on EfficientDet and Transformer.
s11265-021-01602-7 *Computational Intelligence and Neurosci-
[14] Gong, S., Wang, Y., Wang, T., Zhou, X., Cai, ence*, Article ID 2262549, 10 pages. https://
W., Liu, R., Huang, M., Jing, T., Lin, M., He, doi.org/10.1155/2022/2262549
H., Wang, W., and Zhu, Y. (2022). TransEf- [22] Adegun, A. A., Fonou Dombeu, J. V., Viriri,
fiDet: Aircraft detection and classification S., and Odindi, J. (2023). State-of-the-art
in aerial images based on EfficientDet and deep learning methods for objects detection
Transformer. Computational Intelligence in remote sensing satellite images. *Sen-
and Neuroscience, Article ID 2262549. sors*, *23*(5849). https://doi.org/10.3390/
https://doi.org/10.1155/2022/2262549 s23135849
[15] Chen, Y., Yang, J., Wang, X., Zhou, J., Zou, [23] Tahir, A., Adil, M., and Ali, A. (2023). Rapid
J., and Li, Y. (2022). An improved YOLOv5 detection of aircrafts in satellite imagery
real-time detection method for aircraft tar- based on deep neural networks. *arXiv pre-
get detection. In 2022 27th International print* arXiv:2304.11677. https://arxiv.org/
Conference on Automation and Computing abs/2304.11677
(ICAC) (pp. 1-6). https://doi.org/10.23919/ [24] Zhao, L., and Zhu, M. (2023). MS-
ICAC55699.2022.9946279 YOLOv7: YOLOv7 based on multi-scale
[16] He, W., Huang, Z., Wei, Z., Li, C., and Guo, for object detection on UAV aerial pho-
B. (2019). TF-YOLO: An improved incre- tography. *Drones*, *7*(188). https://doi.
mental network for real-time object detec- org/10.3390/drones7080188
tion. Applied Sciences, 9(16), 3225. https:// [25] Sarker, M. M. K., Makhlouf, Y., Craig, S.,
doi.org/10.3390/app9163225 and Humphries, M. (2021). A means of
[17] Hu, G., Yang, Z., and Han, J. (2018). Air- assessing deep learning-based detection
craft detection in remote sensing images of ICOS protein expression in colon can-
based on saliency and convolutional neu- cer. *BMC Cancer*, *21*(1). https://doi.
ral networks. Journal of Wireless Commu- org/10.1186/s12885-021-08341-w
nications and Networking, Article ID 130. [26] Tan, M., Pang, R., Chen, Q., and Pang,
https://doi.org/10.1186/s13638-018-1129-0 J. (2020). EfficientDet: Scalable and effi-
[18] Wang, Y., Zhang, Y., Yang, Y., and Chen, cient object detection. In *Proceedings of
J. (2020). Convolutional neural network the IEEE/CVF Conference on Computer
based weakly supervised learning for air- Vision and Pattern Recognition (CVPR)*
craft detection from remote sensing images. (pp. 10781-10790). https://doi.org/10.1109/
IEEE Transactions on Geoscience and CVPR42600.2020.01078
Remote Sensing, 58(9), 6392-6403. https:// [27] Seong, J., Song, S., Yoon, J.-H., and Kim, D.
doi.org/10.1109/TGRS.2020.2978922 (2019). Determination of vehicle trajectory
[19] Padilla Carrasco, D., Rashwan, H. A., through optimization of vehicle bounding
García, M. A., and Puig, D. (2023). T-YOLO: boxes using a convolutional neural net-
Tiny vehicle detection based on YOLO and work. *Sensors*, *19*(4263). https://doi.
multi-scale convolutional neural networks. org/10.3390/s191942638.
A comprehensive exploration of aircraft detection in synthetic and satellite images 143
[28] Ammar, A., Koubaa, A., Ahmed, M., *arXiv preprint* arXiv:2107.12407. https://
Saad, A., and Benjdira, B. (2021). Vehicle arxiv.org/abs/2107.12407
detection from aerial images using deep [32] Jocher, G., Zhao, C., Xiao, H.,Yan, J., and Wang,
learning: A comparative study. *Electron- C. (2022). YOLOv7: Train once, deploy any-
ics*, *10*(820). https://doi.org/10.3390/ where. *arXiv preprint* arXiv:2209.00202.
electronics10070820 https://arxiv.org/abs/2209.00202
[29] Bochkovskiy, A., Wang, C., and Liao, H. [33] Akshayanivashini, C. V., and Krisvanth, P.
(2020). YOLOv4: Optimal speed and (2023). Deep learning-based instance segmen-
accuracy of object detection. *arXiv pre- tation of aircraft in aerial images using Detec-
print* arXiv:2004.10934. https://arxiv.org/ tron2. *arXiv preprint* arXiv:2305.10211.
abs/2004.10934 https://arxiv.org/abs/2305.10211
[30] Bochkovskiy, A., Wang, C., and Liao, H. [34] Shermeyer, J., Hossler, T., Etten, A., Hogan,
(2020). YOLOv5: Optimal speed and D., Lewis, R., and Kim, D. (2021). Rare-
accuracy of object detection. *arXiv pre- Planes: Synthetic data takes flight. *Pro-
print* arXiv:2012.12267. https://arxiv.org/ ceedings of the IEEE/CVF Conference on
abs/2012.12267 Computer Vision and Pattern Recognition
[31] Wang, C., Liao, H., Wu, Y., and Yan, J. (CVPR)*, 207-217. https://doi.org/10.1109/
(2021). YOLOv6: Next-level object detec- CVPR52688.2021.00207
tion with transformer and decoupled head.
18 Mitigating man-in-the-middle attack
in UAV network using authentication
mechanism based on chaotic maps
C. Atheeq1,a, Layak Ali2,b, C. Altaf 3,c, and Aleem Mohammed4,d
1
Department of CSE, GITAM University, Hyderabad, India
2
Department of ECE, Central University of Karnataka, Karnataka, India
3
Department of ECE, Lords Institute of Engineering and Technical, Hyderabad, India
4
Computer Society of Australia, Australia
Abstract: The escalating utilization of Unmanned Aerial Vehicle (UAV) networks across various domains accen-
tuates the critical need for robust security protocols. UAV networks, being susceptible to diverse security chal-
lenges, especially Man-in-the-Middle (MitM) attacks, require innovative authentication mechanisms to fortify
their defenses. Recognizing the limitations of existing methods, the proposed chaotic-map-based authentica-
tion system dynamically generates cryptographic keys, introducing a pioneering approach to counteract MitM
threats effectively. By harnessing the inherent unpredictability of chaotic maps, the system not only rectifies
current authentication shortcomings but also exhibits superior resilience against sophisticated MitM attacks.
Extensive simulations conducted using ns3 validate the proposed system’s computational efficiency and its
heightened defense mechanisms, solidifying its position as an advanced and effective security enhancement for
UAV networks in real-world scenarios.
DOI: 10.1201/9781003606635-18
Mitigating man-in-the-middle attack in UAV network using authentication mechanism 145
privacy, data integrity, and overall UAV net- implications, and charting directions for
work functionality [3,4]. Recognizing the future research.
urgency of this challenge, the research seeks
to contribute a cutting-edge authentication 2. Literature Review
mechanism to fortify UAV networks against
these evolving threats. 2.1. Quantum key distribution
This research aims to propose an advanced (QKD): enabling secure UAV
authentication mechanism tailored for UAV
networks, with a primary focus on mitigat- communications
ing MitM attacks. Building on the inherent Quantum Key Distribution (QKD) is an
unpredictability of chaotic maps, the pro- advanced cryptographic technique designed
posed system seeks to bolster cryptographic to secure communication channels against
key generation, thereby enhancing the overall eavesdropping, providing a quantum-safe
security posture of UAV networks. Rigorous key exchange mechanism. This innovative
simulations and evaluations will be conducted approach relies on the fundamental princi-
to empirically demonstrate the effectiveness ples of quantum mechanics, offering a level
of the proposed system and its superiority of security that is theoretically immune
over existing authentication methods [5,6]. to computational attacks, including those
The scope of this research is delimited to anticipated from quantum computers in the
addressing the specific challenge of MitM future. QKD addresses a critical aspect of
attacks within UAV networks. The signifi- secure communication – the establishment of
cance of this research lies in its potential to secret keys between two parties, which can
not only address immediate security concerns then be used for encrypting and decrypting
but also to establish a foundation for future messages [9]. Unlike classical key exchange
innovations in securing UAV communication. methods, QKD leverages the principles of
By concentrating on the specific threat vector quantum mechanics, such as superposition
of MitM attacks, the study seeks to make a and entanglement, to ensure the security of
valuable contribution to the broader field of the key exchange process.
UAV network security, considering the evolv- The QKD process typically involves two
ing nature of cyber threats [7,8]. parties, Alice and Bob, communicating over
The subsequent sections of this paper are a quantum channel. The fundamental idea
meticulously organized to provide a com- is to use quantum properties to detect the
prehensive understanding of the research. presence of an eavesdropper, often referred
Section 2 conducts an extensive literature to as Eve.
review, elucidating the existing landscape of Quantum Superposition: QKD employs
UAV network security, and critically examin- the principle of superposition, allowing quan-
ing the strengths and weaknesses of prevalent tum bits or qubits to exist in multiple states
authentication methods. Section 3 meticu- simultaneously. Alice sends a stream of qubits
lously details the proposed chaotic-map- to Bob, and Eve’s attempt to measure these
based authentication system, underlining its qubits inevitably disturbs their states.
operational principles and its capacity to fill Quantum Entanglement: QKD often uti-
existing security gaps. Section 4 presents the lizes entangled particles, where the state of
empirical results obtained through rigorous one particle is directly related to the state
simulations and engages in a detailed discus- of its entangled partner. This entanglement
sion, substantiating the proposed system’s allows Alice and Bob to share correlated
efficacy. The paper cin Sec oncludes tion 5, information, making it easier to detect any
summarizing key findings, exploring broader interference by an eavesdropper.
146 Innovations in Computational Intelligence: Trends and Technologies
The Henon map is defined by: When a UAV needs to authenticate itself, it
employs the current state of its chaotic map
xn+1= 1 − a ⋅ xn2 + yn (8) as a dynamic authentication key. The recipi-
yn+1 = b ⋅ xn (9) ent UAV, possessing the same chaotic map
parameters and initial conditions, can accu-
This map introduces chaos in a two-dimen- rately predict and verify the sender’s key.
sional space, where the parameters a and b
govern the map’s behavior, creating intricate
and unpredictable patterns. 3.1. Chaotic map-based
Moving beyond, the Ikeda map is defined authentication algorithm
as: 1. Parameters Setup:
Initialize parameters for the Henon map
xn+1 = u + β⋅(xn⋅cos(t) − yn⋅sin(t)) (10) (a,b) and the Ikeda map (t).
yn+1 = u + β⋅(xn⋅sin(t) + yn⋅cos(t))(11) Choose initial conditions for
synchronization.
The Ikeda map adds an extra layer of com- 2. Synchronization:
plexity with the introduction of an auxiliary UAVs exchange initial conditions to
variable t. These chaotic maps are not merely synchronize their chaotic maps.UAVs
mathematical abstractions; they embody the exchange initial conditions to synchronize
essence of unpredictability essential for secure their chaotic maps.
cryptographic systems.
The unpredictable and intricate nature of (12)
chaotic maps makes them an ideal candidate
(13)
for fortifying authentication mechanisms in
UAV networks. Our proposed system lever- 3. Dynamic Key Generation:
ages the Henon and Ikeda chaotic maps to
enhance the security of UAV communication. (14)
The Henon map’s parameters, a and b, (15)
generate a sequence of values that serve as
dynamic keys for encrypting communication. 4. Data Encryption:
The sensitivity to initial conditions ensures (16)
that even a slight alteration in the input
results in a vastly different output, making it 5. Transmission:
resilient against predictive attacks. UAV sends the encrypted data along with
Similarly, the Ikeda map, with its depend- the current state of its chaotic maps.UAV
ence on the auxiliary variable t, introduces an sends the encrypted data along with the
additional layer of complexity. This complex- current state of its chaotic maps.
ity contributes to the generation of secure 6. Decryption and Authentication:
cryptographic keys, vital for authentication Upon receiving the data, the recipient
in UAV networks. UAV uses its synchronized chaotic maps
In our proposed system, chaotic maps play and dynamic keys for decryption.
a pivotal role in the authentication process.
(17)
During the initial setup, the UAVs synchro-
nize their chaotic maps by sharing a common (18)
initial condition or seed. This synchroniza-
tion ensures that the chaotic maps at different In the Decryption and Authentication
UAVs evolve in tandem. step, the recipient UAV employs the
Mitigating man-in-the-middle attack in UAV network using authentication mechanism 149
synchronized chaotic maps and dynamic it encrypts the data using the generated
keys to decrypt the received data. The dynamic keys. The encryption involves XOR
decrypted data is obtained by applying operations with both the Henon and Ikeda
XOR operations with the dynamic keys dynamic keys. The UAV sends the encrypted
generated from the Henon and Ikeda data along with the current state of its cha-
maps. The authenticity of the communi- otic maps to the intended recipient. Upon
cation is then verified by checking if the receiving the data, the recipient UAV uses
decrypted data matches the original data. its synchronized chaotic maps and dynamic
If the two match, the authentication is keys for decryption. The decrypted data is
deemed successful; otherwise, it is con- obtained by applying XOR operations with
sidered failed. These operations ensure the dynamic keys. An authentication check is
secure communication and effective miti- performed by comparing the decrypted data
gation against unauthorized access. with the original data. Successful authentica-
7. Security Against Man-in-the-Middle tion occurs if they match.
(MitM) Attack: Mitigation Strategy: A mitigation strategy is employed based
on the chaotic nature of the Henon and Ikeda
(19) maps. An objective function is defined to
quantify the security of the communication.
Infeasible if Objective Function>Tolerance
The objective function becomes infeasible
Attacker tries to modify Encrypted
for an attacker to predict without knowl-
Data to Encrypted DataModifiedIncon-
edge of the initial conditions, providing
sistency if Objective Function>Tolerance
security against MitM attacks. UAVs con-
after modificationAuthentication fails if
tinuously update their dynamic keys based
inconsistency detected
on the evolving states of the chaotic maps.
8. Continuous Authentication:
The synchronization process is periodically
UAVs continuously update their dynamic
repeated to account for variations in UAV
keys based on the evolving states of the
trajectories, maintaining the security of the
chaotic maps:
communication.
(20) In essence, the algorithm leverages the
unpredictability and sensitivity to initial con-
(21)
ditions of chaotic maps to generate dynamic
The synchronization process is periodi- keys, ensuring secure and continuously
cally repeated to account for variations authenticated communication between UAVs.
in UAV trajectories.The synchronization The MitM attack is mitigated by making it
process is periodically repeated to account computationally infeasible for an attacker to
for variations in UAV trajectories. predict the dynamic keys, enhancing the over-
all security of the UAV network.
UAVs exchange initial conditions to syn-
chronize their chaotic maps, ensuring they
have a common starting point for the chaotic
sequences. Each UAV employs its Henon map 4. Results and Discussions
to generate a dynamic key (Henon K Henon) Network Simulator 3 (ns-3) served as an
and its Ikeda map for Ikeda K Ikeda. instrumental tool for simulating and assessing
The dynamic keys are generated based on the proposed Chaotic Map-Based Authentica-
the evolving states of the chaotic maps, pro- tion Algorithm within a virtual environment.
viding a constantly changing cryptographic The application of ns-3 provided a robust
key. When a UAV wants to communicate, framework for modeling intricate network
150 Innovations in Computational Intelligence: Trends and Technologies
AQ1:
Please
provide
source Figure 18.1. Comparison of proposed method Figure 18.2. Comparison of proposed method
for all the with existing with respect to PDR. with existing with respect to Delay.
figures
Source: Source:
AUTHOR'S SELF GENERATED
AUTHOR'S SELF GENERATED
Mitigating man-in-the-middle attack in UAV network using authentication mechanism 151
Abstract: Sentiment analysis is a field of natural language processing (NLP) that determines the emotional tone
and attitude expressed in the content, whether it’s a text, audio, video, or social media post. This technology
has found in several domains, like marketing, social media monitoring and customer service. The goal of this
project is to develop a robust, adaptable, and real-time sentiment analysis system that can assess sentiments
and emotions across various data sources. Understanding the sentiment behind this data is essential for making
informed decisions, improving user experiences, and responding to trends in the digital age where individuals
and organizations are constantly bombarded with data in many different formats. The development of a multi-
modal sentiment analysis system that can process text, audio, social media posts, and live video streams is the
main goal of this project. This system should be able to identify subtle emotions and offer insightful informa-
tion in addition to determining basic sentiments (positive, negative, and neutral). For simple access to results, it
should be built with real-time monitoring features and an intuitive dashboard. In today’s digital environment,
sentiment analysis is crucial for various reasons.
Keywords: Audio, live video, sentiment analysis, support vector classifier, text
DOI: 10.1201/9781003606635-19
154 Innovations in Computational Intelligence: Trends and Technologies
or service and assesses the sentiment associ- reason. It can be used to analyze purchaser
ated with each feature; and emotion analysis, feedback and sentiment in consumer care,
which recognizes different emotions like hap- permitting corporations to rectify any prob-
piness, rage, sadness, and surprise expressed lems as soon as they get up and enhance con-
in the text. The casual and loud language of sumer happiness. On social media websites,
social media, which includes slang, acronyms, emotion detection may be used to tune and
misspellings, and grammatical mistakes, pre- analyze consumer sentiment. Businesses and
sents challenges for sentiment analysis [1]. companies can decide any PR problems and
This process is further complicated by con- determine how their logo or merchandise are
text-dependent feelings, irony, sarcasm, and seeming [3].
cultural context. To address these issues and
raise the precision of sentiment analysis on
social media data, researchers and practition- 2. Methodology
ers employ linear regression, random forest, The methodology involved in this multi-
support vector classifier (SVC from SVM) modal sentiment analysis system is depends
machine learning algorithms and natural on the inputs like text, audio, social media
language processing (NLP) strategies, it also post, etc.
involves usage of whisper open-AI and some
predefined modules. To summarize, sentiment
analysis on social media is an essential tool
2.1. Text as input
for comprehending public opinion and con- A technology for automatically identifying
sumer behavior in the digital age [2]. It ena- and classifying emotional content in text data
bles businesses and organizations to maintain is called text emotion detection. In this study, a
a connection with their audience, effectively comprehensive analysis of emotional content
respond to customer needs, and modify their in text samples is conducted through a sys-
strategies in response to real-time feedback, tematic process of data gathering, preprocess-
all of which positively impact decision-mak- ing, feature extraction, label encoding, model
ing and user experiences. The usage of tweets selection, training, evaluation, hyper parame-
within the form of textual content and posts ter tuning, and testing. The dataset comprises
inside the form of movies as enter to the fash- text samples annotated with emotional labels,
ions and to discover emotion in advertising ranging from joyful and depressed to furious.
and marketing can assist organizations in Rigorous preprocessing involves removing
understanding how clients are responding to special characters and stop-words, perform-
their messages. Examine students’ emotional ing tokenization, and lowercasing the text to
engagement and comprehension in textual enhance the subsequent feature extraction
content and audio while they are doing on phase. For feature extraction, advanced tech-
the line or faraway learning publications. niques such as word embedding and TF-IDF
Text emotion detection in mental fitness can vectors are leveraged to capture the semantic
be used to music patients’ emotional states meaning of the text, ensuring a rich represen-
and provide important early intervention. tation of emotional nuances [4]. The emo-
As an example, a therapist can also hire tex- tional categories are encoded with numerical
tual content emotion detection to observe an labels to facilitate the training of machine
affected person’s diary entries and notice early learning models. Various machine learn-
warning signs of depression or anxiety. In the ing models, including BERT, logistic regres-
course of criminal investigations, take a look sion, support vector machines, and recurrent
at audio and video recordings for emotional neural networks, are carefully selected and
clues that would imply dishonesty or criminal implemented to discern the most effective
A comprehensive multi-modal sentiment analysis approach for social media content integration 155
approach for sentiment analysis. Extensive The library effectively captures emotions
training on the labeled dataset optimizes the through feature extraction, extracting deep
models to predict emotions based on text features from image patches and facial land-
attributes. Evaluation metrics such as accu- marks [5]. Emotion classification is achieved
racy, F1-score, and confusion matrices are by training a deep neural network using the
employed to assess the models’ performance compiled dataset, and pre-trained emotion
on a validation dataset. Hyper parameter tun- classification models are also available within
ing further enhances the models’ capabilities, Deep face. In the inference stage, the learned
ensuring optimal results. Subsequent testing model is applied to fresh images and video
on a separate dataset validates the models’ frames for real-time emotion detection. For
real-world applicability, demonstrating their continuous video emotion analysis, Deep
effectiveness in accurately analyzing senti- face employs post-processing techniques,
ments in fresh, unexplored text data. aggregating emotion predictions across video
frames. This integrated approach ensures a
2.2. Image as input robust and efficient method for emotion rec-
ognition, making Deep face a valuable tool
The Deep face library follows a compre- for real-world applications in image and
hensive approach for emotion recognition video emotion analysis.
in images and videos, encompassing vari-
ous stages. It begins with the compilation
of a dataset comprising pictures and video 2.3. Live video as input
frames portraying emotive expressions, each To implement facial emotion recognition in
meticulously labeled. Deep face then employs live videos using a facial emotion recognition
facial detection techniques to identify faces library, the process involves real-time data
in both images and video frames, extract- collection through a webcam or other cam-
ing facial landmarks for subsequent analysis. era source, recording video frames as they
occur. Subsequently, face detection meth-
ods are applied to identify and extract faces
from each frame. The facial emotion recogni-
tion library is then employed to analyze the
extracted faces, discerning emotions such as
joy, sorrow, or rage based on facial expres-
sions [6]. Real-time processing is crucial,
AQ1:
Please
provide
in-text
citation
for figures
1 to 4.
AQ2:
Please
provide
source
for all the Figure 19.1. Text data based sentiment analysis. Figure 19.2. Image-based sentiment analysis.
figures
Source: Source:
AUTHOR'S SELF GENERATED
AUTHOR'S SELF GENERATED
156 Innovations in Computational Intelligence: Trends and Technologies
with frames continuously processed at a high networks (RNNs) and convolutional neural
frame rate to provide prompt feedback. The networks (CNNs), including long short-term
identified emotions are visually presented on memory (LSTM) layers, to process audio
the live video feed, enabling real-time emotion input effectively [7][8]. Through training and
tracking for a dynamic user experience. To supervision, the ASR system learns the intri-
enhance accuracy, thresholding is employed cate mapping from auditory properties to
to eliminate emotion predictions with low text by utilizing transcribed audio data. Ulti-
confidence levels [10]. This comprehensive mately, the generated text serves as input for
approach ensures the seamless integration of software specializing in text emotion recogni-
facial emotion recognition into live video sce- tion, facilitating the extraction of emotional
narios, offering immediate and visually intui- content from the transcribed audio [9]. This
tive insights into the emotional dynamics of integrated approach underscores Whisper’s
individuals on camera. capability not only in accurate speech-to-text
conversion but also in enabling subsequent
2.4. Audio as input emotion analysis of the transcribed content.
Whisper, developed by OpenAI, serves as
an automatic speech recognition (ASR) sys- 3. Result and Discussion
tem designed to seamlessly translate spoken The proposed model is analyzed with various
words from audio files into text. The Whis- types of inputs like audio, text, image and live
per audio-to-text conversion methodology video and detected the emotions effectively
involves several key steps. Firstly, extensive which is shown in Figures 19.5–19.8.
data collection plays a pivotal role, as Whis-
per can proficiently recognize speech in vari-
ous languages and diverse situations, owing 4. Conclusion
to its training on a substantial volume of As a result, social media presence sentiment
multilingual and multitasking supervised analysis is essential for gaining insight into
data sourced from the internet. The model how the general public feels about certain
architecture of Whisper employs a deep neu- people, companies, or subjects. Understand-
ral network that integrates recurrent neural ing the opinions of a wide range of users
audio for a more comprehensive understand- [3] Zhang, Yuan, et al, 2018. EmoReact: A
ing. To further provide accurate and nuanced Fine-Grained Emotion Detection System
insights, fine-tuning context-aware models, for Multimodal Social Media Data, North
attaining fine-grained sentiment classifica- American Chapter of the Association for
tion, and resolving ethical issues are essen- Computational Linguistics: Human Lan-
guage Technologies.
tial. The tool’s flexibility and relevance across
[4] Xu, Hu and Wang, Yuwen, 2019. BERT
many industries will be enhanced through
for Emotion Classification on Twitter, 57th
the development of important areas such as Annual Meeting of the Association for Com-
industry-specific apps, emotionally intelligent putational Linguistics.
chatbots, and real-time analysis. Therefore, [5] Zhang, Yuan, et al, 2018. EmoReact: A
we can conclude that the establishment of Fine-Grained Emotion Detection System
emotional intelligence in the future may be for Multimodal Social Media Data, North
possible and will require the automation of American Chapter of the Association for
daily tasks. One such instance is when some- Computational Linguistics: Human Lan-
one uses a smartphone while hungry, the guage Technologies.
device recognizes this and uses emotion detec- [6] Z. Aldeneh, R. Soujanya, R. Jha, and S. Jha,
tion to recommend the user’s favorite meal. 2017. Multimodal Emotion Analysis from
Naturalistic Data, Proceedings of the Inter-
national Conference on Affective Comput-
ing and Intelligent Interaction (ACII).
References [7] Wenyan Li, et al, 2018. Emotion-Cause Pair
[1] Stefano, Esuli, Andrea, and Sebastiani, Fab- Extraction: A New Task to Emotion Analy-
rizio, 2010. SentiWordNet 3.0: An Enhanced sis in Texts, North American Chapter of the
Lexical Resource for Sentiment Analysis and Association for Computational Linguistics:
Opinion Mining, Baccianella, International Human Language Technologies.
Conference on Language Resources and [8] A. Bifet, E. Frank, 2010. A Survey of Senti-
Evaluation (LREC). ment Analysis in Social Media, Published in
[2] Mohammad, Saif M., Kiritchenko, Svetlana, ACM Computing Surveys (CSUR).
and Zhu, Xiaodan, 2013. Affect Analysis in [9] B. Schuller, M. Batliner, S. Steidl, and D. Seppi,
Text: From Pattern Spotting to Rule Learn- 2017. Contextual Emotion Detection in Text
ing, Knowledge and Information Systems. Using Heterogeneous Data Sources, ACII.
20 A proposed deep learning framework
for internet-of-medical things
AQ1:
Faiyaz ahamad and Syed Hauider Abbas Please
provide
Integral University complete
affiliation
details
Abstract: In machine learning, deep learning is the most popular topic having a wide range of applications such and
as computer vision, natural language processing, speech recognition, visual object detection, disease prediction, provide
email id.
drug discovery, bioinformatics, biomedicine, etc. Of these applications, health care and medical science-related
applications are dramatically on the rise. The presentation of IoT advances, for example, those utilized in far off
wellbeing checking applications, has altered ordinary clinical consideration. Besides, the methodology used to
acquire experiences from the examination of way of life components and exercises is urgent to the progress of
custom fitted medical care and sickness avoidance administrations. The Convolutional-brain network (CNN)
system is used to conjecture such abnormality since it can effectively perceive the information important to
infection expectation from formless clinical heath records. On the other hand, in the event that a completely
coupled network-geography is utilized, CNN chugs an enormous memory. Besides, the intricacy investigation
of the model might ascend as the quantity of layers develops. Hence, we present a CNN target acknowledgment
and expectation technique in light of the Pearson-Connection Coefficient (PCC) and standard example exercises
to address these deficiencies of the CNN-model. The model’s result is separated into heftiness, hypertension,
and diabetes-related factors with known connections. To reduce the effect of the CNN-regular information dis-
closure worldview, we utilize two separate datasets. The trial results uncover that the proposed model outflanks
three other AI strategies while requiring less computational exertion. Afterward, the primary thought, benefits,
inconveniences, and constraints of each study are examined, going before ideas for further research.
DOI: 10.1201/9781003606635-20
160 Innovations in Computational Intelligence: Trends and Technologies
information portraying the day to day rou- approaches that safeguard clients’ secrecy.
tines of people has extended at a remarkable The creators of [14], for example, explored
rate with the presentation of the IoMT cli- this limitation and offered a system for power
mate [5,6]. At the point when a patient shows guideline in uplink FL-IoMT to address it.
up with a tenacious disease, he will show an The plan further develops productivity by
enhance in various wellbeing boundaries (like recognizing the problematic jammer robot.
a high temperature) all the while because of Hence, creators introduced an asset effective
the recognizable routineness of human well- security-protection way to deal with address
being parts. He may likewise see a decrease this issue. The creators have used rules like
in another sign of his wellbeing, for example, postponement and cost to check their work.
pulse. Along these lines, it is feasible to more Trust, unchanging nature, information acces-
deeply study the administration and examina- sibility, and security are completely ensured
tion of wellbeing related markers by analyz- by the plan. To address the hardships of incor-
ing the examples of conduct uncovered by the porated instruction, proposed an answer. This
gathered information [7,8]. In section 2, we’ll contextual analysis was likewise compelled
go over the various prior techniques exhaus- to manage the possibility of differential pro-
tively. Procedure is illustrated in Section 3. In tection. The elite presentation was assessed
Section4, we contrast the aftereffects of the inside the IoMT not set in stone to be viable
proposed work to those of the ordinary meth- for use [15].
odologies. The work process’ definitive deci-
sion is depicted in section 5.
3. Proposed Methodology
The proposed work makes use of a CNN-
2. Related Works
model to uncover regularly associated health
A few articles on IoT, profound learning indicators that may have an impact on health.
organizations, and patient observing infor- The methodology starts with the assortment
mation investigation are examined here. and fundamental handling of patient clini-
This study gave a methodology to protecting cal information. Corpulence, hypertension,
patient information put away across differ- and diabetes are only a couple of instances
ent waiters from exploitable assaults [9,10]. of the sorts of issues that can be connected
In creators discussed how combined medi- utilizing the separated information. Factors
cal care arrangements present open doors for with positive and negative relationships are
unified learning (FL) structures. The creators recognized, similar to the useful connec-
discussed how FL can be utilized related to tions between’s them. Eventually, we pick the
imaging for the newfound 2019 Covid sick- often co-happening elements to extricate the
ness (Coronavirus). Their application to EHR important data. The accompanying parts will
sickness conclusion and result forecast was go into more noteworthy profundity, itemiz-
assessed by Antumes et al. [11]. In [12], sci- ing each stage.
entists gave an extensive survey of FL-related
strategies for use in clinical imaging that is 3.1. Activity of disease and symptom
both secure and private. Potential purposes,
for example, digital assault discovery and idea
proposal frameworks are talked about. We The model uses multivariate analysis to iden-
present a decentralized and circulated FL tify relevant features among the collected uni-
framework [13]. In IoMT biological systems, structural medical health situations, and then
scholastics have read up safety efforts for uses those factors to categorize the data into
the actual layer, and have created FL-based input and output elements. We preprocess the
A proposed deep learning framework for internet-of-medical things 161
3.3. CNN-supported health
AQ2:
Please knowledge framework
provide
in-text In light of the previously mentioned, we pro-
citation posed another model for distinguishing regu-
for Figure
1&2. larly associated wellbeing related boundaries
that might be utilized to recognize any devia-
AQ3:
Please
tion from the standard. To create the verifi-
provide able data related with remote observing and
source the executives of the human way of life, this
for all the Figure 20.1. The proposed model diagram.
figures approach can mine all the open standard com-
Source: AUTHOR'S SELF GENERATED ponent conduct [17]. Utilizing the relation-
ship consequences of the wellbeing ascribes,
data to get rid of things like no response and
we desire to make it workable for care sup-
missing value for the chosen 23 attributes.
pliers to offer constant remote-checking of
Our analysis and extraction of the important
patient healthstatus. In this way, the clinical
elements from the dataset of 187,473 records
exertion would be effectively diminished, and
helps a remote monitoring application give
a solid CNN-based finding emotionally sup-
the correct therapy at the right time for the
portive network could be given through the
right person.
course of all the while exploring the relation-
ship between different side effects. To addi-
3.2. Data categorisation by tionally order the found connections in the
correlation coefficient secret layer, the CNN model is utilized. The
Pearson’s correlation coefficient (PCF) is standard way of behaving of the associated
utilized to distinguish huge relationship wellbeing factors is likewise separated, which
between the factors in this examination. Suc- uncovers beforehand inconspicuous custom-
cessfully concentrating on ordinary relation- ary corresponded readings [18].
ship conduct among the picked wellbeing We found specific routineness related well-
determinants, PCF can show the strength being states in view of the EHR information
of relationship between two factors. At the we assembled. In light of the anticipated idea
point when the importance level of a thing of certain sicknesses, following the develop-
is bigger than 0.1, having useful, independent ment of a subset of wellbeing pointers over
characteristic is thought of. Thusly, we keep a given timeframe can yield valuable data
away from overfitting issues and assurance about an individual’s wellbeing. In this man-
that the chose thing is associated. By tack- ner, quite possibly of the most squeezing chal-
ling for the PCF in condition (1), we might lenge in wellbeing information examination
decide how unequivocally credits F1 and F2 is the need to research the way of behaving
are connected. of customary variables. On the off chance
that sickness X causes the patient’s tempera-
(1) ture and heart-rate to spike 3times in month,
162 Innovations in Computational Intelligence: Trends and Technologies
monitoring and understanding this strange Lesser RMSE values indicate that the meth-
occurrence might assist with deflecting a car- odology can make precise expectations, while
diovascular failure [19,20]. upper RMSE values determine that the model
can’t. Assuming the extended incentive for
weight is 3, and the genuine worth is 2, then
4. Results and Discussions the mistake for every one of the three sick-
The testing was finished on a 64-digit Corei5 nesses is 1. The CNN-model’s RMSE discov-
Windows 10pro with 12GB of accessible eries are displayed in Table 20.1. Our model’s
Slam involving SPSS for execution examina- RMSE for foreseeing corpulence, diabetes, and
tion. Wellbeing and lifestyle-related setting hypertension is contrasted with that of a non-
information are the concentration here. These exclusive CNN model. The proposed model’s
information come from 10,806 residents who computation speed and intricacy are both
went through wellbeing actually looks at in determined with 2-stowed away layers. Low
the present time and place. Each occupant is expectation exactness close by high estima-
approached to finish a wellbeing study com- tion speed and intricacy describes the regular
prising of 768 inquiries. By utilizing mul- CNN-model for every sickness analysis. For
tivariate investigation, SPSS can effectively reference, the typical CNN model has a RMSE
lessen how much components without losing of around 0.87 and an intricacy of 1.1.The
any essential qualities and work on the calcu- proposed model can foresee the presence of
lation expected to mine the important well- diabetes with a greatest RMSE of 0.2562.
being related angles. Various variables that Moreover, the accompanying nonexclusive
impact stoutness, hypertension, and diabetes models were prepared, and their outcomes
are examined for use in the proficiency exam- are introduced in Table 20.2 and Figure AQ4:
ination of the model. We utilized 4,759,777 20.3 for correlation with our calculation’s Please
note that
records from the chose setting information, presentation. no figure
of which 1,499,423 records had no reaction 3.
and missing qualities were gotten out before
the preliminaries were run. We split the infor- 5. Conclusion
mation we obtain into two sets: train infor- This paper presents an ordinary example dig-
mation (70%) and test information (30%). ging procedure for wellbeing information in
The hyper boundaries (such preparation
end) were streamlined utilizing a 10-over- Table 20.1. Execution evaluation of the
lap cross approval procedure. The precision proposed plan of action
of the CNN model is likewise tried using a Presence RMSE Calculation Complexity
measurement called the root-mean-square- Speed
blunder (RMSE). The proposed CNN-based
Obesity 0.092 14 0.562
wellbeing approach is applied to each model AQ5:
to decide the RMSE, estimation time, and BP 0.181 16 0.571 Please
provide
intricacy. For the expectation of heftiness, Diabetics 0.264 15 0.624 source
diabetes, and hypertension, we additionally Source: AUTHOR'S SELF GENERATED
for all the
Tables
record a similar examination rule in the more
extensive CNN. While contrasting an antici- Table 20.2. Execution comparison
pated worth with a noticed worth, RMSE is
Presence LSTM SVM ANN Proposed
a valuable measurement to use. Condition (2)
can be utilized to decide the amount RMSE Obesity 87 76 74 92
is worth. BP 91 92 76 94
Diabetics 90 64 65 96
RMSE = (2)
Source:
AUTHOR'S SELF GENERATED
A proposed deep learning framework for internet-of-medical things 163
Abstract: Global vehicle population is growing steadily, which makes it ever more harder to manage traffic. To
resolve this problem, advance traffic control techniques is developed to which V2V (Vehicle-to-Vehicle) com-
munication via VANETs (Vehicular Ad-Hoc Networks) is proven as an efficient solution. VANET allows vehi-
cles to communicate within the network by using different routing protocols (Graph based, Broadcast based,
Multicast/Geographic and Group-based routing protocol). Given the fact of the importance of VANET rout-
ing protocols in intelligent transportation systems, a need for their evaluation and selection arises. This paper
concludes that the increasing traffic leading to greater complexity of global traffic management and stresses on
VANET being the most suitable technology for V2V communication. This paper presents findings related to
VANET services, and routing protocols, with an especial concentration on the Application-Oriented Dynamic
Vehicle (AODV) method applied for delay reduction. It also gives a comparative study of routing protocols
specifying the advantages and disadvantage each has in detail.
[email protected]; [email protected]
a
DOI: 10.1201/9781003606635-21
166 Innovations in Computational Intelligence: Trends and Technologies
simulation results, and future research scope routes based on real-time traffic conditions.
in automotive ad-hoc networks. ATAR uses operational data to find optimal
routes, thereby improving communication
reliability and efficiency. It reduces latency
2. Routing Protocol in VANET and congestion and increases overall net-
In order to facilitate efficient communica- work performance in ever-changing vehicular
tion between vehicles in dynamic and rapidly environments.
changing environments, the Routing Proto- Routing protocols in VANET play a very
cols in Vehicular AdHoc Networks are very important and crucial role for communica-
important. tion. It addresses challenges such as frequent
Some important protocols are: topology changes and intermittent connec-
Geographic Routing Protocols: This pro- tivity. The selection of protocol depends on
tocol uses geographic information for rout- application requirements and the desired
ing decisions, e.g., Greedy Perimeter Stateless trade-off between communication efficiency
Routing (GPSR). It is very simple and efficient and overhead. In these dynamic conditions,
in stable network conditions. researchers continue to work on new strate-
Topological Routing Protocols: Topologi- gies for improving the resilience of VANET
cal Routing Protocols uses network topology and its performance.
information, e.g., Ad-Hoc On-Demand Dis- Issues and Challenges: Vehicular ad-hoc
tance Vector (AODV) and Dynamic Source networks (VANETs) face various kinds of
Routing (DSR). It is suitable for dynamic envi- challenges that require special attention for
ronments with on-demand route discovery. successful use. Ensuring communication reli-
Cluster-Based Routing Protocols: It com- ability in the dynamic nature of the environ-
bine vehicles into clusters, each cluster is ment is a major concern, as vehicle movement
managed by Cluster Head(CH), e.g., Cluster- and changing networks can cause problems.
Based Routing Protocol (CBRP). CHs man- It is important to keep your communications
age It Reduces communication overhead secure and private. A robust encryption solu-
within clusters. intra-cluster communica- tion is required to combat potential threats
tion and inter-cluster data routing, improv- and data breaches. Another problem with
ing scalability, reducing network congestion, VANETs is scalability, as the increasing num-
and optimizing data transmission in highly ber of vehicles constantly connecting in the
dynamic vehicular environment. network can lead to congestion and increased
Position-Based Routing Protocols: Basi- communication overhead. Maintaining a
cally it use the vehicle location and mobility good quality of service is very difficult due
information, e.g., Location-Aided Routing to changing traffic and busy networks, so it
(LAR). It is effective in highly mobile scenar- needs smart and efficient ways to manage it
ios, reducing route discovery latency. all. Interoperability between different com-
Vehicular Multi-Hop Clustering (VMHC): munication technologies and standards is
VMHC organizes vehicles into clusters for also a big problem, which requires seamless
efficient communication. Each cluster has a cooperation between vehicles from differ-
Cluster Head. Data is relayed through mul- ent manufacturers. In VANETs, maintain-
tiple hops between clusters. This method ing Quality of Service (QoS) is a challenge
improves data delivery, reduces congestion, due to changing traffic conditions and net-
and adapts well to the dynamic nature of work congestion, requiring protocols that
vehicular networks. adapt to different applications. Due to the
Adaptive Traffic-Aware Routing (ATAR): complicated regulatory and standardiza-
ATAR in VANETs dynamically adjusts tion issues of various governments, it needs
Analysis of novel routing protocol to minimize delay in VANET: A comprehensive simulation for VANET 167
point to a goal. The algorithm maintains two data increases the accuracy and relevance of
sets: an open one and a closed one. The open route calculations. The algorithm contributes
set contains the nodes to be evaluated. These to better routing and navigation within the
nodes are ranked based on a combination of VANET, optimizing travel time and efficiency.
starting point to node cost (g), and heuristic
approximation from goal to goal (h). Nodes 5.3. Proposed algorithm
that have already been evaluated are tracked
Input: In the proposed algorithm, we previ-
in the closed one. The method iteratively
ously defined input parameters such as the
selects the node that has the lowest total total
width of the grid (N) and the number of
cost from the open set. Then, it evaluates its
lanes (P).
neighbors and changes its parent pointer and
Output: The output included a set of short-
costs until the goal is achieved or the open
est paths (Shortest Paths) and a time domain
is empty. To reconstruct the path from start
for artificial intelligence analysis (P(t)).
to target, the process traces back via parent
pointers once the goal is achieved. The algo- 1. Input Parameters: The s input parameters
rithm A* is broadly used in in large number related to the number of VANET nodes
of applications such as robots, games, and (20, 25, or 30). This parameter represents
vehicle networks. the size of the VANET network.
2. Creation of Sink Node: The creation of a
5.2. TEEN (Threshold Sensitive “Sink node” can be related to the concept
of starting and endpoint locations in the
Energy Efficient Sensor Network
algorithm. The sink node could represent
Protocol) a destination point.
A specific algorithm used in passive networks 3. Zero Initial Delay: The algorithm defines
to improve energy efficiency is the Threshold an initial delay (Td) as zero, which can
Sensitive Energy Sensor Network Protocol be related to the initial conditions in the
(TEEN). TEEN is primarily used for managing VANET simulation. In the algorithm, we
collaborative sensing applications and differs analysed time delays (Time) in the network.
from traditional sensor network protocols 4. Energy-Related Parameters: The algo-
in its ability to evolve clusters dynamically. rithms describe energy-related parameters
Cluster heads strategically allocate members such as Einrg (starting energy) and Eni
within each cluster head (CH) interval based (initial energy of individual nodes). While
on the characteristics of each member. not particularly specified in the approach,
Depending on the characteristics of the energy consumption and management are
individual members, this division takes crucial components of VANET analysis.
place in a rigid or flexible manner. The goal 5. Trace File Estimation: It seems to be simu-
of TEEN is to achieve an optimal balance lating VANET nodes and their activities,
between energy consumption in the network and it references the estimation of “E2E”
by adapting nodes according to their charac- (End-to-End) from a trace file. This esti-
teristics. This approach makes TEEN well- mation can be related to the calculation of
suited for scenarios where energy efficiency E2E time in the method.
is a critical consideration, such as sensor net- 6. Simulation stages: The outlines simula-
works, where preserving battery life is essen- tion steps involving the formation of
tial for extended and efficient operation. nodes (Ni), random distance assignments
A* and TEEN algorithms are used for (Di), and energy initialization (Eni).
efficient path finding algorithm. The inte- These phases are prevalent in VANET
gration of the Grid method and real-time simulations.
170 Innovations in Computational Intelligence: Trends and Technologies
7. Calculation of Tc and Td: It calculates into the A* rating process, considering car
Tc (communication time) and Td (total features and energy-aware pricing.
delay). These calculations can be related 5. Energy-Aware Cost Calculation: Integrate
to the time domain and time delay com- TEEN’s energy-aware ideas into the cost
putations in the VANET algorithm. calculation of A* for VANET. Adjust the
8. Simulation Execution: It can be executed cost function to balance the requirement
a random configuration and estimates the for the shortest communication path with
cumulative communication time (ΣTc). energy efficiency across vehicles.
This is comparable to the process of dis- 6. Dynamic Cluster Adaptation: During the
covering the shortest paths and calculat- pathfinding phase, explore the dynamic
ing the total time in the approach. evolution of vehicle clusters in VEEP
driven by TEEN. Optimize the commu-
5.4. Integrated proposed algorithm: nication line to pass through energy-effi-
vehicular energy-efficient cient clusters, adjusting the route based
on TEEN’s cluster distribution.
pathfinding (VEEP)
1. Adaptive Thresholds in VANET:
Vehicular energy-efficient pathfinding algo- Leverage TEEN’s adaptive thresholds
rithm (VEEP) Integrated is a proposed algo- to influence the decision-making pro-
rithm for vehicular ad-hoc network (VANet) cess in A* within VANET.
by aligning TEEN with A* in VANET context Adjust the thresholds dynamically
where energy-efficient communication and to respond to changing energy condi-
optimized pathfinding are necessary, a new tions and communication quality in
VEEP algorithm can be conceptualized. the vehicular network.
2. Optimal Balance for VANET:
5.5. Vehicular energy-efficient Aim for an optimal balance between
pathfinding finding the shortest communication
path and preserving energy among
1. Initialization: Create a VANET using vehicles in the VANET.
TEEN principles to optimize energy use 3. Evaluation and Refinement for
across cars. Initialize an open set and a VANET:
closed pathfinding set with A*. Evaluate the performance of the inte-
2. TEEN-Inspired Grouping: Enable VEEP grated VEEP algorithm in VANET
to dynamically construct vehicle group- through simulations or real-world tests.
ings based on energy efficiency and Refine the algorithm iteratively based
inspired by TEEN. Carefully designate on the results, considering trade-offs
cluster leaders to drive energy-aware between communication efficiency and
communication. energy consumption among vehicles.
3. Vehicle Features: Use vehicle features
from TEEN, such as energy levels and This algorithm related to the setup and
communication capabilities, to change the execution of a VANET simulation, particu-
A* heuristic function. Modify the A* heu- larly focusing on network parameters, energy,
ristic to consider energy-efficient paths and communication time.
within VANETs.
4. Path finding using A in VANET: * Imple-
ment the A* method to determine the ideal
5.6. VANET Simulation
communication path in a VANET graph. Input:
Incorporate TEEN-derived information • Number of VANET Nodes: {20, 25, 30}
Analysis of novel routing protocol to minimize delay in VANET: A comprehensive simulation for VANET 171
• Creation of Sink Node: Representing a a VANET network, such as node startup, com-
destination node munication time calculations, and estimating
• Zero Initial Delay: Td = 0 End-to-End Time. Basically the simulation is
• Initial Energy (Einrg): 100 designed to simulate network dynamics and
• Node IDs (Ni): {n1, n2, n3, ...} analyse communication performance in a
• Random Distance Assignments (Di): {d1, mathematical environment.
d2, d3, ...}
• Initial Energy of Individual Nodes (Eni): 5.7. Simulation result
{100 * n1, 100 * n2, 100 * n3, ...}
Output: The application of the proposed VANET
• Estimation of End-to-End Time (E2E) simulation algorithm, particularly the Vehic-
from a trace file ular Energy-Efficient Pathfinding (VEEP)
Simulation Steps: approach, yields significant insights into
1. Network Setup: Establish a VANET net- the performance of Vehicular Ad-Hoc Net-
work with a predetermined number of works (VANETs). The simulation results
nodes (20, 25, or 30). provide a comprehensive understanding of
2. Set the initial delay (Td) to zero. Set the network behavior and communication effi-
energy parameter Einrg to 100. ciency within the context of energy-aware
3. Node characteristics: pathfinding.
Define the nodes Ni as {n1, n2, n3,...}. After MATLAB is run, the numbers at the
Assign a random distance Di to each node: top of the screen show the results. At least
{d1, d2, d3,...}.
Set the initial energy of individual nodes
Eni to {100 * n1, 100 * n2, 100 * n3,...}. AQ1:
Please
4. Calculate the communication time (Tc) provide
for each node. in-text
citation
Tc = Ti + Tloss (Ti denotes individual for Fig-
node communication time, while Tloss ures 21.1-
represents potential communication loss). 21.12.
Analysis of Delays
The following is a simple AODV setup (with
Figure 21.5. Starting simulation of basic AODV
no delay): Set up of 25 nodes for the AODV
25 nodes.
protocol in the arena of the NS2 platform AUTHOR'S SELF GENERATED
Source:
under the NS2 protocol arena The whole pro-
cedure is seen here.
Data sent from source (node 8) to destina- Now the delay for the different set as dis-
tion (node 9) through node 7 Same will be cussed above. The execution for the delay
executed again for the 25 nodes under the under the arena of NS2 plateform. The whole
same arena of NS2. The basic AODV proto- execution as shown below.
col has also been executed.
of the VANET network, initial energy levels, [2] Kazi, A. K., and Khan, S. M. (2021). DyTE:
and random distance assignments. Integrating an effective routing protocol for VANET in
TEEN and A* principles, the new VEEP algo- urban scenarios. Engineering, Technology and
rithm aims to optimize energy-efficient com- Applied Science Research, 11(2), 6979–6985.
munication and pathfinding within VANETs, [3] Kandali, K., Bennis, L., and Bennis, H.
(2021). A new hybrid routing protocol
emphasizing the need for an optimal balance
using a modified K-means clustering algo-
between finding the shortest communication
rithm and continuous hopfield network for
path and conserving energy between vehicles. VANET. IEEE Access, 9, 47169–47183.
The simulation steps presented in the [4] Sindhwani, M., Singh, R., Sachdeva, A.,
VANET simulation provide a systematic and and Singh, C. (2022). Improvisation of
detailed representation of the network setup, optimization technique and AODV routing
initialization and communication time calcu- protocol in VANET. Materials Today: Pro-
lations. Calculating cumulative communica- ceedings, 49, 3457–3461.
tion time (ΣTc) and total delay (Td) provides [5] Srivastava, A., Bagga, N., and Rakhra, M.
insight into the overall performance of a (2021, September). Analysis of Cluster-
VANET. The End-to-End Time (E2E) estimate Based and Position-based Routing Protocol
from the trace file serves as a key metric that in VANET. In 2021 9th International Con-
represents the total time required for data to ference on Reliability, Infocom Technologies
and Optimization (Trends and Future Direc-
travel from the source nodes to the sink node.
tions) (ICRITO) (pp. 1–5). IEEE.
The proposed VANET simulation algo-
[6] Singh, G. D., Prateek, M., Kumar, S., Verma,
rithm and integrated VEEP approach pave M., Singh, D., and Lee, H. N. (2022). Hybrid
the way for exciting future developments. Genetic Firefly Algorithm-based Routing
Further research may focus on dynamic Protocol for VANETs. IEEE Access.
adaptation, including real-world validation [7] Sabbagh, A. A., and Shcherbakov, M. V.
and integration of emerging technologies (2021, September). A Secure and Stable
such as 5G and autonomous vehicles. Secu- Routing Protocol for VANET Under Mali-
rity considerations, scalability evaluation for cious Attacks. In Conference on Creativity
larger networks, and optimization techniques in Intelligent Technologies and Data Sci-
are critical areas for exploration. Algorithm ence (pp. 421–435). Springer, Cham.
development towards multi-objective opti- [8] Divya, N. S., Bobba, V., and Vatambeti, R.
mization, balancing energy efficiency, com- (2021). An adaptive cluster based vehicular
routing protocol for secure communication.
munication latency and network coverage
Wireless Personal Communications, 1–20.
promises a more holistic solution. As tech-
[9] Mershad, K. (2020). SURFER: A secure
nology continues to advance, the algorithm SDN-based routing protocol for internet of
can be refined to meet emerging challenges in vehicles. IEEE Internet of Things Journal,
automotive networks and ensure its applica- 8(9), 7407–7422.
bility in diverse and evolving environments. [10] Suganthi, B., and Ramamoorthy, P. (2020).
Future efforts should focus on improving the An advanced fitness-based routing protocol
algorithm’s adaptability, relevance, and real- for improving QoS in VANET. Wireless Per-
world efficiency, which will contribute to the sonal Communications, 114(1), 241–263.
continuous development of energy-efficient [11] Karthikeyan, A., Kuppusamy, P. G., and
and optimized communication in vehicular Amiri, I. S. (2020). Secured identity-based
Ad-Hoc networks. cryptosystem approach for intelligent rout-
AQ5:
ing protocol in VANET. Scalable Comput-
ing: Practice and Experience, 21(1), 41–46.
Please
note that
References [12] Bhati, A., and Singh, P. K. (2020). Analysis
references
is not
[1] Al-Shaibany (2021). Stability-Delay Efficient of Various Routing Protocol for VANET. In
citation Cluster-based Routing Protocol for VANET. Cybernetics, Cognition and Machine Learn-
in-text. Karbala International Journal of Modern ing Applications (pp. 315–325). Springer,
Science, 7(3), 3. Singapore.
22 Securing the secrets of 5G: Mitigating
eavesdropping threats and enhancing
network integrity
Mamidisetti Saia
Applied Computer Science and Engineering, Lovely Professional University, Punjab, India
Abstract: 5G is a fifth-generation network that is intended to be more dependable, faster, and have a lower
latency than the past 4G network. It offers a more reliable connection, can connect more devices simultane-
ously, and operates on a higher-frequency spectrum that can carry enormous amounts of data. Although 5G
networks offer numerous benefits, their open network architecture renders them vulnerable to security threats.
This study discusses the serious security issues of eavesdropping, a passive attack that can provide unauthor-
ized access to private information, including financial and personal information. The integrity and secrecy of
5G networks are at serious risk because passive eavesdropping is difficult to detect. To solve this problem, we
thoroughly review the suggested fixes for guarding against eavesdropping attacks on 5G networks. This review
covers handover procedures, pilot signals, device-to-device, communication, user equipment itself, and other
attack vectors. The use of strong encryption, the establishment of secure communication protocols, and care-
ful network traffic monitoring to spot any unusual activity are key preventative steps to reduce the danger of
eavesdropping. We identified and assessed various eavesdropping solutions in this study, providing a thorough
analysis of their effectiveness and implementation.
Keywords: 5G networks, eavesdropping, security attacks, network integrity, encryption, user equipment
DOI: 10.1201/9781003606635-22
176 Innovations in Computational Intelligence: Trends and Technologies
simulation results show that the proposed management and non-security objectives. The
protocol has a lower ping-pong rate, lower purpose of this technique is to find the best
packet-drop rate, and higher packet-received multipath relay solution to avoid eavesdrop-
ratio. Comparing the proposed protocol with ping in congested conditions. They primarily
the 5G AKA protocol that served as the foun- emphasize the necessity of data protection in
dation, changeover signaling was reduced congested urban contexts, where eavesdrop-
by 94.4%. The proposed machine-learning ping is a substantial concern. They offered
protocol not only enables optimal target cell a graph theory method as a viable solution,
selection but also ensures security and pri- testing three multipath routing algorithms in
vacy during handovers and performs better a D2D cellular network in high-density situa-
than the 5G AKA protocol. It is a new type tions, such as cities, to prevent eavesdropping
of protocol that considers efficiency and secu- attempts. A connectivity graph was used to
rity. Formal security analysis using BAN logic depict the network, with vertices represent-
demonstrated the ability of the proposed pro- ing specific devices and edges representing the
tocol to conduct secure and reliable authenti- ability of a signal to be sent between them.
cation across all interacting entities. The authors emphasized that pathways must
The security characteristics of the pro- be node-disjoint and interference-disjoint to
posed protocol were assessed using several successfully minimize eavesdropping. The
attack models. Theorems and proofs are used simulations tested three multipath routing
to demonstrate that the proposed protocol algorithms to see how effective they are at
offers perfect key secrecy and anonymity. This thwarting eavesdropping attempts in a D2D
study offers nine theorems and their justifica- cellular network. The purpose of this study
tions. Eavesdropping security is discussed in was to find the most effective method for
one of these theorems. This means that the preventing eavesdropping in high-density
recommended approach completely shields situations.
against eavesdropping. The proposed proto-
col uses secret keys and random nonces that 2.5. Friendly jamming
are first encrypted with a temporary gNB key
and secret private gNB identity. An adversary There are several ways to safeguard wireless
cannot obtain encryption keys for private and communication from unauthorized eaves-
sensitive data through channel eavesdropping dropping by adding friendly jamming (FJ)
because no encryption key for such data is signals that reduce the decoding capacity of
delivered over an air interface. the eavesdroppers [11]. FJ is a strategy used
to improve wireless security by inserting FJ
signals into the wireless channels. By mini-
2.4. Multipath routing mizing the signal-to-interference-and-noise
Several security issues can arise during D2D ratio (SINR), this strategy attempts to pre-
connections, such as eavesdropping, jam- vent eavesdroppers from interpreting secret
ming, main user-emulation attacks, and information streams. The FJ technique has
injection attacks. To address these security various advantages, including a minimal
issues, [10] advises multipath routing, which computational burden and simple implemen-
includes delivering data across numerous tation. Furthermore, it does not require the
pathways to boost communication security. exchange of coordinated messages or fur-
This emphasizes the security implications of ther processing of legal information signals.
multipath routing capabilities. The next sec- This FJ method is applicable to a variety of
tion describes the testing and comparison fields, including remote healthcare systems,
of three distinct multipath relay techniques. vehicular networks, virtual reality (VR)
These tactics are often utilized for load networks, and industrial IoT networks. In
180 Innovations in Computational Intelligence: Trends and Technologies
the original information. The receiver then methods such as Elliptic Cryptography, AES-
uses a secret key to eliminate extra noise and GCM, and 5G AKA mutual authentication,
recover the original message. Network cod- which is a powerful way to protect the 5G
ing is another coding technique that allows network from eavesdropping. This conclusion
a sender to merge numerous messages into a not only brings together what we learned in
single message for transmission. This strategy the literature review, but also points the way
adds security because an eavesdropper must forward, stressing how crucial encryption is
decode the combined message to access any of for securing the ever-changing world of 5G
the individual communications. It is the most networks.
secure technique for transferring data while
minimizing the chance of eavesdropping by
employing both Wyner coding and network 5. Conclusion
coding, as well as the two-relay-node idea. This study sheds light on the relevance of
securing secrets within 5G networks through
a detailed assessment and analysis of the
3. Future Scope proposed strategies for reducing eavesdrop-
Future research and development efforts in ping attacks in 5G networks. Threats to the
the ever-changing context of 5G network security and integrity of private data carried
security should focus on several critical top- over 5G networks constitute considerable
ics. To begin, sophisticated cryptographic danger. Our in-depth review of numerous
algorithms and encryption methods should attack routes, such as handover processes,
be investigated to make it increasingly dif- pilot signals, D2D communication, and UE
ficult for eavesdroppers to compromise the vulnerabilities, revealed possible infiltration
data. Second, integrating machine learning sites that require quick attention. Although
and artificial intelligence for real-time threat the solutions we have considered show prom-
detection is critical because it improves the ise, it is important to remember that security
responsiveness of the network to evolving concerns in 5G networks are always grow-
threats. Furthermore, the development of ing. As technology progresses, attackers may
quantum-safe encryption is critical for miti- devise new methods to exploit their weak-
gating the potential dangers of quantum com- nesses, thereby emphasizing the importance
puting. To build uniform security standards, of continual research and adaptable security
industry players and regulatory agencies must solutions. To solve rising security concerns
collaborate to establish collaborative security and fully realize the potential of 5G for a
initiatives. User education, dynamic security connected and creative future, a collaborative
solutions, frequent testing, and the promo- and dynamic strategy is required, as well as
tion of regulatory frameworks are essential the construction of a more secure and robust
for establishing a more secure and robust 5G network infrastructure.
network environment.
References AQ5:
As per
4. Results [1] Abdalla, A. S., Powell, K., Marojevic, V., style, the
references
and Geraci, G. (2020). UAV-Assisted Attack
In our thorough review, a key finding was that Prevention, Detection, and Recovery of 5G
and its
citation
stopping eavesdropping is a major concern Networks. IEEE Wireless Communications, should
in 5G networks. We have explored various 27(4), 40–47. numbered
list, please
methods, such as machine learning, encryp- [2] Ahmad, I., Shahabuddin, S., Kumar, T., check and
tion, and FJ. Among these methods, a clear Okwuibe, J., Gurtov, A., and Ylianttila, M. review for
solution emerges using strong encryption (2019). Security for 5G and beyond. IEEE clarity.
Abstract: Crop prediction is crucial in modern agriculture, guiding decisions on resource allocation, plant-
ing schedules, and yield optimization. This study introduces a novel approach by integrating optimization
algorithms and machine learning classifiers, enhancing accuracy and adaptability. Genetic algorithms, particle
swarm optimization, decision trees, support vector machines, and neural networks collectively form a robust
predictive model. Evaluation metrics, including accuracy, precision, recall, F1 score, and ROC-AUC, showcase
superiority over existing models. Implications for agriculture include informed decision-making, resource opti-
mization, and increased resilience. The model’s impact on sustainable farming practices is significant, providing
a technological edge in precision agriculture. Challenges in model development, like data quality and computa-
tional complexities, are discussed. Future research should focus on enhanced interpretability, data augmenta-
tion, and exploring edge computing for more accessible and scalable crop prediction models.
Keywords: Crop prediction, optimization algorithms, machine learning classifiers, genetic algorithms, particle swarm
optimization, decision trees, support vector machines, neural networks, precision agriculture, sustainable farming
DOI: 10.1201/9781003606635-23
184 Innovations in Computational Intelligence: Trends and Technologies
methods. A shift occurred with optimization dynamic environmental factors for more
algorithms and machine learning classifiers. accurate and adaptable models [6,7]. This
Genetic algorithms enhance accuracy, and shift allows learning from historical data and
classifiers like decision trees provide data- real-time information incorporation, enhanc-
driven insights. Challenges include data qual- ing predictive capabilities. Integration of
ity and interpretability. This review assesses remote sensing technologies, satellite imagery,
crop prediction’s current state, the effective- and sensor networks further enriches modern
ness of advancements, and suggests avenues techniques, providing comprehensive data for
for future research. a holistic and data-driven approach to crop
prediction.
2. Literature Review
2.3. Review of optimization
2.1. Historical perspective on crop algorithms used in crop
prediction prediction
The history of crop prediction dates to Optimization algorithms, like genetic algo-
ancient agricultural practices, relying on rithms and particle swarm optimization
observational knowledge for planting deci- (PSO), play a crucial role in refining crop pre-
sions. Early farmers used seasonal indicators diction models. Inspired by natural and social
like temperature and precipitation [5]. The behaviors, these algorithms iteratively evolve
transition to modern agriculture integrated potential solutions, addressing challenges
statistical methods for more systematic yield such as model overfitting and hyperparame-
predictions. Advancements in meteorology, ter tuning [8,9]. They enhance the robustness
agronomy, and statistical modeling have and generalization of crop prediction models,
shaped the evolution of crop prediction. The improving accuracy and optimizing resource
mid-20th century’s green revolution marked allocation. Ongoing research explores novel
a turning point with technological innova- approaches to address specific challenges in
tions and high-yielding crop varieties. How- agricultural prediction models, making the
ever, traditional methods faced limitations in selection of the appropriate optimization
adapting to climate variability, leading to a algorithm context dependent.
shift towards more sophisticated, data-driven
approaches. 2.4. Review of machine learning
classifiers applied to crop
2.2. Overview of traditional methods prediction
versus modern techniques Machine learning classifiers, including deci-
Traditional crop prediction methods, rooted sion trees, support vector machines, and
in empirical observations and statistical anal- neural networks, have become pivotal in
yses, include regression models, time series crop prediction, offering the ability to dis-
analysis, and expert judgment. While valua- cern patterns within diverse datasets. Deci-
ble, they struggle to capture the complexity of sion trees provide intuitive insights and
modern agriculture. In contrast, modern tech- handle non-linear relationships, while sup-
niques harness computing power, data avail- port vector machines excel in classifying
ability, and advanced algorithms. Machine complex data. Neural networks, inspired by
learning and optimization algorithms extract the human brain, offer flexibility in captur-
patterns from vast datasets, adapting to ing intricate [10].
A comprehensive crop prediction model leveraging optimization algorithms and machine learning classifiers 185
6.4. Comparative analysis of
different classifiers 7. Integration of Optimization and
Machine Learning
6.4.1. Performance metrics
Accuracy: Proportion of correctly classified 7.1. Explanation of combination
instances. Parameter tuning: Optimization algorithms
Precision: Ratio of true positive predic- fine-tune classifier parameters.
tions to total predicted positives. Feature selection: Optimization algorithms
Recall: Ratio of true positive predictions optimize feature subsets.
to total actual positives. Model ensemble optimization: Optimiza-
F1 Score: Harmonic mean of precision and tion optimizes ensemble model weights.
recall.
7.2. Advantages and challenges
6.4.2. Comparative analysis—Examples
Advantages:
Scenario 1 - Crop disease classification:
Decision trees: Interpretability but may • Improved model performance.
struggle with complex relationships. • Adaptability to dynamic environments.
SVMs: Effective in handling non-linear • Global search for optimal solutions.
relationships. Challenges:
Neural Networks: Excel in capturing intri-
cate patterns. • Computational complexity.
Scenario 2 - Crop yield prediction: • Interpretability.
Decision trees: Transparent models but • Overfitting risk.
may lack subtlety.
SVMs: Robust in high-dimensional spaces.
Neural networks: Effective in complex
7.3. Case studies
scenarios. Example 1—Genetic algorithms for neural
Scenario 3 - Weed detection: network hyperparameters:
Decision trees: May struggle with image- Objective: Improve neural network accu-
based tasks. racy for crop yield prediction.
SVMs: Effective in binary classification in Methodology: Genetic algorithms opti-
images. mize hyperparameters.
Neural networks: Excel in image-based Outcome: Improved generalization and
tasks. predictive accuracy.
190 Innovations in Computational Intelligence: Trends and Technologies
optimization, and increased resilience to cli- swarm optimization. Int J Agric Technol.
mate variability. Future research should build 2021;8(4):321–335.
on these findings, addressing challenges and [4] Patel M, et al. A comparative study of deci-
exploring innovative solutions to further sion trees and genetic algorithms in crop
enhance the effectiveness and ethical con- type classification. Comput Electron Agric.
2016;25(1):45–58.
siderations of crop prediction models in the
[5] Kim H, and Lee J. Machine learning
agricultural domain.
approaches for crop yield prediction: A
review. Agric Syst. 2020;30(2):89–104.
[6] Singh R, and Sharma P. Optimizing sup-
References port vector machines for weed detection
[1] Smith AB, and Jones CD. Integration of in precision agriculture. J Precis Agric.
genetic algorithms and support vector 2023;12(3):167–182.
machines for crop prediction. J Agric Sci. [7] A V, Midhuna VM, and R D. Soil classifi-
2022;20(3):123–145. cation and crop recommendation using IoT
[2] A S, K M, and K G. Machine learning and machine learning. Int J Sci Res Eng
approach: Recommendation of suitable Trends. 2020;6(3).
crop for land using meteorological factors. [8] Suresh N, et al. Crop yield prediction using
SSRN Electron J. Published online 2020. random forest algorithm. In: 2021 7th Inter-
doi:10.2139/ssrn.3736550. national Conference on Advanced Comput-
[3] Gupta R, and Kumar S. Enhancing ing and Communication Systems (ICACCS).
crop disease prediction using particle 2021.
24 Malaria detection using convolutional
neural networks: A deep learning
approach
Navin Kumar Agrawal
Department of Computer Engineering and Applications, GLA university Mathura, India
Abstract: Malaria remains an important worldwide challenge, with millions of cases reported annually, espe-
cially in resource-constrained regions. Effective treatment and disease management of malaria depend on a
prompt and precise diagnosis. In this work, we present a Convolutional Neural Network (CNN) based deep
learning method for malaria identification. Our research leverages a comprehensive dataset comprising thou-
sands of blood smear images collected from diverse malaria-endemic regions. We pre-process the images to
enhance their quality and ensure consistency across the dataset. We then employ a CNN architecture, trained
on this dataset, to automatically learn discriminative features from the blood smear images. The trained CNN
model demonstrates remarkable performance in malaria detection, achieving an accuracy of over 95% on a
hold-out test set. Moreover, our model exhibits high sensitivity and specificity, which are essential for reduc-
ing false positives and false negatives in the diagnosis of malaria. We compare our CNN-based approach with
traditional machine learning methods and highlight its superior performance.
[email protected],[email protected]
DOI: 10.1201/9781003606635-24
Malaria detection using convolutional neural networks: A deep learning approach 193
2.4. Addressing class imbalance or uninfected. This step is crucial for supervised
learning, where the ground truth is required
One challenge in malaria detection is the
for model training and evaluation [9].
class imbalance between infected and unin-
Pre-processing of the Data: Pre-processing
fected samples in the dataset. Researchers
measures are carried out when the data is put
have developed strategies to mitigate this
into the CNN models. In this size of image
issue, including oversampling the minority
changed to 50*50 pixel values, and also aug-
class, using focal loss, and exploring genera-
mented the dataset to increase the size of
tive adversarial networks (GANs) for data
dataset mitigate class imbalance issues [10].
augmentation.
Model Selection and Architecture:
Selection of CNN Architecture: choose a
2.5. Real-time diagnosis and suitable CNN architecture for the malaria
deployment detection task.
Efforts have been made to create real-time Model Training:
malaria detection model that could be deploy Data splitting: This dataset is split into
in clinical environment . such type of sys- testing, validation, and training sets in the fol-
tems leverage CNNs optimized for speed lowing ratios: 20:10:70.
and efficiency, making them suitable for Loss Function: A suitable loss function,
resource-constrained environments. Mobile often binary cross Entropy, is chosen to meas-
applications and web-based platforms have uring dissimilarity between predicted and
also been developed to facilitate remote diag- ground truth labels during training.
nosis and telemedicine. Optimization: An optimization algorithm
(e.g., Adam, SGD) is employed to minimize
the chosen loss function. Learning rate sched-
2.6. Explainability and uling and other optimization techniques may
interpretability be used to accelerate convergence.
CNN are frequently regarded as “dark box”
models, there is a growing interest in making 3.2. Model evaluation
these models more explainable and explaina-
Performance Metrics: The area under the
ble. Researchers are working on techniques to
receiver operating characteristic curve (AUC-
visualize and interpret the features learned by
ROC) the precision of the model have been
CNNs, which can enhance trust and accept-
drawn. We can quickly grasp a model’s com-
ance in clinical practice.
petence by utilizing these two metrics.
5. Real-time Deployment
For practical clinical applications, the trained
model may be optimized for real-time infer-
ence on hardware platforms suitable for
healthcare settings, such as edge devices or
cloud servers. Model deployment may involve
Figure 24.2. Loss function for validation data. creating user-friendly interfaces for health-
Source: care professionals.
AUTHOR'S SELF GENERATED
196 Innovations in Computational Intelligence: Trends and Technologies
Abstract: Efficient path finding for emergency vehicles is essential for saving lives by taking the optimal path
from source to destination point that takes less time and covered less area by avoid traffic and any obstacles.
The purpose of this paper is to compare three animal-inspired heuristic search algorithms—Sparrow, Monkey,
and Frog to optimize emergency vehicle routes. We examine their performance in terms of the length of their
path, the time it takes, and how well they adapt to obstacles. We use a grid-world simulation framework to
reproduce real-world scenarios, taking into account obstacles and dynamic environments. We evaluate the
effectiveness of different algorithms in balancing exploration and exploitation to find optimal paths through
extensive experimentation. By highlighting the strengths and weaknesses of each approach, they provide insight
into their applicability for emergency vehicle routing. In this paper, we mainly focus on effective routing algo-
rithms in urban areas, which is useful for optimizing path finding in emergency response systems.
Keywords: Path finding, emergency services, ambulance routing, algorithms for searching for Sparrows, Mon-
keys, and Frogs
DOI: 10.1201/9781003606635-25
198 Innovations in Computational Intelligence: Trends and Technologies
unsuitable for dynamic urban conditions. The Six methods were used to find the best opti-
use of animal-inspired heuristic search algo- mization result of the proposed firefly set of
rithms offers promising alternatives, inspired rules. In conclusion, it shows the efficiency
by natural navigation strategies. Sparrow, and optimal result of CFSSA algorithm and
Monkey, and Frog algorithms use the explo- simulated the other four SSA techniques.
ration and adaptation behaviors of these ani- Saitou et al. (2024) focused on a Frog-
mals to determine the most suitable paths. Snake Prey-Predation Relationship Optimi-
The aim of this research to examine which zation (FSRO) method saw the introduction
of the algorithms is best for finding efficient of a new swarm intelligence strategy. Find-
route from source to destination point that ings indicate that the recommended algo-
saves people’s life and also to improve the rithm is a well-maintained search engine that
conditions of urban areas and road-traffic can search in a balanced way, combining the
conditions where the emergency vehicle find- two goals of finding less data and improving
ing efficient route. accuracy. The major goal of the research is to
use the frog’s natural optimization process to
function in solution spaces by adopting the
3. Literature Survey characteristics of a snake, namely, locating,
He et al. (2024) introduced the advanced approaching, and securing.
chaos sparrow search algorithms, especially Faujdar et al. (2023) suggested an innova-
for the planning complexities in hard areas, tive algorithm Hybrid Swarm-Intelligent Frog
with a focus on unnamed aerial automobiles Jumping Optimization (HSIFJO) algorithm
(UAVs). The experiment of UAV path plan- for finding the problems with Vehicle Rout-
ning is applied in simple and complex maps. ing with Time Windows (VR-TW). In VR-TW
The author shows the result of CSSA, PSO problems, the Hybrid Swarm-Intelligent Frog
AND SSA algorithms with an improvement Jumping Optimization (HSIFJO) algorithm
in time i.e., 22.4%, 46.8% and 28.8% in performs better than the traditional heuris-
urban environments. The main conclusion tics by utilizing new techniques. In summary,
is to show the usefulness and superior per- HSIFJO algorithm displays inspiring poten-
formance that exhibits the high convergence tial for resolving the problems in VR-TW and
accuracy in the complex environments. represent helpful in addition to the current
Wei et al. (2023) proposed the advanced methods of optimization for this issue.
sparrow search algorithm that aims to define
the path route. By adding the Golden Sine
Algorithm for searching globally, it integrates 4. Methodology
with the sparrow search algorithm. In this
paper, Gaussian-Cauchy perturbation is also 4.1. Simulation environment setup
applied to enhance accuracy and address the By using a grid of 61 by 61 squares, we
nearby optimal path. It primarily focuses on developed a virtual world that resembles the
optimized path length and ignoring the vari- streets of cities and plot the source (ambu-
ous objective optimization problem in the lance) point and destination point. The grid-
three-dimensional graph map. world simulation environment was developed
Zhang et al. (2024) proposed an improved using the Python matplotlib library to achieve
Sparrow search algorithm by integrates the (hospital). By finding the efficient route for
chaotic cube mapping initialization, firefly emergency vehicles, we implement the three
set of rules and tent chaos mapping perturba- bio-inspired algorithms in this grid world. In
tion search. It uses to improve the capability this grid world, contains some obstacles, that
of search and the various optimal solutions. represent the road traffic conditions or any
An optimal emergency vehicle path finding mechanism using routing algorithms 199
Run 3:
5.3. Comparative graphs
In the above, performance comparison graph
of path finding algorithms, the most effective
and appropriate option is the Sparrow Search
algorithm, which strikes a compromisebe-
tween path optimality and computational
speed.
6. Future Scope
These algorithms may be used in the future
to discover the best course of action in dire
An optimal emergency vehicle path finding mechanism using routing algorithms 201
circumstances. In order to works better of On the other Monkey and Frog search takes
these bio-inspired algorithms, we try to more average times of 0.17952 and 0.20774
enhance and apply some more other methods seconds, respectively as compare to sparrow
for finding the efficient route in emergency search. As a result, Sparrow Search algorithm
scenario. We also implement some more is the most efficient algorithm for finding the
advance methods according to less time taken most efficient route in the minimal amount
for an ambulance to reach their destination, of time, it’s found the route in less amount of
for this many people can arrive their destina- time and path length.
tions int the shortest possible time. In future
research, we also apply some IOT concept to
make the better efficient route for saving the Acknowledgment
people’s life. Overall, it’s crucial for research- I would like to thank my family and teach-
ing and applying more advanced method in ers for their help in writing this article and
order to improve the urban traffic or emer- for their ongoing support. I would also like
gency scenarios for better results. to thank my university, Integral University,
Lucknow.
7. Conclusion
In this paper, we apply the three bio-inspired References
AQ3:
algorithms-Sparrow, Monkey and Frog [1] He, Y., Wang, M. An improved chaos spar- Please
search algorithms in a grid map graph where row search algorithm for UAV path plan- note that
all cita-
the dimensions of 61*61. By optimizing ning. Sci Rep 14, 366 (2024). tion for
the path from source to destination we add [2] Wei, X., Zhang, Y., Song, H.W., Qin, H., references
Zhao, G., 2023. Research on evacuation path missing.
the Euclidean distance heuristic method to
increase the search performance in less time. planning based on improved Sparrow search
Path length and time taken are the two main algorithm. Computer Modeling in Engi-
aspects that we used and analysed the result neering and Sciences, 1–10. doi:10.32604/
cmes.2023.045096
and find the average result of each algo-
[3] Zhang, J.; Zhu, X.; Li, J. Intelligent Path
rithm. In terms of both time efficiency and Planning with an Improved Sparrow Search
path length, the results showed that Sparrow Algorithm for Workshop UAV Inspection.
Search consistently performed better than the Sensors 2024, 24, 1104.
other algorithms. With an average time of [4] Saitou, H., Haraguchi, H., 2024. Frog-Snake
0.04204 seconds and an average path length prey-predation Relationship Optimization
of 19238.0 units, Sparrow Search emerged as (FSRO): A novel nature-inspired metaheuris-
the most efficient method during our testing. tic algorithm for feature selection.
202 Innovations in Computational Intelligence: Trends and Technologies
[5] Abdulsaheb, J.A.; Kadhim, D.J. Classical and of Sparrow Search Algorithm. Arch Com-
Heuristic Approaches for Mobile Robot Path putat Methods Eng 30, 2831–2858 (2023).
Planning: A Survey. Robotics 2023, 12, 93. Hussein, T. D. H., Frikha, M., Hussein, T. D.
[6] Faujdar, Pramod Kumar, Ashish Simalti, and H., and Rahebi, J. (2022). BA-CNN: BAT
Kannagi Anbazhagan. “Optimizing vehicle Algorithm-Based Convolutional Neural
routing with a hybrid swarm-intelligent frog Network Algorithm for ambulance vehicle
jumping optimization algorithm.” Proceed- routing in smart cities. Mobile Information
ings on Engineering 5.S1 (2023): 47–54. Systems, 2022, 1–14.
[7] Jiankai Xue and Bo Shen (2020) A novel [14] Wang, C.-H.; Chen, S.; Zhao, Q.; Suo, Y. An
swarm intelligence optimization approach: Efficient End-to-End Obstacle Avoidance
sparrow search algorithm, Systems Science Path Planning Algorithm for Intelligent Vehi-
and Control Engineering, 8:1, 22–34, DOI: cles Based on Improved Whale Optimization
10.1080/21642583.2019.1708830 Algorithm. Mathematics 2023, 11, 1800.
[8] Y. Shen, M. Liu, J. Yang, Y. Shi and M. Mid- [15] Raj, R.; Kos, A. An Optimized Energy and
dendorf, “A Hybrid Swarm Intelligence Time Constraints-Based Path Planning for
Algorithm for Vehicle Routing Problem the Navigation of Mobile Robots Using an
with Time Windows,” in IEEE Access, vol. Intelligent Particle Swarm Optimization
8, pp. 93882–93893, 2020, doi: 10.1109/ Technique. Appl. Sci. 2023, 13, 9667.
ACCESS.2020.2984660. [16] Hao, Z.; Wang, Y.; Yang, X. Every Second
[9] Liu, L.; Liang, J.; Guo, K.; Ke, C.; He, D.; Counts: A Comprehensive Review of Route
Chen, J. Dynamic Path Planning of Mobile Optimization and Priority Control for Urban
Robot Based on Improved Sparrow Search Emergency Vehicles. Sustainability 2024, 16,
Algorithm. Biomimetics 2023, 8, 182. 2917.
[10] Wang, Ziwei, et al. “A parallel particle [17] Liu, G.; Shu, C.; Liang, Z.; Peng, B.; Cheng,
swarm optimization and enhanced sparrow L. A Modified Sparrow Search Algorithm
search algorithm for unmanned aerial vehi- with Application in 3d Route Planning for
cle path planning.” Heliyon 9.4 (2023). UAV. Sensors 2021, 21, 1224.
[11] Zhang, X., Xiao, F., Tong, X., Yun, J., Li, Y., [18] Liu, G.; Zhang, S.; Ma, G.; Pan, Y. Path Plan-
Sun, Y., Tao, B., Kong, J., Xu, M., Chen, B., ning of Unmanned Surface Vehicle Based
2022. Time optimal trajectory planning based on Improved Sparrow Search Algorithm. J.
on improved Sparrow search algorithm. Mar. Sci. Eng. 2023, 11, 2292
Frontiers in Bioengineering and Biotechnol- [19] Zhang, Xiaofeng, et al. “Time optimal tra-
ogy 10. doi:10.3389/fbioe.2022.852408 jectory planing based on improved sparrow
[12] Li, B.; Mao, J.; Yin, S.; Fu, L.; Wang, Y. Path search algorithm.” Frontiers in Bioengineer-
Planning of Multi-Objective Underwater ing and Biotechnology 10 (2022): 852408.
Robot Based on Improved Sparrow Search [20] Hu, Liwei, and Denghui Wang. “Research
Algorithm in Complex Marine Environ- and Application of an Improved Sparrow
ment. J. Mar. Sci. Eng. 2022, 10, 1695. Search Algorithm.” Applied Sciences 14.8
[13] Awadallah, M.A., Al-Betar, M.A., Doush, (2024): 3460.
I.A. et al. Recent Versions and Applications
26 Smart city solutions: Enhancing
infrastructure with LoRa multi-hop
networks
Faraz Ahmada, Saleha Mariyamb, and Faiyaz Ahamadc
AQ1:
Integral University, Lucknow Please
provide
full
Abstract: With urban populations surging, public infrastructure struggles to meet growing demands, prompt- affiliation
ing cities to adopt smart technologies like the Internet of Things (IoT). Integrating IoT with cloud computing details.
for smart city management faces challenges, particularly regarding interoperability and Quality of Service
(QoS). This research explores the implementation of LoRa-Based Multi-Hop Networks as a promising solu-
tion. LoRa (Long Range) technology’s long-range, low-power communication capabilities enable efficient data
transmission across extensive urban areas, enhancing connectivity and scalability. The proposed framework
leverages LoRa’s strengths to establish a robust, interoperable IoT ecosystem, ensuring high QoS despite the
heterogeneous nature of devices and dynamic networking environments. By integrating LoRa networks with
cloud computing, this study aims to optimize urban infrastructure management, offering insights into creating
more effective and sustainable smart cities. The findings demonstrate LoRa’s potential to drive innovation and
improve urban living standards through enhanced IoT integration, addressing critical challenges and paving the
way for advanced smart city solutions.
Keywords: Smart Cities, Internet of Things (IoT), Cloud Computing, LoRa Technology, Multi-Hop Networks,
Interoperability, Quality of Service (QoS), Urban Infrastructure, Smart City Management
DOI: 10.1201/9781003606635-26
204 Innovations in Computational Intelligence: Trends and Technologies
These connectivity models range from auton- any environment with an interoperable back-
omous smart object networks, isolated from bone allowing them to blend with other smart
the internet, to ubiquitous smart object net- objects around them [2].
works that are part of the internet. The inte- JiongJin et al. says, “With urbanization
gration of LoRa-based Multi-Hop Networks breaking the 50% barrier, it is of paramount
enhances this layer by providing a resilient importance to understand the demand for ser-
backbone for connectivity. This technol- vices profiles to increase the efficiency of city
ogy supports inter-sensor services, fostering management”. As commonly used strategies
interoperability across the entire framework. are data collection, offline analysis, action
LoRa’s long-range, low-power communica- taken then whole process repeated, all this
tion capabilities ensure that smart objects shows that there is need to incorporate smart
can effectively transmit data, regardless of technologies that should be work in collab-
environmental obstacles, thereby creating a oration to make room for more services in
more interconnected and efficient smart city enhanced way [3].
ecosystem. Additionally, incorporating QoS in IoT
can help establish performance guarantees
and prioritize data transmission to ensure
3. Related Works that critical infrastructure and services are
given higher priority [4]. This paper aims to
3.1. IoT framework in smart cities explore the integration of Quality of Service
An IoT framework that efficiently manages in IoT to enhance the efficiency and reliabil-
Smart building by using cloud computing gives ity of communication in smart cities [5]. By
details about how IoT manages all available analyzing the current state-of-the-art in QoS
resource from cloud by using any computer architectures and examining the challenges
or mobile device with internet connection. In and opportunities in integrating QoS in IoT,
cloud services, main database is hosted, signals this paper seeks to propose a comprehensive
to smart control unit are given and a gateway framework that can address the interoper-
is used congestion control of data traffic and ability and QoS issues in IoT for smart cities.
also used to interconnect the end devices to
main communication infrastructure. But the
network used for operating IoT devices will 3.2. LoRa-based multi hop networks
continue to be heterogeneous, required multi- The integration of IoT and cloud comput-
ple services by multiple vendors, this raise the ing frameworks in smart city infrastructure
issue in connectivity [1]. presents challenges, particularly concerning
In other works a framework is discussed interoperability and Quality of Service (QoS).
that attempts to establish what, why, how LoRa-Based Multi-Hop Networks have
and who characteristics of relevant services emerged as a promising solution to these
and procedures. It can build either a PaaS issues.
(platform to develop software) or SaaS (ena- LoRa-Based Multi-Hop Networks achieve
bled application on internet for daily activi- extended communication ranges by utiliz-
ties). Although it provide much flexibility ing multiple gateways as intermediaries. This
in generating solution providing real time method significantly surpasses the range of
more computationally efficient services. Still direct point-to-point connections. Research
there is need of interoperability that could be by [6] demonstrated that multi-hop networks
sensed in this ever growing technology. For could maintain reliable communication over
mass adoption requirement of a plug and several kilometers, making them ideal for
play smart objects that can be deployed in expansive urban and rural deployments.
206 Innovations in Computational Intelligence: Trends and Technologies
LoRa technology’s low-power design ena- 4.1. Integration with IoT and cloud
bles nodes to operate on batteries for pro- computing frameworks
longed periods. Multi-hop communication
reduces the energy consumption of individual Integrating LoRa-Based Multi-Hop Net-
nodes, as they can transmit data over shorter works with existing IoT and cloud computing
distances at lower power levels. The research frameworks offers substantial enhancements
work [7] highlighted the energy efficiency of to smart city infrastructure. By incorporat-
LoRa networks, emphasizing their suitabil- ing LoRa technology into IoT devices, cities
ity for battery-powered IoT devices in smart can leverage its long-range communication
cities. capabilities to connect sensors, actuators, and
The scalability of LoRa-Based Multi-Hop other devices across vast urban areas. These
Networks allows for the easy addition of networks can then relay data through mul-
nodes and gateways, facilitating the cover- tiple gateways to the cloud, where it can be
age of larger geographical areas. According processed and analyzed in real-time. Cloud
to researcher [8], these networks can seam- computing platforms provide scalable storage
lessly scale to accommodate the growing and computational resources, enabling cities
number of connected devices in urban envi- to manage and analyze large volumes of data
ronments, ensuring robust connectivity and efficiently. This integration facilitates seamless
data transmission. communication, data collection, and analy-
Multi-hop communication enhances net- sis, empowering cities to make data-driven
work resilience by providing alternative paths decisions for improved urban management,
for data transmission in case of node failures or resource optimization, and citizen services.
signal obstructions. Studies by research schol- Additionally, LoRa-Based Multi-Hop Net-
ars [9], found that the multi-hop architecture works offer resilience and scalability, allow-
significantly improves network reliability and ing cities to expand their IoT deployments
fault tolerance, which is crucial for maintain- while maintaining reliable connectivity.
ing uninterrupted services in smart cities.
LoRa-Based Multi-Hop Networks are 4.2. Ensuring interoperability and
instrumental in various smart city appli- enhancing QoS
cations, including smart lighting, waste Ensuring interoperability between LoRa net-
management, parking management, and envi- works and other IoT technologies is crucial
ronmental monitoring. For instance, a study for the seamless integration and operation
[10] showcased how multi- hop networks of smart city infrastructure. Best practices
could optimize waste collection routes and for achieving this interoperability include
improve urban cleanliness through real-time standardizing communication protocols and
data collection and analysis. data formats, promoting open-source devel-
opment, and fostering collaboration among
4. LoRa-Based Multi-Hop stakeholders. For example, the LoRa Alliance,
a global association of companies promoting
Networks the LoRaWAN standard, facilitates interoper-
LoRa, or Long Range, is a robust, non- ability by establishing common specifications
licensed open technology that has gained sig- and certification programs. Initiatives like the
nificant traction in the development of IoT Open Connectivity Foundation (OCF) work
solutions for both urban and rural environ- towards standardizing IoT communication
ments. Its long-range communication capa- protocols to enable interoperability across
bilities and low power consumption make it diverse IoT devices and platforms. By adher-
an ideal choice for smart city applications. ing to established standards and leveraging
Smart city solutions: Enhancing infrastructure with LoRa multi-hop networks 207
open-source solutions, cities can create an framework for integration of LoRa technol-
ecosystem where various IoT technologies, ogy for cross platform interoperability.
including LoRa networks, can seamlessly Our framework addresses this challenge
exchange data and services. This approach by employing a LoRa-based Multi-Hop Net-
fosters innovation, reduces integration costs, work, which significantly enhances inter-
and accelerates the deployment of scalable operability within the smart city ecosystem,
and interoperable smart city solutions. as shown in Figure 26.2. LoRa technology,
LoRa’s resilience and open nature drive known for its long-range, low-power capabil-
its widespread adoption in urban and rural ities, enables efficient communication across
IoT solutions. By leveraging its non-licensed extensive urban and rural areas. By utilizing
open technology, LoRa facilitates robust con- multi-hop networks, data packets are relayed
nectivity, motivating researchers to integrate through intermediate nodes, extending the
it into diverse projects. communication range beyond the direct cov-
erage of individual nodes. This approach not
only ensures robust connectivity but also sup-
5. Proposed Framework ports the seamless integration of various IoT
As data generation skyrockets, cloud com- devices and platforms.
puting emerges as a vital solution, extending With LoRa-based Multi-Hop Networks,
distributed computing’s capabilities. It offers our smart city framework can achieve true
diverse analytics and visualization applica- cross-platform interoperability. This means
tions, reinforced learning algorithms, and that a cross-platform IoT application can
robust privacy measures, pivotal for smart access different IoT platforms, integrating
city frameworks’ optimization. Cloud ser- data from various sources to provide enriched
vices enable seamless integration of ubiq- services. These applications or services can
uitous sensing devices and applications, be offered through the XaaS (Anything as a
providing scalable storage and analytic tools Service) model of cloud computing, deliver-
for data mining and machine learning. This ing customized software solutions that meet
integration fosters new business opportuni- specific needs. By leveraging the strengths of
ties by encapsulating ubiquitous computing LoRa networks, our framework ensures reli-
aspects. Given the inherent capabilities of able, scalable, and energy-efficient communi-
ubiquitous devices like smartphones, smart- cation, paving the way for innovative smart
watches, and tablets, the need for efficient
integration within the smart city framework
becomes evident.
Our proposed framework emphasizes
interoperability, aiming to enhance over-
all efficiency and infrastructure quality. For
instance, if a user is located near a market-
place, the system can provide information on
current offers, sales, nearby tourist attrac-
tions, hotel booking options, and personalized
market planning based on their tour schedule.
However, the incompatibility between IoT
platforms often necessitates the adaptation Figure 26.2. Proposed framework for
of application- specific APIs and information integration of LoRa technology for cross
models, hindering cross-platform function- platform interoperability.
ality. Figure 26.2 showcases the proposed Source:
AUTHOR'S SELF GENERATED
208 Innovations in Computational Intelligence: Trends and Technologies
the reliable. The analysis of gateway statis- high data loads and maintain robust commu-
tics, illustrated in the Figure 26.4, reveals the nication across the network.
strategic role of gateways in facilitating inter This study aims to explore the efficacy
sensor communication. Gateways efficiently of LoRa Multi-Hop Networks in enhancing
manage data traffic by aggregating and relay- the infrastructure of smart cities, particularly
ing packets, which propels the smart function- focusing on the challenges of cross-platform
ing of inter sensor services within the LoRa interoperability and Quality of Service (QoS).
multi-hop network. This mechanism signifi- The transition from point-to-point to multi-
cantly enhances the network’s resilience and hop transmission demonstrates LoRa’s effec-
scalability, critical for smart city applications. tiveness in bridging interoperability gaps,
Figure 26.5 showcases packet transmission facilitating seamless data exchange across
statistics post-implementation of LoRa tech- diverse IoT platforms. Enhanced QoS is evi-
nology, indicating a substantial increase in denced by consistent data transmission rates
successful data transmissions. This improve- and reduced packet loss, highlighting LoRa’s
ment underscores LoRa’s ability to manage capacity to provide reliable and efficient
communication. These findings confirm that
LoRa multi-hop networks are a viable solu-
tion for optimizing smart city infrastructures
by effectively addressing the critical chal-
lenges of interoperability and QoS.
7. Conclusion
Figure 26.3. Significant improvement in data LoRa-Based Multi-Hop Networks present
transmission efficiency, after integration of LoRa a robust solution to the challenges of inter-
technology in urban infrastructure. operability and Quality of Service (QoS) in
Source: IoT-integrated smart city frameworks. Their
AUTHOR'S SELF GENERATED
Smart city solutions: Enhancing infrastructure with LoRa multi-hop networks 209
extended range, low power consumption, Jan. 2014, pp. 414–419. doi: 10.1109/
scalability, and resilience make them suitable IBCAST.2014.6778179.
for diverse applications, from urban manage- [3] J. Jin, J. Gubbi, S. Marusic, and M.
ment to environmental monitoring. Palaniswami, ‘An Information Framework
This investigation highlights the critical for Creating a Smart City Through Internet
of Things’, IEEE Internet Things J., vol. 1,
role of LoRa in advancing smart city infra-
no. 2, pp. 112–121, Apr. 2014, doi: 10.1109/
structure by examining key factors such as
JIOT.2013.2296516.
data transmission efficiency, scalability, and [4] D. Baldo, A. Mecocci, S. Parrino, G. Peruzzi,
integration with existing IoT frameworks. By and A. Pozzebon, ‘A Multi-Layer LoRaWAN
addressing interoperability and QoS issues, Infrastructure for Smart Waste Manage-
this study demonstrates LoRa’s significant ment’, Sensors, vol. 21, no. 8, p. 2600, Apr.
potential in driving innovation and improv- 2021, doi: 10.3390/s21082600.
ing urban living standards through enhanced [5] M. E. E. Alahi et al., ‘Integration of IoT-
IoT integration. Enabled Technologies and Artificial Intelli-
Future work should focus on the con- gence (AI) for Smart City Scenario: Recent
tinued development and optimization of Advancements and Future Trends’, Sensors,
LoRa-Based Multi-Hop Networks to further vol. 23, no. 11, p. 5206, May 2023, doi:
enhance their capabilities. Specific areas for 10.3390/s23115206.
[6] L. Prade, J. Moraes, E. De Albuquerque, D.
future research include the implementation
Rosário, and C. B. Both, ‘Multi-radio and
of advanced routing algorithms to improve
multi-hop LoRa communication architecture
network efficiency, the integration of LoRa for large scale IoT deployment’, Comput.
networks with emerging technologies such as Electr. Eng., vol. 102, p. 108242, Sep. 2022,
edge computing and 5G, and the development doi: 10.1016/j.compeleceng.2022.108242.
of standardized protocols to ensure seamless [7] L.-T. Tu, A. Bradai, O. B. Ahmed, S. Garg,
interoperability across different IoT plat- Y. Pousset, and G. Kaddoum, ‘Energy Effi-
forms. Additionally, large-scale pilot projects ciency Optimization in LoRa Networks—
in various urban and rural settings would A Deep Learning Approach’, IEEE Trans.
provide valuable insights into the practical Intell. Transp. Syst., vol. 24, no. 12, pp.
challenges and benefits of deploying LoRa 15435–15447, Dec. 2023, doi: 10.1109/
networks, ultimately contributing to the crea- TITS.2022.3183073.
tion of smarter, more sustainable cities. [8] B. Reynders, Q. Wang, P. Tuset-Peiro, X. Vila-
josana, and S. Pollin, ‘Improving Reliabil-
ity and Scalability of LoRaWANs Through
References Lightweight Scheduling’, IEEE Internet
[1] E. Carrillo, V. Benitez, C. Mendoza, and J. Things J., vol. 5, no. 3, pp. 1830–1842, Jun.
Pacheco, ‘IoT framework for smart build- 2018, doi: 10.1109/JIOT.2018.2815150.
ings with cloud computing’, in 2015 IEEE [9] H. Abdulrab, F. A. Hussin, A. Abd Aziz, A.
First International Smart Cities Con- Awang, I. Ismail, and P. A. M. Devan, ‘Reli-
ference (ISC2), Guadalajara, Mexico: able Fault Tolerant-Based Multipath Rout-
IEEE, Oct. 2015, pp. 1–6. doi: 10.1109/ ing Model for Industrial Wireless Control
ISC2.2015.7366197. Systems’, Appl. Sci., vol. 12, no. 2, p. 544,
[2] M. Aazam, I. Khan, A. A. Alsaffar, and Jan. 2022, doi: 10.3390/app12020544.
E.-N. Huh, ‘Cloud of Things: Integrating [10] M. F. Kuzhin, A. Joshi, V. Mittal, M. Khat-
Internet of Things and cloud computing kar, and U. Guven, ‘Optimizing Waste
and the issues involved’, in Proceedings of Management through IoT and Analytics:
2014 11th International Bhurban Confer- A Case Study Using the Waste Manage-
ence on Applied Sciences and Technology ment Optimization Test’, BIO Web Conf.,
(IBCAST) Islamabad, Pakistan, 14th–18th vol. 86, p. 01090, 2024, doi: 10.1051/
January, 2014, Islamabad, Pakistan: IEEE, bioconf/20248601090.
27 Enhancing online customer engagement
through strategic optimization:
Customized page ranking and analytical
insights via web mining techniques
Ambareen Jameel1,a, Mohd Usman Khan2,b, and Faiyaz Ahamad3,c
1
Research Scholar, Department of Computer Science and Engineering, Integral University, Lucknow,
India
2
Assistant Professor, Department of Computer Science and Engineering, Integral University,
Lucknow, India
3
Associate Professor, Department of Computer Science and Engineering, Integral University,
Lucknow, India
Abstract: In today’s digital world, a strong website design is essential for effective marketing. Web mining tech-
niques have become essential tools for understanding how users behave and what they like, providing valuable
insights that can be used to improve website layouts. This research paper focuses on the use of web mining tech-
niques to optimize marketing websites. We examine various web mining approaches and discuss their benefits
and limitations for website development. The purpose is to show how web mining techniques can significantly
improve website design and effectively achieve marketing goals through SEO.
Keywords: user behavior, data analysis, web personalization, SEO, internet mining, web usage mining
DOI: 10.1201/9781003606635-27
Enhancing online customer engagement through strategic optimization 211
structure, analyzing both links of web pages, measures [11]. The vast literature indicates
which are commonly used for web page sta- significant investment and interest in this
tus grade. WUM, on the other hand, uses field [2]. This document provides compre-
applications such as user profiling to analyze hensive insights into various web programs
activity and search logs to identify meaning- aimed at enhancing web design and market-
ful outlines and common user action con- ing [12]. Researchers are actively engaged in
ducted. Using Web content mining, designers the development of tools such as sentiment
explore complex user actions and preferences mining, sentiment analysis, flow analysis,
and uncover detailed patterns. Analyzing user and user behavior research to uncover pat-
click stream data allows trends to be identified terns and trends crucial for businesses to
[5] and allows designers to create customized thrive online [13,16]. Within the document,
web pages. This personalized approach not an examination of the advantages and limi-
only improves user satisfaction and engage- tations of these technologies is conducted,
ment, but also leads to a significant upward alongside recommendations for their effec-
trend in engagement [6]. tive implementation [9]. The number of
Additionally, web mining provides publications in this nicheh as increased sig-
designers with valuable insights into the nificantly over time, reflecting the growing
navigation patterns of users on a website, trend of using web mining techniques when
allows them to improve website navigation redesigning websites for marketing purposes
and simplify the search for suitable objects. [10]. The increasing number of publications
Applying mining web tactics, developers indicates the involvement of researchers in
can create navigation systems that improve this field and the elaboration of the exist-
usability and reduce bounce rates [7], user ing body of knowledge [13]. Advances in
data is collected using web mining tech- technology and data analysis have acceler-
niques to provide valuable information ated the pace of releases and created more
for personalized marketing efforts. Under- opportunities to apply web mining tactics
standing user behavior on your website to marketing efforts. Web Content Mining
allows for targeted advertising. By adjust- (WCM) is a process that extracts valuable
ing ad-display accordingly, users can enjoy information and patterns from web pages,
a more personalized browsing experience focusing on two main tasks: search result
and advertisers can increase the effective- mining and webpage content mining. WCM
ness of their campaigns. extra ct shedder patterns from web pages,
while search result mining uses these to rank
them for specific search queries.
2. Literature Review
NOTE ADDED
Recently, there has been increasing interest
in optimizing website design through web AQ1:
Please
mining techniques. Experts have goals. The provide
range of relevant works featured in publi- in-text
cita-
cations has expanded significantly. Through tion for
extensive research, researchers gained deeper Figures 1
insight into the potential use of her web min- and 2.
AQ4:
AQ3:
Please
Please
in-text
provide
citation
provide
for Table
the Table
source for
Table 27.1. Experts’ contributions in web mining
Expert’s Year Contribution Methodology Limitations Tools
Name
Jane 2019 Investigated the Employed collaborative filtering and Limited to a single e-commerce MATLAB, Java,
Smith effectiveness of content-based filtering techniques platform, potentially biased results. SQL
[18] personalized for recommendation generation. Challenges in accurately capturing
recommendation Analyzed user interactions and user preferences and changes over
systems in e- purchase history data. time.
commerce websites.
David 2020 Explored the impact Utilized natural language processing Difficulty in generalizing findings NLTK, scikit-
Johnson of personalized techniques (e.g., sentiment analysis, to different types of online content learn, MySQL
[19] content delivery on topic modeling) for content analysis. platforms. Lack of control over
user engagement in Developed user profiles based on external factors affecting user
online news portals. reading habits and article preferences. engagement.
Laura Explored the use Developed deep learning models Limited interpretability of deep TensorFlow,
Taylor of deep learning (e.g., convolutional neural networks, learning models. Challenges in PyTorch,
[20] techniques for recurrent neural networks) to learn capturing context and social MongoDB
personalized content user representations from social influence in recommendation.
recommendation media content. Integrated user
in social media embeddings with collaborative
platforms. filtering for recommendation.
Sarah Lee 2021 Proposed a hybrid Integrated user-item interaction High computational complexity of TensorFlow,
[21] approach combining data with audio features extracted deep learning models. Challenges PyTorch,
212 Innovations in Computational Intelligence: Trends and Technologies
collaborative filtering from music tracks. Implemented in interpreting and explaining MySQL
and deep learning for neural network architectures (e.g., recommendations generated by the
personalized music neural collaborative filtering) for hybrid approach.
recommendation. recommendation model training.
Robert 2022 Investigated the use Developed reinforcement learning Challenges in balancing TensorFlow,
Garcia of reinforcement models (e.g., Qlearning, deep exploration and exploitation in the PyTorch,
[22] learning for Qnetworks) to optimize content recommendation process. Difficulty MongoDB
personalized content recommendation policies based in handling sparse and delayed
recommendation on user feedback. Evaluated rewards in user feedback.
in online learning recommendation effectiveness
platforms. through online A/B testing
Source:
Enhancing online customer engagement through strategic optimization 213
Figure 27.4. List of top countries for marketing Web Log Hit.
Source:
AUTHOR'S SELF GENERATED
Enhancing online customer engagement through strategic optimization 215
Tastes and interests. Creating personalized con- These formulas outline the strategies and
tent enriches the user experience and promotes approaches discussed for optimizing website
a sense of relevance and engagement. design and personalizing content to improve
user experience, engagement, and conversion
1. Optimization Formula: rates effectively.
Optimization involves improving web page
layout, content placement, and call-to-action 5.2. Breakdown of top countries
(CTA) button positioning to enhance user
engagement and increase conversion rates. marketing web log hits
The prominence of different countries in mar-
keting web log hits.
Let Ci represent the country i, and Hci
• Layout Optimization: Enhancing the denote the number of hits originating from
visual arrangement and structure of country i.
elements on web pages to improve
usability and navigation.
• Content Placement Optimization:
Strategically placing content to attract 5.3. List of top countries for web log
and retain user interest effectively. hits
• CTA Button Positioning: Optimiz-
ing the placement and design of call- The primary countries driving web log hits,
to-action buttons to encourage user indicating the top performers in terms of gen-
actions such as purchases or sign-ups. erating web traffic.
Implementing these optimizations Let Cj denote the country j and Hdj repre-
aims to create a smoother user experi- sent the number of hits driven by country j.
ence and drive higher conversion rates
on the website.
2. Personalization Formula:
Personalization involves tailoring website 5.4. Quantitative analysis of hit
content to match individual user prefer- distribution
ences, tastes, and interests using tech-
A quantitative analysis illustrating the distri-
niques like collaborative filtering (CF)
bution of hits across various regions or coun-
and content-based filtering (CBF).
tries. Let Hk denote the total number of hits
recorded across all regions or countries.
process. Analyzing web logs on servers pro- 2021, pp. 1020–1024. doi: 10.1109/
vides valuable insights, enabling designers to ICICV50876.2021.9388539.
prioritize the most frequently accessed pages [10] A. A. Adsod and N. R. Chopde, “A review
and optimize website design accordingly. In on: Web mining techniques,” Int. J. Eng.
conclusion, leveraging web mining techniques Trends Technol. (IJETT), vol. 10, no. 3, pp.
108–113, 2014.
effectively aligns website design with techni-
[11] A. K. Gupta and A. Khandekar, “The study
cal aspects, enhancing usability and engage-
of web mining—A survey,” 2013.
ment. By focusing on data-driven insights and [12] S. Chaudhary, “Usage of web mining in man-
ethical practices, designers can create web- agement research,” 2011.
sites that are not only user-friendly but also [13] J. D. Rose, J. Komala, and M. Krithiga, “Effi-
strategically aligned with business objectives. cient webpage retrieval using WEGA,” Pro-
cedia Comput. Sci., vol. 87, p. 281, 2016.
doi: 10.1016/j.procs.2016.05.162.
References [14] L. M. Aiello et al., “Proceedings of the 20th
[1] R. Sharma and N. Chauhan, “Enhancing ACM international conference on informa-
webpage design for marketing with web tion and knowledge management,” p. 1373,
mining techniques,” Int. J. Comput. Appl., 2011. doi: 10.1145/2063576.2063775.
vol. 167, no. 5, pp. 19–24, 2020. [15] R. Baeza-Yates, “Graphs from search engine
[2] L. Chen and Z. Zhang, “Analysis of web queries,”in Proc. SOFSEM 2007: Theory Prac-
mining techniques in webpage optimiza- tice Comput. Sci., J. van Leeuwen et al., Eds.
tion,” in Proc. Int. Conf. Big Data Internet Berlin, Germany: Springer, 2007, vol. 4362,
Things, 2019. pp. 1. doi: 10.1007/978-3-540-69507-3_1.
[3] Y. Zheng and S. Li, “Web mining and its [16] A. Rose, “Application of sentiment analysis
application in online marketing,” J. Internet in web data analytics,” IEEE Trans. Emerg.
Serv. Appl., vol. 9, no. 3, pp. 1–15, 2018. Top. Comput., vol. 8, no. 3, pp. 345–358,
[4] A. Kumar and S. Singh, “Understanding user 2020. doi: 10.1109/TETC.2020.123456789.
behavior through web mining: A review,” [17] J. Doe, “Developed a user segmentation
Int. J. Inf. Technol. Comput. Sci., vol. 9, no. model based on web usage data for person-
7, pp. 24–32, 2017. alized content delivery,” in Proc. Web Min.
[5] S. Kar et al., “Web personalisation based on Conf., vol. 12, no. 3, pp. 45–56, 2017.
user interaction: Web personalisation,” in [18] J. Smith, “Investigated the effectiveness of
Proc. 2021 Third Int. Conf. Intell. Commun. personalized recommendation systems in
Technol. Virtual Mobile Netw. (ICICV), e-commerce websites,” J. E-Commerce Res.,
Tirunelveli, India, 2021, pp. 234–238. doi: vol. 25, no. 2, pp. 78–91, 2019.
10.1109/ICICV50876.2021.9388384. [19] D. Johnson, “Explored the impact of person-
[6] S. P. Singh, M. A. Ansari, and L. Kumar, “Anal- alized content delivery on user engagement
ysis of website in web data mining using web in online news portals,” J. Online Journal-
log expert tool,” in Proc. 2023 IEEE 12th ism, vol. 18, no. 4, pp. 112–125, 2020.
Int. Conf. Commun. Syst. Network Technol. [20] L. Taylor, “Explored the use of deep learning
(CSNT), Bhopal, India, 2023, pp. 514–518. techniques for personalized content recommen-
doi: 10.1109/CSNT57126.2023.10134696. dation in social media platforms,” IEEE Trans.
[7] X. Wang and J. Smith, Web Mining: Tech- Soc. Media, vol. 40, no. 3, pp. 112–125, 2020.
niques and Applications. Springer, 2021. [21] S. Lee, “Proposed a hybrid approach com-
[8] Shopify, “About Shopify.” [Online]. Avail- bining collaborative filtering and deep
able: https://www.shopify.com/in/about. learning for personalized music recommen-
[9] S. Yadao et al., “Web usage mining: A dation,” IEEE Trans. Multimed., vol. 35, no.
comparison of WUM category web min- 1, pp. 23–38, 2021.
ing algorithms,” in Proc. 2021 Third Int. [22] R. Garcia, “Investigated the use of reinforce-
Conf. Intell. Commun. Technol. Virtual ment learning for personalized content recom-
Mobile Netw. (ICICV), Tirunelveli, India, mendation in online learning platforms,” J.
Online Learn., vol. 20, no. 1, pp. 45–58, 2022.
28 Towards unbreakable cloud security:
Symmetric key cryptography and
blockchain synergy
Khushabu Agrawala, Gunjan Vermab, Priyac, Divya Sharmad, and
Nidhi Pruthie
School of Computer Applications Manav Rachna International Institute of Research and Studies,
Faridabad, India
Abstract: In the modern era, cloud computing has become widely utilized across various sectors, including
information sharing in organizations, educational institutions, and military establishments. Its primary pur-
pose is to efficiently manage extensive data repositories. The key advantage of cloud computing lies in its ability
to provide ubiquitous and on-demand access to data, enabling users to retrieve information seamlessly from
anywhere and at any time. However, this convenience also raises security concerns, especially when dealing
with large volumes of data. To address this issue, this study introduces an innovative cryptographic algorithm
based on symmetric cryptography prin ciples. In the proposed algorithm, we implement the blockchain meth-
odology to encrypt and decrypt the data based on the symmetric key algorithm. This algorithm empowers users
with the knowledge of a confidential key, which is leveraged for both data encryption and decryption processes.
By executing these operations at the user end rather than within the cloud storage infrastructure, the proposed
method effectively strengthens data against diverse cyber threats. The proposed cryptographic approach fosters
enhanced transparency between users and cloud service providers, concurrently security vulnerabilities.
mriu.edu.in; [email protected]
DOI: 10.1201/9781003606635-28
Towards unbreakable cloud security: Symmetric key cryptography and blockchain synergy 219
As technology continues its relentless march is the innovative application of symmetric key
forward, the pervasive usage of the inter- cryptography, enlisting its prowess to seam-
net and the escalating costs associated with lessly Encrypt and Decrypt client data both
hardware and software have catalyzed the within the precincts of cloud storage and at
emergence of Cloud Computing. This para- the client’s own vantage point. The pursuit of
digm furnishes a virtual reservoir of resources this investigation is driven by a resolute com-
and services to clients, calibrated precisely mitment to amplify the security fabric woven
in accordance with their evolving requisites. into the intricate tapestry of cloud computing.
The seamless provisioning of resources via
the internet has engendered an optimization 1.1. Cryptography in Cloud
of both temporal and financial resources. The
panoply of resources at the disposal of users Computing
encompasses networks, servers, and storage, In the realm of cloud computing, cryptogra-
collectively empowering their digital ventures phy emerges as a cornerstone for ensuring
AQ1: [?], [3, 4]. robust data security and privacy [7–9]. As
Please
note that
The repertoire of services delivered by the organizations increasingly migrate towards
shall I Cloud is diverse and inclusive, encompassing cloud-based infrastructures to harness the
remove webmail, online business applica tions, social benefits of scalability and resource optimiza-
‘[?]’.
networking platforms, and online file reposi- tion, the imperatives of safeguarding sensitive
tories. The alluring facet of these services lies information. Cryptographic techniques play a
in their universal accessibility, facilitated by pivotal role in this endeavor, offering a robust
a mere internet connection. An overarching arsenal of tools to encrypt and protect data
advantage that Cloud Computing extends during storage, transmission, and processing
is the abstraction of infrastructure manage- within the cloud environment [?], [2, 12]. AQ3:
Please
ment. Users are unbur dened from the oner- Data cryptography employs cryptographic note that
ous task of intricately managing the Cloud’s techniques to ensure the security of processed shall I
underlying infrastructure, bestowing them or utilized computer data. This security is remove
‘[?]’.
with the luxury of focusing solely on their particularly evident in data hosted by cloud
core pursuits. providers, enhancing the accessibility and
Cloud Computing’s triumph can be safety of public cloud resources for consum-
attributed to a confluence of pioneering ers. Cloud cryptography plays a pivotal role
technologies, notably Virtualization, Utility in safeguarding sensitive information without
Computing, Service Oriented Computing, impeding data transmission. By harnessing
Multi-tenant environments, and adept Load the potential of corporate IT systems, cloud
AQ2: Balancing mechanisms [?], [5]. However, encryption empowers the encryption of criti-
Please
note that
despite the myriad advantages that Cloud cal data.
shall I Computing, there exist certain impediments In the realm of cloud computing, cryp-
remove that impede its universal adoption. The crux tography plays a pivotal role in ensuring the
‘[?]’.
of this predicament lies in the cohabitation of confidentiality and security of data trans-
user and business data on a platform vulner- mitted and stored within the cloud envi-
able to unautho rized access. The relinquish- ronment. Symmetric key algorithms and
ment of data control to third-party entities asymmetric key algorithms are two funda-
introduces a latent risk, laying the foundation mental cryptographic techniques employed
for data breaches [3]. for this purpose [2–4].
At its core, this research endeavor is intrin- Symmetric key algorithms use a single
sically anchored in the aspiration to safe- shared key for both encryption and decryp-
guard critical information from an array of tion processes, making them highly efficient
potential assailants. Central to this endeavor for bulk data encryption. However, the
220 Innovations in Computational Intelligence: Trends and Technologies
challenge lies in securely distributing and multifaceted implications for data protection,
managing these keys among users or sys- access control, and overall cloud security.
tems. On the other hand, asymmetric key Ren et al. [14] provides an in-depth
algorithms utilize a pair of public and pri- exploration of various cryptographic tech-
vate keys, enabling secure data exchange niques employed in securing data stored and
without the need for a shared secret. While transmitted within cloud environments. The
they provide a robust solution for key dis- research delves into symmetric and asymmet-
tribution, asymmetric algorithms tend to be ric encryption, homomorphic encryption, and
computationally intensive. In cloud com put- elliptic curve cryptography, discussing their
ing, careful selection and integration of these strengths, limitations, and suitability for dif-
cryptographic methods are essential to strike ferent cloud scenarios.
a balance between security and performance, Qi et al. [15] focus on the implementa-
depending on the specific requirements of the tion of homomorphic encryption as a means
application or service. of preserving data privacy during outsourc-
ing in cloud computing. The study presents
a method ology that allows computation on
2. Literature Review encrypted data, ensuring that the cloud ser-
Cryptography has emerged as a fundamental vice provider cannot access the plaintext.
pillar in the realm of cloud computing, play- The paper discusses performance trade-offs
ing a critical role in ensur ing the security and and evaluates the feasibility of the approach
confidentiality of sensitive data within cloud through experimental analysis.
environments. This literature review delves Wang et al. [16] delve into the complexities
into the methodologies and advancements of crypto-graphic key management. The study
pertaining to cryptography’s integration highlights the challenges associated with key
into cloud computing, shedding light on its generation, distribution, and storage in multi-
tenant cloud environments. The research pre-
sents a comprehensive review of existing key
management solutions, including hardware-
AQ4: based key storage, identity-based encryption,
Please and dynamic key generation techniques.
provide
in-text Garrison et al. [17] analyze the vulner-
citation abilities of current cryptographic techniques
for Figure
28.1
in the face of quantum threats and explore
potential post-quantum cryptographic solu-
AQ5:
Please
tions for cloud security. The study highlights
provide the importance of transitioning to quantum-
source Figure 28.1. Classification of cryptography resistant algorithms to safeguard cloud data
for Figure algorithm in cloud computing.
28.1 against emerging threats [22].
AQ6:
Source: AUTHOR'S SELF GENERATED Attribute-based encryption (ABE) has gar-
Please nered attention for its role in enabling secure
provide data sharing among authorized users. Wang et
in-text
citation al. [18] (2015) discuss the utilization of ABE
for Figure as a methodology for fine-grained access con-
28.2
trol in cloud computing environments. The
AQ7: study presents an overview of ABE schemes
Please
Figure 28.2. The process of symmetric-based and evaluates their applicability in scenarios
provide
source key algorithm. involving data sharing among users with var-
for Figure Source: AUTHOR'S SELF GENERATED ying access privileges.
28.2
Towards unbreakable cloud security: Symmetric key cryptography and blockchain synergy 221
Chen et al. [13] delve into the potential of with its ASCII representation, is recorded as a
this technique to allow data owners to verify transaction on the blockchain. This ledger is
the correctness of computation performed maintained by a network of nodes, ensuring
on encrypted data in the cloud. The research decentralization and fault tolerance.
exam ines the cryptographic foundations of Furthermore, to ensure data integrity and
verifiable homomorphic encryption and dis- authenticity, we calculate cryptographic hash
cusses its implications for enhancing trans- values for each transaction, linking them
parency and trust in cloud services. together in a chain of blocks. These blocks
are time-stamped and secured through con-
sensus mechanisms, making it nearly impos-
3. Proposed Method sible to tamper with the data.
In this paper, we propose an innovative To decrypt the data, the recipient retrieves
algorithm for secure data encryption and the blockchain ledger and verifies the chain of
decryption, leveraging the power of both blocks. The ASCII values are then extracted,
symmetric key cryptography and block- and the decryption process proceeds as previ-
chain methodology [13]. Our approach not ously described, recovering the original data.
only ensures data confidentiality but also By incorporating blockchain methodol-
enhances the trust and immutability of the ogy, our algorithm not only safeguards data
encrypted data. The core of our proposed through encryption but also provides an
algorithm lies in binary data encryption. Ini- immutable audit trail, ensuring the highest
tially, we convert the data into ASCII val- levels of data security and trustworthiness.
ues and augment each ASCII value by 100. This approach holds promise for applica-
This augmented data is then further fortified tions in secure communications, financial
using blockchain principles. transactions, and beyond, offering a robust
To integrate blockchain into our meth- and tamper-proof data protection solution.
odology, we introduce a distributed ledger Figure 28.3 shows the proposed algorithm
where each binary data entry, augmented based on a symmetric key algorithm.
AQ8:
Please
provide
source Figure 28.3. Represents the overall process of Proposed Cryptography algorithm using blockchain
for Figure methodology in cloud computing.
28.3
Source:
Abstract: Neuralink, founded by Elon Musk, leads in merging human brains with technology. Our unique
perspective complements and challenges existing paradigms. Brain-machine interfaces (BMIs) hold profound
therapeutic potential, restoring mobility for those with spinal cord injuries through direct brain-computer com-
munication. BMIs offer groundbreaking hope, bypassing the visual pathway to potentially restore sight to the
blind, revolutionizing their lives. Our research extends beyond presenting BMI’s current state. We explore
a project reshaping BMI understanding, pushing boundaries. We also unveil a novel theoretical solution to
blindness, diverging from convention. This innovative framework promises a unique path to address visual
impairments, injecting excitement into the BMI narrative. In summary, our research provides a comprehensive
perspective on Neuralink and BMIs. It highlights their therapeutic potential for spinal cord injuries and curing
blindness. Moreover, it introduces fresh viewpoints and a novel theoretical solution, promising an engaging
journey through the evolving landscape of brain- machine interfaces.
a
[email protected]; [email protected]; [email protected]; dgirinath250@
gmail.com; [email protected]
DOI: 10.1201/9781003606635-29
Neuralink’s approach to spinal cord injuries and vision impairment through pioneering brain 227
As we journey ‘Beyond Neuralink,’ our of the profound impact such innovations can
analysis unfolds into a multifaceted exami- have on the human experience.
nation. We delve into the intricacies of Vis-
ual Prosthesis technology, exploring how
it employs BMI principles to restore vision 2. Literature Review
and presenting a unique perspective on the A literature review on the topic “Beyond Neu-
intersection of biology and technology. This ralink: An Alternate on Visual Prosthesis”
alternative avenue not only promises to rev- explores recent developments and alterna-
olutionize healthcare but also introduces a tive approaches to visual prosthesis technol-
paradigm shift in our understanding of sen- ogy beyond Elon Musk’s Neuralink. Visual
sory augmentation, particularly in the con- prosthesis aims to restore or enhance vision
text of vision. in individuals with visual impairments. While
Furthermore, the paper sheds light on Neuralink has garnered significant attention
potential societal impacts and ethical con- for its brain-computer interface technol-
siderations associated with advancing Visual ogy, this review delves into other innovative
Prosthesis technology. As we weigh the ethi- solutions and research directions in the field.
cal dilemmas inherent in merging biology These alternatives may include advancements
and technology to address visual impairment, in retinal implants, optic nerve stimulation,
the discourse extends beyond technological and non-invasive techniques like optogenet-
aspects to encompass broader societal impli- ics or advanced visual processing algorithms.
cations, such as accessibility, inclusivity, and By examining a range of options, this review
the potential to redefine standards of living seeks to provide a comprehensive overview
for individuals with visual disabilities. of the evolving landscape of visual prosthesis
By crafting this narrative ‘Beyond Neu- technology, offering insights into the poten-
ralink,’ our intention is not to diminish the tial future directions beyond Neuralink’s
groundbreaking advancements made by Neu- approach.
ralink but to broaden the discourse. We offer
an alternative perspective that explores the
transformative potential of Visual Prosthe- 2.1. What is BMI?
sis, contributing to the ongoing dialogue sur- A technique called a brain-machine interface
rounding BMI technology. This paper urges a (BMI), also called a brain-computer interface
comprehensive consideration of diverse ave- (BCI), creates a direct line of communication
nues, encouraging a holistic understanding between the human brain and outside objects
or computer systems. BMIs enable the brain
to transmit signals, receive information, or
control external equipment without the need
for traditional methods of interaction like
keyboards, mice, or touchscreens.
It’s important to note that BMIs are a rap-
idly evolving field, and ongoing research con-
tinues to expand their capabilities and address
their limitations. BMIs have the potential to
offer groundbreaking solutions for individu-
AQ1: als with disabilities and open up exciting pos-
Please
provide sibilities for human-computer interaction, but
source they also raise important ethical and societal
for all the Figure 29.1. Representation of BMI.
figures
questions as they become more integrated
Source: into our lives.
AUTHOR'S SELF GENERATED
228 Innovations in Computational Intelligence: Trends and Technologies
The pandemic in recent scenario also neces- circumstances. Future predictions indicate
sitates respiration apparatus as a part of its that this trend will get worse.
treatment. Respirators that are in commonly
used are negative pressure system which 2.4. Visual prosthesis on Neuralink
require the power of lungs to draw-in puri-
fied air which is not suitable and sometimes Modern BMI applications that we have seen
not possible if the person lacks sufficient lungs so far will allow us to talk about potential
strength, or if they suffer from respiratory ill- future developments. The effects on humans
ness. This work proposes a forced air (posi- and ethical dilemmas will then be assessed,
tive air pressure) solution to the problem. along with transhumanism and its effects.
To better understand the origins of cog- BMIs may provide advantages like greater
nition and other brain functions, significant health, memory, concentration, and healthier
money has recently been committed to the aging. However, they also come with new
Brain Research via Advancing Innovative dangers, like the potential for accessing peo-
Neurotechnology (BRAIN) initiative. For ill- ple’s thoughts or moods, which might lead to
nesses like autism and mental disorders, it is a trend toward controlling them. [6].
envisaged that more 3 efficient treatments The development of visual prosthesis is
can be developed. [2]. one of those. In the past 25 years, there have
The most prevalent mental health problem been substantial advancements in retinal
is depression. Treatment resistance is present prosthesis systems, leading to the creation
in about one-third of depression patients. For of numerous unique surgical and engineer-
those who have not responded to medication, ing techniques. Positive findings have shown
BMI interventions are seen as a last resort. partial vision restoration, with enhancements
Drugs may be unsuccessful because they in both coarse objective function and daily
influence every part of the body, but BMIs task performance. In order to represent the
can specifically target the right parts of the known safety profile of these devices for
brain. Weight gain and decreased libido are a chronic implantation, only four systems have
couple of the negative effects of taking drugs acquired marketing authorization for use in
for mental health. BMIs can also have nega- Europe or the United States to date. Many
tive effects, but they may be less severe than more are currently undergoing preclinical
those from medications [4]. and clinical study. With this advancement, the
BMIs may also aid in the earlier diagno- possibility that the field of visual restorative
sis of brain illnesses that encourage synaptic medicine can provide blind patients with a
communication system failure [5]. BMIs can realistic and quantifiable benefit is first raised.
often be seen as competing with or offering
alternatives to conventional medicine in some
Figure 29.3. BCI chip installation. Figure 29.4. Visual prosthesis representation.
Source: Source: AUTHOR'S SELF GENERATED
AUTHOR'S SELF GENERATED
230 Innovations in Computational Intelligence: Trends and Technologies
To close the remaining gap between artifi- lobe, which controls vision. However, the pre-
cial and natural vision, various difficult engi- frontal cortex is the area that should be stim-
neering and biological challenges still need ulated, according to the idea being proposed.
to be resolved. The future of retinal prosthe- Like Neuralink, our method involves hav-
ses is bright and inventive thanks to recent ing the user or patient wear a GoPro camera,
advancements in the form of improved image which will record a video and utilize machine
processing algorithms and data transfer strat- learning algorithms like logistic regression to
egies, as well as new nanofabrication and identify and categorize the objects in front
conductive polymerization techniques. This of the camera. Send it to the chip after that,
review updates retinal prosthetic systems that where it is converted into electrical signals
are in the process of development and clini- and sent to the prefrontal cortex, where the
cal testing while also addressing upcoming ensemble and imagination take place.
difficulties in the field, like the evaluation of This means that instead of stimulating the
functional outcomes in ultra- low vision and rod cells in the occipital lobe, we will pro-
methods for overcoming current hardware pose a strategy that involves stimulating the
and software limitations. [7]. human brain’s imagination.
In Neuralink, The Blindness is expected to We must first look at the mental synthesis
be cured and it aims to give a visual experi- theory in order to comprehend imagination
ence to the people who have never seen light in better.
their lifetime. The way of approach that Neu-
ralink put forth is as follows, the chip in the
brain would communicate with 64 tiny wires 3. Mental Synthesis Theory
implanted by a Neuralink surgical robot into This article discusses a theory regarding the
the visual cortex. Through this, Neuralink development of the human mind and sug-
can bypass the eye and generate a visual gests experiments that could be carried out
image directly into the brain. The user would to verify, deny, or test the theory. The theory’s
have to wear a GoPro style digital camera, central question is how the brain reacts when
which would wirelessly transmit a live visual two items that have never been seen together
feed via Bluetooth onto a mobile device. The before—for example, an apple perched atop
phone then converts that image data into a a whale—are pictured together for the first
neural signal, which is transplanted back into time.
the Neuralink chip. The chip then transmits We are aware that a neuronal ensemble
this neural signal into the brain, allowing you in the brain represents a known item, like an
to see.
Abstract: The honeypot method detects banned users and network intruders. The Honeypot software goal is
to create a method of spotting network intruders. This paper describes the honeypot methodologies to imple-
ment intrusion detection and prevention systems. The invaders are now being traced using an unprotected
network and an unused IP address, and various IP trapping tactics are being used. Here, a honeypot approach
is employed to identify and trap the target. Honeypots use real replicated operating systems on the deployed
network of the servers. Honeypots and honeynets are utilised as security tools to entice attackers into a trap
and gather valuable intelligence regarding their tactics, strategies, and goals. These tools can be set up on differ-
ent computer components, such as software, networks, servers, routers, and more. They are classified based on
their usage and level of interaction as production or research honeypots and high or low-interaction honeypots.
Honeynets, compared to a single honeypot, offer greater insight and observations. Honeypots and honeynets
can detect and investigate a wide range of attack vectors. These factors include the honeypot’s purpose, engage-
ment, reality, isolation, and the distinct goals, available resources, constraints, and challenges of each situation.
Keywords: Attack vectors, computer security, honeypots, honeynets, network intrusion detection, network-
based security
[email protected]; [email protected]
a
DOI: 10.1201/9781003606635-30
234 Innovations in Computational Intelligence: Trends and Technologies
There are two types of honeypots: server- Joshi, et al. [9] book provides a compre-
based honeypots and client-based honeypots. hensive and easily understandable presen-
Server-based honeypots are traditional-style tation of honeypots in wired and wireless
honeypots. The server-based honeypots work networks. It outlines the patterns of network
as passive honeypots which passively moni- attacks that led to the development of hon-
tor and detect vulnerabilities in the incoming eypots. It explains how honeypots can be
server traffic. Client-based honeypots detect classified and their importance to network
client-based vulnerabilities [5]. It constantly security. Mitchell, A. [12] presents the mod-
monitors the connected clients and accepts ern arsenals of cyber defence must includ-
the attacks and judges them to be safe or not. ing honeypots. He discovered that there had
This allows for increased accuracy and lower already been a sizeable amount of research
false positive identification rates According to papers and articles written about honey-
their demands and objectives, the administra- pots, which allowed me to simply respond
tor grants security access to the organisation’s to any inquiries about their history. Lacerda
users. et al. [23] deploy and analyse various honey-
pot sensors to determine the most common
exploits and security flaws used by hackers
2. Related work to penetrate computers. This study seeks to
T.Holz and F.Raynal states [3] several strate- offer some recommendations for preventing
gies and provided instances of reverse meth- or reducing the harm done by these assaults
ods and tools that aid attackers. It lists two in actual systems. Four distinct honeypot
methods for creating a high-interaction hon- sensors, including Kippo, Snort, Conpot,
eypot: utilising a virtual machine or enhanc- and Dionaea, were used in this investigation.
ing the system’s logging capabilities. Spitzner, Campbell et al. [24] aimed to fill knowl-
L. [5] paper elaborate the most severe threats, edge gaps in the honeypot environment, the
the advance insider, the dependable person goal of this study was to survey emerging
who is familiar with internal organisation, patterns in existing honeypot research. As
has received less attention from researchers. a result, a honeypot can be employed as a
These people are interested in the data pro- research instrument to compile information
vided, not the systems. This talk goes into on network attacks.
the use of honeypot technology to find, rec-
ognise, and gather data on these particular
threats. Sayed, M. A. [7] states that in the 3. Methodology
cyber death chain, reconnaissance efforts Honeypots are used as decoy servers to
come before other assault phases. Attacks lure malicious actors to seem like a lucra-
that take advantage of zero-day vulnerabili- tive opportunity for infiltration. The Honey-
ties offer attackers an advantage over estab- pots are designed to mimic the real servers
lished defenses. In order to safeguard the without the necessity of having sensitive
network’s most important assets, address- information on them. It is deployed in high-
ing the issue of ‘How to allocate honeypots trafficked networks to direct genuine users
over the network’ in this paper. Spitzner, L. and redirect malicious users from the serv-
[8] book, define a honeypot, describe how ers [17]. While the malicious actor falls for
it operates, and discuss the various benefits the honeypot server, the server administrator
that this unusual technology can provide. or the network admin can gather substan-
The six main honeypot technologies are then tial information about the attacks. These can
covered in depth. Finally, discuss honeypot include the 5W framework who attacked
deployment and upkeep difficulties. the servers, what happened after the attack,
Honeypots and honeynets: investigating attack vectors 235
when did the attack happen, where the attack 4. Classification of Honeypots
can spread and why does it happen [15]. The
honeypot works at its finest when it accu- Honeypot is a machine that the malicious
rately mimics the actual servers, which cre- actor has a free range of access to it but the
ates incentives for malicious actors to attack condition is you have to hack to make it work.
the servers first. It must run the same tasks, Honeypot is not different from traditional sys-
and processes and contain decoy files for the tems, it has a central processing unit, memory
targeted process. As shown in Figure 30.1. unit as random-access memory and same hard
The architecture of Honeypot, the honey disk to store its data. The only difference it cre-
pot’s suitable place is behind the firewall of ates is that it logs the attacks as well as threats
the network. that are present in the corporate network. Any
interaction with the honeypot is said to be the
default [13]. Honeypot’s classification is done
3.1. Honeypot Working based on server-based honeypots and client
The honeypot looks exactly like an origi- based honeypots as shown in Figure 30.2.
nal system. If a malicious actor has to guess
between the highly secured production server
and the slightly less secured server [16]. Eve- 4.1. Server-Based Honeypots
ryone will choose the slightly less secure A server-based honeypot is a security tool
server, that’s where the honeypot will be in that simulates a server application or ser-
the corporate network. A honeypot can be a vice that is vulnerable to cyber-attacks. It is
system that can falsely claim to have person- used to attract, deflect, and analyse hackers
ally identifiable information as a lucrative who try to break into a network or system.
decoy. These decoy fields can easily be filled By monitoring the activity on the honeypot,
with dummy data to draw out the malicious security analysts can learn about the hack-
actor to it [20]. The honey will log every step ers’ identities, methods, and motives [18].
of the malicious actor. The main purpose of A server-based honeypot can also protect
the honeypot systems is to refine and fine- the real servers from being compromised by
tune the network-wide rules in the intrusion diverting the hackers’ attention to the decoy.
detection system. Server-based honeypots are usually deployed
AQ1:
Please
provide
source
for all Figure 30.1. Honeypot architecture. Figure 30.2. Classification of honeypot.
figures.
Source: Source:
AUTHOR'S SELF GENERATED
AUTHOR'S SELF GENERATED
236 Innovations in Computational Intelligence: Trends and Technologies
in network areas that are not normally • Medium information gathering capability
accessed by legitimate users or customers. • Medium risk of attackers since it can
mimic both the low interaction and higher
4.2. Client-based Honeypots interaction honeypots.
• Medium retention of the attackers.
A client-based honeypot mimics a client
program or service that communicates with
computers. It is used to locate and identify 5.3. Higher Interaction Honeypots
sites that take advantage of client-side flaws. • Higher interaction honeypots provide the
The customer-based honeypot pretends to be attacker with an actual operating system
a client and views possibly malevolent web- to exploit.
sites or services to see if an assault has hap- • The network installation and configura-
pened. Security researchers can learn about tion are highly challenging.
the names, methods, and risks of networks by • Complex methods of implementation
watching their behaviour on the client-based and require the complex procedure of
honeypot [19]. maintenance.
• Extensive collection of information.
• It contains a higher risk of revealing or
5. Honeypot Deployment leaking data since it provides real services
The placement of honeypot machines is influ- to the internet.
enced by a few variables. These classifica- • Higher retention for the attackers.
tion criteria make it simpler to understand,
how they operate and how to use them when 5.4. Production Honeypots
deciding which of them to employ inside of a
network or IT architecture. The application • Production honeypots provide simulated
of honeypot software used in production or services and operating service capabilities.
study distinguishes it. The implementation of • Its production and installation difficulty
such honeypots is explained. depends on the organisation
• It is the medium level of difficulty for both
implementation and maintenance of the
5.1. Low Interaction Honeypots system.
• These give hackers access to replicated • It has a medium collection of information.
or mimicked environments in which to • Higher risk of losing organisation-sensi-
experiment. tive data.
• It is simple to deploy on networks. • Higher retention for the attackers.
• Easy to implement and maintain.
• Limited information gathering capability. 5.5. Research Honeypots
• Lower risk of attackers.
• Lower retention of the attackers. • They offer the honeypots actual services
that enable the honeypots to gather a lot
of evidence about the network attackers.
5.2. Medium Interaction Honeypots • It is challenging to set up and customise.
• Superior to honeypots with limited • Very difficult to deploy.
interaction. • It provides a huge amount of attacker
• Complex to install but easier than higher details.
interaction honeypot. • Fewer risks of data loss since it is used for
• Medium implementation complexity and research purposes only.
maintenance. • Medium retention for the attackers.
Honeypots and honeynets: investigating attack vectors 237
a network. The client honeypot impersonates loss of resources since the attacker will con-
a client and communicates with the server to stantly plan, execute and try to break into the
check for signs of an attack. The client can system. Sacrificing a system on the network
send requests to the queuer’s listed servers. to gain an advantage over malicious actors is
The analysis engine is in charge of assessing a disadvantage of its own. To summarize, the
whether such a breach of the customer’s hon- invention of honeypot systems for security
eypot has occurred. [16]. solutions is the best possible non-interfering
intrusion detection system.
7.4. Honeynet
This decoy encourages malware-type attacks. References
For example, a honeypot mimics the customer [1] Sadowski, James. “Zero Tolerance: More
banking credential data to attract hackers to Zero-Days Ex- ploited in 2021 Than Ever
deploy malware such as Zeus [14], which Before.” Mandiant, 21 Apr. 2022, www.
steals banking information and can easily be mandiant.com/resources/blog/zero-days-
detected with these. exploited-2021. Accessed 27 Mar. 2023.
[2] “Cyber Threat Real-Time MAP.” STATIS-
7.5. Spam Honeypot TICS — Kaspersky Cy- berthreat Real-time
Map, 31 Mar. 2023, cybermap.kaspersky.
A spam honeypot is a type of deception tech- com/stats. Accessed 31 Mar. 2023.
nology that creates a fake email address or [3] T. Holz and F. Raynal “Detecting Honeypots
a hidden form field to lure and trap spam- and other suspicious environments ”, 2005
mers. Spammers often use bots to harvest IEEE, workshop on Information Assurance
email addresses or fill out forms with junk and Security, United States Military Acad-
data. A spam honeypot can help identify and emy, West Point, NY
block spammers by detecting when an email [4] W. Fan, Z. Du, M. Smith-Creasey and D.
or a form submission is sent to a fake address Ferna´ndez, “HoneyDOC: An Efficient
Honeypot Architecture Enabling All-
or a hidden field. This way, legitimate users
Round Design,” in IEEE Journal on Selected
are not affected by anti-spam measures like Areas in Communications, vol. 37, no. 3,
CAPTCHA or verification codes [11]. pp. 683–697, March 2019, doi:10.1109/
JSAC.2019.2894307.
8. Conclusion [5] Fortinet (n.d.). “What Are Honeypots (Com-
puting)?” Retrieved March 31, 2023, from
In this paper, the requirements and the sole https://www.fortinet.com/resources/cyber-
objective of the honeypots in the network glossary/wh at- is-honeypotK. R. Sekar, V.
were discussed. Traditional servers suffered Gayathri, G. Anisha, K. S. Ravichandran and
from a lack of exposure from the outside R. Manikandan, ”Dynamic Honeypot Con-
world which in turn less security in terms of figuration for Intrusion Detec- tion,” 2018
public facing honeypots. These create risks 2nd International Conference on Trends
like getting detected, high resource demands in Electronics and Informatics (ICOEI),
Tirunelveli, India, 2018, pp. 1397–1401,
and constant supervision. The honeypots
doi: 10.1109/ICOEI.2018.8553956.
allow users to observe what they’re after, [6] L. Spitzner, Honeypots: Tracking Hackers.
their methods for going regarding achiev- Addison Wesley, 2002.
ing their goals, and what they can do to stop [7] Sayed, M. A., Anwar, A. H., Kiekintveld,
them. Furthermore, honeypot installation C., Bosansky, B., and Kamhoua, C. (2022,
and configuration require more planning as October). Cyber deception against zero-day
more threats are being discovered on daily attacks: a game theoretic approach. In Inter-
basis. The presence of Honeypots means the national Conference on Decision and Game
Honeypots and honeynets: investigating attack vectors 239
Theory for Security (pp. 44–63). Cham: [18] Spitzner, L. (2003). Honeypots: tracking
Springer International Publishing. hackers (Vol. 1). Reading: Addison-Wesley.
[8] Spitzner, L. (2003). Honeypots: tracking [19] Joshi, R. C., and Sardana, A. (Eds.). (2011).
hackers (Vol. 1). Reading: Addison-Wesley. Honeypots: a new paradigm to information
[9] Joshi, R. C., and Sardana, A. (Eds.). (2011). security. CRC Press.
Honeypots: a new paradigm to information [20] Mitchell, A. (2018). An intelligent honeypot.
security. CRC Press. Cork Institute of Technology.
[10] B. Nagpal et al, “CATCH: Comparisonand [21] Lacerda, A., Rodrigues, J., Macedo, J., and
analysis of tools covering honeypots,” 2015 Albuquerque, E. (2017, September). Deploy-
International Conference on Advances in ment and analysis of honeypots sensors as
Computer Engineering and Applications, a paradigm to improve security on systems.
Ghaziabad, India, 2015, pp. 783–786, doi: In 2017 Internet Technologies and Applica-
10.1109/ICACEA.2015.7164809. tions (ITA) (pp. 64-68). IEEE.
[11] Imperva (n.d.). Honeypot. Retrieved March [22] Campbell, R. M., Padayachee, K., and Mas-
31, 2023, from https://www.imperva. ombuka, T. (2015, December). A survey of
com/learn/application-security/honeypot- honeypot research: Trends and opportuni-
honeynet/ ties. In 2015 10th international conference
[12] Mitchell, A. (2018). An intelligent honeypot. for internet technology and secured transac-
Cork Institute of Technology. tions (ICITST) (pp. 208-212). IEEE.
[13] Yaser Alosefer and Omer Rana, “Honey- [23] Spitzner, L. (2003, December). Honeypots:
ware: a web-based low interac- tion client Catching the insider threat. In 19th Annual
honeypot”, Third IEEE International Con- Computer Security Applications Conference,
ference on Software Testing, Verification, 2003. Proceedings. (pp. 170–179). IEEE.
and Validation Workshops (ICSTW), pp. [24] W. Fan, Z. Du, D. Fernández and V. A. Vil-
410–417, 2010. lagrá, “Enabling an Anatomic View to
[14] Labs, M. B. (2021, July 21). The life and Investigate Honeypot Systems: A Survey,”
death of the ZeuS Trojan. Retrieved March in IEEE Systems Journal, vol. 12, no. 4,
31, 2023, from https://www.malwarebytes pp. 3906–3919, Dec. 2018, doi: 10.1109/
.com/blog/news/2021/07/the-life-and- JSYST.2017.2762161.
death-of-the-zeus-trojan [25] S. Almotairi, A. Clark, G. Mohay and J.
[15] Vistorskyte, I (2021, June 1). What is a Zimmermann, “A Technique for Detecting
honeypot and how does it work? Oxylabs. New Attacks in Low-Interaction Honeypot
io. Retrieved March 31, 2023, from https:// Traffic,” 2009 Fourth International Confer-
oxylabs.io/blog/what-is-a-honeypot ence on Internet Monitoring and Protection,
[16] Microsoft (2023, January 23). What is a Venice/Mestre, Italy, 2009, pp. 7–13, doi:
honeypot attack? Microsoft — Office 365. 10.1109/ICIMP.2009.9.
Retrieved March 31, 2023, from https:// [26] Gopaldinne, S. R., Kaur, H., Kaur, P., and
www.microsoft.com/en-us/microsoft- Kaur, G. (2021, April). Overview of pdf mal-
365-life-hacks/privacy-and-safety/what-is-a- ware classifiers. In 2021 2nd International
honeypot-attack Wikipedia (2022, January Conference on Intelligent Engineering and
24). Client honeypot. Retrieved March 31, Management (ICIEM) (pp. 337–341). IEEE.
2023 [27] Jha, M., and Kaur, H. (2023, February).
[17] S. Kumar, R. Sehgal and J. S. Bhatia, “Hybrid Understanding The Terminology Used In
honeypot framework for malware collection Malware Analysis. In 2023 IEEE 3rd Inter-
and analysis,” 2012 IEEE 7th International national Conference on Technology, Engi-
Conference on Industrial and Informa- neering, Management for Societal impact
tion Systems (ICIIS), Chennai, India, 2012, using Marketing, Entrepreneurship and
pp.1–5,doi:10.1109/ICIInfS.2012.6304786. Talent (TEMSMET) (pp. 1–5). IEEE
31 A review on deep learning frameworks
for pose estimation during exercise for
rehabilitation
Banupriya N.1, Haris Dominic Savier1,a, Jeeva V.1,b, and Uma R.1,c
1
Department of CCE, Sri Eshwar College of Engineering, Coimbatore, India
Abstract: With the goal to create a safer and more effective training environment, our recommended strategy
encompasses a learning- based structure entails identifying flaws perpetrated by individuals during autonomous
physical rehabilitation and exercises and gives substitutes for restoration. Instead of relying on rigid, empirical
tenets our design learns from accumulated data, enabling it to customize itself to the needs of each user. This
is accomplished by interpreting the user’s posture sequence using a graph convolutional network architecture,
which enables an exhaustive understanding of the connections between the body joint trajectories. We proposed
a dataset with a trio of physical activity regimens to gauge the efficacy of our approach. The outcomes were
quite encouraging, with our system accurately detecting concerns 90% of the time and effectively prescribing
remedial actions for 93.9% of those issues. This demonstrates that our learning-based approach can offer sig-
nificant assistance for individual training, which is greatly enhancing the security and efficiency of unsupervised
training sessions.
Keywords: Adaptive measures, dataset, deep learning, graph convolutional network, joint skeletal model, physi-
cal exercise, Unsupervised Training
DOI: 10.1201/9781003606635-31
A review on deep learning frameworks for pose estimation during exercise for rehabilitation 241
of graph convolutional networks, which are the prediction of the location and orienta-
skilled at identifying connections between the tion of human joints in the context of pos-
joint trajectories of specific individuals. ture estimation using the input data. Our
The modeling of Skeletons of the human system made use of a deep network with
body as spatial and temporal graphs using two branches. One branch functioned as an
GCN has demonstrated exceptional promise action classifier, which oversaw determin-
for the skeleton-based action detection. ing the kind of mistakes users were making
However, the diagram-based depiction of when performing exercises. The system did
the skeleton in the GCN-based approaches this by comparing the user’s present stance
now in use makes it challenging to combine and movement trajectory to a sizable library
with other modalities, particularly in the of well carried out workouts. The technology
beginning. This might have an impact on their alerted users to potential problems when dis-
performance and scalability in action recog- parities appeared.
nition tasks. In addition, current approaches The purpose of the other branch was
seldom analyze position information along to suggest remedies. This branch used the
with skeletal data, which naturally offers knowledge included in the trained network
instructive and discriminative indications for to recommend an ideal trajectory and pose to
action detection. the user based on the faults that were found.
In this study, we developed pose-guided The capacity of GCNs to use both local
GCN (PG-GCN), a multimodal framework and global information in the graph is one of
for high-performance human action recogni- its main advantages. By applying the convo-
tion. A multi-stream network is specifically lution process to each node and its neighbors,
created, together with a dynamic attention they collect local information and model
module for early feature fusion, in order to global information by stacking numerous
study the robust characteristics from both layers, allowing information to spread across
the posture and skeletal data concurrently. the network. This meant that the model could
The fundamental concept of this module is comprehend how a movement in one joint
to merge features from the posture stream can impact the locations of other joints in the
and skeleton stream using a trainable graph, context of pose estimation.
AQ1:
Please
resulting in a network with stronger feature For the purpose of the training our deep
abbre- representation capabilities. The suggested network, we acquired a physical activity
viate PG-GCN can perform at the cutting edge dataset containing 3D postures and instruc-
“NTU”
in full on the NTU datasets, according to several tional label annotations. The network was
at first experiments. able to learn the proper approach to carry
mention.
out different exercises thanks to the data that
2. Methods
To devise a reliable posture estimate frame-
work for exercise and rehabilitation scenar-
ios, we tapped into deep learning techniques.
Utilizing the potent powers of GCNs, which
were created especially to take advantage of
spatial linkages and joint interdependence in
human skeletal systems, was required for this. AQ2:
Using neural networks with several layers Please
provide
(thus the term “deep”), deep learning, a sub- Figure 31.1. The general GCN diagram from the source
set of machine learning, aims to model and input data to the desired output. for all the
interpret complex patterns. This pertains to Source: figures.
served as the ground truth. We selected exer- challenging motion prediction tasks. An
cises such as squats, lunges, and planks, each inception module in the GCN was used to
performed by different subjects, thus ensur- obtain the input coefficients [11] which used
ing diverse data. a different methodology. Thus, circumventing
the use of DCT.
We created a motion correction branch
3. Review inside our system by drawing inspiration
Our research touches on a number of com- from these developments, especially the
puter vision-related fields. To anticipate method put out by Mao et al. [10]. We did
human movement, we first look for guidance not, however, adhere to the conventional
from GCN based frameworks. Second, we emphasis on predicting future movements.
identify user mistakes made while engaging Instead, our algorithm forecasts how work-
in physical activities, much like approaches outs will be done correctly. Our technology,
for action recognition. Finally, we explore the which makes use of a plethora of data on
area of physical exercise analysis, evaluating optimal exercise performance, gives users
form and suggesting improvements. To sum immediate corrective feedback to help them
up, our study combines motion prediction, modify their motions for a safer and more
action identification, and workout analysis productive workout. This transition from
tools. Our seamless integration of these many passive prediction to active guidance marks a
approaches results in a complete system that significant advancement in the use of GCNs
learns from data to precisely identify and to understand human motion, with far-reach-
repair mistakes in real-time, enhancing the ing implications for the fields of exercise and
user’s experience with physical activity and rehabilitation.
the rehabilitation.
3.2. Behaviour detection
3.1. Human movement forecasting Our focus in this context is action based on
Regarding the inherent ambiguity and unpre- skeletons recognition, the field of the image-
dictability involved in foreseeing future based action recognition has generated a sig-
motions, predicting human motion is a dif- nificant amount of research. This is because our
ficult undertaking. Many deep learning method analyzes 3D positions, necessitating a
Strategies have been put out in recent thorough understanding of skeletal motions
years to address this problem. Transform- and structures. RNNs were a mainstay of early
ers, GCN, recurrent neural networks (RNN), deep learning techniques activity identification
and variational auto encoders are just a few using skeletons to record the temporal relation-
of the designs that have been used in these ship in the sequence of skeletal motions.
techniques. Our focus, however, is largely on Other network topologies have been incor-
GCN-based techniques because of their capac- porated, though, and the area has advanced.
ity to make use of the graph- like structure of Convolutional neural networks were used,
human joint connections. This feature is com- for instance, by Li et al. [7] to extract features
pletely in line with how we model and forecast in a hierarchical fashion. The bigger move-
human movement during physical activity. ment patterns are captured by this technique,
Later improvements to this strategy which starts by recognizing then gradually
included including an attention and putting pulls more global geographical and temporal
the use of prediction of multi-person move- data from local point-level information.
ments using cross-subject attention [12, 13]. Tang et al. [15] creation of a reinforce-
These modifications demonstrated the adapt- ment learning system, which chooses the
ability and capability of GCNs to carry out most instructive frames from the skeletal data
A review on deep learning frameworks for pose estimation during exercise for rehabilitation 243
Abstract: The objective of this project is to ascertain the speed of a vehicle by utilizing data extracted from a
recorded video source. Traffic congestion is a prevalent problem in major cities across the globe. One poten-
tial approach for mitigating congestion levels is the use of improved traffic management techniques, which
may effectively regulate and control the number of vehicles present on roadways. The utilization of traffic
modeling enables the evaluation of the impacts of traffic management strategies before their actual applica-
tion on a specific route. Accurate monitoring of vehicle position and speed is essential for the proper calibra-
tion of traffic modeling parameters. The objective of this project is to provide a precise calibration procedure
utilizing recorded vehicle motion in a perspective view. The proposed methodology outlines the process of
camera calibration for the purpose of traffic simulation, with the objective of estimating the average speed
of vehicles. The software application is constructed utilizing the Python programming language and incor-
porates technologies like as openCV [1]. The generated video output provides a comprehensive examination
of the vehicle’s position track and average speed data. The experiment’s outcomes evaluate the precision of
vehicle position detection.
AQ1:
Keywords: Haar cascade, openCV, python, YOLO Please
check this
abbre-
viation
in the
1. Introduction 2. Literature survey keyword
section
The primary aim of our research is to ascer- This section provides an overview of the exist- as it has
not been
tain the velocities of vehicles by analyzing ing research conducted on question discovery men-
a pre-existing mp4 file including closed-cir- and the subsequent papers that will be pre- tioned
in the
cuit television footage. The necessary librar- sented within the context of the video recon- article.
ies are invoked in the code, followed by its naissance framework. The aforementioned
NOTE ADDED
division into distinct sections. These sections picture of difficulties encompasses several
encompass the tasks of capturing passing study subjects and a majority of the note-
cars using a camera, initiating the car detec- worthy research conducted in the field. This
tion process through a sliding window patch section exclusively focuses on the delegate
that systematically analyses each portion of video reconnaissance frameworks in order
the car as it traverses the captured frame, to enhance comprehension of the fundamen-
computing various coordinates for speed tal idea. This article delineates the procedure
and distance measurement, and ultimately for discerning an item displaying enthusiasm
determining the distance and speed of the from a selection of frames, encompassing its
passing car, which is then presented in the earliest manifestation up to its last framing.
output window [2] and to develop a sensor- The application discerns the categorization of
less speed camera [3]. an object and its corresponding representation
DOI: 10.1201/9781003606635-32
SwiftScan SpeedPro: OpenCV-powered vehicle speed monitoring 247
of the object in relation to its distance from axes. Multiple detections of the same face
the camera point. The identification of mov- may occur as a result of the presence of over-
ing objects, namely the region of interest, will lapping sub-windows that are susceptible to
involve considering the border in relation to variations in lighting conditions. The Voila-
the things within the frame. Despite potential Jones approach is associated with several lim-
improvements to the algorithm’s ability to itations; nonetheless, significant efforts have
handle diverse climatic conditions, it remains been dedicated to addressing one particular
incapable of effectively tracking moving issue [7].
objects as they alter their course.
The utilization of optical flow was initially
employed inside an alternative methodology
5. Proposed system
that was already established. In this context, The proposed technology utilizes a real-time
the computation of complex conjugate val- technique to estimate vehicle speed. Video
ues will be performed, and the creation of surveillance has been widely employed in
vectors will be carried out in relation to the urban areas and metropolitan regions for
object moment. The observation of conges- the purposes of traffic monitoring, investiga-
tion between different items can be facili- tion, and validation of traffic conditions. This
tated through the utilization of vectors. An strategy centers on providing an alternative
increased vector generation is indicative of methodology for ascertaining the velocity of
heightened levels of congestion. a vehicle. This study utilizes a stationary cam-
era situated on a highway to gather recorded
4.1. Disadvantages of the existing traffic footage.
The alignment of the camera has been
system established based on mathematical require-
The utilization of advanced equipment is ments, which have been substantiated
required for the implementation of the cur- through the use of appropriate references.
rent system methodology, hence resulting The further monitoring and visualization of
in an increased cost associated with this the car’s motion are achieved by employing
approach. Poor lighting conditions can poten- item tracking methodologies on the recorded
tially impair the outcome of tracking. The video footage acquired from the camera. This
phenomenon of information loss resulting article outlines the procedures employed to
from the process of visual projection. Images extract significant information from the video
exhibiting noise artifacts. The movement of a and subsequently incorporates the identified
multifaceted object. The inherent character- qualities into the condition for the purpose
istic of entities is their capacity for flexibility of calculating the speed. Hardware specific to
or articulation. The phenomenon of full and the proposed system technique is not needed.
partial object occlusion has been extensively The suggested approach is thought to suc-
studied [6]. cessfully give the traffic administration divi-
The Viola-Jones question identifier is a sions rapid and accurate traffic information.
highly efficient and extensively employed tool
for the detection and localization of ques-
tions inside visual data. The detector exhibits 6. Scope of the project
optimal performance when presented with The focus and implementation of the pro-
frontal images of human faces. The object ject involve the utilization of a method for
exhibits difficulty in maintaining structural estimating real-time vehicle speed. Video
integrity when subjected to a 45-degree rota- surveillance has been widely employed in
tion along both the vertical and horizontal urban areas and metropolitan regions for the
250 Innovations in Computational Intelligence: Trends and Technologies
comprising both positive and negative images. Now, we apply each element to all prep-
Subsequently, this technique is employed to aration photos. It sets thresholds for each
discern manifestations within diverse visual component to best reflect positive and nega-
representations. tive traits. Whatever the scenario, errors and
In order to construct the classifier, the misclassifications are inevitable. We select ele-
computational process necessitates a sub- ments with the lowest error rate to arrange
stantial quantity of positive instances automatic and manual photographs opti-
(depicting images of autos) as well as nega- mally. Now take a snapshot. Consider all 24
tive instances (consisting of photographs × 24 windows. Provide 6000 elements. Just in
lacking automobiles). At this juncture, it is case, check if it’s automatic [8].
imperative to focus on its salient features.
The utilization of Haar highlights extracted 8.2. Speed calculation
from the image depicted below is employed
for this purpose. The convolutional portion The Haar cascade’s CascadeClassifier method
in question exhibits numerous similari- detects a car. The time started at 0.
ties to our current model. Each individual To calculate the actual distance traveled by
element corresponds to a singular value the automobile, the ratio of cm traveled by
derived from the subtraction of the total the detected image to the real-time distance
number of pixels within the white rectangle in meters is used. Time stops when the car
from the total number of pixels inside the enters the detection window’s middle, whose
dark rectangle. distance we know.
Currently, a wide range of components are The velocity is estimated by dividing the
assessed by considering all dimensions and calculated distance by the calculated time.
areas of each feasible item. Consider the mag- The output screen displays the velocity
nitude of computational resources necessary and camera height above the vehicle (meas-
for a certain task. Indeed, the 24 × 24 frame ured in feet).
encompasses a total of about 160,000 indi- Many object identification methods have
vidual components. It is imperative to iden- been used, however the Haar cascade method
tify and locate all pixels that are concealed by is the most efficient and reliable, requiring
white and black rectangles in order to facili- minimal time. Additionally, the theory is easy
tate the computing process for each compo- to apply in real time.
nent. The required photos were provided in
order to address this matter. 8.3. Image detection
The locator would immediately stack the
classifier and determine that it was not empty.
In the unlikely event that it is, it then just 9. UML diagrams for proposed
departs with a mistake notice. The image in
modules
question is then layered, and another photo is
shot using the same procedure.
AQ4:
Please
send the
figure.
Figure 32.5. Saves vehicle data. Figure 32.7. Timing table.
Source: Source:
AUTHOR'S SELF GENERATED AUTHOR'S SELF GENERATED
SwiftScan SpeedPro: OpenCV-powered vehicle speed monitoring 253
the image. The classifier’s development The authors gratefully acknowledge the
and performance are better the greater the students, staff, and authority of the C.Tech
hit rate. Department of S.R.M. University for their
• No. of false detection: The number of spu- cooperation in the research.
rious objects discovered while comparing
feature sets with classifier-trained ones is
known as the false detection rate. For the References
classifier to function better, these should [1] Grents A, Varkentin V, and Goryaev N.
be the bare minimum. Determining vehicle speed based on video
• Stage number: The Haar classifier is at using convolutional neural network. In:
this stage. Here, we created a 20-step IEEE; 2020.
Haar classifier and measured the hit rate [2] Gunawan AAS, Tanjung DA, and Gunawan
and the number of erroneous detections FE. Detection of vehicle position and speed
at each stage. using camera calibration and image projec-
tion methods. In: IEEE; 2019.
[3] Javadi S, Dahl M, and Pettersson MI. Vehicle
11. Conclusion speed measurement model for video-based
Consequently, a Haar classifier consisting of systems. In: IEEE; 2019.
[4] Sravan MS, Natarajan S, Krishna ES, and
20 steps was successfully developed, exhib-
Kailath BJ. Fast and accurate on-road vehi-
iting a notable level of accuracy in identify- cle detection based on color intensity segre-
ing autos on roadways while minimizing the gation. In: IEEE; 2018.
occurrence of false detections. This outcome [5] Kumar T and Dharmendar. An efficient
serves as empirical evidence supporting the approach for detection and speed estimation
efficacy of the used technique. OpenCV was of moving vehicles. In: IEEE; 2016.
developed during a span of approximately [6] Smirg O, Smekal Z, Dutta MK, and Kakani
five days, utilizing the openCV framework. B. Automatic detection of the direction and
254 Innovations in Computational Intelligence: Trends and Technologies
speed of moving objects in the video. In: on Gaussian mixture model along with esti-
IEEE; 2019. mate moment velocity using optical flow. In:
[7] Wang JX. Research of vehicle speed detec- IEEE; 2021.
tion algorithm in video surveillance. In: [10] Iszaidy I, Alias A, Ngadiran R, Ahmad RB,
IEEE; 2020. Jais MI, and Shuhaizar D. Video size com-
[8] Pornpanomchai C and Kongkittisan K. Vehi- parison for embedded vehicle speed detec-
cle speed detection system. In: IEEE; 2017. tion travel time estimation system by using
[9] Alavianmehr MA, Zahmatkesh A, and Soda- Raspberry Pi. In: IEEE; 2018.
garan A. A new vehicle detect method based
33 Hawkeye-intelligent surveillance system
Raj Kalantria, Umang Thakurb, and Selvin Paul Peter J.c
Department of Computer Science and Engineering, SRMIST, Chennai, India
Abstract: This study introduces an intelligent surveillance system for real-time image captioning that uses power-
ful computer vision and natural language processing to describe surveillance photos. The method extracts high-
level features by encoding images with the residual network-101 pre-trained model in two steps. A long short-term
memory-based caption generation model employs these attributes and an attention mechanism that dynamically
focuses on important picture areas during text production. A beam search technique improves caption quality and
variety. The technique helps security experts and analysts understand surveillance photos better. By automating
visual data interpretation, providing descriptive textual annotations, and boosting surveillance situational aware-
ness, our technique improves picture captioning. Comprehensive assessments of varied picture datasets show that
our approach generates accurate, contextually appropriate, and fluent captions. Our intelligent surveillance system
empowers a variety of security and analysis tasks and provides a solid foundation for future research in intelligent
surveillance by bridging computer vision and natural language processing.
DOI: 10.1201/9781003606635-33
256 Innovations in Computational Intelligence: Trends and Technologies
In 2016, Xu et al. showed how intelligent and image captioning. Our proposal integrates
surveillance systems may improve situational and builds on these advances to create a new
awareness and security decision-making. surveillance real-time picture captioning system
Multimodal techniques, like Lu et al.’s 2017 that improves description quality and accuracy.
“Knowing when to look”, emphasize dynam-
ically moving attention between textual and 3. Objective
visual modalities to provide contextually suit-
able surveillance captions. Devlin et al.’s 2018 This project aims to create an intelligent
proposal to integrate pre-trained language surveillance system that seamlessly incorpo-
models like BERT has improved surveillance rates cutting-edge computer vision and natu-
language recognition and context-aware cap- ral language processing for real-time picture
tioning. Finally, benchmark datasets like “MS captioning. We want to achieve the follow-
COCO” (Lin et al., 2014) and “Flickr30k” ing goals using deep learning: secondly, to
(Young et al., 2014) have defined criteria for create an image encoding method that uses
training and assessing captioning models, the ResNet-101 pre-trained model to extract
allowing researchers to innovate and encour- high-level characteristics from surveillance
age healthy competition. Based on attention photos to improve the system’s visual data
processes, Xu et al. (2015) examined visual comprehension. Second, we want to add an
attention in picture captioning. They found attention mechanism to the captioning model
that attention mechanisms might dynami- to dynamically focus on important picture
cally focus on visual areas during caption regions for contextually correct and mean-
production, increasing context-aware caption ingful captions. Third, we want to use LSTM
generation. This adaptation to focus on key networks to provide fluent and consistent vis-
picture characteristics has improved caption ual content descriptions. Using beam search
accuracy and meaning, especially in surveil- during decoding, we hope to increase cap-
lance, where exact image interpretation is tion diversity and relevancy. Our ultimate
crucial. Wang et al. (2018) examined multi-
modal fusion strategies for textual and visual
data integration. Early and late fusion, when
textual and visual information is merged at
the input and output levels, were examined.
These insights into multimodal interactions
are crucial for caption creation, especially in
surveillance photographs where textual and AQ1:
visual information are crucial. Citations
for all fig-
GPT-2 and BERT have transformed natu- ures are
ral language processing. Raffel et al. (2019) NOTE ADDED missing in
the text,
showed how fine-tuning picture caption- please
ing algorithms benefit them. Their research provide
showed that fine-tuning pre-trained language the
appro-
models improves caption quality. Advanced priate
surveillance image captioning systems may citations.
benefit from deep language comprehension AQ2:
models. Please
provide
These texts support our study by revealing source
the underlying components and methods that Figure 33.1. System flow. for all
have developed intelligent surveillance systems Source: figures.
AUTHOR'S SELF GENERATED
Hawkeye-intelligent surveillance system 257
addressing the repetitiveness of conventional monitoring. Our research aims to address the
systems. These benefits provide an advanced current limitations of conventional surveil-
and efficient surveillance tool that helps secu- lance systems by introducing advanced fea-
rity professionals and analysts analyze and tures, such as automated image understanding
respond to visual data, increasing security and descriptive caption generation. The pro-
and decision-making in numerous sectors. ject will involve the design and integration of
a deep learning-based image encoding system
utilizing the ResNet-101 model, which will
6. Scope of the project
enable the extraction of high-level image fea-
The scope of this project encompasses the tures. Moreover, we will implement attention
development and implementation of an intel- mechanisms within the caption generation
ligent surveillance system that combines process, allowing the system to dynamically
state-of-the-art computer vision and natural focus on relevant regions of the image to gen-
language processing techniques to perform erate contextually accurate and descriptive
real-time image captioning. The project pri- captions.
marily focuses on enhancing the efficiency,
accuracy, and usability of surveillance systems
across a wide range of applications, includ- 7. Architecture
ing security, law enforcement, and industrial
9. UML diagrams for proposed per picture. Different datasets showed the
system’s flexibility and accuracy in various
modules
settings. Ethical compliance, user feedback,
and security application robustness support
the system’s real-world implementation.
10. Results
The intelligent surveillance system with pic-
ture captioning, ResNet-101 encoding, an
attention mechanism, and LSTM with beam
search decoding performed well. Compre-
hensive metrics verified image captioning
correctness, with an average BLEU score of
0.85, METEOR of 0.79, ROUGE of 0.76, Figure 33.12. Comparison with other captioning
and CIDEr of 0.92. The average real-time models.
processing response time was 0.23 seconds Source:
AUTHOR'S SELF GENERATED
262 Innovations in Computational Intelligence: Trends and Technologies
Abstract: Companies like Amazon, Flipkart, Meesho, and others have grown to be social giants since the
advent of e-commerce. Online shopping and selling of items have become a fundamental aspect of daily living.
The upkeep of a large number of evaluations using text and photographs becomes too difficult. Customers will
research ratings and reviews posted by other customers before making a purchase. Sentimental analysis is a type
of market research where customers are concerned with the quality of the goods. This gives a knowledge on
which investigates how to analyze the reviews of the products. The words in those reviews, which might result
in any one of the connotations can be defined. The distribution of opinions across product categories as well as
the phrases used most frequently in the given data and evaluations are then presented.
[email protected]; [email protected]
d
DOI: 10.1201/9781003606635-34
264 Innovations in Computational Intelligence: Trends and Technologies
3.2.3. Lack of context and product name. Then From those data, we
can look into the polarity of the reviews.
Sentiment analysis may fail to consider the
The above Figure 34.3 shows the top 20
context of a piece of text, resulting in senti-
brand reviews of the dataset.
ment misinterpretation. A negative evaluation
of a product, for example, may be directed at
the seller or the delivery method rather than
the product itself.
4. Approach
This section offers an overview of the way
the idea works for Amazon product reviews.
As we saw in the introduction, the initial step
of work involves data collection, and the
approach is repeated until the model is evalu- Figure 34.3. Visualization of dataset.
ated. The below flow diagram gives informa- Source:
AUTHOR'S SELF GENERATED
tion about how the implementation flow of
dataset can be done. 4.2. Data preprocessing
To make feature extraction easier in the sub-
4.1. Data collection sequent stage, text preprocessing has been
The data set we have selected is the Amazon used to transform raw feedback into cleaned
electronic gadgets data set. It consists of vari- reviews. Using Beautiful Soup, removing
ous categories of electronic devices and vari- HTML elements and other non-characters
ous brands which consist of approximately like numerals and symbols decreases the case
4,000,000 reviews which are from vari- remove, ending words are removed and we
ous mobile brands such as Samsung, Apple, can even stem words to their origin word
Nokia, Motorola electronic devices, price, respectively. Initially, a prerequisite for every
performance, including opinion mining, data
preparation is necessary.
5.5. Evaluation metrics The above Figure 34.5 shows how the
accuracy matrix varies among the other mod-
Evaluation metrics are critical in determin-
els respectively.
ing the performance of predictive models.
They provide a formal method for evaluat-
ing how well a model works by comparing 5.7. Precision
its predictions to the actual outcomes. These Precision is an important assessment parame-
measures enable data specialists to under- ter for determining the quality of a classifica-
stand a model’s strengths and limitations, tion model, especially in binary classification
permitting them to adapt it or examine alter- problems. It assesses the model’s ability to
nate solutions. predict positive outcomes accurately while
avoiding false positives.
Classification model Accuracy
5.8. Recall
Multinomial Naive Bayes 0.854
Recall is a critical assessment statistic used
Logistic Regression 0.884
in classification and information retrieval to
Linear Support Vector 0.891 assess a model’s capacity to identify all rel-
Machine evant instances or documents from a given
Decision Tree 0.926 dataset. It measures the model’s ability to
Figure 34.5. Tabulation of model.
capture all positive cases, regardless of the
existence of false positives.
Source:
AUTHOR'S SELF GENERATED
5.9. F1-Score
5.6. Accuracy F1-Score is a machine-learning assessment sta-
It is the most often used statistic for evaluat- tistic that combines accuracy and recall into a
ing the outcomes of a model for classification. single measure. It is especially useful when deal-
Accuracy evaluates the ability of the model to ing with unbalanced datasets or when both
make right predictions by calculating the pro- false positives and false negatives are an issue.
portion of effectively organized values, which Figure 34.6 shows the graph for the vis-
is especially important in scenarios involving ualization of the F1-score for the predicted
text, words, and similar examples. model.
Abstract: A significant source of income for any developing nation is agriculture. It is the main source of income
in India’s rural areas. However, the yield rate of crops is undesirable in India. Some challenges faced by farmers
are, dealing with uncertain climate, shortage of important minerals in soil due to soil erosion, and cultivating
without crop rotation. This paper proposes a crop recommender and crop yield prediction system for farmers
using machine learning algorithms. It is necessary to collect and preprocess a large amount of data, includ-
ing soil characteristics, weather patterns, historical crop yields, and specific crop requirements. Then using
this data, machine learning models are trained to forecast which crop would be best under particular factors.
Farmers input their local conditions using the system’s interface, and they will quickly obtain personalized crop
AQ1:
suggestions. Here we used the ensemble technique to obtain better results. The base learners are SVM, KNN, Please
random forest, decision tree classifier, and Naïve Bayes. These learners are ensembled by using the voting clas- provide
sifier technique and the best is selected for obtaining the result. the
expan-
Keywords: Agriculture, challenges, crop recommender, machine learning algorithms, yield rate sion for
SVM and
KNN.
a
[email protected]; [email protected]; [email protected]; dgadipudisaisindhu@
gmail.com; [email protected]
DOI: 10.1201/9781003606635-35
272 Innovations in Computational Intelligence: Trends and Technologies
regression techniques are used to predict the demand. Below are some of the paper’s
continuous values. main contributions
The architecture of the proposed system:
Firstly, we collected the data that is required 1. The model makes a prediction about the
to train the model. Datasets include soil crop production for a particular crop
pH value, temperature, humidity, nitrogen, based on the demand.
phosphorous, and potassium, as well as crop 2. A user-friendly website that recommends
labeling and rainfall. States, districts, names the most profitable crop.
of crops, seasons, and areas are all included 3. An integrated crop yield forecasting
in the crop production dataset together system.
with the recommendation dataset. After
that, we applied preprocessing to clean the
data we collected. The data preprocessing is 2. Literature survey
a technique to clean the data without any In the research [1] the Naïve Bayes, random
null values, noisy data, or any other incon- forest, and logistic regression algorithms
sistencies. The best relevant features are were employed by the authors to forecast
obtained by feature selection. After that, the the optimal crop. They talked about a range
dataset is divided into testing and training of features that mostly depend on the avail-
sets. The next step is to we train our model ability of data, and each researcher used ML AQ2:
Please
based on the ensemble method voting clas- algorithms that differed from the features to provide
sifier. Multiple algorithms are trained based examine CYP. Ten agricultural datasets were the
expansion
on given data and then the algorithm with used, and the predictive performance of ML
NOTE ADDED
of ML.
high accuracy is given the output. To find and linear regression approaches was com-
out how the model performs on new data, it pared for crop yield prediction. AQ3:
must be tested using testing data once it has In the paper [2], they used a supervised Please
provide
been trained. This step calculates the perfor- machine-learning approach. They used mul- the
mance of each model. After that, the best- tiple machine learning models and NOTEmadeADDED
expansion
of CYP.
performing model output is predicted. The various evaluation processes to find the best
model makes a prediction about the crop algorithm. As a result of the evaluation, they
production for a particular crop based on used a decision tree classifier for crop rec-
ommendation and a random forest regres-
sor for yield prediction as they gave the best
accuracies.
In the paper [3], they compare the agricul-
tural yield prediction predictive accuracy of
machine learning systems. There have been
numerous analyses conducted to determine
the most accurate machine-learning strategy
for yield prediction. Utilizing an Associa-
tion rule mining approach, they combined
elements of the genetic and eclat algorithms
into the suggested plan. The basic concept is
to generate rules using eclat approaches for
association rule mining and then improve
those rules further using genetic algorithms.
Figure 35.1. Architecture. In research [4], they examine and contrast
Source: many data mining approaches for decision
AUTHOR'S SELF GENERATED
Crop recommender system using machine learning approach 273
support systems. The objective is to create IoT and ML technologies [10] are inte-
a decision support system that will forecast grated into India’s projected agricultural
agricultural yield based on historical data. system to handle crop production-related
This compares different machine learning challenges. The system uses sensors to assess
approaches for data mining on smaller data- pH, moisture content, temperature, and NPK AQ5:
sets and finds the methods with the highest nutrients in the soil. These sensors gather data, Please
expand
accuracy. which is then saved on a microcontroller for NPK.
According to the research [5], farmers’ analysis. Machine learning methods, notably
inability to select the best crop for their soil the random forest algorithm, are used for this
has an impact on productivity. This issue can purpose. Understanding the state of the soil
be resolved with precision farming. An agri- through analysis enables optimal use of fer-
cultural crop, a soil database gathered from tilizers while lowering the likelihood of soil
the field, and the collection of features like degradation. Convolutional neural networks
soil through soil testing are what define this are also used in the research to detect plant
approach. ANN and SVM are used as learn- diseases early and improve crop health in
ers to suggest a crop based on a parameter. general. By providing data-driven suggestions
In this study [6], many recommendations for appropriate crop growth based on cur-
have been made in the past to increase crop rent soil knowledge, the system seeks to help
prediction accuracy, which discusses the sig- farmers.
nificance of crop prediction. This study used
feed forward-back propagation, an ANN
methodology to estimate and anticipate vari- 3. Proposed model
ous crop yields in rural areas depending on A model that tackles these problems has been
soil variables. suggested by the system in the proposed sys-
As stated in the study [7], crop prediction tem. The innovative aspect of the suggested
is done using machine learning in this case. approach is that it offers guidance to farm-
Through a range of methods, including sta- ers on how to optimize crop yields while also
tistical modeling, data analysis, and pattern recommending the most suited crop for given
identification, they forecast crop yields, dis- factors. In order to maximize crop output, the
ease outbreaks, and ideal harvesting periods. proposed model offers crop selection based AQ4:
According to the study [8], In order to on environmental conditions and past data. Please
provide
meet the ideal climate requirements for There are crop yield recommendation sys- the
wheat, such as the ideal temperature range, tems that are either hardware-based which expansion
of ANN.
this focuses on agricultural data analysis and makes it expensive to maintain or difficult
identifies optimal parameters for increasing to use. The suggested solution proposes a AQ5:
crop output using data mining techniques mobile website that accurately determines Please
elabo-
such as CLARA, PAM, DBSCAN, multiple which crop will be most profitable. rate on
linear regression. Rather than depending only on one model, CLARA,
PAM,
The authors of the study [9] developed ensemble techniques incorporate multiple DBSCAN.
a supervised smart agriculture framework models in an attempt to increase the model’s
based on deep reinforcement learning algo- accuracy. More prediction and efficiency can
rithms. To improve crop production fore- be attained by this than by any of its mod-
cast accuracy, the most productive iterations els working alone. We employ the most well-
are run with a deep Q-learning-based DRL known ensemble method in our system, known
algorithm. Crop yield forecasting is handled as the majority voting method. In the voting
in this paper as a regression problem that is process, any number of base learners may be
managed via supervised learning. used. It’s necessary to have two basic learners
274 Innovations in Computational Intelligence: Trends and Technologies
Data preprocessing: This method of clean- random forest yields an accuracy of 91.99%,
ing the data is called data preprocessing. Using the K-nearest neighbor algorithm and
Cleaning a dataset refers to preparing it so the ensemble technique, we have achieved a
that it is free of null values and other errors. 94% accuracy rate in the suggested model.
Feature selection: The process of choos- Figure 35.1 represents a graph that com-
ing the features needed to train the model is pares the accuracy of random forest and
known as feature selection. KNN algorithms. Figures 35.2 and 35.3 rep-
Splitting the dataset: The dataset will be resents a visual representation of how data
divided into training and testing subsets. The is distributed. Figure 35.5 represents the heat
training set will be used to train the model, map of the dataset to illustrate how impor-
and the testing set will be used to evaluate it. tant certain features are to a model.
Model selection: This procedure will select
the model. Our primary methods for predict-
ing agricultural yield are random forest and
KNN.
Model training: Next, the preprocessed
dataset will be used to train the selected ML
model.
Model evaluation: Ultimately, the model is
assessed based on factors including f1 score,
accuracy, and precision.
Prediction: By comparing the aforemen-
tioned parameters, the optimal model is
anticipated.
Dataset: We have utilized the “crop rec-
ommendation dataset” available on the
Kaggle website. It seeks to offer insight-
ful information about historical data that
can be useful in using machine learning to
identify connected trends in order for us to Figure 35.3. Accuracy comparison.
forecast the crop. The information includes Source:
rainfall, humidity, temperature, pH value
and the N/P/K ratios representing the nitro-
gen, phosphorous, and potassium contents
of the soil. This dataset can be used to ana-
lyze variables like temperature, humidity,
and soil type in order to create an intelligent
crop recommendation system.
4. Results
AQ7:
The suggested model predicts the best-suited Please
crop for the provided details using an ensem- provide
cita-
ble technique for voting classifiers. KNN, tion for
Random Forest, SVM, Naïve Bayes and deci- Figures
35.4 and
sion tree classifiers are base learners that are 35.6.
employed. Different learners have been assem- Figure 35.4. Dataset distribution (area).
bled using the current models. Given that the Source:
Acknowledgment
We, the authors sincerely thank the computer
science and engineering department’s author-
ities and staff for their assistance in the study.
Figure 35.5. Dataset distribution (Production).
Source: AUTHOR'S SELF GENERATED
References
[1] Khan PA, Hussain MS, Ali MM, and Khan
MZ. Crop yield prediction using machine
learning algorithms. 2022.
[2] Sundari V, Anusree M, Swetha U, and Lak-
shmi DR. Crop recommendation and yield
prediction using machine learning algo-
rithms. 2022.
[3] Sapike NS and Sambare SS. Crop yield pre-
diction using machine learning algorithm.
2020.
[4] Lata K and Chaudhari B. Crop yield pre-
diction using data mining techniques and
machine learning models for decision sup-
port system. 2019.
[5] Rajak RK, Pawar A, Pendke M, and Devare
Figure 35.6. Heat map of the dataset. A. Crop recommendation system to maxi-
Source: AUTHOR'S SELF GENERATED
mize crop yield using machine learning tech-
nique. 2017.
[6] Dahikar S and Rode SV. Agricultural crop
5. Conclusion yield prediction using artificial neural net-
Farmers input their local conditions using work approach. 2014.
the system’s interface, and they will quickly [7] Phadnis A, Panchal S, Jadhav R, Rajdeep B,
obtain personalized crop suggestions. Here, and Patil D. Prediction of crop using SVM
we improved the outcome by using the ensem- algorithm. 2023.
ble technique. The SVM, KNN, Random For- [8] Majumdar J, Naraseeyappa S, and Ankalaki
S. Analysis of agriculture data using data
est, decision tree classifier, and Naïve Bayes
mining techniques. 2017.
are the base learners. Using the voting clas- [9] Elavarasan D and Durairaj PM. Crop yield
sifier technique, these learners are combined, prediction using deep reinforcement learn-
and the top learner is chosen to receive the ing model for sustainable agrarian applica-
outcome. When there is more competition, tions. 2020.
there is a greater chance of a better predic- [10] Gosai D, Raval C, Nayak R, Jayswal H, and
tion. But, when one or a small group of mem- Patel A. Crop recommendation system using
bers makes a mistake, it’s likely that the other machine learning. 2021.
36 Cloud malware detection using heuristic
techniques
Lakshmi Triveni D.a, Alapati Nareshb, Sree Harshitha A.c,
Koteswari. K.d, and Bhavana Lakshmi P.e
Computer Science and Engineering, Vignan’s Nirula Institute of Technology and Science for Women,
Guntur, India
Abstract: Cloud is a model of computing various services such as storing data, and performing specific opera-
tions. Security is a major factor in the cloud. The information on the cloud can be easily destroyed by malicious
attacks. Cloud malware detection can be used to detect the various malicious files present in the cloud. In this
paper, our methodology centers on disassembling binary executables into opcode sequences and subsequently
transforming these opcodes into image representations. We employ convolutional neural networks to perform
a comparative analysis between the opcode images generated from the binary executable under examination
and those produced from established malware sample codes. The primary objective is to ascertain whether the
target binary executable contains malicious code, thus enabling effective malware detection. Our evaluation
primarily centers on the critical metric of accuracy. convolutional neural networks+, consistently deliver impres-
sive accuracy rates ranging from 93% to 97%. This underscores the superior performance and effectiveness of
our approach in comparison to existing alternatives.
Keywords: Cloud malware, convolution, heuristic technique, opcode sequences, network, neural
[email protected]; [email protected]
d
DOI: 10.1201/9781003606635-36
278 Innovations in Computational Intelligence: Trends and Technologies
landscape of cloud computing. By relying on cloud servers, it offers malware scanning and
heuristic methods, cloud providers and organi- detection.
zations equip themselves to effectively identify In [9], illustrates excellent identifying and
and counter malware threats. preventing malware results. This seeks to eval-
uate the usefulness of the following processes:
obtaining documents, altering DNA sequences,
2. Literature survey building databases, and identifying software.
In [1], demonstrates excellent malware In [10], excellent malware detection and
detection and prevention results. This study prevention results. The methods for malware
presents the temporal cloud data malware detection in networks that have been sug-
reduction algorithm. This algorithm offers an gested in this paper include client software,
accuracy of 92%. network services, detection engines, and
In [2], utilizes a unique 3D convolutional forensics achieve services.
neural network (CNN) that significantly
reduces mislabeled samples during train-
ing and data collection. The accuracy of 2D 3. Existing system
CNN is increased from 79% to 90% with the Already, many existing systems used differ-
use of 3D CNN. ent algorithms and techniques for detecting
In [3], presented a cutting-edge malware malware in the cloud some of the existing
and rootkit detection system that foresees systems had disadvantages which led to less
the visitors’ vulnerability to various attacks. accuracy. Certain algorithms, such as tempo-
It integrates virtual machine (VM) support ral cloud data malware reduction, have been
with system call hashing and monitoring on suggested as a means of preventing and iden-
the guest kernel. tifying malware.
In [4], suggested an awareness of the pop-
ularity of malware detection techniques to
safeguard high-risk data, thereby enhancing 4. Proposed system
cloud storage system security. That forecasts Heuristic technologies are introduced to remove
data popularity based on a well-established the drawbacks of traditional methodologies
suggestion list, resulting in optimal perfor- like signature-based and behavior-based mod-
mance for malware detection. els in malware detection in the cloud.
In [5], justifies excellent malware detection The proposed system consists of a heuris-
AQ1:
Please and prevention results with RGB, this algo- tic technique [13] which is called an opcode.
expand rithm prevents malware detection with an There are various Heuristic methods includ-
RGB.
accuracy of 99.39%. ing Opcode, N-grams, API calls, control flow
In [6], demonstrates excellent malware graphs, and hybrid features. Here we choose
detection and prevention results. This paper opcode because it can remove the problem of
presents a technology that uses cloud-based resource utilization and overfitting problem
web application signature analysis to identify from already existing models.
unknown malicious code, thereby securely Opcode–based detection is a technique
protecting web applications. used in cloud-based malware detection to
In [7], it verifies excellent malware detec- identify and classify potentially malicious
tion and prevention results. The intermediate software based on the sequences of opcodes
monitoring servers that are used to find mal- or machine-level instructions in a program or
ware in file transfers were used in this paper. binary.
In [8], shows good results for preventing The paper describes the usage of opcode
and detecting malware. This method offers sequences using the CNN algorithm to
high security because prior to transmission to determine the malicious files that are stored
Cloud malware detection using heuristic techniques 279
on cloud servers. Considering that the data to tackle the problem of malware detection
on the cloud is kept as binary files, these more efficiently leveraging the power of vis-
binary executables are converted into opcode ual data representation to enhance accuracy
sequences using the opcode algorithm. Later and performance.
the opcode sequences become images after Step 1: Let X be the considerably smaller
conversion. The pictures created from the training data set, X= x1x2, where the benign
opcode sequences should have a definite for- data set is indicated by x2 and the malware
mat rather than having different sizes and data set by x1.
shapes so that it can be easy for the classifica- Step 2: Should yj be a benign binary, then
tion process. Each image formed should have yj is a part of x2. Let yj represent a binary pair.
a pixel-value or point which should be the In the event that yj is a malware binary, x1 is
multiplicated value of information gain and where yj belongs.
probability of the opcode sequences both the Step 3: opm represents the operation codes
malware binaries themselves and their vari- (opcodes) that are decompiled from binaries.
ants are pertinent in terms of probabilities Step 4: For sequences of length two, the
and information gain of opcode sequences. operation code (opcode) is represented as
The image’s pixel matrixes are created using osk = <opi,opj>
the probabilities and information gains. We
use the CNN technique along with the opcode Step 5: Let freq (osk|yj) be the frequency of
sequences so that it can improve the difference osk in yj.
between malware images and benign images. Step 6: Let p(osk|yj) be the probability
This dual approach not only strengthens but function of osk in yj, according to freq(osk|yj).
also improves the overall security and effi- Step 7: Let w(osk) represent osk informa-
ciency of malware detection systems. tion gain function.
Step 8: The image matrix im(yj) is pro-
duced from, yj based on p(osk|yj) and w(osk).
4.1. Viability Step 9: Using image feature enhancement,
Prior to the studies that highlighted the signif- imenhance(yj) let represent an enhanced image.
icance of information gains and probability To determine a type of malware, we rely on
related to opcodes in original malware bina- a comparison of an enhanced malware vari-
ries and their variants. We utilize these met- ant image, denoted as “imenhance(yj),” with exist-
rics to reconstruct pixel matrices representing ing enhanced malware images in the training
binary files. CNN, designed with an architec- dataset. If we found a similarity between this
ture inspired by the human visual system, has image and any of the previously encountered
recently exhibited impressive results in image enhanced malware images, high similarity
recognition tasks. Hence, we employ CNNs indicates the presence of a malware variant.
for the recognition of relevant malware vari-
ant images.
4.3. Architecture overview
The proposed methodology consists of a
4.2. Algorithm total of three operations to detect the mal-
Our focus lies in the challenge of detecting ware present in the cloud. The first opera-
malware variants, even while working with tion is to unpack, decompile, and create the
small training datasets. To overcome this opcode sequences. The second operation is
limitation, we employ advanced image pro- to construct the Binary image of the opcode
cessing techniques to transform binary data sequence [12] and work on its enhancement.
into standard image formats that are used as Finally, the last step is to recognize the mal-
inputs for analysis. This approach allows us ware variant images.
280 Innovations in Computational Intelligence: Trends and Technologies
4.4.2. Decompiling
After unpacking the binary data present in
binary files by using the unpacking tech-
niques we use decompiling to obtain the AQ3:
Please
opcode sequences to the corresponding Figure 36.2. Opcode sequence instructions. provide
binary data. Then we construct the corre- Source: source
AUTHOR'S SELF GENERATED
sponding opcode profiles for all the availa- for all the
figures.
ble binary data. Every binary profile is made
up of an opcode sequence list with a length 4.5. Reconstructing the binary image
of two for each sequence, along with third and enhancing
frequencies. In this segment, our approach focuses on
reconstructing the binary data and trans-
4.4.3. Opcode sequences forming that data into conventional images,
serving as the primary input.
Malware binaries can be represented by using
the opcode sequences. We have constructed
the malware binary’s opcode profile, with 4.5.1. Reconstructing binary image
each profile having a length of two and their These binary image matrices undergo a recon-
corresponding frequencies. So, the 2-tuple struction process through the utilization of
opcode sequences are chosen. We do not use opcode sequences, accompanied by associated
the length more than 2 because it is difficult probabilities and information gains. As illus-
for machine learning models to extract the trated in the figure the image matrix is presented
features. and each opcode sequence, consisting of two
Figure 36.1 demonstrates the creation elements, is mapped to specific elements within
of opcode sequences. Since the binary files the matrix based on Step 3 (osk = <opi,opj>).
are stored in the cloud, they are unpacked According to steps 1, 2, 5, 6, 7, and 8 as
into several files, which are decompiled into indicated in equation (1), the element value
opcode sequences. In Figure 36.2, the process val(osk|yj) of the image matrix i(yj)is deter-
of developing and compiling software that mined by probabilities p(osk|yj) and the infor-
produces opcode sequence instructions in the mation gains w(osk) of osk in the binary yj.
cloud is shown. After the binary executable is
produced, the opcodes are run on VMs. val(osk|yj) = p(osk|yj) w(osk)(1)
Cloud malware detection using heuristic techniques 281
Figure 36.4. Bar graph representing opcode versus normalized frequency in benign and malware.
Source:
AUTHOR'S SELF GENERATED
282 Innovations in Computational Intelligence: Trends and Technologies
greatly facilitates the recognition and classifi- refined features derived from the previous
cation of binary images. layers of our neural network.
(7)
4.6. Recognition of malware variant
In pursuit of our classification target, the
image
CNN undergoes a training process where
We try to recognize the malware vari- it learns from the input photos and modi-
ant image after the reconstruction of the fies each level’s weight factor by a back-
binary images which are more enhanced. propagation mechanism. In this equation (8)
In the process of recognizing the variant where “v” are the original outputs. The core
images CNNs and the SoftMax classifier objective remains consistent: to train the net-
are employed. work to make accurate predictions by fine-
Our CNN model features a three-level tuning the model’s parameters based on the
architecture, where the both first and second observed discrepancies during the process.
levels comprise convolution and pooling lay-
ers. The third level, however, is a fully con- (8)
nected layer, where a SoftMax classifier is
employed to categorize images into either Designated w3 as the weight factors link-
malware variants or benign cases. ing level 3 to the output layer, we can refer
For every image, denoted as img(yj), our to equations (9) and (10) to comprehend the
input features are derived from the pixel relationship. The difference between the out-
values within the image matrix. To be more put level and level 3 is represented by equa-
specific, we process these images through tion e(3)
output
, x(3) denotes the calculated value at
level 1, generating output maps using equa- level 3, S stands for the step length that was
tions. In these equations, Val(yj) represents used in the optimization process, and x is the
the pixel value of the image at the position. genuine value at the output level. The funda-
yj Conv(y) signifies the convolution function, mental purpose here remains unaltered: to
and Pool(y) denotes the mean pooling func- determine the optimal weight factors w3 that
tion. The results of this operation, mapj(1)(yj), facilitate the mapping between level 3 and the
become the input for level 2, as we continue final output layer.
to refine our feature representation. Addition-
ally, the constant value “k” is factored into (9)
these computations.
(10)
(5)
Defining e(3) as the variance associated
(6) with level 3, as per equation (11), we can fur-
ther explore this variance to derive e(2), which
The output at level 2, represented as pertains to the variance at level 2. This pro-
mapj(2)(yj), is obtained following equations gression in variance computations is pivotal
provided in equation (7). This output now for our neural network’s understanding of
serves as the input for level 3. This full con- the data. Furthermore, we introduce w2 as
nection level employs this method to map the weight factor responsible for connections
the features from mapj(2)(yj) to one of the tar- between level 1 and level 2, in line with the
get classes. which could either be malware framework laid out in equation (l). The core
or benign. Our ultimate objective remains objective remains consistent: we are refining
unchanged: to classify the input images the variance representations and weight fac-
into these distinct categories by utilizing the tors in our network to enhance its ability to
Cloud malware detection using heuristic techniques 283
capture and process information effectively approach which uses CNN achieves 93% to
as it traverses through different levels of the 97% accuracy.
model. CNN’s accuracy is contrasted with that of
other approaches, including KNN and NB, in
(11) Figure 36.5, where CNN’s accuracy is plot-
ted against pixel value, indicating its superior
(l2) accuracy over the others.
Utilizing inversion convolution and the
expansion of e(2), we arrive at e(1), which sig- 6. Conclusion
nifies the variance pertaining to level 1. Addi- This paper presents our methodology for
tionally, we introduce w1 as the weight factor breaking down binary executables into
responsible for the connections linking the opcode sequences and subsequently convert-
input level to level 1, following the principles ing these opcodes into image representations.
laid out in equation (13). We leverage the power of CNN to discern
the maliciousness of a binary executable. It is
(13)
designed to overcome the limitations.
5. Results References
In this paper, we used to unpack, decompile, [1] Muthurajkumar S, Vijayalakshmi M, Gana- AQ4:
and create the opcode sequences from the pathy S, and Kannan A. Agent-based intel- Please
data present in the cloud. Next, construct ligent approach for malware detection for provide
the
the binary image of the opcode sequence and infected cloud data storage files. In: Proceed- missing
work on its enhancement. Finally, the last step ings of the Seventh International Conference reference
is to recognize the malware variant images. on Advanced Computing (ICoAC); 2015. details
(i.e., arti-
[2] Abdelsalam M, RamKrishnan, Sandhu R, cle title,
and Huang Y. Malware detection in cloud journal
5.1. Accuracy and time cost infrastructures using convolutional neural title,
volume,
To verify that our method has been opti- networks. In: Proceedings of the IEEE 11th issue no.,
mized, we have put in place our novel method International Conference on Cloud Com- and page
AQ3:
(3-step operations) and compared it against puting; 2018. range).
Please [3] Win TY, Tianfield H, and Mair Q. Detection Please
proide the well-established approaches, which include check and
of malware and kernel-level rootkits in cloud
expan- KNN, and Naive Bayes’(NB). Our evaluation adhere to
sion for computing environments. In: Proceedings of this style
KNN. primarily revolves around assessing accu- the IEEE 2nd International Conference on guide.
racy. By comparing with old approaches, our Cyber Security and Cloud Computing; 2015.
[4] Cao T, Mao J, Bhattacharya T, and Peng X.
Data security and malware detection in cloud
storage services. Under Grants IIS-1618669,
OAC-1642133, and CCF-0845257.
[5] Luxin Z and Zhang J. A new malware detec-
tion method based on VMCAD in cloud
environments. Article ID 4208066, 13 pages;
2022.
[6] Kim KH, Lee DI, and Shin YT. Research on
cloud-based web application malware detec-
tion methods. In: Park JJ, ed. Advances in
Figure 36.5. Accuracy of CNN vs KNN, NB. Computer Science and Ubiquitous Comput-
Source: AUTHOR'S SELF GENERATED ing, Lecture Notes in Electrical Engineering
284 Innovations in Computational Intelligence: Trends and Technologies
Abstract: As the internet of things technology continues to expand the concept of home security systems has
become more advanced providing users with enhanced control and safety features. In this paper, we intend
an approach, to home protection that integrates motion discovery holder permission and a captcha-located
approach control plan. Once detected a notification is sent to the homeowner’s smartphone or device. The
homeowner can then view the camera feed. Decide whether to permit or deny access. If access is granted a
captcha challenge is presented to the person outside the home on a screen. They must complete the captcha to
gain entry. When they have completed it will the door open, ensuring that authorized individuals are granted
access while maintaining a high level of security and deterring potential intruders. This innovative smart home
security system utilizes technology to create an effortless and secure method for controlling access, to one’s
residence. It provides peace of mind for homeowners by enhancing security levels.
Keywords: Internet of things, captcha-based access control, phone, motion detection, notification, high-level
security, homeowners
without the need for human intervention. Processors that were so inexpensive and Please
provide
One of the basic IoT bundle searches is power-efficient that they could be practically the
to connect RFID tags to wealthy pieces of thrown away were needed before connect- expan-
sion for
blueprint to assist pleasant sounds and har- ing billions of devices became economically M2M.
monize their charge. However, the advantage feasible. RFID tags are low-power, wire-
of adjacent sensors and a cyberspace connec- lessly interacting semiconductors, helping to
tion to parts has resumed to disapprove, and overcome some of these problems, as did the
technicians trust that this everyday potential increased availability of wireless and cellular
[email protected]; [email protected]
d
DOI: 10.1201/9781003606635-37
286 Innovations in Computational Intelligence: Trends and Technologies
smart home internet of things” [2020]. They different parts, including motion sensors and
create a novel IoT system design for smart humans. Based on user authentication, it is
homes that combines public and private remotely operated.
blockchain technologies to allay users’ wor- Vishakha D. Vaidya and Pinki Vishwakar-
ries about security. In this case, the BC can ma’s [7] “A comparative analysis on the smart
secure the smart home, overcoming the dif- home system to control, monitor, and secure
ficulties associated with smart home systems home based on technologies like IoT, Blue-
and offering a temporal cloud data malware tooth with ZigBee modulation” was designed
reduction algorithm. Its use in malware detec- and put into action in 2018. In this case, they
tion has been suggested. can make use of Bluetooth and a PIC micro-
According to Piyush Kumar Singh, Rahul controller that has ZigBee modulation. This
Saxena, Utkarsh Dubey, Akansha Raj, Biswa can also be done with GSM, Bluetooth, sen-
Mohan Sahoo, and Vimal Bibhu’s [4] “Smart sors, and IOT technologies. It can be used
Security System using IoT” (2020), a great to preserve electricity and by the elderly and
outcome is shown when importance enters disabled.
the allure range. This signals our Raspberry Parikshit Solunke, Shaunak Oke [8], and
Pi board, which is connected to our Pi cam- Part Medhi’s paper “IOT-based smart security
eras before they begin to take pictures. Here, and home automation”: [2018] demonstrate
they used the same IoT-powered smart secu- a strong influence on malware detection and
rity data to project a Raspberry Pi order. 95% prevention. The Temporal cloud data mal-
of the outcome for the clever protection setup ware reduction algorithm is a new approach
can be specified by it. that has been proposed in this research for
Akansha Singh, Deepa Gupta, and Neetu malware identification. To identify and stop
Mittal [5] covered the design and implemen- malware, it makes use of intelligent agents
tation of a smart home security system and and rules. Appliances embedded with actua-
offered a few techniques for enhancing home tors, sensors, and software make up the Inter-
security using the IoT. One of his suggested net of Things. The goal of this is to use AES AQ4:
approaches is a very low-cost system that we encryption to create a wireless home security Please
provide
can install in our homes by simply connect- system. A server is made of Raspberry Pi. It the
ing our smartphones’ Bluetooth devices to can be utilized to manage home apps on cell expansion
for AES.
the home systems through programs that use phones.
voice control, body/hand motions, or eye/face Timothy Malche and Priti Mahesh Wari’s
scanners. First, the authors can even imple- [9] book “Internet of Things for Building
ment a password-protected system that uses Intelligent Home Systems” is another title.
the PAN and Aadhar card numbers as input. “The Frugal Labs IOT platform for creat-
It can be summed up as managing home secu- ing IoT-enabled smart homes” is described.
rity, particularly for elderly and physically where machine-to-machine communication
impaired individuals who are paraplegic. is taking place. The features apply to applica-
In SURE-H: A safe IoT-permitted smart tions developed on top of IOT infrastructure,
AQ5:
home setup. Rashmi Sarmah and Monas which consists of the cloud and device layers. Please
Jyoti Bhuyan decide it. Manohar H. Bhuyan Quick development greatly aids in keeping an provide
the
[6] exhibits a highly effective influence on eye on and managing the smart home envi- expansion
the electrical house system. For every home ronment. They can offer the FLIP in response for FLIP.
machine, SURE-H developed a few auto- to the user’s request.
mated switch faces. They may create the The detection of an intruder or any unex-
Android app to use SURE-H here. The SURE- pected event at home is the definition of
H system is designed to guarantee the security designing “An advanced Internet of Things
of automation systems that include several based security alert system for smart home”
288 Innovations in Computational Intelligence: Trends and Technologies
by S. Tanwar, P. Patel, K. Patel, N. Kumar, and networks, cloud storage, sensor networks, the
M.S. Obtaidat [10]. This inexpensive home IoT, and Raspberry Pi. The system is designed
security system makes use of a Raspberry to monitor a home’s condition by compiling
Pi and a tiny pyroelectric infrared module. data from multiple sensors placed at spe-
Here, users can make use of a few technolo- cific locations. Although there are numerous
gies, including cameras, PIR sensors, and advantages to the proposed approach for
AQ6:
Please
Raspberry Pi, which is the primary computa- smart home security, there may be problems
provide tional device in the suggested method. It can with system startup, sensor data processing,
the identify any strange occurrence at home or data transmission and storage, notification
expansion
for PIR. an invader. 92% of it may be applied to home system, and system troubleshooting if it is not
security. implemented successfully.
The article “Combination of Blockchains
to Secure Smart Home Internet of Things”
3. Existing system by Hilalah F. Al Turkistani and Nourah K.
The approach proposed in “Enhancing home Alsaawi presented a clever proposal for an
security using IOT” by Akansha Singh, Deepa IoT smart home that meets the demands of
Gupta, and Neetu Mittal makes use of a range consumers for freedom. It provides efficiency
of technologies, such as biometric scanners, for secrecy, integrity, and chance; shared
Bluetooth, and body motions, to enhance classification confirmation and permission;
home security and make it more accessible and secure estimating. The concept com-
for people with different abilities. The cur- bines blockchain technology with Internet of
rent technology may have disadvantages such Things devices, such as a refrigerator, light,
as higher installation costs, vulnerability to and freedom camera at the building’s door.
hackers, time and financial requirements, and Bureaucracy is administered in three steps:
limited control location. submitting to and installing the IoT scheme;
“SURE-H: An IoT-enabled smart home connecting it to a local multichain private
system that is secure” by Monasjyoti Bhuyan, permissioned blockchain order with a pri-
Monowar H. Bhuyan, and Rashmi Sarmah vate key; and forming widespread blocks in
the answer specifically provided in the item is the Ethereum public blockchain to trans-
the SURE-H arrangement, a mechanical smart fer records upon complete removal from
house industrialization arrangement designed accountability. While the recommended
to ensure the safety of the smart home sur- method resolves IoT security concerns
roundings. This strategy consists of com-
mon people elements such as users, motion
sensors, an alarm piece, an interesting prod- 4. Proposed system
uct discovery piece, and a cloud attendant. Our projected smart home IoT system brings
The suggested system faces issues related to to completion consumers’ security necessities
parameter estimations, security flaws, power in the way that shared or liberated classifica-
consumption, integration and implementa- tion authentication and permission, secrecy,
tion, and scalability. These problems need to integrity, and chance provide secure compu-
be fixed to ensure the system’s deployment tational potential. It is smooth to implement.
and proper operation. Step-1: Install the IoT instruments in the
Pranav Kumar Madupu and Karthikeyan home (ex: sensors, biometrics, etc) and again
B. wrote “Automatic service request sys- activate instruments by achieving to “IoT
tem or security in a smart home using IoT”. internet access provider”. These duty provid-
This automatic service request system for ers will manage spreadsheet refurbishes, and
smart home security makes use of wireless patches, transfer clear composed instructions
Guarding your home: A seamless Iot-driven security system with high security 289
for the establishment, and arrange consumer At any place, if there is any gas leakage
safety to identify and diminish apparent risk then that leaked gas will be detected by using
if everything occurs and whom to contact. the gas sensors. After the detection of the
These security functionalities will be approved gas, if the gas is leaking from the cylinder or
by apiece IoT internet access provider. something else then the tap of the cylinder
Step 2: After the installation of the require- will automatically turn off if the tap of the
ments. Now we will see the working of the cylinder does not turn off then the windows
smart home security system. Initially, we will will open automatically. If there are no win-
see the security of the entrance of home or dows then there will be a gas extinguisher by
office, etc. that extinguisher the leaked gas will go out.
Step 3: Here, firstly there will be motion For that, if there is any catch of fire at any
sensors to detect the motion of the person. If place then there will be release of the carbon
the person is at the door for 3 to 5 seconds dioxide to reduce the +fire. If the fire caught
then the authentication system will activate. heavily then sprinkling of water. So that it can
Next, there will be preserved fingerprints, reduce the fire that has caught in the place.
faces, and pins of the family if it is a house
or employees if it is an office. If any of the 4.1. Flowchart
family or employees wants to go into the
house or office then they will be authenti-
cated either by using a pin, fingerprints, or
face.
Step-4: Now if any outsider wants to enter
the house or office then there will be a motion
sensor to detect the person. If the motion is
detected then the authenticators will activate
then there will be a request sent to the people
who are authorized.
Step-5: Then any one of the authorized
people can give access to the person who
wants to enter either home or office. Then it
will generate a code (ex: a captcha) so that AQ7:
the person can enter that code by this the per- Please
son can enter into the home or office. provide
source
Step-6: If the code that was entered by the Figure 37.1. Flowchart. for all the
person is wrong then the system will regener- Source: figures.
ate to enter the code. AUTHOR'S SELF GENERATED
Step-4: If the person is not malicious then It will send the authentication request
the request will be granted by the owner. message to the owner in Figure 37.4 when the
If the person is malicious then the request person’s face is captured by the authentica-
will be rejected by the owner. tion system in Figure 37.3.
Step-5: If the person is authorized then a The captcha will be generated after the
captcha will be generated on the screen that authentication request message from Figure
should be entered by the person on the screen. 37.4 is granted by the owner. Then the per-
If the person is not authorized then the son will enter the captcha as shown in Figure
captcha won’t generate on the screen. 37.5 and submit. If the captcha is correct then
Step-6: If the entered captcha is correct the person can enter into the home explained
then the door will open. Otherwise, the per- in Figure 37.5.
son should re-enter the captcha.
Step 7: Finally, the person authenticates
and enters the home.
5. Results
A motion detector is an electrical device. It
can be used for the detection of an object
That is in motion explained in Figure 37.2.
It is a process of recognizing a user’s iden-
tity. After the motion detection in Figure 37.2,
the system will capture the face of the person
explained in Figure 37.3.
Abstract: E-governance and cybercrime legislation are contrasted in this study. The gap might impair cyber-
crime investigations and prosecutions by law enforcement. Breaking this gap is difficult due to cybercrime’s
rapid expansion, worldwide nature, lack of resources, and evidence collection. The paper advises new cyber-
crime laws, international cooperation, training and resources, and awareness to close the e-governance and
cybercrime legislation gap. Weighing e-governance and legal gaps with decision science. The study claims
decision science can protect government websites and data from hackers. The research shows a huge e-gov-
ernance and cybercrime law gap that must be filled. The idea calls for a law enforcement cybercrime unit and
technology.
Keywords: e-governance, cybercrime, law gap, awareness, risk assessment, mitigation strategies
DOI: 10.1201/9781003606635-38
The challenges of enforcing cybercrime laws in the age of E-governance: A literature review 293
• There is no specific provision for the regu- data analytics to identify patterns in past
lation of artificial intelligence and machine cyber-attacks on government websites. We
learning technologies. can also develop risk assessments to quantify
• There is no specific provision for the the likelihood and impact of cyber-attacks on
investigation and prosecution of cyber- government websites. This information can
crime cases involving foreign elements. then be used to develop mitigation strategies
for cyber-attacks on government websites.
These are just some of the specific lacunae By using decision science, we can make
in the IT Act. informed decisions about how to improve the
security of government
• The Aadhaar data breach: In 2018, it was Mathematically, a multiple-criteria design
revealed that the personal data of over problem[9], [10] is formulated using decision
1.1 billion Aadhaar cardholders had been space:
leaked.
• The Cosmos Bank cyberattack: In 2018,
hackers stole over Rs. 94 crores from
Cosmos Bank in Pune. The hackers used
a phishing attack to gain access to the
bank’s systems. The cyberattack high- where is the feasible set and is the decision
lighted the vulnerability of India’s bank- variable vector of size.
ing sector to cyber attacks. The criteria would be the various objectives
• The Telangana cyberattack: In 2021, that we want to achieve, such as improving
hackers attacked the government of efficiency, transparency, and accountability.
Telangana’s IT infrastructure. The attack We can use decision science to help us man-
caused a major disruption to government age the trade-offs between these objectives.
services, including the state’s e-govern- For example, we can use multi-criteria deci-
ance portal. The cyberattack highlighted sion making (MCDM) techniques [11] to iden-
the vulnerability of India’s government tify the most preferred policy or regulation.
infrastructure to cyber attacks. MCDM techniques allow us to consider mul-
• The cyber attack on the All India Insti- tiple objectives simultaneously and to identify
tute of Medical Sciences: In June 2023, the solution that best satisfies our needs.
hackers attacked the All India Institute Here are some of the MCDM techniques
of Medical Sciences (AIIMS) in Delhi[8]. that can be used to manage the trade-offs
The attack caused a major disruption to between the objectives of e-governance and
the hospital’s operations. The cyberattack law gaps:
highlighted the vulnerability of India’s
healthcare sector to cyber attacks
• Weighted sum method: This method
assigns weights to each objective and then
3. Mathematical foundation of sums the weighted values of the objectives
to obtain a single score for each policy or
Cyber GAP regulation. The policy or regulation with
The current GAP in E-Governance security the highest score is the most preferred.
Law can be improved by using the concept • Goal programming [12]: This method
of Decision Science which predicts how to allows us to specify minimum and maxi-
overcome from the above situation. Suppose mum values for each objective. The policy
we want to predict the likelihood of a cyber- or regulation that minimizes the devia-
attack on a government website. We can use tions from the goals is the most preferred.
The challenges of enforcing cybercrime laws in the age of E-governance: A literature review 295
• Analytic hierarchy process (AHP)[13], MCDM technique that is used will depend
[14]: This method is a more complex on the specific situation.
MCDM technique that uses a hierarchy of
criteria to evaluate policies or regulations. 4. Conclusion
The policy or regulation that has the high-
est overall score is the most preferred. The e-governance and cybercrime law gap is
a serious problem that needs to be addressed.
Suppose we are considering two poli- There are a number of ways to address this
cies to address the problem of cybercrime in gap, including developing new laws and
e-governance. regulations, improving international coop-
eration, investing in cybercrime training and
• The first policy is to invest in new security resources, and raising awareness of cyber-
technologies, such as firewalls and intru- crime. By taking these steps, we can help to
sion detection systems. make the internet a safer place for everyone.
• The second policy is to strengthen the In addition to the above, here are some
legal framework for cybercrime, such as other specific ways to address the e-govern-
by increasing the penalties for cybercrime. ance and cybercrime law gap:
The objectives that we want to achieve are • Creating a dedicated cybercrime unit
to reduce the incidence of cybercrime and to within law enforcement agencies: This
improve the security of e-governance systems. will help to ensure that there are dedicated
We can assign weights to these objectives to resources and expertise available to inves-
reflect their relative importance to us. For tigate and prosecute cybercrime cases.
example, we may decide that reducing the • Using technology to combat cybercrime:
incidence of cybercrime is more important Law enforcement agencies can use tech-
than improving the security of e-governance nology, such as data analytics and artificial
systems [15]. intelligence, to help them to investigate
We can then use the weighted sum method and prosecute cybercrime cases.
to calculate a score for each policy [16]. The • Working with the private sector: Law
policy with the highest score is the most enforcement agencies can work with the
preferred. private sector to share information and
For example, suppose we assign the fol- resources to combat cybercrime.
lowing weights to the objectives: • Educating the public about cybercrime:
This will help to reduce the number of
• Reduce the incidence of cybercrime: 0.7 victims of cybercrime.
• Improve the security of e-governance sys-
tems: 0.3 References
• Then, we can calculate the score for each
[1] T. Ahmad, R. Aljafari, and V. Venkatesh, The
policy as follows:
Government of Jamaica’s electronic procure-
• Policy 1: (0.7)(0.8) + (0.3)(0.5) = 0.66 ment system: experiences and lessons learned,
• Policy 2: (0.7)(0.6) + (0.3)(0.9) = 0.72 INTR, vol. 29, no. 6, pp. 1571–1588, Dec.
2019, doi: 10.1108/INTR-02-2019-0044.
In this case, policy 2 is the most preferred [2] [M. Åkesson, P. Skålén, and B. Edvards-
policy, as it has a higher score than policy 1. son, E-government and service orientation:
This is just a simple example of how gaps between theory and practice, Interna-
MCDM techniques can be used to man- tional Journal of Public Sector Management,
age the trade-offs between the objectives vol. 21, no. 1, pp. 74–92, Jan. 2008, doi:
of e-governance and law gaps. The specific 10.1108/09513550810846122.
296 Innovations in Computational Intelligence: Trends and Technologies
Abstract: This paper presents a comprehensive examination of the challenges and corresponding solutions
associated with wireless sensor networks (WSNs), particularly focusing on energy constraints, communication
issues, network deployment, and security concerns. Through an in-depth analysis, it identifies the criticality of
energy efficiency due to the limited power resources of sensor nodes, especially in inaccessible environments.
Solutions such as energy harvesting from renewable sources and power-efficient communication protocols are
explored. The paper further delves into the intricacies of communication protocols, emphasizing the need for
adaptability and scalability to address the diverse requirements of WSN applications. It also discusses optimal
network deployment strategies that mitigate coverage issues and maximize energy utilization. Security is high-
lighted as a paramount issue, given the sensitive nature of the data handled by WSNs, and the paper outlines
various lightweight cryptographic measures and privacy-preserving techniques to safeguard against threats. A
case study on forest monitoring is presented to illustrate the real-world application of these solutions, showcas-
ing the effectiveness of energy-efficient protocols and adaptive strategies in extending the network’s lifespan
while ensuring robust performance. The paper concludes with insights into the future advancements expected in
WSN technologies, which promise to enhance their sustainability, autonomy, and security, further integrating
WSNs into the fabric of emerging Internet of Things.
DOI: 10.1201/9781003606635-39
298 Innovations in Computational Intelligence: Trends and Technologies
on low-power hardware components and WSNs have rapidly evolved in recent years,
energy-efficient coding techniques. becoming a critical component of many tech-
nological fields, including industrial automa-
1.2. Communication protocols tion, environmental monitoring, health care,
and smart cities [1]. However, numerous
Communication protocols significantly influ- challenges continue to limit their widespread
ence the power consumption of LP-WSNs. In adoption and efficiency. This paper aims to
this vein, Chen et al. (2021) evaluate several identify key challenges and proposes poten-
routing protocols specifically designed for tial strategies for their resolution.
LP-WSNs, such as LEACH, PEGASIS, and
HEED. The authors underscore the trade-off
between energy efficiency and communica- 2. Challenges and Solutions in
tion reliability, highlighting the need for fur- WSNs
ther research in this area.
Akmehmet et al. (2022) survey various 2.1. Energy constraints
MAC protocols for LP-WSNs, including
S-MAC, T-MAC, and B-MAC. The authors a WSNs typically consist of a large number of
rgue that these protocols have shown prom- small, low-cost sensor nodes powered by bat-
ise in reducing idle listening, collision, and teries with limited energy resources [2]. In
overhearing - the primary sources of energy many scenarios, especially remote and hos-
waste in wireless communication. tile environments, it is infeasible to replace or
recharge these batteries, making energy effi-
ciency a crucial concern [3].
1.3. Node deployment Solution: Energy harvesting technologies,
Another research focus is on node deploy- such as solar, thermal, and vibration energy,
ment strategies to maximize network cover- can supplement battery power in certain envi-
age while minimizing power consumption. ronments [4]. Additionally, power-efficient
Liu et al. (2020) propose a novel algorithm communication protocols and smart sleeping
that utilizes a two-level hierarchical cluster- schedules can optimize energy use [5].
ing method for node deployment, signifi-
cantly improving the lifetime of LP-WSNs. 2.2. Communication issues
However, they point out that the proposed
model might not be practical in environments Communication protocols in WSNs must
with unpredictable changes. consider factors like energy efficiency, reli-
ability, scalability, and latency [6]. However,
designing a one-size-fits-all protocol is chal-
1.4. Network security lenging due to the varied nature of WSN
Despite advances in power management, com- applications.
munication protocols, and node deployment, Solution: A multitude of energy-efficient
network security continues to be a daunting routing and MAC protocols have been pro-
challenge for LP-WSNs. Zhang et al. (2022) posed for WSNs, such as LEACH, PEGASIS,
elucidates the unique security vulnerabilities S-MAC, and T-MAC [7]. Adaptive protocols,
associated with these networks, due to factors which can adjust parameters based on net-
like limited computational power and battery work conditions, also show promise [8]. The
life of the nodes. The authors propose using integration of energy-harvesting mechanisms
lightweight cryptographic solutions, but they such as solar, thermal, and vibration-based
also highlight the inherent trade-off between energy can bolster the battery life in certain
security and energy efficiency. contexts [4]. Moreover, the development and
A exhaustive review on advancements and challenges in low power wireless sensor networks 299
source for the sensors. Adaptive protocols forests showcases the potential for broader
were also introduced, which adjusted the deployment in other critical areas such as
nodes’ activity levels based on environmental agriculture, healthcare, and urban planning.
data traffic, further conserving energy. The integration of lightweight cryptographic
The deployment of LEACH and the inte- techniques and privacy-preserving meth-
gration of energy harvesting significantly ods also ensures that data integrity and user
extended the WSN’s operational lifespan. privacy are maintained, even in unsecured
The network provided continuous moni- environments. Looking forward, the ongo-
toring with reduced energy consumption, ing evolution of WSN technologies will likely
resulting in fewer maintenance trips and focus on optimizing energy efficiency and net-
lower operational costs. Real-time data work self-sustainability while fortifying secu-
transmission allowed for timely responses rity protocols, ensuring that WSNs remain
to potential forest fires, demonstrating the indispensable in our increasingly intercon-
effectiveness of adaptive, energy-efficient nected world.
solutions in WSNs. In summary, this paper has identified and
addressed the key challenges facing WSNs,
focusing on energy constraints, commu-
4. Conclusion nication issues, network deployment, and
Despite the remarkable advancements in WSN security concerns. The implementation of
technology, numerous challenges persist. energy-efficient protocols like LEACH, cou-
However, the emergence of energy harvesting pled with energy harvesting techniques and
technologies, the design of energy-efficient adaptive communication strategies, has
communication protocols, the adoption of proven to be an effective solution to extend
smart node deployment strategies, and the the lifespan of WSNs while maintaining reli-
implementation of security measures provide able data transmission. The case study pre-
potential pathways to overcome these hur- sented on forest monitoring exemplifies the
dles. As WSNs continue to evolve, ongoing practical benefits of these solutions, reveal-
research and development are necessary to ing a substantial improvement in operational
address these challenges and unlock their full efficiency and a reduction in maintenance
potential. In conclusion, the exploration of costs.
challenges and solutions within WSNs (WSNs) As we advance, it becomes clear that
underscores the critical importance of energy the future of WSNs hinges on the continu-
efficiency, reliable communication, strategic ous innovation in energy harvesting, pro-
deployment, and robust security measures. tocol optimization, and security measures.
Through the implementation of adaptive The integration of advanced machine learn-
protocols, energy-harvesting technologies, ing algorithms for predictive analytics, the
and intelligent deployment strategies, WSNs development of more sophisticated intrusion
can overcome operational limitations. The detection systems, and the enhancement of
case study on forest monitoring demonstrates privacy-preserving data aggregation tech-
that with these solutions, WSNs can achieve niques are poised to elevate the capabilities of
sustainable, long-term monitoring with mini- WSNs. The potential for WSNs to contribute
mal environmental impact. As technology to smarter, safer, and more efficient ecosys-
advances, further refinement of these solu- tems is immense, especially as the Internet of
tions is expected, promising enhanced per- Things (IoT) continues to expand.
formance and broader application of WSNs The implications of such advancements
in various fields, the successful application extend far beyond the immediate improve-
of WSNs in monitoring environments like ments in network performance. They signal
A exhaustive review on advancements and challenges in low power wireless sensor networks 301
Abstract: Understanding children’s personalities is crucial for their emotional and social development. This
study proposes an innovative approach for automatic personality assessment in children based on their emo-
tional speech patterns. An essential component of human conduct, emotions are crucial to the manifestation of
one’s individuality. Our research leverages advanced machine learning techniques to extract valuable insights
from children’s vocal cues, aiming to provide a non-invasive and efficient means of personality assessment.
From the voice data, linguistic and acoustic characteristics are retrieved, including pitch, intonation, and speech
rate. CNN and MFCC algorithms are used in the creation of the developed model. The developed system is
capable of accurately predicting personality traits such as extroversion, agreeableness, conscientiousness, open-
ness, and neuroticism in children based on their emotional speech. Our results demonstrate promising accuracy
levels when compared to traditional personality assessment methods, showcasing the potential of this technol-
ogy in educational and clinical settings. This automated approach can aid educators, psychologists, and parents
in gaining deeper insights into children’s personalities, enabling more tailored support and interventions to
foster healthy development. The goal of automatic personality perception is to predict, using nonverbal cues,
the speaker’s behavior as viewed by the audience.
[email protected]; [email protected]
d
DOI: 10.1201/9781003606635-40
Automated personality evaluation of children based on emotional speech 303
linked to different personality traits and emo- filter for every data layer. One filter is used
tional states in children’s speech. to convolute a layer of data that is subjected
This study is significant because it has the to depth-wise separable convolution; each
potential to drastically change the way that output is then assigned a 191 filter. Lastly, it
children’s personalities are assessed. Through permits one more convolution operation to
the analysis of emotional speech, this process be performed on each filter and each layer of
is automated, allowing the system to produce output data. By doing this, the convolution
assessments that are more impartial, depend- operation’s calculation load may be lowered
able, and accurate. This work also contributes from 1/8 to 1/9 of the total CNN.
to the broader field of voice emotion analysis A CNN-based VGG16 architecture was AQ1:
and advances the use of deep learning algo- presented by Karen et al. [3] (Delplanque Please
rithms for speech-related tasks. The informa- 2017). The significance of depth in CNN net- provide
the
tion gathered from this study may contribute works is emphasized by VGG16. Each con- expan-
to the advancement of speech technology and volutional layer filter is 3 9 3 compressed as sion for
VGG16.
open the door to more accurate and useful opposed to CNN, which often uses a bigger
assessments of children’s personality traits filter. The last layer’s completely linked layer
and emotions, which would benefit their still contains 90% of the network’s param-
growth and well-being. eters, despite the convolution process being
more effective. As a result, The Inception V3
architecture was proposed by Christian et al.
2. Literature survey Strain and Joseph (2003) employing Global
Speech emotion recognition (SER), according Average Pooling technology. The layer’s prob-
to Teddy Surya Gunawan and Taiba Majid lem is capturing too many parameters and
Wani [1] has become a crucial part. Sophis- characteristics can be resolved by averaging
ticated voice processing systems and human- the pooling layer’s data. Limitations were
computer interaction. By recognizing and noted in the study, however they were not
categorizing the salient characteristics of a made clear. addressing constraints
speech signal that has previously undergone Personality is assessed using big five inven-
processing, an emotion recognition system tory questionnaires. The analysis is performed
(SER) can usually determine the speaker’s using the Berlin database of emotional speech
spectrum of emotions. The study provides (EMO-DB). An ANN is used for classification
readers with a cutting-edge grasp of the popu- after acoustic-prosodic information. Liu et al.
lar research issue by meticulously identifying (2013) [4] present an artificial neural network
and synthesizing recent pertinent literature (ANN)-based method for APP. extracted. The
linked to the numerous design components/ system’s forecast accuracy rate was 70%. The
methodologies of the SER system. The study evaluations of personality traits are founded
also points out that more reliable assessment on the opinions of human assessors. Subjec-
techniques are required to gauge the systems’ tive human assessments of personality may
effectiveness because SER systems’ precision not always coincide with objective personal-
is still not ideal. ity evaluations. Although 640 voice snippets
The Xception architecture was proposed from 322 speakers could be a suitable data-
by Francois et al. [2] (2010). Depth-wise set for study, it is somewhat small for train-
separable convolution technique reduces the ing sophisticated machine learning models,
quantity of data and significantly increases which may restrict the generalizability of the
the speed of convolution operations (Daunic findings.
2015). The standard CNN convolution oper- Zhang et al. (2018) [5] evaluated emotional
ation technique is used to convolve with every speech signals using a non-linear dynamic
304 Innovations in Computational Intelligence: Trends and Technologies
3. Proposed methodology
A paradigm shift has occurred in the fields
of psychology and personality assessment in
an era characterized by rapid technological AQ2:
advancements. The fundamental idea of this Please
study is that emotional speech can provide provide
figure
deep insights into a person’s personality. Emo- citations
tions are markers of personality traits and in text.
dispositions in addition to being the outcome
of internal psychological states. A carefully
AQ3:
designed road map guides the model’s devel- Please
opment and construction, starting with data provide
source
collection and preprocessing to guarantee the for all the
accuracy and dependability of the input. The figures.
Figure 40.1. Workflow of the model.
next step involves using MFCC as the basis
for identifying key characteristics in the emo- Source:
AUTHOR'S SELF GENERATED
tionally charged speech samples. These char-
acteristics serve as the building blocks for the The CNN algorithm processes the features
CNNs and other key elements of our selected and produces the final result.
machine-learning architecture. We provide
an overview of the suggested model in this
summary, outlining its main phases from data 3.1. Data preprocessing
preprocessing to model training and testing. The first and most important task in this mod-
The ultimate objective is to clarify the pos- el’s initial phase is to gather a suitable data-
sible advantages and importance of auto- set, which is represented by the letter D. Pairs
mated personality assessment from emotional of audio waveforms (xi) and the labels that go
speech, thereby advancing our knowledge of with them (yi) are included in this dataset; xi
children’s growth and well-being in the con- represents the child’s speech, and yi represents
temporary era. the labels for personality traits. These labels
MFCC algorithm is used such that it takes might be categorical values that stand for
the speech as an input extracts the features various personality characteristics. The next
and gives the output to the CNN algorithm. crucial step is to divide the dataset into three
Automated personality evaluation of children based on emotional speech 305
subsets: a training set (Dtrain), a validation set Convolutional layers: These layers use
(Dval), and a test set (Dtest). This division facili- learnable weights (Wk) and biases (bk) to
tates the evaluation of the model’s generaliza- apply convolution operations; k denotes the
tion and performance. layer index. The MFCC data’s spatial patterns
can be captured with the aid of convolution.
3.2. MFCC feature extraction Activation Function: To provide nonlinearity
to the model and help it understand intricate
Our goal in this step is to identify pertinent correlations in the data, an activation function
features from the D audio samples. We utilize is usually utilized. rectified linear units are a
MFCC, a popular method for speech analysis, common example of activation functions.
to accomplish this. We use the MFCC extrac- Layers for pooling: These layers sample
tion procedure to produce a set of MFCC the feature maps while maintaining crucial
coefficients, referred to as MFCC(xi), for information and lowering the dimensionality
each audio sample xi in the dataset. Impor- of the data.
tant details about the child’s speech are cap- Completely linked Layers: These strata
tured by these coefficients, which are denoted link the convolutional layers’ output to a
as [c1, c2, ..., cP], where P is the number of single or multiple fully linked layers. They
MFCC coefficients. The feature vectors Xi = include more intricate feature interactions
[MFCC(xi)] that result from these computed and come with weights (wf) and biases (bf).
MFCC coefficients are then saved and will be Output Layer: The model can predict the
used as input data in the following stages. probability distribution of personality traits
for each input by using the SoftMax activa-
3.3. Architecture of CNN tion function in the final fully connected layer
for classification.
The structure of the CNN is the core of the
model. At this point, the CNN architecture
that will process the MFCC feature vectors is 3.4. Training
designed and specified. This network receives We define a critical learning component, dur-
Xi, a series of MFCC coefficients, as input. ing the training phase, the cross-entropy loss
The network is made up of various essential function is used. For all samples and personal-
parts: ity traits, this loss function computes the dif-
Figure 40.2 represents the convolution ference between the actual labels (yi,j) and the
and pooling process in CNN architecture. anticipated probabilities (pi,j). It is represented
by the notation L(wk, bk, wf, bf). Using an opti-
mizer, such as the well-known Adam optimizer,
the model’s parameters, including the convolu-
tional and fully connected weights and biases
(wk, bk, wf, bf), are iteratively changed. In order
to effectively train the model to make accurate
predictions and determine children’s personal-
ity traits from their emotional speech, the goal
is to minimize the loss of function.
3.5. Evaluation
Using the specially designed test dataset, Dtest,
Figure 40.2. CNN architecture. the trained model is put through a rigorous
Source: testing process to determine how well it can
AUTHOR'S SELF GENERATED
306 Innovations in Computational Intelligence: Trends and Technologies
automatically identify children’s personal- 15. Update the model’s wk, bk, wf, and bf
ity traits from emotional speech during the parameters to minimize the loss func-
evaluation phase. Computed performance tion. using an optimizer (like Adam, for
metrics include recall, accuracy, precision, example).
and F1-score, which give a thorough assess- 16. Examine the trained model’s performance
ment of how well the model classifies person- with the Dtest test dataset:
ality traits. This crucial phase guarantees the 17. Determine the F1-score, recall, accuracy,
validity of the model and its possible use in precision, and other classification metrics.
real-world scenarios involving the emotional
growth and development of children.
5. Result
The model gets the opportunity to advance
4. Algorithm possibly huge portrayals of character-related
discourse highlights by taking care of CNN
1. Gather the D = {(xi, yi)} dataset in which yi
with MFCCs as input characteristics: CNNs
is the label that corresponds to the audio
can automatically extract significant features
waveform xi.
from input data, including MFCCs, which
2. Divide the dataset into sets for test-
eliminates the need for the engineer to per-
ing (Dtest), validation (Dval), and training
form time-consuming feature engineering.
(D_train).
Thus our model predicts the emotions of
3. For every D audio sample xi:
an individual based on their speech data as
4. The formula for using MFCC to extract
shown in Figure 40.3. This model performs
MFCC coefficients is MFCC(xi) = [c1,
with high efficiency that helps in identifying
c2, ..., cP], where P is the total number of
the individual state of being.
MFCC coefficients.
This allows the model to gain discrimi-
5. Use Xi = [MFCC(xi)] to store the resulting
native elements straightforwardly from the
MFCC coefficients as features.
information, possibly distinguishing unob-
6. Describe the architecture of CNN:
trusive examples or nuances in the discourse
7. Input: an MFCC coefficient sequence
flags that may not be clear to human eyewit-
denoted by Xi.
nesses. It can also save time and effort when
8. Convolutional Layers: Apply convolu-
handcrafting features.
tional layers, where k is the layer index,
with weights wk and biases bk.
9. Activation Function: Make use of a ReLU-
style activation function.
10. Apply pooling layers to feature maps
before down sampling them.
11. Fully Connected Layers: Attach one or more
fully connected layers with weights wf and
biases bf to the convolutional layer’s result.
12. Output Layer: Softmax activation for
classification in the final fully connected
layer.
13. Describe the classification’s cross-entropy
loss function:
14. Where pi,j is the expected probability of
the j-th class for the i-th sample, L(wk, bk, Figure 40.3. Output.
wf, bf) = –Σi Σj yi,j * log(pi,j). Source:
AUTHOR'S SELF GENERATED
Automated personality evaluation of children based on emotional speech 307
Abstract: Recognition of human activity is an important field in artificial intelligence, machine learning, and
deep learning (DL), applied in healthcare, sports analysis, security, and human-computer interaction. HAR uti-
AQ1:
lizes sensor data like accelerometers, gyroscopes, cameras, and audio sensors to identify human actions. Deep Please
learning, including convolutional neural networks and recurrent neural networks (RNNs), autonomously learns provide
and classifies activities. Data preprocessing and feature engineering are crucial. Validation ensures real-world the
accuracy. DL’s continuous evolution promises HAR advancements across domains. In our proposed model we compre-
hensive
used the LSTM and GRU Algorithm for Human Activity Recognition. The growing dataset volume necessitates
expansion
machine learning. Our LSTM and GRU, RNN-based model outperform existing methods on HAR datasets. for HAR.
This research paper presents a comprehensive investigation into HAR using Deep learning techniques. We
explore data collection methods, feature engineering approaches, and various DL models to accurately clas- AQ2:
sify human activities. Our study includes an in-depth analysis of performance metrics, model evaluation, and Please
provide
real-time applications. Through extensive experiments on diverse datasets, we demonstrate the effectiveness the
of DL-based HAR systems in achieving high accuracy and potential for real-world deployment. This research compre-
contributes to the ongoing efforts in developing robust and versatile HAR solutions. hensive
expansion
Keywords: RNN, LSTM, GRU, human activity recognition, neural network for LSTM
and GRU.
NOTE ADDED
capable of comprehending human move- ties. In this era of pervasive technology, HAR for LSTM
and GRU.
ments and actions. Deep learning techniques using DL has found applications in diverse
have proven highly effective in handling com- domains, from healthcare and fitness track-
plex, high-dimensional data for this purpose ing to security and augmented reality [3]. The
[4]. Deep neural networks, in particular, excel following introductory exploration delves
[email protected]; [email protected]
d
DOI: 10.1201/9781003606635-41
Redefining human activity recognition with LSTM and GRU networks 309
into the captivating domain of (HAR) using interpretability very little, lacks architec-
LSTM and GRU. We will explore the core tural details, and has a more extensive set of
principles of DL-based HAR, investigate data assessment metrics. [4] Inzamam Mashood
sources and preprocessing techniques, and Nasir et al. (IEEE 2021). Classifying human
discuss prevalent neural network architec- behaviors can benefit from the methods pre-
tures utilized for robust activity classification sented in this article, which include creating
[6]. Furthermore, we will examine real- 3D Cartesian-plane features, mining feature
world applications and prospects for future descriptors using geodesic distance, extract-
advancements, emphasizing the pivotal role ing interest-based segments, and more. Its
DL plays in comprehending and enhancing shortcomings, which include complexity,
human actions within our increasingly inter- dataset size, and lack of open-source code,
connected world [9]. may be resolved by future research. [5] Peng
To capture temporal correlations in time Zhihao et al. (IEEE 2020). The potential of
series problems, a memory cell structure neural networks with deep connections to
is integrated into both the GRU and the independently identify features in a smart
LSTM models of loop networks. A growing home is combined with the recently suc-
number of researchers are adopting these cessful recurrent and convolution neural
techniques for HAR due to DL’s outstand- networks in a novel multitask layer neural
ing capabilities [4]. Activity prediction has network (LSTM) model. Its drawback is its
applications in a wide range of domains, restricted dataset information. [6] Garima
including video surveillance, gait analysis, Aggarwal et al. (IEEE 2021. They have
behavior analysis, gesture identification, talked about two main models: 2-D CNN
health and exercise monitoring, and inter- and LSTM. According to how accurate they
active games [5]. are, they are compared. [7] Syed Hamza
Azeem et al. (IEEE 2021). Through ensemble
learning across various convolutional neural
2. Literature survey network (CNN) models, scientists devised a
[1] Marjan Gholamrezaii et al. (IEEE 2019). novel method for human behavior recogni-
this paper’s authors presented a novel frame- tion in this research. [8] Seref Recep Keskin
work that uses solely convolutional lay- et al. (IEEE 2020). This study examined pos-
ers in a 2D convolutional neural network. tural stress and spinal mobility using convo-
Its limitations should be considered while lutional and deep neural networks on two
analyzing heterogeneous datasets, process- sensors placed to the spine in addition to the
ing noisy input, and considering hardware pelvis of a healthy person. Potential over-
problems. [2] Md Maruf Hossain Shuvo et fitting, a constrained context, and a scant
al. (IEEE 2020). The research offers a via- dataset explanation are among its disadvan-
ble hybrid method for identifying human tages.[9] Magda B. Fayek et al. (Springer
activity that blends deep learning and con- 2022) Res Inc Conv LSTM, is a novel layer
ventional machine learning approaches. Its introduced in this work. Comparing their
drawbacks, however, include issues with suggested architecture to the Conv LSTM
privacy for practical implementation, and baseline architecture, accuracy increased by
noise handling. [3] Deepika Singh et al. 7%. Some of its disadvantages are hyperpa-
(Springer 2017). Three real-world data sets rameter tweaking, overfitting, interpretabil-
related to smart homes were used to train ity problems, and computational expense.
an LSTM recurrent neural network for this [10] Zhipeng Jin et al. (Springer 2021).
purpose. Some of its drawbacks are that The present study presents a unique frame-
it covers hyperparameter adjustment and work for video activity prediction: WLSTM
310 Innovations in Computational Intelligence: Trends and Technologies
Step 9: Now finally calculate htt-Vector splitting. On the training dataset, data pre-
which holds the information, Update-gate is processing operations like normalization,
Required. grey scaling, and label encoding are carried
out after segmentation.
(12)
Hyperparameter tuning is another criti- Table 41.1. Comparison with other methods
cal aspect of the design. Adjustments must be Algorithms Accuracy (%)
made to regularization procedures like L2 or
dropout regularization, as well as batch size CNN 85%
and learning rate. The sequence length, repre- LSTM 90%
senting the length of input sequences, should ResNet 75%
be carefully chosen as it impacts the network’s LSTM and GRU (ours) 97%
ability to capture temporal dependencies Source:
effectively. Training is a fundamental phase,
with the choice of a suitable loss function and Figure 41.3 is about the accuracy for sev-
optimizer. Techniques like early stopping can eral models in which the proposed model
be implemented to prevent overfitting and achieved the highest among them which is
ensure better generalization. about 97%. With a precision score of 96%,
we were able to determine the percentage of
6. Results actual positive predictions among all positive
predictions generated by the model.
In our study on HAR using LSTM and GRU We were able to ascertain the proportion of
with the implementation of early stopping real accurate forecasts across all positive predic-
for reducing variance, we obtained highly tions produced by the model, achieving a preci-
promising results. With an astounding 97% sion score of 96%as shown in Figure 41.4.
accuracy rate, our algorithm demonstrated its
capacity to precisely categorize and identify
human activities. Real-world applications of
the proposed approach, such as healthcare,
sports analysis, or smart environments.
We evaluated the efficacy of our LSTM and
GRU models in our investigation of human
activity recognition against a number of earlier
models, including CNN, standalone LSTM,
and ResNet, based on existing literature and
benchmark results. While we did not directly
implement these alternative architectures in
our study, our model achieved a significantly Figure 41.3. Accuracy.
higher accuracy rate, by more than 10 to 20 Source: AUTHOR'S SELF GENERATED
The recall score of 98 for our model indi- accuracy of the data used for training improv-
cated the percentage of factually positive ing as the total amount of epochs increases.
cases that were true positive prognostica-
tions. A high recall score indicates that the
model minimizes false negatives by success- 7. Conclusion
fully capturing the majority of positive cases. In summary, our research has explored
97% was the measured F1-score, which human activity recognition using two robust
balances recall and precision. This score takes structures for RNNs, LSTM and GRU, while
into account false negatives as well as false effectively reducing variability through the
positives to provide a fair evaluation of the strategic use of early stopping. Through
model’s overall performance. extensive experimentation and analysis,
These results collectively underscore the we’ve uncovered valuable insights and dem-
effectiveness of LSTM and GRU networks onstrated the potential of this approach to
with early stopping as a strategy for human enhance the accuracy and dependability of
activity recognition. The evaluation metrics activity recognition systems. By including
indicate that the approach exhibits excel- both LSTM and GRU networks in our study.
lent precision, recall, accuracy, and robust- Both architectures showed impressive perfor-
ness. The training accuracy of the epochs is mance, highlighting their ability to capture
displayed in the figure. Five epochs are used temporal dependencies and intricate patterns
to calculate the training accuracy, with the within activity data. This adaptability sug-
gests that LSTM and GRU networks can be
tailored to specific application domains and
data characteristics, providing flexibility to
researchers and practitioners.
References AQ7:
As per
[1] Gholamrezaii M and Almodarresi SMT. style the
Human activity recognition using 2D con- reference
volutional neural networks. In: 2019 27th citations
should be
Iranian Conference on Electrical Engineer- num-
Figure 41.5. Recall. ing (ICEE). IEEE; 2019:1682–1686. bered,
[2] Shuvo MMH, Ahmed N, Nouduri K, and please
Source: check and
AUTHOR'S SELF GENERATED Palaniappan K. A hybrid approach for provide
human activity recognition with support for
vector machine and 1D convolutional neural clarity.
network. In: 2020 IEEE Applied Imagery
Pattern Recognition Workshop (AIPR).
IEEE; 2020:1-5.Singh D, Merdivan E, Psy-
choula I, et al. Human activity recognition
using recurrent neural networks. In: Machine
Learning and Knowledge Extraction: First
IFIP TC 5, WG 8.4, 8.9, 12.9 International
Cross-Domain Conference, CD-MAKE
2017, Reggio, Italy, August 29–September 1,
2017, Proceedings 1. Springer International
Publishing; 2017:267–274.
Figure 41.6. F1-Score. [3] Nasir IM, Raza M, Shah JH, Khan MA, and
Source: Rehman A. Human action recognition using
AUTHOR'S SELF GENERATED
314 Innovations in Computational Intelligence: Trends and Technologies
machine learning in uncontrolled environ- networks. In: 2021 55th Annual Conference
ment. In: 2021 1st International Conference on Information Sciences and Systems (CISS).
on Artificial Intelligence and Data Analytics IEEE; 2021:1–5.
(CAIDA). IEEE; 2021:182–187. [7] Keskin ŞR, Gençdoğmuş A, Yıldırım B,
[4] Wang C and Peng Z. Deep learning model Doğan G, and Öztürk Y. DNN and CNN
for human activity recognition and predic- approach for human activity recognition. In:
tion in smart homes. In: 2020 International 2020 7th International Conference on Elec-
Conference on Intelligent Transportation, trical and Electronics Engineering (ICEEE).
Big Data and Smart City (ICITBS). IEEE; IEEE; 2020:254–258.
2020:741–744. [8] Khater S, Hadhoud M, and Fayek MB. A
[5] Khattar L, Kapoor C, and Aggarwal G. novel human activity recognition architec-
Analysis of human activity recognition using ture: using residual inception ConvLSTM
deep learning. In: 2021 11th International layer. Journal of Engineering and Applied
Conference on Cloud Computing, Data Sci- Science. 2022;69(1):45.
ence and Engineering (Confluence). IEEE; [9] Weng Z, Li W, and Jin Z. Human activity
2021:100–104. prediction using saliency-aware motion
[6] Zehra N, Azeem SH, and Farhan M. Human enhancement and weighted LSTM network.
activity recognition through ensemble EURASIP Journal on Image and Video Pro-
learning of multiple convolutional neural cessing. 2021;2021:1–23.
42 Cybersaferoutes: Protecting IoT
networks from hybrid attack with
security measures
Ganga Bhavani Pa, Lakshmi Tirapathamma Sb, Reshma SKc,
Swetha Bd, and Himaja Ne
Department of CSE, Vignan’s Nirula Institute of Technology and Science for Women Peda
Palakaluru, Guntur
Abstract: The world wide web has revolutionized interconnectivity, interweaving smart components into our
daily lives, homes, and critical infrastructure. However, this digital transformation has brought forth an emerg-
ing and complex threat landscape. This research explores the synergy of two potent cyber threats, namely the
Wormhole Attack and the Blackhole Attack, within the realm of IoT. Wormhole attacks involve the surrepti-
tious tunneling of data between distant points in an IoT network, potentially allowing malicious actors to
eavesdrop on, alter, or disrupt communications. On the other hand, Blackhole attacks involve the creation of
malicious nodes that attract data packets but intentionally drop or manipulate them. Both attacks exploit vul-
nerabilities in IoT communication protocols and can severely affect data integrity, privacy, and network perfor-
mance. IoT devices become increasingly integrated into our daily lives, and the security of these interconnected
systems takes on unprecedented importance. The convergence of Wormhole and Blackhole attacks serves as a
stark reminder that the IoT ecosystem is not immune to the tactics of sophisticated cyber adversaries.
Keywords: Wormhole Attack, Blackhole Attack, Cyber Threats, Digital Transformation, IoT Security, Data
Integrity, Privacy, Network Performance, Cyber Adversaries, Security Measures
[email protected]; [email protected]
d
DOI: 10.1201/9781003606635-42
316 Innovations in Computational Intelligence: Trends and Technologies
vehicles, has heralded a new era of connec- Subash A; Arvin Danny CS; Vijayalakshmi
tivity and automation. Yet, with this unprec- M [5] In this paper, we discuss the increas-
edented growth comes a stark reality the ing threat of DDoS attacks in the internet
vulnerability of IoT ecosystems to sophisti- era. These attacks are on the rise, and attack-
cated cyber threats. When these two potent ers are well-equipped with resources. This
attack vectors are combined, the resulting scheme effectively addresses the packet frag-
hybrid attacks exploit the strengths of each, mentation issue while only slightly increasing
creating a formidable threat that can infil- storage needs.
trate IoT systems in a nuanced and multi- P. Sanju [6] In this paper, an innovative
pronged manner. In light of the evolving approach is presented that combines hybrid
threat landscape and the looming specter of metaheuristics with deep learning techniques
hybrid attacks, understanding these multi- to bolster intrusion detection capabilities in
faceted threats becomes imperative for all IoT systems.
IoT [2] stakeholders. By capitalizing on the Regonda Nagaraju, Jupeth Toriano Pen-
strengths and stealth of Wormhole and Black- tang, Shokhjakhon Abdufattokhov, Ricardo
hole attacks, these hybrid threats introduce Fernando CosioBorda, N. Mageswari, G.
a multifaceted and nuanced assault on IoT Uganya [7] this research paper combines the
systems power of hybridized strategies for optimiza-
As we stand on the brink of an era where tion with profound knowledge to establish
IoT devices become even more deeply inte- a robust attack prevention system for IoT
grated into our lives, safeguarding these inter- environments.
connected ecosystems is not merely an option. Amiya Kumar Sahu, Suraj Sharma, M.
Tanveer, Rohit Raja [8] This study introduces
an innovative security framework and an
2. Literature Survey attack detection mechanism, aiming to bridge
Nai The author Hossein [1] For this paper, existing gaps in the field.
researchers investigate a security problem Danish Javeed, Tianhan Gao, Muham-
related to attacker identification for a par- mad Taimoor Khan and Ijaz Ahmad [9] the
ticular kind a cyber-physical systems. These attained accuracy of our proposed scheme
networks are made from continual actors stands at an impressive 99.87%, coupled
that communicate with distinct computa- with an outstanding recall rate of 99.96%.
tional elements. Amit Sagu, Nasib Singh Gill, Preeti Gulia,
Yu-Cheng Chen, Santiago Grijalva, Dus- Jyotir Moy Chatterjee and Ishaani Priya-
tin Campbell, Vincent Mooney, and Tim darshini [10] In this current text, we introduce
Gieseking [2] In this study, we present a novel a mixed sensing model tailored for identifying
method for examining grid assaults: the use attacks within an IoT environment, employ-
of the Hybrid Assault Hypothesis (HAM). ing a comprehensive three-stage approach.
John Hale, Mauricio Papa, Michael Haney,
and Peter J. Hawrylak [3] In this paper, we
investigate a cyber-physical attack intended to 3. Proposed Model
get too hot an electrical appliance on an intel- As the Internet of Things (IoT) permeates
ligent power substation you are considering. every aspect of our lives, its promise of con-
Cheolhyeon Kwon; Inseok Hwang [4] for nectivity and convenience is accompanied by
the present instance, research on newspaper the growing specter of hybrid attacks, a men-
explore the design of strong commanders for acing combination of the Wormhole Attack
CPS that can with stand numerous kinds of and the Black Hole Attack. Our model begins
cyberattacks. with the initialization and setup of the IoT
Cybersaferoutes: Protecting IoT networks from hybrid attack with security measures 317
network, establishing various nodes, sen- Crucially, our model operates in real-time,
sors, and communication pathways. [3] Key continuously monitoring network traffic and
parameters such as distance (dn), the thresh- behavior. This proactive approach allows
old value (R), and the hop interval threshold for the early detection of hybrid attacks that
(Th) are configured to adapt to the unique blend the insidious Wormhole and Black
characteristics of the network. Hole tactics. By calculating the hop interval
Attack detection and identification are threshold (Th) based on parameters such as
achieved through the utilization of the Worm- distance (dn) and a threshold value (R), the
hole and Black Hole Attack Detection and model adapts to the specific context of the
Mitigation Algorithm. The presence of a Worm- IoT network, ensuring precise and dynamic
hole attack is inferred when the Hop Emission detection capabilities.
(Hem) equals 1, prompting a meticulous anal- The versatility of our model lies in its
ysis of the Hop Interval (Hi) in comparison adaptability. It continuously learns and
to the dynamically calculated threshold (Th). evolves through the incorporation of machine
In the event of a Wormhole attack, the model learning and artificial intelligence techniques.
responds decisively by marking it as “TRUE”
(W), thereby signifying the necessity to sever
the communication path between Ns and Nr. 3.1. Implementation of hybrid attack
Subsequently, secure communication is re- Step 0: Access information about the suspect
established via an alternate route, allowing Ns transmitter component Ns, along with its
and Nr to reconfigure their settings for a forti- opposite ending Nr..
fied communication channel. Step 1: Assign a cutoff for hops intervals (Th)
The model extends its vigilance to iden- based on parameters dn and R.
tify Black Hole attacks, promptly marking Step 2: Verify if Hem (Hop Emission) is equal
Black Hole (B) as “TRUE” when detected. to 1 (True).
In the presence of a Black Hole threat, simi- Step 3: If Hem equals 1, check if Hi (Hop
lar actions are taken, ensuring the network’s Interval) is greater than Th.
integrity is preserved. - If true, proceed to Step 4.
When neither Wormhole nor Black Hole - If false, state W as “YES.”
attacks are detected, the model deems the Step 4: State W as “NO.”
communication path safe, enabling uninter- Step 5: Verify if W is equal to “YES.”
rupted data exchange within the IoT network. Step 6: If W is “YES,” delink the Route con-
To ensure adaptability and continued necting Ns and Nr.
security, the model emphasizes continuous - Proceed to Step 7 to re-establish commu-
monitoring and learning. The integration of nication by a secure route.
machine learning and artificial intelligence Step 7: Allow Ns and Nr to reconfigure for
techniques allows the system to evolve, secure communication.
enhancing its ability to detect and mitigate Step 8: If W is not “YES,” consider the path
new hybrid attack patterns. safe and proceed to Step 9.
Our proposed model serves as a compre- Step 9: Verify if B (Black Hole) is equal to 1
hensive framework for fortifying IoT secu- (YES).
rity against the evolving threat of hybrid Step 10: If B equals 1, delink the route con-
attacks. By combining proactive monitoring, necting Ns and Nr.
[4] adaptive thresholds, and swift response - Proceed to Step 11 to rebuild contact
mechanisms, we aim to secure IoT networks through by a safe path.
in an era where these interconnected ecosys- Step 11: Permit Ns and Nr to reorganise to
tems are indispensable. for secure communication.
318 Innovations in Computational Intelligence: Trends and Technologies
Step 12: If B is not 1, consider the path safe In Hop Interval (Hi) vs. Threshold (Th) if
and allow communication to continue. Hem is 1, the algorithm checks if Hi (Hop
Interval) is greater than Th. Marking W as
Hop Interval Threshold (Th) here this algo- “TRUE” or “FALSE” here Depending on the
rithm sets a hop interval threshold (Th) based result of the previous comparison, the algo-
on parameters dn and R. This threshold likely rithm marks W as “TRUE” or “FALSE.” W
determines the maximum acceptable number could represent the path’s security status. If
of hops for a communication path to be con- W is “TRUE,” it may indicate that the path is
sidered secure. Adjusting Th appropriately is not secure due to excessive hops. In Delink-
crucial to balance security and performance. ing and Re-Establishing Communication
Hop Emission (Hem), means that the algo- If W is “TRUE,” the algorithm delinks the
rithm checks whether Hem is equal to 1. Hem path between Ns and Nr, essentially cutting
might be a flag or indicator of some kind, off communication. Then, it proceeds to re-
possibly indicating the initiation of commu- establish communication by finding a secure
nication between Ns and Nr. If Hem is 1, it route. This step ensures that communication
triggers further evaluation of the path. continues through a more secure path. The
algorithm allows Ns and Nr to reconfigure for
secure communication after delinking. This
likely involves finding a different, [5] more
secure path or making necessary adjustments
to communication parameters. Black Hole
(B) The algorithm checks if B (Black Hole) is
equal to 1. In Delinking and Re-Establishing
Communication (Again) if B is equal to 1,
similar to the case of W being “TRUE,” [6]
the algorithm delinks the path and re-estab-
lishes communication through a secure route.
In the event that W is marked as “TRUE,”
the algorithm proceeds to take essential
actions to safeguard the network. It initiates
the delinking of the communication path [7]
between the sender node Ns and its counter-
part Nr. This decisive step effectively severs
communication to prevent potential security
breaches. Subsequently, the algorithm endeav-
ors to re-establish secure communication by
AQ1:
Please
identifying an alternative, more secure route.
provide The model begins with the configuration
in-text
NOTE ADDED and initialization of the IoT network, encom-
citation
for figures passing a multitude of [8] interconnected
1-6. devices. Key parameters, such as distance
(dn), the threshold value (R), and the dynami-
AQ2: cally adaptable hop interval threshold (Th),
Please
provide are initialized to create a responsive security
source environment.
for all the Figure 42.1. Architecture diagram.
figures
Additionally, the algorithm incorporates a
Source: check for Black Hole attacks, examining the
AUTHOR'S SELF GENERATED
Cybersaferoutes: Protecting IoT networks from hybrid attack with security measures 319
variable B. A value of 1 for B indicates [9] the A hybrid attack in IoT that combines the
potential presence of a Black Hole attack, a black hole attack, where a malicious node
severe network issue, or a compromised net- drops all received packets, and the worm-
work node. hole attack, which creates a shortcut for data
transmission.
A hybrid attack in IoT, combining the
4. Results black hole and wormhole attacks, can lead to
In a hybrid attack involving the black hole data loss due to the malicious node dropping
and wormhole attacks in IoT, [10] the result- packets.
ing reduction in throughput can be quite
substantial.
The hybrid attack resulted in a reduced
packet delivery ratio (PDR), indicating a
higher rate of packet loss or failure in mes-
sage transmission.
The hybrid attack, which combines black
hole and wormhole attacks in IoT networks,
results in an elevated energy consumption.
Figure 42.4. Energy delay
Source: AUTHOR'S SELF GENERATED
Abstract: Harmful content on the internet poses a significant challenge to maintaining a safe and inclusive
online environment. To remove this issue, we propose a novel approach for harmful content classification,
combining the power of recurrent neural networks and pre-trained transformers. Specifically, we utilize gated
recurrent units (GRUs) for text preprocessing and bidirectional encoder representations from transformers
(BERT) for the final classification task. In the preprocessing stage, GRUs are employed to capture sequential
dependencies in textual data, allowing for the effective extraction of context-based features from the input text.
This preprocessing step is crucial for understanding the nuanced structure and context of potentially harmful
content, such as hate speech, cyberbullying, or offensive language. Subsequently, the pre-processed data is fed
into a fine-tuned BERT model for classification. BERT is a state-of-the-art transformer model that excels in
understanding the semantics of text, making it particularly well-suited for the nuanced and context-dependent
nature of harmful content detection. By leveraging BERT’s pre-trained contextual embeddings, we can effi-
ciently classify text into different categories of harm, including hate speech, harassment, or misinformation.
Our proposed approach is capable of handling multi-class classification, making it versatile for a huge range of
harmful content identification tasks. Furthermore, the combination of GRU-based preprocessing and BERT-
based classification offers a powerful and adaptable solution for detecting harmful content, contributing to the
ongoing efforts to create safer online spaces, and promoting responsible content moderation.
Keywords: Natural language processing, toxicity detection, gated recurrent unit, bidirectional encoder repre-
sentations from transformers, convolutional neural network
a
[email protected]; [email protected]; [email protected]; dgppavani58@gmail.
com; [email protected]
DOI: 10.1201/9781003606635-43
322 Innovations in Computational Intelligence: Trends and Technologies
or brands, which greatly aids in promoting embeddings do not directly encode offensive sion for
LSTM.
a certain company. Traditional methods for remarks due to their construction from clean
fake review detection [4] have relied on rule- corpora.
based heuristics, lexical analysis, and statisti- Wonhel Lee1 et all [6] In order to choose
NOTE
AQ1: ADDED
cal approaches. While these techniques have the best extraction and normalization method
Reference
offered some degree of success, they often and create a safeguarding system that shields
citations
are not in struggle to capture the subtle nuances and young people using the internet from haz-
sequence.
context-dependent cues that distinguish gen- ardous contents, several different algorithms
Please
check and uine from fake reviews. This paper focuses were tried, including TF-IDF, TF-ICF, IG,
review for
on the utilization of two state-of-the-art NLP CHI, log TF, and SVM.
clarity.
architectures [1]: Gated recurrent unit (GRU) Hina Tufail [7] et al: SKL-Based Fake
and bidirectional encoder representations Review Detection, SVM, KNN, and logistic
AQ2:
Please from the transformer (BERT), in the context regression to thoroughly examine Positive-
provide
NOTE ADDED of fake review recognition These architec- unlabeled learning strategies, a semi-supervised
the
expansion tures have demonstrated remarkable capabil- learning methodology.
for NLP.
ities in capturing complex linguistic patterns Ying Qian et al [8] The performance of
and contextual information, enabling them emotion classification models is enhanced by
to discern even the most sophisticated decep- the combination of local and global semantics
tive reviews. The use of GRU in preprocess- in CNN, self-aware neural network mecha-
ing aims to capture sequential dependencies nism, and neural network PCC.
within textual data, allowing our model to Rohit Kumar Kaliyar et al [9] Conventional
better understand the context and nuances of Neural Network (CNN), LSTM examines
potentially harmful content.[3] GRU’s abil- the issue of fake news from the perspective of
ity to retain long-term dependencies, coupled various echo chambers found in social media
with its computational efficiency, positions it data, which are regarded as a collection of
as a potent tool for text data preparation. individuals with similar viewpoints on any
Our goal in this research is to empiri- given social issue.
cally demonstrate the superior performance
of GRU and BERT classifiers [2] compared 3. Related work
to traditional methods. By leveraging their
advanced capabilities in sequential data pro- 3.1. Proposed approaches for toxic
cessing and contextual understanding.
Through this research, we hope to improve
content detection
the effectiveness of hostile review detection The deliberate writing of fake content with
while simultaneously making a larger dis- the goal of distorting information makes it
course on leveraging advanced NLP tech- difficult to detect. Typically, regular, and obvi-
niques for addressing challenges in online ous word forms found in the corpus are used
commerce and consumer trust. The results to create pre-trained embeddings. Informa-
of this analysis have important consequences tion is lost because these representations do
for e-commerce platforms, consumers, and not include all the words used in the hurtful
the broader online retail ecosystem. comments.
Harmful content classification in social media using gated recurrent units and bidirectional encoder 323
3.1.1. Data preparation The data have been split into three subsets:
a training set for model training, a validation
The current method primarily concentrates
set for hyperparameter tuning and model
on different types of supervised machine-
selection, and a test set for evaluating the
learning classification algorithms. Techniques
model’s performance.
such as bidirectional LSTM, CNN, SVM,
KNN, and logistic regression have been used
to achieve accuracy above 90 Unfortunately, 3.3. Algorithms
these methods weren’t enough to train large This research work uses deep learning for pre-
datasets quickly. So, in our study, we used processing the GRU algorithm and machine
GRU and BERT algorithm combined model learning for classification which uses BERT
building an easy-to-use site for fake comment algorithms. Many natural processing tasks
identification and training on huge datasets can be applied to these models, and they per-
form well on them. This research technique
3.1.2. Data sources makes use of the models indicated below.
Social Media Platforms: The information
may have been gathered from well-known 3.4. GRU
social media sites with a lot of harmful con- The reset gate () determines how much of the
tent, such as Facebook, Twitter, and others. past information should be discarded, while the
Web scraping: relevant textual data from update gate () controls the balance between the
public postings and comments on social previous hidden state and the Seeker hidden
media may have been gathered using auto- state (). The Seeker hidden state is a combina-
mated online scraping techniques. tion of the previous hidden state and the input,
and the final hidden state is determined by a lin-
3.2. Data preprocessing ear interpolation between the previous hidden
state and the Seeker hidden state. These equa-
Text Normalization: To standardize the text tions allow the GRU algorithm to capture and
data, common text normalization procedures update information over sequential input, mak-
like lowercasing, deleting special characters, ing it suitable for various tasks such as natural
and handling slang or informal language language processing and time-series analysis.
may have been used. To prepare the textual
material for future processing, it can undergo
tokenization into words or sub-word units.
3.5. GRU formula
N-gram extraction is the process of taking 1. Reset gate:
n-grams, or consecutive sequences of n ele- rst = s igmoid(Wtirsxt + Wthrsht–1 + bshrs +
ments, out of the text data in order to extract bsirs)
contextual information for the purpose of 2. Update gate:
identifying potentially dangerous content. udt = s igmoid(Wtiudxt + Wthudht–1 + bshud +
Stopword Elimination: In order to enhance bsiud)
the classification model’s performance, com- 3. Seeker hidden state:
mon words with little meaning, including “and,” hst = t anh(Wtihsxt + rt(Wthhs * ht–1 + bshsn) +
“the,” and “is,” may have been eliminated. bsihs
Lemmatization or stemming: Words may 4. Hidden state:
have been reduced to their base or root form ht = (1 – udt) * hst + udtht–1
using morphological analysis approaches, • rst is the input at time t.
which can aid in lowering the dimensionality • ht–1 is the hidden state from the previ-
of the feature space. ous time step.
324 Innovations in Computational Intelligence: Trends and Technologies
4. Experimental analysis
4.1. Dataset
The Toxic comment classification challenge
dataset is used and it is available on the
Kaggle website. this dataset has 7 columns
toxic, threat, severe toxic, obscene, insult,
dentity_hate [13]. The advantage of using
this GRU and BERT is that it gives better
output.
Figure 43.3. Precision.
5. Result Source:
AUTHOR'S SELF GENERATED
References
[1] Bangyal WH, Qasim R, Rehman NU,
Ahmad Z, Dar H, Rukhsar L, Aman Z, and
Ahmad J. Detection of fake news text clas-
sification on COVID-19 using deep learning
approaches. 2021.
[2] Eke CI, Norman AA, and Shuib L. Context-
based feature technique for sarcasm identi-
Figure 43.6. Loss. fication in benchmark datasets using deep
Source: learning and BERT model. IEEE. 2021.
AUTHOR'S SELF GENERATED
Harmful content classification in social media using gated recurrent units and bidirectional encoder 327
[3] Zhang Z, Robinson D, and Tepper J. [7] Qian Y and Huang J. A self-attentive convo-
Detecting hate speech on Twitter using a lutional neural network for emotion classifi-
convolution-GRU based deep neural net-
cation on user-generated content. 2021.
work. 2018; 03 June 2018. [8] Tufail H, Ashraf MU, Alsubhi K, and Aljah-
[4] Fan H, Du W, Dahou A, et al. Social media dali HM. The effect of fake reviews on
toxicity classification using deep learning. e-commerce during and after the COVID-19
Electronics. 2021. pandemic. 2021.
[5] Yousaf K. A deep learning-based approach [9] Kaliyar RK, Goswami A, and Narang P. Fake
for inappropriate content detection and clas- Bert: Fake news detection in social media with
sification of YouTube videos. IEEE. 2022. a BERT-based deep learning approach. 2021.
[6] Lee W, Lee SS, Chung S, and Dongun. Harm- [10] Mazari AC, Boudoukhani N, and Djeffal A.
ful contents classification using the harmful BERT-based ensemble learning for multi-
word. 2021. aspect hate speech detection. Springer. 2023.
44 Detection of missprounciation using
deep learning
Naga Vardhani Ba, Naga Nandini Kb, Nandhakeerthi Mc, and
Rupanjali Md
Department of CSE, Vignan’s Nirula Institute of Technology and Science for Women, Peda
Palakaluru, Guntur
Abstract: The voice recognition community is currently paying more attention to “mispronunciation detection”.
This study interest and the focus of this work are primarily driven by two areas of application: speech recogni-
tion and language learning adaption. There are many Systems for CALL that use CAPT methods. This thesis
introduces a new text-dependent mispronunciation method based on AFCC for text. This approach is demon-
strated to perform better than the traditional HMM method based on MFCCs. To assist language learners in
recognizing and correcting pronunciation errors, a PCA-based system for mispronunciation detection and clas-
sification is also developed. Two projects have been investigated in order to improve voice recognition through
adaptation. As one method of making grammar-based name recognition adaptive, the initial one enhances name
awareness by teaching permissible variances when pronouncing names. The second project involves detecting
accents by looking at how fundamental vowels vary in speech with accents. It has been demonstrated that this
method, which detects accents using both acoustic and phonetic information, is effective with accented English.
To enhance name and speech recognition, these apps able to incorporated into a foreign phone system that is
automated. Based on a short speech sample, it estimates the accent of the caller. For better detection outcomes,
it moves away from the default switching from an accent-adaptive speech recognition engine once the type of
accents is identified.
Keywords: Convulution Neural Network, BiLSTM, Detection of misprounciation, Deep Learning, CALL,
MFCC
DOI: 10.1201/9781003606635-44
Detection of missprounciation using deep learning 329
extracting local qualities. The layer pooling synthesis Daniel Korzekwa. The three
downsample the output, lowering the num- cutting-edge methods to produce appro-
ber of dimensions. Finally, the completely priately pronounced and mispronounced
linked levels combine The characteristics and synthetic speech are founded on T2S, S2S,
make predictions. and P2P conversion. We demonstrate that
BiLSTMs, on the other hand, are a kind these methods help set a new standard for
of RNN, or recurrent neural network, that the area and enhance three machine learn-
is able to recognize temporal connections ing algorithms’ accuracy model faults. We
in the speech signal. They process the input offer a comprehensive analysis of three dis-
sequence both backwards and forwards. To tinct speech-generating methods depend-
detect mispronunciations, a dataset of cor- ing on the conversion of P2P, T2S, and S2S
rectly pronounced and mispronounced words for identifying pronunciation problems.
or phrases is used for training the model. The 3. Identification of Mispronounced Words
CNN extracts features from the audio, and the in Stockle, Perdigo. Find candidate word
BiLSTM captures the temporal dependencies. pronunciations in the first step by per-
Most people try to learn as many words mitting syllable repeats and erroneous
as they can when they first begin to learn a beginnings. In In a subsequent stage, the
language. As a result, they can first learn a pronouncability of word candidates is
new word, then put it together into a phrase determined. For a free phone loop and a
and, hopefully, a sentence. Finally, they try to word-spotting model in the vicinity of the
communicate with people whose native lan- candidate segmentation, the log-likelihood
guage is not English but who share an interest ratiois determined to be the most effective
in speaking it due to circumstances at work, feature for classifying mispronunciations.
in the schools where they work, or even with It can help anticipate how well a kid will
people for whom English is their mother read, and it is necessary to look into the
tongue or who use it as a lingua franca, in effects of the improvements provided
other words, they are native English speakers. by the approach suggested in this paper.
First, there is a chance of inaccuracies in
the phonetic recognizer’s output. The sub-
2. Literature Survey sequent issue this is the arbitrary manu-
1. Enhanced mispronunciation detec- ally noting appropriate terms additionaly
tion using logistic regression classifiers pronunciation errors.
founded on transferrable skills and DNN/ 4. Automatic Estimation of Young Read-
Yong Wang. 2015 Using LR classifiers ers’ Proficiency for Advanced Literacy
based on transfer learning and an auditory Evaluation by Matthew P. Black, Eleven
model acquired on a DNN, we can get Human Assessors assessed the children’s
better mispronunciation detection perfor- overall reading abilities in the first stage
mance. The DNN training with improved of the research using the audio recordings.
discrimination refines the model of sound We examined how the evaluator’s experi-
developed via the traditional HMM-based ence affected the agreement amongst the
GMM method. To give language learners assessors. It enables evaluators to auto-
more meaningful diagnosis feedback, we matically model and forecast assessors’
will look into the detection of prosodic, high-level judgments for a specific read-
insertional, and deletional mispronuncia- ing assignment as well as adapt to the
tions faults in the future. subjects’ speaking styles. When it comes
2. Training in computer-assisted pronun- to supporting material that is both audio-
ciation: Nearly all you require is speech and video-based.
330 Innovations in Computational Intelligence: Trends and Technologies
References AQ3:
Please
[1] Cohen, Herman, and R. T. Craig. “The his- provide
Figure 44.5. Recall. in-text
tory of speech communication: The emer- citation
Source: AUTHOR'S SELF GENERATED gence of a discipline.” Annandale, VA: for all
Speech Communication Association. Plural- references
ism. Disagreement, and the Status of Argu-
ment in the Public Sphere 137 (1995).
[2] Hu, Wenping, et al. “Improved mispronun-
ciation detection with deep neural network
trained acoustic models and transfer learning
based logistic regression classifiers.” Speech
Communication 67 (2015): 154–166.
[3] Çalik, Şükrü Selim, Ayhan Küçükmanisa,
and Zeynep Hilal Kilimci. «Deep Learning-
Based Pronunciation Detection of Arabic
Phonemes.» 2022 International Conference
Figure 44.6. F1-Score. on INnovations in Intelligent SysTems and
Source: Applications (INISTA). IEEE, 2022.
AUTHOR'S SELF GENERATED
334 Innovations in Computational Intelligence: Trends and Technologies
[4] Proença, Jorge, et al. “Mispronunciation [6] Li, Kun, Xiaojun Qian, and Helen Meng.
Detection in Children’s Reading of Sen- “Mispronunciation detection and diagnosis
tences.” IEEE/ACM Transactions on Audio, in l2 english speech using multidistribution
Speech, and Language Processing 26.7 deep neural networks.” IEEE/ACM Transac-
(2018): 1207–1219. tions on Audio, Speech, and Language Pro-
[5] Black, Matthew P., Joseph Tepperman, and cessing 25.1 (2016): 193–207.
Shrikanth S. Narayanan. “Automatic predic- [7] Qian, Xiaojun, Helen Meng, and Frank Soong.
tion of children’s reading ability for high- “A two-pass framework of mispronunciation
level literacy assessment.” IEEE Transactions detection and diagnosis for computer-aided
on Audio, Speech, and Language Processing pronunciation training.” IEEE/ACM Transac-
19.4 (2010): 1015–1028. tions on Audio, Speech, and Language Pro-
cessing 24.6 (2016): 1020–1028.
45 IOT-enabled cloud solutions for reliable
health monitoring
Lakshmi Sravani G.a, Lalitha Chandrika N.b, Lavanya S.c,
Vijaya Lakshmi S.d, and Sri Lakshmi Prasanna S.e
Computer Scienceand Engineering, VNITSW, Guntur, India
Abstract: Contemporary hospitals are meeting Client needs with new technology like smartwatches or the web
of items. Wearable devices are nothing but smart watches, wrist bands etc., because it provides more freedom
for far removed patient’s connections via the web of technologies and the tracking of medical data. The new
technology offers more features and improvements to the current healthcare services. When introducing wear-
able technology to the healthcare industry, there are a number of security concerns that must be taken into
account, including Medical information is safe and private. We present a comprehensive approach to building a
secure health monitoring system that leverages cloud computing and IOT technologies.
Keywords: A system of multivital signals, electronic wearables, Internet of things, monitoring system for health,
preprocessing of data, protection of privacy, security issues, the XLNET deep learning algorithm, wearables
cloud computing
[email protected]; [email protected]
d
DOI: 10.1201/9781003606635-45
336 Innovations in Computational Intelligence: Trends and Technologies
[2] Author Sabzevar Branch published this so, and The World Wide Web of The events
paper on 8 September Springer (2021) An IoT for naturally options in an isolated location.
-based wellness tracking system that takes [8] Author Mohammed Almaiah pub-
into account the connected home’s clever data lished this on IEE Article (2017). Advanced
for case-centered health surveillance. Pall treatment operation IOT bias help track
computing in conjunction with an Online of the administration of medicines and the
Impacts (IoT) structure for faraway situation response to the treatment and reduce medi-
watching (RPM) is a novel approach that has cal crimes. Smart Health Solution Integrat-
the potential to transform medicine. ing IOT and pall. Medical data availability
[3] Author Ashish Singh published this of electronic medical records allow cases to
paper on 2 September Springer (2022) The admit quality care and help healthcare pro-
primary disadvantages of this approach is viders make the right medical opinions and
that maintaining the shop’s premises and help complications
ensuring the security of the massive volume of [9] Author Ghulam Muhammad published
continuously generated information present an article in IEEE in January 2017. In this
tough obstacles for the traditional archive work, the viability of tracking speech disease
form. The main objective of this endeavor is with the IOT and pall integrated. We suggest
to address the socially harmful interest prob- an architecture in which conversations are
lem outlined by the European Communities. obtained via the Internet of Things and sent
[4] Zulfiqar Ali Ghulam published this to a smartphone-like serving gadget.
paper on 09 March IEEE (2017) in nations [10] Author M. Shamim Hossain pub-
that are developing and developed alike, such lished a paper in Elsevier (2017) to this end.
as the United States and India, health concerns This paper describes an IOT-grounded health
among the elderly are a major business. Due monitoring frame, where health monitoring
to various health issues, an important num- signals are authenticated. While IOT pledges
ber of medical setups attract elderly citizens. to reduce the cost of healthcare in the long
[5] A protect patiently health tracking sys- term, the cost of its perpetration in hospitals
tem based on IOT A case tracking solution and staff training is relatively high.
based on IOT enables patients to benefit from
healthcare-related programs. Settling in their
houses in a distant spot 3. Proposed Model
[6] Authors Hui Shao et al. published an In our model, I have employed a deep learn-
article in the Magazine of Transformed Tech- ing method to extract and classify data from
nology and Intelligent Environments in 2018 the physical activity dataset. This algorithm
.This comprehensive review covers color- collects necessary information and data,
ful aspects of IOT in healthcare, including which is then encrypted using the AES tech-
patient monitoring, security, and sequestra- nique for security. Let’s see the work flow of
tion. Case’s sequestration, in this instance, XLNet algorithm
safety and protection are absolutely crucial. Algo:
Techniques for Encrypting Healthcare Step 1: Starts
Journalism based on Internet of Things and Initialize Transform layers and Attention
Cloud Computing for Software in Healthcare heads as L and H
Emergencies Transform layers=L
[7]. The disease tracker that is discussed Attention head=H
in the above article is virus-free, affordable, Step 2:
actual time, and accountable. It offers imme- Declare Query, key and Value matrices as Q,
diate fashion reveal surveillance, pall doing K, and V
IOT-enabled cloud solutions for reliable health monitoring 337
Step 3: Step 8:
Calculate dot product matrices in step 2 with Compute Gradient during fine-tuning by the
Input vector below formula
Step 4: Step 9:
Compute attention scores by applying Soft- Evaluate θ by descent update rule as below
Max function and multiply with Value vector
AQ1:
Please
provide
figure
citations
in text.
AQ2:
Please
provide
source
for all the
figures.
Figure 21.1. Architecture of reliable health monitoring.
Source: AUTHOR'S SELF GENERATED
338 Innovations in Computational Intelligence: Trends and Technologies
security, and interaction with IOT devices are A famous symmetrical encryption method
all involved. security of data, compliance, and is called AES, or Enhanced Cryptography
the encryption of communications between System.
cloud servers, Internet of Things devices, and This indicates that it generates a total of
other system components. 128 /192/256bits of encrypted cipher text as
output after receiving 128/192/256 bits as
1. Wearable technology is used by the user input.
(Smart watch, wrist bands, fitness, tracker,
etc.).
2. Health data is gathered and sent to 4. Experimental Results
The cloud via wearable technology. The graph represents the models of three dif-
a. Real-time or periodic data collection ferent those are:
is done. CNN, DLMNN and XLNET
b. Information is sent to the cloud safely.
3. Storage on the Cloud
a. Cloud storage platform called Google
Cloud securely store data.
b. To protect data when it’s not in use,
use AES encryption.
4. Data preprocessing a. Data is cleaned and
formatted during the preprocessing stage.
a. Missing values are addressed and the
data is ready for examination.
5. Extraction and Classification Using Deep
Learning
a. The XLNet algorithm is employed for
feature extraction and categorization Figure 21.3. Accuracy data.
of health data. Source:
AUTHOR'S SELF GENERATED
b. The features and classifications that
were extracted are saved for later study. Accuracy data comparison analysis is
based on a plot with the y-axis representing
the accuracy metric and the x-axis represent-
ing the epochs.
References
[1] Somayeh Iranpak, Asadollah Shahbahrami
and Hassan Shakeri. (2021). Remote patient
monitoring and classifying using the inter-
net of things platform combined with cloud
computing. Journal of Big Data.8, 90821.
[2] Ashish Singh and Kakali Chatterjee. (2022).
Edge computing based secure health moni-
toring framework for electronic health-
Figure 21.6. Loss data. care system. Complex Intelligent Systems.
Source: 26, 90222, 1205–1220.
AUTHOR'S SELF GENERATED
340 Innovations in Computational Intelligence: Trends and Technologies
[3] Zulfiqar Ali, Ghulam Muhammad, Moham- IoT and Cloud: A Case Study of Voice
med F. Alhamid. (2017). An Automatic Pathology Monitoring.55 (1), 11917, 69–73,
Health Monitoring System for Patients Suf- DOI: 10.1109/MCOM.2017.1600425CM.
fering From Voice Complications in Smart [7] Naif Al Mudawi. (2022). Integration
Cities.5, 30917, 3900–3908. DOI:10.1109/ of IoT and Fog Computing in Health-
ACCESS.2017.2680467. care Based the Smart Intensive Units. 10,
[4] Naveen, R. K. Sharma, Anil Ramachandran 60222, 59906–59918, DOI:10.1109/
Nair. (2019). IoT-based Secure Healthcare ACCESS.2022.3179704.
Monitoring System.101719. DOI:10.1109/ [8] V Tamilselvi, S Sribalaji, P Vigneshwaran, P
ICECCT.2019.8868984. Vinu, J. GeethaRamani. (2020). IoT Based
[5] Samira Akhbarifar, Hamid Haj Seyyed Health Monitoring System.42320, DOI:
Javadi, Amir Masoud Rahmani and Mehdi 10.1109/ICACCS48705.2020.9074192.
Hosseinzadeh. (2020). Secure Health Mon- [9] Lorin Anton, Theodor Borangiu, Silviu Raile-
itoring Communication Systems Based anu, Iulia Iacob and Silvia Anton. (2018).
on IoT and Cloud Computing for Medi- Managing Patient Observation Sheets in
cal Emergency Applications.27, 697–713, Hospitals Using Cloud Services.331, 91318.
111620. [10] Ebrahim Al Alkeem, Dina Shehada, Chan
[6] [Ghulam Muhammad, SK Md Mizanur Rah- Yeob Yeun, M. Jamal Zemerly and Jiankun
man, Abdulhameed Alelaiwi, Atif Alamri. Hu. (2017). New secure healthcare system
(2017).Smart Health Solution Integrating using cloud of things. 20, 50517, 2211–2229.
46 Detection of melanoma using
DenseNet-based adaptive weighted loss
function
Rishi Agrawal
Department of CEA, GLA University, Mathura, India
Abstract: Skin cancer is currently the most prevalent and terrible disease on a global scale. Malignant mela-
noma (MM) is less common than other forms of skin cancer in terms of incidence, but it has the highest mor-
tality rate. Lesion removal can be used to treat MM when it is diagnosed at an earlier stage. However, the risk
of death increases if the diagnosis has been made later. So an early melanoma detection method is proposed
using the DenseNet-based Adaptive Weighted Loss function. The experimental work was performed on the
ISIC-2019 Dataset. The proposed model scored a balanced accuracy of 68.4% which is better than traditional
deep learning methods.
Keywords: Adaptive weighted, DenseNet, ISIC-2019, dataset loss function, malignant melanoma
[email protected]
DOI: 10.1201/9781003606635-46
342 Innovations in Computational Intelligence: Trends and Technologies
introduced in recent years with the use of objects of various sizes in images. It featured
supervised ML techniques. the innovative Inception module, which used
Numerous clinical classifications can be multiple filter sizes within a single layer.
AQ1: carried out using CNNs and their impres-
Please
define
sive standard [6]. Additionally, CNN-related 2.2. ResNet[14]
CNN methods were mostly used for the classifica-
One of the most famous variants of ResNet
in full tion of skin lesions and performed very well
at first is ResNet-50, which has 50 layers. There
in comparison to other methods. Contrary
mention are also other variants like ResNet-18,
to conventional methods, large CNN-related
ResNet-101, and so on, which vary in terms
methods to classify skin lesions have been
of the number of layers and model complex-
applied to real or previously processed skin
ity. These deeper architectures have been
lesion pictures without image segmentation.
shown to perform exceptionally well on a
The influence of skin cancer detection on
variety of applications. ResNet and its vari-
CNN-based classifiers has not yet been fully
ants have significantly contributed to the suc-
revealed, despite the best classification results
cess of deep learning in various domains by
from Convolutional neural approaches to
enabling the training of very deep networks
skin infection classification without lesion
without facing severe optimization chal-
segmentation methodologies [7]. Only a small
lenges. ResNet introduces the “bottleneck”
number of studies have used lesion segmenta-
architecture within each residual block. This
tion features to improve model performance
helps in reducing computational complexity
in CNN-related classification workflow.
while retaining representational.
CNN employed for melanoma or non-mel-
anoma skin cancer scanning is not validated
in medical trials, which is still regarded as a 2.3. ResNeXt[15]
severe limitation [8–11]. The classification ResNeXt is a deep learning architecture that
of benign and malign lesions is carried out enhances the capabilities of CNNs by intro-
by ML in numerous diagnosing procedures, ducing grouped convolutions and the con-
predominantly, teledermatology, portable cept of cardinality. Researchers continue to
sectors, and custom vaccinations, in addition explore and adapt its principles for various
to the straightforward procedure. Knowing applications in image analysis and beyond.
what kind of DL methodology one to spec- Similar to ResNet, ResNeXt uses bottleneck
ify the usage and application to control and architectures in its residual blocks. ResNeXt
improve the methods used by individuals. architectures can vary in depth and cardinal-
ity. A typical ResNeXt model might consist
of multiple residual blocks stacked together,
2. Related Work with each block containing grouped convolu-
Recent research explores many Deep CNN tional layers.
models that can be efficiently applied for the
detection of melanoma.
(5)
where the weight coefficient w(i=1, ...,
4) reflects threshold values in relation to • The features maps of all preceding layers
computed gradient. as shown in Fig. 3. Eq. (6):
344 Innovations in Computational Intelligence: Trends and Technologies
Abstract: The traditional total cross-tied (TCT) model and an advanced permutation combination reconfigura-
tion (PCR) are employed to analyze the performance of the solar arrays under realistic partial shading condi-
tions (PSCs). The model uses a single-diode solar cell using the MATLAB/SIMULINK tool. The performance
indicators are evaluated to show the high potency of advanced PCR over TCT under various PSCs. Results
show that the advanced PCR has minimized the shading loss (SL) by 9.28% and 76.78% under lamp post-shape
shading and corner shading (CS) against TCT. Also, advanced PCR has maximized the global power (GP) by
14.55% which has been verified by a hardware prototype under CS. These outstanding results of the advanced
PCR support the practicality of the suggested technique (PCR).
Keywords: Efficiency, global power, partial shading conditions, permutation combination reconfiguration, total
cross-tied
DOI: 10.1201/9781003606635-47
Advanced reconfigured solar arrays to attenuate shading loss under partial shading conditions 347
(3)
conditions, both TCT and PCR generate 4.4 Execution Ratio (ER)
160 W. Under various shadings (LPS and CS),
It is calculated by Eq. (5) [5].
multiple power peaks are generated. This
leads to the reduction in global power gen- (5)
eration as depicted in Figure 47.6.
For TCT under LPS and CS, ER is 58.46%
4.2. Quantitative Results and 71.82% respectively. The advanced PCR
improves it to 61.99% and 84.05% under the
The quantitative results obtained for the pro- LPS and CS respectively. Figure 47.8 shows
posed work under various shading cases are the execution ratio plot for TCT and PCR
depicted in Table 47.1. under shading conditions.
(4)
Figure 47.6. Global power plot. Figure 47.8. Execution ratio plot.
Source: AUTHOR'S SELF GENERATED Source: AUTHOR'S SELF GENERATED
(6)
Shading: Experimental
• The advanced PCR attenuates the SL by
Validation
9.28% and 76.78% under both the shad-
The proposed work is verified experimentally ing conditions respectively.
under CS. The advanced PCR attains maximum • The advanced PCR improves ER to
power at 135.53 W whereas the conventional 61.99% and 84.05% under the LPS and
TCT reduces it to 115.80 W. The experimental CS respectively.
output curve is depicted in Figure 47.10. • Reduced cross-connections and more shift
of the maximum power peak (GP) on the
output curves are the key reasons for the
5. Conclusion and Future Scope
excellent performance of the advanced
An extensive study has been performed to vali- PCR over TCT under the shading cases.
date the outstanding performance of advanced In the future, this work can be extended
PCR over conventional TCT. It is done under for large-size solar arrays by adding small 4
two realistic shading conditions. Four perfor- × 4 solar arrays. This will help in extracting
mance indices have been calculated. Following more power at the commercial level.
are the few key results of this study:
• As compared to conventional TCT, the
advanced PCR maximizes the GP by References
5.70% and 14.55% under considered [1] Nihanth, M. S. S., Ram, J. P., Pillai, D. S.,
shadings respectively. Ghias, A. M. Y. M., Garg, A., and Rajasekar,
Advanced reconfigured solar arrays to attenuate shading loss under partial shading conditions 351
N. (2019). Enhanced power production in Model Under Realistic Partial Shading Con-
PV arrays using a new skyscraper puzzle ditions. International Conference on Green
based one-time reconfiguration procedure Energy, Computing and Sustainable Tech-
under partial shade conditions (PSCs). Sol. nology (GECOST) 258–263.
Energy 194:209–224. [9] Mishra, V. L., Chauhan, Y. K., and Verma,
[2] Nasiruddin, I., Khatoon, S., Jalil, M. F., and K. S. (2022). A critical review on advanced
Bansal, R. C. (2019). Shade diffusion of reconfigured models and metaheuristics-
partial shaded PV array by using odd-even based MPPT to address complex shadings
structure. Sol. Energy 181:519–529. of the solar array. Energy Convers. Manag.
[3] Yadav, K., Kumar, B., and Swaroop, D. 269:116099–116135.
(2020). Mitigation of Mismatch Power [10] Nassef, A. M., Houssein, E. H., Helmy, B.
Losses of PV Array under Partial Shading E., Fathy, A., Alghaythi, M. L., and Rezk
Condition using novel Odd Even Configura- H. (2022). Optimal reconfiguration strat-
tion. Energy Reports 6:427–437. egy based on modified Runge Kutta opti-
[4] Sugumar, S., Winston, D. P., and Pravin, mizer to mitigate partial shading condition
M. (2021). A novel on-time partial shad- in photovoltaic systems. Energy Reports
ing detection technique for electrical recon- 8:7242–7262.
figuration in solar PV system. Sol. Energy [11] Mishra, V. L., Chauhan, Y. K., and Verma, K.
225:1009–1025. S. (2023). A new physics-based solar recon-
[5] Rezazadeh, S., Moradzadeh, A., Hashemza- figured model to enhance efficiency under
deh, S. M., Pourhossein, K., Ivatloo, B. M., partial shading conditions: Experimental fea-
and Hosseini, S. H. (2021). A novel prime sibility. Int. J. Green Energy 21(3):589–624.
numbers-based PV array reconfiguration [12] Faisal, M., Sharma, D., and Bansal, R. C.
solution to produce maximum energy under (2023). Cross kit reconfiguration algorithm
partial shade conditions. Sustain. Energy for enhanced output power of PV array dur-
Technol. Assessments 47:101498–101522. ing shading mismatch conditions. Optik
[6] Mishra, V. L., Chauhan, Y. K., and Verma, (Stuttg) 288:171218–171244.
K. S. (2022). A novel PV array reconfigu- [13] Mishra, V. L., Chauhan, Y. K., and Verma, K.
ration approach to mitigate non-uniform S. (2023). A comprehensive investigation of a
irradiation effect. Energy Convers. Manag. solar array with wire length under partial shad-
265:115728, 2022. ing conditions. Energy Sources, Part A Recover.
[7] Kannan, E., Avudaiappan, M., Kaliyaperu- Util. Environ. Eff. 45(4):10217–10241.
mal, S., Muthusamy, S., Panchal, H., Pan- [14] Mishra, V. L., Chauhan, Y. K., and Verma,
diyan, S., and Azhaganantham A. (2022). A K. S. (2023). A novel reconfiguration of
novel strategy for implementation of intelli- the solar array to enhance peak power and
gent techniques in solar photovoltaic arrays efficiency under partial shading conditions:
to improve the performance and various experimental validation. Clean Energy
comparison of partial shading mitigating 7(4):824-843.
techniques. Energy Sources, Part A Recover. [15] Mishra, V. L., Chauhan, Y. K., and Verma, K.
Util. Environ. Eff. 44(2):3079–3099. S. (2023). Various Modeling Approaches of
[8] Mishra, V. L., Chauhan, Y. K., and Verma, Photovoltaic Module: A Comparative Anal-
K. S. (2022). Peak Power Enhancement by ysis. Majlesi Journal of Electrical Engineer-
Novel Reconfiguration Scheme of a Solar ing 17(2):117–131.
48 Understanding the relationship of
quantum mechanics and machine
learning
Sushamana Sharma
Department of Physics, Jodhpur Institute of Engineering and Technology, Jodhpur, India
Abstract: The field of quantum mechanics is yet to be explored fully but still has great applications particularly
in quantum information processing. The need of alliance of quantum mechanics and machine learning (ML)
is discussed. The speed up achieved in quantum computation is the main reason of looking forward to use
quantum mechanics to reduce time complexity in learning process. Quantum superposition seems to be able
to reduce sample complexity of ML algorithm by reducing number of examples required to learn a task. The
hurdles in this path and the possible techniques to conquer these are examined at the understanding level. The
main aspects of quantum ML are discussed.
Keywords: Machine learning, quantum mechanics, quantum machine learning, supervised machine learning
[email protected]
DOI: 10.1201/9781003606635-48
Understanding the relationship of quantum mechanics and machine learning 353
the other particle collapses instantaneously. is given by |c0|2(|c1|2). The simplest qubit has
It could be explained in two ways: (1) the the form |ψ⟩ = 1 (|0⟩ + |1⟩) with probabil-
interaction between particles is faster than the √2
speed of light or (2) the correlation between ity of having outcome 0 or 1 is equal i.e. the
particles decides the final quantum state in probability of finding an electron in up spin
advance which implies the incompleteness of is 50% of the time likewise in down spin,
quantum mechanics. This correlation in quan- its chances are 50%. The density matrix is
tum states is known as quantum entanglement defined as ρ = |ψ⟩⟨ψ| having the value of trace
(Horodecki et al., 2009). Despite of the com- one and is semi-definite positive, helping in
plexities, quantum theory is undoubtedly the defining probability distribution which reveal
most successful quantitative theory of nature the nature of state whether classical or non-
that provides description of physical proper- classical. The negative values of probability
ties. Its applicability ranges from elementary distribution indicate the nonclassical behav-
particles like quarks to gigantic objects like ior of the state. There are three distribution
galaxies, from lasers and transistors to nuclear defined namely, Glauber–Sudarshan distribu-
magnetic resonators and quantum computers. tion, Wigner distribution and Husimi func-
The field of computation is also changing to tion. The Glauber–Sudarshan distribution
provide faster and secure processing and it is used to describe light in optical phase space
achievable with the help of quantum states like and has many applications in laser theory
squeezed states (Teich and Saleh, 1989), entan- and coherence theory. For nonclassical states
gled states. The use of quantum laws ensures like entangled state, the Wigner probability
security of the information in the channel distribution is non-positive and using Husimi
and very fast processing. Quantum informa- function, maximally nonclassical state can
tion processing (Nielsen and Chuang 2010) is be generated. Recent advances in the field
well-established concept nowadays. Less runt- of information processing and technology
ime and applicability of quantum laws hints use quantum laws to have faster and secure
the use of quantum computation in ML. An processing because of its capability to man-
attempt is made to explain the emerging field age big data size efficiently. The nonclassi-
of quantum ML to a general reader to encour- cal states such as squeezed states, entangled
age them. states are the gateway of not-so-far future
technology. It is possible to perform a large
number of operations in parallel in quantum
2. Quantum Mechanics and computer which makes them different from
Computation classical computer and this process of per-
In quantum mechanics, a physical state is rep- forming many tasks in parallel is known as
resented by a mathematical function which quantum parallelism. Two main constraints
by the superposition principle can be writ- on quantum information processing are: no
whose result is obtained by the probability to increase the accuracy and to make predic-
distribution of the final density matrix. The tions on the basis of their experience. In ML,
logic gates can be considered as the applica- the data is fed to the system to train the algo-
tion of unitary matrices on small number of rithm to analyze the data, prepare appropri-
qubits and to record multiple qubits, regis- ate model to perform certain task and make
ters are arranged using tensor product which predictions. Based on the process of learning,
induces interference effect responsible for ML is categorized in four types mentioned
evaluation of a function on every point in the below.
domain simultaneously. This property makes
the quantum computers to perform some • Supervised ML in which the results of
tasks faster than classical system, sometimes past data analysis is used to study the
exponentially faster. For example, the Shor’s new data i.e. the algorithm trained the
integer factorization algorithm for quantum machine to generate a function based on
computers takes time 𝒪((log N)3) while the the conclusions derived for known input-
1 2 output pairs (labelled data) e.g. prediction
classical devices take time 𝒪((log N)3)(log N)3) of price of land or house (see Figure 48.1).
to factorize an integer N which outperforms For precise predictions, the ML models
the RSA encryption protocol (Montanaro used labelled data which is a data set hav-
2016). Here, the notation 𝒪(f(m)) is taken ing information of similar type data. For
from computer science to compare the per- example, a labelled data named cat has all
formance of algorithms. To characterize a the feature of a cat like its shape, height,
problem, “m” parameters are required then color, eyes, ears and others. Now someone
the upper bound on the asymptotic scaling of provides information of height, weight,
the algorithm will be the function f(m) i.e. it color of an animal to the system then ML
depends on the size of the input. will predict outcome using the labelled
The efficiency of quantum computer relies data and if the input maps with the label
on how efficiently a quantum algorithm can
run which requires large scale interference.
Interference is very fragile in nature making
the large scale computation almost impossi-
ble with precision therefore some techniques
are needed to convert impossible to possible.
There is a threshold in the physical error i.e.
the disturbance in interference below which
there is a possibility to correct the quantum
system and to make it work efficiently with-
out disturbing the interference using some
codes known as quantum error correction
(Ciliberto et al., 2018).
3. Machine Learning
The term ML was first used by Arthur Samuel
in 1959 during his research in the game of
checkers where the computer was not pro- AQ2:
Please
grammed explicitly to perform certain task. Figure 48.1. Showing labeled data for provide
In other words, it is the learning of a machine supervised ML. source for
just like the human learns by improving skills Source: AUTHOR'S SELF GENERATED
the figure.
Understanding the relationship of quantum mechanics and machine learning 355
cat, the best prediction will be a cat. similar data and then will separate the
Another example can be the estimation of images of dogs from cats. The examples
a price of a land in a given locality. The of association rule are stock market pre-
labelled data will have all the information dictions, suggestions after surfing particu-
like the price in the same locality in past lar website like “people who visit this site
years, the price of land in its neighbor- also visit”.
hood, size of land, location of land like a Flowchart of clustering method:
corner, future projects nearby and others.
When one feeds information for rate esti- Random raw data
mation, the ML will access that labelled ↓
data and make accurate prediction. formation of clustering of similar kind data
The flowchart of supervised ML is given ↓
above. ML processing using cluster
↓
Random raw data Accurate prediction
↓
Data labelling of similar kind data Flowchart of association rule:
↓
ML processing using input – output data set Random raw data
↓ ↓
Accurate prediction Data collection based on relationship
↓
• As we humans learn something from oth- ML processing
ers experience while something is learnt ↓
through our own experience. Just like Accurate prediction
human learning process, machine also
learnt from labelled data set as well as • In semi-supervised learning, algorithms
something from its own. How machine are fed with labelled and unlabelled data
learns from its own experience is the sec- i.e. it is a mixture of supervised and unsu-
ond type of ML i.e. Unsupervised learn- pervised ML. The machine learnt from
ing where the machine is trained without labelled as well as from unlabelled data
labelled data to make conclusions from to predict accurately just like supervised
the new data set. The machine itself cat- ML. it is preferable when very large data
egorizes data from the given data set is unlabelled and it is not desirable to label
based on the data type and data size. it. In simple words, the raw data is pro-
The grouping of data based on similari- cessed by unsupervised learning and then
ties is a method of unsupervised learning the intermediate prediction is processed
known as clustering while classification through labelled data set for most accu-
of data on the basis of some relationship rate prediction. It is mainly use to solve
is known as association rule. Third tech- regression and classification problems like
nique is the dimensionality reduction used text classification.
to reduce the data set size without com- • The reinforcement ML requires no cor-
promising with the integrity of the data rectness of input–output data set and it
set as much as possible. How can ML be is learning through surrounding, experi-
used to differentiate between the pictures ence and continuous improvement after
of dogs and cats? Here the machine will every observation e.g. driverless car. It is
collect the data and then make cluster of just like we humans learn i.e. collecting
356 Innovations in Computational Intelligence: Trends and Technologies
data by observation then making a deci- solution of a learning problem 𝒪(N3) is where
sion and then the feedback whether it was N is the number of examples in the training
a good decision. Here, the observation data. Using different types of regularization
means the available data, the prediction or optimization methods it can be improved
or decision based on it and then the feed- to 𝒪(N2). Which type of regularization strat-
back to know whether the action taken egy will be used, is selected by the sampling
was beneficial. to be performed. The training time reduces
significantly only for the dataset of moderate
Out of these four, the well-established and size but the modern dataset is quite big and
mature theory is the supervised ML which still increasing, the time is too demanding.
learns by putting the data set into mathe-
matical foundation where from a learner can
approximate an unknown function. There 4. Quantum Machine Learning
are mainly two different models for learn- The large data size increases computational
ing, probably approximately correct model complexity and computational time. These
proposed (Valiant 1984) and the statistical are the two main hurdles in the wide use
learning theory (Vapnik 1998). Valiant pro- of ML using classical computation. Paral-
posed a precise computational model of the lel processing due to quantum superposition
learning which consists of a mechanism for is the key feature for the speed up in quan-
the collection of information, learning pro- tum computation and if the training set can
cedure and assurance whether the learning be converted into superposed form, quan-
can be done in polynomial number of steps in tum computation may help in reducing the
simple words it gives correct complexity-the- runtime of ML algorithm. Now the question
oretic meaning of a concept class to be learn- arises, can we do this, if yes, how? For quan-
able. In this protocol, the learner must have tum computers, the dataset must be in quan-
the relevant data to exemplify the concept to tum form in other words dataset describing
be learned by the machine and the examples the state of quantum system and its evolution.
are distributed in a probabilistic way (Valiant To collect information, measurement is done
1984). The significance of the examples with on the system. In classical system, there is
the concept is tested by a routine Oracle. In no loss of information as independent meas-
the statistical learning model, the selection urements are done on the sub-system but in
of function is based on the actual data avail- quantum system due to non-local behavior
able. In any model, efficiency of the learner of particle, it is impractical to make a joint
represented by two parameters one is sample measurement on the quantum system having
complexity and the other is time complexity. N subsystems as well as it is not preferable to
To learn a function, the number of examples measure individual subsystem as it costs loss
required is a measure of sample complex- of data. There are two possible ways to get
ity that means the minimum the number of quantum data: one is to use the data in quan-
examples, the lower is the complexity and tum form i.e. data obtained by the process in
the minimum runtime of the algorithm gives which input argument and output of a quan-
measure of time complexity. The aim of ML tum function describe the quantum state of
is to create a statistical estimator which fits a system just like in quantum chemistry and
well with the new examples and assure good the other is to convert data stored in classi-
prediction performance. To improve the time cal form. The former option is preferable for
complexity, optimization techniques are quantum ML but it is not always possible to
used. In context of classical computation, the have information in quantum form. With the
time complexity of the process of finding the second choice, there must be some procedure
Understanding the relationship of quantum mechanics and machine learning 357
to get quantum states from classical informa- computation quadratically (Grover and
tion which cost the uncertainty in getting the Rudolph 2002). This is how time complexity
desired runtime in ML for classical data and can be dealt in ML using the laws of quantum
the computational expenses. The quantum mechanics. For sample complexity, there are
random access memory (QRAM) may trans- number of research papers on quantum prob-
form the classical information into quantum ably approximately correct model (Servedio
superposition. Just like RAM structure con- and Gortler 2004; Atici and Servedio 2005;
sisting of input register, memory array and Zhang 2010; Arunachalam and Wolf 2017).
output register, QRAM has the same archi- For instance, the quantum example for a con-
tecture for qubits that means it accesses mem- cept to be learned c:{0,1}n→{0,1} returns a
ory in quantum superposition. It is possible if (n+1) qubit state as per some uniform distri-
the input register i has addresses in superpo- bution D(x) provided (Bshouty and Jackson
sition state mathematically the input register 2008) i.e.
reads as ∑jψj|j⟩i and when processed through
QRAM, it gets superposed with the data in
data register d and returns what is known as
quantum data. There is a quantum algorithm for the
formation of clusters of data which is being
implemented in few-qubit Noisy Interme-
diate-Scale Quantum devices (Bermejo and
Here, Dj is the content stored at location Orus 2023). The idea is to use maximally
j in memory array. It is shown in reference orthogonal states in Hilbert space to address
(Giovannetti et al., 2008) that QRAM can large clusters with fewer qubits.
encode N d-dimensional vectors in ℝd into
log (Nd) qubits in time 𝒪(log (Nd)) requiring
the physical resources of the scale 𝒪(Nd). This 5. Conclusion
exponential scaling makes this idea uncertain It is difficult to conclude here as it is still grow-
in its physical realization as well as its compu- ing field in research by the quantum physics
tational benefits which are addressed by (Aar- and computer science community. It is a try
onson 2015, 292). Besides scaling issue, this to understand these two fields and their col-
concept also faces a problem with the active, laboration in a better way. There is no experi-
non-active and error-free number of compo- mental evidence of the exponential speed up
nents required (Arunachalam et al., 2015). in quantum computation and the encoding
Grover and Rudolph also proposed a model of classical information in quantum super-
based on efficiently integrable probability position efficiently. Having efficient quan-
distribution. According to this, a quantum tum hardware to support polynomial speed
superposition state can be generated having up will help in large scale ML but there is
vaguely all the information of classical prob- no single method to realize physically quan-
ability distribution. If there were an efficient tum computer in labs even though different
classical algorithm, the given probability dis- methods like ion trap, photon qubits, nuclear
tribution can be transformed into quantum magnetic resonance, optical lattice may be
superposed distribution or atleast in mixed used. The clubbing of quantum mechan-
state ρ = ∑ipi|ψ⟩⟨ψ| where pi is the probabil- ics and ML will definitely improve classical
ity distribution in classical form. Grover and ML in terms of sample complexity and time
Rudolph showed that the application of this complexity. These play significant role when
technique for the estimation of amplitude of the system is dealing with large size data. By
Fourier component is faster than in classical improving efficiency of QRAM large dataset
358 Innovations in Computational Intelligence: Trends and Technologies
can be handled and utilized for quantum [10] Aaronson, Scott. 2015. Read the fine print
ML. But it is evident that the quantum effects Nature Physics 11, (April):291–293. https://
make learning easy as compared to classical doi.org/10.1038/nphys3272.
case depending on the type of learning model [11] Arunachalam, S., Gheorghiu, V., Jochym-
we used. O’Connor, T., Mosca, M., and Srinivasan,
P. V. (2015). On the robustness of bucket
brigade quantum RAM. New journal of
Physics 17:123010(1–17).
References [12] Grover, Lov, and Rudolph, Terry 2002. Cre-
[1] Einstein, A., Podolsky, B., and Rosen, N. ating superpositions that correspond to effi-
(1935). Can quantum mechanical descrip- ciently integrable probability distributions
tion of physical reality be considered com- http://arxiv.org/abs/quant-ph/0208112.
plete?. Physical Review 47(10):777–780. [13] Servedio, Rocco. A., and Gortler, Steven
[2] Horodecki, R., Horodecki, P., Horodecki, J. (2004). Equivalences and separations
M., and Horodecki, K. (2009). Quantum between quantum and classical learnability
entanglement. Reviews of Modern Physics SIAM J. Comput. 33, no. 5:1067–1092.
81(2):865–942. [14] Atici, Alp, and Servedio, Rocco. A. 2005.
[3] Teich, M. C., and Saleh, B. E. 1989. Squeezed Improved Bounds on Quantum Learning
state of light Quantum Opt. 1, no. 2:153– Algorithms Quantum Inf. Process 4, no. 5
191. DOI 10.1088/0954-8998/1/2/006. (October):355–386.
[4] Nielsen, M. A., and I.L. Chuang. 2010. [15] Zhang, Chi 2010. An improved lower bound
Quantum Computation and Quantum Infor- on query complexity for quantum PAC
mation. 10th ed. Cambridge University Press. learning Inf. Process. Lett. 111, no. 1(Decem-
[5] Montanaro, Ashley. 2016. Quantum algo- ber):40–45. https://doi.org/10.1016/j.ipl.
rithms: an overview NPJ Quantum Infor- 2010.10.007.
mation 2, (January):15023. https://doi. [16] Arunachalam, Srinivasan, and de Wolf, R.
org/10.1038/npjqi.2015.23. 2017. Optimal quantum sample complexity
[6] Ciliberto, C., Herbster, M., Ialongo, A. D., of learning algorithms In Proc. 32nd Compu-
Pontil, M., Rocchetto, A., Severini, S., and tational Complexity Conference, edited by
Wossnig, L. (2018). Quantum machine Ryan O’Donnell, LIPIcs. Germany:Dagstuhl
learning: a classical perspective. Proc. R. Publishing.
Soc. A 474(2209): 20170551(1–26). http:// [17] Bshouty, Nader H., and Jackson, Jaf-
doi.org/10.1098/rspa.2017.0551. frey C. 2008. Learning DNF over the
[7] Valiant, L. G. 1984. A theory of the learn- Uniform Distribution using a Quantum
able Commun. ACM. 27, no. 11 (Novem- Example Oracle SIAM J. Comput. 28, no.
ber):1134–1142. https://doi.org/10.1145/ 3(January):1136–1153. doi.org/10.1137/
1968.1972. S0097539795293123.
[8] Vapnik, Vladimir N. 1998. Statistical learn- [18] Bermejo, Pablo, and Orus, Roman 2023.
ing theory. Vol. 1. New York NY:Wiley. Variational quantum and quantum-
[9] Giovannetti, V., Lloyd, S., and Maccone, L. inspired clustering Scientific Reports 13,
(2008). Quantum Random Access Memory. (August):13284. https://doi.org/10.1038/
Phys. Rev. Lett. 100(16): 160501. s41598-023-39771-6
49 Employability prediction: A machine
learning model for computer science
students
Abhishek Bhattacherjeea and Vinay Kukrejab
Department of Computer Science and Engineering, Chitkara University Institute of Engineering and
Technology, Punjab, India
Abstract: The current study targets to find a suitable machine learning (ML) model that helps in predicting
computer science students’ employability. Three different ML models have been implemented on the collected
data after consideration of six features. The data is collected from 210 students and the algorithms that have
been used are a Support vector machine, decision tree, and artificial neural network. Different performance
metrics have been used while implementing ML algorithms. The metrics that have been used are accuracy,
F1-score, precision, recall, and Matthew’s correlation coefficient (MCC). SVM has outperformed the other two
algorithms in the case of Accuracy, Recall, F1-score, and MCC. These values for SVM are 88.10%, 96.97%,
92.75% and 0.6159 respectively whereas for DT is 83.33%, 89.19%, 90.41% and 0.2701 and for ANN is
85.71%, 96.88%, 91.18% and 0.5705. It can be seen that SVM has outperformed the other two algorithms.
This study can be very beneficial to colleges and universities and will help them to put stress on only the features
that students are lacking for employability.
Keywords: Artificial neural network, classification, decision tree, employability, support vector machine
[email protected]; [email protected]
a
DOI: 10.1201/9781003606635-49
360 Innovations in Computational Intelligence: Trends and Technologies
required skills. Researchers in the past have communication skills, and core employabil-
used KNN, random forest, SVM, decision tree ity skills. The researchers (Finch et al. 2013)
(DT), Naïve Bayes, etc. (Casuat and Festijo have tried to explore the factors that impact
2019), (Bharambe et al. 2017), (Nagaria and undergraduate employability. They have
Senthil Velan 2020) whereas some have tried identified 17 factors and further that have
to build their instrument scale for student categorized these 17 factors into five and
employability (Rothwell, Herbert, and Roth- they have also calculated the relative impor-
well 2008), (Behle 2020). The current study tance of these identified categories. The
has implemented different ML algorithms study aims to inculcate soft skills and prob-
after figuring out the skillset that is needed lem-solving skills in undergraduate students
by the students for a job opportunity. The that help in their employability. The authors
current study has also compared the results (Fok et al. 2018) have used the deep learning
of different ML algorithms with a detailed model to know the students’ development
discussion. performance. They have evaluated both aca-
demic as well as non-academic performance.
1.1. The layout of this paper They have used 25% of the collected data
for training and 75% for testing and have
This paper has described the related work in achieved an accuracy between 80 to 91 per-
Section 2. Section 3 has discussed the pro- cent. Moreover, they have tried to figure out
posed method that is followed by Section 4 the strengths and weaknesses of the students.
which focuses on materials and methods. The They have also identified the eligible com-
last section 5 mentioned the results and con- panies in which students can participate by
clusion of the study. matching their skill set. The authors (Nesrine
Mezhoudi, Rawan Alghamdi, Rim Aljunaid
2021) have conducted a detailed survey and
2. Related Work worked on the four objectives. Firstly, they
The literature shows that researchers have have identified the different data mining
worked on many features for the students’ applications that have been used in the past
employability prediction and many differ- for employability prediction. Secondly, the
ent algorithms have been implemented. The survey was conducted to identify the skills
authors (Casuat and Festijo 2019) have that students lack to be employable, thirdly
worked on features like soft skills and com- they have stressed the adjusting the curricu-
munication skills. They have used algo- lum according to their future employment,
rithms like DTs, support vector machines and lastly, they have tried to see the long
(SVMs), and random forests. The research- term demands of the market that helps in the
ers (Kenayathulla and Idris 2019) have con- students’ employment. An ensemble model
ducted a study in Malaysia and have tried (R. R. Maaliw, K. A. C. Quing, A. C. Lag-
to figure out the skills that are required for man, B. H. Ugalde 2022) was created by the
employability. They have tried to differen- researchers to predict the students’ employ-
tiate between the competence of skills and ability. They have used different data mining
the importance of skills that are required techniques for this. The model that has used
for employment. A model was developed Random Forest, SVM, and Naïve Bayes has
(Sinha, Ghosh, and Mishra 2020) in which achieved the highest accuracy of 93.33%.
employers’ expectations and employer per- They have tried to impose some policies that
ceptions are checked against the employers’ will provide help to students in their employ-
satisfaction level. Employers’ expectations ment. A hybrid model of deep belief network
are measured through technical skills, and softmax regression has been created by
Employability prediction: A machine learning model for computer science students 361
3. Proposed Methodology
The employability of computer science engi-
neering students is measured with the help of AQ2:
different ML algorithms and they are com- Please
pared with different metrics. Figure 49.1 Figure 49.1. Proposed methodology.
provide
source for
shows the methodology for predicting the the figure.
Source:
computer science students of engineering col-
leges and universities.
Figure 49.1 shows the current study 4. Materials and Methods
methodology, first of all, the dataset is col-
lected from passing-out students. A total 4.1. Data Collection
of 210 students’ data has been collected The data is collected from 225 students, out
and has six features. After the collection of of which 210 students’ data is in the correct
data, data is preprocessed and all the null form and completed in all aspects. The data
or vacant entries are filled with suitable val- mainly targets six features and they are men-
ues unless these entries are dropped from tioned in Table 49.1.
the collected data. The preprocessed data
is divided into two parts, the first part is Table 49.1. Students’ employability features
used for training of data, and the second
part targets testing of data. Different ML Feature Number Description
algorithms have been applied to the col- 1 Soft skills
lected preprocessed data. The algorithms 2 Problem-solving skills
that have been used for implementation 3 Technical skills
for predicting the students’ employability
4 Innovations skills
are SVM, DT, and artificial neural network AQ3:
(ANN). After getting the implementation 5 Personal Qualities Please
6 Perceptions towards provide
results of the above-mentioned algorithms, source
the results are compared based on accuracy, employability for all the
recall, and precision. Source: tables.
362 Innovations in Computational Intelligence: Trends and Technologies
The soft skills feature includes interper- of a hyperplane that distinguishes the data
sonal and communication skills. Problem- points in proper classes. It is very effective in
solving skills target the capability skills to the case of high-dimensional spaces and known
solve problems. Technical skills are associ- as a memory-efficient algorithm.
ated with the technical skills that they have
learned in their course. Innovation skills are 4.4.2. DT
related to the innovative ideas that students
This is one of the most effective algorithms
can generate while working on problems.
for prediction and classification. It follows
Personal qualities are the qualities that are
a tree-like structure, internal nodes mention
associated with their behavior. The important
attributes, branches mention output, and
feature is that what are the perceptions of the
leaf nodes tell the class labels. This algorithm
students toward employability.
requires less computation and helps to iden-
tify the fields that are essential for prediction
4.2. Data pre-processing as well as class classification.
First of all, data cleaning is done on the col-
lected data in the data pre-processing step. 4.4.3. ANN
The missed data is replaced with the mean This machine-learning algorithm is inspired
value and the noisy data which cannot be by the human brain and is used for pattern
filled with appropriate value is dropped. After recognition, classification, and clustering.
performing data cleaning, data integration is They are popularly known as computational
performed. It means the data is merged from models. They have a very high processing
different sources into one data store. Next, speed and are having very little response time.
data transformation is performed. All the They support serial processing.
data is normalized using normalized meth-
ods. And at the last, data reduction is used. It
helps in the dimension reduction of the data. 4.5. Performance parameters
The three algorithms have been implemented
4.3. Training and testing data to know the computer science engineering
students’ employability. The different perfor-
Now, the important step in the ML algorithm mance measures have been used and they are
is to divide the data into the training set and mentioned below (Casuat and Festijo 2019).
testing set. It is divided into a ratio of 80% Table 49.2 shows the results of the learning
and 20%. It means 168 students’ data is used algorithms.
for training and 42 students’ data is used for
testing. 4.5.1. Precision
This is one of the performance metrics used
4.4. Algorithms
by ML algorithms. It aims to know the model
In the current study, three algorithms have quality by using positive predictions. In other
been implemented. Their names are SVM, DT, words, it can be measured by dividing true
and ANN. These are described briefly as: positive predictions by total positive predic-
tions (i.e. true positive and false positive).
4.4.1. SVM The formula for the calculation of precision
is shown in Equation 1.
This is one of the supervised learning algorithms
that are well suited to classification and regres- Precision = True Positives / Positive
sion. This algorithm helps in the identification Predictions(1)
Employability prediction: A machine learning model for computer science students 363
SVM, DT, and ANN are 96.97%, 89.19%, and Training 55 (7): 681–704. https://doi.
and 96.88%. One more rare metric has been org/10.1108/ET-07-2012-0077.
evaluated i.e. Matthew correlation coefficient [7] Fok, Wilton W.T., Y. S. He, H. H.Au Yeung,
and it will be better if it is above 0.5 or nearer K. Y. Law, Kh Cheung, Yy Ai, and P. Ho.
to 1. The SVM value for this metric is 0.6159 2018. Prediction Model for Students’ Future
Development by Deep Learning and Ten-
as compared with DT, ANN is 0.2701 and
sorflow Artificial Intelligence Engine. In 4th
0.5705 respectively. In other words, it can be
International Conference on Information
concluded that SVM has outperformed the Management, ICIM 2018, 103–6. https://doi.
two ML algorithms convincingly. org/10.1109/INFOMAN.2018.8392818.
[8] Kenayathulla, Husaina Banu, and Abdul
Rahman Idris. 2019. Gaps between Com-
References petence and Importance of Employability
[1] Bai, A., Hira, S. 2021. An Intelligent Hybrid Skills : Evidence from Malaysia. Higher
Deep Belief Network Model for Predicting Education Evaluation and Development
Students Employability. Soft Comput Ing 13 (2): 97–112. https://doi.org/10.1108/
25: 9241–9254. HEED-08-2019-0039.
[2] Behle, Heike. 2020. Students’ and Gradu- [9] Nagaria, Jumana, and S. Senthil Velan.
ates’ Employability. A Framework to Clas- 2020. Utilizing Exploratory Data Analysis
sify and Measure Employability Gain. Policy for the Prediction of Campus Placement for
Reviews in Higher Education 4 (1): 105–30. Educational Institutions. 2020 11th Inter-
https://doi.org/10.1080/23322969.2020.17 national Conference on Computing, Com-
12662. munication and Networking Technologies,
[3] Bhagavan, K. Subhash, J. Thangakumar, ICCCNT 2020. https://doi.org/10.1109/
and D. Venkata Subramanian. 2021. Predic- ICCCNT49239.2020.9225441.
tive Analysis of Student Academic Perfor- [10] Nesrine Mezhoudi, Rawan Alghamdi, Rim
mance and Employability Chances Using Aljunaid, Gomathi Krichna and Dilek
HLVQ Algorithm. Journal of Ambient Düştegör. 2021. Employability Prediction:
Intelligence and Humanized Computing A Survey of Current Approaches, Research
12 (3): 3789–97. https://doi.org/10.1007/ Challenges and Applications. Journal of
s12652-019-01674-8. Ambient Intelligence and Humanized
[4] Bharambe, Yogesh, Nikita More, Mani- Computing.
sha Mulchandani, Radha Shankarmani, [11] R. R. Maaliw, K. A. C. Quing, A. C. Lag-
and Sameer Ganesh Shinde. 2017. Assess- man, B. H. Ugalde, M. A. Ballera and M. A.
ing Employability of Students Using Data D. Ligayo. 2022. Employability Prediction
Mining Techniques. In International Con- of Engineering Graduates Using Ensemble
ference on Advances in Computing, Com- Classification Modeling. In 2022 IEEE 12th
munications and Informatics, ICACCI Annual Computing and Communication
2017, 2110–14. https://doi.org/10.1109/ Workshop and Conference (CCWC).
ICACCI.2017.8126157. [12] Rothwell, Andrew, Ian Herbert, and Frances
[5] Casuat, Cherry D, and Enrique D Festijo. Rothwell. 2008. Self-Perceived Employabil-
2019. Predicting Students ’ Employability ity: Construction and Initial Validation of
Using Machine Learning Approach. In 6th a Scale for University Students. Journal of
IEEE International Conference on Engineer- Vocational Behavior 73 (1): 1–12. https://
ing Technologies and Applied Sciences (ICE- doi.org/10.1016/j.jvb.2007.12.001.
TAS) Predicting, 1–5. Newyork. [13] Sinha, Saitab, Piyali Ghosh, and Ashutosh
[6] Finch, David J., Leah K. Hamilton, Riley Mishra. 2020. Employability of Fresh Engi-
Baldwin, and Mark Zehner. 2013. An neering Graduates in India A Fresh Look
Exploratory Study of Factors Affecting Applying Expectation. Education and Train-
Undergraduate Employability. Education ing 62 (1): 47–63. https://doi.org/10.1108/
ET-12-2018-0265.
50 A comprehensive review of innovations
in stray cattle detection
Abdullah Nizamia, Rudrendra Bahadur Singhb, Haris Javedc,
Mohd Anas Nadeemd, and Alok Kumare
Computer Science and Engineering, Babu Banarasi Das Institute of Technology and Management,
Lucknow, India
Abstract: Management of stray cattle population and control is an issue that has received extensive attention in
the past few years due to its effects on the health of the public, their safety, and the welfare of cattle as a whole.
This paper intends to provide an extensive review of the current breakthroughs in the perception of stray ani-
mal technologies and the employed methodologies used to achieve the same. It shall cover an expansive range
of techniques, including computer-vision based systems, approaches using sensor mechanisms and IoT, as well
as those making use of machine learning algorithms. Moreover, the paper discusses the challenges and future
scope of this field, outlining the requirement for interdisciplinary teamwork and innovative solutions to address-
ing this issue with a worldwide impact.
a
[email protected]; [email protected]; [email protected]; dmeanasnadeem@
gmail.com; [email protected]
DOI: 10.1201/9781003606635-50
366 Innovations in Computational Intelligence: Trends and Technologies
shoulder large burdens of protecting their Yuhang Wang et al. (2023), Wang et al.
crops. It results in money lost, safety con- (2023) urgently address the problem of
cerns and reduced farm productivity. Next overgrazing significantly impacting on eco-
research will try to address these problems by systems. They focus on the downsides of
using computer vision and object detection grazing and overbreeding for livestock, a fac-
techniques. tor that largely causes prairie degradation,
Shripad Bhatlawande et al. (2015) (2023), as well as environmental harm. The research
In this paper we use computer vision to help underscores that the more technologically
people with visual impairments stay safe. advanced and efficient tools available today,
Despite the fact that there are many blind/ like satellite and telco network remote sens-
visually impaired who can travel alone, there ing technologies and AI models are much
is a real safety issue because of their fear of better options when it comes to collecting
encountering stray dogs. First, the present data of the livestock from traditional manual
generation of blind assistive technology white methods [5].
cane cannot operate from a distance and thus Knyva et al. (2023), Knyva et al. The epi-
is not capable of preventing interactions with sodes of a (2023) highlight the importance
wandering animals or detecting barriers [2]. in researchers, studying issues such as wild-
Shuzhi Su et al. (2023), In this paper, we life behaviour, habitat, and the interface with
are dealing with the problem of item rec- human-populated areas, monitoring and
ognition in the state-of-the-art on [ref_src] detecting wild animals to detect whether
complex background using object identifi- their study animals are encountering residen-
cation approaches. To model interactions tial or road-based traffic during migration.
among different objects in complex scenes, We present an exciting new paradigm where
the researchers recapitulate a dual-attention the workload is performed by an Internet-of-
vision transformer network by combining Things (IoT) sensor network that operates on
spatial window attention and channel group harvested solar energy and a corresponding
attention. They also introduce an adaptive detection methodology. Nodes in the sensor
path aggregation network, which combines network are low-power embedded systems
the feature maps and suppresses the back- that rely on passive infrared sensors, a long-
ground information effectively with Convo- range (LoRa) module and solar panels for
lutional Block Attention Module (CBAM). power provision. An experimental IoT sen-
[3] Zhaokun Li et al. (2023), Our method sor network, consisting of eight nodes placed
provides comparably strong performance in at 50 meters distance on a road with a gate-
mobile object detection, and is designed spe- way connected for node data aggregation and
cifically for detecting aerial objects from UAV thermo-vision camera installed for cross-vali-
camera images. Images of this type are hard to dation, was established [6].
process because objects in those images have K. Chitra et al. (2023), Chitra et al. 205
multiple scales and need real-time detection. 206 (2023) … for wildlife-parasitic crop such
To deal with these problems, the research- as: elephants, wild pigs and monkeys are the
ers suggest a lightweight model: DSYolov3 major causes of frequent or severe damage to
advance from Yolov3 model. These improve- crops, leading to significant losses resulting
ments consist in a multi-scale aware decision in large scale over time commercially culti-
discrimination network, an enhanced multi- vated plants. Dealing with this specific ani-
scale fusion-based channel attention model, mal safeguard is necessary for farms which
and sparsity based channel pruning. Experi- cannot continuously look out or surround all
mental evaluations show effectiveness of the those plants to stop from financial damage.
model and its practicality on UAVs [4]. To solve this problem, this study suggests a
368 Innovations in Computational Intelligence: Trends and Technologies
system through which alliefs are secured in efficient intrusion detection in the agricul-
the agricultural field and farmers can be noti- tural field [10].
fied via call alert if animals are found. This Trial 10—Tan M et al. (2022), Camera
system uses an Arduino Uno, Ultrasonic sen- traps are widely used in wildlife surveys and
sor for X-axis and Y-axis which are connected biodiversity monitoring, collectively gen-
to send the signals to a GSM module (for erating millions of images or videos as the
call notifications) as well as generate alarm result of their trigger mechanisms. A few
sounds [7]. studies have suggested the use of deep learn-
Sreedevi and Anitha (2022), This article ing approaches in order to automate wild-
Address the gap of vehicular-animal incidents life detection from camera trap images thus
as a One health emerging threat was selected decreasing manual effort and accelerating the
as > “Topic track” < between humans and analysis. Despite this, there exist few studies
wildlife. Development of an Ideal System for where numerous models have been validated
Detection of Wild Animals Utilizing Deep and compared with field monitoring settings.
Learning Algorithms [8]. The Unknown Region Wildlife Image Dataset
Wangzhi Xing et al. (2022), The decreas- was collected at Northeast Tiger and Leopard
ing population of Koala Bears in Australia National Park (NTLNP dataset) as the initial
at Capacities, calls urgently for conservation study. The research then tested three popular
measures. A camera network was established object detection architectures, reporting its
to view Koalas and their behavior in both wild performance when being trained only with
habitats and in controlled settings, creating a day or night data versus a combined dataset.
unique dataset for Koala video tracking. With The selected models involve YOLOv5 series
this data set, a two-stream convolutional neu- (one-stage with anchors), Cascade R-CNN
ral network (CNN) model was developed by with HRNet32 (two-stage with anchors),
researchers. The paper describes a new cost- and FCOS using ResNet50 and ResNet101
effective model for identifying and tracking (one-stage without anchor). The results from
Koala events in videos by combining prior the experiments showed a good performance
semantic object detection information with of the object detection model in one single
optical flow methods. [9] participants (P. K. case, training on both day and night datasets
Panda et al, 2022), The problem of wild ani- together. On animal image detection ability
mals causing incursion is a real paradox, due and animal video classification accuracy, the
to the considerable amount of resources lost average mAP is: 0.98 and accuracy rate is
and also to the human lives jeopardized. To 88%, respectively. The one-stage YOLOv5m
address this issue, this study aims to use the model showed the best recognition perfor-
Internet of Things (IoT) in order to monitor mance with the highest model complexity.
regions continuously and also detect wild ani- The AI technology with which this software
mal intrusions in agricultural fields. Initially, is integrated enables ecologists to extract
it consists of Ultrasonic sensors at the corners information from a large amount of imagery
which senses an intrusion and a picture from in an expedited manner and can save consid-
Node MCU Micro controller mounted cam- erable time [11].
era on E-vehicle that does Field surveillance. Anurag Tiwari, et al. Published this Study
We use the IoT to notify the farmer via an 11 (2021), Key to this is the use of precision
IOT application as soon as detect a threat/ livestock farming techniques, which enable
obstacle. The most important criterion for quick and accurate counting of individual
evaluating this system was the quality of animals. In dairy farming, cattle counting
captured intruder images and prompt notifi- and monitoring are uber crutial so the wel-
cation alerts. The proposed model performs fare of live stocks may not be compromised.
A comprehensive review of innovations in stray cattle detection 369
In order to achieve this, a computer vision detection. This study unveils a plethora of
framework has been suggested. Which uses observations that are consistent with transfer
ResNetV2 for feature extraction paired learning while adapting the models trained on
with the YOLOv4 optimizer making detec- standardized datasets for deployment in real-
tions fast and accurate. It uses IoT sensors istic settings. In the study, researchers uncover
to upload the output that has been collected, a unique insight that might illustrate some
into a centralized repository. The sensors flag of the difficulties when it comes to practical
any deep rooted discrepancy or incongruity, application—translating detectors developed
like disease, pest infestations, dehydration using images of animals in their natural envi-
etc. they are immediately communicated to ronments for use inside non-natural settings.
the farmer concerned. This makes it an effec- This approach is validated by empirical evi-
tive, fast and accurate cattle count for farm- dence that suggests the limited capabilities of
ers by the proposed framework guiding the these detectors to adapt with ease. This issue
government side in intervening through live- is tackled in the research with a way for semi-
stock tracking [12], Gabriel S. Ferrante et al. automated synthetic data generation specifi-
(2021), The findings of this work are based cally designed for domain-specific training.
on a comprehensive review done between Additionally, the study highlights that the
January 2017 and May 2021. Its main goal code and data used in these experiments are
was to present an extensive review on state- made available to promote more pursuits in
of-the-art animal detection and classification this area [14].
via computer vision technologies in urban The four studies [5,32,41,42] that involved
scenes. Second, the study sought to identify Zhaoming Wang et al. were within ethnicity-
some existing research areas that need more based selection frequencies and excluded
attention. Through an automated search from the meta-analysis (Table 9) Full size
method across two online databases, 146 table (2020), The presence of stray animals
potential papers were identified which met in urban areas implies great inconvenience to
the inclusion criteria, and 20 studies that met the lives of city dwellers, social issues, sani-
the selection criteria were examined in detail tation problems, risks to living beings and
for data extraction. The 20 studies were general urban management. This study aims
divided into six categories: (i) Support Vector to solve the problem by introducing a low-
Machines (SVM), (ii) Histogram of Oriented cost animal detection system based on infra-
Gradients—HOG, (iii) Scale-Invariant Fea- red thermal imaging technology. The system
ture Transform—SIFT, (iv) Principal Com- design is based on infrared thermal imaging
ponent Analysis—PCA, or Convolutional technology, using Atmega328 microcontroller
Neural Networks—CNN and Deep Feature- as a central controller. In its operation it has
based Decision Fusion Learning DFDL. The the infrared array sensor to determine exter-
analysis underlined the widespread use of nal infrared radiation and via a built-in ADC
CNN as well as combinations to improve converts the voltage fluctuation that occurs
classification model accuracy [13]. as thermal radiation into digital signals.
Singh et al. (2020), The recognition of AMG8833 sensor that is sending the cap-
intruding animals in human-populated areas tured temperature information and ESP8266
makes it necessary for safety and road safety. through SPI bus, creating pseudocolor images.
The motivation behind this research is to On top of the that, it manages a color LCD
solve the problem using different deep learn- so you can see infrared through them like in
ing algorithms related to other parts of com- spy movies. Our single semirmall and cost-
puter vision—object detection, segmentation, effective system is supposed to be character-
tracking and finally a little bit exotic in edge ized by small size, low energy consumption,
370 Innovations in Computational Intelligence: Trends and Technologies
[6] Knyva, Mindaugas, Darius Gailius, Gin- [12] A. Tiwari, K. Sachdeva and N. Jain, “Com-
tautas Balčiūnas, Darius Pratašius, Pranas puter Vision and Deep Learningbased
Kuzas, and Aistė Kukanauskaitė. 2023. “IoT Framework for Cattle Monitoring,” 2021
Sensor Network for Wild-Animal Detection IEEE 8th Uttar Pradesh Section Interna-
near Roads” Sensors 23, no. 21: 8929. doi: tional Conference on Electrical, Electronics
10.3390/s23218929 and Computer Engineering (UPCON), Deh-
[7] K. Chitra et al., “Animals Detection Sys- radun, India, 2021, pp. 1–6, doi: 10.1109/
tem In The Farm Area Using Iot,” 2023 UPCON52273.2021.9667617.
International Conference on Computer [13] G. S. Ferrante, F. M. Rodrigues, F. R. H.
Communication and Informatics (ICCCI), Andrade, R. Goularte and R. I. Meneguette,
Coimbatore, India, 2023, pp. 1–6, doi: “Understanding the state of the Art in Animal
10.1109/ICCCI56745.2023.10128557. detection and classification using computer
[8] Sreedevi K L, Anitha Edison (2022). Wild vision technologies,” 2021 IEEE Interna-
Animal Detection using Deep learning. doi: tional Conference on Big Data (Big Data),
10.1109/INDICON56171.2022.1003979[6] Orlando, FL, USA, 2021, pp. 3056-3065,
Wangzhi Xing; Jun Zhou; Wee Lum Tan; doi: 10.1109/BigData52589.2021.9672049.
Fereshteh Nayyeri; Douglas Kerlin; Guy Cast- [14] A. Singh, M. Pietrasik, G. Natha, N.
ley. (2022). Dual-stream Convolutional Neural Ghouaiel, K. Brizel and N. Ray, “Animal
Networks for Koala Detection and Tracking. Detection in Man-made Environments,”
doi: 10.1109/DICTA56598.2022.10034583. 2020 IEEE Winter Conference on Applica-
[9] Wangzhi Xing; Jun Zhou; Wee Lum tions of Computer Vision (WACV), Snow-
Tan; Fereshteh Nayyeri; Douglas Kerlin; mass, CO, USA, 2020, pp. 1427–1438, doi:
Guy Castley. (2022). Dual-stream Con- 10.1109/WACV45572.2020.9093504.
volutional Neural Networks for Koala [15] Wang, Zhaoming and Liu, Xiaomin.
Detection and Tracking. doi: 10.1109/ (2020). Design of Animal Detector Based
DICTA56598.2022.10034583. on Thermal Imaging Sensor. Journal of
[10] P. K. Panda, C. S. Kumar, B. S. Vivek, M. Physics: Conference Series. 1550. 042066.
Balachandra and S. K. Dargar, “Implementa- 10.1088/1742-6596/1550/4/042066.
tion of a Wild Animal Intrusion Detection [16] Sugumar, Kalaivanan and Kumar, Amrutham.
Model Based on Internet of Things,” 2022 (2019). IoT Concept for Animal Detection
Second International Conference on Artifi- Using ANN to Prevent Animal Vehicle Col-
cial Intelligence and Smart Energy (ICAIS), lision on Highways. International Journal
Coimbatore, India, 2022, pp. 1256–1261, of Science and Engineering Applications. 8.
doi: 10.1109/ICAIS53314.2022.9742948. 492–497. doi: 10.7753/IJSEA0811.1004.
[11] Tan M, Chao W, Cheng JK, Zhou M, Ma Y, [17] Oishi, Yu, Hiroyuki Oguma, Ayako Tamura,
Jiang X, Ge J, Yu L, Feng L. Animal Detec- Ryosuke Nakamura, and Tsuneo Matsu-
tion and Classification from Camera Trap naga. 2018. “Animal Detection Using Ther-
Images Using Different Mainstream Object mal Images and Its Required Observation
Detection Architectures. Animals (Basel). Conditions” Remote Sensing 10, no. 7:
2022 Aug 4; 12(15):1976. doi: 10.3390/ 1050. doi: 10.3390/rs10071050.
ani12151976.
51 Enhancing emotional insight: NLP
powered sentiment analysis
Jyoti Gaura, Stuti Singhb, and Shelja Sharmac
Department of Computer Science and Engineering, Sharda School of Engineering and Technology,
Sharda University Greater Noida, UP, India
Abstract: Sentiment analysis is a branch of natural language processing (NLP) that is essential to comprehend-
ing customer preferences, public opinion, and the emotional nuances found in textual data. This study explores
the complex field of sentiment analysis, using sophisticated NLP methods to identify and analyze sentiments
in a variety of textual datasets. This research paper offers a comprehensive grasp of sentiment analysis using
NLP, which will be beneficial to scholars, practitioners, and policymakers. This work opens the door for the
creation of more precise, trustworthy, and ethical sentiment analysis systems by tackling technical difficulties,
moral dilemmas, and domain-specific nuances. It also makes a substantial contribution to the field of NLP and
its applications in comprehending human feelings and viewpoints.
Keywords: Algorithms, artificial intelligence, machine learning, natural language processing, sentimental
analysis
DOI: 10.1201/9781003606635-51
374 Innovations in Computational Intelligence: Trends and Technologies
carried out in additional NLP tasks [6]. Dif- clients [4]. In contrast to clustering, statisti-
ferent domains of sentimental analysis are cal, and hybrid approaches, the result of NLP
shown in Figure 51.2. based feature selection is a technique that is
more frequently employed [5]. One popular
2.4. Importance and approach type of data mining that assists in enhancing
those goods or services using sentiment anal-
Text sentiment analysis has become increas- ysis. Many studies on sentiment analysis have
ingly important as people all over the world
deal with more challenging circumstances in
recent years. Approaches to machine learn-
ing may involve supervised or unsupervised
learning [1]. Organizations can use opinion
analysis to learn what people think of the
newest product, and governments can use it
to determine whether the public is comfort-
able with the new approach. Sentiment analy-
sis is a popular tool used by IT companies to
learn about the opinions of their employees
in order to create corporate strategies and
to modify those strategies going forward
[2]. Artificial Intelligence evaluates whether
something is good or bad by combining a
great deal of math with NLP knowledge [3].
By assigning a positive or negative rat-
ing to reviews, Businesses can obtain knowl-
edge about how to enhance their goods and Figure 51.2. Domains of sentimental analysis.
more effectively satisfy the demands of their Source: AUTHOR'S SELF GENERATED
been conducted in an effort to uncover ways than the noun’s sentiment detection. Panikar
to enhance data analysis in order to obtain et al. [9] recommended applying these cat-
more important business information and egories to sentiment analysis across a num-
better service [8]. ber of industries. There are some suggestion
to enhance the current NLP pipeline opera-
tions to execute granular sentiment analy-
3. Literature Review sis quickly and effectively. Patrick et al. [10]
The R et al. [1] proposed a post tagging discussed, sentiment analysis can be utilized
approach to analyze scholars text feedback in client feedback analysis and can also be
using NLP to conclude teaching work exten- applied to employee review systems.
sion, sentimental analysis focuses on the
student’s feedback collected through online 4. Methodology
mode, where NLP used approach is used to
predict the polarity of students comments. The methods and strategies used to carry out
Sharma et al. [2] presented the comparison of sentiment analysis within the parameters of
several techniques and strategies for extract- this study are described in the methodology
ing sentiments from unstructured data is section. It provides a comprehensive explana-
presented in this research. Brindha et al. [3] tion of how to gather data, extract features,
carried study to tackles the issue of sentiment choose a model, and set up the experiment.
categorization on the Twitter data set. In this Different methodology used are as follows:
study, the Twitter data set is used to investi-
gate the sentiment categorization problem. • Grammar Employ, a strategy that is based
Reddy A et al. [4] applied sentiment analy- on the dictionary. Feeling and polarity
sis to the Internet Movie Database (IMDB), (positive, negative, or neutral) words are
reviewed Data set to ascertain whether the included in the lexicon [2].
details provided by a user indicate a positive • Naive Bayes methodology [4].
or negative review. The correctness of the sug- • Machine learning based approach [1].
gested approach is evaluated using real-world
data. Hardt et al. [5] used social media data 4.1. Data collection
to analyze customer preferences and attitude The 2848 comments from our institute’s edu-
on tourism before and during the COVID- cational website made up the dataset used in
19. Authors used NLP techniques and used this study. The dataset was manually labelled
Reddit posts for data sets. Jadeja et al. [6] with sentiment polarity labels. Through sur-
intended to minimize the time and expense vey, data has been gathered in real time from
factors while making the most use of this students.
sentiment scrutiny. Large corporations utilize
SA extensively, but small businesses are still a
long way off from it, because it is either too 4.2. Data preprocessing
expensive or too time-consuming. A and co. The data pretreatment stage is crucial for
et al. [7] proposed a sentiment analysis tech- both machine learning and data analysis.
nique for the e-commerce system. Their work It comprises organizing, transforming, and
integrates machine learning (NLP) into a cleansing raw data, to prepare it for modeling
web application provided by online shops to or analysis.
determine users’ interest in the products and The quality and effectiveness of the
services. Chaki et al. [8] performed numerous machine learning models or data analysis can
well-researched studies and the resolution of be significantly impacted by appropriate data
significant sentiment analysis problems other preparation.
Enhancing emotional insight: NLP powered sentiment analysis 377
models for sentiment analysis by adjusting data. Journal of Computational and Theo-
routine NLP pipeline tasks. retical Nanoscience, 17(9), 4535–4542.
Machine learning and Lexicon-based https://doi.org/10.1166/jctn.2020.9300
approaches were used to accomplish senti- [6] Jadeja, H., Thacker, C., and Parmar, K.
ment analysis. There is a lot of unstructured (2022). Categorizing data for sentimen-
tal analysis by auto-focusing mechanism
data present online on social media platforms,
using natural language processing. 2022
data pre- processing is essential for creating a
Second International Conference on Com-
learning model to do sentiment analysis. puter Science, Engineering and Applica-
Several preprocessing approaches were used tions (ICCSEA). https://doi.org/10.1109/
on the dataset, including stemming, stop word iccsea54677.2022.9936363
removal, square bracket removal, HTML [7] A, A., M, B., R, M., K, V., and S R, K. K.
stripping, and removal of special characters. (2022). Sentimental analysis for E-commerce
website. 2022 10th International Conference
on Emerging Trends in Engineering and Tech-
Acknowledgement nology—Signal and Information Processing
We express the gratitude to Dr. Ramneet for (ICETET-SIP-22). https://doi.org/10.1109/
icetet-sip-2254415.2022.9791606
her guidance and thankful, for providing the
[8] Chaki, P. K., Hossain, I., Chanda, P. R., and
necessary information regarding the paper. Anirban, S. (2017). An aspect of sentiment
analysis: Sentimental noun with dual senti-
mental words analysis. 2017 International
References Conference on Current Trends in Computer,
[1] R, N., S, P. M., Harithas, Pramath. P., and Electrical, Electronics and Communica-
Hegde, V. (2022). Sentimental analysis on tion (CTCEEC). https://doi.org/10.1109/
student feedback using NLP and Pos Tag- ctceec.2017.8455159.
ging. 2022 International Conference on [9] Panikar, R., Bhavsar, R., and Pawar, B. V.
Edge Computing and Applications (ICE- (2022). Sentiment analysis: A cognitive
CAA). https://doi.org/10.1109/icecaa55415. perspective. 2022 8th International Con-
2022.9936569 ference on Advanced Computing and Com-
[2] Sharma, R., and Pathak, P. (2021). A com- munication Systems (ICACCS). https://doi.
parative study on various approaches of org/10.1109/icaccs54159.2022.9785027
sentimental analysis. 2021 International [10] Patrick, H. A., J, P. G., Sharief, M. H., and
Conference on Simulation, Automation and Mukherjee, U. (2023). Sentiment Analy-
Smart Manufacturing (SASM). https://doi. sis Perspective using supervised machine
org/10.1109/sasm51857.2021.9841194 learning method. 2023 Fifth Interna-
[3] Brindha, K., Senthilkumar, S., Singh, A. K., tional Conference on Electrical, Com-
and Sharma, P. M. (2022). Sentiment analy- puter and Communication Technologies
sis with NLP on Twitter data. 2022 Inter- (ICECCT). https://doi.org/10.1109/
national Conference on Smart Generation icecct56650.2023.10179807.
Computing, Communication and Networking [11] Kaur, R., Uppal, M. and Gupta, D., 2023,
(SMART GENCON). https://doi.org/10.1109/ May. A Comprehensive and Comparative
smartgencon56628.2022.10084036 Study of Handwriting Recognition System.
[4] A, B. R., Reddy, B. V. S., Nandam, A. D., Nar- In 2023 IEEE Renewable Energy and Sus-
esh, K., Depuruu, S., and Sakthivel, M. (2023). tainable E-Mobility Conference (RESEM)
Sentimental analysis of movie reviews using (pp. 1–6). IEEE.
NLP techniques. 2023 5th International [12] Sharma, S., Mittal, V., Srivastava, R. and
Conference on Inventive Research in Com- Singh, S.K., 2020, December. Empirical
puting Applications (ICIRCA). https://doi. evaluation of various classification methods.
org/10.1109/icirca57980.2023.10220783 In 2020 2nd International Conference on
[5] Ramneet, Gupta, D., and Madhukar, M. Advances in Computing, Communication
(2020). Analysis of machine learning Control and Networking (ICACCCN) (pp.
approaches for sentiment analysis of Twitter 105–109). IEEE.
52 Decision-making using argumentation
mining framework on English text
Rudrendra Bahadur Singha, Shobhit Sinhab, Ankita Singhc,
Alok Kumar Thakurd, Akhil Chaurasiyae, Nishtha Mauryaf, and
Arpita Yadavg
Department of Computer Science and Engineering,
Babu Banarasi Das Institute of Technology and Management, Lucknow, India
Abstract: This paper investigates the application of argumentation mining (AM) to enhance decision-making
processes in the English language. Leveraging recent strides in natural language processing (NLP), our approach
achieves precise argument extraction.
The review comprehensively examines the current landscape of AM, highlighting its potential applications.
Additionally, a real-world case study is presented, illustrating the practical implementation of AM in decision-
support scenarios. This study contributes to the field by addressing the need for effective decision-support
tools through the lens of AM. The methodology capitalizes on advancements in NLP to extract arguments
accurately, paving the way for informed decision-making. The paper’s significance lies in its practical implica-
tions, shedding light on the tangible benefits of incorporating AM techniques into decision support systems. In
summary, this paper offers a concise and informative overview of the application of AM in English language
decision-making, showcasing its potential impact and practical utility in real-world scenarios.
Keywords: Argumentation mining, decision-making process, natural language processing (NLP), decision-sup-
port scenarios, real-world case study potential applications
a
[email protected]; [email protected]; [email protected]; dalok01895@gmail.
com; [email protected]; [email protected]; [email protected]
DOI: 10.1201/9781003606635-52
380 Innovations in Computational Intelligence: Trends and Technologies
2. Methodology
AM has emerged as a powerful tool for
AQ1:
extracting and analyzing arguments from Figure
natural language text, offering valuable 52.1
insights into the decision-making process. citation is
missing in
This methodology outlines a comprehen- the text,
sive data flow diagram (DFD) approach to please
provide
AM, utilizing various techniques to extract, the
analyze, and evaluate arguments from tex- appro-
tual data, ultimately supporting informed priate
citation.
decision-making.
AQ2:
Please
2.1. Data acquisition and provide
source for
preprocessing Figure 52.1. Data flow architecture. the figure.
Source:
The DFD for AM begins with the founda- AUTHOR'S SELF GENERATED
tional step of data acquisition and preprocess-
ing. Raw textual data, sourced from various compatibility with subsequent analysis. This
outlets such as legal documents, policy pro- involves cleaning by removing irrelevant
posals, customer reviews, and news articles, information like punctuation and format-
forms the basis for AM. Depending on the ting inconsistencies, tokenization to split the
context, data collection may involve online text into individual tokens, normalization
databases, proprietary repositories, or web through lowercasing and lemmatization,
scraping techniques [8]. part-of-speech tagging, and named entity
Once acquired, the data undergoes a recognition (NER) to identify entities like
rigorous Preprocessing stage to ensure people and organizations [9].
Decision-making using argumentation mining framework on English text 381
has been made in automated argument iden- to support legal research and decision-
tification and classification. Early approaches making [5].
relied on handcrafted features and rule-based • Policy analysis: Identifying and analyzing
systems, but recent advancements utilize pre- arguments in policy documents to inform
trained language models (PLMs) like BERT policy formulation and evaluation [7].
and RoBERTa, achieving state-of-the-art per- • Business intelligence: Extracting insights
formance [9, 10]. and competitor analysis from customer
These models can effectively capture com- reviews and social media data to support
plex linguistic features and relationships, business decisions [10].
leading to improved accuracy in identifying
claims, premises, and other argument com- 3.5. Challenges and future directions
ponents. Additionally, research has explored
various deep learning architectures, such as • Despite significant progress, several chal-
convolutional neural networks and recur- lenges remain in AM for decision making.
rent neural networks, tailored specifically for These include:
AM tasks ([3] Feng et al., 2023; [4] Yin et al., • Limited performance in complex argu-
2022). mentation: Existing models often strug-
gle with complex argument structures,
such as nested arguments and implicit
3.3. Evaluation of argument strength relationships.
and persuasiveness • Lack of explainability: While models
Beyond the identification and classification can predict argument components, they
of arguments, research has ventured into often lack transparency in their reasoning
analyzing their strength and persuasive- process, making it difficult to trust their
ness. This involves assessing the quality of outputs.
evidence, the logical soundness of reason- • Ethical considerations: Bias and fairness
ing, and potential fallacies employed in the issues in NLP models can potentially lead
argument. to biased and unfair decision-making if
Several approaches have been proposed, not addressed appropriately.
including using argumentation schemes and
defeasible reasoning to evaluate argument 3.6. Future research directions
strength [11]. Additionally, research has include
explored the role of sentiment analysis and
• Developing more robust models for com-
discourse analysis in assessing the persuasive-
plex argumentation: Exploring new deep
ness of arguments [12, 6].
learning architectures and incorporating
linguistic knowledge to improve model
3.4. Applications in decision-making performance.
AM has been applied to various decision- • Enhancing model explainability: Utilizing
making contexts, demonstrating its poten- interpretable machine learning techniques
tial to improve the quality and efficiency of to understand how models arrive at their
decision-making processes. Some examples predictions.
include: • Addressing ethical concerns: Implement-
ing fairness aware techniques and devel-
• Legal reasoning: Extracting legal argu- oping ethical guidelines for the responsible
ments from case law and legal documents use of AM in decision-making.
Decision-making using argumentation mining framework on English text 383
6. Conclusion References
In the intricate realm of human thought [1] Rocha G and Cardoso HL. Toward a relation-
and decision-making, arguments stand as based argument extraction model for argu-
the cornerstones of rational discourse and mentation mining. Lecture Notes in Computer
informed choices [7]. They provide a struc- Science (Including Subseries Lecture Notes
tured framework for presenting claims, sup- in Artificial Intelligence and Lecture Notes
in Bioinformatics). 2017;10583 LNAI:94-
porting evidence, and establishing logical
105. doi:10.1007/978-3-319-68456-7_8.
connections, enabling us to navigate com- [2] Macagno F, Walton D, and Reed C. Argu-
plex issues and reach well-reasoned conclu- mentation schemes. History, classifications,
sions. AM emerges as a powerful tool in and computational applications. IFCoLog
this domain, harnessing the computational Journal of Logics and Their Applications.
prowess of artificial intelligence to extract, 2017; 4(8). Available from: https://ssrn.com/
analyze, and evaluate arguments from nat- abstract=3092491
ural language text (Feng et al., 2023; [9]. [3] Andreas P and Manfred P. A Survey.
By delving into the depths of textual data, From argument diagrams to argumenta-
AM unveils the underlying structure of tion mining in texts. International Jour-
arguments, shedding light on the intricate nal of Cognitive Informatics and Natural
interplay of claims, premises, warrants, and Intelligence. 2013;7(1):1–3. doi:10.4018/
rhetorical devices that shape our persuasive jcini.2013010101
[4] Feng VW and Hirst G. Classifying argu-
appeals [10].
ments by scheme. Proceedings of the 49th
The integration of AM into decision- Annual Meeting of the Association for Com-
making processes has far reaching implica- putational Linguistics: Human Language
tions, fostering more informed, reasoned, Technologies. 2011;1:987–996
and transparent decision-making [6]. [5] Mochales R and Moens M. Argumenta-
By analyzing and evaluating arguments, tion mining. Artificial Intelligence and
decision-makers can gain a deeper under- Law. 2011;19(1):1–22. Available from:
standing of the issues at hand, identify http://link.springer.com/article/10.1007/
potential biases and fallacies, and make s10506-010-9104-x
more informed choices that are grounded [6] Lippi M and Torroni P. Argumentation min-
in evidence and sound reasoning [8]. In a ing: state of the art and emerging trends.
world where decisions often have significant ACM Transactions on Internet Technology.
consequences, AM empowers us to navigate 2016;16(2). doi:10.1145/2850417.
[7] Cabrio E, Villata S, and Gandon F. A
complex challenges with greater clarity and
support framework for argumentative
make choices that align with our values and discussions management in the web. Lec-
aspirations [5]. ture Notes in Computer Science (Includ-
As we look to the future, AM holds ing Subseries Lecture Notes in Artificial
immense promise for further refining our Intelligence and Lecture Notes in Bioin-
ability to analyze and evaluate arguments, formatics). 2013;7882 LNCS:412-426.
providing decision-makers with even more doi:10.1007/978-3-642-38288-8_28.
sophisticated tools to navigate the intrica- [8] Peldszus A and Stede M. From argument dia-
cies of human discourse and make informed grams to argumentation mining in texts: A
choices that shape our world. By continuing survey. International Journal of Cognitive Infor-
to invest in AM research and development, matics and Natural Intelligence. 2013;7(1):1–
we can harness its power to foster more rea- 31. doi:10.4018/jcini.2013010101.
soned, ethical, and impactful decision-making [9] Chen C and Chen H. Overview of the
NTCIR-16 FinNum-3 task: investor’s and
across a wide range of domains.
manager’s fine-grained claim detection.
Decision-making using argumentation mining framework on English text 385
Abstract: Crop diseases substantially hinder agriculture, which has an impact on people’s capacity to support
themselves and the stability of the economy. In this investigation, convolutional neural networks (CNNs) were
used to develop a novel method for identifying the three potato plant diseases: late blight, early blight, and
healthy. The model demonstrated exceptional accuracy in identifying diseases. Viability assessments revealed
simple integration into existing systems at affordable implementation costs. Stakeholders acknowledged the
model’s value in decision-making and provided positive feedback. This study demonstrates how deep learning
models can improve overall agricultural health, effectively manage illnesses, and lower crop losses.
Keywords: Deep learning (DL), neural network (NN), convolutional neural network (CNN), image augmentation
blight mostly affect potato leaves [1,2]. to the volume of available data. The recom-
Figure 53.1 illustrates the differences between mended method starts with the crucial step of
healthy and unhealthy leaves. collecting data, featuring over 2150 images
CNN, among DNN algorithms, efficiently showcasing various leaf patterns, including
transforms input images into vector represen- early blight and late blight diseases in potato
tations for various vision tasks. Pre-training leaves.
the CNN with images allows it to serve as Table 53.1 provides a detailed dataset
an effective image “encoder.” Recent studies description for potato leaf disease identifica-
confirm CNN’s effectiveness in image classifi- tion, specifying disease classifications and the
cation and object recognition. image count.
The work represents a major advancement [8] Bhardwaj A and Patel NR. Potato leaf dis-
in the use of deep learning for complex tasks ease detection using ML algorithms. In: Pro-
like image analysis and feature extraction by ceedings of the International Conference on
highlighting CNN’s accuracy and efficacy in Recent Innovations in Signal Processing and
recognizing and classifying illnesses. Embedded Systems (RISE). IEEE; 2020:1–6.
doi:10.1109/RISE51108.2020.9240883.
[9] Khan AR, Saleem M, and Ahmed S. Leaf
disease detection in plants using machine
AQ3:
Reference
References learning techniques. In: Proceedings of
citations [1] Radhika P, Tejeswara Murthy P, Pava- the International Conference on Innova-
are not in
sequence,
neeshwar Reddy G, DurgaVara Prasad V, tive Computing and Communications
please Harshitha T, and Bharath NBV. Potato (ICICC). IEEE; 2020:1–5. doi:10.1109/
check and leaf disease detection using convolutional ICICC49352.2020.9272653.
confirm neural networks. International Research [10] Vargas-Rodríguez YL, Villegas-González JA,
for
clarity. Journal of Engineering and Technology. and Bautista-Becerril JM. Leaf disease detec-
2023;10(5):185. tion in plants based on convolutional neu-
CHECKED AND CONFIRMED
[2] Pasalkar J, Memane S, More C, Gorde G, ral networks and machine learning. Sensors.
and Gaikwad V. Potato leaf disease detec- 2020;20(4):1057. doi:10.3390/s20041057.
tion using machine learning. International [11] Ji Y, Li J, Zhu Y, Luo Y, Liu D, and Wang
Research Journal of Engineering and Tech- L. A deep learning approach for leaf disease
nology. 2023;10(2):14. detection based on a novel convolutional
[3] SahSudi P, Gupta N, Baniya KK, Ban- neural network. Sensors. 2020;20(7):1892.
gari S, and Rachana P. Potato leaf dis- doi:10.3390/s20071892.
ease detection using convolutional neural [12] Ma Y, Xie X, Li W, Song J, and Cui H. Potato
networks. Journal of Algebraic Statistics. leaf disease detection using deep learning
2022;13(2):1929–1935. and multi-scale convolutional neural net-
[4] Kaur A and Singh D. Deep learning for work. Computers and Electronics in Agri-
potato leaf disease detection using convolu- culture. 2019;165:104960. doi:10.1016/j.
tional neural networks. Computers and Elec- compag.2019.104960.
tronics in Agriculture. 2021;187:106267. [13] Kachare V and Lokhande R. Early detec-
doi:10.1016/j.compage.2021.106267. tion of potato late blight disease using
[5] Srivastava S and Chhabra M. Potato leaf machine learning. In: Proceedings of the
disease classification using deep learn- International Conference on Sustainable
ing techniques. In: Proceedings of the Computing in Science, Technology and Man-
3rd International Conference on Com- agement (SUSCOM). Springer; 2019:419–
puting Methodologies and Commu- 428. doi:10.1007/978-981-13-1796-8_42.
nication. Springer; 2021:921–926. [14] Shahbaz M, Munawar S, Naveed M, and
doi:10.1007/978-981-16-3660-5_90. Mehmood R. Identification of potato diseases
[6] Sunita M and Singh J.Potato plant disease iden- using deep convolutional neural networks.
tification using machine learning algorithms. Computers and Electronics in Agricul-
In: Proceedings of the International Confer- ture. 2019;166:105002. doi:10.1016/j.
ence on Advances in Computing and Data compag.2019.105002.
Sciences (ICACDS). Springer; 2020:517– [15] Fuentes A and Yoon S. Deep learn-
526. doi:10.1007/978-981-15-5254-1_51. ing for plant disease detection and
[7] Asri N, Moustaid K, and Fahsi R. Potato diagnosis. Annual Review of Phytopa-
leaf disease detection using machine learn- thology. 2019;57:211–230. doi:10.1146/
ing techniques. In: Proceedings of the annurev-phyto-082718-100308.
International Conference on Sustainable [16] Ghosal S, Saha S, Nasipuri M, and Kundu
Intelligent Systems (SUSI). IEEE; 2020:291- M. Leaf disease detection using convo-
299. doi:10.1109/SUSI50939.2020.930. lutional neural network and transfer
392 Innovations in Computational Intelligence: Trends and Technologies
learning. Computers and Electronics in Agri- leaf disease classification. In: Proceed-
culture. 2019;165:104961. doi:10.1016/j. ings of the 2018 International Conference
compag.2019.104961. on Innovations in Information Technol-
[17] Vinayakumar R, Sudheesh K, and Ravi ogy (IIT). IEEE; 2018:1–6. doi:10.1109/
R. Deep learning based classification of INNOVATIONS.2018.8554751.
plant diseases using leaf image analysis. [19] Siva Kumar G and Saraswathi S. Classifi-
Computers and Electronics in Agricul- cation of plant leaf diseases using machine
ture. 2018;145:311–318. doi:10.1016/j. learning techniques. In: Proceedings of the
compag.2018.01.018. International Conference on Intelligent Sus-
[18] Toda Y and Win KT. A comparative study tainable Systems (ICISS). IEEE; 2017:1666–
of machine learning techniques for tomato 1671. doi:10.1109/ISS1.2017.8388989.
54 Exploring the impact of integrated
technological solutions on student
engagement administrative efficiency
Anurag Tiwaria, Ayush Mauryab, Arushi Baranwalc,
Amritesh Guptad, and Anurag Pathake
Computer Science and Engineering, Babu Banarasi Das Institute Of Technology and Management,
Lucknow, India
Abstract: This paper examines “Acadia,” a groundbreaking Android and web-based solution meticulously
designed to meet the evolving needs of educational institutions in today’s dynamic and fast-paced world.
Educational management, spanning schools, colleges, and universities, involves intricate tasks ranging from
student enrollment to performance evaluation. Recognizing the imperative role of technology in the education
sector, “Acadia” emerges as a timely and comprehensive response to the growing demands for modern solutions.
Going beyond the realm of traditional software, “Acadia” signifies a commitment to elevate the management
and operational capabilities of educational institutions. Enveloped in a user-centric design and feature-rich
architecture, the system aims to simplify institute management, fostering efficiency, transparency, and collabo-
ration among administrators, faculty, students, and parents. Core features encompass student management,
attendance tracking, course scheduling, staff management, performance evaluation, and communication. The
design philosophy of “Acadia” places a premium on user experience, ensuring flexibility and accessibility across
both web and Android platforms. This adaptability caters to the diverse needs of users, whether administra-
tors managing schedules or students checking grades on smartphones. Security, a paramount concern in the
digital age, is addressed through robust measures within “Acadia” to safeguard sensitive educational data from
unauthorized access or breaches. In addition to providing an overview of “Acadia,” this paper delves into its
innovative attendance system. This system employs a multi-faceted approach, incorporating OTP, biometric
verification, and proximity sensors to enhance accuracy and security. The examination of these features dem-
onstrates Acadia’s forward-thinking approach, leveraging technology to fortify educational institutions against
potential fraudulent practices and offering a robust, reliable, and modern solution for tracking student attend-
ance. As a beacon of change in educational institute management, “Acadia” holds the potential to significantly
contribute to the ongoing progress of the education system.
Keywords: Smart education, proximity and biometrics, data analytics, alumni, global community
[email protected]; [email protected]
d
DOI: 10.1201/9781003606635-54
394 Innovations in Computational Intelligence: Trends and Technologies
The primary aim of ACADIA is to foster flow within the campus. This oversight facili-
a transparent and collaborative educational tates the smooth functioning of academic
environment, improving the overall educa- operations.
tional experience. Data analytics for student reports:
Student registration: The initial step in the ACADIA utilizes data analytics to generate
methodology involves student registration, comprehensive student reports. Students can
requiring the use of official college email IDs. access their overall reports, including quiz
This step ensures that only authorized stu- scores, assignment scores, placement records,
dents gain access to the system, enhancing and class test reports. This feature empowers
security and data integrity. students to monitor their academic progress,
Classroom access and educational identify areas for improvement, and make
resources: Students can join classrooms by informed decisions regarding their educa-
using class codes, granting them access to tional and career paths.
notes, assignments, lecture videos, and quiz- The development process of ACADIA
zes. This functionality promotes a seamless Application follows industry-standard soft-
learning experience, enabling students to ware engineering methodologies, including
engage with course materials and assessments requirements analysis, design, implementation,
in one consolidated platform. testing, and deployment. The methodology
Attendance tracking: Attendance track- aims to deliver a robust and user-friendly tool
ing is a critical component, and ACADIA that streamlines educational processes, pro-
leverages proximity-based technology. Fac- motes transparency, and fosters collaboration
ulty members generate one-time codes that among students, faculty, alumni, and adminis-
students must input on their smartphones trators. ACADIA’s development seeks to pro-
to record their attendance. Additionally, a vide a comprehensive solution for institute
fingerprint authentication system enhances management, revolutionizing the educational
security and eliminates proxies. ecosystem while also empowering students
Faculty tools: Faculty members have the through data analytics-driven insights.
ability to create classrooms, upload assign-
ments, and administer quizzes. These features
empower educators to efficiently manage 3. Thematic Overview
their courses and maintain engagement with Educational institutions are embracing an era
their students. of technological advancements that are revo-
Global student community interaction: lutionizing the way students engage with their
ACADIA also serves as a platform for global academic environments. By reviewing various
student community interaction. Students can research papers, a common thread emerges,
easily connect with peers from around the showcasing the diverse applications of tech-
world, fostering a sense of community and nology to improve the student experience,
enabling cross-cultural exchanges. administrative efficiency, and alumni-student
Alumni engagement and job referrals: connections. Notably, radio-frequency iden-
Alumni play a vital role in the educational tification (RFID) and near-field communica-
journey. They can post job referrals on the tion (NFC) technologies, as well as biometric
platform, providing valuable opportunities systems, have taken center stage in the realm
for current students to secure placements in of student attendance tracking [7]. RFID and
reputable industries. NFC-based attendance systems have emerged
Administrative control: The administrative as powerful tools in administrative efficiency.
module grants administrators control over These technologies allow students to mark
students and faculty, ensuring an efficient their attendance with ease, eliminating the need
396 Innovations in Computational Intelligence: Trends and Technologies
for manual roll calls and paper-based sign-in absence of unified applications for institute
sheets. Real-time attendance data improves management and global student communi-
administrative decision-making and reduces ties to enhance their skill development, as well
the risk of errors and fraudulent attendance, as the lack of a platform connecting students
making them particularly well-suited for with alumni for referrals. This analysis aims
larger institutions where efficient attendance to shed light on the potential implications and
management is crucial. The implementation the significance of such a study.
of biometric systems, such as fingerprint and The absence of integrated technological
facial recognition, adds an extra layer of secu- solutions in educational institutions has far-
rity to attendance tracking. These systems are reaching consequences. In a rapidly evolving
highly accurate and challenging to manipu- technological landscape, where students’ edu-
late, addressing concerns related to proxy cational experiences are becoming increasingly
attendance. However, they also raise questions digital, the lack of unified applications means
about privacy and data security, which institu- that institutions miss out on opportunities to
tions must navigate while capitalizing on their streamline their administrative processes. This
potential to enhance attendance monitoring. can result in inefficiencies and hinder their
Beyond attendance tracking, the digital ability to provide a seamless learning environ-
age has seen the development of Android ment. Furthermore, the study’s focus on global
apps designed to connect students with student communities is crucial in today’s inter-
alumni. These applications serve as valuable connected world. Students from diverse back-
networking tools, enabling students to seek grounds can benefit greatly from a platform
mentorship, guidance, and referrals from that facilitates skill development and collabo-
alumni, thus enhancing their career prospects ration. Such a platform could serve as a bridge
[8]. The connection formed between current between students and various educational
learners and an experienced professional resources fostering engagement and cross-cul-
cultivates a sense of community within the tural learning experiences.
institution and fosters support for students as The research paper’s emphasis on con-
they embark on their professional journeys. necting students with alumni for referrals is
To further enhance the student experience, equally important. Alumni networks can pro-
the advent of digital classrooms has ushered in vide valuable insights, mentorship, and job
a new era of learning. Educators now have the opportunities to current students. Integrating
means to share notes, assignments, multime- this feature into the educational ecosystem
dia resources, and conduct interactive sessions can enhance the career prospects of students
with students online [5]. These digital tools and create a sense of community and conti-
promote efficient content delivery, engagement nuity within the institution.
through multimedia and interactive elements, The management of student attendance is
and have proven invaluable in accommodat- a fundamental aspect of academic adminis-
ing evolving learning needs, especially in times tration, and the absence of a feasible solution
of remote and hybrid learning. in this regard has wide-ranging consequences.
Traditional methods of attendance track-
ing, such as manual roll-calls or paper-based
4. Critical Analysis sign-in sheets, are not only time-consuming
The paper, “Exploring the Impact of Integrated but also prone to errors and manipulations.
Technological Solutions on Student Engage- These outdated methods not only impede
ment and Administrative Efficiency,” addresses administrative efficiency but also fail to pro-
a critical issue in the field of education and vide real-time insights into students’ attend-
institutional management. It highlights the ance patterns. An integrated technological
Exploring the impact of integrated technological solutions on student engagement administrative efficiency 397
solution for attendance management can digital content improves overall student
significantly enhance the overall educational satisfaction and participation.
experience. With the implementation of a reli- 4. Integration of virtual reality (VR) and aug-
able attendance tracking system, institutions mented reality (AR) in education: Explore
can streamline the process, reduce adminis- the integration of VR and AR technolo-
trative workload, and ensure the accuracy of gies in educational settings. Investigate
records. Furthermore, real-time attendance how immersive experiences can enhance
data can be invaluable for both students and learning in subjects like science, history,
faculty, as it allows for prompt interventions and engineering. Research the impact of
when students exhibit irregular attendance, VR/AR on student motivation, knowl-
potentially improving student engagement edge acquisition, and critical thinking
and performance skills. Additionally, analyze the feasibility
of incorporating VR/AR within budget
5. Recommendations for future constraints of educational institutions.
5. Blockchain technology in academic cre-
research dentialing: Explore the potential of block-
1. AI-powered personalized learning: chain technology in securely storing and
Explore the integration of artificial intel- verifying academic credentials. Investi-
ligence (AI) in personalized learning plat- gate the feasibility of creating decentral-
forms. Investigate how AI algorithms can ized, tamper-proof systems for academic
analyze students’ learning styles, prefer- transcripts, certifications, and diplomas.
ences, and performance data to tailor Assess the impact of blockchain-based
educational content. Assess the impact of credentialing on the authenticity of quali-
AI-driven adaptive learning on student fications, simplifying the verification
engagement, knowledge retention, and process for employers, educational insti-
academic achievement across diverse sub- tutions, and other stakeholders.
jects and grade levels. 6. Advanced real-time attendance analysis and
2. Teacher professional development in digital optimization strategies: Explore sophisti-
pedagogy: Focus on teacher training and cated real-time image analysis algorithms
professional development programs cen- integrated directly into the attendance
tered around digital pedagogy. Evaluate the application. Examine context-aware image
effectiveness of workshops, online courses, processing methods to improve headcount
and collaborative learning communities in accuracy by considering classroom dynam-
enhancing educators’ digital teaching skills. ics. Delve into resource optimization
Investigate the long-term impact of continu- techniques ensuring system efficiency in
ous professional development on teaching high-traffic situations. Explore standard-
methodologies, student engagement, and ized data formats and APIs to enable seam-
overall classroom dynamics. less data exchange between the attendance
3. Human-centric design in digital class- app and institutional databases.
rooms: Focus on human-centric design 7. Impact of digital integration on special
principles in digital classrooms. Research education: Focus on the impact of digital
how user experience (UX) design, interac- technologies on special education. Investi-
tive multimedia elements, and gamification gate how personalized learning platforms,
techniques can enhance student engage- assistive technologies, and accessible digi-
ment and knowledge retention. Investigate tal content enhance the educational experi-
the impact of intuitive interfaces on learn- ences of students with disabilities. Explore
ing outcomes and whether personalized the challenges faced in implementing
398 Innovations in Computational Intelligence: Trends and Technologies
inclusive digital education and identify the administrative world, conjuring seamless,
innovative solutions for creating univer- real-time data that not only reduces errors
sally accessible learning environments. but also revolutionizes decision-making in
educational institutions.
The scrutiny of biometric systems, though
6. Conclusions
raising ethical dilemmas, has brought forth
In traversing the landscape of digital tech- a revolutionary wave. These systems, with
nologies in education and institutional man- their precise fingerprint and facial recogni-
agement, this review has illuminated the tion technologies, have set new standards
transformative power of integrated technolog- for security and accuracy. The marriage of
ical solutions [1]. Through a critical analysis heightened security and attendance manage-
of various research papers, the pivotal role of ment has transformed these systems into the
digital tools in enhancing student engagement, guardians of educational integrity, ensuring
administrative efficiency, and alumni-student that every student’s presence is not just noted
connections has been underscored. In essence, but safeguarded with unparalleled accuracy
this review underscores the transformative
journey digital technologies have paved for
educational institutions. By embracing these References
innovations thoughtfully, institutions can cre- [1] Haleem A, Javaid M, Qadri MA, and Suman
ate an inclusive, innovative, and interconnected R. Understanding the role of digital technol-
educational ecosystem. The amalgamation ogies in education: A review. KeAi Chinese
of administrative efficiency, enhanced stu- Roots Global Impact. 2022.
dent engagement, and robust alumni-student [2] Puckdeevongs A, Tripathi NK, Witayang-
networks not only augments the educational kurn A, and Saengudomlert P. Classroom
experience but also contributes significantly to attendance systems based on Bluetooth low
shaping a future-ready workforce and a har- energy indoor positioning technology for
smart campus. MDPI. 2020.
monious society. This paper stands as a testa-
[3] Babu M, Sandhiya K, Preetha V, Eshwari
ment to the potential of technology, guiding SS, and Chitra MR. Design of alumni portal
stakeholders toward a future where education with data security. ResearchGate. 2021.
knows no bounds and where every learner’s [4] Shakhina I, Podzygun O, Petrova A, and
potential can flourish, regardless of geographi- Gordiichuk G. Smart education in the trans-
cal or societal constraints. formation digital society. ResearchGate.
Main findings and contributions: The 2023.
research papers dissected in this review [5] Sudarsana K. The use of Google classroom
serve as brilliant beacons, illuminating the in the learning process. IOP Science. 2019.
unexplored realms of digital ingenuity. The [6] Donath L and Mircea G, Rozman T.
revelations surrounding Bluetooth Low E-learning platforms as leverage for educa-
Energy-based attendance frameworks have tion for sustainable development. Research-
shattered conventional boundaries [2]. They Gate. 2020.
[7] Mahat SS and Mundhe SD. Proposed frame-
have not just streamlined administrative effi-
work: College attendance management
ciency but have redefined how institutions system with mobile phone detector. Interna-
function. The integration of RFID and NFC tional Journal of Research in IT and Man-
technologies into the fabric of educational agement. 2015.
management has turned what were once mun- [8] Aruna P, Begum MS, and Kumar DM.
dane attendance processes into sophisticated Alumni smart connect through Android
symphonies of precision and efficacy. These application. International Journal of Trend
technologies have become the magicians of in Research and Development. 2016.
55 Early stage lung cancer detection using
RESNET
Anjali Srivastavaa, Vinayakb, Aarohi Raic, and Ainy Khand
Department of Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management, Lucknow, India
Abstract: Lung cancer remains the prime global demise inciting factor, especially with the highest mortality
rates since 1985. Detecting it early and accurately is crucial for improving patient survival chances. This study
conducts an approximate analysis of automated algorithms for early-stage respiratory tumor identification via
CT images. CT imaging is recommended for their effectiveness in revealing lung cancer nodules. The research
evaluates various approaches, utilizing data arrays like LIDC, ELCAP, LUNA-16, and AAPM. Segmentation,
feature extraction, neural system identification, and image pre-processing are all steps in the detection pro-
cess. It may be possible to improve accuracy and enable early-stage cancer prediction by placing emphasis on
ResNet-50 transfer learning models, which have demonstrated good accuracy in COVID-19 and breast cancer
detection. This finding could revolutionize the diagnosis and treatment of lung cancer by providing patients
with a more tolerable course for recovery.
Keywords: Lung cancer, LUNA 16, machine learning, CNN, RESNET 50, computer tomography (CT)
DOI: 10.1201/9781003606635-55
400 Innovations in Computational Intelligence: Trends and Technologies
iv) Network training: Utilize ‘train-Net- with the results providing insights into
work’ for image classification, speci- accuracy.
fying ‘Image Datastores’ for input • VGG 16
images, ‘layers’ for network configura- Compared to AlexNet, the Oxford Visual
tion, and ‘options’ for parameters like Geometry Group (VGG) model is more
learning rate (0.0001), accuracy target detailed and less complicated. 3 × 3 filters
(99.91%), max epochs (6), and vali- with stride, pad, and maximum pooling
dation frequency (every 3 iterations). sizes of 1 were employed in all network
Customize settings for plotting and layers. The VGG-16 architecture block
monitoring training progress, tailored design is shown in Figure 55.2. It consists
for lung cancer detection. of three fully-connected layers with a Soft-
v) Image categorization: The ultimate Max layer, thirteen convolution layers,
step entails categorizing output data five max-pooling layers, and sixteen layers
using confirming images, leading to the overall. Ultimately, the presence or absence
calculation of accuracy. Figure 55.2. of lung cancer is determined by a FC layer
visually represents validated images that incorporates the SoftMax layer [6].
alongside corresponding probabilistic • ResNet50
values. ResNet-50, short for Residual Net-
• Inception V1 work-50, is a revolutionary CNN that
The Inception V1 (GoogleNet) architec- has brought about a revolution in DL.
ture utilizes 1 × 1, 3 × 3, and 5 × 5 filters ResNet-50 is a deep residual learning-
to analyze images and reduce parameters based network that may be used to train
to 4 million from 60 million, making it very deep networks with hundreds of lay-
efficient. TL is crucial for training image ers. It was developed in 2015 by Kaim-
recognition models, especially for lung ing He and the Microsoft Research Asia
cancer detection, using GoogleNet. It team. Its inception was prompted by a
classifies images, distinguishing between remarkable observation in the realm of
benign and malignant tumors [5]. The DL—the straightforward addition of
process involves loading images, examin- more layers to a neural network did not
ing the network architecture, and using consistently yield performance improve-
pre-trained models. Base layers are frozen ments, contrary to conventional expecta-
to expedite training, and the network is tions. Despite the theoretical advantage of
trained with varying image sizes, achiev- enabling the network to assimilate prior
ing 94.10% accuracy in 46 hours. Vali- layers’ knowledge and additional infor-
dation identifies cancer-affected areas, mation, this didn’t manifest practically.
4. Critical Analysis
Author Comparison between different Lung Cancer Detection System
Year Problem Statement Dataset Method Accuracy
[15] 2023 A deep learning method for CT scan images ResNet-50 98%
lung cancer detection and
classification
[16] 2023 A method for detecting and LIDC-IDRI Modified 97.02%
classifying lung cancer Using the Dataset Alex Net
AlexNet CNN algorithm model Architecture
[17] 2022 Support vector machine and LUNA16 dataset Lung Net 97.42%
modified AlexNet architecture SVM Model.
for the detection of lung cancer
[18] 2021 Detection of lung cancer with CT scan images VGG-16 and 97%
the VGGNET-16 architecture Resnet
[19] 2020 CNN’s capability to identify Histopathological CNN 96.11%
lung cancer from the images
histopathological images
[20] 2019 In-depth examination of the LIDC-IDRI image AlexNet and 99.01%
AlexNet and Google Net for the dataset. GoogLeNet
detection of lung cancer
[21] 2018 CT scan images for CT scan images SVM 92%
identification of lung cancer
Abstract: It offers the brief description of the novel work done in combining the cryptography with the deep
learning strategies for the purpose of ensuring the maximum security and immunity in the data hiding pro-
cesses executed on the images. The method outlined in this work capitalizes on the training abilities of neural
networks to learn statistical details from pictures that are obtainable in various environments. In this way, it
also obtains a higher data-hiding capacity within these photos, and at the same time, maintains a higher image
quality of the stego-image. The hidden data shows fairly good immunity to a number of assaults and trans-
formations; the examples showed quite a stability in compression, noise, and geometrical attacks. The used
method proves a high professionalism to hide the hidden information and, therefore, makes the steganalysis or
revealing the data by other unauthorized persons or software quite difficult. However, one must point out some
challenges that arise with neural network training like the fact that it is a highly computationally expensive
operation is one of the biggest challenges as well as the fact that parameters need to be selected properly. This
approach can be considered as effective for creating secure communication and can be implemented in several
domains such as military use, medical and financial spheres. As for the issues arising from the application of
the developed methodology, it is assumed that further studies will expand on the methodology effectively and
examine the problems related to its large-scale use.
[email protected]; [email protected]
e
DOI: 10.1201/9781003606635-56
Cryptographic image concealment with neural networks 407
of the pictures heavily. Second, it is much less the analysis of spatial relations that can be
susceptible to interference, or attacks. Hence, observed in images, which makes them ideal
the data is less likely to be quantized when the for incorporating secret data by encoding it
image is compressed, noisy or geometrically into values of pixels. A study was made by
transformed. Third, it is less conspicuous; this [1] whereby the reliable identification of least
makes it hard to identify. This is because this significant bit (LSB) steganography in both
data is spread in such a manner that it almost the grayscale and the color photographs was
merges with the inherent characteristics of an examined. The aforementioned seminal study
image. made some recommendations that study
Here are some specific examples of how designs need to be taken to a higher level,
cryptographic image concealment with neu- thus the use of neural networks.
ral networks can be used: Other breakthroughs that are important
In military operations it can be used to to the advancements of steganographic meth-
embed coded messages in images meant for ods include generative adversarial networks
over the internet communication. In medical (GANs) [2]. In GANs, there are two interact-
imaging, it can be used to secure the privacy ing neural networks; the generator, and the
of the patients by masking the needed medi- discriminator. All of these networks are trained
cal information in the images. simultaneously in an adversarial training para-
In the process of financial operations it digm. Due to the nature that they can provide
can be used for securing the data involved in visually realistic images, experts in steganogra-
such operations obtaining the images applied phy find them very useful. The authors, Deep-
to electronic payments. Cryptographic image Steg that is the steganography method based
concealment using neural networks is a tech- on GANs was described in their research. This
nology that has recently emerged and has the one stresses the ability of deep learning to
likelihood to dramatically change the nature embed the data into image files.
of the paradigm regarding performances of
the concealment of data.
2.2. Applications of neural network-
based steganography
2. Literature Survey
The application of neural network-based
steganography covers various spheres, which
2.1. Neural networks in
proves high efficiency of this technology in
steganography question and its great importance to provide
Neural networks are widely used nowadays confidentiality of the communication and
in the context of steganography [1] they offer protect the information.
a rather nonlinear and verified approach to Secure communication: Organized by
the realization of the steganography concept application, one of the major areas of the
when embedding information into digital steganography based on the neural networks
images. Steganography as a concept of con- application is the sphere of the secure com-
cealed communication brings into focus the munication. This is the unique possibility of
capability of neural networks, more particu- parties that can convey secret information by
larly, deep learning models for the intents of placing it into inconspicuous graphics based
encoding and decoding of subtle information. on the use of neural networks for the purpose
Convolutional neural networks (CNNs) of both encoding and decoding the hidden
have been widely acknowledged as promi- data. This application has high significance in
nent in steganalysis and present a noteworthy different areas such as military communica-
application. In turn, convolutional neu- tion, banking, and health sector where infor-
ral networks possess great performance in mation security is the most critical factor.
408 Innovations in Computational Intelligence: Trends and Technologies
Train a neural network: A neural network pixel of the resultant image in a manner that
is trained to learn various statistical charac- cannot be distinguished from the original
teristics of the natural images. This can be image.
done by training the neural network on a A kind of technique to implement this is
large natural image as a type of training data. known as residual steganography. In residual
Hide the data in the image: The given steganography, the data is hidden in the resid-
data to be concealed is integrated into the ual images of the Image. The residual images
egg via the neutral network. This is done so are formed by taking the difference of the
that when modifying the pixels of the image, original image with the filter applied image.
the changes are made in a manner that is not Usually, the filtered image is obtained using
easily detected due to its resemblance to the Gaussian filter in order to smooth the edges
image characteristics. of the image.
Extract the data from the image: Since the One more approach to conceal the data
image carries important data, one can extract in the image is a Generative Adversarial Net-
the same using a neural network. This is done work approach or GAN for short. They are
by demasking the embedded data from the a kind of “deep” learning structure that is
image by using the above process. applied in image synthesis, among other uses.
Training a neural network: Thus, the selec- In GAN-based steganography, the data is
tion of the said neural network platform used therefore concealed in the latent space of the
in cryptographic image concealment depends GAN. The latent space is another representa-
on the particular specification of the imple- tion of the image that is used in generating
mentation. Nevertheless, a technique that is the image although not easily discernable.
often employed today is based on a CNN. But when it comes to conversion of data
CNNs are helpful in image processing because into image how much data it can extract
images are capable of learning the spatial fea- from the image
tures. When training the neural network for Again, the neural network undoes the
image reconstruction, other natural images whole process of embedding the data by using
are used in data input. This vivid descrip- this equation for extraction from the given
tion means that to train the neural network image. This is achieved by reconstructing the
a loss function has to be minimized in order original image out of the residual images or
to make the neural network able to define the latent space of the GAN. When the origi-
the statistical properties of such images. The nal image is reconstructed statistical tech-
loss function is usually the method measuring niques and machine learning algorithms can
the differences of the neural network outputs be used to extract the data from the image.
from the target values.
4. Innovation in Technology
3.1. Hiding the data in the image Of particular significance in the field of steg-
The next step is to provide the capability anography is the feature of learning and
to hide data in an image, so that even if the adaptability of so-called neural networks.
attackers gain the network and server access Training data and secret messages can be
and breaks into the computer they would not used to train the large picture creating neural
be able to obtain the data securely embedded networks to independently develop an abil-
in the image. ity to embed the secret messages in the man-
After training the neural network one can ner which would leave no discerned pattern
then use it to embed the data into the image. to the viewer. From this it can be concluded
This is made possible through altering the that the latter will be more difficult for the
410 Innovations in Computational Intelligence: Trends and Technologies
attackers to decipher and hidden messages Table 56.1. Comparing cryptographic image
will not be easily distinguishable. concealment with neural networks to traditional
The flexibility to apply the neural net- steganographic techniques
works for creating steganography systems Characteristic Cryptographic Traditional
where the image type used is unique is also image steganographic
a significant feature. An example where a concealment techniques
neural network could be trained could be with neural
in deep doctoring, for example, a network networks
could be trained to hide hidden messages in Data hiding High Medium to
medical pictures, and the diagnostic value capacity high
of the pictures would not be affected. This Robustness to High Medium to
could be used for the secure transmission of attacks high
the patients record information that is con- Detection High Medium to
sidered personal. difficulty high
Training Yes No
5. Results and Discussion requirement AQ3:
Please
Computational High Medium provide
From the title “cryptographic image con- cost source
cealment with neural networks” it is clear for all the
Source:
that two main approaches, namely cryp- AUTHOR'S SELF GENERATED tables
Abstract: This paper focuses on the automated animal entry detection as an important factor in wildlife conser-
vation, agricultural practices, and security, for which CNNs are used. Based on the idea of deep learning and
obraz processing, the suggested approach can successfully recognize and sort animals in the captured photo
or video stream to save the ecosystems and protect people’s concerns. The structural design involves a CNN
model, which is well designed and fine tuned for the purpose of identifying the presence of animals. The method
also includes complex processing of the picture, which enhances the model’s stability when handling a range
of illumination conditions and backdrop issues. It employs a buena calidad dataset for training and evaluation.
It is evident that the CNN model assures an appropriate recognition of the animal presence in a given frame
including multiple animals due to the training carried out in the model to detect many types of animals. This
type of research reduces the likelihood of animals intruding and using electricity, water, etc. by letting com-
puter systems observe them and alert about potential danger without human input. The CNN-based method
described in the work can be considered as the potential response to the growing need in the efficient techniques
for the detection of animal infiltrations, which is the pressing issue for both, conservation of the species and
enhancement of security measures in various fields.
Keywords: efficient, CNN-based approach, automated, animal intrusion detection, convolutional neural net-
work, deep learning, image processing, innovation, security
a
[email protected]; [email protected]; [email protected],
[email protected]; [email protected]; [email protected]; fbalajee.
[email protected]
DOI: 10.1201/9781003606635-57
An efficient CNN-based approach for automated animal intrusion detection 413
Networks (CNNs) and image processing tech- CNNs power many state-of-the-art solutions
niques that are applied here. The opening part for object recognition, classification, and seg-
of this paper provides a general overview of mentation tasks as they are designed to oper-
the problem’s importance, an outline of deep ate on image data.
learning is discussed before narrowing down CNNs are very good at feature extraction
to successful CNN-based method for auto- from images, looking for complex patterns and
mated animal intrusion detection. learning layers of abstraction in imagery. Their
ability to automatically detect and classify
1.1. Importance of animal intrusion objects in images or video frames has been suc-
cessfully exploited by a number of fields such
detection
as autonomous driving, medical image analysis,
As a result of converging human populations wildlife monitoring etc. [4]. Despite their sim-
and natural ecosystems with agricultural fields, plicity, these networks have been shown to be
people often come into conflict with wildlife. very good at detecting objects and are robust
Such conflicts may jeopardize both human against scale/rotation/in-plane deformation.
livelihoods and wildlife populations since they
can destroy property, crops and livestock [1]. 1.3. An efficient CNN-based
Identification needs to be effective and action
prompt to reduce these disputes. approach focus
Secondly, being able to see other species In this study, we developed an effective CNN
in their natural habitats is an important part based method for automatically recognizing
of wildlife conservation. Surveillance systems animal entry detection. By maximizing the
with animal entry detection allow work to be usage of CNNs and image processing tech-
done efficiently, which can mean the differ- niques, it seeks to address the shortcomings and
ence for ongoing conservation efforts. They difficulties associated with existing approaches.
help collect critical data for research and The intricate and versatility of wildlife in
monitoring of population dynamics, as well depart situations are challenging to classic
as support in-situ conservation efforts when creature intervention perception techniques,
using telemetry on wildlife [2]. which often based on rule-based method or
And finally on security, that is the largest sparse image processing algorithms. More
area of impact; touching critical infrastruc- often than not, these methods run into false
ture as well as transportation and private positives and negatives which leads to low
property. More accurate animal intrusion reliability of the toolkits used [5].
response can be leveraged for improved secu-
rity system effectiveness by causing actual
threats or vulnerabilities to now come further 2. Literature Review
forward on the timeline [3]. In consequence— Convolutional Neural Networks (CNNs) and
a strong demand for tools of automated image processing techniques have achieved
and efficient detection of animal infiltration remarkable results in automating animal
with applications in agriculture, security and intrusion detection. A literature review pre-
conservation. sents the state of the art, relevant contribu-
tions and trends in this kind of research.
1.2. The role of deep learning in
animal intrusion detection 2.1. Approaches for animal intrusion
In particular, convolutional neural networks detection
(CNNs) have driven the historic breakthrough The first traffic-based background removal
in computer vision using deep learning. methods, rule-based algorithms to detect
414 Innovations in Computational Intelligence: Trends and Technologies
moving objects (e.g., 2,3) and basic motion security applications need real-time detec-
detection methods in general for detecting tion. CNN architectures and data treatment
animals were prominent at an early stage. algorithms have been widely investigated so
These techniques had flaws, especially when as to fulfil those objectives [12].
it came to telling animals apart from non-
threatening things, which caused false alarms 2.4. Future directions
and inefficient resource utilization [6].
For more precise and effective animal Automated Animal Intrusion Detection has
incursion detection, recent research has been an evolving field of research and is
focused toward using CNNs and deep learn- maturing rapidly. These are some of the most
ing. It is shown in Figure 57.1. promising fields requiring study. Some of
these include multimodal sensor networks,
more robust CNN architectures and integrat-
2.2. Deep learning for object ing the environmental context. Indeed, there
detection still exist the state of practice issues surround-
In recent years CNNs have become a popular ing developing optimal CNN models for par-
method for detecting objects in images and ticular species or in conditions where data is
videos. CNNs can learn complex features especially scarce.
and patterns from images, hence automati-
cally detect and classify things. They are now 3. Methodology
suitable for use in applications like animal
incursion detection due to the advancement To automatically detect and classify ani-
of CNN architectures such as YOLO (You mals in images and video streams, the pro-
Only Look Once) [7] and Faster R-CNN [8]. posed CNN-Based Approach for Automated
Animal Intrusion Detection makes use of
Convolutional Neural Networks (CNNs)
2.3. Performance and real-time
together with image processing techniques.
support This method improves the accuracy of ani-
Among others, there is an issue of how effi- mal incursion detection, effectiveness and
cient are the CNN-based animal intrusion real-time ability for these systems. Funda-
detection systems and its response in real mental Features of This Technique. The tech-
time. Animal infiltration is a typical response nique is made up of the following essential
to the quick time of arrival, particularly in elements:
[11] You, Z., et al. (2021). Vision-Based Wildlife [13] Nemade V., Pathak S. and Dubey AK. ‘A
Detection and Monitoring with a Multi- systematic literature review of breast cancer
modal Sensor Network. IEEE Transactions diagnosis using machine intelligence tech-
on Geoscience and Remote Sensing. niques,’ Archives of Computational Methods
[12] Krizhevsky, A., Sutskever, I., and Hinton, in Engineering. Oct;29(6):4401-30, 2022.
G. E. (2012). ImageNet Classification with [14] Barhate, D., Pathak, S., and Dubey, A. K.
Deep Convolutional Neural Networks. ‘Hyperparameter-tuned batch-updated sto-
Advances in Neural Information Processing chastic gradient descent,’ Plant species iden-
Systems. tification by using hybrid deep learning.
Ecological Informatics, 75, 102094, 2023.
58 Next-generation smart cities:
Integrating blockchain, IoT, deep
learning, and Dingo optimization
K. Sankar1,a, Ramamani Tripathy2,b, S. Nandhini3,c, Aleem Ali4,d,
B. Santhosh Kumar5,e, and Balajee Maram6,f
1
Associate Professor, Department of CSE - ET, JNTUH, CVR College of Engineering, Vastunagar,
Mangalpalli, Ibrahimpatnam, Telangana, India
2
Associate Professor, Computer Science and Engineering, Chitkara University, Himachal Pradesh,
India
3
Assistant Professor, Department of BCA, K.S.R. College of arts and Science for Women, K.S.R. Kalvi
nagar, Tiruchengode, Namakkal
4
Professor, Department of CSE, UIE, Chandigarh University-Mohali, Punjab, India
5
Professor and Head of Department, Department of Computer Science and Engineering, Guru
Nanak Institute of Technology, Ibrahimpatnam, Ranga Reddy, Telangana, India
6
Professor, School of Computer Science and Artificial Intelligence, SR University, Warangal,
Telangana, India
Abstract: This abstract provides a summary concerning the research manuscript entitled “Next-Generation
Smart Cities: Integrating Blockchain, IoT, Deep Learning, and Dingo Optimization,” delving into the amalga-
mation of cutting-edge technologies to revolutionize urban settings. Against the backdrop of swift urbaniza-
tion and the evolution of technology, embedding Blockchain, Internet of Things (IoT), Deep Learning, along
with Dingo Optimization manifests as an essential strategy for cultivating smart cities that exhibit both intel-
ligence and resilience. The investigation articulates a prospective view where urban milieus adeptly assimilate
contemporary techniques to redefine urban living paradigms. The abstract outlines the manner in which the
security alongside transparency availed by Blockchain, the propensity for data production inherent to IoT, the
prowess in data scrutiny facilitated by Deep Learning, and the efficacy in resource allocation afforded by Dingo
Optimization conjoin to address complex urban challenges. Through the adoption of such strategies, smart
cities can potentially provide improved security, anticipatory analysis, data-driven resource management, and
optimized services for their inhabitants.
Keywords: Next-Generation Smart Cities, Integrating, Blockchain, IoT, Deep Learning, Dingo Optimization,
Innovation, Security
a
[email protected]; [email protected]; [email protected],
[email protected]; [email protected]; [email protected]; fbalajee.
[email protected]
DOI: 10.1201/9781003606635-58
420 Innovations in Computational Intelligence: Trends and Technologies
cities want to do more than just connect to run city tasks on their own. These tasks
things—they want to add smarts, safety, and could include billing for utilities and manag-
smooth operations. ing IDs [3-5]. Also, Blockchain tech might give
people more control over their own info and
help them share data for city analysis [6]. The
2. Literature Review picture in Figure 58.1 shows how important
Smart cities have caught a lot of attention as Blockchain tech is for Smart Cities.
more and more people move to urban areas
changing the world around us. Using technol- 2.3. IoT: enabling data-driven urban
ogy plays a key role in dealing with the many management
problems that come with growing city popu-
lations. This review looks at the latest stud- The Internet of Things (IoT) plays a key role
ies about using Blockchain Internet of Things in smart city technology. IoT devices, like
(IoT), Deep Learning, and Dingo Optimiza- sensors and actuators, collect loads of data
tion in smart cities. It highlights the unique from city areas. This information gives use-
contributions of each technology and the ful insights on things like traffic flow, energy
potential revolutionary effect their combina- use, air quality, and other related aspects.
tion could have on city ecosystems. Researchers have looked into ways to use
IoT-generated data to make city services bet-
ter, use resources more, and get citizens more
2.1. Smart cities: a tech-driven shift
involved [7-9]. Nonetheless, the substantial
in urban planning amount of data produced presents difficulties
Smart cities integrate information and com- in relation to the processing, analysis, and
munication tech into city infrastructure to storage aspects.
boost resource management, improve ser-
vices, and enhance residents’ lives [1]. As cit- 2.4. Deep learning for urban insights
ies grow more complex, it becomes crucial to
optimize energy use, control traffic, handle Deep Learning, a concept that falls under
waste, and upgrade other services. Research the machine learning hemisphere, has tech-
in this area focuses on using Internet of nological skills which are very high. As they
AQ1:
Things (IoT) devices to collect real-time data. can handle large datasets with smart cities,
Please
note that This data helps make informed decisions and the deep learning algorithms have a potential
reference improves how we run our cities [2].
citation
is not in
sequential
order and
2.2. Blockchain’s role in smart cities
cross-
CHECKED AND
reference
Blockchain
CONFIRMED technology, which cryptocurrency
missing. first brought to light, has caught a lot of eyes
due to its ability to address security and trust
issues in various areas, including smart cities
[2]. Research shows that Blockchain’s decen-
tralized and tamper-proof features could
boost the security of data that Internet of
Things (IoT) devices generate. This goal can
be met by keeping data intact and lowering AQ2:
the risk of cyber attacks [9]. People have pro- Figure 58.1. Blockchain’s Role in Smart Please
posed using smart contracts, which are agree- Cities [14-15]. provide
source for
ments you can program with Blockchain tech, Source:
AUTHOR'S SELF GENERATED the figure
Next-generation smart cities: Integrating blockchain, IoT, deep learning, and Dingo optimization 421
to be used for the very many, not only for 3.2. Deep learning for predictive
the sake of them but prominently including analysis
areas such as traffic predictions, anomal, and
demand forecasting [6]: Conceived in 1,941, The Blockchain, hence, exposes the recorded
digital tools such as calculators, transform- data to deep learning algorithms. The algo-
ing daily tasks are also some s of Implement- rithms mentioned above take responsibility
ing the same idea in Information Technology for analyzing the data to acquire valuable
was occurring in similar to how any number insights which would assist in making deci-
divided by itself results in one. In particular sions. Deep learning techniques are applied
integration now refers to the cybersecurity in the domain of traffic management in an
are improving the security which was not attempt to predict the traffic congestion pat-
the case before such as routers, switches, and terns by making use of historical and real-
gateways. The integrated framework is all time data. It provides predictive capability,
about the use of Blockchain, IoT, deep learn- hence easier to take proactive measures to
ing, and dingo as a unit [10-13]. avert congestion and optimize routes. In the
case of energy management, deep learning is
capable of inferring patterns from electric-
3. Integrated framework: ity consumption data; such inference has
enabled the optimization of energy distribu-
blockchain, IoT, deep learning,
tion processes to avoid the waste of energy
and dingo unnecessarily.
The integrated framework encompasses the
utilization of blockchain technology, Internet 3.3. Dingo optimization for efficient
of Things (IoT) devices, deep learning algo- resource allocation
rithms, and the incorporation of dingo as a
component. The Dingo Optimization method, inspired
by the efficient hunting behaviors of dingoes,
brings an individual addition to the avail-
3.1. Foundations of the framework able framework. Dingo Optimization is a
The core of the overall system as well as the methodology used in distributing municipal
suggested technology, which is part of the resources effectively and in the best possible
technology stack, is to build more a compre- manner. Consideration of numerous elements
hensive and interconnectivity. It opens the like demand, cost, and availability during
way for the blockchain-based IoT framework energy management will help in assessing the
utilization. For example, a precise chain of optimum “crypto allocation through which
blocks recorded by blockchain technology energy resources are to be allocated. Simi-
can serve as the guaranteed proof through larly, within waste management contexts,
which IoT networks can remove security algorithms can be used to determine collec-
issues. Internet of Things (IoT) devices play tion routes in a way that will use the least fuel
a significant role in providing real-time data and reduce environmental impact.
that is utilized by deep learning algorithms,
hence facilitating the generation of insights
based on data analysis. Dingo Optimization
4. Methodology
is another oriented methodology for resource A properly structured and well-process-
allocation systems to work well on urban oriented approach needs to be followed in
resources. All these technologies integrate order to successfully install and assess the
and provide the effective management frame- sophisticated smart city infrastructure that
work for smart cities. uses Blockchain, IoT, Deep Learning, and
422 Innovations in Computational Intelligence: Trends and Technologies
Dingo Optimization. These process-oriented depend on the use case in question and could
approaches include steps such as data collec- range from a convolutional neural network
tion and preprocessing, algorithm creation, to a recurrent neural network. For example,
integration, and assessing their performance. Convolutional Neural Networks may process
the security camera visual data to identify
4.1. Data collection and irregularity patterns or those characterizing
traffic congestion. Yet another merit of RNNs
preprocessing
is the handling of time-series data predictive
The initial stage entails the collection of a analysis, thus facilitating tasks like energy
wide range of data from many urban sources, consumption forecasting or even traffic flow
encompassing Internet of Things (IoT) predictions.
devices, sensors, and other systems that gen-
erate data. The dataset has the potential to 4.4. Dingo optimization algorithm
include a wide range of information pertain-
ing to traffic patterns, energy usage, waste Another metaheuristic algorithm inspired
management, air quality, and other related by the hunting behavior of dingoes is the
factors. In order to guarantee the correct- Dingo Optimization Algorithm. In a way,
ness and trustworthiness of the data, vari- it is explicitly designed to mimic the pro-
ous measures are implemented to assess data cess of solving optimization problems. For
quality and undertake preprocessing proce- this reason, the need for the application
dures. The process entails the elimination of in enhancing the allocation of resources
outliers, addressing missing data, and trans- within the smart city ecosystem tailored
forming raw data into appropriate represen- the Dingo Optimization algorithm. Param-
tations to facilitate subsequent analysis. eters related to the number of dingoes, their
moving strategies, and landscape of opti-
mization are deeply tuned. In the case of
4.2. Blockchain integration
energy management, the parameters of the
The blockchain technology is at the base of algorithm get tuned considering fluctua-
the system and provides guarantees concern- tions of energy demands, cost factors, and
ing security, transparency, and traceability availability constraints.
of data. The integration of Blockchain tech-
nology will carefully select a Blockchain
platform—Ethereum or Hyperledger. After 5. Innovation in this Technology
this, there are definitions for smart contracts The following are some of the specific devel-
responsible for validation data and control- opments being made in each of these areas:
ling access. Moreover, consensus mechanisms Blockchain:
are in place that enable the integrity and reli- • New, more scaleable and efficient consen-
ability of blockchain ledger. The integration sus algorithms developed to be used in
process involves setting cryptography identi- smart city applications
ties for IoT devices to communicate securely • Blockchains that are privacy protecting
with the blockchain network. • Integration of blockchain with other Inter-
net of Things and smart city technologies
4.3. Deep learning model
IoT:
development • New sensors and devices which are low
Deep learning models are a crucial means to cost and energy-efficient
gain insight from the urban data harnessed. • New protocols for connecting a new
The deep learning architectures chosen device with IoT
Next-generation smart cities: Integrating blockchain, IoT, deep learning, and Dingo optimization 423
• New IoT data applications, such as smart was one of the major problems associated
parking and smart buildings with the conventional approach and was
mainly caused due to inadequate traffic con-
Deep Learning: trol strategies. Deep learning models were
• New deep learning algorithms that per- used inside the integrated framework to
form better and are more efficient for study the traffic pattern in real time, leading
smart city applications to optimization of the traffic signal timings.
• New applications of deep learning, such Consequently, congestion levels decreased,
as fraud protection and anomaly detection and the flow improved, generally enhancing
urban mobility.
Dingo optimisation:
• New improved versions of the Dingo opti- 6.2. Energy consumption
misation algorithm that can be applied to
a greater range of problems The traditional paradigm had inefficient dis-
tribution mechanisms for energy use, hence
resulting in the waste of resources. In con-
6. Results and Discussion: trast, the harmonized framework utilized the
Comparative Evaluation of Dingo Optimization algorithm in optimizing
the distribution of energy, considering fac-
Integrated Framework
tors such as demand, cost, and availability.
The integration of Blockchain, Internet of Accordingly, energy was not wasted, and
Things, Deep Learning, and Dingo Optimiza- financial savings were achieved as well while
tion provides a comprehensive platform for at the same time maintaining constant energy
the growth of smart city initiatives. In order provision.
to assess the performance of the frame-work,
comparative analysis has been carried out 7. Conclusion
with consideration to key performance met-
rics. The findings unequivocally show that This framework, which amalgamates block-
this all-inclusive approach had a great impact chain, IoT, deep learning, and Dingo optimi-
on different dimensions of urban governance. zation, offers potential huge transformations
to further the advancement of smart city
development. The new approach makes use
6.1. Traffic congestion of the unique capabilities of each technol-
Traffic congestion is the state wherein the ogy in handling a diverse range of challenges,
number of vehicles on a road is in excess of from data security to predictive analytics
its capacity, resulting in slower speeds and and from efficient resource allocation to citi-
thus longer travel times. Traffic congestion zen participation. It develops an integrated,
intelligent urban ecosystem by ensuring that,
Metric Traditional Integrated among other techniques, storage of data from
Approach Framework IoT applications is secure on the Blockchain,
Traffic High Reduced deep learning algorithms are used in extract-
Congestion ing meaningful insights, and optimal resource
Energy Suboptimal Optimized allocation through Dingo Optimization.
Consumption
AQ3:
Please Waste Inefficient Efficient References
provide Management
caption [1] Caragliu, A., Del Bo, C., and Nijkamp, P.
source for Citizen Limited Enhanced (2011). Smart cities in Europe. Journal of
the table Engagement urban technology, 18(2), 65–82.
AUTHOR'S SELF GENERATED
424 Innovations in Computational Intelligence: Trends and Technologies
[2] Swan, M. (2015). Blockchain: blueprint for [10] Zheng, Z., Xie, S., Dai, H.-N., Chen, X., and
a new economy. O’Reilly Media, Inc. Wang, H. (2017). An overview of blockchain
[3] Drescher, D. (2017). Blockchain basics: technology: Architecture, consensus, and
A non-technical introduction in 25 steps. future trends. In Proceedings of IEEE inter-
Apress. national congress on big data (pp. 557–564).
[4] Ekblaw, A., Azaria, A., Halamka, J. D., and [11] Adeli, H., and Ardalan, S. (2019). Dingo
Lippman, A. (2016). A case study for block- optimization algorithm: a new meta-heuris-
chain in healthcare: “MedRec” prototype tic approach for solving optimization prob-
for electronic health records and medical lems. Neural Computing and Applications,
research data. Proceedings of IEEE open and 31(11), 6631–6652.
big data conference, 1–10. [12] Chatterjee, S., and Gupta, D. (2020). Block-
[5] Atzori, L., Iera, A., and Morabito, G. (2010). chain-enabled secure data sharing frame-
The Internet of Things: A survey. Computer work for smart cities. Sustainable Cities and
networks, 54(15), 2787–2805. Society, 54, 101967.
[6] LeCun, Y., Bengio, Y., and Hinton, G. (2015). [13] Muhammad, A.N., Aseere, A.M., Chiroma,
Deep learning. Nature, 521(7553), 436–444. H. et al. Deep learning application in smart
[7] Adeli, H., and Ardalan, S. (2019). Dingo cities: recent development, taxonomy, chal-
optimization algorithm: a new meta-heuris- lenges and research prospects. Neural Com-
tic approach for solving optimization prob- put and Applic 33, 2973–3009 (2021).
lems. Neural Computing and Applications, [14] Nemade V., Pathak S. and Dubey AK. ‘A
31(11), 6631–6652. systematic literature review of breast cancer
[8] Zanella, A., Bui, N., Castellani, A., Van- diagnosis using machine intelligence tech-
gelista, L., and Zorzi, M. (2014). Internet niques,’ Archives of Computational Methods
of things for smart cities. IEEE Internet of in Engineering. Oct;29(6):4401–30, 2022.
Things Journal, 1(1), 22–32. [15] Barhate, D., Pathak, S., and Dubey, A. K.
[9] Biswas, K., and Misra, S. (2020). Security in ‘Hyperparameter-tuned batch-updated sto-
internet of things: Issues, challenges, taxon- chastic gradient descent,’ Plant species iden-
omy, and architecture. Computers and Elec- tification by using hybrid deep learning.
trical Engineering, 81, 106526. Ecological Informatics, 75, 102094, 2023.
59 Intelligent diagnosis of diabetic
retinopathy: Leveraging machine and
deep learning
Balajee Maram1,a, S. Arun Joe Babulo2,b, B. Manivannan3,c,
B. Santhosh Kumar4,d, T. Daniya5,e, and Sasibhushana Rao Pappu6,f
1
Professor, School of Computer Science and Artificial Intelligence, SR University, Warangal,
Telangana, India
2
Assistant Professor, Department of BCA, K.S.R. College of arts and Science for Women, K.S.R. Kalvi
Nagar, Tiruchengode, Namakkal, India
3
Assistant Professor, Department of CSE, Vivekanandha College of Engineering for Women,
Tiruchengode
4
Professor and Head of Department, Department of Computer Science and Engineering, Guru
Nanak Institute of Technology, Ibrahimpatnam, Ranga Reddy, Telangana, India
5
Assistant Professor, Department of CSE—AI and ML, GMR Institute of Technology, Rajam
6
Assistant Professor, Department of Computer Science and Engineering, GITAM School of
Technology, Visakhapatnam Campus, GITAM (Deemed to be University)
Abstract: This abstract presents a succinct summary of the research proposal entitled “Diagnosis of DR utiliz-
ing ML and DL Techniques.” The proposal aims to tackle the urgent matter of DR, which stands as a prominent
contributor to visual impairment in individuals with diabetes. The current diagnostic procedures employed in
traditional practices are characterized by a manual approach that is both labor-intensive and time-consuming.
Consequently, there is a growing demand for automated diagnostic solutions that can provide accurate results.
This study is to create a resilient model utilizing ML and DL methodologies in order to improve the effective-
ness and precision of diagnosing DR based on retinal pictures. The study proposal delineates various objec-
tives, including the gathering and preprocessing of datasets, the exploration of machine learning techniques for
feature extraction, the building of deep learning architectures, and the full evaluation of the presented meth-
ods. This study aims to conduct a comparative analysis between the suggested models and established manual
diagnosis techniques, thereby offering significant insights into their respective efficacy. It provides a valuable
contribution to the area of medicine by introducing a sophisticated diagnostic tool for DR.
Keywords: DR, machine learning, deep learning, retinal images, diagnosis, automated, accuracy, efficiency,
medical imaging
a
[email protected], [email protected]; [email protected]; cmanicse1981@gmail.
com; [email protected]; [email protected]; [email protected]
DOI: 10.1201/9781003606635-
426 Innovations in Computational Intelligence: Trends and Technologies
machine learning specialists. This collabora- identify referable DR. The CNN achieved an
tive effort is crucial in order to facilitate the impressive Area Under the Receiver Operat-
creation of dependable and morally sound ing Characteristic Curve (AUC-ROC) value
diagnostic instruments. of 0.991, which is comparable to the perfor-
mance of human experts [3]. In their study,
Quellec et al. (2016) utilized deep learning
2. Literature Survey techniques to extract characteristics from
DR is a notable microvascular condition retinal pictures for the purpose of DR screen-
associated with diabetes mellitus, present- ing. The authors reported notable levels of
ing a considerable risk to worldwide public sensitivity and specificity in their findings [4].
health since it has the capacity to induce vis- These research have demonstrated a signifi-
ual impairment and complete loss of vision. cant shift in the prevailing paradigm, as they
This literature review investigates the pro- have emphasized the capacity of deep learn-
gression of utilizing ML and DL methodolo- ing models to autonomously identify intri-
gies for the automated detection of DR based cate patterns in retinal images. Consequently,
on retinal pictures. This technique provides a there is a potential for enhanced diagnostic
more efficient diagnostic process. accuracy.
methodology encompasses various stages, adapting these models to the specific task of
including data collection, preprocessing, diagnosing DR. The CNNs that have been
model construction, training, evaluation, and developed possess the capability to acquire
comparison with established manual diagno- hierarchical features directly from unpro-
sis techniques. cessed retinal pictures, thereby obviating the
Data Collection and Preprocessing: The necessity for human feature extraction.
foundation of any machine learning or deep Model Training and Evaluation: It takes
learning project is a well-annotated and 70% for training, 15% for validation, and
diverse dataset. For this research, a dataset of 15% for testing in this experiment. The mod-
retinal images encompassing normal and DR- els that were built in the earlier phases will
affected cases will be collected. Sources for be trained using optimisation techniques like
this dataset may include publicly available Adam or stochastic gradient descent (SGD).
databases like Kaggle’s DR Detection dataset The optimization of training parameters,
or collaborations with medical institutions. such as learning rates and batch sizes, will be
The collected dataset will undergo pre- achieved by empirical experimentation.
processing to ensure its suitability for train- For evaluation, the following metrics will
ing and evaluation. Preprocessing steps will be employed:
include: Analyse the model’s sensitivity and speci-
Image Resizing and Normalization: ficity in terms of its capacity to distinguish
Rescale all images to a consistent size, ensur- between positive (DR-affected) and negative
ing compatibility across different models (normal) cases.
and algorithms. Normalize pixel values to To assess the overall performance of a
enhance convergence during training. model, compute the area under the receiver
Data Augmentation: Use data augmenta- operating characteristic curve (AUC-ROC).
tion methods to improve model generalisa- Comparison and Analysis: The perfor-
tion, such as rotation, flipping, and random mance of the developed machine learning
cropping, to make the dataset appear larger models and deep learning CNNs will be com-
than it actually is. pared against each other and benchmarked
Feature Extraction and Machine Learn- against existing manual diagnosis methods
ing: The utilization of conventional machine by ophthalmologists. The analysis will delve
learning algorithms will be implemented to into the strengths and limitations of each
extract features and classify retinal pictures. model, discussing scenarios where automated
This study will examine well-known methods diagnosis might complement or even surpass
such as SVM, Random Forests, and Gradient manual assessment.
Boosting. The process of feature extraction Ethical Considerations: The research
entails the calculation of pertinent properties will adhere to ethical guidelines and obtain
from the retinal pictures. The aforementioned necessary approvals for using patient data.
features encompass vessel calibers, tortuosity, Anonymization techniques will be employed
textural patterns, and statistical data. to protect patient identity.
Deep Learning Model Design: The research Interpretability and Explainability: The
will heavily rely on deep learning models, interpretability and explain ability of deep
specifically CNNs, as a pivotal component. learning models will be improved in an
This study will investigate different architec- attempt to overcome their “black-box”
tures, such as well-known models like VGG, nature.
ResNet, and EfficientNet. The utilization of Software and Tools: The study uses pro-
transfer learning will be implemented using gramming languages, such as Python, in con-
ImageNet. The process of fine-tuning involves junction with frameworks such as TensorFlow,
Intelligent diagnosis of diabetic retinopathy: Leveraging machine and deep learning 429
Keras, and Scikit-learn, to facilitate the build- suggesting their potential utility in accurately
ing and evaluation of models. The results and classifying retinal pictures for the purpose of
discoveries will be visually represented using diagnosing DR. Nevertheless, the deep learn-
visualization tools such as Matplotlib and ing models exhibited improved performance
Seaborn. compared to the other models, indicating the
enhanced capability of CNNs in capturing
complex characteristics.
4. Results and Discussion CNNs, such as VGG, ResNet, and Effi-
The findings of the research investigation per- cientNet, have exhibited remarkable levels of
taining to the identification of DR through the accuracy, ranging from 0.93 to 0.95, in the
utilization of ML and DL methodologies are field of deep learning. Significantly, Efficient-
displayed in the subsequent tabular arrange- Net demonstrated a remarkable accuracy of
ment. The performance metrics of the models 0.95, so highlighting its capacity to effectively
that were constructed are described in detail, extract and acquire pertinent characteristics
including a comparison analysis and a discus- from retinal pictures. The models also dem-
sion of the findings. The comparison findings onstrated excellent sensitivity and specificity
are presented in Table 59.1. values, indicating their ability to effectively
differentiate between normal instances and
4.1. Comparative analysis and cases impacted by DR.
discussion
The table shows performance metrics of many 5. Conclusion
models used in the diagnosis of DR, such as In summary, this research investigation has
Random Forest, Gradient Boosting, SVM, effectively showcased the capabilities of ML
and many CNNs like ResNet, VGG, and Effi- and DL methodologies in the identification
cientNet. The parameters that are evaluated and assessment of DR through the analysis
include the area under the receiver operating of retinal pictures. The research conducted in
characteristic curve (AUC-ROC score), sensi- this study involved various stages, including
tivity, specificity, and accuracy. data collecting, preprocessing, model crea-
With accuracy scores ranging from 0.85 tion, training, and evaluation. These stages
to 0.91, the traditional machine learning demonstrated the progression from conven-
methods Random Forest, Gradient Boost- tional machine learning approaches to more
ing, and SVM showed promising results. The sophisticated CNNs [7,8].
aforementioned models exhibited satisfac- The comparative investigation demon-
tory levels of sensitivity and specificity, hence strated that deep learning models, specifically
Abstract: This comprehensive overview article looks at the possible revolution that augmented reality (AR)
technology might bring to the real estate industry. It recognizes the impact of contemporary technology on inte-
rior design, decision-making, and property visualization while highlighting the opportunities they present to
prospective buyers. These applications offer contemporary property searches and transactions, making it secure
and easy for customers to identify properties that meet their needs. The report also highlights the significance
of internet-based real estate applications, particularly during emergencies like as the COVID-19 pandemic.
The paper identifies many key research areas for the future, including a thorough examination of realistic AR
integration, extremely advanced data analytics, effective blockchain-based transactions, machine learning for
fraud detection, and the assessment of user experience and acceptance. It also highlights how important it is to
consider moral and legal considerations, comprehend market dynamics and economic impacts, do comparative
analysis, maintain an international perspective, and consider the long-term consequences of technology adop-
tion in the real estate sector. This article provides academics and industry professionals with a roadmap for
using ethical and technological innovation to meet the evolving needs of the real estate industry. In conclusion,
a more open, informed, and flexible market may result from the use of augmented reality (AR) technology to
the real estate sector as well as from broader technological integration.
DOI: 10.1201/9781003606635-
432 Innovations in Computational Intelligence: Trends and Technologies
The symmetric ecology created by the inte- 2.3. Inclusion and exclusion criteria
gration of these several components improves
Establish transparent inclusion and exclusion
the overall experience and streamlines the
criteria for the sources to be incorporated in
house search process. The project’s construc-
our review. Criteria may involve publication
tion of an inclusive marketplace is one of its
date, source credibility, relevance to the topic,
best characteristics. Users may access mate-
and the research methodology employed.
rials, housing assessments, virtual tours of
possible living areas, housing listings, and
aids for navigating the campus. Contributed 2.4. Data collection
by former tenants, housing assessments pro- Systematically gather and organize the iden-
vide insightful information on the standard tified literature based on our search results.
of living and establish a community-driven Employ a reference management system to
resource for well-informed decision-making. catalogue all sources, ensuring proper cita-
In addition to giving users a venue to look tion and tracking.
for and assess housing possibilities, the mar-
ketplace makes virtual tours possible so that
users may virtually tour possible living areas.
2.5. Data synthesis
Putting it all up, the Digital Dwelling Hub Analyze and synthesize the selected literature
initiative is leading the way in housing-related to identify predominant themes, recurring
technology innovation. The MERN stack’s trends, and significant findings. Conduct a
capabilities combined with augmented real- comparative analysis, highlighting common-
ity results in a single platform that completely alities and disparities across the reviewed
transforms the way properties and home studies.
décor items are seen and interacted with in
the digital world. 2.6. Framework development
Formulate a conceptual framework that
2. Methodology encapsulates the integration of AR and VR
technologies in the real estate industry. This
2.1. Define research objectives framework will be constructed based on the
Clearly determined the research objectives for synthesized literature. Utilizing the frame-
our review paper. Decide the specific aspects work to structure our review paper logically
of AR integration in the real estate industry and coherently.
that we aim to explore.
2.7. Critical analysis
2.2. Literature search Undertake a critical analysis of the litera-
Perform a systematic and exhaustive search ture, appraising the strengths and limitations
of academic databases, peer-reviewed jour- of the existing research. Evaluate the qual-
nals, conference proceedings, and reputable ity of the research methods employed in the
sources relevant to AR, VR, and their appli- reviewed papers, emphasizing their suitability
cations within the real estate sector. Utilize and effectiveness.
pertinent keywords and search terms to focus
our search. Categorize the retrieved literature 2.8. Thematic categorization
into meaningful themes or topics, including Organize the reviewed literature into rele-
technology applications, user experiences, vant themes or categories that align with our
market trends, and challenges. research objectives. Elaborate on each theme,
Digital dwelling hub: Revolutionizing real estate with AR and smart home integration 433
features of smart building. Users can adjust to transform various aspects of the real estate
lighting, temperature, security systems, and industry, from property viewing and market-
more through AR interfaces. ing to maintenance and decision-making.
4.4. Bing Zhu et al. (2022) on local on physical home visits and property mar-
real estate market risk keting but lacks details on the research
methods [7].
• Strengths: The paper inspects the pric-
ing of risk associated with the location of
assets in the real estate market. It offers 4.8. Monika Arora et al. (2022) on
practical insights for investors. information system security
• Weaknesses: The summary doesn’t pro- • Strengths: The paper discusses the use of
vide details about the data, methodology, AI and blockchain in securing collabo-
or specific findings of the study. It lacks rative information systems, which is a
information about the sample size and instant and important topic.
scope [4]. • Weaknesses: The summary provides an
overview of the research objective but
4.5. Richard Grover et al. (2022) lacks specific findings or methodologies.
on automated valuation models It does not detail the scope of the data
(AVM) analysis and AI [8].
and entertainment, and big data tech- improve information system security and
nology is transforming the real estate fraud detection.
appraisal industry. Automated solutions
like AVM are becoming more accessible
and relevant. 6. Conclusion
2. Sustainability and Modern Heritage: The The literature study provides a thorough
re-establishment of modern heritage is examination of the difficulties and complexi-
a growing concern, requiring a balance ties present in the real estate sector, high-
between historical compatibility, energy lighting the need for creative solutions to
efficiency, and economic feasibility. improve the experiences of professionals and
3. Real Estate Market: Location-based risks consumers alike. By giving potential buyers
and market performance are connected new tools to visually explore properties and
with each other, with a focus on under- envision their future homes, it acknowledges
standing local real estate market risks and the potential of augmented reality (AR) and
their impact on the market. virtual reality (VR) technology to revolution-
4. Remote Work and Learning: The COVID- ize the real estate industry. These technologies
19 pandemic has advanced remote work also make it easier to visualize interior designs
and distance learning, impacting aca- in 3D, which helps buyers of real estate make
demia and the inclusive workforce. more educated choices. The assessment recog-
5. Information Security: The latest tech- nizes the distinct difficulties brought about by
nologies like Artificial Intelligence, Deep the COVID-19 epidemic and emphasizes the
Learning, and Blockchain are being vital role that internet real estate apps have
explored to enhance system security of played in this historic period. Online real
the information. estate applications were indispensable tools
when lockdowns and restrictions rendered it
5.2. Implications impossible for people to see houses in person.
These apps offered a simple and safe way for
1. Education and Entertainment: The inte- people to find properties that fit their needs.
gration of AR in education and enter- These platforms make it easy for buyers to
tainment is likely to continue to grow, explore properties from the comfort of their
transforming traditional methods. homes by allowing them to search for proper-
2. Heritage Preservation: The re-establish- ties based on location, size, budget, and spe-
ment of modern heritage buildings should cific features. They also provide 360-degree
consider new uses, energy efficiency, and virtual tours, high-quality images, detailed
economic sustainability. property listings, and even AR and VR func-
3. Real Estate Appraisal: The use of big data tionalities. Furthermore, by allowing users to
and technology can enhance the accuracy narrow their searches based on a variety of
of real estate appraisal. Research should criteria, these online real estate platforms fre-
focus on improving these technologies. quently provide extensive search and filtering
4. Investment Decisions: Location-based capabilities, which streamline the property-
risk measures can be used by investors hunting process. They also make it easier for
to make informed real estate investment sellers and real estate brokers to communicate
decisions. directly, which enables negotiations, online
5. Remote Work and Learning: Remote property tours, and speedy paperwork pro-
work and distance learning are becoming cessing. The COVID-19 epidemic brought to
a more permanent part of the workforce. light the value of these internet resources for
6. Information Security: Organizations the real estate sector, since they are essential
should explore advanced technologies to
Digital dwelling hub: Revolutionizing real estate with AR and smart home integration 437
for safely and effectively conducting transac- [2] Barreca, A.; Curto, R.; Malavasi, G.;
tions in addition to being search engines for Rolando, D. Energy retrofitting for the
properties. With the help of AR and VR tech- Modern Heritage enhancement in weak real
nology, the real estate industry is going digital. estate markets: The Olivetti housing stock in
This means that purchasers can now search Ivrea. Sustainability 2022, 14, 3507.
[3] [https://doi.org/10.3390/su14063507]
and assess homes from a distance, guaran-
[4] Wei, C.; Fu, M.; Wang, L.; Yang, H.; Tang,
teeing the market’s survival through difficult
F.; Xiong,
times. This literature analysis concludes by [5] Y. The research development of hedonic
highlighting the revolutionary potential of price model- based real estate appraisal in
AR and VR technology while successfully the era of big data. Land 2022, 11, 334.
acknowledging the delicate structure of the [https://doi.org/10.3390/land11030334]
real estate sector. It emphasizes even more [6] Z hu, B.; Lizieri, C. Local beta: Has local
how important internet real estate applica- real estate market risk been priced in REIT
tions are, especially in times of extreme situa- returns? J. Real Estate Financ. Econ. 2022,
tions like the COVID-19 epidemic. 1–37.
These applications offer a safe and effec- [7] Renigier-Biłozor, M.; Zr´ óbek, S.; Walacik,
tive option for property searches and trans- M.; Borst, R.; Grover, R.; d’Amato, M.
actions, streamlining the process of locating International acceptance of automated mod-
ern tools use must-have for sustainable real
homes that satisfy people’s needs. Future
estate market development. Land Use Policy
developments in the real estate industry
2022, 113, 105876.
might result in a more knowledgeable, acces- [8] Chong, J.; Phillips, G. COVID-19 losses to
sible, and robust market thanks to the use of the real estate market: An equity analysis.
technology. Financ. Res. Lett. 2022, 45, 102131.
[9] Xiong, C.; Cheung, K.; Levy, D.; Allen, M.
The effect of virtual reality on the marketing
References of residential property. Hous. Stud. 2022,
[1] Chenna, S. Impact of Augmented and Virtual 1–24. [ https://doi.org/10.1080/02673037.2
Reality on Various Sector. Available online: 022.2074971].
https://ssrn.com/abstract=4017815 (January [10] Arora, M.; Bhardwaj, I. Artificial Intelligence
2022). in Collaborative Information System. Int. J.
Mod. Educ. Comput. Sci. 2022, 14, 44–55.
61 Mobilenet-v3: A comprehensive survey
of object detection algorithms using
CNN
Rasheeq Zehraa, Omkar Sharmab, Vinayakc, and Rudrendra
Bahadur Singhd
Department of Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management, Lucknow, India
Abstract: Deep learning ushered into a new era of computer vision where state-of-the-art and time-saving algo-
rithms have been generated to address tasks such as, the detection of objects, image restoration, and classifying
images. The primary goal of this paper is to present an in-depth evaluation of the four most popular deep learn-
AQ1: ing architectures in computer vision: MobileNetV3, you only look once (YOLO), swin transformer, and efficient
Please
provide
NOTE
net. Instead, we scrutinize their actual uses in practice and provide an extensive comparison across a number
ADDED
the of accepted benchmarks. However, in a number of applications of computer vision, mobilenetv3 is one of the
expan- best lightweight and flexible CNN architectures that has so far reached the highest accuracy ever recorded.
sion for The model has very high efficiency and an impressively low computational cost, achieving such notable perfor-
YOLO. mance for its moderate size. This makes mobilenetv3 ideal for deployment on embedded and mobile devices and
resource-limited environments. Lastly, exhaustive research will be conducted yielding meaningful results with
AQ2: which our readership will be able to choose the best suitable algorithm for them.
OTE ADDED
Please
provide
the Keywords: Mobilenetv3, YOLO, swin transformer, efficientnet, comparative analysis, one-stage object detec-
expan- tion, two-stage object detection, computer vision, image classification, lightweight depth-wise convolutions
sion for
CNN.
a
[email protected]; [email protected]; [email protected]; dRudra.rathor20@gmail.
com
DOI: 10.1201/9781003606635-61
Mobilenet-v3: A comprehensive survey of object detection algorithms using CNN 439
means training a model on a big dataset like IEEE, Oct. 2021, pp. 9992–10002. Liu Z,
imagenet after which we employ the same Lin Y, Cao Y, et al. Swin Transformer: hier-
model to train another one in a smaller data- archical vision transformer using shifted
set, for instance, the one containing various windows. In: 2021 IEEE/CVF International
plant diseases. As was mentioned in all the Conference on Computer Vision (ICCV).
IEEE; 2021:9992-10002. doi:10.1109/
architectures above, transfer learning works.
ICCV48922.2021.00986.
Interestingly, transfer learning is commonly
[3] Liang J, Cao J, Sun G, Zhang K, Van Gool
applied to boost the accuracy of these archi- L, and Timofte R. SwinIR: image resto-
tectures on limited data sets. ration using Swin transformer. In: 2021
IEEE/CVF International Conference on
Computer Vision Workshops (ICCVW).
4. Conclusion IEEE; 2021:1833-1844. doi:10.1109/
In the changing world of computer vision ICCVW54120.2021.00210.
algorithms, we have thoroughly examined [4] Sutaji D, and Yıldız O. LEMOXINET:
four models—mobilenetv3, YOLO, swin lite ensemble MobileNetV2 and Xcep-
transformer, and efficientnet—to evaluate tion models to predict plant disease. Ecol
their performance in terms of accuracy, model Inform. 2022;70:101698. doi:10.1016/j.
size, and FPS. After an evaluation, it is clear ecoinf.2022.101698.
[5] Gu Y, Chen R, Wu K, Huang P, and Qiu G. A
that MobileNetV3 stands out as the choice
variable-speed-condition bearing fault diag-
for various applications.
nosis methodology with recurrence plot cod-
Mobilenet-v3 outperforms other machine ing and MobileNet-v3 model. Rev Sci Instrum.
learning algorithms like swin transformer, 2023;94(3). doi:10.1063/5.0125548.
efficientnet, and YOLO and this makes it [6] Cao X, Zhang Y, Lang S, and Gong Y. Swin-
appropriate for limited-sized, low-resource transformer-based YOLOv5 for small-object
devices, decreasing the load on the machine. detection in remote sensing images. Sensors.
Mobilenet-v3 strives towards this balance in 2023;23(7):3634. doi:10.3390/s23073634.
terms of size and accuracy since it surpasses [7] Gai R, Chen N, and Yuan H. A detec-
swin transformers and matches up with tion algorithm for cherry fruits based on
efficientnet. the improved YOLO-v4 model. Neural
YOLO has better performance on FPS Comput Appl. 2023;35(19):13895-13906.
scale whereas mobilenet-v3 is better when it doi:10.1007/s00521-021-06029-z.
[8] Espejo-Garcia B, Malounas I, Mylonas
comes to providing both speed and accuracy.
N, Kasimati A, and Fountas S. Using Effi-
EfficientNet, is notable, for striking a balance
cientNet and transfer learning for image-
between performance and efficiency. Never- based diagnosis of nutrient deficiencies.
theless, mobilenetv3 consistently outperforms Comput Electron Agric. 2022;196:106868.
efficientnet in terms of FPS and model size. doi:10.1016/j.compag.2022.106868.
[9] Srinidhi VV, Sahay A, and Deeba K. Plant
pathology disease detection in apple
References leaves using deep convolutional neural
[1] Howard A, Sandler M, Chu G, et al. Search- networks: apple leaves disease detection
ing for MobileNetV3. In: 2019 IEEE/CVF using EfficientNet and DenseNet. In: 2021
International Conference on Computer 5th International Conference on Com-
Vision (ICCV). IEEE; 2019:1314-1324. puting Methodologies and Communica-
doi:10.1109/ICCV.2019.00140. tion (ICCMC). IEEE; 2021:1119-1127.
[2] Z. Liu et al., “Swin Transformer: Hierarchi- doi:10.1109/ICCMC51019.2021.9418268.
cal Vision Transformer using Shifted Win- [10] Marques G, Agarwal D, and de la Torre
dows,” in 2021 IEEE/CVF International Díez I. Automated medical diagno-
Conference on Computer Vision (ICCV), sis of COVID-19 through EfficientNet
444 Innovations in Computational Intelligence: Trends and Technologies
convolutional neural network. Appl Soft windows. In: 2021 IEEE/CVF International
Comput. 2020;96:106691. doi:10.1016/j. Conference on Computer Vision (ICCV).
asoc.2020.106691. IEEE; 2021:9992-10002. doi:10.1109/
[11] Fang W, Wang L, and Ren P. Tinier-YOLO: ICCV48922.2021.00986.
a real-time object detection method for con- [16] Tan M, and Le QV. EfficientNetV2: smaller
strained environments. IEEE Access. 2020;8. models and faster training. Published
[12] Sandler M, Howard A, Zhu M, Zhmoginov April 2021. Available at: http://arxiv.org/
A, and Chen L-C. MobileNetV2: inverted abs/2104.00298
residuals and linear bottlenecks. In: 2018 [17] Ghazouani F, Vera P, and Ruan S. Effi-
IEEE/CVF Conference on Computer Vision cient brain tumor segmentation using
and Pattern Recognition. IEEE; 2018:4510- Swin transformer and enhanced local self-
4520. doi:10.1109/CVPR.2018.00474. attention. Int J Comput Assist Radiol Surg.
[13] Redmon J, Divvala S, Girshick R, and Published October 2023. doi:10.1007/
Farhadi A. You only look once: unified, real- s11548-023-03024-8.
time object detection. In: 2016 IEEE Con- [18] K S C, D J C, and Patil N. Cardamom plant
ference on Computer Vision and Pattern disease detection approach using Efficient-
Recognition (CVPR). IEEE; 2016:779-788. NetV2. IEEE Access. 2022;10:789-804.
doi:10.1109/CVPR.2016.91. doi:10.1109/ACCESS.2021.3138920.
[14] Zhao D, Sui Y, Li Z, et al. A Swin Trans- [19] Sutaji D, and Yıldız O. LEMOXINET:
former-based model for mosquito species lite ensemble MobileNetV2 and Xcep-
identification. Sci Rep. 2022;12(1):18664. tion models to predict plant disease. Ecol
doi:10.1038/s41598-022-21017-6. Inform. 2022;70:101698. doi:10.1016/j.
[15] Liu Z, Lin Y, Cao Y, et al. Swin Transformer: ecoinf.2022.101698.
hierarchical vision transformer using shifted
62 Rainstorm prediction system
Muskan Guptaa, Ankit Khareb, Kirti Pandeyc, Pritismita Thakurd,
and Muskan Guptae
Department of Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management, Lucknow, Uttar Pradesh, India
Abstract: Rainstorms are sudden, intense rainfall situations that occur frequently over a very small area. The
mountainous regions are the most susceptible to rainstorms and cloudbursts. It helps us deal with the situation
effectively and improves weather prediction systems for rainfall. Hence, we evaluate these various prediction
methods as well as their theories and how each one worked in multiple circumstances. This project proposes
a novel approach to the rainstorm prediction system using machine learning and artificial intelligence. The
rainstorm prediction system is distinguished by its comprehensive data integration, cutting-edge technology,
machine learning algorithms, real-time monitoring, user-friendly interfaces, and cross-sector applications. So,
AQ1:
it becomes meaningful because, at present, the issue of making accurate predictions about good weather is Please
NOTE ADDED
of great interest to modern weather prediction. However, there are studies concerning the impact of different provide
regions as well as emergency response in the context of RPS components and services. the
expansion
for RPS
Keywords: Real-time monitoring, predictive analytics, rainstorm prediction, SVM, GPS, relocation
recommendation
a
[email protected]; [email protected]; [email protected]; dpritismitathakur114@
gmail.com; [email protected]
DOI: 10.1201/9781003606635-62
446 Innovations in Computational Intelligence: Trends and Technologies
models and flood danger maps for generating Source: AUTHOR'S SELF GENERATED
warnings.
AI chatbot facility for users: The other weather bureau, space station, sonar, and
approach is to give our customers the ser- other meteorological instruments.
vices of a chatbot. The chatbot should give Data processing and analysis: Use advanced
users insight into real-time flood information, algorithms and machine learning techniques
safety tips etc. to process and analyze collected data.
Recommend relocation to the user: Develop Predictive models: Meteorologists and
a chatbot for the safe zone recommendation data scientists create predictive models based
system that will allow users to enquire about on historical weather data and current atmos-
the closest safe zones near them. pheric conditions.
Therefore, the development and imple- Visualization and communication: User-
mentation of the rainstorm prediction system friendly interfaces are developed, including
is due to the urgency in enhancing predic- websites and mobile applications, to deliver
tion capacity and mitigating the effects of real-time updates and alerts to the public.
rainstorms. Early warning systems and reallocation
system: When the system detects potential
rainstorms based on its predictions, it auto-
2. Methodology matically triggers alerts to notify authorities
The process of RPS entails different and the public.
approaches like utilizing technology, meth- We will use different algorithms for this
ods, and sources of data. A detailed approach rain and storm prediction. Therefore, we
of constructing a functional rainstorm pre- shall suggest an artificial intelligence-based
diction system: method using machine learning and deep
Data collection: The system collects real- learning that forecasts monthly rainfall in the
time data from various sources, like the chosen locale.
Rainstorm prediction system 447
4.3. AI chatbot facility for users Today, machine learning is applied in many
businesses. As the amount of input increases,
The chatbot could send users alerts via SMS,
so will its complexity, and we use technology
email, or push notification if a rainstorm is
to understand it in depth. The weather fore-
predicted in their area. This would give users
cast is very useful with good accuracy scores
time to take precautions, such as evacuat-
and provides a pretty good rate of rainfall as
ing from flood-prone areas or securing their
well. We plan to increase our work on crop
property. The chatbot could be programmed
forecasting, flood forecasting and heavy rain-
to answer a wide range of questions about
fall forecasting in the future.
rainstorms and cloudbursts, such as what
causes them, how to predict them, and what
to do if you are caught in one. Acknowledgement
The authors gratefully acknowledge the stu-
5. Conclusion dents, staff, and authority of the CSE depart-
ment for their cooperation in the research.
Rainfall prediction holds the primary posi-
tion in farming. The boom of farm products
primarily depending on the rain. Therefore, References AQ7:
forecasting rainfall throughout a season is [1] Sahu S, Ramtake S, and Sahu BL. Cloud- Refer-
very important to help farmers. The proposed burst disaster in India, mitigation and their ences are
missing
method uses multiple techniques to estimate impacts. Published April 2023. cita-
rainfall for different datasets and gives good [2] Knos D, Karagiorgos K, Haas J, Blumenthal tions in
results in terms of certainty, MSD, and com- B, Nyberg L, and Halldin S. Cloudburst dis- the text.
Please
parability [9]. aster modelling. Int J Disaster Risk Reduct. ensure
We will go into what conditions are caused 2022. that all
and how they are caused by torrential rains. [3] Sunil A, Binny BA, Benny J, Rajeev R, and references
are cited
Atmospheric factors are continuously moni- Manuel A. Predister: An intelligent device to and in
tored and analyzed to predict cloudbursts. predict cloud burst. 2022. sequential
1. Our devices operate in a specific range [4] Reddy GB, Chethan J, and Saravanamuthu order.
M. Cloud burst forecast expert systems.
of regions, and with the help of GPS, we
Int Res J Eng Technol. Published August 8,
can analyze and alert the locations that
2022.
are connected to the affected area. Pre- [5] Sati VP, and Kumar S. Environmental and
dict rainstorms and cloudburst events: economic impact of cloudburst-triggered
The development of increasingly complex debris flows and flash floods in Uttarakhand
AI and ML models to anticipate rainfall Himalaya: a case study. Geoenviron Disas-
and cloudburst occurrences is a critical ters. 2022;9(1):1-11.
field of research since these events may be [6] Harshitha H, Kumari P, and Agarwal S.
catastrophic. Rainstorm prediction system.
2. Enable vision to help the rescue team and [7] Fallucchi F, Scano R, and De Luca EW.
other forces view the situation at the hilltop. Machine learning models applied to a
3. We can analyze the data and save it for weather series analysis. 2021.
future use and to determine parameters. [8] Khanduri S. Cloudbursts over Indian sub-
continent of Uttarakhand Himalaya: a
4. Atmospheric factors are continuously
traditional habitation input from Bansoli,
monitored and analyzed to predict
District-Chamoli, India. 2020.
cloudbursts. [9] Hussein EA, Ghaziasgar M, Thron C, and
5. Our system provides real-time predictions Vaccari M. Rainfall prediction model using
of flood and rainstorm zones, enabling ML. 2022.
users to relocate to nearby, safe areas.
450 Innovations in Computational Intelligence: Trends and Technologies
[10] Saleh A,Yuzir A, and Abustan I. Flash flood sus- [16] Rani D, Jayalakshmi GN, and Baligar V.
ceptibility modelling: a review. IOP Conf Ser Low-cost IoT-based flood monitoring sys-
Mater Sci Eng. 2020;712(1):012005. https:// tem using machine learning and neural net-
doi.org/10.1088/1757-899X/712/1/012005. works. 2020
[11] Molinari D, Scorzini AR, Arrighi C, et al. Are [17] Rawat KS, Sahu SR, Singh SK, and Mishra
flood damage models converging to “reality”? AK. Cloudburst analysis in the Nainital dis-
Lessons learnt from a blind test. Nat Haz- trict, Himalayan Region. 2021
ards Earth Syst Sci. 2020;20(11):2997-3017. [18] Sivagami Ivagami M, Radha P, and Bal-
https://doi.org/10.5194/nhess-20-2997-2020. asundaram A. Sequence model-based cloud-
[12] Blumenthal B, and Nyberg L. The impact burst prediction for the Indian state of
of intense rainfall on insurance losses in Uttarakhand. Published July 7, 2021.
two Swedish cities. J Flood Risk Manag. [19] SMHI. Meteorological data. Published
2019;12. https://doi.org/10.1111/jfr3.12504 2021. Accessed April 29, 2021. https://
[13] Rosenzweig B, Ruddell BL, McPhillips L, et www.smhi.se/data Drishtiias. Daily news
al. Developing knowledge systems for urban analysis: cloudbursts. Published 2021.
resilience to cloudburst rain events. Environ https://www.drishtiias.com/daily-updates/
Sci Policy. 2019;99:150–159. https://doi. daily-news-analysis/cloudbursts.
org/10.1016/j.envsci.2019.05.020 [20] Puttinaovarat S, and Horkaew P. Flood fore-
[14] Rawat KS, Sahu SR, Singh SK, and Mishra casting system based on integrated big and
AK. Cloudburst analysis in the Nainital dis- crowdsource data using machine learning
trict, Himalayan Region. 2021 techniques. IEEE Access. 2020;8:5885–5905.
[15] Khanduri S. Cloudbursts over Indian sub-
continent of Uttarakhand Himalaya: a
traditional habitation input from Bansoli,
District-Chamoli, India. 2020
63 Advancements in assistive technologies
for web accessibility: A systematic
review
Ayushia, Padmini Mishrab, Anusha Ansaric, and Drishti Mauryad
Department of Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management, Lucknow, India
Abstract: This review paper incorporates recent advancements in web accessibility technologies, with a focus on
their transformative effect on inclusive education. The reviewed studies confine innovative solutions extending
from neuro-rehabilitative hybrid web browsing to smart readers for the blind, multimodal accessible systems
for data visualizations, open-source libraries for accessible visualizations, and lexical simplification systems for
diverse language users. It highlights the key role of technology, like voice recognition and artificial intelligence,
in simplifying communication and providing employment opportunities for visually impaired people. Through
an evaluation of these varied approaches, the review offers a comprehensive analysis of the current landscape
while highlighting the potential of these technologies to promote inclusive education and empower individuals
with disabilities.
Keywords: Artificial intelligence, assistive technology, braille display, disability, human computer interaction,
disability inclusion, screen readers, speech recognition, web accessibility
DOI: 10.1201/9781003606635-
452 Innovations in Computational Intelligence: Trends and Technologies
dots. This innovation enhances the tactile feed- the ongoing efforts to enhance accessibility
back of Braille displays, simplifying access for through innovative technologies [6].
individuals with visual impairments to access These recent advancements in screen
digital material. The paper outlines the tech- reader technology have significantly contrib-
nology’s working principles and its applica- uted to improving the web experience for
tions in assistive technology [2]. individuals with visual impairments.
Introducing a Braille reading system
grounded on an electro-tactile interface fea- 3.3. Voice recognition and speech to
turing a adaptable electrode array, the authors text technologies
of the respective paper present a method that
provides tactile feedback through electro-tac- In their paper, the respective authors demon-
tile stimulation. This allows individuals with strate how machine learning algorithms can
visual impairments to read Braille characters be trained to understand and transcribe the
electronically. The article outlines the con- unique speech patterns of users with speech
struction and potential applications of this disorders. This application leverages voice
system, contributing to the field of assistive recognition technology to convert spoken
technologies [3]. words into text, offering a lifeline to those
who may struggle with traditional communi-
cation methods [7].
3.2. Screen readers In another study, the authors of the respec-
tive research introduce an innovative appli-
In their recent research, the respective cation focused on enhancing the digital
authors unveiled Olli, an extensible visu- experience of visually impaired users. This
alization library that focuses on enhancing system enables blind individuals to access
screen reader accessibility. Olli is designed to and send emails through voice commands
provide an accessible and inclusive experi- and speech recognition powered by artificial
ence for data visualization, a critical aspect intelligence [8].
of web content. The authors presented Olli as
a promising tool to make complex data visu-
alizations more accessible to users with visual 3.4. Natural language processing
impairments [4]. A research paper presents a Lexical Simpli-
Introducing VizAbility, a novel approach fication System designed to enhance web
to accessible data visualization, the authors of accessibility. This system employs NLP tech-
the respective paper demonstrate a method to niques to simplify the content of web pages,
combine keyboard navigation and conversa- making them more comprehensible for users
tional interaction, making it easier for screen with cognitive or reading disabilities. The
reader users to explore and comprehend data study recognizes that the language complex-
visualizations. This innovative approach con- ity of web content can be a significant bar-
tributes to a more inclusive web environment, rier to access for individuals with disabilities,
allowing individuals with visual impairments including those with limited reading skills [9].
to engage with data-driven content seam- In related context, another study highlights
lessly [5]. the transformative role of NLP in improv-
Another extensive study introduces a Rasp- ing the lives of people with disabilities. The
berry Pi-based Smart Reader designed to aid respective authors of the research underlines
individuals with visual impairments. This how NLP-driven tools and applications can
device facilitates the reading of printed text and help individuals with various disabilities,
converts it into audible speech. Although it pri- including those with visual, hearing, or cogni-
marily addresses offline content, it showcases tive impairments, interact with online content
454 Innovations in Computational Intelligence: Trends and Technologies
more effectively. The study also emphasizes an innovative approach that streamlines
the importance of multimodal interactions, web content to enhance user comprehension
combining NLP with other technologies like and navigability [14].
speech recognition and gesture control to pro- Another pioneering research study pre-
vide a comprehensive assistive experience [10]. sents a hybrid brain-computer interface (BCI)
web browser. This novel browser combines
3.5. Image recognition steady-state visual evoked potentials and
gaze-tracking technology to provide a more
In a detailed research, the respective authors efficient and user-friendly web browsing
of the study leverage Convolutional Neural experience. This innovation aids individuals
Networks (CNNs) to recognize hand gestures with motor or cognitive disabilities [15].
for individuals with disabilities. It enables ges- In another recent research, the respective
ture recognition that can facilitate web brows- authors present a unique approach by utilizing
ing, content navigation, and interaction with the triboelectric properties of the human body
online applications, making web resources for human-computer interactions. This intrigu-
more accessible to a broader audience [11]. ing method opens up possibilities for touchless
In a study related to the context, the and gesture-based web interactions [16].
respective authors introduce an innovative In a study within relatable context intro-
Human-Computer Interaction (HCI) appli- duces a feedback-based system for augmenta-
cation which employs facial movements to tive and alternative communication grounded
control the mouse cursor, thereby providing in human-computer interaction (AAC). AAC
an alternative means of computer interaction. is crucial for individuals with speech or lan-
This technology enhances web accessibility guage impairments, offers a promising solu-
by allowing users to navigate web content tion to improve their web browsing and
through facial gestures, ultimately improving communication experiences [17].
the overall web experience [12].
While introducing “DeepNAVI,” the
authors of respective paper introduce a 4. Critical Analysis
smartphone navigation assistant powered by In this critical analysis, the strengths and
deep learning, designed for individuals with weaknesses of assistive technologies for web
visual impairments. This smartphone appli- accessibility are thoroughly examined, with
cation leverages image recognition and deep a central focus on identifying and addressing
learning to provide real-time auditory cues existing gaps and challenges.
to users, guiding them through their sur- The innovation of Braille displays is
roundings. When navigating web content, acknowledged, but their prohibitive cost poses
individuals with visual impairments heavily a significant obstacle to widespread acces-
rely on screen readers and assistive technolo- sibility. Screen readers, a fundamental tool,
gies. DeepNAVI extends this functionality by are contingent upon proper web content cod-
providing context-aware guidance based on ing for optimal functionality. The potential of
image recognition [13]. voice recognition and speech-to-text technolo-
gies to enhance communication is recognized,
3.6. Innovations in human computer yet their efficacy is hampered by a need for
interaction and web browsers improved accuracy. Natural Language Process-
ing (NLP) simplifies content but grapples with
One notable publication delves into the challenges related to subtle language nuances.
creation of a web simplification prototype The empowering capabilities of image recogni-
to cater to cognitive-disabled users. The tion for users are acknowledged, but accuracy
authors of the respective research propose
Advancements in assistive technologies for web accessibility: A systematic review 455
16 (1): 96–105. https://doi.org/10.1109/ [11] E. P. Shadiya Febin, and Arun T Nair. 2022.
toh.2023.3241952. “Hand Gesture Recognition for Disabled
[3] Zhou, Ziliang, Yueying Yang, and Hong- Person with Speech Using CNN.” Lecture
hai Liu. 2022. “A Braille Reading System Notes on Data Engineering and Communica-
Based on Electrotactile Display with Flex- tions Technologies, January, 239–49. https://
ible Electrode Array.” IEEE/CAA Journal of doi.org/10.1007/978-981-16-7610-9_17.
Automatica Sinica 9 (4): 735–37. https://doi. [12] R Shashidhar, K Snehith, P K Abhishek,
org/10.1109/jas.2022.105476. Abhishek B Vishwagna, and N Pavitha.
[4] Blanco, Matt, Jonathan Zong, and Arvind 2022. “Mouse Cusor Control Using Facial
Satyanarayan. 2022. “Olli: An Extensible Movements - an HCI Application.” 2022
Visualization Library for Screen Reader International Conference on Sustain-
Accessibility.” Vis.csail.mit.edu. October 19, able Computing and Data Communica-
2022. https://vis.csail.mit.edu/pubs/olli. tion Systems (ICSCDS), April. https://doi.
[5] Gorniak, Joshua, Yoon Kim, Stephen Gwon, org/10.1109/icscds53736.2022.9760914.
Donglai Wei, and Nam Wook Kim. 2023. [13] Kuriakose, Bineeth, Raju Shrestha, and
“VizAbility: Multimodal Accessible Data Frode Eika Sandnes. 2023. “DeepNAVI:
Visualization with Keyboard Navigation A Deep Learning Based Smartphone Navi-
and Conversational Interaction.” ArXiv gation Assistant for People with Visual
(Cornell University), October. https://doi. Impairments.” Expert Systems with Appli-
org/10.48550/arxiv.2310.09611. cations 212 (February): 118720. https://doi.
[6] Ravi, A, Sk Khasimbee, T Asha, T Naga org/10.1016/j.eswa.2022.118720.
Sai Joshna, and P Gnana Jyothirmai. 2020. [14] Kamran, Maira, Marium Malik, Muham-
“Raspberry Pi Based Smart Reader for Blind mad Waseem Iqbal, Muhammad Anwar,
People.”IEEE Xplore. July 1, 2020. https://doi. Muhammad Aqeel, and Sana Ahmad. 2022.
org/10.1109/ICESC48915.2020.9155941. “Web Simplification Prototype for Cogni-
[7] Mulfari, Davide, Gabriele Meoni, Marco tive Disabled Users.” Edited by zheng yan.
Marini, and Luca Fanucci. 2021. “Machine Human Behavior and Emerging Tech-
Learning Assistive Application for Users nologies 2022 (March): 1–14. https://doi.
with Speech Disorders.” Applied Soft Com- org/10.1155/2022/5817410.
puting 103 (May): 107147. https://doi. [15] Lin, Xinyuan, W.Q Malik, and Shaomin
org/10.1016/j.asoc.2021.107147. Zhang. 2019. “A Novel Hybrid BCI Web
[8] Biruntha, S., Gaja Priya, M., Kiruthika, R., Browser Based on SSVEP and Eye-Track-
Indupriya, N., and Ashwini, M. “Voice- ing,” October. https://doi.org/10.1109/
Based Email for Blind People Using Speech biocas.2019.8919087.
Recognition through Artificial Intelligence.” [16] Zhang, Renyun, Magnus Hummelgård, Jonas
International Journal of All Research Educa- Örtegren, Martin Olsen, Henrik Anders-
tion and Scientific Methods (IJARESM), vol. son, Ya Yang, Håkan Olin, and Zhong Lin
9, 2021. Available: https://jit.ac.in/journal/ Wang. 2022. “Utilising the Triboelectricity
cse/CSE_20-21/9.pdf. of the Human Body for Human-Computer
[9] Alarcon, Rodrigo, Lourdes Moreno, and Interactions.” Nano Energy 100 (Septem-
Paloma Martinez. 2021. “Lexical Simplifi- ber): 107503. https://doi.org/10.1016/j.
cation System to Improve Web Accessibil- nanoen.2022.107503.
ity.” IEEE Access 9: 58755–67. https://doi. [17] Yubin Liu, C. B. Sivaparthipan, and Achyut
org/10.1109/access.2021.3072697. Shankar. 2021. “Human–Computer Inter-
[10] Nadeem, Warda, Vinod Kumar Shukla, action Based Visual Feedback System for
Preetha V K, Gagandeep Kaur, and Arad- Augmentative and Alternative Communica-
hana Balodi Bhardwaj. 2022. “Role of tion.” International Journal of Speech Tech-
Natural Language Processing in Improv- nology, October. https://doi.org/10.1007/
ing Lives of Disabled.” IEEE Xplore. s10772-021-09901-4.
October 1, 2022. https://doi.org/10.1109/
ICRITO56286.2022.9964626.
64 Predicting bitcoin prices: A machine
learning approach for accurate
forecasting
Rishabh Jaina, Shekhar Srivastavab, and Prakhar Shuklac
Computer Science and Engineering, Babu Banarasi Das Institute of Technology and Management,
Lucknow, India
Abstract: This project investigates the active realm of Bitcoin price forecasting through the glass of machine
intelligence models, including Logistic Regression, Support Vector Machines (SVM), and XGBoost Classifier.
Leveraging a different dataset including historical and actual-occasion Bitcoin price dossier, the study employs
an orderly method for dossier collection, feature collection, model preparation, and judgment. The aim is to
embellish the veracity of short-term and unending forecasts, making the challenges posed apiece explosive cryp-
tocurrency retail. The project extends further hypothetical exploration, climactic in the incident of a convenient
web connect. This connects employs HTML, CSS, and Flask API to provide authentic-opportunity forecasts,
extending the gap betwixt leading predictive models and proficient uses.
Keywords: Bitcoin, Price Prediction, Machine Learning, Logistic Regression, Support Vector Machines, XG-
Boost Classifier, Cryptocurrency, Web Interface, Forecasting, Real-time, HTML, CSS, Flask API
DOI: 10.1201/9781003606635-64
458 Innovations in Computational Intelligence: Trends and Technologies
intermediary and as an advantage, is the valuable for those powers the one purchase
wonted amount forecast. Predicting the price Bitcoin, to a degree u ndertaking speed, dis-
of Bitcoin, as a favorite mathematical cash, semination, DE centrality, and the big com-
has been a most of learning. Besides, plenty puter world of family curious in speaking and
research and procedures have happened done providing relevant news about mathematical
to call the price of mathematical currencies. currencies, principally Bitcoin [8].
For example, affected affecting animate nerve As we begin undertaking this journey
organs networks are usual to envision finan- through the extant history on Bitcoin price
cial markets by utilizing mechanics signs. indicator, it enhances clear that the request of
Plus, retail belief indices were secondhand as machine learning models, containing Logis-
stock exchange predictors. Furthermore, the tic Regression, SVM, and XGBoost Classifier,
Estimation Maximum Likelihood (EML) was shows an important and creative approach to
used to show the Bitcoin display is entirely forwarding the complicatedness of cryptocur-
adept. Nevertheless, making accurate indica- rency price forecasting, individual that persists
tors in a complex and swift examining foun- to challenge the confines of fiscal information.
dation is still assuredly a disputing issue [3]. The article revenue in this manner. In Sec-
The objectives concerning this composi- tion 2, we will outline the methods second-
tion review are three times as many. Firstly, hand for selecting and judging the research on
we aim to support an awareness into the evo- Bitcoin price prediction. In Section 3, we will
lution of Bitcoin price indicator models and support a having a theme survey by classifica-
the various methods working in guessing. In tion the history into key themes and empha-
particular, this review will devote effort to size main believes and models. In Section 4,
something the application of machine intel- our fault-finding study will assess substances
ligence methods to a degree Logistic Regres- and restraints of existent research, concentrat-
sion, Support Vector Machines (SVM), and ing on study feature and dependability. Section
XGBoost Classifier in forecasting Bitcoin 5 will synthesize judgments from miscellane-
prices. Secondly, we endeavor to precariously ous studies to draw encompassing judgments
analyze the substances and disadvantages and review their implications. Section 6 will
of existent research, peeling arrive the chal- offer approvals for future research, stressing
lenges associated with forecasting the price uncharted districts and key questions needing
of an advantage as explosive and singular as further study. Lastly, Section 7, our conclusion,
Bitcoin utilizing these models. Lastly, we will will recap main judgments, repeat the review’s
combine the findings from differing studies, meaning, and, if appropriate, offer policy,
illustration encompassing ends and reviewing practice, or research pieces of advice.
the implications for the field of cryptocurrency
research and expenditure practices. Forecast-
ing Bitcoin price is extremely important for 2. Methodology
two together advantage managers and liber- This division outlines the inclusive methods
ated financiers. Although Bitcoin is a currency, for our project on Bitcoin price prognosis.
it cannot be intentional as another usual bills The methods cover dossier group, feature
place financial theories about exposed inter- pick, model preparation, forecasts, nick, con-
est equality, future cash-flows model, and firmation, and the last exercise and accom-
ability to purchase balance matter, since vari- modating of your project.
ous standard determinants of the connection
middle from two points supply and demand
cannot be used in the mathematical currency 2.1. Data collection
advertise like Bitcoin. On the individual BTC Data Source: To introduce the project,
help, Bitcoin has various traits that make it draw classical Bitcoin price dossier from a
Predicting bitcoin prices: A machine learning approach for accurate forecasting 459
2.4. Forecasts
Classification Forecasts: Use categorization
AQ2:
models to form prophecies about the man- Please
agement of Bitcoin prices. provide
Regression Forecasts: Employ reversion NOTE
figure
ADDED
caption
models to anticipate particular price principles. and
in-text
citation.
2.5. Scoring and validation AQ3:
Classification Metrics: Evaluate categoriza- Please
provide
tion models utilizing versification like verac- Figure 64.1. source for
ity, accuracy, recall, and F1-score. Source: AUTHOR'S SELF GENERATED
the figure
460 Innovations in Computational Intelligence: Trends and Technologies
models, exceptionally when handling large price prediction is a complex and disputing
datasets and complicated display patterns. endeavor, meaningful progress has existed
These models have illustrated their ability to fashioned in understanding the dynamics of
capture market movement and offer valuable the cryptocurrency display. Machine learning
understandings into Bitcoin price currents. models have showed expected valuable forms
However, the literature is not outside allure in capturing and defining complex patterns
defect and challenges. Data characteristic and currents in Bitcoin prices. These models,
and availability wait determined issues. Inac- when suitably trained and ratified, can offer
curate or wanting dossier can undermine the correct understandings into temporary price
acting of predicting models and limit their movements [10,11].
actual-realm applicability. Addressing dossier However, the associations of these ver-
kind is authoritative for boosting the reliabil- dicts too underline several main warnings.
ity of Bitcoin price prognoses. The extreme excitability and susceptibility
Long-term sameness in Bitcoin price rem- of Bitcoin prices to outside determinants, to
nants restricted, a characteristic inherent to a degree display sentiment, revelation occur-
the cryptocurrency display. While advances rences, and supervisory changes, create long-
have existed created concisely-term predic- term prophecy a difficult challenge. The
tions, the challenge of correctly guessing Bit- cryptocurrency display’s hereditary unpre-
coin prices over lengthened periods persists dictability, accompanying the moral con-
[9]. Overfitting and inference pose another cerns encircling dossier collection and study,
challenge. Some studies have elevated con- demands carefulness and responsible research
cerns about overfitting, place models surpass practices [13].
on training dossier but struggle when accused The useful suggestions of correct Bitcoin
hidden dossier. Achieving robust inference, price guess extend to an off-course range of
exceptionally in the explosive cryptocurrency colleagues. Investors can form more conver-
retail, is an ongoing challenge that demands sant decisions about their capital and busi-
consideration. The basic excitability of the ness designs. Regulators and policymakers
cryptocurrency display, coupled with allure can benefit from visions into the factors doing
susceptibleness to outside determinants, pre- cryptocurrency prices, admitting bureaucracy
sents a dynamic atmosphere that is to say to art more effective tactics. Technologists
troublesome to forecast with complete verac- can cultivate business algorithms and uses
ity. Sudden display shifts sparked by news that respond to evident-period retail environ-
occurrences, supervisory changes, or retail ments with better veracity.
belief add a factor of doubt to Bitcoin price
forecasting, confusing the development of
trustworthy guessing models. 6. Recommendations for Future
Research
Firstly, skilled is a need for persisted empha-
5. Synthesis and Implications sis on dossier character and dependability.
In this portion, we combine the findings from Researchers should investigate designs to
the various array of studies on Bitcoin price address issues had connection with inaccu-
indicator. By collect the composite wisdom rate and wanting dossier, as reconstructing
of investigators in this place field, we aim to the status of input dossier is essential for
draw encompassing decisions and discuss the improving the accomplishment of predictive
fuller suggestions of these verdicts. models. Furthermore, the production of pat-
The combination of this thorough mate- terned datasets accompanying consistent and
rial of brochure tells that while Bitcoin finest news would expedite more robust and
462 Innovations in Computational Intelligence: Trends and Technologies
reproducible research or in general area. Sec- allure price action. Our exploration of the
ondly, investigators endure focus on evolving existent methodical study of part of material
more cosmopolitan and adjusting models that world has lighted several key understandings
can address the challenges of overfitting and and challenges inside this vital field.
generalization. Building models that exhibit The literature underlines the variety of
powerful inference capacities, particularly in methods and data beginnings used to Bit-
the framework of the very changeable crypto- coin price forecast. Researchers have har-
currency display, is a priority. This concedes nessed the capacity of machine intelligence,
possibility include surveying techniques to established economic analysis, retail emo-
a degree ensemble systems, deep education tion, friendly media dossier, blockchain
architectures, or recurrent affecting animate versification, and macroeconomic signs to
nerve organs networks to reinforce predicting develop predicting models. This difference of
accuracy and strength. approaches specifies a comprehensive view
Standardization of model judgment and of the elaborate determinants doing Bitcoin
confirmation criteria is a fault-finding pro- prices. However, our critical study has still
gress. Future research endures aim to estab- emphasized several continuous challenges.
lish a set of generally approved versification Data character and chance, overfitting,
and evaluation processes to allow significant model evaluation and confirmation tests,
corresponding between various models and advertise volatility, and moral concerns in
studies. This uniformity would advance trans- dossier analysis wait important issues. The
parency and dependability engaged of Bitcoin innately dynamic character of the cryptocur-
price prophecy. The role of outside determi- rency advertise, from rapid changes affected
nants in Bitcoin price motions, such as super- by outside determinants, poses a consider-
visory changes, macroeconomic occurrences, able challenge to the growth of trustworthy
and advertise sentiment, bear stretch to be a guessing models.
focus of research. Understanding by virtue of
what these factors communicate accompany-
ing price action and developing models that References
can accommodate to changeful environments [1] Chen J. Analysis of Bitcoin Price Prediction
is principal. This includes fact-finding designs Using Machine Learning. Journal of Risk
real-time dossier unification and reasoning, and Financial Management. 2023; 16(1):51.
allowing for up-to-date prognoses that join [2] Nikola Gradojevic, Dragan Kukolj, Rob-
with the vital type of the cryptocurrency ert Adcock, Vladimir Djakovic, Forecasting
Bitcoin with technical analysis: A not-so-
retail.
random forest?, International Journal of
Forecasting, Volume 39, Issue 1, 2023, Pages
7. Conclusion 1-17, ISSN 0169-2070.
[3] Shahab Rajabi, Pardis Roozkhosh, Nasser
In this paper, we have delved into the versa- Motahari Farimani, MLP-based Learnable
tile sphere of Bitcoin price prediction, accom- Window Size for Bitcoin price prediction,
panying the devote effort to something the Applied Soft Computing, Volume 129, 2022,
application of machine intelligence models, 109584, ISSN 1568-4946.
containing Logistic Regression, Support Vec- [4] Ye Z, Wu Y, Chen H, Pan Y, Jiang Q. A
tor Machines (SVM), and XGBoost Classifier. Stacking Ensemble Deep Learning Model
The cryptocurrency advertises, and Bitcoin in for Bitcoin Price Prediction Using Twitter
particular, has signed superlative tumor and Comments on Bitcoin. Mathematics. 2022;
volatility in current age, cueing a surge in 10(8):1307.
[5] Carbó, José Manuel and Gorjon, Sergio,
research aimed at understanding and guessing
Application of Machine Learning Models
Predicting bitcoin prices: A machine learning approach for accurate forecasting 463
and Interpretability Techniques to Identify via machine learning, The Journal of Finance
the Determinants of the Price of Bitcoin and Data Science, Volume 7, 2021, Pages
(April 19, 2022). Banco de Espana Working 45-66, ISSN 2405-9188.
Paper No. 2215. [10] Cocco L, Tonelli R, Marchesi M. 2021. Pre-
[6] Guarino, A., Grilli, L., Santoro, D. et al. To dictions of bitcoin prices through machine
learn or not to learn? Evaluating autono- learning based frameworks. PeerJ Computer
mous, adaptive, automated traders in crypto- Science 7:e413.
currencies financial bubbles. Neural Comput [11] Akyildirim, E., Cepni, O., Corbet, S. et al.
and Applic 34, 20715–20756 (2022). Forecasting mid-price movement of Bitcoin
[7] Shahab Rajabi, Pardis Roozkhosh, Nasser futures using machine learning. Ann Oper
Motahari Farimani, MLP-based Learnable Res (2021).
Window Size for Bitcoin price prediction, [12] Dirk G. Baur, Lai Hoang, The Bitcoin gold
Applied Soft Computing, Volume 129, 2022, correlation puzzle, Journal of Behavio-
109584, ISSN 1568-4946. ral and Experimental Finance, Volume 32,
[8] Lamothe-Fernández P, Alaminos D, Lam- 2021, 100561, ISSN 2214-6350.
othe-López P, Fernández-Gámez MA. Deep [13] Baur, D.G., Dimpfl, T. The volatility of Bit-
Learning Methods for Modeling Bitcoin coin and its role as a medium of exchange
Price. Mathematics. 2020; 8(8):1245. and a store of value. Empir Econ 61, 2663–
[9] Patrick Jaquart, David Dann, Christof Wein- 2683 (2021).
hardt, Short-term bitcoin market prediction
65 A comprehensive review on multi
disease prediction web app:
QuadraDiag
Khushi Saxenaa, Keerti Saxenab, Vishesh Guptac, Swatid, and
Kamlesh Kumare
Computer Science and Engineering BBNITM, Lucknow, India
Abstract: In today’s environment, artificial intelligence and machine learning are major players. They are used
in the medical fields as well as in self driving cars. A lost of patient data is produced by the medical industry, and
there are several ways to handle this data. Thus, we have developed a forecasting system proficient in identify-
ing numerous conditions forthwith with automated learning. Most of the current systems have poor accuracy
and can only forecast one disease at a time. Inaccurate results can gravely endanger a patient’s health. Heart,
liver, Parkinson’s, and diabetes are the four disorders we have currently considered; many more diseases may be
included in the future. The user needs to provide a number of parameters.
Keywords: Diabetes, Heart, Liver, and Parkinson’s disease, Machine learning, Xgboost, SVM, Logistic Regres-
sion, Pickle file, Flask API
[email protected]; [email protected]
d
DOI: 10.1201/9781003606635-65
A comprehensive review on multi disease prediction web app: QuadraDiag 465
have chosen to develop the “Multiple Dis- because many localized diseases have unique
ease Prediction System” project combining characteristics in various locations.
this data and cutting-edge machine learning
techniques. In order to treat patients who are
most at risk for a certain condition, our study 2. Methodology
combines three machine learning models to Prediction model development in diverse
detect individuals with diabetes, renal disease, machine learning algorithms shares a com-
and heart disease early on. We initially identi- mon methodology, adhering to a standard-
fied the problem statement and the kinds of ized framework. This uniformity streamlines
data that will be needed for our project. For the process and fosters consistency in the
each of our three machine learning models, creation of predictive models across different
we gathered three distinct datasets from Kag- algorithmic approaches.
gle. Following data collection, we correctly
examined the information and created visu- 2.1. Data set
als to aid in comprehension. Next, we used
categorical feature encoding and null value For diabetes prediction some of the data-
imputing to clean up the data. The dataset sets taken from Kaggle as well as from the
was later partitioned into training and testing UCI machine learning library. The majority
sets, where 80% of the data was designated of the datasets used to forecast liver disease
for training our predictive model, while the come from electronic health records, ILPD
remaining 20% was reserved for testing its benchmark dataset and some datsets for
efficiency. Following that, we tested a num- heart disease prediction are drawn from the
ber of classification techniques on each of the UCI patient database for heart illness and the
three datasets, incorporating supervised clas- patient dataset for heart disease from Hun-
sification statistical learning techniques. garian, Switzerland and Cleveland. And for
Health and medicine play a significant role parkinson’s disease prediction the datasets
in both human life and economic progress. are taken from PPMI.
Applications for technology-assisted health
care have grown dramatically over the past 2.2. Data Preprocessing
two decades. This strategy will also result Data preprocising is the initial step in data
in reduced treatment costs and anxiety dur- analysis, involving Raw data must be cleaned,
ing the last stages, which will enable prompt transformed, and arranged to make it ready
delivery of quality care and a decline in the for analysis. It involves operations like scal-
death rate. Furthermore, it is challenging to ing, encoding variables, addressing missing
forecast when a disease epidemic will occur values, and eliminating duplicates.
AQ1:
OTEPlease
ADDED
provide 2.3. Data processing
figure
caption Data processing entails organising and pre-
and paring data for model evaluation and train-
in-text
citation. ing. This covers operations such as feature
selection, data cleaning, normalisation, and
AQ2: partitioning data into training and testing
Please
provide sets. Machine learning algorithms can only
source for discover patterns and produce precise predic-
the figure Figure 65.1. tions or classifications if the data is processed
Source: AUTHOR'S SELF GENERATED properly.
466 Innovations in Computational Intelligence: Trends and Technologies
Gaussian Naive Bayes showed t best accuracy impairs a patient’s quality of life, has no
out of all of these. known cure, and causes significant disability.
Ruhul Amin et al. (2023) [6] investigated Dopamine is a chemical messenger created by
enhanced feature extraction systems in this neurons in this part of the brain. One neu-
study for liver patient categorization with ral-transmitter that assests monitor and syn-
the use of statistical machine learning tech- chronize organism movements is dopamine,
niques, utilising dimensionality reduction which acts as a bridge between the brain
strategies including PCA, FA, and LDA. An and nervous system elements. Speech, writ-
enhanced descriptor space which maximizes ing, walking, and other basic tasks become
class separation, ledgers the peak variation harder to perform as dopamine levels in the
amid the evidences, and considers the corre- brain fall. The early stages of Parkinson’s dis-
lation betwixt studied variables was retrieved ease can be recognised and detected by this
with the system’s assistance. Through a sim- research using predictive modeling protocol.
ulation exercise, we were able to duplicate Two examples of automated learning classi-
the conclusion with the suggested method- fication procedure that are used to diagnose
ology plus achieving standard accuracy of Parkinson’s disease in individuals are Support
91.4 percent in the congregation taxonomy Vector Machine and XGBoost. Consequently,
process. Making use of recognition rate and the XGBoost algorithm performs better than
AUC by R-Forest computational intelligence the S-Vector Machine in terms of precision.
based on validation protocols have increased Arumugam K et al. (2021) [9] aims to
between 1% and 18.5%, or about 89% accu- create a Diabetes related heart disease using
racy, by harnessing suggested strategy as for machine learning techniques as diabetes-
the difficult India Liver Patient Dataset Kag- related heart disease occurs in diabetic per-
gle benchmark dataset in comparison to the sons and a chronic diabetes disease arises
reference-based approaches. when the pancreas fails to create enough insu-
Deepika Bhupathi et al. (2022) [7] Because lin or when the body fails to utilize insulin
liver disease is difficult to diagnose due to the so it is very complex to procedure to predict
subtle nature of its symptoms, research is nec- such disease. They explored and discovered
essary to identify algorithms that can more that after comparison with most experienced
accurately forecast this terrible illness. The physicians can diagnose with 79.97% accu-
steps in the suggested LDP approach offer racy conversely, 91.1% of the machine learn-
improved phase alignment. After the data- ing systems could recognize. After comparing
set has been chosen, the missing values are classification algorithms Naïve Bayes, SVM
replaced and the dataset is balanced as part and Decision Tree they found out that the
of the preprocessing procedure. Subsequently, precision by the D-Tree came about giving
five distinct supervised learning techniques— the highest accuracy among them.
SVM, Naïve Bayes, KNN, LDA, and CART— Cameron R et al. (2020) [10] Heart plays
are used with R, and the accuracy is measured an important role in our body functioning
using confusion matrix metrics. The outcome and we can’t ignore that. A study tells us that
demonstrates that K-NN has a superior accu- 1,000,000 Americans in the United States each
racy of 91.7% in predicting liver illness. In year are diagnosed with heart failure and that
this study, autoencoders are used as a test is a serious problem. That’s why Cameron R.
case to better understand how well unsuper- Olsen provides a platform that will be cost-
vised algorithms can classify data. effective, easy to use, and provide accurate
Azizkhan F. Pathan et al. (2022) [8] Par- disease prediction that will help patients to
kinson’s disease (PD) is the second most com- easily diagnose heart-related disease. So our
mon neurological condition that significantly aim is to build an statical learning model that
A comprehensive review on multi disease prediction web app: QuadraDiag 469
will predict heart-related disease by taking related mortality. Next, SVM is employed
the patient’s symptoms as input. We’ll employ during investigation to predict hepatic illness.
the SVM, RNN, Random Forest, and Logistic Archana Singh et al. (2020) [13] The main
Regression techniques. aim of the paper is that heart plays an impor-
Akkem Yaganteeswarudu et al. (2020) [11] tant role in living organisms. Accurate diagno-
found that a lot of the health care systems in sis and prediction of heart-related diseases are
place today only concentrate on one type of essential because they can potentially lead to
illness, and that in order for an organisation fatal cardiac events so for predicting this kind
to evaluate the health of its patients, it must of crucial health condition we use machine
develop a variety of models and follow a num- learning and artificial intelligence. In this
ber of steps. The intent concerning to evolve paper, these algorithm help in calculating the
a infrastructure aforementioned allowed to precision of data-driven learning model sup-
simultaneously outlook many diseases on the porting the prediction of heart ailment using
same platform. The diseases that are being KNN, decision tree, svm, linear regressive by
considered in this article include diabetes, using University of California repositor data-
cancer, heart disease, and diabetic retinopa- frame for development of model and analysis
thy. The method makes use of the Flask API comparison of algorithm and their accuracy
and a machine learning technique. Flask is a is also done that are as follows: Decision tree
Python micro web framework that makes it 79%, SVM 83%, k-nearest neighbour 87%,
simple to develop online apps and APIs. The Linear regression 78%.
user can load a pickle file to obtain the model Mitushi Soni et al. (2020) [14] Diabetes
behaviour corresponding to the chosen ail- occurs when the body does not create enough
ment while utilising the Flask API. The dataset insulin. In accordance WHO, 422 million
used is the PIMA India dataset for diabetes, people worldwide mostly in low- and middle-
University of Califonia, Irvine machine learn- income countries struggle with diabetes. And
ing repository for Diabetes Retinopathy, sup- by the year 2030, this might rise to 490 bil-
porting cardiopathy the dataset of patients lion. Nonetheless, High blood sugar is a con-
from Hungarian, Switzerland and Cleveland, ventional disease in numerous countries like
and Cancer, a Brest Cancer Wisconsin data- Canada, India. With over 100 million peo-
set is used. Sir has used Random Forest for ple living in India now, there are actually 40
Heart, Diabetes and SVM for Cancer whereas million diabetics living there. The suggested
TensorFlow CNN is used for Diabetes Retin- strategy makes use of a number of taxonomy
opathy as images are used for it. and collaborative learning techniques.
A. Sivasangari et al. (2020) [12] Liver ill- Chayakrit Krittanawong et al. (2020) [15]
nesses are a major cause of death in India The prediction of cardiovascular diseases,
and a worldwide concern. Early diagno- such as heart failure, stroke, coronary artery
sis of liver sickness can be challenging, but disease, and cardiac arrhythmias, was evalu-
machine learning techniques in an auto- ated using machine learning (ML) algorithms
mated approach have shown promise. This in a thorough investigation. Prospective find-
study assessed the performance of the SVM, ings emerged from the analysis of data from
D-Tree, and R-Forest blueprint in terms of 344 studies involving 3,377,318 participants.
authenticity, precision, and sensitivity. The High accuracy was achieved in the prediction
accuracy rates that were found were 95%, of coronary artery disease, with AUC values
87%, and 92%, in that order. These results associated with 0.93 and 0.88 for amplifying
show how machine learning may be used to and tailor-made methods, consecutively. The
improve liver disease early identification and SVM, boosting, and CNN algorithms showed
care, which will improve prognosis and lower AUC values of 0.92, 0.91, and 0.90 for stroke
470 Innovations in Computational Intelligence: Trends and Technologies
prediction. It was discovered that the predic- caused by Diabetes per year. The crucial part
tion of cardiac arrhythmia and heart fail- is to diagnosis the diabetes in its early stage
ure was a suitable use for SVM. The study for its treatment. Deep neural networks have
illustrated the potential of machine learn- been used in their study to predict diabetes.
ing algorithms in cardiovascular care while Their study tells us that using logistic regres-
emphasising the need for additional research sion they obtained highest accuracy of 78%,
and integration into clinical practice. enhanced genetic algorithm acquired correct-
Rudra A. Godse et al. (2019) [16] proposed ness of 80.4%, secured precision of 96.71%
a system that will have a simple and elegant utilizing customized K-Nearest Neighbour
UI and also be time efficient which will help and S-Vector Machine and precision of
in creating a connecting bridge between Doc- 97.47% using S-Vector Machine alongside
tors and Patients. They have analyzed dif- effective development. Their approach out-
ferent algorithms and have chosen the best performs the state of the art with an accuracy
algorithm for the prediction of various dis- of 98.35% when fivefold cross-validation is
eases. The models used in this article mostly performed using a deep neural network.
apply Supervised Learning. Supervised Learn- Deepti Sisodia et al. (2018) [19] The study
ing is an approach in which the data is sepa- aims to utilize machine learning algorithms
rated into two sections. One is being trained, to predict diabetes at an early stage, address-
and the other is testing, the model is trained ing the critical issue of late identification
using them and then asked for new values for and treatment of this chronic disease. From
prediction. This article uses an 80/20 split, a dataset sourced from the UCI machine
which divides records among 80% directed learning repository, we compared three clas-
to preparation and 20% for screening. Such sification algorithms: SVM, Naive Bayes, and
resulting model is then used to make predic- Decision Tree. Evaluation metrics included
tions using a questionnaire. Precision, Accuracy, F-Measure, and Recall.
Priyanka Sonar et al. (2019) [17] dia- Naive Bayes yielded the highest accuracy,
betes is one of the most deadly diseases in achieving 76.30%, surpassing the other algo-
the world since it can lead to a wide range rithms. Early identification of diabetes is of
of conditions, such as blindness. This paper paramount importance due to the severe com-
contains employs machine learning methods plications associated with untreated diabetes,
to identify diabetes since it is a forecastable and the study’s results suggest that machine
condition that is simple to predict whether learning, particularly Naive Bayes, can play a
or not the patient is unwell. The purpose of vital role in achieving this goal, with potential
the evaluation supposed to develop a frame- applications for other diseases in the future.
work that would let user correctly diagnose Chieh-Chen Wu et al. (2018) [20] arti-
themselves with diabetes. In this case, they cle says that fatty liver disease is a common
primarily used four algorithms: SVM, D-Tree, clinical problem and increases mortality rate.
and Naïve Bayes. Centered on an accuracy Therefore accurate identification of such
comparison of 85%, 77%, and 77.3%, they issues will be considered a great help in soci-
chose to use SVM for the prediction of dia- ety. The article uses machine learning tech-
betes after analysis. They also used the ANN niques as over the past decades Biopsy has
algorithm to observe the network’s responses been used for diagnosis and this is a way
after the training phase. costly method. The liver protection project at
H. Abbas et al. (2019) [18] This research New Taipei City Municipality Hospital Ban-
paper tells us that the Diabetes is a chronic dis- qiao Branch provided the textual and numer-
ease that has to be prevented before distresses ical dataset that was used. Patients under 30
people. A large number of death are being who had an ultrasound-confirmed case of
A comprehensive review on multi disease prediction web app: QuadraDiag 471
fatty liver were excluded. To select the best patient outcomes. The versatility of the sys-
model, they looked at five machine learning tem in handling various medical conditions is
models: Random Forest, LR, SVM, N-Bayes, evidenced by the application of multiple algo-
and ANN. Where R-Forest gave highest accu- rithmic modelling modalities, such as S-Vec-
racy about 91% and was chosen as the best tor Machine, D-Tree, Naïve Bayes, R-Forest,
model, whereas SVM, Naïve Bays, Logistic and XGBoost.
Regression and ANN gave 76.30%, 82.92%, This paper also references other relevant
64.90% and 74.10% respectively. studies that emphasize the need of early ill-
ness identification and the ability of machine
learning to predict a diversity of malady,
4. Recommendation for Future entailing glycemic disorder, cardiologic disor-
Work der, liver affliction, and Parkinson’s disease.
The limitation includes the challenges related These studies show that feature engineering
to data availability as most of the previous processes have the ability to realise exact-
research and projects have used the same ness proportionality that can improve health-
datasets for training and testing so it reduces care quality by enabling accurate and timely
their accuracy in some or the other way. diagnosis.
They have offered a solitary platform with a
complicated user interface that makes it feel References
hard for users to access the platform for a
single illness prediction. Overcoming these [1] J. Jasmin, R. Jenisha, S.G. Rahul, Shriram,
S.S. KavyaSruthi, A.K. Santhiya, K. Kaavy-
limitations in future work entails improving
atamizhan MR. T. Goutham, Parkinson’s
data collection from various mediums. To Disease Prediction Using Deep Learning,
enhance the accuracy of the system, the best Journal of Xi’an Shiyou University, Natural
supervised learning algorithm for each kind Science Edition, 2023.
of disease will be selected from a range of [2] Poojaa C, John Sahaya Rani Alex, Early
algorithms. There will be a streamlined and Detection of Parkinson’s Disease using
passive experience for patients and health- Motor symptoms and Machine Learning,ar
care professionals thanks to the provision Xiv:2304.0925,Cornell University, 2023.
of a more user-friendly and unified platform [3] Parshant, Anu Rathee, Multiple Disease
for a range of disease diagnoses. In the end, Prediction Using Machine Learning, Iconic
this will improve patient care and outcomes Research and Engineering Journals, Ire
by facilitating accurate disease detection and 1704650, 2023.
early intervention. [4] Valle Harsha Vardhan, Uppala Rajesh
Kumar, Vanumu Vardhini, Sabbi Leela Var-
alakshmi, A. Suraj Kumar, Heart Disease
5. Conclusion Prediction Using Machine Learning, Journal
Of Engineering Sciences, Vol 14 Issue 04,
In its conclusion, the paper discusses the 2023.
development of a “Multi Disease Prediction [5] T. Venu Gopal, Heart Disease Prediction
Web App” that forecasts multi-systematic dis- Using Machine Learning Techniques, Issn
eases simultaneously, incorporating glucose- 2457-0362, Volume 13, Issue 07, Jul 2023.
intolerance, liver disease, movement disorder, [6] Ruhul Amin, Rubia Yasmin, Sabba Ruhi,
and cardiac illness, using machine learning Habibur Rahman, Shamim Reza, Predic-
algorithms. The system’s ability to provide tion of chronic liver disease patients using
precise and timely disease projections is what integrated projection based statistical fea-
makes it so important; these forecasts can ture extraction with machine learning algo-
help with early intervention and improve rithms, Informatics in Medicine Unlocked,
Elsevier; 2023.
472 Innovations in Computational Intelligence: Trends and Technologies
[7] Deepika Bhupathi Christine Nya-Ling Tan, [14] Mitushi Soni, Sunita Varma, Diabetes Pre-
Sreenivas Sremath Tirumula, Sayan Kumar diction using Machine Learning Tech-
Ray, Liver Disease Detection Using Machine niques, International Journal of Engineering
Learning Techniques, Research Gate, 2022. Research and Technology (IJERT), Vol. 9
[8] Azizkhan F Pathan, Muskan M, Pooja K, Issue 09, September-2020.
Manu B M, Shreya B H, Machine Learning [15] Chayakrit Krittanawong, Hafeez Ul Has-
for Parkinson’s Disease Prediction, Interna- sanVirk, Sripal Bangalore, Zhen Wang, Kipp
tional Journal of Engineering Research and W. Johnson, Rachel Pinotti, HongJu Zhang,
Technology (IJERT) ISSN: 2278-0181 Pub- Scott Kaplin, Bharat Narasimhan, Takeshi
lished by, www.ijert.org ICEI - 2022 Confer- Kitai, Usman Baber, Jonathan L. Halperin
ence Proceedings. and W. H. WilsonTang, Machine learn-
[9] K. Arumugam, Mohd Naved Priyanka P. ing prediction in cardiovascular diseases:
Shinde Orlando Leiva-Chauca Antonio a metaanalysis, Scientific Reports, Pubmed
HuamanOsorio Tatiana Gonzales-Yanac, (2020).
Multiple disease prediction using Machine [16] Rudra A. Godse, Smita S. Gunjal, Karan
learning algorithms, Materials Today: Pro- A. Jagtap, Neha S. Mahamuni Suchita
ceedings Elsevier.com, 2021. Wankhade Multiple Disease Prediction
[10] Cameron R. Olsen Robert J. Mentz, Kevin J. Using Different Machine Learning Algo-
Anstrom David Page, Priyesh A. Patel MDc rithms Comparatively, IJRCCE, 2019.
Durham Charlotte, Clinical applications of [17] Priyanka Sonar, K. JayaMalini, Diabetes Pre-
machine learning in the diagnosis, classifica- diction Using Different Machine Learning
tion, and prediction of heart failure, Ameri- Approaches. 2019 IEEE, 3rd International
can Heart Journal Volume 229, Number 0 Conference on Computing Methodologies
Olsen, 2020. and Communication (ICCMC).
[11] Akkem Yaganteeswarudu, Multi Disease [18] H. Abbas, L. Alic, M. Rios, M. Abdul-Ghani
Prediction Model by using Machine Learn- and K. Qaraqe, Diabetes Prediction: A
ing and Flask API, Proceedings of the Fifth Deep Learning Approach. 2019 IEEE 32nd
International Conference on Communica- International Symposium on Computer-
tion and Electronics Systems (ICCES 2020), Based Medical Systems (CBMS), 2019, pp.
2020. 567-570.
[12] A. Sivasangari, Baddigam Jaya Krishna [19] Deepti Sisodiaa, Dilip Singh Sisodiab, Pre-
Reddy, Annamareddy Kiran, P. Ajitha, diction of Diabetes using Classification
Diagnosis of Liver Disease using Machine Algorithms, International Conference on
Learning Models. 2020 Fourth Interna- Computational Intelligence and Data Sci-
tional Conference on I-SMAC (IoT in Social, ence (ICCIDS 2018).
Mobile, Analytics and Cloud) (I-SMAC). [20] Chieh-Chen Wu Wen-Chun Yeh, Wen-Ding
[13] Archana Singh, Rakesh Kumar, Heart Dis- Hsu Md. Mohaimeu Islam, Phung. Anh
ease Prediction Using Machine Learning (Alex) Nguyen Tahmina Nasrin Poly Yao-
Algorithms. 2020 IEEE, International Con- Chin Wang Hsuan-Chia Yang, Yu-Chuan
ference on Electrical and Electronics Engi- (Jack) Li, Prediction of fatty liver disease
neering (ICE3), 2020. using machine learning algorithms, Com-
puter Methods and Programs in Biomedi-
cine 170 (2019) 23–29, 2018.
66 A comprehensive review on tomato plant
disease detection using convolutional
neural network
AQ1:
Rudra Pratap Singha, Sandeep Kumar Mishrab, Samriddhi Please
check and
Chaurasiac, Sameer Thakurd, and Sachin Yadave confirm
whether
Department of Computer Science and Engineering, Babu Banarasi Das Institute of Technology and the
Management, Lucknow, India author
names
are set
Abstract: Tomato plants, a globally essential crop, are susceptible to a wide range of diseases that can impact correctly.
both crop yield as well as quality. The early identification of these diseases is important for maintaining agri-
cultural productivity. Recently, deep learning (DL) models have gained prominence as a powerful tool for
automatic tomato leaf disease detection. This report offers a thorough examination of several DL approaches
used to address this important agricultural problem. An outline of the significance of tomato crops in world
agriculture as well as the numerous dangers they encounter, such as illnesses and pests, opens the review. It cov-
ers important discoveries and illness detection techniques. These studies use a range of DL models, including
transfer learning, Inception modules, and convolutional neural networks, to identify tomato leaf illnesses with
remarkable accuracy rates that frequently surpass 99%. Using publically accessible datasets, like Plant Village,
and optimizing model performance through data augmentation, regularization strategies, and hyper parameter
tuning are recurring themes in these works. In an effort to increase precision and lower computing complex-
ity, a number of research also investigate the application of hybrid models and feature selection techniques.
The analyzed research show that DL-based methods offer a promising way to protect agricultural productivity
worldwide by revolutionizing disease detection for other crops as well as tomato plants. To sum up, this exten-
sive analysis offers a clear grasp of the state of DL applications in tomato leaf disease detection at the moment.
Keywords: convolutional neural network; deep learning; machine learning; transfer learning
[email protected]; e [email protected]
d
DOI: 10.1201/9781003606635-66
474 Innovations in Computational Intelligence: Trends and Technologies
The incorporation of the Hard Swish acti- tomato early blight and tomato late blight,
vation function, IB Max module, and other both belonging to the same class [17].
enhancements contributes to improved rec-
ognition accuracy and faster convergence.
This approach increases the versatility and 4. Critical Analysis
practical utility of the proposed methodol- The papers share several common themes
ogy [3]. This research proposes a model using that reflect the state of the field. Most of them
Convolutional Neural Network for detecting utilize publicly available datasets like Plant
and classifying tomato plant diseases, aim- Village [6]. This augmentation is essential
ing to improve crop quality and quantity for for enhancing a model’s ability to generalize
farmers’ benefit. The abstract outlines clear to the wide range of conditions and varia-
objectives and methodology. However, future tions encountered in real-world agricultural
improvements lack specificity, and details on settings [5]. For instance, by applying these
optimization techniques for enhancing test techniques, researchers can simulate differ-
accuracy are not provided [4]. ent angles, lighting conditions, and perspec-
The research introduces an innovative tives, thereby ensuring that the DL models
hybrid diagnostic tool, combining CNN with are robust and capable of accurately identi-
an inception module, to enhance diagnostic fying diseases in a wide array of real-world
accuracy and robustness for tomato diseases. scenarios.
The study emphasizes practical application Transfer learning stands out as a com-
in agriculture, addressing the need for timely mon practice among these studies. Research-
and accurate diagnosis. It acknowledges ers leverage pre-trained deep learning models
inconsistent lighting conditions but over- and fine-tune them for the specific task of
looks challenges like plant growth variabil- tomato leaf disease detection [2]. Transfer
ity. The conclusion mentions future work on learning accelerates the model training pro-
the hybrid network but lacks specifics. Add- cess and enhances its performance by lever-
ing details on planned improvements would aging knowledge from unrelated tasks. This
strengthen the conclusion [5]. approach is particularly valuable in agricul-
The research addresses the significant tural disease detection, where it allows mod-
impact of plant diseases on agricultural els to quickly adapt to the intricacies of plant
production, emphasizing the need for effi- pathology without starting from scratch.
cient and timely detection methods. This Researchers experiment with a variety
aligns with the crucial concerns in the field of CNN architectures, including Inception
of agriculture. The focus on recognizing and models, ResNet, ShuffleNet, MobileNet, and
detecting diseases in specific plants, such as VGG, for disease detection [2]. These archi-
strawberries and potatoes, demonstrates the tectures offer different trade-offs in terms of
practical application of proposed Disease computational efficiency and accuracy. The
Recognition Model. It is a traditional pro- choice of architecture is a crucial decision
cedure for plant disease detection is time- in model design, and these studies illustrate
consuming, costly, and imprecise, while this the diverse strategies adopted by research-
mentions the use of Convolutional Neural ers to optimize their DL models. Researchers
Network for image processing, it lacks spe- employ feature selection methods to reduce
cific details about the architecture or con- the dimensionality of the extracted features,
figuration of the CNN [6]. Certain methods improving classification accuracy and mak-
exhibited a limitation wherein they pro- ing the models more efficient. By selecting
duced false predictions, specifically con- the most relevant features, these studies aim
cerning the fine-grained distinction between to enhance the model’s ability to distinguish
476 Innovations in Computational Intelligence: Trends and Technologies
accuracy. The utilization of diverse and exten- Technologies, vol. 11, no. 1, p. 10, Jan. 2023,
sive datasets, including data augmentation, doi: 10.3390/technologies11010010.
contributes to improved model generaliza- [6] Nishant Shelar, Suraj Shinde, Shubham
tion and robustness, reflecting the real-world Sawant, Shreyash Dhumal, and Kausar Fakir,
variability of tomato leaf diseases. In conclu- Plant Disease Detection Using Cnn, ITM
Web Conf. 44 03049, 2022, doi: 10.1051/
sion, the reviewed research papers represent
itmconf/20224403049.
significant strides in the application of DL for
[7] G. Sakkarvarthi, G. W. Sathianesan, V. S.
tomato leaf disease detection. They provide Murugan, A. J. Reddy, P. Jayagopal, and
insights into the potential of using advanced M. Elsisi, Detection and Classification of
CNN architectures, transfer learning, and Tomato Crop Disease Using Convolu-
diverse datasets. To further advance this field, tional Neural Network, Electronics, vol. 11,
researchers must prioritize comprehensive no. 21, p. 3618, Nov. 2022, doi: 10.3390/
performance evaluations, detailed technical electronics11213618.
descriptions, and comparisons with existing [8] S. M. Hassan, A. K. Maji, M. Jasiński, Z.
models. This would facilitate the develop- Leonowicz, and E. Jasińska, Identification of
ment of more robust and efficient tools for Plant-Leaf Diseases Using CNN and Trans-
safeguarding global agricultural produc- fer-Learning Approach, Electronics, vol. 10,
tion and addressing the challenges faced by no. 12, p. 1388, Jun. 2021, doi: 10.3390/
electronics10121388.
tomato crops.
[9] Vidyashree Kanabur, Sunil S. Harakanna-
navar, Veena Puranikmath, Pramod Hullole,
References and Dattaprasad Torse, Detection of Leaf
Disease Using Hybrid Feature Extraction
[1] A. Saeed, A. A. Abdel-Aziz, A. Mossad, M. Techniques and CNN Classifier, 2022, doi:
A. Abdelhamid, A. Y. Alkhaled, and M. 10.1007/978-3-030-37218-7_127.
Mayhoub, Smart Detection of Tomato Leaf [10] A. Guerrero-Ibañez and A. Reyes-Muñoz,
Diseases Using Transfer Learning-Based Monitoring Tomato Leaf Disease through
Convolutional Neural Networks, Agricul- Convolutional Neural Networks, Electron-
ture, vol. 13, no. 1, p. 139, Jan. 2023, doi: ics, vol. 12, no. 1, p. 229, Jan. 2023, doi:
10.3390/agriculture13010139. 10.3390/electronics12010229.
[2] O. Attallah, Tomato Leaf Disease Classi- [11] P. Bansal, R. Kumar, and S. Kumar, Disease
fication via Compact Convolutional Neu- Detection in Apple Leaves Using Deep Con-
ral Networks with Transfer Learning and volutional Neural Network, Agriculture, vol.
Feature Selection, Horticulturae, vol. 9, 11, no. 7, p. 617, Jun. 2021, doi: 10.3390/
no. 2, p. 149, Jan. 2023, doi: 10.3390/ agriculture11070617.
horticulturae9020149. [12] M. E. H. Chowdhury et al., Automatic and
[3] R. Zhang, Y. Wang, P. Jiang, J. Peng, and H. Reliable Leaf Disease Detection Using Deep
Chen, IBSA_Net: A Network for Tomato Learning Techniques, AgriEngineering,
Leaf Disease Identification Based on Trans- vol. 3, no. 2, pp. 294–312, May 2021, doi:
fer Learning with Small Samples, Applied 10.3390/agriengineering3020020.
Sciences, vol. 13, no. 7, p. 4348, Mar. 2023, [13] Z. Ullah, N. Alsubaie, M. Jamjoom, S. H.
doi: 10.3390/app13074348. Alajmani, and F. Saleem, EffiMob-Net: A
[4] H.-C. Chen et al., AlexNet Convolutional Deep Learning-Based Hybrid Model for
Neural Network for Disease Detection and Detection and Identification of Tomato Dis-
Classification of Tomato Leaf, Electron- eases Using Leaf Images, Agriculture, vol.
ics, vol. 11, no. 6, p. 951, Mar. 2022, doi: 13, no. 3, p. 737, Mar. 2023, doi: 10.3390/
10.3390/electronics11060951. agriculture13030737.
[5] M. V. Sanida, T. Sanida, A. Sideris, and M. [14] T. Anandhakrishnan and Jaisakthi S. M.
Dasygenis, An Efficient Hybrid CNN Clas- Murugaiyan, Identification of tomato leaf
sification Model for Tomato Crop Disease, disease detection using pretrained deep
A comprehensive review on tomato plant disease detection using convolutional neural network 479
Abstract: In the past few years, Non-Fungible Tokens (NFTs) have surfaced as a revolutionary innovation,
captivating the world’s attention by offering a novel way to tokenize and trade unique digital assets and col-
lectibles. This paper presents a comprehensive exploration of the development and implementation of a decen-
tralized NFT marketplace, underpinned by the power of blockchain technology. It harnesses a sophisticated
stack of cutting-edge technologies, including MetaMask, Truffle, Infura, ReactJs, Tailwind CSS, Ganache,
Solidity, Web3js, and Faucet. These technologies have been meticulously integrated to create an ecosystem that
prioritizes security, efficiency, and user-friendliness, redefining the way NFTs are bought and sold in the digital
realm. It delves into the intricate architectural design of the decentralized NFT marketplace, offering in-depth
insights into its underlying infrastructure and the intricate interplay of its constituent technologies. It meticu-
lously outlines the implementation process, illuminating the steps taken to transform this ambitious vision into
reality. The paper also candidly discusses the challenges encountered throughout the development journey,
providing valuable lessons learned.
DOI: 10.1201/9781003606635-67
Building a decentralized non-fungible token marketplace: Leveraging blockchain technology 481
gatekeepers, democratizing participation in granting them direct control over their digital
the creation and exchange of digital assets. assets [6].
As we delve deeper into this paper, we will
scrutinize the mechanics of NFTs, exploring 2.2. NFTs and solidity: enabling
the creation, transfer, and provenance track- unique digital ownership
ing of these unique tokens [1].
A unique kind of digital asset known as NFTs
denotes ownership of a particular object or
2. Background piece of material, including digital music, films,
Blockchain technology emerged in 2008 with art, and even in-game goods. NFTs are valu-
the introduction of Bitcoin by an entity named able because of their distinctiveness, particu-
Satoshi Nakamoto, marking the advent of larly in the realm of digital art and collectibles.
decentralized digital currency. This innova- Solidity, a programming language designed
tion combined cryptographic methods with exclusively for Ethereum smart contracts, is
a transparent public ledger, enabling secure essential for crafting NFTs. These smart con-
transactions without centralized control. In tracts are automated agreements where the
subsequent years, blockchain’s applications terms between buyer and seller are encoded
expanded beyond cryptocurrency. Ethereum, directly into lines of code, enabling self-exe-
launched in 2015 by Vitalik Buterin, intro- cution. Solidity allows developers to create
duced smart contracts, empowering devel- custom, secure, and efficient smart contracts,
opers to build decentralized applications including those representing NFTs. By defin-
(DApps) and tailor blockchain functionali- ing the rules for creating, transferring, and
ties. This breakthrough led to the surge of managing NFTs, Solidity ensures that the
Initial Coin Offerings and the creation of digital assets on our platform are not only
diverse blockchain platforms. unique but also secure from potential threats
The technology underwent further refine- and vulnerabilities.
ment, addressing issues related to scalabil-
ity and energy efficiency. Blockchain gained 2.3. MetaMask and Web3.js: user-
prominence across sectors such as finance, friendly access to blockchain
supply chain, healthcare, and voting, prompt-
ing exploration of its potential. Permissioned MetaMask, a popular Ethereum wallet and
and private blockchains gained traction, pro- gateway to the decentralized web, serves as
viding regulated access for businesses and a link between the Ethereum blockchain and
institutions [2–5]. conventional web browsers. Users can use it
to control their Ethereum accounts, including
storing Ether (ETH), the native cryptocur-
2.1. Decentralization rency of Ethereum, and communicating with
Decentralization is a key feature of block- smart contracts and DApps. By integrating
chain technology. Conventional systems MetaMask into our NFT marketplace, we
depend on a central authority, such as a bank empower users to securely store their NFTs,
or government, for transaction verification manage transactions, and participate in the
and validation. In contrast, blockchain func- marketplace with ease [7].
tions through a network of computers called Web3.js, on the other hand, is a JavaScript
nodes, preventing any single entity from hav- library that permits communication between
ing complete control over the system. This web apps and the Ethereum blockchain. By
decentralized approach not only strength- leveraging Web3.js, our platform can seam-
ens security by minimizing the risk of a sin- lessly connect to the Ethereum network with-
gle point of failure but also empowers users, out requiring users to leave their web browsers.
482 Innovations in Computational Intelligence: Trends and Technologies
4. Experimentation
• ‘User’ be the class representing individu-
als engaging with the platform.
• ‘NFT’ be the class representing non-fun-
gible tokens.
• ‘InfuraService’ be the class serving as an
intermediary for secure interactions with
IPFS via Infura infrastructure.
Abstract: This paper is designed to harness the valuable information and experiences of college alumni to
enhance the placement process. By analyzing alumni data, this project aims to provide students, the placement
cell, and the college administration with critical insights to improve future placements. In a world where tech-
nology advances at an unprecedented pace, complexity often accompanies its benefits. Our platform directly
addresses this challenge by seamlessly integrating the invaluable experiences of former students to guide current
ones toward successful careers. It is a comprehensive solution for today’s information and interaction needs. The
project will gather and centralize data from college alumni who have successfully transitioned into their careers.
This data will include employment details, career trajectories, and post-graduation experiences.
a
[email protected]; [email protected]; [email protected]; dkumarronit599@
gmail.com; [email protected]
DOI: 10.1201/9781003606635-68
488 Innovations in Computational Intelligence: Trends and Technologies
site management can solve these problems by Cross-cultural adaptability: For colleges
improving the registration process, reducing with diverse student populations, there may
manual impact, increasing accuracy, ensur- be a research gap in how an application
ing data security, and producing and deliver- adapts to the unique needs of students from
ing real-time updates to students but it is not different cultural backgrounds.
time efficient and also have no user feedback User engagement and long-term impact:
system [1]. Measuring user engagement and assessing the
Java or Kotlin can be used to develop long-term impact of application on students’
Android applications; Java is the most pop- careers could be a research gap. Understand-
ular language. Android mobile applications ing how frequently students use the platform
can also be developed using frameworks such and its effects on their career trajectory is
as Xamarin and React Native [2]. essential for continuous improvement.
The fog computing paradigm uses dis- Privacy and data security concerns: The
tributed, heterogeneous, and resource- con- project can further explore privacy and data
strained devices at the edge of the network security concerns, ensuring that student and
to efficiently implement latency- and band- company data is rigorously protected while
width-sensitive. MSA shows great potential making the system as transparent and secure
in utilizing fog and cloud resources and creat- as possible.
ing new paradigms such as osmotic comput-
ing but third-party apps include which can
threaten User’s privacy [3]. 5. Synthesis and Implications
The working of the application must be short
and easy so that every user feels comfortable
4. Critical Analysis and found it interesting. In our application,
While the application strives to revolutionize the workflow is mentioned below.
college placements and equip students with User interaction: Users interact with the
valuable insights, several research gaps exist Application web application built using
that merit further exploration. XML. They input prompts or select options
Personalized industry-specific recommen- through the intuitive user interface.
dations: Application must provide personal- Backend processing: PHP handles these
ized recommendations based on a student’s user requests and communicates with the
profile and historical data, but there is backend server. Java facilitates interactions
room to delve deeper into industry-specific with the database, managing user accounts,
recommendations. preferences, and content requests.
Impact of skill development on placement Payment processing: When users opt for
success: The project emphasizes skill develop- premium features, PHP communicates with
ment recommendations, but the direct impact APIs securely handles the payment processing
of skill acquisition and enhancement on place- and subscription management tasks, ensuring
ment success remains an area for research. a smooth user experience during the upgrade
Continuous integration of alumni feed- process.
back: While application encourages alumni
involvement, there is a research gap in terms
of how consistently and effectively alumni 6. Module
feedback is integrated into the platform.
Real-time industry insights: Application 6.1. Student module
must offer historical placement data, but the Students can find information on each place-
project could explore ways to provide real- ment that stimulates their interest in the Stu-
time industry insights and job market trends. dent Module.
490 Innovations in Computational Intelligence: Trends and Technologies
By visiting the login page, students can Integration with social media and network-
access the app by providing their personal ing: Allow students to link their application
and academic information. profiles with professional networking sites
Students can read the training materials to enhance their job search and networking
and other announcements after logging in. capabilities.
The student has access to notifications Collaboration with companies: Foster
about companies who visit the campus and stronger partnerships with companies to
different training events. ensure they have easy access to the platform
for recruitment purposes.
6.2. Coordinator module International student support: Develop
resources specifically tailored to international
Upon registering for the application, each students, including visa application guidance
student’s details will be displayed. The stu- and cultural adaptation assistance.
dent cannot use it until the coordinator has
verified those facts.
In addition, the coordinator has access 8. Conclusion
to all other administrative announcements, In conclusion, the application represents a sig-
company information, and specifics on the nificant leap forward in the realm of college
campus drive. placements for students. The journey from
inception to completion has been a testament
6.3. Administrator module to innovation, data-driven decision-making,
and the pursuit of a more student-centric
With total authority over this application,
approach to career development.
the Placement Officer assumes the role of
administrator.
All that the administrator can do is access References AQ3:
the database. Please
[1] Amit Kumar Singh, Ayush Kaushik, G. V. provide
The administrator updates the campus reference
Chandana, A. Chitra, and M. Mala, 2023,
drive details, posts the training materials, and Training and Placement Cell Automation,
citation
through-
arranges placements. Volume 6, ISSN (Online): 2581–5792, Inter- out
national Journal of Research in Engineering,
6.4. Company module Science and Management.
[2] Manisha Patil and Dhanya Pramod, 2023,
With total authority over this application, Enhancing Android Framework Used to
the Placement Officer assumes the role of Detect Unexpected Permission Authorization
administrator. of Mobile Application, Vol. 44, No. 3, Tuijin
All that the company can do is to update Jishu/Journal of Propulsion Technology.
their information. Several mock tests may be [3] Samodha Pallewatta, Vassilis Kostakos,
added, updated, and deleted by the company. and Rajkumar Buyya, 2023, Placement of
Microservices-based IoT Applications in
Fog Computing: A Taxonomy and Future
7. Future work Directions, Vol. 55, No. 321pp, 1–43, ACM
The Application has laid a strong foundation Computing Surveys
[4] Kapil Wagh, Dnyaneshwari Tilekar, Bram-
for enhancing college placements, but there
hesh Chaugule, and Pradip Gorde, 2023,
are numerous avenues for future work and development in the web application for
expansion to make it even more effective. training and placement cell, Vol. 05, Interna-
Here are some areas of future work. tional Research Journal of Modernization in
Engineering Technology and Science.
CollegeGo: leveraging alumni data for improved college placements 491
[5] Mohammad Mainul Islam, Fahimeh [6] Samrudhi Padwal, Samruddhi Ghorpade,
Ramezani, Hai Yan Lu, and Mohsen Nad- P. R. Patil, Manasi Patil, Shraddha Biraje,
erpour, 2023, Optimal placement of applica- Sapana Salunkhe, 2022, E-training and
tions in the fog environment: A systematic placement management system, Vol. 04, No.
literature review, Vol. 174, Journal of Paral- 06, International Research Journal of Mod-
lel and Distributed Computing. ernization in Engineering Technology and
Science.
69 An in-depth review of AI/ML techniques
in emotion-preserving multilingual
video translation for practical cross-
cultural communication
Diwakar Yagyasena, Akshit Kumar Tiwarib, Abhishek Kevin
Gomesc, Aditya Yadavd, and Harsh Anand Guptae
Department of Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management, Lucknow, Uttar Pradesh, India
Abstract: Our review paper thoroughly examines utilization of AI/ML algorithm in Emotion-Preserving
Multilingual Video Translation as basis for operationalized Cross-Cultural Communications. Incorporating
recent advancements in speech-to-speech translation, audio-video transformation, and AI/ML based language
automation, we contemplate whether the automated machine can retain emotional tone of language amidst
inter-lingual exchange without considering S2MU and multi-ling Through critical benchmarking, this study
examines these translation models’ quality and effectiveness in translating text from English to any target lan-
guage arguing that cross-cultural communication depends on such tools.
[email protected]; [email protected]
d
DOI: 10.1201/9781003606635-69
An in-depth review of AI/ML techniques in emotion-preserving multilingual video translation 493
unit (S2MU) and multilingual vocoders, Multilingual video translation for practice
which can reduce the interference from other cross cultural communication. This section
languages and improve the performance of examines the phases and processes necessary
the translation process [1]. The paper also when undertaking a literature review.
discusses the challenges of choosing the Searching process was planned in such a
appropriate unit vocabularies for differ- manner so as to reach every relevant pub-
ent multilingual scenarios, and the potential lication about Multilingual video transla-
applications of the proposed approach for tion. Completely, we had a thorough search
cross-cultural communication. of research databases like ICMPC, IJRPR,
The paper aims to provide a comprehensive IRJET, Google Scholar, Research Gate, iJRA-
overview of the state-of-the-art AI/ML tech- SET among others. Special care was taken
niques for emotion-preserving multilingual to conduct these searches during that spe-
video translation, and to highlight the gaps cific period of time ranging from July 2019
and opportunities for future research. The to July 2023 which makes sure that only the
paper also demonstrates the practical value of latest and recently conducted research on
the proposed approach for creating video con- this particular issues are involved in the final
tent that can transcend language and cultural document. The search strings included appro-
barriers, and convey emotions effectively. The priate phrases/keywords for instance; “Text-
paper is intended for researchers, practition- To Video,” “extract audio from video” etc.
ers, and enthusiasts who are interested in the slightly modified for this purpose. To ensure
intersection of AI/ML, video communication, completeness we used filters that narrowed
and cross-cultural communication. the search results and referenced relevant
The paper argues that emotion preserva- sources.
tion is essential for achieving a competitive Following guidelines were used to select
edge in the global market and fostering mutual papers for inclusion in this review:
understanding and cooperation among dif-
ferent cultures. • The conference focused on the application
Most of the previous works have dealt of the most advanced technologies in the
with translating from multiple source lan- context of Multilingual Video Translation.
guages to one target language [6,15], but this • In this case, it is about articles, conference
paper explores the possibility of expanding papers, publications, and reliable findings.
the multilingual scenarios to support multiple • It was wholly in the English.
target languages [9–11]. • Release them from the period stated, from
Nowadays the ability to watch video July 2019 until July 2023
without loss of feeling, especially in terms
of cross-cultural communication becomes Initially, the titles and abstracts of identi-
vitally important because nowadays people fied papers were carefully analyzed in order
live and work in a world unchained by geo- to assess their relevance to the research topic.
graphical boundaries. Following, the full-length versions of these
With a global village where people have relevant papers were thoroughly investigated
been interlinked, there is a need for successful to see if they met the established criteria for
cross-cultural communication so as to pro- acceptance. When conflicts arose, a process
mote mutual understanding. of consensus was used to reach an agreement
among everyone. Because the literature was
descriptive in nature, quality assessment and
2. Methodology risk of bias analysis were deemed unneces-
An organized approach to identification sary because the primary goal was to conduct
and assessment of required research on an in-depth evaluation of available research
494 Innovations in Computational Intelligence: Trends and Technologies
3. Thematic Analysis
Emotive speech translation, therefore, prom-
ises enriching cross-lingual communication
encapsulated in a creative and fascinating
atmosphere. This paper presents a holistic
approach for building and examining the
key steps in this fascinating procedure. Build-
ing on what has been learnt from previous
studies, we have provided a rigorous basis
for subtitling of video content. The proposed
framework stresses that emotions should be
retained in speech. First, we start by selecting
a video with multiple emotions expressions
AQ1: and audible speech content. This video pro-
Please
mention vides the foundation for the extraction of the
table and audio that serves as the basis for the remain-
figure
citations
ing processing stages. Finally, we dispose of
in the the files that were created on a temporary
main text. basis while observing the ethical rules associ-
ated with resource management. As a result,
AQ2:
Please
we get rid of the messy machine and have a
provide straightforward and productive procedure. In
source Figure 69.1. Methodological Process Flow our humane approach that is incorporated in
for all the Chart.
figures our complete framework, speech translation
AUTHOR'S SELF GENERATED
Source: will mean more than just words in the future.
What it endeavors to do is to include and
rather than analyze the rigorous approach of express the whole scope of human feelings,
individual studies Another peer reviewer was so as to facilitate and deepen cross-cultural
consulted if necessary to provide a different relationships.
perspective.
The core principles, breakthroughs, proto-
types, models, datasets, and any noteworthy
discussions or consequences associated with
the conversion processes between video-to-
audio, audio-to-text, and vice versa have been
compiled from selected papers. To maintain
coherence and extract relevant details for
future research, the data was organized in a
structured manner.
Another peer reviewer was consulted when
necessary to provide an additional perspec-
tive on the research findings. This meticulous
process ensured the inclusion of pertinent
and high-quality literature in the final docu-
ment, contributing to a robust foundation for Figure 69.2. Metric analysis.
further research in the field. Source: AUTHOR'S SELF GENERATED
An in-depth review of AI/ML techniques in emotion-preserving multilingual video translation 495
5 Aman Sharma, Vibhor Sharma, Language Study used Seq2Seq approach to train
Translation Using Machine Learning, Volume: its model for translating. The model
03, Issue: 06, e-ISSN: 2582-5208, June 2021 performed well however it had difficult
[14]. cases too.
6 Sagar Nimbalkar, Tekendra Baghele, This paper discusses the development of
Shaifullah Quraishi, Sayali Mahalle, Monali a speech translation system using Google
Junghare, Vol 4, no 5, pp 1204–1208, Speech API and Microsoft Trans API,
Personalized Speech Translation using Google implemented on a Raspberry Pi, utilizes
Speech API and Microsoft Translation API, voice commands via a headset.
International Research Journal of Engineering
and Technology (IRJET), e-ISSN: 2395-0056,
Vol 07, No 05, p-ISSN: 2395-0072, May
2020 [16].
7 B. P. Mishra, Laxman Singh, Spoorti J. Jainar, Researchers employed an electro-acoustic
AQ3: and Nagaraja B. G. A Research of Noise system with active noise control (ANC) to
Please
provide Estimation and Removal Techniques for diminish surrounding noise using adaptive
source Speech Signal, ISSN: 2277-3878, Vol 8, No filtering in MATLAB 2015.
for all the 2S3, July 2019 [17].
tables
Source:
496 Innovations in Computational Intelligence: Trends and Technologies
Appl. Sci. 2022, 12, 9188. doi.org/10.3390/ [13] Rupayan Dirghangi, Koushik Pal, Sujoy
app12189188, September 2022. Dutta, Arindam Roy, Rahul Bera, Manosijo
[8] Sadil Chamishka, Ishara Madhavi, Rash- Ganguly, Dipankar Pariary, and Karan
mika Nawaratne, Damminda Alahakoon, Kumar, Language Translation Using Artifi-
Daswin De Silva, Naveen Chilamkurti, cial Intelligence, Ijraset Journal for Research
Vishaka Nanayakkara, A voice-based real- in Applied Science and Engineering Technol-
time emotion detection technique using ogy, doi.org/10.22214/ijraset.2022.46380,
recurrent neural network empowered feature 2022.
modeling. 1174: Futuristic Trends and Inno- [14] Aman Sharma and Vibhor Sharma, Lan-
vations in Multimedia Systems Using Big guage Translation Using Machine Learning,
Data, IoT and Cloud Technologies (FTIMS). Vol 03, No 06, e-ISSN: 2582-5208, June
Multimed Tools Appl 81, 35173–35194. 2021.
doi.org/10.1007/s11042-022-13363-4, June [15] Philipp Harzig, Moritz Einfalt, and Rainer
2022. Lienhart, Vol 4, No 5, pp. 1204–1208,
[9] Najeema Afrin, G. Aditi Sai, K. Gopi Krishna, Synchronized Audio-Visual Frames with
K. Rathan, Language Convertor Using Fractional Positional Encoding for Trans-
Python, International Research Journal of formers in Video-to-Text Translation, doi.
Modernization in Engineering Technology org/10.48550/arXiv.2112.14088: 2395–
and Science, Vol 04, No 06, June 2022. 0072, December 2021.
[10] Sonali Wangikar, Anjali Bobade, Nam- [16] Sagar Nimbalkar, Tekendra Baghele, Shaiful-
rata Pawar, and Akshay Dhanmani, Text lah Quraishi, Sayali Mahalle, and Monali
to Speech Conversion using Python, Inter- Junghare, Vol 4, No 5, pp. 1204–1208, Per-
national Journal of Advanced Research in sonalized Speech Translation using Google
Science, Communication and Technology Speech API and Microsoft Translation API,
(IJARSCT), ISSN (Online) 2581-9429, Vol International Research Journal of Engineer-
2, No 1, July 2022. ing and Technology (IRJET), e-ISSN: 2395-
[11] Abdul Afzal Pasha and M. D. Irshad Hus- 0056, Vol 07, No 05, p-ISSN: 2395-0072,
sain, Speech to Text Conversion Using May 2020.
Python, International Journal of Scientific [17] B. P. Mishra, Laxman Singh, Spoorti J. Jai-
Research in Engineering and Management, nar, and B. G. Nagaraja, A Research of
doi: 10.55041/IJSREM14934, June 2022. Noise Estimation and Removal Techniques
[12] Rajat Saini, Speech Recognition System, for Speech Signal, ISSN: 2277-3878, Vol 8,
International Research Journal of Moderni- No 2S3, July 2019.
zation in Engineering Technology and Sci-
ence, e-ISSN: 2582-5208, January 2022
70 Data analysis for revenue optimization
in the hospitality sector
Pankaj Kunekara, Parul Patleb, and Anagha Gajaralwarc
Department of Information Technology Vishwakarma Institute of Technology, Pune, India
Abstract: This paper overhauls revenue management and boosts guest experiences in hospitality. Power BI,
Power Query, and DAX analyze varied data sources like booking trends and seasonal patterns. Data cleaning
leads to a solid star schema data model. DAX creates crucial performance metrics. The data becomes an inter-
active dashboard via Power BI, empowering agile revenue strategies and guest experience improvements. This
highlights data’s key role in navigating the competitive hospitality world and fostering guest loyalty.
Keywords: Hospitality sector, revenue management, Power BI, data integration, visualizations, guest experiences
DOI: 10.1201/9781003606635-70
500 Innovations in Computational Intelligence: Trends and Technologies
managers to leverage BDA for enhanced busi- 3. Using DAX for insights: We use DAX,
ness value and performance. a language for data analysis, to create
This paper [8] discusses how big data ana- important benchmarks for revenue man-
lytics has transformed the sector. Showcases agement. This involves complex calcu-
real-world examples of how big data has lations and aggregations on the data,
benefited various aspects of the hospitality helping us spot trends and patterns cru-
industry. cial for decision-making.
This article [9] evaluates the literature 4. Visualizing data with Power BI: Next, we
regarding the adoption of artificial intelli- import the prepared data into Power BI, a
gence (AI) in the hospitality industry. Empha- strong tool for business analytics. Here, we
sizes potential risks of AI adoption, including turn the data into visuals like dashboards
job displacement and concerns about safety, and reports, making it easier to understand
security, and privacy. and act upon the revenue insights.
This study [10] presents a comprehensive 5. Dashboard creation: Finally, we design
survey on the application of Computational interactive dashboards and reports that
Intelligence (CI) in the Hotel and Travel showcase key indicators and trends in a
Industry. Provides guidelines and recommen- visually engaging way. The goal is to pro-
dations for future research directions and vide decision-makers with an easy-to-use
potential applications in the field. interface to make informed choices based
on the insights we’ve generated.
3. Methodology
1. Data collection: We collect vital infor- 4. Calculations
mation from diverse sources in the hos- We use DAX formulas for key performance
pitality sector—such as booking trends, metrics, employing Week-on-Week (WoW)
customer reviews, and seasonal pat- calculations like Revenue, Occupancy, ADR,
terns. This information is meticulously RevPAR, Realization, and DSRN percentages.
organized into Excel files, including five This ensures precise analysis and facilitates
crucial CSV files: dim_date (date-related strategic decision-making in the hospitality
details), dim_hotels (hotel specifics), sector.
dim_rooms (room types), fact_aggre-
gated_bookings (hotel booking stats),
and fact_bookings (customer-specific 5. Data model
booking info). These files form a com- The project employs a star schema data
prehensive dataset, allowing for detailed model, characterized by a central fact table
reports to enhance revenue management (“fact_bookings”and “fact_aggregated_
and guest experiences. bookings”) capturing key transactional
2. Data preparation and structure: After details. This table is surrounded by dimen-
gathering the data, we clean it thoroughly sional tables (“dim_dates”, “dim_rooms”,
using Power Query to fix errors and “dim_hotels”, and “dim_customers”) pro-
ensure high quality. Then, we build a solid viding context and facilitating exploration.
data model following industry standards, Relationships between tables are represented
creating tables for customer info, book- by lines, enabling efficient data retrieval. The
ings, and timeframes, while also tracking star schema’s structured design enhances
vital metrics like revenue and customer query performance and simplifies data analy-
satisfaction. sis for effective decision-making.
Data analysis for revenue optimization in the hospitality sector 501
AQ2:
Please
provide
source
for all the Figure 70.1. Data Model (Star Schema).
figures
Source:
AUTHOR'S SELF GENERATED
6. Results
Table 70.2. Insights from dashboard
Filtering Options
City Filter Dynamically filter data for Hyderabad, Mumbai, Delhi, and Bangalore. AQ3:
Please
Month Filter Focus on specific months: May, June, and July 2022. mention
Week Filter Narrow down data by selecting weeks from W19 to W31. table and
figure
Platform Filter Explore data based on booking platforms: Direct Offline, Direct Online, citations
Journey, LogTrip, MakeYourTrip, Others, Tripster. in the
main text.
Property Filter Analyze data specific to AtliQ properties: Bay, Blu, City, Exotica, Grands,
Palace, Seasons.
Room Class Filter Refine analysis by room classes: Elite, Standard, Presidential, Premium.
Visualization Enhancements
Week on Week % Track percentage changes with arrows: Green for increase, red for decrease,
Change yellow for no change.
Hover Tooltip Tooltip shows trends in revenue, RevPAR, occupancy, and realization based
Insights on weekdays and weekends, and ADR, DSRN shows trend based on week
number.
Detailed Report Reports display % changes in RevPAR, occupancy, ADR, and realization
based on weekends/weekdays, and a chart illustrating realization % and
ADR by booking platforms.
Revenue Breakdown Donut chart visually represents revenue percentages for luxury and business
hotels.
Trend Analysis Line chart depicts trends in occupancy %, ADR, and RevPAR.
Key Insights
Occupancy Constant changes suggest dynamic pricing strategies, especially on peak
and RevPAR days.
Fluctuations
ADR Consistency Consistent ADR implies potential for revenue optimization through dynamic
pricing differentials.
Opportunities for Recommend dynamic pricing for peak days and higher rates on weekdays
Revenue Increase and weekends for business and luxury hotels respectively.
Property by Key Categorizes properties based on cities, showcasing key metric changes and
Metrics Table totals for a comprehensive view.
Unfiltered Results from Key Performance Metrics
Note: These insights, inclusive of various performance metrics, provide a comprehensive
understanding of the dataset before applying specific filters or constraints.
Top Revenue Atliq Exotica Mumbai: Highest revenue at 117 million; Atliq Grands Delhi:
Lowest at 36 million.
City Occupancy Atliq Palace Delhi: Impressive 66.3%; Bangalore: Lowest at 44.3%.
Leaders
RevPAR Atliq Exotica Mumbai: Highest at 10,629; Atliq Exotica Hyderabad: Lowest
at 4,061.
Total Bookings Atliq Exotica Mumbai: Highest at 7,251; Atliq Grands Delhi: Least at 3,114.
(continued)
504 Innovations in Computational Intelligence: Trends and Technologies
[9] Limna, P. (2022). Artificial Intelligence (AI) future crisis: using DEA-based performance
in the hospitality industry: A review article. analysis to assess initial pandemic responses
International Journal of Computing Sciences in the Taiwanese hotel industry. Interna-
Research. Advance online publication. doi: tional Hospitality Review. ISSN: 2516-8142.
10.25147/ijcsr.2017.001.1.103. Open Access. Article publication date: 23
[10] Guerra-Montenegro, J., Sanchez-Medina, May 2023.
J., Laña, I., Sanchez-Rodriguez, D., Alonso- [13] Wang, X. L., Heo, C. Y., Schwartz, Z., Leg-
Gonzalez, I., and Del Ser, J. (2021). Com- ohérel, P., and Specklin, F. (2015). Revenue
putational Intelligence in the hospitality Management: Progress, Challenges, and
industry: A systematic literature review Research Prospects. Journal of Travel and
and a prospect of challenges. Applied Soft Tourism Marketing, 32(7), 797–811. https://
Computing, 102, 107082. https://doi. doi.org/10.1080/10548408.2015.1063798.
org/10.1016/j.asoc.2021.107082. [14] Peterlin, J., Meško, M., Dimovski, V., and
[11] Tong-On, Panithan, Siripipatthanakul, Supa- Roblek, V. (2021). Automated content
prawat and Phayaphrom, Bordin, The Imple- analysis: The review of the big data sys-
mentation of Business Intelligence Using temic discourse in tourism and hospitality.
Data Analytics and Its Effects Towards on Sustainable Development, 38(3), 377–385.
Performance in the Hotel Industry in Thai- https://doi.org/10.1002/sres.2790.
land (October 17, 2021). International Jour- [15] Remy, D. (2019). Data Analytics Dilemma at
nal of Behavioral Analytics, 1(2), No. 9, pp. Alpen Hotel. Journal of Information Tech-
1–16, September 2021, Available at SSRN: nology Teaching Cases. SAGE Publications.
https://ssrn.com/abstract=3944077.
[12] Huang, Y.-H. (John), Meyer, B., Connolly,
D., and Strader, T. (2023). Preparing for a
71 Technological solutions for E-waste
management and disposal
Aditya Pratap Singha and Akshat Chaturvedib
Computer Science and Engineering, Babu Banarasi Das Institute of Technology and Management,
Lucknow, India
Abstract: There is a rapidly growing push to combat e-waste a global dilemma having severe impacts on the
environment and human health. So, we are providing a solution to this using the MERN Stack: e-waste facil-
ity locator With this web application, users can search for e-waste facilities with criteria such as location and
e-waste type to recycle at a distance they are willing to travel. Developed at the Triple-I Lab, this locator will
help users easily recycle their e-waste and minimize the environmental impact of e-waste. This research is also
valuable for e-waste recycling centers, government authorities, and environmentalists. This e-waste facility
locator has to be optimized for such applications and will be a unique and original method in addressing the
problem of Disposal of e-waste can contribute significantly to reducing the environmental impact of e- waste
as a whole.
Keywords: e-waste, recycling, web application, location based services, sustainability, user-friendly, environ-
ment, human health
[email protected]; [email protected]
a
DOI: 10.1201/9781003606635-71
Technological solutions for E-waste management and disposal 507
• Efficiency: E-waste collection and disposal attention due to its potential to enhance trans-
can be made more efficient by optimizing parency, traceability, and security in e-waste
the routes of pickup vehicles. management systems.
• Transparency: Users can track the status
of their e-waste pickup and disposal. 2.1. Blockchain-based e-waste
• Security: E-waste data can be stored and management systems
transmitted securely using the MERN
stack. Several studies have explored the application
of blockchain technology in e-waste manage-
In addition to these benefits, web-based ment. In a study titled “A Blockchain-Based
e-waste facility locators and pickup schedul- IoT-Enabled System for E-waste Manage-
ers can also help to [5]: ment and Recycling,” researchers proposed a
system that utilizes blockchain to track the
1. Reduce the environmental impact of movement of e-waste from generation to dis-
e-waste: By making it easier for users to posal [4]. The system employs smart contracts
dispose of their e-waste properly, these to automate transactions and ensure compli-
applications can help to reduce the amount ance with regulations.
of e-waste that is landfilled or incinerated. Another study, “Blockchain-Based E-waste
2. Promote a circular economy: Web-based Management: A Framework for Secure and
e-waste facility locators and pickup Traceable E-waste Disposal,” presents a
schedulers can help to promote a circular framework for a blockchain-based e-waste
economy by making it easier for e-waste management system. The framework empha-
to be recycled and reused. sizes secure data storage, transparent trans-
3. Employment Generation: The e-waste actions, and auditable tracking of e-waste
management sector can provide employ- throughout the supply chain [4].
ment opportunities through the creation
and deployment of web-based facility 2.2. IoT-enabled e-waste
locators and web-based pickup schedulers.
management systems
In conclusion, this website-embedded The Internet of Things (IoT) has also emerged
e-waste facility locator-and-pickup scheduler as a promising technology for e-waste man-
is promising in terms of its ability to support agement. IoT devices can be deployed to
efficient and effective and sustainable man- monitor e-waste collection, transportation,
agement of e-waste [7]. and recycling processes, providing real-time
This paper reviews previous work on data and insights to improve efficiency and
smart e-waste management systems and pro- reduce environmental impact [8].
poses a web-based e-waste facility locator In a study titled “IoT-Enabled Smart Waste
and pickup scheduler using the MERN stack Management for Sustainable E-waste Recy-
as a solution for better e-waste management cling,” researchers developed an IoT-enabled
using a web based solution. system for monitoring and managing e-waste.
The system utilizes sensors to collect data on
e-waste volume, location, and composition,
2. Related Work enabling optimization of collection routes
E-waste management and disposal are essen- and recycling processes [5].
tial environmental concerns, and various Another study, “IoT-Based E-waste Man-
technological solutions have been developed agement System for Efficient E-waste Collec-
to address these challenges. Blockchain tech- tion and Recycling,” presents an IoT based
nology, in particular, has garnered significant system for e-waste management. The system
508 Innovations in Computational Intelligence: Trends and Technologies
utilizes RFID tags to identify and track e-waste ultimately contributing to environmental
items, providing realtime information to opti- protection efforts [10].
mize collection routes and reduce transporta- Taking inspiration from the proposed web
tion costs [7]. application for land protection, an e-waste
application could revolutionize how we man-
2.3. AI-powered e-waste management age our electronic waste [11]. Imagine a plat-
form where users can:
systems
Artificial intelligence (AI) is also being • Access educational resources: Learn about
explored for enhancing e-waste management the environmental impact of e-waste,
practices. AI algorithms can analyze large responsible disposal methods, and the
datasets of e-waste data to identify patterns, importance of recycling.
predict waste generation trends, and optimize • Locate e-waste facilities: Easily find
resource allocation [5]. nearby recycling centers and donation
In a study titled “AI-Powered E-waste points, eliminating geographical barriers
Management: Using Machine Learning to and encouraging proper disposal.
Enhance E-waste Recycling,” researchers • Connect with like-minded individuals:
developed an AI-based system for e-waste Share experiences, participate in e-waste
classification and sorting. The system uti- collection drives, and collaborate on com-
lizes machine learning algorithms to accu- munity-driven initiatives.
rately identify and categorize e-waste items, • Support the circular economy: Buy and
improving recycling efficiency and reducing sell refurbished electronics or products
contamination [7]. made from recycled materials, extend-
Another study, “AI-Driven E-waste Man- ing the lifespan of electronic devices and
agement for Predictive Maintenance and reducing the need for raw materials.
Resource Optimization,” presents an AI-
driven system for predictive maintenance By fostering a community-driven approach
of e-waste processing equipment and opti- and leveraging the power of social media, this
mization of resource utilization. The system e-waste application can achieve several key
analyzes historical data and sensor readings goals:
to predict equipment failures and optimize
waste processing schedules [2]. • Increased awareness: Inform users about
the urgency of e-waste management and
2.4. Web-based e-waste management inspire them to take action.
• Improved accessibility: Provide convenient
platforms
and accessible information about e-waste
This research investigates the potential of disposal options, regardless of location.
social media web applications in addressing • Enhanced engagement: Encourage user
life-on-land sustainability objectives. It pro- participation through interactive fea-
poses a web application that educates users tures, fostering a sense of community and
about land protection, helps resolve human- responsibility.
wildlife conflicts, and facilitates the sale of • Promoted sustainability: Support the circu-
eco-friendly products [9]. The MERN stack lar economy by encouraging reuse, repair,
was chosen for development, and testing and responsible recycling of e-waste.
results confirm the application’s function-
ality and browser compatibility. This user- This proposed social media approach
centric platform allows users to post ideas, offers a dynamic and engaging solution to
join projects, and sell eco-friendly products, the growing e-waste problem. By adapting
Technological solutions for E-waste management and disposal 509
the user-centric features and readily accessi- and in future add more features. MongoDB serve
ble platform like the land protection applica- for all E-Waste Collection Centers· Express.
tion, e-waste management can move beyond React executes the core UI components, makes
traditional methods and embrace the power changes when variables change-state and js
of digital communication to achieve environ- manages those server-side operations. js for
mental sustainability [12]. user interfaces and Node. js streams. Server-
side execution is also possible with node. js The
location lies on the Haversine formula, which
3. Methodology calculates the distances by users’ location and
collection centers. Google Maps API aids in
3.1. System development showing the collection centers on map which
methodology gives a rich user experience [15].
In this research project, the development
methodology employed is Feature Driven 3.4. Get user approximate location
Development (FDD), recognized for its effec-
To identify the user’s location, the Google
tiveness and adaptability in system devel-
Maps Geocoder class is employed to convert
opment. FDD offers iterative development,
user-entered addresses into coordinates. The
emphasizing industry best practices and
coordinates assist in marking the user’s loca-
ensuring a focus on quality throughout the
tion on the Google Map interface. Users are
project lifecycle. It involves five sequential
then presented with options to self-drop their
processes: developing an overall model, build-
e-waste or request a pick-up [16].
ing a feature list, planning by feature, design-
ing by feature, and building by feature. The
core of FDD lies in designing and building the 3.5. Self-drop off follow the direction
application incrementally based on identified sign in E
features, fostering an iterative process to meet
Creating directions for self-drop-offs is done
evolving requirements [13].
with the help of DirectService class from the
Google Maps API. If the user has GPS ena-
3.2. Methodology flow chart bled on their phone, these driving directions
The overall development workflow, utiliz- provide turn-by-turn instructions from their
ing the MERN stack (MongoDB, Express.js, current location to the selected e-waste col-
React.js, Node.js), is depicted in the method- lection center.
ology flow chart. The project begins with the
development of an e-waste collection center 3.6. One-click request pick up
locator, serving as the communication element
in the system. The subsequent steps involve One-click request pick-up: The function
locating the user’s approximate location, offer- requires user registration and records some key
ing options for self-drop or pick-up, suggesting information in the database. Users can option-
routes for self-drop-offs, and implementing a ally request a pick-up and enter information
one-click request pickup feature. The flow such as address, phone number and desired
chart provides a comprehensive overview of time. The data is then sent to the e-waste drop-
the system’s sequential processes [14]. off outlet chosen by the system via an email.
This MERN stack based end-end approach
is logical and procedural framework that serves
3.3. E-Waste collection center locator the ultimate purpose of envisioning and develop-
You can get the E-Waste Collection Center App ing an effective and long run e-waste manage-
(E-C3) pr/rrc_ui, also play with FirstMilestone ment solution for Indian e-win scenario [17].
510 Innovations in Computational Intelligence: Trends and Technologies
5, pp. 531–537, 2013, [Online]. Available: [13] P. Nguyen, “Applying HTTP Protocol of
http://www.environmentaljournal.org/3-5/ TCP communication layer to build login sys-
ujert-3-51.pdf tem by modern web technology,” no. Octo-
[4] A. U. R. Khan and R. W. Ahmad, “A ber, 2022.
[5] Blockchain Based IoT-Enabled E-Waste [14] B. Nguyen, “Improving web development
Tracking and Tracing System for Smart process of MERN stack,” Metrop. Univ. Appl.
Cities,” IEEE Access, vol. 10, no. August, Sci., no. May, p. 52, 2021 [Online]. Avail-
pp. 86256–86269, 2022, doi: 10.1109/ able: https://www.theseus.fi/bitstream/han-
ACCESS.2022.3198973. dle/10024/146232/thesis.pdf?sequence=1
[6] R. Kahhat, J. Kim, M. Xu, B. Allenby, [15] P. Baral, “Role-Based User Access Control in
E. Williams, and P. Zhang, “Exploring Mern Stack,” Bachelor Eng. Inf. Commun.
e-waste management systems in the United Technol., p. 55, 2020.
States,” Resour. Conserv. Recycl., vol. 52, [16] Samikshya Aryal, “Mern Stack With Mod-
no. 7, pp. 955–964, 2008, doi: 10.1016/j. ern Web Practices-Developers Connecting
resconrec.2008.03.002. Application,” 2020.
[7] T. Shevchenko, M. Saidani, Y. Danko, I. [17] “MdAlamin a social platform for software
Golysheva, J. Chovancová, and R. Vavrek, developers: using modern web stack mern,”
“Towards a smart Ewaste system utilizing no. December, 2022.
supply chain participants and interactive [18] M. Keinanen, “Creation of a web service
online maps,” Recycling, vol. 6, no. 1, pp. using the MERN stack,” Metrop. Univ.
1–14, 2021, doi: 10.3390/recycling6010008. Appl. Sci., no. August, 2018, [Online].
[8] M. Ikhlayel, “An integrated approach to Available: https://www.theseus.fi/bitstream/
establish ewaste management systems for handle/10024/153461/Markus_Keinanen.
developing countries,” J. Clean. Prod., vol. pdf?sequence=1
170, no. January, pp. 119–130, 2018, doi: [19] W. A. I. A. Wickramasinghe, K. M. P. M.
10.1016/j.jclepro.2017.09.137. [20] Karunarathna, V. O. V Rajapakse, and D. I.
[9] I. Technology and N. Delhi, “REST- De Silva, “Designing and Developing a Web
ful IoT Service Using the MERN Stack,” Application Using The MERN Stack to Sup-
vol. 3, no. 6, pp. 2609– 2616, 2021, doi: port Biodiversity Conservation and Sustain-
10.35629/5252-030626092616. able Use of Natural Resources,” pp. 1–23,
[10] M. Nguyen, “Minh Nguyen full-stack crud 2023.
application User management system Thesis [21] H. Tran, “Developing a social platform based
centria university of applied sciences Degree on MERN stack Title: Developing a social
Programme March 2023,” no. March, p. 42, platform based on MERN stack Number of
2023. Pages: 41 pages + 2 appendices,” no. March,
[11] M. Bawane, “A Review on Technologies 2021.
used in MERN stack,” Int. J. Res. Appl. Sci. [22] T. Atiemo, S., Faabeluon, L., Manhart, A.,
Eng. Technol., vol. 10, no. 1, pp. 479–488, Nyaaba, L., Schleicher, “Baseline assessment
2022, doi: 10.22214/ijraset.2022.39868. on e-waste management in Ghana,” no.
[12] S. Raju, S. Soundararajan, and V. Loga- June, pp. 7–12, 2016, [Online]. Available:
nathan, “MERN Stack Web Application,” http://sustainable-recycling.org/sustaina-
R.S.C.B, vol. 25, no. 6, pp. 6325–6332, ble-recycling/wpcontent/uploads/2016/07/
2021, [Online]. Available: http://annalso- Sampson_2016_SRI-Ghana.pdf
frscb.ro
72 Comparative study of various
transformation techniques in image
fusion
Kunal Kishor Jhaa, Sumit Kumar Jhab, Hari Om Shanker Mishrac,
Amit Dhawand, Manish Tiwarie
Electronics and Communication Engineering, Motilal Nehru National Institute of Technology,
Allahabad, Prayagraj, India
Abstract: The basic purpose of picture fusion is combining complimentary information from multiple pictures
into a single picture while maintaining the significant and necessary elements from each of the original picture.
The final picture is more suited for both human and machine perception and offers a more precise depiction
of scene than any of individual source pictures. Fusion at pixel level, one of three stages of picture fusion, is
typically used in practice due to preserving the original measured values. A transform-based approach is widely
used to do pixel level picture fusion; hence, the best picture fusion method to maximize productivity of the fused
picture is transform-based picture fusion. The most effective transform methodologies are Discrete Wavelet
Transforms (DWT), Discrete Cosine Transforms (DCT), and hybrid transforms (DWT with NSCT - Non-Sub -
Sampled Contourlet Transform). The merged picture of the deconstructed sub bands is produced using inverse
transforms. In this paper, the various transform techniques have been applied to perform the picture fusion
process. A relatively powerful transform technique, known as curvelet Transform, which is capable of multi-
resolution and multi-direction flexible breakdown and capture the essence of the picture for sub-sampled data,
has been also used for picture fusion. A detailed comparison of these transform techniques has been carried out
with respect to the following performance parameters: The Correlation coefficients, MSE (Mean Square Error)
and PSNR (Peak Signal to Noise Ratio), to evaluate the quality of a fused picture. Low MSE and PSNR ratio
are criterion of a high-quality fused picture. To analyze various transform techniques, fusions of two mode of
pictures, i.e., multimodel and multi-view, have been carried out and detailed comparison has been provided.
Keywords: Picture/image fusion, Discrete Wavelet Transform (DWT), Mean Square Error (MSE), Discrete Co-
sine Transform (DCT), Peak Signal to Noise Ratio (PSNR), Curvelet Transform
mnnit.ac.in
DOI: 10.1201/9781003606635-72
514 Innovations in Computational Intelligence: Trends and Technologies
The primary uses of picture fusion tech- Transform which is capable of multi-resolu-
nology are the multi-focus imaging system tion and multi-direction flexible breakdown
and the support system for medical diagno- and capture the essence of the picture for sub-
ses and offer fresh knowledge for medical sampled data and the performance is supe-
diagnosis and treatment. The picture fusion rior in the transform domain compared to
technique is employed for a variety of pur- the spatial domain method [12]. Owing to
poses, including segmentation and resolu- these powerful characteristics, the curvelet
tion enhancement [9–11]. The picture fusion transform has been used to fuse images and
technique can make use of the pixel, decision, compare the outcomes with other transform-
feature, and data levels of picture representa- based picture fusion methods. In this paper,
tion. A fused picture in which each pixel rec- picture fusion is performed by applying vari-
ognizes as a collection of pixels from many ous transform approaches. The obtained
source pictures can be produced by apply- fused pictures are analyzed and compared in
ing the pixel level picture fusion approach. the transform domain. It has been observed
The fused picture has the advantage over the that, among the available transform tech-
input picture in that it is more informational niques, the fused pictures resulting from
and contains original information. Even in applying the curvelet transform-based picture
cases where decision level-based fusion and fusion accomplish better compared to results
feature levelbased fusion are in opposition obtained using other transform domain tech-
to one another, picture fusion at pixel level niques. The structure of this document is as
is more useful and simpler to employ. Using follows: Transformation-based photo fusion
the picture fusion technique, the average of methods have been covered in Section II. Sec-
the source picture is calculated on a pixel-by- tions III and IV cover several picture fusion
pixel basis [6], [7], [8]. Spatial and transform techniques and performance metrics, respec-
domains can be used to categories the picture tively. The detailed simulation results and a
fusion process. Some fusion techniques that fit comparison of various picture fusion algo-
within the nature of the spatial domain are the rithms are provided in Section V. The conclu-
Brovey method, Intensity and Hue Saturation sion of the research work done in this paper
(IHS), Principal Component Analysis (PCA), is discussed in Section VI.
and high pass filtering-based approaches
[14], [24–26]. Spatial domain, however, will
result in a notable spatial distortion in the 2. Transform Based Picture Fusion
combined pictures. One way to overcome the Methods
spatial domain limitation is to combine trans- In this particular section, a discussion on dif-
form-based methods with pixel-level fusion. ferent transform-based picture fusion meth-
Examples of transform-based techniques are ods has been presented. Among the various
NSCT, Discrete Cosine Transforms (DCT) available transform techniques, this section
and Discrete Wavelet Transforms (DWT) examines the Non-Sub Sampled Counterlet
[1–5]. The literature review above leads to Transform (NSCT), Curvelet Transform, Dis-
the conclusion that picture fusion has been crete Wavelet Transform, and Discrete Cosine
accomplished using a variety of transform Transform.
techniques. Various transform methods per-
form differently for a required picture fusion
process. Every transform technique has cer- 2.1. DWT-based picture fusion
tain advantages and drawbacks in particular DWT is a mathematical process frequently uti-
applications. However, a relatively power- lized in digital image processing to find local
ful transform technique, known as curvelet features in the image [2]. A two-dimensional
Comparative study of various transformation techniques in image fusion 515
(2-D) picture, such as a 2-D grayscale pic- cosines [17]. Frequency of low block, fre-
ture, can be broken down into a variety of quency of middle block, and frequency of
frequency components known as sub bands high block are three frequencies that make-
using the wavelet transform. It contains two up DCT. Low- frequency block is in first
sub bands, a band of low-frequency, and a block. The information in second block is of
band of high-frequency, when it is applied moderate frequency, while that in the third
to columns [2]. Four sub bands are created block is of high- frequency. In the low- Fre-
when DWT is applied to rows: three sets of quency block, the information on approxi-
accurate coefficients and one set of approxi- mative coefficients can be seen [17], [18]. The
mation coefficients. Each of a deconstructed DCT-based picture fusion technique is vividly
picture’s horizontal, vertical, and diagonal, or illustrated by the schematic representation in
approximate, components are represented by Figure 72.2.
a detailed coefficient [3]. The output of the
low-low (L L), low-high (L H), high-low (H 2.3. Non-sub sampled counterlet
L), and high-high (H H) sub bands is matched transform (nsct)-based image
by four subpictures that include the estimated
and detailed coefficients. Low frequency fusion
decomposed sub band picture incorporates of A variation of the contourlet transform is the
observable components, as opposed to high NSCT. A realistic 2D sparse portrayal of sig-
frequency decomposed sub band picture, nals is provided by this transform, which has
which is composed of the image’s finer ele- several scales anddirections [17]. More effec-
ments, such as texture, lines, and edges [5], tively than other transformations, contour-
[6]. The sub band pictures will break down lets capture abrupt transitions like edges and
the frequency bands at the appropriate levels. geometrical shapes. In compressed sensing,
The schematic representation in Figure 72.1 a fusion method based on non-subsampled
provides a clear illustration of DWT-based contourlet transform (NSCT) was suggested
picture fusion technique. [18]. Technique employs NSCT to decompose
two or more original images. It then obtains
2.2. DCT-based image fusion the sparse matrix using the sparse representa-
tion of the NSCT coefficients and fuses the
The picture is divided into 8x8 blocks by sparse matrices using the absolute valuemaxi-
using DCT. The DCT is used to break down mum strategy.
an image’s spatial frequency into different
AQ1:
Please
provide
source
for all the Figure 72.1. DWT based image fusion. Figure 72.2. DCT based image fusion.
figures
and tables Source: Source:
AUTHOR'S SELF GENERATED
AUTHOR'S SELF GENERATED
516 Innovations in Computational Intelligence: Trends and Technologies
4.3. Correlation co-efficient
It identifies the structural similarities between
the input and the combined picture. More
information is preserved when the correla- a b
tion value is higher. The definition of the cor-
relation coefficient is:
SMi=i SNj=i (aij × bij)
CC = (3)
SMi=i SNj=i (aij)2
c d
where ‘a’ represents the variance between the
input picture and its average value overall,
and ‘b’ represents the variance between the
fused picture and its average value overall.
5. Simulation Results e f
The results of image fusion utilizing trans- Figure 72.6. (a) CT Picture, (b) MRI Picture,
form- based approaches are described in this (c) DCT based fusion, (d) DWT based fusion,
segment. Additionally, performance of vari- (e) NSCT based fusion, (f) Curvelet based fusion.
ous picture fusion methods is assessed based Source:
AUTHOR'S SELF GENERATED
on different performance measure parame-
ters. and the experimental findings are shown where the image in Figure 72.5(a) focus on
below. To carry on the above-mentioned left half face and image in Figure 72.5(b)
analysis, two separate examples are consid- focus on right half face of the object. After
ered (Figures 72.5–72.6). performing various transform techniques, e,
In Figure 72.5(a)–(b), two multi-focus g., DCT, DWT, NSCT and Curvelet trans-
input pictures of same object are considered form, the corresponding results in the form
of fused pictures are shown in Figure 72.5(c)–
(f), respectively. The Table 72.1 provides val-
ues of various performance measures, such as,
for PSNR, MSE, and Correlation Co-efficient
(CC) for the different applied transform tech-
a b niques on the multi-focus pictures shown in
Figure 72.5(a)–(b). Ideally, the PSNR and CC
should be higher and MSE should be lower the fusion rule controls how well the image
for a better-quality fused picture. From the is fused. Theclassic fusion approaches have
Table 72.1, it can be concluded that the bet- two significant drawbacks: picking the coef-
ter fused picture produced by the Curvelet ficients individually and selecting them using
transform has a higher PSNR value and less the same rule. Low and high frequency bands
MSE values. are treated independently by Discrete Wavelet
Similarly, another example of medi- Transforms and Discrete Cosine Transform-
cal image of CT and MRI is considered as based picture fusion method. Compared to
shown in Figure 72.6(a)–(b). The results in alternatives, the LDP and SF based fusion
the form of the fused pictures by applying technique performs better. Using the same
DCT, DWT, NSCT and Curvelet Transform, fusion method to choose low and high fre-
are subsequently shown in Figure 72.6(c)–(f). quency coefficients and decoding process to
Table 72.2 display the values for performance produce a higher-quality fused image. It has
parameters PSNR, MSE, and Correlation Co- been observed that DCT performed better for
efficient (CC). multi-model images and multi-focus images.
It can be observed that, by fusing the CT By referring to the detailed comparative anal-
and MRI images, DWT creates a merged ysis done in this paper, it can be concluded
image that better reveals the soft tissue and that the overall most effective transformation
bone tissue. The DCT-based picture fusion technique is curvelet transform.
technology produces distorted combined
images.
However, the Curvelet transform has been References
shown to be efficient and to deliver superior [1] Saranya, C., and Shoba, S. (2015). Compari-
information in fused images when compared son of Image Fusion Technique by Various
to DWT, DCT, NSCT. Transform based Methods. International
Journal of Engineering Research and Tech-
nology, 4(9).
5. Conclusion [2] Ellmauthaler, A., Pagliari, C. L., and Da
Silva, E. A. (2012). Multiscale image fusion
Various transform techniques have been uti- using the undecimated wavelet transform
lized to perform the picture fusion process with spectral factorization and nonorthogo-
for multi-focus and multi-model pictures. nal filter banks. IEEE Transactions on image
Among these transform techniques, the Cur- processing, 22(3), 1005–1017.
velet transform has been shown to be more [3] Li, S., and Yang, B. (2010). Hybrid multires-
effective in transform-based picture fusion olution method for multisensor multimodal
techniques. In wavelet-based approaches, image fusion. IEEE Sensors Journal, 10(9),
1519-1526.
Table 72.2. Performance metrics for transform- [4] Nunez, J., Otazu, X., Fors, O., Prades, A.,
based approaches’ multi-model images Pala, V., and Arbiol, R. (1999). Multires-
Transfonn MSE PSNR Correlation olution-based image fusion with additive
Used Co-efficient wavelet decomposition. IEEE Transactions
on Geoscience and Remote sensing, 37(3),
DCT 44.8977 16.877 0.8173
1204–1211.
DWT 87.6285 15.6686 0.8071 [5] Kumar, M., and Dass, S. (2009). A total var-
NSCT 87.7 16.9096 0.8105 iation-based algorithm for pixel-level image
fusion. IEEE Transactions on Image Pro-
Curvelet 50.51 16.9832 0.8296 cessing, 18(9), 2137–2143.
Transform [6] Starck, J. L., Fadili, J., and Murtagh, F. (2007).
Source: The undecimated wavelet decomposition
AUTHOR'S SELF GENERATED
Comparative study of various transformation techniques in image fusion 519
and its reconstruction. IEEE transactions on on circuits and systems for video technology,
image processing, 16(2), 297–309. 23(9), 1491–1501.
[7] Petrovic, V. S., and Xydeas, C. S. (2004). Gra- [17] Cao, L., Jin, L., Tao, H., Li, G., Zhuang, Z.,
dient-based multiresolution image fusion. and Zhang, Y. (2014). Multi-focus image
IEEE Transactions on Image processing, fusion based on spatial frequency in discrete
13(2), 228–237. cosine transform domain. IEEE signal pro-
[8] Li, S., and Yang, B. (2010). Hybrid multires- cessing letters, 22(2), 220–224.
olution method for multisensor multimodal [18] Zhou, J., Civco, D. L., and Silander, J. A.
image fusion. IEEE Sensors Journal, 10(9), (1998). A wavelet transform method to
1519–1526. merge Landsat TM and SPOT panchromatic
[9] Pajares, G., and De La Cruz, J. M. (2004). A data. International journal of remote sens-
wavelet-based image fusion tutorial. Pattern ing, 19(4), 743–757.
recognition, 37(9), 1855–1872. [19] Wald, L., Ranchin, T., and Mangolini, M.
[10] Nair, T. G., and Sharma, R. (2013, Febru- (1997). Fusion of satellite images of differ-
ary). Accurate merging of images for predic- ent spatial resolutions: Assessing the quality
tive analysis using combined image. In 2013 of resulting images. Photogrammetric engi-
International Conference on Signal Process- neering and remote sensing, 63(6), 691–699.
ing, Image Processing and Pattern Recogni- [20] Mallat, S. G. (1989). A theory for multires-
tion (pp. 169–173). IEEE. olution signal decomposition: the wave-
[11] Liu, S. S., Zhang, X. H., and Zheng, A. (2013, let representation. IEEE transactions on
March). Image fusion algorithm based on pattern analysis and machine intelligence,
wavelet sparse represented compressed sens- 11(7), 674–693.
ing. In Conference of the 2nd International [21] Zhu, R., Li, X., Zhang, X., and Wang, J.
Conference on Computer Science and Elec- (2021). HID: the hybrid image decomposi-
tronics Engineering (ICCSEE 2013) (pp. tion model for MRI and CT fusion. IEEE
1214–1217). Atlantis Press. Journal of Biomedical and Health Informat-
[12] Saranya, C., and Shoba, S. (2015). Compari- ics, 26(2), 727–739.
son of Image Fusion Technique by Various [22] Abdallatif, M. H., Eissa, H., and Benedress,
Transform based Methods. International L. G. (2022, May). Wavelet transform based
Journal of Engineering Research and Tech- image fusion for brain tumor detection. In
nology, 4(9). 2022 IEEE 2nd International Maghreb
[13] Lallier, E., and Farooq, M. (2000, July). A Meeting of the Conference on Sciences and
real time pixel-level based image fusion via Techniques of Automatic Control and Com-
adaptive weight averaging. In Proceedings of puter Engineering (MI-STA) (pp. 283–287).
the third international conference on infor- IEEE.
mation fusion (Vol. 2, pp. WEC3-3). IEEE. [23] Xi, W., Wang, X., and Wang, B. (2022, July).
[14] Liu, S. S., Zhang, X. H., and Zheng, A. (2013, An Image Fusion Method of Wavelet Trans-
March). Image fusion algorithm based on form and Principal Component Analysis
wavelet sparse represented compressed sens- Based on EIT. In 2022 4th International
ing. In Conference of the 2nd International Conference on intelligent control, Measure-
Conference on Computer Science and Elec- ment, and signal processing (ICMSP) (pp.
tronics Engineering (ICCSEE 2013) (pp. 905–909). IEEE.
1214–1217). Atlantis Press. [24] Noor, A., Gaffar, S., Hassan, M. T., Junaid,
[15] Saranya, C., and Shoba, S. (2015). Compari- M., Mir, A., and Kaur, A. (2020, November).
son of Image Fusion Technique by Various Hybrid image fusion method based on dis-
Transform based Methods. International crete wavelet transform (DWT), principal
Journal of Engineering Research and Tech- component analysis (PCA) and guided filter.
nology, 4(9). In 2020 First International Conference of
[16] Lee, I. H., and Choi, T. S. (2013). Accurate Smart Systems and Emerging Technologies
registration using adaptive block processing (SMARTTECH) (pp. 138–143). IEEE.
for multispectral images. IEEE transactions
520 Innovations in Computational Intelligence: Trends and Technologies
[25] Malhotra, R., Kaur, K., and Singh, P. (2021, Hybrid Network with a Transformer Mod-
July). Wavelet based image fusion tech- ule for Medical Image Fusion. IEEE Journal
niques: a comparison-based review. In 2021 of Biomedical and Health Informatics.
6th international conference on communica- [28] Aravinth, J. (2023, May). Alzheimer’s Dis-
tion and electronics systems (ICCES) (pp. ease Prediction by Spatio-Temporal Feature
1148–1152). IEEE. Fusion for MRI Data. In 2023 Third Inter-
[26] Nalwaya, P., Allapakam, V., Karuna, Y., and national Conference on Secure Cyber Com-
Saladi, S. (2023, April). CT-PET Based Image puting and Communication (ICSCCC) (pp.
Fusion Algorithm for Medical Applications. 580–585). IEEE.
In 2023 IEEE 12th International Confer- [29] Candes, E. J., and Donoho, D. L. (1999).
ence on Communication Systems and Net- Curvelets: A surprisingly effective nonadap-
work Technologies (CSNT) (pp. 391–397). tive representation for objects with edges
IEEE. (pp. 1–10). USA: Department of Statistics,
[27] Liu, Y., Zang, Y., Zhou, D., Cao, J., Nie, R., Stanford University.
Hou, R., ... and Mei, J. (2023). An Improved
73 Blockchain transaction processing:
challenges and resolutions
Kamal Kant1,a, Sarvesh Pandey2,b, and Udai Shanker1,c
1
Department of Computer Science and Engingeering; M. M. M. University of Technology,
Gorakhpur, India
2
Computer Science-MMV, Banaras Hindu University, Varanasi, India
Abstract: This paper delves into the transformative shift from traditional databases to blockchain technology
motivated by challenges such as tampering and central control inherent in databases. Traditional databases
(e.g., relational databases) are structured in rows and columns while blockchain is structured as a chain of
blocks secured through cryptographic primitives. Blockchain technology has paved the way for developing more
practical solutions with its features, which include decentralization, security, and immutability etc. We intro-
duce traditional databases and blockchain technology focusing on the shift towards the later. A emphasis is also
placed on the pivotal role of consensus, a notable divergence that renders blockchain unique. Furthermore, we
discuss key consensus algorithms, their challenges, and the opportunities they present.
DOI: 10.1201/9781003606635-73
522 Innovations in Computational Intelligence: Trends and Technologies
Table 73.1. Comparison of traditional and is faulty (no reply) or malicious (reply with the
blockchain wrong answer), the whole system collapses or
Domain Database Blockchain is going to be damaged. More problems have
Features domain domain not been rectified in the traditional database
High throughput yes To be until now; so, we are moving from the con-
carried out ventional database to blockchain technology.
In blockchain technology, it is the distributed
Scalability yes To be
carried out
electronic ledger whose exact copy is kept
to every single network node that is there.
Transactions Low High
It allows the platform to transition between
Decentralization Blockchain- yes two properties without using the third party,
inspired which means that it permanently eliminates
databases the third party. Blockchain has many more
Immutability preventing yes characteristics that separate it from the dif-
deletions ferent other ones.
and keeping
track of
updates 3. Consensus Algorithm
transferring digital New yes Classification
assets databases
AQ1: distributed Consensus algorithms are to make a final
Please
provide in the decision to achieve a consensus. First, there
source blockchain is the category of proof-based consensus
for all the manner algorithms, which necessitates that a node
tables
Source: compete with other nodes and demonstrate
AUTHOR'S SELF GENERATED a higher level of qualification to commit the
transactions. Proof of Work (PoW) (Naka-
concurrency control (Bernstein and Good- moto, Bitcoin: Review, 21260, 2008) (Mishra,
man, 1983) can support provenance queries Kushwaha, and Misra, 2010) (Buterin and
on historical data. Griffith, 2017), Proof of Stake (PoS) (Kiayias,
Decentralization is now possible with the Russell, and David, 2017) (Li, Andreina, and
introduction of new blockchain-style data- Bohli, 2017), Proof of Burn (PoB) (Kiayias,
bases which have a wide range of potential and Zindros, 2020) etc. belong to this cate-
applications for which it could be used. The gory of algorithms. Because the commitment
immutability of transactions or their resist- is decided by which committed result obtains
ance to tampering, is another outstanding the majority of votes, the other type of algo-
aspect of blockchain. Database systems can rithm is voting based. Paxos (Lamport, 2012)
achieve this tamper-resistance by imple- (Shi and Wen-Cheng, 2012), Raft (Biryukov,
menting measures that prevent database Alex, Khovratovich, and k, 2014), PBFT and
deletes and modifications (Dwyer, 2015) its variants (Kotla, Alvisi, Dahlin, Clement,
(Conti, Kumar, Lal, and Ruj, Fourth Quar- and Wong, 2009) (Konnov, Makarov, Pozdn-
ter 2018) (Berentsen and F.Schar, 2018) yakova, Safin, and Salagaev, February, 1999)
(Maurer, 2016). Table 73.1 shows the sum- (Bessani, Sousa, and Alchieri, 2014) (Aublin,
marized comparison of the database and Mokhtar, and Quéma, 2013) (Stellar, 2015,
blockchain domain. [Online]) (Yin, Malkhi, Reiter, Gueta, and
In the traditional database, there are many Abraham, 2018) etc. belong to this category.
problems or drawbacks. It is organized or The following algorithms are discussed in
managed by a single entity. If this single entity Table 73.2 based on their characteristics.
524 Innovations in Computational Intelligence: Trends and Technologies
solution for the honest miner. International systems. International Conference on Com-
Conference on Financial Cryptography and puter and Communication Technology
Data Security, Springer, Berlin, Heidelberg, (ICCCT), 503–509.
161–162. [26] Nakamoto, S. (2008). Bitcoin: A peer-to-
[14] Joshi, A. P., Han, M., and Wang, Y. (2018). peer electronic cash system. Decentralized
A survey on security and privacy issues of Business Review, 21260.
blockchain technology. Mathematical Foun- [27] Nakamoto, S. (n.d.). Bitcoin: A Peer-to-Peer Elec-
dations of Computing, 1(2), 121–147. tronic Cash System. Citeseer, 2008. [Online].
[15] Kant, K., Pandey, S., and Shanker, U. (2022, Available: http://bitcoin.org/bitcoin.pdf.
May). A Journey from Commit Process- [28] Pandey, S., and Shanker, U. (2018). CART:
ing in Distributed Databases to Consensus a real-time concurrency control protocol. in
in Blockchain. In 2022 IEEE 38th Inter- Proceedings of the 22nd International Data-
national Conference on Data Engineering base Engineering and Applications Sympo-
(ICDE). (pp. 3236–3240). IEEE. sium (IDEAS), 119–128.
[16] Karantias, K., Kiayias, A., and Zindros, D. [29] Pandey, S., and Shanker, U. (2022). STEP:
(2020). Proof-of-burn. International con- a concomitant protocol for real time appli-
ference on financial cryptography and data cations. Journal of Wirel. Pers. Commun.,
security, Springer, Cham. 122(4), 3795–3832.
[17] Kiayias, R. O., Russell, A., and David, B. [30] Shanker, U., Misra, M., and Sarje, A. K.
(2017). Ouroboros: A Provably Secure Proof- (2006). SWIFT—a new real time commit
of-Stake Blockchain Protocol. Advances in protocol. Journal of Distrib. Parallel Data-
Cryptology (CRYPTO2017), 357–388. bases, 20(1), 29–56.
[18] Konnov, A., Makarov, A., Pozdnyakova, M., [31] Shanker, U., Misra, M., and Sarje, A. K.
Safin, R., and Salagaev, A. (February, 1999). (2008). Distributed real time database sys-
Practical Byzantine Fault Tolerance. Proc. of tems: background and literature review.
the Third Symp. Oper. Syst. Des. Implemen- Journal of Distrib. parallel databases, 23(2),
tation, New Orleans, USA. 127–149.
[19] Kotla, R., Alvisi, L., Dahlin, M., Clement, A., [32] Shi, J. P., and Wen-Cheng. (2012). Research
and Wong, E. (2009). Zyzzyva: Speculative on consistency of distributed system based
Byzantine fault tolerance. ACM Trans. Com- on Paxos algorithm. International Confer-
put. Syst., 27(4). ence on Wavelet Active Media Technology
[20] Kung, H. T., and Robinson, J. T. (Jun. 1981). and Information Processing (ICWAMTIP,
On optimistic methods for concurrency con- 257–259.
trol. ACM Trans. Data. Syst., 6(2), 213–226. [33] Stellar, D. M. (2015, [Online]). The stellar
[21] Lamport, L. (2012). Paxos Made Simple. consensus protocol: A federated model for
Int. Conf. Wavelet Act. Media Technol. Inf. internet-level consensus. Available: https://
Process, 18–25. itnext.io/the-stellar-consensus-protocol-
[22] Li, G. K., Andreina, S., and Bohli, J. M. decentralization-explained-338b374d0d72.
(2017). Securing Proof-of-Stake Blockchain [34] Yin, M., Malkhi, D., Reiter, M. K., Gueta, G.
Protocols. Data Privacy Management, Cryp- G., and Abraham, I. (2018). HotStuff: BFT
tocurrencies and Blockchain Technology- Consensus in the Lens of Blockchain. Avail-
ESORICS 2017 International Workshops, able: http://arxiv.org/abs/1803.05069, 1-23.
DPM 2017 and CBT 2017, 297–315. [35] Zagar, L. M. (2018). Comparative analysis
[23] MangoDB, “Building enterprise-grade of blockchain consensus algorithms. 41st
blockchain databases with mon-godb,” International Convention on Information
White paper, Nov 2017. (n.d.). and Communication Technology, Elec-
[24] Maurer, F. K. (2016). A survey on approaches tronics and Microelectronics (MIPRO),
to anonymity in Bitcoin and other crypto- 1545–1550.
currencies. Informatik, 2145–2150. [36] Zheng, Z., Xie, S., Dai, H. N., Chen, X., and
[25] Mishra, S., Kushwaha, D. S., and Misra, A. Wang, H. (2018). Blockchain challenges and
K. (2010). An optimized scheduling algo- opportunities: A survey. International jour-
rithm for migrated jobs in trusted distributed nal of web and grid services, 14(4), 352–375.
74 Fake social media profile detection
using machine learning
Anurag Shuklaa, Shreya Chaurasiab, Tanushri Asthanac, Tej
Narayan Prajapatid, and Vivek Kushwahae
Computer Science and Engineering, Babu Banarasi Das Institute of Technology and Management
Lucknow, India
Abstract: The pervasive growth of social media platforms has brought about a surge in the creation of fake
profiles, posing significant challenges to online security, trust, and information integrity. With the exponential
rise of social media platforms, the prevalence of fake profiles has become a critical concern, leading to various
malicious activities and misinformation dissemination. The study encompasses a diverse range of approaches,
including machine learning algorithms, natural language processing, behavioral analysis, and network-based
methods. The review begins by outlining the motivations behind the creation of fake profiles, emphasizing the
potential harm they inflict on individuals, organizations, and the broader online community. Subsequently, it
delves into the various features and characteristics commonly exploited by researchers to distinguish between
authentic and deceptive profiles. These features encompass textual, visual, and behavioral attributes, revealing
the multidimensional nature of fake profile detection. This study focuses on the development and implementa-
tion of a robust fake social media profile detection system. Leveraging machine learning techniques, specifically
Convolution Neural Networks (CNN), the model is trained on a dataset comprising genuine and fake social
media profiles. Features including user names, gender classification, language usage, and profile statistics are
extracted and utilized to discern patterns indicative of fake profiles. The model’s performance is evaluated
through rigorous testing and validation, showcasing its efficacy in accurately identifying fake profiles. The
proposed detection system contributes to the ongoing efforts to mitigate the adverse impacts of fake profiles on
social media platforms, promoting a safer and more trustworthy online environment.
Keywords: Logistic regression, KNN, random forest, CNN, ML, neural network, fake accounts, fake social
media detection
[email protected]; [email protected]
d
DOI: 10.1201/9781003606635-74
528 Innovations in Computational Intelligence: Trends and Technologies
enable user interaction and communication. strategies. The term “prediction” is defined in
They are experiencing rapid growth, altering a research context as the output of an algo-
the dynamics of interpersonal communica- rithm for unknown variables based on histor-
tion. These digital communities unite people ical data, exemplified by predicting customer
with shared interests, fostering new friend- churn rates over 30 days [1].
ships. In today’s era, individuals’ social lives The prevalence of online identity theft and
are intertwined with online networks, funda- social media account fraud poses significant
mentally transforming societal norms. These challenges, leading to reputation damage and
platforms streamline the process of staying reduced user engagement. Machine learn-
updated and connecting with acquaintances. ing is emerging as a valuable tool for detect-
Moreover, they exert a considerable influ- ing and solving these problems by analyzing
ence on various domains like science, edu- user behavior, content patterns, and network
cation, grassroots movements, employment, structure. In addition to improving user
and commerce. Researchers extensively study experience, this technology also has broader
these internet-based networks to comprehend social implications, addressing issues such
their impact on individuals. Educators, for as misinformation, propaganda, and online
instance, now utilize these platforms to create fraud. Aware of the potential threat, efforts
conducive learning environments, share class are underway to develop detection systems
materials, assign tasks, and engage with stu- using machine learning, using techniques
dents, significantly enhancing the educational such as Support Vector Machines and deep
experience. neural networks. The focus is on distinguish-
However, despite their myriad advantages, ing between real and fraudulent accounts on
these social platforms carry inherent risks, online social networks, thereby contributing
particularly for unsuspecting users. Various to the overall integrity and trustworthiness of
cyber threats such as phishing, spoofing, and these platforms [2].
spam have proliferated. Instances of fraudu- The author used CNN, Random Forests,
lent profiles—individuals masquerading as and XG Boost in the project to detect fraudu-
others—engage in malicious activities that lent Twitter accounts based on available data.
disrupt social networks and pose a challenge Limitations include working on display data
not only to society but also to businesses. and a lack of real-time applications. The pro-
Fake accounts can be wielded as weapons posed improvements involve running CNNs
against companies, causing unforeseen havoc on numerical and categorical data, adding
and distress to the targeted organization. parameters, and building models in real-time.
Varying the importance of regions in the
model and exploring combined approaches
2. Literature Survey may yield better results. The future includes
In the presented paper, techniques are pro- adapting this model to other social media
posed to integrate Natural Language Pro- platforms such as LinkedIn, Snapchat,
cessing and Machine Learning Algorithms. WeChat, and QQ [3].
The focus is on detecting fake profiles from The study addresses the evolving nature of
social media sites, with Facebook data used fake accounts on Facebook and highlights the
for analysis. The dataset undergoes NLP need for effective detection methods. Focusing
pre-processing and machine learning algo- on user behavior and interactions in Southeast
rithms like SVM and Naive Bayes are used Asia, it describes the basic principles for iden-
to classify records. The paper highlights the tifying fake accounts. Using an artificial data-
improvement in fake profile detection accu- set created by Facebook’s privacy settings, it
racy through the application of these learning applies machine learning methods to identify
Fake social media profile detection using machine learning 529
the most effective classifiers. The conclusion strategies employed by creators of fake social
suggests that future research should explore media profiles. This involves identifying pat-
combined methods and additional param- terns in profile creation, content dissemina-
eters such as account ID, location data, and tion, and interaction behavior to develop a
device usage to improve detection methods. nuanced understanding of deceptive practices.
Finally, the study highlights the importance Data Collection and Labelling: Collect a
of developing detection techniques to combat diverse dataset of social media profiles, distin-
the ever-changing landscape fake accounts on guishing between genuine and fake accounts.
internet community platforms [4]. Develop comprehensive labeling criteria that
The results of the study are important for encompass various dimensions of deception,
business owners looking for Instagram influ- including profile information, posting behav-
encers to support their brands. Instagram’s ior, and engagement patterns.
multi-media sharing features make it a popu- Machine Learning Model Development:
lar platform for brand marketing. The study Employ advanced machine learning tech-
suggests improvements such as text analytics niques to train models capable of discerning
for captions and comments, image analytics between genuine and fake profiles. Utilize fea-
to detect spam, and affinity graph analysis tures such as linguistic cues, network analysis
to identify fake users within the same social and client behavior to enhance accuracy and
circles. Using logistic regression and a ran- dependability of detection system.
dom forest algorithm, the proposed method Behavioral Analysis: Investigate the tem-
achieves over 98% accuracy in classifying poral and behavioral aspects of social media
Instagram accounts as fake or real [5]. interactions to uncover anomalies that may
indicate deceptive practices. Develop algo-
rithms capable of identifying abnormal pat-
3. Proposed Work terns in posting frequency, content sharing,
In response to the escalating challenges posed and interaction dynamics.
by fake social media profiles, this research pro- Real-time Monitoring and Adaptation:
poses a comprehensive approach to enhance Implement a real-time monitoring system that
the detection and mitigation of deceptive continuously updates the detection models
accounts on popular online platforms. As the based on emerging trends and deceptive tac-
prevalence and sophistication of fake profiles tics. This adaptive approach ensures the sys-
continue to evolve, there is a pressing need tem remains effective against evolving threats
for innovative solutions that go beyond tradi- in the dynamic landscape of social media
tional methods. This proposed work aims to
contribute to the existing body of knowledge
by developing and implementing advanced 4. Methodology
techniques for the identification of fake social The approach for the work is described in the
media profiles. By leveraging state-of-the- following steps:
art technologies, including machine learning Code Organization and Modularity:
algorithms, neural networks, and behavioral Organize the code into functions or classes to
analysis, this research seeks to create a robust enhance modularity and readability. Separate
and adaptive framework capable of staying different tasks such as data pre- processing,
ahead of emerging deception tactics. model training, and prediction into distinct
The primary objectives of the proposed functions or methods.
work include: Visualization: Integrate a more interactive
Understanding Deceptive Patterns: Con- and dynamic visualization library like Plotly
duct an in-depth analysis of the evolving for a better user experience. Use interactive
530 Innovations in Computational Intelligence: Trends and Technologies
charts that allow users to explore and under- 5.1. Logistic regression
stand the prediction results in more detail.
Logistic regression (LR) is a sequential algo-
Validation: Create a resilient input valida-
rithm that establishes a connection between
tion system to verify that user-supplied data
response and predictor variables through a
adheres to the prescribed format and falls
logistic distribution. Mathematically, it mod-
within the acceptable range. Handle invalid
els the likelihood of specific events (as in
inputs gracefully and provide informative
Equation 1). By creating a sequential relation-
messages to the user.
ship between input and output, LR assesses
Error Handling: Add error handling for
the likelihood of belonging to a particu-
file operations, ensuring that file paths are
lar category within a dataset. It’s primarily
valid and that the required files exist. Handle
employed in modeling binary response data,
potential exceptions gracefully and provide
where the response denotes success or failure.
clear error messages.
This involves data points, weights, and class
Model Evaluation: Estimate the model on
labels of 1 and 0.
test dataset by employing metrics like accu-
racy, precision, recall, and F1 score. Provide P (c=+1|d, a) = 1/(1+exp(-c(aTd+b)))(1)
a summary of model performance and poten-
tial areas for improvement. Key Concepts that are used in Logistic
User Interface: If deploying as a web appli- regression include the following points:
cation, consider using a web framework (e.g.,
Flask or Django) for backend development. 1. Sigmoid Activation Function: Logistic
Enhance the user interface by providing clear Regression employs the sigmoid activation
instructions and informative messages during function to compress the output within
data input and result display. range 0 and 1 indicating the likelihood of
User Experience: Enhance the user being member of a special category.
experience by providing feedback during 2. Decision Boundary: It is a hyperplane that
longer-running processes and displaying user- separates the input space into areas cor-
friendly messages. Include informative labels responding to different classes.
and prompts to guide users through the input 3. Cost Function (Log Loss): The logis-
process. tic regression model is trained through
Security: Implement secure coding prac- minimization the log loss (cross- entropy)
tices, especially if deploying the script as a web between the predicted probabilities and
application. Include input validation to pro- the true labels.
tect against potential security vulnerabilities.
Model Persistence: Save the trained model 5.2. K-nearest neighbor (KNN)
to a file so that retraining is not required every
time the script is run. Check for the existence KNN is a supervised learning method utilized
of a pre-trained model during script execu- for pattern recognition and classification. In this
tion and load it if available. approach, the test dataset is compared to the
existing training dataset, with similarity meas-
ured via the Euclidean distance function. The
5. Algorithms primary goal is to determine class membership.
Algorithm selection is a crucial step in the The KNN classification process involves
process of developing a machine learning two key stages. First, it identifies the nearest
model, as the selection of algorithm can have neighbors to the test data. Second, it deter-
a considerable influence on performance and mines the classes by considering these neigh-
accuracy of model. boring data points.
Fake social media profile detection using machine learning 531
Here’s a breakdown of how the KNN clas- on feature thresholds until a specified
sifier works: stopping criteria is satisfied, resulting in
leaves that represent predictions.
1. Calculate the distances between attributes 3. Bootstrapping: Random Forest uses
in the testing and training datasets. bootstrapped samples (randomly sam-
2. Sort the training data based on these spa- pled with replacement) from the train-
tial metrics. ing data to train each decision tree.
3. Select the ‘k’ nearest neighbors, which Approximately one-third of the data
closely resemble the testing data. is not used for training each tree and
4. Assign the majority class of the training can be used for validation (OOB error
data to the testing data. estimation).
4. Feature Randomization: When construct-
In essence, KNN finds similar instances ing individual decision trees, only a subset
within the training set to make predictions of features is taken into account at each
about the class of the new data point based split, and this selection is done randomly.
on the classes of closest neighbors. Decorrelation the trees and ensures that
no single feature dominates the decision-
5.3. Random forest making process.
5. Voting (Classification) or Averaging
The Random Forest is a machine learning
(Regression): For each new instance, the
algorithm that constructs numerous deci-
ensemble of trees votes, and the class with
sion trees using a random subset of features.
the most votes is assigned. For regression
Training multiple models on random samples
tasks, the ensemble’s predictions are aver-
of the dataset ensures consistent and reliable
aged to obtain the final prediction.
prediction performance. The output from all
these individual decision trees is aggregated
to form the final prediction. 5.4. Convolutional neural networks
For example, in the scenario you men- (CNN)
tioned, if five friends predict you will like A CNN is an artificial neural network
Building R while only two friends predict designed to process, analyze grid-like data.
you won’t, the ultimate prediction would CNNs are commonly used in computer vision
be that you’ll like Building R because applications, such as image recognition. A
the majority vote typically prevails. This CNN consists of layers that perform the fol-
reflects how Random Forest combines the lowing operations:
decisions of multiple models to reach a final
prediction. 1. Pooling
Key Concepts: 2. Non-linear activation functions
3. Feature learning.
1. Ensemble Learning: Random Forest con-
structs numerous decision trees and con- It is especially useful for things like image
solidates their predictions. Each tree is recognition, and it has layers that do things
trained on a randomly selected subset of like convolution, pooling, and feature learn-
the training data, and they may utilize dif- ing. It usually uses a non-linear activation
ferent sets of features, introducing vari- function to do this. CNNs are popular in
ability among the trees. computer vision. A convolutional neural
2. Decision Trees: The decision tree is the network (CNN) is an artificial neural net-
base model of the Random Forest. Deci- work that is designed to process and analyze
sion trees split the data into subsets based grid-like data. CNNs are commonly used in
532 Innovations in Computational Intelligence: Trends and Technologies
Abstract: This paper is a survey of recent research on prompted large language models (LLMs) as chatbot mod-
ules for long open-domain conversation. The document covers the following topics:
• The motivation and challenges of using prompted LLMs for open-domain dialogue, such as avoiding fine-
tuning, increasing flexibility, and enhancing reasoning abilities.
• The methods and techniques for creating and using prompted LLMs, such as prompting, instruction-tuning,
chain-of-thought, and external memory.
• The applications and challenges of prompted LLMs in different domains, such as dialogue, question answer-
ing, summarization, and reasoning.
• The future directions and open problems for prompted LLMs, such as improving their generalization,
robustness, efficiency, and ethics.
This paper also presents a systematic literature review (SLR) on the applications of LLMs for open-domain
dialogue tasks, following a rigorous methodology that includes literature search, data collection, data synthesis,
critical analysis, and comparison. The document aims to provide a comprehensive overview of the state-of-the-
art and the potential of prompted LLMs, as well as to inspire new research directions and collaborations in
this emerging field
Keywords: Large language model, open-domain dialogue, chatbot, conversational agent, dialogue system, pre-
trained language model, and mining
models, which are advanced language learn- of large language models (LLM) for open
ing models that can perform many language dialogue projects. The specific research ques-
tasks with minimal maintenance. The survey tions are:
covers the following topics:
• RQ1: What are the main challenges and
• The definition and characteristics of aug- opportunities of using LLMs for open-
mented language models, and how they domain dialogue?
differ from conventional language models. • RQ2: How do LLMs compare with other
• The methods and techniques for creating methods for open-domain dialogue in terms
and using augmented language models, of performance, data efficiency, and safety?
such as prompting, instruction-tuning, • RQ3: What are the current best practices
chain-of-thought, and external memory. and future directions for developing and
• Applications and challenges of high-level evaluating LLM-based open-domain dia-
language models in various fields such as logue systems?
conversation, question-and-answer, gen-
eralization, and reasoning. 2.2. Literature search
• The future directions and open problems
We searched for relevant papers published
for augmented language models, such as
between 2020 and 2023 in the following
improving their generalization, robust-
databases: ACL Anthology, arXiv, Google
ness, efficiency, and ethics.
Scholar, and Semantic Scholar.
This research is designed to provide an
overview of the state-of-the-art technology 2.3. Inclusion and exclusion criteria
and potential of language development and We applied the following criteria to select the
to stimulate new research and collaboration papers for inclusion in the SLR:
in the emerging field. This review paper aims
to explore the current state of chatbots pow- • The paper must focus on the application
ered by LLMs and identify gaps in the exist- of LLMs for domain dialogue tasks,
ing literature. • The paper must provide sufficient details
on the LLM architecture, training method,
data source, evaluation metrics, and
2. Methodology
baselines.
• Time frame: The search was limited to
research papers published between 2020 We excluded the papers that:
and 2023.Main focus was on most recent
• Do not use LLMs or only use them as
ones.
auxiliary components, such as encoders,
• Types of sources: The research included
retrievers, or rankers.
reviews of journals, conferences, and
• Do not present original research or only
books.
provide theoretical analysis, survey, or
• Specific keywords or themes: The search
tutorial.
was focused on articles related to chat-
bots, natural language processing, large
language models, user support and mining. 2.4. Data collection
We extracted the following information from
2.1. Define Research Objectives each paper:
The main aim of this study is to conduct a • Paper title, authors, publication venue,
qualitative literature review (SLR) on the use and year.
536 Innovations in Computational Intelligence: Trends and Technologies
• LLM name, size, pre-training method, and while examining the key influences on their
data source. effectiveness, such as LLM size, pre-training
• Dialogue task, dataset, and domain. data, training approach, and evaluation crite-
• Training method, such as fine-tuning, ria. Additionally, we conducted a comparison
prompting, or in-context learning. between LLMs and other methods, including
• Evaluation metrics, such as perplexity, retrieval-based, generation-based, and hybrid
BLEU, F1, human ratings, etc. models, outlining their respective advantages
• Baselines and comparison results. and limitations.
• Main findings, contributions, and
limitations. 2.8. Emerging trends and future
developments
2.5. Data synthesis: framework
We identified the emerging trends and future
development developments of LLM-based open-domain
We synthesized the data collected from the dialogue systems. We discussed the recent
papers using a thematic analysis approach advances and challenges of LLMs, such as
(Braun and Clarke, 2006). We identified the instruction-tuning, modular prompting, long-
main themes and sub-themes that emerged term memory, and multi-modal dialogue. We
from the literature and organized them into also explored the potential applications and
a framework that captures the key aspects of impacts of LLMs for open-domain dialogue,
LLM-based open-domain dialogue systems. such as social bots, education, entertainment,
The framework consists of four dimen- and health.
sions: LLM architecture, training method,
evaluation method, and safety and ethics. 2.9. Conclusions and implications
Each dimension has several sub-dimensions
that reflect the different choices and challenges We concluded the SLR by summarizing the
of using LLMs for open-domain dialogue. main findings and contributions of the lit-
erature. We highlighted the benefits and
challenges of using LLMs for open-domain
2.6. Critical analysis: thematic dialogue and the best practices and direc-
categorization tions for developing and evaluating LLM-
We categorized the papers according to the based open-domain dialogue systems. We
framework and analyzed the trends and pat- also discussed the implications and limita-
terns of the literature. Then we summarized tions of LLMs for open-domain dialogue and
the main advantages and disadvantages of the ethical and social issues that need to be
each sub-dimension and discussed the trade- addressed.
offs and implications of different design deci- The paper by Jing Wei, Hyunhoon Jung,
sions. We also highlight the differences and Sungdong Kim, and Young-Ho Kim explores
limitations of the current study and offer sug- how design inspiration can guide a chatbot
gestions for future studies. to communicate and gather reliable informa-
tion. Through online research, the authors
evaluated the impact of responsive design
2.7. Integration and comparison
and interactive content on interactivity and
Our analysis involved incorporating and con- users’ understanding of chatbots. Chatbots
trasting various findings from multiple papers, cover 79% of the information needed dur-
considering various sub-dimensions and ing a conversation, and creating alerts and
datasets. Our report showcases the leading related topics impacts the conversation and
performance of LLMs for domain dialogue, data collection.
Prompted LLMs as chatbot modules for long open-domain conversation 537
• Techniques and techniques for creat- Blenderbot and GPT-3. The results of human
ing chatbot mods using LLM; for exam- analysis show that MPC is comparable and
ple, several step prompts, modifications, even preferred to well-tuned LLM in an open
thought chains, and external memories, as dialogue environment; This also makes it use-
well as the trade-offs and effects of high ful for creating chatbots.
design difference. The document on using LLM as a chat-
• The applications and evaluations of bot mode for long-term open discussion
chatbot modules with LLMs in differ- covers many topics and discussions, such as
ent domains and scenarios, such as chit- motivations and challenges of using LLM for
chat, knowledge-grounded conversation, chatbots, methods and techniques of using
persona-based conversation, and implicit LLM to create chatbot modules, implementa-
persona, and the factors that affect their tion and evaluation of Chatbot modules, etc.
performance, such as LLM size, pre-train- Comparison and connection of MSc, chatbot
ing data, training method, and evaluation modules with MSc and other methods in dif-
metric. ferent fields and situations, and future direc-
• The comparisons and combinations of tions and open issues of chatbot modules in
chatbot modules with LLMs and other MSc. Data show that inspirational LLM has
methods, such as retrieval-based, gener- the potential to produce effective communi-
ation-based, and hybrid models, and the cation agents without the need for fine-tuning
strengths and weaknesses of each method. and that MPC is a promising, long-term, and
• The future directions and open problems flexible method for success. However, there
for chatbot modules with LLMs, such as are still many challenges and opportunities to
improving their generalization, robust- improve the functionality, security, and ethics
ness, efficiency, and ethics, and the poten- of LL.M.’s chatbot modules and investigate
tial applications and impacts of chatbot their applications and impacts in different
modules with LLMs, such as social bots, places and cultures.
education, entertainment, and health. The strength of the current LLM portfo-
The literature suggests that prompted lio as a chatbot mode includes its focus on
LLMs have great potential for creating high- cutting-edge and rapidly evolving technol-
quality conversational agents without the ogy that has the potential to transform con-
need for fine-tuning, and that MPC is a prom- versational skills. This document provides
ising approach for achieving long-term con- an overview of the latest technologies and
sistency and flexibility. capabilities of the LL.M. and we support new
research and collaborations in this new field.
The document also highlights the advantages
4. Critical Analysis of supporting LL.M. It has advantages over
The document “Prompted LLMs as Chatbot other methods such as its simplicity, scal-
Modules for Long Open-domain Conversa- ability and adaptability to new projects and
tion” proposes a novel approach for creating activities. The paper also provides empirical
chatbot modules with pre-trained LLMs and evidence demonstrating the effectiveness and
prompt techniques, called Modular Prompted efficiency of LLM in a variety of situations
Chatbot (MPC). The document also presents and leaders (e.g., small talk, knowledge shar-
the experimental setup and results of evalu- ing, in-role discussion, and main role).
ating MPC on various metrics, such as sen- However, the existing literature on
sibleness, consistency, engagingness, and prompted LLMs as chatbot modules also has
preference, and compares MPC with fine- some weaknesses and limitations. One signifi-
tuned and vanilla LLM baselines, such as cant drawback is the lack of standardization
Prompted LLMs as chatbot modules for long open-domain conversation 539
and reproducibility of the experiments and on its context, purpose, and methodology,
evaluations, which makes it difficult to com- and to avoid overgeneralizing or extrapolat-
pare and replicate the results across differ- ing the findings to other contexts or domains.
ent studies. Another limitation is the lack In summary, existing literature shows
of diversity and representativeness of the that LLM has many advantages, disadvan-
datasets and scenarios used in the evalua- tages, gaps, inconsistencies, and conflicts as
tions, which may bias the results and limit a chatbot module for open-ended long-term
the generalization of the findings. Moreover, communication. This document provides a
the literature also lacks a comprehensive and comprehensive and supportive overview of
systematic analysis of the ethical and social the latest technologies and capabilities of the
implications of prompted LLMs, such as their LL.M. and we encourage new directions and
impact on privacy, security, bias, and trust, collaborations in these new projects.
and the need for transparency, accountability,
and explainability. 4.1. Challenges
The existing literature on prompted LLMs
as chatbot modules also has some gaps, The article “Requesting Prompt LLM as a
inconsistencies, and controversies. One gap is Chatbot Mode for Long Public Conversa-
the lack of research on the long-term effects tions” highlights some of the limitations and
and sustainability of prompted LLMs, such challenges of using Prompt LLM as a chatbot
as their ability to adapt to changing user pref- module. One of the main limitations is the
erences and expectations, and to learn from lack of design and reproducibility of experi-
feedback and interactions. Another gap is ments and evaluations; This makes it dif-
the lack of research on the cross-cultural and ficult to compare and replicate results from
multilingual aspects of prompted LLMs, such different studies. This is due to the diversity
as their ability to handle different languages, of the datasets, models, and metrics used in
dialects, and cultures, and to avoid stereo- the evaluations, as well as the lack of clear
types and prejudices. Moreover, the literature guidelines and benchmarks for evaluating
also has some inconsistencies and contro- the performance and quality of chatbots.
versies regarding the evaluation metrics and Another limitation is the lack of diversity
benchmarks used in the studies, such as the and representativeness of the datasets and
trade-offs between objective and subjective scenarios used in the evaluations, which may
metrics, and the need for more diverse and bias the results and limit the generalization
challenging datasets and scenarios. of the findings. This is because most of the
The quality and reliability of the studies datasets and scenarios are designed and col-
reviewed in the literature on prompted LLMs lected by researchers, and may not reflect
as chatbot modules vary depending on the the real-world complexity and variability of
methodology, design, and execution of the open-domain conversation.
experiments and evaluations. Some studies Another challenge of using prompted
have rigorous and transparent procedures for LLMs as chatbot modules is the difficulty
data collection, preprocessing, modeling, and of creating consistent and engaging chatbots
evaluation, and provide detailed descriptions that can handle various topics, styles, and con-
and analyses of the results and limitations. texts. Moreover, LLMs may suffer from the
Other studies have less rigorous and trans- problem of hallucination, which means gen-
parent procedures, and rely on anecdotal or erating responses that are factually incorrect
subjective evidence to support their claims. or misleading, or that do not match the user’s
Therefore, it is important to critically assess intent or expectation. This can lead to poor
the quality and reliability of each study based user experience and low trust in chatbots.
540 Innovations in Computational Intelligence: Trends and Technologies
The article reiterates the importance of language modeling with pathways. arXiv
this review and its implications for the AI preprint arXiv:2204.02311.
debate. It shows the results of the approach [5] Hyung Won Chung, Le Hou, Shayne Long-
to the design of open chatbot modules, as pre, Barret Zoph, Yi Tay, William Fedus,
well as the ability of pre-Masters students to Eric Li, Xuezhi Wang, Mostafa Dehghani,
Siddhartha Brahma, et al. 2022. Scaling
create learning content and chain of thought
instruction-finetuned language models.
reasoning. It also provides recommendations
arXiv preprint arXiv:2210.11416.
for policy, practice or further research, such [6] Ishita Dasgupta, Andrew K Lampinen,
as ensuring the security and ethics of chat- Stephanie CY Chan, Antonia Creswell,
bot interactions and best practices for MPC Dharshan Kumaran, James L McClelland,
development, and investigating the scalability and Felix Hill. 2022. Language models show
and generalizability of MPC. human-like content effects on reasoning.
arXiv e-prints, pages arXiv–2207
[7] Song Feng, Siva Sankalp Patel, Hui Wan,
AQ1:
Please
References and Sachindra Joshi. 2021. Multidoc2dial:
provide [1] A. Kumar, S. Singh, and S. Chakraborty, Modeling dialogues grounded in multiple
in-text
citation Prompted LLMs as Chatbot Modules documents. In Proceedings of the 2021 Con-
for all for Long Open-domain Conversation, in ference on Empirical Methods in Natural
references. Proceedings of the Association for Com- Language Processing, pages 6162–6176
putational Linguistics (ACL), 2023, pp. [8] Vladimir Karpukhin, Barlas Oguz, Sewon
1234–1245. Min, Patrick Lewis, Ledell Wu, Sergey Edu-
[2] Tom Brown, Benjamin Mann, Nick Ryder, nov, Danqi Chen, and Wen-tau Yih. 2020.
Melanie Subbiah, Jared D Kaplan, Prafulla Dense passage retrieval for opendomain
Dhariwal, Arvind Neelakantan, Pranav question answering. In Proceedings of the
Shyam, Girish Sastry, Amanda Askell, et al. 2020 Conference on Empirical Methods in
2020. Language models are few-shot learn- Natural Language Processing (EMNLP),
ers. Advances in neural information process- pages 6769–6781
ing systems, 33:1877–1901. [9] Omar Khattab, Keshav Santhanam, Xiang
[3] Yulong Chen, Yang Liu, Liang Chen, and Lisa Li, David Hall, Percy Liang, Christo-
Yue Zhang. 2021. Dialogsum: A real-life pher Potts, and Matei Zaharia. 2022. Dem-
scenario dialogue summarization dataset. In onstrate-searchpredict: Composing retrieval
Findings of the Association for Computa- and language models for knowledge-inten-
tional Linguistics: ACL-IJCNLP 2021, pages sive nlp. arXiv preprint arXiv:2212.14024.
5062–5074. [10] Tushar Khot, Harsh Trivedi, Matthew Fin-
[4] Aakanksha Chowdhery, Sharan Narang, layson, Yao Fu, Kyle Richardson, Peter
Jacob Devlin, Maarten Bosma, Gaurav Clark, and Ashish Sabharwal. 2022. Decom-
Mishra, Adam Roberts, Paul Barham, posed prompting: A modular approach
Hyung Won Chung, Charles Sutton, Sebas- for solving complex tasks. arXiv preprint
tian Gehrmann, et al. 2022. Palm: Scaling arXiv:2210.02.
76 Smart locking system using machine
learning technique
Sadhana Singh1,a, Jhanak Verma2,b, Aditya Gupta2,c, and Priyanka
Sharma1,d
1
Assistant Professor, Computer Science and Engineering (Artificial Intelligence), ABES Institute of
Technology, Ghaziabad, India
2
B.Tech.*, Computer Science and Engineering (Artificial Intelligence), ABES Institute of Technology,
Ghaziabad, India
Abstract: This research paper explores the integration of face and fingerprint recognition technologies in the
strategy and execution of a Smart Locking System, with a focus on enhancing security and user authentica-
tion. In an age where access control plays a pivotal role in ensuring the safety of both personal and commercial
spaces, the need for robust, user-friendly, and versatile solutions is paramount. Face recognition and fingerprint
recognition are two widely used biometric authentication methods known for their accuracy, uniqueness, and
non-intrusive nature. This paper investigates the benefits and challenges of incorporating both features within
a single smart locking system. In conclusion, this research paper underscores the significance of combining
face and fingerprint recognition for smart locking systems. By enhancing security and user authentication, this
multi-modal approach addresses the evolving needs of access control in a changing technological environment.
Keywords: Machine Learning, Artificial Intelligence, face recognition and fingerprint recognition
DOI: 10.1201/9781003606635-76
Smart locking system using machine learning technique 543
Database Comparison: The face template Image Capture: The process begins
is compared against a database of pre-existing with capturing an image of the individual’s
face templates. The system looks for a match fingerprint.
by comparing the extracted face template with Pre-Processing: The seized fingerprint image
the templates stored in a database. This data- may experience pre-processing to improve its
base may contain templates for known indi- worth and style it appropriate for examination.
viduals, allowing the system to identify them.
Matching and Verification: Matching
involves determining the degree of similar-
ity between the captured face and the stored
templates. The system assesses the similarity
between the newly captured face template and
those in the catalogue. If a match is originated,
it suggests that the separate has been formerly
recognized and is known to the system.
Decision and Action: Created on the iden-
tical consequences, the organization strate-
gies concerning the uniqueness of the specific
and takes suitable action.
Fingerprint recognition, also known as fin-
gerprint authentication or fingerprint biomet-
rics, is a widely used biometric technology for
identifying and verifying individuals based on Figure 76.3. Facial Recognition system working.
the unique patterns of ridges and valleys pre- Source: AUTHOR'S SELF GENERATED
sent on their fingertips.
Feature Extraction: The system extracts templates in the database. The goal is to
distinctive features from the fingerprint determine if there is a match.
image. The most common features used in Decision and Action: Founded on the iden-
fingerprint recognition are minutiae points, tical consequences, the organization chooses
which are the specific locations where ridge concerning the uniqueness of the distinct. If a
endings, bifurcations, and other ridge char- match is found and verified, the system takes
acteristics occur. The relative positions and the appropriate action.
orientation of these minutiae points are used
to create a unique fingerprint representation.
Database Comparison: The created finger- 4. Conclusion
print pattern is linked to a catalogue of ware- In the rapidly evolving landscape of secu-
housed patterns. This catalogue comprises rity and access control, the development of
patterns of recognized entities. the “Smart Locking System Using Face and
Matching and Verification: The system Fingerprint Recognition” represents a sig-
performs matching by comparing the tem- nificant milestone in the pursuit of enhanced
plate from the captured fingerprint with the security, convenience, and user privacy.
This project sought to address the limita-
tions of traditional lock and key systems
and conventional access control methods
by harnessing the power of biometric rec-
ognition technologies. Through meticulous
research, rigorous testing, and a commit-
ment to ethical data handling, this project
has culminated in the creation of a cutting-
edge access control solution that holds the
promise of transforming the way individuals
and organizations secure their spaces and
assets. The “Smart Locking System Using
Face and Fingerprint Recognition” project is
not merely a response to the immediate chal-
lenges of access control but a testament to
our commitment to innovation, security, and
Figure 76.6. Different types of fingerprint the well-being of individuals and society. By
postures.
redefining the way, we secure our spaces, this
Source: AUTHOR'S SELF GENERATED
project contributes to a safer, more conveni-
ent, and technologically advanced world,
setting a standard for the future of access
control. It underscores the importance of
adapting to changing times while upholding
the highest standards of security, conveni-
ence, and ethical responsibility.
Acknowledgement
We really thankful to God, our family mem-
Figure 76.7. Fingerprint matching. bers to making this possible.
Source:
AUTHOR'S SELF GENERATED
546 Innovations in Computational Intelligence: Trends and Technologies
Abstract: The mental health stigma persists in society and refrains people from speaking up about their psy-
chological issues. They conceal their feelings and display a cheerful demeanor in front of others, convinced that
nobody will offer a listening ear or provide support. These individuals go in isolation to recharge themselves
mentally. They cannot comprehend their struggles as most of their words are considered excuses and juvenile.
We extend aid to them by proposing a mental health application that aims to foster their psychological health
using CBT Chatbot and the option to find a psychotherapist near their location. The operator can share his or
her feelings and get the right assistance. The paper critically reviews existing frameworks that utilize smart-
phones for mental health treatment, highlighting the innovative approaches and novel methodologies employed
in the application. The Android application presents a promising avenue for effectively managing mental health
challenges faced by students and individuals globally and understanding the mental stigma in society.
Keywords: Smart education, proximity and biometrics, data analytics, alumni, global community
a
[email protected]; [email protected]; [email protected]; danushka040902@gmail.
com; [email protected]
DOI: 10.1201/9781003606635-77
548 Innovations in Computational Intelligence: Trends and Technologies
Hao Liu et al. [2022] introduced the results proved the feasibility of Moodivate as
research paper by stating the impact of well as MoodKit [2].
depression among college students. The study Nidhi Vahishtha et al. [2018] introduce
contrasts chatbot therapy with bibliotherapy. a novel Android application designed to
The objective includes the effectiveness of support the mental health development of
the therapy chatbot in treating people deal- students. The significance of mental disor-
ing with mental health issues as the chatbot is ders on students’ academic lives cannot be
affordable and available at any time. A group underestimated, given their potential nega-
of 83 students got themselves along with the tive impact. The paper explores the use of
chatbot therapy as well as bibliotherapy. The mobile apps in mental health treatment by
result stated that the individuals connected implementing personalized treatment, and
with the chatbot therapy showed a reduction the collection of crucial data from patients’
in their Generalized Anxiety Disorder [3]. daily lives to monitor their current mental
Prabod Rathnayaka et al. [2022] state and track their progress in managing
address the mental issues mostly faced by psychological healing [6].
the employed people. The need for mental Magee Joshua et al.’s [2018] review aims
healthcare services has escalated, particu- to support primary care professionals in eval-
larly in the call of the COVID-19 pandemic. uating and integrating mental health apps
These chatbots have been adapted for men- effectively. It outlines two prominent evalu-
tal healthcare, offering a scalable solution ation frameworks for these apps and con-
through cross-platform smartphone appli- ducts a systematic analysis covering various
cations. Current iterations of CBT chatbots areas typically encountered in primary care.
expand Cognitive Behavioral Therapy (CBT) Established frameworks offer guidance in
by employing predetermined conversational app selection, focusing on factors like privacy,
routes, yet their efficacy diminishes with fre- credibility, and user experience. Some men-
quent utilization [7]. tal health areas, such as PTSD, smoking, and
Naziat Choudhury et al. [2020] projected alcohol use, show more substantial scientific
the increasing rate of use of mobile phones evaluation in available apps [5].
and their uses in health care. The study tends Sinha Deb et al.’s [2018] study aimed to
to test multiple dimensions of the mobile men- explore the potential of mobile app-based
tal health applications that focus on healing interventions for severe mental illnesses
mental conditions like stress, post-traumatic (SMIs) to bridge the treatment gap and ease
disorder, sleep disorder, obsessive- compul- caregiver burden. This research focused on
sive disorder and substance use. The app also comprehending health technology usage,
suggests interactive activities to the users so identifying perceived needs, and gauging
that they remain active [1]. the acceptability of app-based interventions
Jennifer Dahne et al. [2019] proposed the among individuals with SMIs. Its goal was
study of the examination of the feasibility of to enhance illness management and alleviate
the mobile mental health application known caregiver burden [8].
as Moodivate. Out of fifty-two participants,
some were asked to use the Moodivate app,
others were to try a therapy-based mobile app 2. Methodology
known as MoodKit and others were treated The methodology of developing a Mental
as usual for eight weeks. The individuals who Health App involves a systematic and col-
use the mental health application had shown laborative approach, ensuring the integration
improvement in their mental health when of CBT principles, Natural Language Pro-
compared to the treatment as usual. The cessing (NLP), and user- friendly features. It
Mind Matters: Psychological analysis using CBT Chatbot 549
strengths, it is essential to critically assess both positive, negative, or neutral. Early symp-
its positive aspects and potential limitation. tom detection enables timely interven-
The incorporation of advanced technolo- tions, allowing individuals to seek help
gies such as NLP and sentiment analysis is a before their conditions worsen, leading
testament to the project’s innovation. These to more effective and proactive mental
features enhance the app’s ability to under- health support.
stand users’ emotions and deliver personal- 2. Expansion of Remote Counselling: Tele-
ized responses, fostering a sense of empathy therapy services refer to the delivery of
and connection. mental health support and therapy ses-
CBT chatbots provide instant access to sions through digital communication
mental health support, overcoming barriers channels. Users can connect themselves
like geographical distance and limited to the licensed mental health profession-
availability of therapists. Users can receive als from the comfort of their homes. The
help at any time, making mental health sense of comfort from home encourages
resources more accessible and convenient. openness and honesty during therapy ses-
Moreover, these chatbots offer immediate sions, fostering a strong therapeutic alli-
responses, providing users with timely assis- ance between the user and the mental
tance when they are in distress. health professional.
This instant support can be crucial during 3. Gamification Elements: Gamification, the
moments of crisis, offering reassurance and integration of game-like elements into
coping strategies promptly. The app’s geolo- non- game contexts, has been increasingly
cation feature, facilitating immediate connec- used in mental health apps to motivate
tions with nearby psychotherapists, is a pivotal their therapeutic journey. Users can set
strength. This real- time accessibility can pre- achievable goals related to their mental
vent crises and provide timely intervention, health, such as practicing relaxation tech-
potentially saving lives and improving overall niques daily or completing mindfulness
mental well-being. Solving concerns related exercises, enhancing their overall experi-
to data privacy, consent, and responsible data ence and motivation.
usage is necessary. Ensuring accurate inter- 4. Collaboration with Professionals: Col-
pretation of users’ emotions and intents by laborating with mental health profession-
AI- driven responses is challenging. Inaccurate als, researchers, and institutions plays a
interpretations could lead to inappropriate or pivotal role in ensuring comprehensive
insensitive responses, potentially causing dis- and effective healing for individual strug-
tress. Rigorous testing and continuous refine- gling with mental health issues. Mental
ment are necessary to minimize these risks. If health professionals bring clinical exper-
users have smartphones and stable internet tise, experience, and expertise in identify-
connections might exclude marginalized pop- ing and managing diverse mental health
ulations with limited access to technology. disorders through specialized diagnos-
tic techniques and tailored treatment
6. Recommendations for Future approaches. Researchers contribute by
conducting studies, analyzing data, and
Research discovering innovative therapeutic tech-
1. Increase of AI and Machine Learning: AI niques. Institutions provide a structured
algorithms, particularly those rooted in environment for learning and disseminat-
NLP, enable mental health apps to con- ing knowledge. Collaborative attempts
duct sentiment analysis effectively. AI- among mental health professionals and
driven models detect the words used but researchers drive inventive steps in mental
also the underlying sentiment, whether it’s health care.
552 Innovations in Computational Intelligence: Trends and Technologies
Application for Mental Health of the Stu- [8] Sinha Deb K., Tuli A., Sood M., Chadda
dents for Betterment. 2018;4(4). R., Verma R., Kumar S., Ganesh R., and
[7] Rathnayaka, P., Mills, N., Burnett, D., De Singh P. Is India ready for mental health
Silva, D., Alahakoon, D., and Gray, R. A apps (MHApps)? A quantitative-qualitative
Mental Health Chatbot with Cognitive exploration of caregivers’ perspective on
Skills for Personalized Behavioural Activa- smartphone-based solutions for manag-
tion and Remote Health Monitoring. Sen- ing severe mental illnesses in low resource
sors 2022;22:3653. settings. PLoS One. 2018 Sep 19; 13(9):
e0203353.
78 Optimizing patient outcomes through
integrated health analysis and
management strategies
Anurag Shuklaa, Sambhav Pathakb, Rahulc, Rishikant Yadavd, and
Raj Guptae
Computer Science and Engineering, Babu Banarasi Das Institute of Technology and Management,
Lucknow, India
Abstract: This study examines the changing field of health analysis and management, highlighting the need
for a thorough and integrated strategy to address the range of issues facing modern healthcare systems. Given
the fast improvements in technology, data analytics, and healthcare delivery, there is an urgent need for crea-
tive solutions to improve patient outcomes, optimize operations, and guarantee the sustainability of healthcare
practices. The study’s first part evaluates health analysis and management as it is today, emphasizing the short-
comings and inadequacies of the current system. In order to improve the precision and effectiveness of health
assessments, the study then presents a novel framework that combines artificial intelligence, sophisticated data
analytics, and personalized medicine. This framework not only addresses the diagnosis and treatment of dis-
eases but also places a significant emphasis on preventive strategies and proactive health management.
a
[email protected]; [email protected]; [email protected]; drishikyadav2607@gmail.
com; [email protected]
DOI: 10.1201/9781003606635-78
Optimizing patient outcomes through integrated health analysis and management strategies 555
2. This article presents a study on data anal- lifestyle that allows each individual have
ysis in Polish medical institutions, aiming a responsibility to your health your own
to fill a gap in understanding the use of happiness. Have been created. Addition-
big data analytics in healthcare. The study ally, CoCoNat created Virtual Appliances
analyzed data processing, analysis types, for Instruction, Details, Information and
and analytical maturity in 217 Polish Results (VITERIO®), a web-based health-
medical institutions, using a critical litera- care section that addresses these important
ture analysis and survey questionnaire. and sought-after needs. Changes in indi-
3. There are very few studies that show how vidual behaviors, attitudes, and beliefs are
data analysis is performed in medical set- difficult topics when it comes to lifestyle
tings, what kind of data medical institu- medicine and health education. perfect
tions use, and what kind of analysis they way. The ideal way to solve this problem
perform in which fields. The aim of this is to create a patient-centered, performance
article is to fill this gap by presenting the measurement-based program that includes
results of a study conducted in a Polish open records and blended learning. HCI
medical institution. The aim is to analyze and Analytics wellness can be used in every-
the possibilities of using big data analytics day life when combined with personalized
in healthcare, especially in the Polish con- web-based healthcare input and personal
text. The purpose of this article is, inter coaching [3].
alia, to find out what data is processed in
Polish healthcare institutions, what kind 1.3. Significance of the topic
of analysis is carried out in which areas,
and how they assess their analytical matu- The significance of this documentary is to
rity. To achieve this goal, a critical analy- explore the evolution of data collection in
sis of the literature was carried out and a healthcare, emphasizing the transition from
direct study based on a survey question- traditional record-keeping to contemporary
naire was carried out on a sample of 217 methods involving digital health records,
medical institutions in Poland [2]. wearable devices, and real-time health moni-
4. The aim of this study was to establish a toring systems. Let’s break it down:
key set of questions for a self-assessment
1. Illustration Learning in Clinical Hando-
program regarding specific risk indicators
ver and Auto-filling: The use of illustra-
and comprehensive health protective fac-
tion learning is highlighted as a rapidly
tors, and to develop and improve instru-
growing field, particularly in clinical
ments for individual feedback.
handover and auto-filling areas. The paper
5. Long-term preparation package of self-
introduces a distinctive model of feature
monitoring, self assessment, self-care
choice. The proposed model is designed
organization, notes, and open records for
to select customized term-based classifica-
healthcare providers and patients, as well
tion options. This customization is crucial
as team members and individual audits
for addressing the unique characteristics
Test the device on different markers for
of different terms and improving the accu-
individual training and logic assessment.
racy of classification. The application of
The Competence Center for Complemen-
CRFs, a statistical modeling methodology,
tary and Naturopathic Medicine (CoCo-
is introduced. Unlike traditional methods,
Nat) of the Munich School of Medicine.
CRFs automatically select the most rel-
(TUM) has created the concept of “Indi- evant options for a given term, enhancing
vidual Health Management” (IHM), a the efficiency and accuracy of the learning
machine [4].
Optimizing patient outcomes through integrated health analysis and management strategies 557
approach beyond traditional disease-centric less effective over time. The integration of
models. The inclusion of keywords such as advanced technologies in healthcare raises
“Integrated Health,” “Health Management,” regulatory and ethical challenges. The article
and “Preventive Strategies” reflects a deep should acknowledge and address these chal-
understanding of the evolving healthcare lenges to ensure the proposed framework
landscape. These keywords encapsulate the complies with healthcare regulations and eth-
essence of the proposed framework, provid- ical standards. Healthcare systems often face
ing a clear roadmap for the reader. The arti- resistance to change, especially concerning
cle successfully contextualizes its discussion the adoption of new technologies. The arti-
within the dynamic changes in healthcare sys- cle should consider strategies for overcom-
tems globally. It recognizes the paradigm shift ing resistance and promoting the successful
towards patient-centric care and data-driven implementation of the proposed framework.
approaches, grounding the proposed frame- The “Evolving Landscape of Health Analy-
work in the current healthcare landscape. sis and Management” article provides a valua-
The selection of the MERN Stack for system ble exploration of a comprehensive healthcare
development is well-justified, considering its framework. While it successfully identifies key
popularity, industry support, and the specific challenges and proposes an integrated solution,
advantages of React.js. The article provides a addressing the weaknesses and seizing oppor-
concise yet informative overview of the tech- tunities would enhance the article’s overall
nology stack. The overview effectively ties impact and applicability in the dynamic field
together various aspects of the article, creat- of healthcare. Expanding on these weaknesses
ing a cohesive narrative. It ensures that the with empirical evidence or case studies could
reader can easily follow the logical progres- further substantiate the arguments presented.
sion from the introduction to the methodol- It will offer a more comprehensive view of the
ogy, and finally to the thematic connections. alternative solutions for this.
The article, could benefit from an expanded
literature review, incorporating additional
studies or frameworks in health analysis and 5. Recommendations For Future
management. This would provide a more Research
comprehensive understanding of the current
state of the field and better position the pro- 5.1. Explore ethics in health data use
posed framework. To strengthen the proposed Future research ought to delve deeper into
framework, the article could explore the per- the ethical considerations surrounding fitness
spectives of various stakeholders, includ- data use in analysis and control. This consists
ing healthcare practitioners, administrators, of examining the privateness implications,
and patients. Understanding their needs and consent fashions, and frameworks for mak-
concerns would contribute to a more well- ing sure the accountable and moral managing
rounded solution. While the article discusses of touchy health data. expertise the ethical
trends in healthcare globally, further explora- landscape is vital for keeping public trust and
tion of how the proposed framework could be ensuring the accountable use of fitness infor-
adapted to different healthcare systems world- mation in decision-making.
wide would broaden its relevance and impact.
The field of healthcare technology is rap-
idly evolving. The proposed framework must 5.2. Investigating the impact of
anticipate and adapt to ongoing technologi- emerging technologies
cal changes to remain relevant. Failure to do Future research should examine the effects
so might render the framework obsolete or of emerging technologies, like blockchain,
560 Innovations in Computational Intelligence: Trends and Technologies
and management, our study highlights their [3] Beatrice E Bachmeier, Dieter Melchart, Axel
inseparable connection. Health analytics Eustachi, Stephan Gronwald, Erich Wühr,
acts as a compass, guiding decision-makers Kristina Wifling (2022), Patient Related
through the vast health data landscape, while Outcome Measures.
performance management acts as a naviga- [4] Andrea Ford and Giulia De Togni (2021)
Hormonal
tor, ensuring that this information translate
[5] Health: Period Tracking Apps, Wellness, and
into tangible improvements in patient care.
Self- Management in the Era of Surveillance
The synergy between the two appears to Capitalism, Engaging Science, Technology,
be not a simple collaboration but a symbi- and Society.
otic relationship necessary for the develop- [6] Shan Feng, Matti Mäntymäki, Amandeep
ment of the modern healthcare industry. In a Dhir, Hannu Salmela (2021) How self-track-
world increasingly defined by global health ing and the quantified self-promote health
challenges, the implications of our findings and well-being: systematic review, Journal
extend beyond individual health systems. of Medical Internet Research
The principles outlined in this study provide [7] Karthik S. Bhatt and Neha Kumar (2021)
a basis for developing frameworks that are Sociocultural dimensions of tracking health
adaptable to diverse cultural, economic, and and taking care, Association for Computing
health care contexts. The ubiquity of data- Machinery.
[8] Lisa M Vizer, Jordan Eschler, Bon Mi Koo,
driven knowledge and strategic management
James Ralston, Wanda Pratt, Sean Munson
practices positions our research as a potential
(2019) Constructing a conceptual model
catalyst for positive change on a global scale. of shared health informatics for tracking
inchronic illness management, Journal of
References Medical Internet Research.
[9] Maria Panagioti, Gerry Richardson, Nicola
[1] Srinath Venkatesan, Giovanny Haro-Sosa Small, Elizabeth Murray, Anne Rogers, Anne
(2023) Personified Health Care Transitions Kennedy, Stanton Newman and Peter Bower
with Automated Doctor Appointment Sys- (2020) Self-managementsupport interven-
tem: Logistics, Journal of Pharmaceutical tions to reduce health care utilization with-
Negative Results. out compromising outcomes: a systematic
[2] Andrzej Ślęzak, Kornelia Batko (2022) The review and meta- analysis, Bmc Health Ser-
use of Big Data Analyticsin healthcare, Jour- vices Research
nal of Big Data.
79 Data leakage detection
Neha Singha, Sandeep Kumar Mishrab, Rahul Kumarc, and Sandeep
Vishwakarmad
Department of Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management, Lucknow, Uttar Pradesh, India
Abstract: A data distributor shared sensitive data with an aggregate that claimed to be trusted representatives
(third parties). If this data is later found in the public or private sector, it becomes difficult for the distributor to
identify the culprit. Traditionally, watermarking was used to control data leaks, but it requires data transforma-
tion and can be defeated by others. Therefore, modern methods of data distribution are used to increase the
chances of identifying a guilty third party. In this work, we propose a model of guilt that refers to users who do
not modify the original data distribution channels. The responsible party for the leak is someone who partially
distributed the data. The idea is to distribute data intelligently and explicitly for representation based on sample
data queries and data requests to improve the chances of discovering the guilty agent. Implementing algorithms
with fake products can also increase the distributor’s chances of finding the guilty party. It is worth noting that
reducing the sum value can increase the chances of identifying the guilty party. We present a framework for
generating fake objects.
a
[email protected]; [email protected]; crahulk873684 @gmail.com; darcsandeep1985@
gmail.com
DOI: 10.1201/9781003606635-79
Data leakage detection 563
• The goal is to estimate the probability of sensitive statistics cannot be modified, and
leakage from the agent compared to other the agent guilt version that captures leak-
sources. age scenarios and appropriate models that
• Not only do we need to estimate the prob- can discover fake tuples cannot be changed.
ability of the agent leaking information, Finally, the system is not an internet seize of
but we also need to find out if one of them leak situations in present structures, which
is a leaker with a lot of overlap. are more focused on information allocation
• Information distribution strategies can problems. The main aim of this application is
help distributors provide “clear” informa- to create an Android utility that can find a list
tion to employees. of eating places based totally on the vicinity
• Add structures to detect criminals and and cuisine input from the consumer. Users
specify four scenarios in the application no longer most effectively find all of the res-
file to solve this problem. taurants within the metropolis; however, they
• Forgery is permitted depending on the can pick out the first-class eating places based
type of information requested. totally on their rankings and the cuisine they
need. The consumer can map the area of
the eating place on Google Maps, locate the
2. Existing System direction from his present-day vicinity to the
Watermarking is a method used to confirm eating place from the telephone, call at once
information leakage in existing structures, to the eating place, and reap the exact opin-
wherein a unique programming code is added ions of the eating places he has selected [5].
to each printed file. If the reproduction is seen
by an unauthorized individual, the leaker can 2.1. Drawbacks of existing system
be diagnosed. Watermarks are useful in some
instances, but they may additionally require If the person receiving the information is not
adjustments to the original. They can also be good, the watermark will be affected by the
affected if the character receiving the facts agency. In other words, users can easily remove
isn’t always nice. For instance, a health facil- watermarks from their files by using various
ity might also share affected person records software that can easily remove watermarks.
with researchers, or an organization might There is no way to notify suppliers when
also enter into a partnership that requires information is leaked. There are some agency
sharing purchaser information. problems in current systems that are similar to
Another employer might also outsource previously known worker problems.
its information processing and have to send
statistics to several other groups. We call 2.2. Future work in existing system
information owners distributors and alleg- Future projects include analyzing agent’s
edly depend on 1/3 of event agents. In many crime modeling and collecting data leaks.
instances, distributors need to work with For example, what would be an appropri-
untrustworthy sellers, and vendors cannot be ate model for an agent to associate and
sure that leaking objects come from market- detect fraud reports? Another open issue is to
ers or other resources because positive infor- expand our distribution system so that online
mation can’t recognize watermarks. There are applications can be mediated.
a few problems with the prevailing machine,
which include constant retailers, and the
prevailing device can be in comparison with 3. Proposed System
sellers with previous request records. Fur- Our goal is to identify perpetrators of leak-
thermore, by adding fake gadgets, the unique ing sensitive information about suppliers
564 Innovations in Computational Intelligence: Trends and Technologies
and, if possible, to identify the agency that situation, leaked facts no longer protect the
leaked the information. Perturbation is a use- organization in opposition to the company.
ful technique in which information is altered This uncontrollable record leak causes losses
and desensitized before being sent to the to the commercial enterprise. For example, a
agent. We propose the development of a non- worker obtained information from outside
invasive method to detect leaks in a group of the employer, so we created a second version
products. to assess the enterprise’s “crime. Standard
In this case, we aim to develop a model for mistakes are used to boost the chance those
evaluating the agent’s fault. We also propose different human beings may be incorrect.
algorithms for distributing goods to employ- The modules of the current system are as
ees regarding the detection of leakers. Finally, follows:
we are still considering the option of adding 1. Data allocation module:
arte facts to the distribution. These do not • Our project focuses on data alloca-
correspond to real places; they appear real to tion. Problems are that distributors
the agent. In a way, the fake serves as a sort can give “intelligently” data to agents
of watermark for the entire collection with- to improve the likelihood of detection
out changing a single member. If the agent of criminals.
is discovered to have received one or more 2. Fake Object Module:
counterfeit items, the shipper may believe the • The distributor generates a false object
agent is guilty. to increase the probability of finding
The following factors need to be taken the source of the data leak. The use of
into consideration at some stage in the plan- fake objects is inspired by the use of
ning process. “tracking” records on mailing lists.
3. Optimization Module:
1. Use a secure module so no person can
• The optimization module is the distrib-
smash it like existing structures.
utor’s data. The allocation of agents
2. Apply this method to present watermark-
has a limitation and an objective.
ing systems.
4. Data Distributor Module:
3. Use the anti-aliasing module.
• A Data Distributor distributes its data
at the request of the agent.
4. System Architecture
System Architecture of Block Diagram
In any business enterprise, data leakage is a
completely serious problem. The proprietor
of the organization sends touchy statistics
to employees, but in most cases, employ-
ees lose the data. The facts leakage become
observed in unauthorized places, including
the comparator business enterprise’s net, the AQ2:
PC of the comparator business enterprise’s Please
provide
employees, and the PC proprietor of the com- NOTE in-text
ADDED
parator. It is observed by the owner or, once citation
for figure
in a while, not located. Leakage informa- 1.
tion may also consist of source code or lay-
AQ3:
out specifications, fee lists, highbrow assets Please
and copyright records, change secrets and Figure 79.1. System architecture block diagram. provide
source for
techniques, forecasts, and budgets. In this Source:
the figure
AUTHOR'S SELF GENERATED
Data leakage detection 565
Problem Setup and Notation: identity of the leaker, but only with the
A trader has a set of key data T = {t1 … agent who received the leaked content
tm}. The dealer desires to proportion a few material.
products with U1, U2 ... Agencies, however,
do not want to sell them to 0.33 parties. The
object T can be of shape and length, i.e. It can 6. System Working
be a tuple of facts or a couple of relationships. 1. Data Allocation Module
The UI agent gets a widget decided by way of The main goal of our project is to solve
the request version or the express request. the information distribution problem.
How can distributors intelligently provide
1. Explicit request
information to agents to increase their
2. Sample request
chances of catching criminals? Adminis-
trators can submit information to verify
5. Data Allocation Strategies users’ identities, users can submit account
details, etc. can update. The moderator
The distribution proposed in this section
checks the important details of the email.
solves the scalar version exactly or approxi-
Increase the time it takes for employees to
mately. In this project, we implemented and
check for information leakage.
analyzed a crime model that uses a distrib-
2. Fake Object Module
uted strategy to detect agents without chang-
The distributor creates a fake product and
ing the original data. Criminals leaked some
adds it to the distributor’s facts. Counter-
of the export data. The idea is to intelligently
feits are merchandise created by senders to
distribute information to agents. We describe
increase the chance of the submitted facts
practical techniques for solving scalar ver-
being detected by detection personnel.
sions of approximate equations exactly or
Suppliers can add counterfeit products to
approximately. In cases where solving the
the evidence to increase their performance
optimization problem does not work, we use
in detecting fraudulent employees. Our
approximate solutions.
use of counterfeit merchandise is because
1. Explicit data request of the tracking statistics on mailing lists.
Advertisers are not allowed to use coun- If you enter the incorrect key to download
terfeit material in their advertising materi- the file, you’ll open a reproduction report
als unless a special request for counterfeit and get the incorrect email content mate-
material permits. Therefore, with the help rial. For instance, the content material of
of the lawyer’s request for information, the product might be displayed.
the state of the truth is fully disclosed. 3. Optimization Module
Once there is a valid request for informa- The optimization module is the distribu-
tion and a valid request, the advertiser tion of data from dealers to groups within
cannot suspend or modify the intermedi- a restriction and reason. Agencies meet
ary’s request. the supplier’s demand by providing the
2. Sample data request handiest gadgets they need, and all goods
From the model of the proposed record, are to meet the requirements. Its reason
each agent can obtain T from one of the is to discover intermediaries who leak a
extraordinary subsets. That’s why there number of their facts. Users can lock and
are special sections. At every deployment, unlock documents securely.
the supplier can update and manage prod- 4. Data Distributor
uct T due to locating the violator. This is The records issuer presents touchy records
because the blame does not lie with the to trusted employees (third parties). Some
566 Innovations in Computational Intelligence: Trends and Technologies
of these files are leaked and located in motive, it isn’t simply stated in requests for
unauthorized locations, including the the exchange of products. The distributor is
Internet or a person’s PC. Sellers have to forced” to distribute a given object to more
evaluate the possibility of information than one marketer’s handiest while the quan-
leakage from one or more dealers, no tity of objects requested exceeds the wide
longer relying on statistics accumulated variety of objects in set T. The larger the total
by the vendor via different approaches. product profile requested by the business
Administrators can view leaked facts and enterprise, the higher the average number
information about fraudulent customers. of customers of that product, the more mer-
chandise is shared among specific companies,
and the more difficult it is to become aware
7. Algorithm of the wrongdoer.
Analysis of Requested Information: Algorithm: Allocation for Sample Data
The most important purpose of these Requests (SF)
assessments is to decide whether the presence Input: m1; ...; mn, [T]. Assuming mi¡= [T]
of incorrect facts in the distribution of infor- Output: T1; ...; T n
mation impacts our search for criminals. Sec- Steps
ond, we need to evaluate the high-quality set 1. Suppliers offer people devices so that, in
of rules associated with the mistake feature. the event of a product leak, the culprit can
Note: The distributor has a set of key be without difficulty identified.
information: T = [t1...tn]. Items on the T can 2. False facts are injected into unlawful files
be any shape and size; that is, they can be so that criminals may be investigated.
tuples in one or more relations in the data- 3. These fake products are designed in this
base. The distributor wants to share some of sort of way that employees cannot distin-
its products with U1... and Un, but we do not guish them from the originals.
want to leak the product to other third-party 4. You can keep separate documents for
distributors to create a fake process. F = [F1... counterfeit products or create them as
Fn] Ob. preferred.
Algorithm: Define Allocation Request
Information (EF) Input: T1,..., Tn, cond1,...,
London, b1,..., bn, 8. Expected Result
Output B: T1... F1... Fn We applied the partitioning set of rules in
Steps Python and evaluated its overall performance
1. Enter all fake facts for a series of unau- with the aid of simulating the information
thorized objects. leakage trouble.
2. And all false positives identical 0. The take-a-look should produce the out-
3. Choose the agent that will provide the fin- comes of the assessment:
est development in the ordinary purpose. In our case, we receive 500 objects and
4. Create false data. take delivery of requests from all organiza-
5. Add false information to the consultant, tions. Since we don’t forget to agree with val-
and also upload false facts. ues, there’s no limit on the range of agencies.
6. Reduce information mistakes with the aid Here’s how our system works:
of handling records mistakes.
1. The controller ought to be specific or
Evaluation of Sample data request: implicit.
In the request form, the representative isn’t 2. Leaked information takes place as unau-
always interested in a particular item. For this thorized entry into the system.
Data leakage detection 567
3. Find the listing of all retailers that have whether or not a breach of information dis-
the same tuple as the leaked tuple and tribution is detrimental to the way we stum-
calculate the proximity of the computer ble on criminals.
virus. Second, we need to assess the software opti-
4. Shows that overlap with leaked facts can mality algorithm primarily based on random
reduce the hazard of finding perpetrators. projects. We focus on the case where many
gadgets are shared among a couple of sell-
In our case, we are trying to deliver a suit- ers. These are the best laughs because sharing
able display screen to the consumer to keep things makes it harder to identify the culprit.
away from errors. This article tries to locate Scenes with more dispensed gadgets or fewer
the perpetrator and decrease the publicity of proxies for shared items are less complicated
a criminal report. to manipulate. Situations requiring the distri-
bution of large quantities of products and a
huge range of requests from medium-degree
9. Analysis
companies are similar to the conditions we’ve
Below are the metrics we use to assess our studied previously, in that we will educate
algorithms. We provide an assessment of the them about the distribution of many small
model and ask for clarification. To improve organizations.
this problem, we suggest an algorithm that
is near the authentic optimization prob-
lem. We examine the algorithm against the 10. Advantage and Application
unique hassle. This no longer most effec-
tively evaluates the effectiveness of the set 10.1. Advantages
of rules but additionally the effectiveness of • The use of the perturbation data tech-
the approach. Information-sharing strategies nology makes the agent less sensitive to
boost the distributor’s possibilities of detect- handling.
ing fact leaks. It turns out that the choice to • Realistic but false objects are injected
distribute the product may have an impact into distributed data sets to identify the
on detecting the fault, specifically when the culprits.
size of the product the employer gets is huge. • If representatives get an equal result, the
In some cases, “authentic but fake” infor- first selection in the first round will rely
mation files are injected to discover the leak on showing fault.
and become aware of the culprits. Our future • Maintenance and SLA for all services
work consists of extending this work to take
Easy entry to new software
into account online domain names and dis-
tribution strategies that permit them to gov-
ern fraudulent information using encryption 10.2. Application
techniques. However, most of the time, we • Provides data confidentiality and identi-
ought to work with organizations that might fies the guilty agent in the event of infor-
not be 100% reliable, and we won’t be able mation leakage.
to decide whether the product is leaking from • We present a problem associated with
the brand or another supplier. Despite these information beginning.
troubles, we determined that it is viable to • Our work in particular pertains to water-
assess the occurrence of organization leaks marking, which is used to establish the
and see different items because they overlap ownership of the unique distributed item.
with different corporation profiles. Primarily, • Our method and watermarking are com-
the purpose of these exams is to determine parable in the sense that they provide
568 Innovations in Computational Intelligence: Trends and Technologies
Abstract: Lip reading may be the strategy that changes our dialog by decoding lip improvement. Visual vision-
based lip control frameworks utilize as input a video (without sound) of somebody saying a word or facial
expression. At this point, either state what they are saying or anticipate a euphemism. In this study, a novel
vision-based lip-reading framework combining convolutional neural networks (CNNs) and long short-term
memory (LSTM) recurrent neural networks is presented. An evaluation dataset comprising numerous speak-
ers’ well-articulated speech is used to assess the suggested framework. We utilize a pre-trained CNN to extri- AQ1:
cate highlights from pre-processed video outlines. This step trains the LSTM to keep in mind the plan. The Please
SoftMax layer in our framework enables lip-reading. To evaluate the effectiveness of our approach, we con- provide the
expan-
ducted experiments using two pre-trained models: VGG19 and ResNet50. Compare execution. We moreover
sion for
apply an equipment learning technique to extend the precision of the structure. By combining ResNet50 and VGG and
equipment preparation, our system accomplishes an exactness of 80%. ResNet50.
Keywords: Convolutional neural network, recurrent neural network, long short-term memory, mechanism of
attention, lip-reading automation, and deep learning
a
[email protected]; [email protected]; [email protected]; dabhi6699dubey@
gmail.com
DOI: 10.1201/9781003606635-80
570 Innovations in Computational Intelligence: Trends and Technologies
phase’s implementation for prediction are the suggested automatic lip-reading recogni-
called hidden Markov models (HMM) and tion system are included. Keyframes from the
support vector machines [1]. The point vec- example video are extracted as the first step.
tor’s size and the number of duplications can ROI is determined by locating significant spots
both be quite big, yet this has no bearing on in the lip or mouth region using keyframes.
data loss. Because the entire visual power is With the returned ROI, a sequence of frames
focused on this transfigure, redundancy is is computationally processed. The VGG19
eliminated advancements and noteworthy and ResNet50 networks are used to extract
breakthroughs in deep learning and com- significant characteristics from the original
puter vision learning, find out more about mouth image. The first step is preprocessing
the features that can be extracted with this the input videotape, which includes mouth
course. No intervention is required. long placement and keyframe birth. An alterna-
short-term memory (LSTM) was introduced tive is a shadowing-grounded LSTM network
many times ago. Numerous human speech that learns from continuous input mostly via
styles have also been developed since then; VHS savages. Final test results are provided
these include language models for speech rec- by SoftMax level.
ognition and LSTM-based bidirectional aural
models. Oscar Kohler et al. [4] presented a
convolutional neural network (CNN)-LSTM 2. Methodology
network training for task recognition that The proposed method integrates CNNs with
can categorize over 1000 orders consisting long short-term memory (LSTM) recurrent
of tasks, conduct, and semantics. CNNs are neural networks (RNNs) for sequential pat-
good at feting and recycling movements, but tern recognition and visual feature extrac-
the movement seems to play an important tion. Figure 80.1 displays the lip reader’s
part in these tasks, and counting solely on the block diagram.
HMM to capture changes isn’t enough. To A silent video is fed into the system to start
facilitate the training of the entire network, a it working. The film then goes through the pre-
deep CNN is combined with an LSTM layer. quels, which is an important step in turning it
LSTM can handle big datasets for efficient into a film of special interest. After that, CNN
training. Unlike many models, like HMM, is utilized to extract features from vector-
nonlinearity can be modeled independently representation keyframes. Furthermore, the
of Markov theory [4]. physical properties of the body are extracted
Three phases make up the automatic lip- from vectors using LSTM-based tracking. For
reading concept. The first technique involves
taking the most important elements from
the sample video and using those elements
to identify the word-of-mouth or word-of-
mouth keyword and ROI. Consecutive rows
are included in this ROI. Raw mouth image
features were retrieved using ResNet50 and
VGG19 network. The first step is to remove
keyframes and mouth parts before the video
begins. In the second stage, important infor-
mation is extracted from continuous input
using a tracking-based LSTM network with
AQ2:
video primitives. The last classification stage, Figure 80.1. Block layout for the lip-reader Please
the SoftMax layer, yields the anticipated lip- system [1]. provide
source for
reading outcomes. The three main steps of Source:
AUTHOR'S SELF GENERATED the figure
Vision-based lip-reading system using deep learning 571
voice prediction, a layer is added after LSTM. problem. The predictive model locates land-
The following sections describe the steps you marks or points of interest in the image given
need to take to complete. an input (often an ROI representing an object
of interest). This approach searches the con-
2.1. Preprocessing of input video text of facial landmarks for significant facial
features for facial recognition.
Video feedback should be provided first, as
shown in Figure 80.1. Follow the steps to obtain
the frames needed to perform the subtraction. 2.4. Location of the lip and mouth
The intro is a video of a human face saying area
some words. Every frame of the video must be The image’s lip-representation points are
viewed in order to extract some valuable infor- used as a guide to crop the lip region after
mation from video technology. Extracting the the facial region has been recognized. The
video’s frames is the first task, then. top four lip locations (49, 55, 52, and 58) are
At 30 frames per second, most videos are considered for lip transplantation. The usual
recorded. Finding the link between the poles 224 x 224 size is applied to each keyframe,
and extracting features are crucial steps in and it is chopped based on the lip position.
building the model. The context of a word Ten photos of clipped lips for every movie are
determines the length of each syllable and the result of the previous phase.
how it should be pronounced. Many ques-
tions may arise regarding the movement of 2.5. Establishing CNN and LSTM
the lips when pronouncing certain words.
Therefore, unnecessary materials should be The spatial feature blocks of the CNN archi-
removed from all raw materials. Finding the tectures, ResNet50 and VGG19, are fed the
ideal balance between exercise intensity and cropped pictures. For every input, VGG19 and
pace will also be made easier with this. Thus, ResNet50 offer a distinct spatial set (feature
the frames are processed by deleting only vector). The design of ResNet50 is displayed
some highlights and lips, rather than using all in Figure 80.2 prior to network training.
the frames of the video sequence. The clipped photos are used as CNN’s
input for spatial point blocks. Every input is
given a distinct spatial set (point vector) by
2.2. Extraction of keyframes
VGG19 and ResNet50. The ResNet50 pre-
Divide time or all video or speech frames trained network’s architecture is shown in Fig-
into 10 equal parts and select one frame at ure 80.2. Preprocessed 224 × 224 lip images
a time as the keyframe. To ensure a consist- are given into the VGG19 and ResNet50 net-
ent input length, the video is divided into ten works as input. VGG19 architecture is utilized
keyframes. For instance, divide a movie of up till the first caste for unique concluding
40 frames into ten equal segments. Ten parts, objectives. Up to FC1000 layers are also used
each with four frames, then. Additionally, the by ResNet50. For every frame in the movie,
full movie is now turned into a sequence of both architectures provide a unique plate.
10 frames after one frame is randomly chosen ResNet50 and VGG19 have point vector sizes
for each classification. of 2048 and 4096, respectively. Additionally,
the vector set is supplied as input to the con-
2.3. Detection of facial landmarks trolled system’s time frame in Figure 80.1
in accordance with LSTM. Data-learning
The location of the face was determined by RNNs, such as LSTM, are unique. This paper
processing keyframes that were taken from is lengthy and ongoing. An LSTM with a fas-
the video. One way to think of face localiza- tening algorithm enables the model to focus
tion as a separate component of the prediction
572 Innovations in Computational Intelligence: Trends and Technologies
End-to-end training: End-to-end training well on real data. - The variability of the
allows whole lip reading to be combined with world.[9]
training, which can ameliorate the overall • Material dependency: Deep learning algo-
performance of the body.[5] rithms for image identification frequently
need a lot of recorded data to train, which
can be challenging for some languages
4. Critical Analysis or domains. Limited data prevents the
Image-based lip-reading machines using deep development of effective and widely used
learning have received widespread attention methods for lip reading.[6]
for their applications in many areas such as • Competing on runtime alone: Lip reading
HCI, security, and technology using technol- can be difficult to master, which restricts
ogy. These machines are designed to recognize the applications where these technologies
spoken words by analyzing the movements can be used in high-stakes scenarios where
and shapes of the lips. response times are minimal. Optimiz-
ing the structure for on-the-fly execution
4.1. Strengths without compromising accuracy remains
a challenge.[10]
• Increased accuracy: Deep learning algo-
rithms, especially CNN and RNN, have
shown impressive efficacy in lip reading 5. Recommendations for Future
when compared to traditional methods. Research
The capacity of deep learning models to
extract hierarchical characteristics from 5.1. Lip reading
unprocessed data is responsible for the
Research methods to improve lip reading that
notable increase in accuracy.[6]
can be extended to languages. This involves
• End-to-end learning: With end-to-end learn-
understanding and adapting to changes in
ing, the model matches the lip entry image
speech patterns and lip movements of differ-
directly to a word prediction, making it eas-
ent languages.
ier to label the entire system and eliminating
the need for intermediate feature extraction.
This training is promising in capturing the 5.2. Resistance to environmental
physical effects of the lips.[7] conditions
• Multimodal integration: The integration Lip reading systems can withstand differ-
of auditory and visual information has ent lighting conditions, background noise,
been explored to provide additional con- etc. Look for environmental features that
text and increase the power of lip reading. increase its resistance to This may include
Combining lip features with audio fea- data enhancement strategies, adaptive trans-
tures can improve performance, especially fer processes, or multimodal data integration.
in noisy environments.[8]
systems to hostile attacks. Develop methods memory. Appl Sci. 2019;9:1599. https://doi. the text in
sequential
to increase the robustness of these systems org/10.3390/app9081599
order
[2] Scanlon P, Reilly R, de Chazal P. Visual fea-
against carefully designed prototypes while
ture analysis for automatic speech reading.
maintaining the fidelity of natural materials.
In: International Conference on Audio-Vis-
ual Speech Processing; September 2003.
5.7. Continuing education [3] Priyanka P. Kapkar and S. D. Bharkad, “Lip
Feature Extraction and Movement Recog-
Discover continuing education that allows
nition Methods”, International Journal of
lip-reading patterns to adapt over time to Scientific and Technology Research, vol.8,
new speakers, discourses, or environments August 2019.
without causing any harm and without being [4] Koller O, Zargaran S, Ney H. Re-Sign: re-
forgotten. This is especially important for sys- aligned end-to-end sequence modeling with
tems used in dynamic and changing scenarios. deep recurrent CNN HMM. In: Human
Language Technology and Pattern Recogni-
tion Group RWTH Aachen University, Ger-
6. Conclusion many; 2017
The suggested method combines CNN and [5] Etay T, et al. Vision-based lip read-
LSTM for vision-based lip reading. Videos ing: a practical review. arXiv preprint
featuring a speaker who just says one word arXiv:2104.11699. 2021.
[6] Chung JS, et al. Lip reading sentences in the
(without sound) can use this approach. The
wild. In: CVPR. 2017.
film has placed the lips and mouth regions as
[7] Wand M, et al. Lip reading with long short-
well as important frames precisely for the first term memory. In: ECCV. 2016V.
time. While learning sequence data is done [8] Afouras T, et al. Deep audio-visual speech
using LSTM, feature extraction is done with recognition. IEEE Trans Pattern Anal Mach
CNN. VGG19 and ResNet50 are the two Intell. 2018;1-10.
pre-training CNNs that are employed. Two [9] Petridis S, et al. End-to-end multimodal
fully linked layers are used to approach the speech recognition using attention. In:
final output, and then the SoftMax layer. The ICASSP. 2018.
experiment’s resources were videos showing [10] Shillingford B, et al. Large scale visual speech
how to pronounce a word (number). The recognition. In: ECCV. 2018.
81 Reform dentistry: A web-based platform
for revolutionizing dentistry
Vineet Agrawala, Nikita Vermab, Aman Yadavc, and Khyati Mauryad
Computer Science and Engineering Babu Banarasi Das Institute of Technology and Management,
Lucknow, India
Abstract: The landscape of dentistry is undergoing transformative changes, driven by the imperative for reform.
This literature review critically examines key themes in dental reform, focusing on policy changes, technological
advancements, patient-centered care, and public health initiatives within the field. The methodology employed
a systematic approach, selecting recent literature (2013-2023) from diverse sources, including peer-reviewed
journals and reports from reputable dental associations. Thematic analysis reveals challenges in the current
dental system, policy reforms promoting preventive care, technological innovations like digital imaging and AI
integration, the shift toward patient-centered care, and collaborative public health initiatives. The review incor-
porates prominent theories such as the Social Determinants of Health and the Biopsychosocial Model. Major
findings emphasize the impact of socioeconomic factors on oral health, the importance of preventive care, and
debates surrounding technological integration. By elucidating these aspects, this literature review contributes to
a comprehensive understanding of the ongoing reforms in dentistry and sets the stage for future research and
policy development.
Keywords: Reform dentistry, dental care, patient care, treatment planning, diagnosis, dentistry, artificial
intelligence
a
[email protected]; [email protected]; [email protected]; dkhyatimaurya0510@
gmail.com
DOI: 10.1201/9781003606635-81
576 Innovations in Computational Intelligence: Trends and Technologies
The commitment to data analytics forms critical analysis must scrutinize the potential
another crucial theme, providing a lens into challenges, such as ensuring the platform’s
user behavior and preferences. Through the ability to maintain the same standard of care
systematic analysis of data, the platform remotely and addressing concerns related to
gains insights into usage patterns, enabling data security and patient privacy during vir-
informed decision-making for continuous tual consultations.
improvement and tailoring services to meet The reliance on data analytics is another
evolving user needs. commendable aspect, offering the oppor-
The iterative development approach tunity to glean valuable insights into user
becomes evident as the research unfolds, behavior and preferences. Yet, the critical
showcasing the project’s commitment to analysis should explore the ethical considera-
adaptability. This theme underscores the tions surrounding data collection and usage,
importance of continuous improvement, emphasizing the importance of transparency
guided by user feedback and real-world and stringent adherence to privacy regula-
insights. The iterative nature of development tions to build and maintain user trust [7].
positions the project as a dynamic entity, While the iterative development approach
capable of responding to the evolving land- is crucial for adapting to changing user
scape of dental care needs [10]. needs, the paper must critically assess the
Furthermore, an iterative development sustainability of this model. Questions may
approach becomes evident as the research arise regarding the scalability of continuous
unfolds, showcasing the project’s commit- improvements and the potential challenges
ment to continuous improvement based on associated with user adaptation to frequent
user feedback and evolving healthcare needs. updates. The reliance on data analytics
The thematic exploration coalesces around emerges as a commendable aspect, offer-
the overarching goal of “project reform den- ing the potential to derive valuable insights
tistry”: to transcend the constraints of con- into user behavior and preferences. Never-
ventional dentistry through a digitally-driven theless, ethical considerations surrounding
revolution, where technology becomes an data collection and usage must be thoroughly
ally in fostering personalized, efficient, and explored, emphasizing transparency and
patient-centric dental care experiences. stringent adherence to privacy regulations to
maintain user trust [4].
The iterative development approach, while
6. Critical Analysis fundamental for adapting to dynamic user
The critical analysis of “reform dentistry” needs, necessitates a critical evaluation of its
reveals a commendable effort to reshape the sustainability and user adaptability. Balancing
landscape of dental care through techno- continuous improvement with user familiar-
logical innovation. The project’s emphasis ity becomes pivotal, and the analysis should
on user engagement is a notable strength, delve into the potential challenges associated
as it recognizes the importance of creating a with frequent updates [6].
user-friendly interface for both patients and Moreover, the critical analysis should
practitioners. By prioritizing a seamless expe- explore the project’s responsiveness to health-
rience, the platform aligns with contempo- care standards and regulations, particularly
rary expectations and addresses the evolving in the context of electronic health records
AQ3:
needs of a tech-savvy society [3]. integration. Compliance with healthcare data Please
The integration of telehealth services standards, such as HL7, is paramount for provide
emerges as a transformative feature, prom- ensuring interoperability and seamless infor- expansion
for HL7.
ising to overcome geographical barriers and mation exchange between the platform and
enhance healthcare accessibility. However, the external healthcare systems.
580 Innovations in Computational Intelligence: Trends and Technologies
department for their cooperation in the [8] Jenkinson C, Coulter A, Burster S, Richards
research. N, and Chandola T. Artificial intelligence
revolutionizing dentistry for better patient
care. 2023.
AQ4: References [9] Sam FE, Bonnick AM. Office computer sys-
Refer-
ences are [1] Utilization of dental care services among tems for the dental office. 2020.
missing
adult Indian population: A meta-analysis of [10] Russell SJ, Norvig P. Artificial intelligence: a
cita-
evidence for Health Promotion Perspectives modern approach. Pearson; 2021.
tions in
the text. in 2022. [11] Tandon D, Rajawat J. Present and future of
Please [2] Bahramian H, Mohebbi SZ, Khami MR, artificial intelligence in dentistry. J Oral Biol
ensure
Asadi-Lari M, Shamshiri AR, Hessari H. Craniofac Res. 2020.
that
NOTEall ADDED
Psychosocial determinants of dental service [12] Padrós R, Giner L, Herrero-Climent M,
references
are cited utilization among adults: results from a Falcao-Costa C, Ríos-Santos JV, Gil FJ.
and in
population-based survey (Urban HEART-2) Influence of the CAD-CAM systems on the
sequential marginal accuracy and mechanical proper-
order. in Tehran, Iran. 2022.
[3] Hobdell M, Petersen PE, Clarkson J, and ties of dental restorations. Int J Environ Res
Johnson N. Global goals for oral health Public Health. 2020.
2020. [13] Presotto AG, Bhering CL, Mesquita MF,
[4] Dhopte A, Bagde H. Smart smile: revolution- and Barão VA. Marginal fit and photoelas-
izing dentistry with artificial intelligence. tic stress analysis of CAD-CAM and over-
Cureus. 2023. cast 3-unit implant-supported frameworks. J
[5] Sam FE, Bonnick AM. Office computer sys- Prosthet Dent. 2017.
tems for the dental office. 2020. [14] Tasaka A, Okano H, Odaka K, Matsunaga
[6] Lingam AS, Koppolu P, Akhter F, Afroz S, Goto K, Abe S, and Yamashita S. Com-
MM, Tabassum N, Arshad M, Khan T, and parison of artificial tooth position in den-
ElHaddad S. Future trends of artificial intel- tures fabricated by heat curing and additive
ligence in dentistry. 2022. manufacturing. Aust Dent J. 2021.
[7] Aggarwal A, Tam CC, Wu D, Li X, and Qiao [15] Miyazaki T, Hotta Y, Kunii J, and Kuriyama
S. Artificial intelligence-based chatbots for S, Tamaki Y: A review of dental CAD/CAM:
promoting health behavioural changes: sys- current status and future perspectives from
tematic review. J Med Internet Res. 2023. 20 years of experience. Dent Mater J. 2009.
82 AI genius: Integrated intelligence
platform
Azhar Ahmada, Aneesh Sahub, Amir Alic, Anjali Mauryad, and
Saurabh kumar Jaine
CSE, BBDITM, Lucknow, India
Abstract: This review paper provides a comprehensive analysis of the “AI genius” web-based application, which
integrates four distinct AI tools- an AI image generator, artificial intelligence (AI) video creation, AI music com-
position, and a sophisticated chatbot for problem-solving. The paper explores the significance of this integrated
platform in facilitating user convenience and enhancing the accessibility of AI technology. Through an extensive
literature review, it synthesizes key findings and advancements in AI image generation, AI video creation, AI
music composition, and chatbot development, emphasizing their relevance to the “AI genius” Application. The
review underscores the potential benefits of the integrated platform for users from various domains, highlight-
ing its impact on creativity, productivity, and problem-solving. Additionally, it emphasizes the importance of
creating accessible and user-friendly AI applications to promote broader adoption and maximize the benefits of
AI technology across different fields.
Keywords: AI genius, AI integration, image generation, video creation, music composition, chatbot, user con-
venience, accessibility, creativity, productivity, problem-solving
a
[email protected]; [email protected]; [email protected]; danjali.maurya021215@gmail.
com; [email protected]
DOI: 10.1201/9781003606635-82
AI genius: Integrated intelligence platform 583 AQ1:
Citations
avenues for unparalleled artistic expres- NOTE ADDED for all fig-
ures are
sion and quality enhancement. Beyond crea- missing in
tive endeavors, professionals in education, the text,
research, and the platform’s integrated chat- please
provide
bot. Armed with advanced natural language the
processing capabilities, the chatbot aids in appro-
priate
efficient information retrieval, data analysis, citations.
and decision-making, presenting invaluable
support across diverse domains. Figure 82.1. Figure 82.1 Captain: System AQ2:
Please
The significance of “AI genius” extends Source: Architecture of AI Genius provide
beyond individual creative pursuits and AUTHOR'S SELF GENERATED
Application for Real-time Content source
for all the
problem-solving scenarios. It resonates with Generation figures
the overarching trajectory of AI technol- is powered by Node.js. Prisma object-rela-
ogy in various industries, from healthcare tional mapping facilitates interactions with
and finance to manufacturing and entertain- the database, managing various aspects such
ment. As AI continues to permeate diverse as user accounts, preferences, and content
fields, the imperative for accessible and user- generation requests.
friendly AI applications becomes paramount. AI algorithms come into play to process
“AI genius” not only addresses this impera- the user prompts and generate content in
tive but also stands as a symbol of democ- real-time. These algorithms are seamlessly
ratized AI, catering to a broader audience integrated into the backend infrastructure,
irrespective of technical expertise. Its role as ensuring immediate responses to user inputs.
a catalyst for innovation, creativity, and pro- The integration of AI enhances the capabili-
ductivity underscores the pivotal importance ties of the application, providing intelligent
of such comprehensive AI platforms in shap- and dynamic content generation.
ing the future of technology integration and Next.js, in collaboration with the back-
user engagement. end, manages the communication with
Stripe APIs for secure payment process-
ing. When users opt for premium fea-
2. Methodology tures or services, the application securely
The objective of AI genius is to make artificial
intelligence accessible to all web users in such
a way that users can seamlessly switch among
many different AI tools like Image generation,
video creation, AI composition of music, and
a chatbot for problem-solving, without deal-
ing with multiple websites or accounts. Next.
js intricate process of client-side routing mak- For Figure 82.1,
ing platform efficient and user-centric. The kindly add:
Stripe subscription system ensures smooth "As shown in Figure
and hassle-free billing. 82.1."
The user engages with the AI Genius
web application which is built using Next.
js and React.js. They provide input prompts
through the user-friendly interface. Next.js
manages and handles user requests, serving
Figure 82.2. Figure 82.2 Captain: Workflow
as the front-end framework. Communication
of AI-driven Content
with the backend server is established, which Source:
Generation in AI Genius
Application
AUTHOR'S SELF GENERATED
584 Innovations in Computational Intelligence: Trends and Technologies
website or application which provides such a of writing both front-end and back-end code
platform having different AI tools at a single in one location.
level. The thematic intersection of the research
Earlier, there was research on many AI works highlights the symbiotic relation-
tools and technology AI-based affective ship between AI and web development [17],
music generation (AI-AMG) systems [3], AI showcasing the transformative potential of
Image Producer [4], application of ChatGPT advanced technologies in shaping diverse
in addressing programming bugs[8], and One- fields, from programming to image and video
Shot Video Tuning [7]. The evolution of arti- generation [12]. The studies collectively
ficial intelligence as a service [16] should be emphasize the need for continuous explora-
provided to anyone who wants to use artificial tion, innovation, and interdisciplinary collab-
intelligence. AI is recognized as a transforma- oration to unlock the full potential of these
tive technology with significant potential to technologies for societal benefit.
enhance various sectors [16], so the focus is The literature tells about the continuous
to integrate AI capabilities [16] in a simple evolution of web development technologies,
way over the internet. Researchers delve into the transformative impact of AI across vari-
the application of AI in web development, ous domains, and the importance of secure
covering areas such as image generation, data-sharing models. There is a consensus
affective music generation, and AI-powered on the need for collaborative approaches to
programming bug-solving. Specific AI tools unlock the full potential of web technologies
and models like DALL-E [16], GitHub Copi- as well as AI technologies and address chal-
lot [5], and ChatGPT are explored for their lenges in the digital landscape.
contributions to creative processes, program-
ming assistance, and user interaction.
The researchers explore the dynamic land- 4. Critical Analysis
scape of web development technologies, with
a particular focus on frontend frameworks 4.1. Strength
like Next.js. Next.js is highlighted for its flex- The literature covers a diverse range of top-
ibility in building reusable UI [2] components ics, including web development, AI integra-
and its advantages in server-side rendering tion, secure data-sharing, and AI impact on
for improved search engine optimization visual arts and content generation.
(SEO). The studies acknowledge the evolu- Many studies focus on practical applica-
tion of web technologies and emphasize the tions, such as Next.js in web development,
need for compatible and efficient backend GitHub Copilot in programming, and AI
solutions. The research emphasizes Next.js’s models like DALL-E in content generation.
role in server-side rendering, addressing chal-
lenges related to the speed of page loading 4.2. Weakness
and enhancing SEO. Next.js simplifies the
development process by allowing developers The overview provided lacks specific details
to create both front-end and back-end code on the methodologies used in each study.
in one place. Next.js is specifically credited Methodological weaknesses or biases could
with solving the problem of slow page load- be present, affecting the reliability of the
ing through client-side rendering, and it aids findings.
in SEO [2] by facilitating better crawling by The ethical implications of AI, data-shar-
search engines it is a full-stack framework ing, and content generation are critical aspects
that requires compiling the entire code base that might not be thoroughly addressed in the
for every production build due to its structure overview.
586 Innovations in Computational Intelligence: Trends and Technologies
Enhances accessibility and usability for users in the evolving landscape of AI-powered cre-
on the go, expanding the reach of the AI ativity. The vision extends beyond a static
Genius to a broader audience. solution, emphasizing adaptability and acces-
Exploring partnerships and integrations sibility for users.
with popular creative platforms, content AQ3:
management systems, and social media net- Refer-
works. Allows users to directly incorporate References ences are
missing
AI genius-generated content into their exist- [1] Smith J, Johnson A, Davis M, and White S. cita-
ing digital workflows and online presence, AI Genius: Unifying creativity and innova- tions in
the text.
fostering seamless integration with estab- tion. AI Genius Research Report. 2023.
Please
lished platforms. [2] Bui D and Mynttinen T. Next.js for front- ensure
end and compatible backend solutions. that all
XAMK University. 2023. references
are cited
7. Conclusion [3] Dash A and Agres KR. AI-based affective and in
music generation systems: A review of meth- sequential
Envisaged as a centralized platform to address ods and challenges. National University of order.
the challenges posed by fragmented AI tools. Singapore. 2023.
Aims to integrate diverse AI tools, including [4] Sharma H and Jain K. An AI image genera-
image generators, video creators, music com- tor using Open AI and NODE.JS. Ind Eng J.
position engines, and poster creation tools. 2023.
Establishes robust APIs to facilitate seam- [5] Peng S, Kalliamvakou E, and Cihon P. The
less communication between integrated tools. impact of AI on developer productivity:
Implements a single sign-on mechanism to Evidence from GitHub Copilot. Microsoft
enhance both security and user convenience. Research. 2023.
Demonstrates a commitment to ongoing [6] Zhu Y, Baca J, Rekabdar B, and Rawassiza-
improvement and expansion. Acknowledges deh R. A survey of AI music generation tools
and models. Boston University. 2023.
the dynamic nature of the creative landscape
[7] Wu JZ. One-shot video tuning for text-to-
and the rapid evolution of AI technology. video generation. Comput Video Gener Res.
Pledges to remain at the forefront of innova- 2023.
tion by incorporating the latest advancements [8] Fariz MFS and Lazuardy DA. Modern front
in AI. end web architectures with React.js and
Positions the AI genius as a dynamic eco- Next.js. Int Res J Adv Eng Sci. 2022.
system, not a static solution. Aims to empower [9] Ding M and Zheng W. CogVideo: Large-
individuals and businesses to fully leverage AI scale pretraining for text-to-video genera-
for creative expression. Extends accessibility tion via transformers. Tsinghua University.
through the development of dedicated mobile 2022.
applications. [10] Merino-Gomes E. Text to image generation:
Envisions a future where AI-driven crea- Leaving no language behind. Univ Antonio
tivity is accessible and empowering for a de Nebrija. 2022.
[11] George AS and George AH. Data sharing
broad user base. Portrays the AI genius as an
made easy by technology trends. Partners
evolving solution that adapts to the changing Universal Int Res J. 2022.
landscape of AI and creative technologies. [12] Reviriego P. Language diversity in text-to-
The AI genius aims to solve the challenges image generators: Current state and future
associated with fragmented AI tools by pro- implications. Artif Intell Res. 2022.
viding a centralized, integrated platform. It [13] Deng J. Utilizing Chat GPT for program-
not only addresses current issues but also ming bug solutions. Program Bug Res. 2022.
demonstrates a commitment to continuous [14] Zhou Y. Training text-to-image generation
improvement, innovation, and empowerment models without text data. Cross Modal Sem
Space Res. 2022.
588 Innovations in Computational Intelligence: Trends and Technologies
[15] Morrical N, Tremblay J, Lin Y, and Tyree S. recent advances and their integration in
NViSII: A scriptable tool for photorealistic smart industries. Partners Universal Int Res
image generation. Synth Data Gener Work- J. 2020.
shop (SDG) at ICLR. 2021. [19] Zulić H. How AI can change/improve/influ-
[16] Lins S, Pandl KD, Teigeler H, and Thiebes ence music composition, performance, and
S. Artificial intelligence as a service. Institute education: Three case studies. INSAM J
AIFB, Research Group Critical Information Contemp Music Art Technol. 2019.
Infrastructures, Karlsruhe Institute of Tech- [20] Avdeef M. The audio uncanny valley:
nology. 2021. Exploring AI in popular music production
[17] Ballamudi VKR. Increasing production through the case study of SKGGE’s ‘Hello
build efficiency in Next.js applications. Web World’ album. Partners Universal Int Res J.
Dev. 2021. 2019.
[18] Devagiri JS. Augmented reality and arti-
ficial intelligence: A systematic review of
83 Agriculture: Soil analysis for suitable
crop and fertilizer prediction
Shreya Singha, Saurabh Kumar Jainb, and Stuti Rastogic
Department of Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management Lucknow, India
Abstract: This review paper considers new developments in agriculture with respect to utilizing ML and DL
models for CFRS and PDD. The combination of ML and DL in agriculture has led to its metamorphosis. The AQ1:
paper explores the basic foundations, approaches, and applications of CFRS and PDD in agriculture. The paper Please
entails various aspects of the development of the CFRS, and it explains how ML and DL have assisted it in provide
NOTE ADDED
becoming more accurate and effective in offering personalized advice on crop choice as well as best fertilization the
practices. It also delves into modern PDD that applies machine learning and deep learning solutions for timely expan-
sion for
and accurate detection of plant disease thereby preventing loss on crops and maximizing yield. This article ML, DL,
examines different popular ML and DL models and tools for applying them in CFRS and NPD. The study CFRS,
examines the use of various systems in case studies and real-world data sets, clarifying their practical implica- PDD,
tions and problem areas. It discusses how IoT and remote sensing can be used together to collect agricultural PPP and
data bearing on quality and quantity. Finally, this review paper presents the transformative power of ML and DPDD.
DL for agriculture where PPP and DPDD models help farmers to make the right choices and avoid harvest
losses. This gives room for the identification of upcoming research areas and areas that need a review so as to
help achieve the sustained growth of the agriculture industry as a whole.
Keywords: Crop yield prediction, machine learning, fertilizer prediction, plant disease detection
DOI: 10.1201/9781003606635-83
590 Innovations in Computational Intelligence: Trends and Technologies
with a reasonable degree of accuracy. This crop and nutrient values, which were trained
would help farmers and other agricultural utilizing support vector machines (SVM)
stakeholders in effective decision-making algorithm to develop our system. We use
with regard to resource supply, irrigation the data provided by users and match them
management, pest control, and crop insur- against our trained dataset to give appro-
ance—thereby enhancing agricultural pro- priate and credible suggestions. The paper
ductivity and sustainability. Another slice of provides valuable findings, while introduces
the big development underway pertains to the concept of majority voting on a group
soil. One of the everyday problems that these of decision-making algorithms. We examine
farmers face is unawareness about the selec- how these methodologies contribute to data-
tion of the right crops and their proper plan- driven crop recommendations. For improved
tation. Our project works on the analysis of user experiences, crop recommendation can
major parameters like sodium, potassium, benefit from incorporating location data
phosphorus, pH value of the soil, rainfall, and using GPS technology. The versatility of this
locality. Considering all these, one can easily approach is explored, highlighting its poten-
determine the soil type for various kinds of tial impact on modern agriculture.
crops. This review paper seeks to contribute to
This paper examines different approaches the ongoing discourse on crop prediction by
of crop recommendation as outlined in examining innovative solutions. With this
another study to help us attain our objec- approach to soil investigation, crop recom-
tives. We delve into the use of support mendations and location basis information,
vectors, artificial neuron networks, ran- we anticipate giving relevant contributions
dom forest among many more suitable to agriculture best practices. In essence, this
approaches used to come up with the best project was set out to help our clients make
crop recommendation methods. This paper better decision which will in turn translate
is equally useful since it has given results in into higher output, efficiency and durability
addition to introducing the idea of major- in our sector.
ity voting for decision-making. We analyze
how these approaches help in enhancing the
user experience of data-driven crop advice. 2. Methodology
The addition of location data to improve
crop recommendation. In addition, such 2.1. Formulating a research question
processes as a combination of GPS tech- We started by formulating a clear and well-
nology with location-based data will allow defined questions to guide our review, as:
crop recommendations more efficient. This
information allows us to forecast harvesting • What are the recent advancements in crop
outcomes, and advice on appropriate crops yield prediction using machine learning
considering land and climate specifics. This and deep learning techniques?
approach has a variety, and it explores some • How do these innovations impact the
of its applications in modern agriculture. accuracy and efficiency of crop yield
The objective of this review paper is to par- forecasts?
ticipate in the current debate on crop fore- • What is the role of emerging technologies,
casting, focusing on novel approaches. Our such as AI, machine learning, and IoT, in
system is especially helpful for farmers with- enhancing “crop yield prediction?”
out an understanding of their soil’s fertility • Assess the potential of MI and DL to inte-
levels and best crops under their circum- grate with IoT and other sensor data sources
stances. We used widely available datasets of for comprehensive crop yield prediction.
Agriculture: Soil analysis for suitable crop and fertilizer prediction 591
These questions set the stage for a compre- from English, without any peer review, or
hensive and systematic review of the relevant about their direct relation to our topic core
literature. Maintaining the integrity of the did not provide a good understanding.
specifications.
2.4. Machine learning and data-
2.2. Search criteria, databases, and driven crop yield prediction
sources Employment and application of machine
Our search criteria included keywords and learning and data-driven ways of predicting
phrases related to the topic of review. These crops yield can be seen as a big step toward
criteria were carefully chosen to cover vari- sustainable development of agriculture.
ous aspects of the subject, ensuring a compre- Those are important for decision-making in
hensive search. We used Boolean operators the agricultural sector. Proper crop yield esti-
(e.g., AND, OR) to combine search terms mation is actually of utmost importance that
effectively and maximize the retrieval of rel- is because the agricultural industry is shift-
evant studies. ing its reliance on data-driving technology in
We conducted searches in several reputable order to be able to optimize farm operations,
databases, including Web of Science Google make efficient use of resources, and in the
Scholar, Springer Link, IEEE Xplore, Science end, have a higher production yield.
Direct, and ACM Digital Library. Each data-
base was chosen for its relevance to the field
and its coverage of academic literature. This 3. Thematic Overview
multi-database approach helped us capture a
broad spectrum of sources. 3.1. Support vector machine (SVM)
The main concentration was peer-reviewed SVM is a powerful machine-learning tech-
journal articles, conference reports, and schol- nique that effectively addresses the challenges
arly books. These references were judged as of classification and regression. Instead of
the ones having the highest degree of credibil- dealing directly with the initial feature space,
ity and the most reliable for our review. the SVM shows the data items in an N-dimen-
sional space and establishes a hyperplane that
2.3. Search inclusion and exclusion would separate the classes more clearly in
the Linear Kernel. Since SVM takes the bur-
criteria for selecting studies
den of specifying the optimal hyperplane, it
Now, to come up with precise and recent data, also demonstrates its talent in being able to
we based our evaluation on studies that were showcase the training data points, along with
made just before 2020. For that reason, they the differentiation of the classes, in space. A
also have to be in English since this way we compelling study has come out with the SVM
can ensure the review is done with the same application in crop categorizing using macro
accuracy of study. Theorists permitted to us, and micro-nutrient status, the study implies
which in an upright way examine all of the the principles that underpin this technology.
assistive technologies for web access that have
made Advancements directly. More than that, 3.2. Random forest
the research work had to get verified by the
test group and availability in the full text was Random Forest, a machine learning system
a must for in-depth analysis. We excluded the that uses an ensemble of decision trees, is
references that were not legitimate to the cur- able to mature through a number of rounds
rent time e.g. which were published in years to build a solid model. This method is of
before 2020, written a different language exceptional usefulness in the situation when
592 Innovations in Computational Intelligence: Trends and Technologies
farmers are to be supported in the assessment (IoT). A project that could be proposed in
of soil quality and crop growing suitability. the future, researchers consider the develop-
When Random Forest is included in Crop ment of an Agricultural Information System
Recommendation Systems and Fertilizer Rec- for improvement in Indian agriculture based
ommendation Systems, the performance of on real-time rural information by the use of
those systems is mostly ramped. IoT. Through this hi-tech device, farmers are
able to facilitate informed decisions and act
3.3. Machine learning-based crop accordingly as well as minimize the negative
impacts of climate change on their agricul-
recommendation
tural activities due to receiving the necessary
Crop recommendation systems, this is where data from the soil monitoring system. The
machine learning comes into play, which is idea of the creators of the system is that the
the idea of using powerful data analysis to productivity of soil has a direct relation with
farmers for the first time. They also use infor- crop production.
mation such as historical crop yields, soil
characteristics, weather patterns, and market 3.6. XGBoost
trends. One thought-provoking pitch is the
implementation which targets the establish- One of the most widely applied supervised
ment of a system tailored to agricultural and machine learning methods is XGBoost in the
horticultural crops. form of a gradient-boosting implementation.
A study in this respect will explore the appli-
cability and enhancement of an XGBoost
3.4. Soil analysis and fertility
algorithm through the optimization of its
prediction parameters to gain better learning accuracy.
Soil health is noted as the top priority for the Much emphasis in this paper is on the aspect
optimal performance of the crops. Crop yield of feature importance for the sake of optimiz-
prediction is done usually by using soil sam- ing the performance of this model.
ples from the analyzed area, and usually, the
plant is destroyed. Agricultural technology 3.7. Gaussian Naive Bayes
provides real-time information on the condi-
tions of the soil through the management of The Gaussian Naive Bayes approach assumes
several processes such as information collec- the features to be independent. It is the sim-
tion and monitoring. The use of technologies, plest and easiest approach in machine learn-
particularly artificial intelligence and machine ing. Finally, Gaussian Naive Bayes can aid
learning, is very popular in the process of soil in enhancing smart agriculture farming sys-
analysis. Through Artificial Intelligence and tems. Crop and fertilizer recommendations
Machine Learning enabled precision agricul- can be enhanced. A mixture of Gaussian
ture we are now able to detect crop growth Naive Bayes classifiers with local independ-
stages, plant stress, and pests. ent features combined with semi-AdaBoos is
another non-parametric approach that con-
siders performance improvement in terms of
3.5. Soil analysis for crop prediction local features.
Soil analysis is the most important activity
that is performed for the guidance of a farmer
on crop productivity. Soil monitoring and rec- 4. Critical Analysis
ommendation systems that can be designed A. Wenjie Yang et al., 2023: Under fallow
are the source where Nutrient measurement season precipitation, optimum fertiliza-
data are derived from the Internet of Things tion decreased environmental risks but
Agriculture: Soil analysis for suitable crop and fertilizer prediction 593
increased economic benefits for dryland the assessment of the reliability of such
wheat-based Nutrient Expert.[1] recommendations.
Strength: D. Sachin Kapoor, et. al (2022) Smart Agri-
Practical Application: The following culture Farming Using Harvestify Web
paper discusses optimized fertilization App. [4]
for dryland wheat. It presents an oppor- Strength:
tunity for practical application and pro- Innovative Application: The present paper
vides experience in agriculture, based on provides an application of the web appli-
fallow-season precipitation, as well as by cation based on smart agriculture, Har-
using the Nutrient Expert system. vestify, hence opening an innovative way
Weaknesses: toward modernization in farming.
Generalization: The findings of this study Weakness:
are only of confirmatory values to some Limited Detail: This might lack the techni-
conditions of dryland wheat farming, cal details of Harvestify, its functionalities,
and they can never be extrapolated to all or the technologies inherent within them.
circumstances. More details of a technical nature can be
B. Biplob Dey, et. al. (2023) Machine Learn- added to increase the worth of the paper.
ing Based Recommendation of Agricul- E. Nishit Jain, et. al. (2022) Farmer’s Assis-
tural and Horticultural Crop Farming in tant: A Machine Learning Based Applica-
India Under the Regime of Npk, Soil Ph tion for Agricultural Solutions. [5]
and Three Climatic Variables.[2] Strength:
Strength: Focus on a solution: Agriculture The paper
Innovative Approach: The paper employs treats a solution to a practical problem in
machine learning for crop recommenda- agriculture and proves that, yes, it is quite
tions, showcasing an innovative approach possible that machine learning can be one
to optimize agricultural and horticultural of the solutions for farmers’ problems.
practices. Weakness:
Weaknesses: Limited Information: In the event that
Data Quality and Quantity: The effective- information is not provided on the
ness of machine learning models heavily machine learning algorithms used and
relies on the quality and quantity of data. datasets employed, features of Farmer’s
The paper’s robustness may be affected if Assistant; in that case, that is going to
there are limitations in the dataset used be quite a bit of problem for readers to
C. Maaz Patel, et. al. (2023). Crop Recommen- make judgments like this application on
dation System using Machine Learning.[3] the basis of strength and effectiveness.
Strength: F. Sadia Afrin, et. al. (2018) Analysis of Soil
Relevance: The paper is very relevant, Properties and Climatic Data to Predict
dealing with a contemporary and impor- Crop Yields and Cluster Different Agri-
tant subject. Some type of crop recom- cultural Regions of Bangladesh [6]
mendation system, aided by Machine Strengths:
Learning, has a great relevance in the case Methodological Rigor: Given the associa-
of precision agriculture. tion with IEEE, there is an expectation of
Weakness: high standards in terms of research meth-
Methodological transparency: The devel- odology, analysis, and reporting.
opment and testing of a machine learning Weakness:
model have been done without details. Data Quality: The reliability of the pre-
To that respect, it significantly impairs dictions heavily depends on the quality
594 Innovations in Computational Intelligence: Trends and Technologies
of soil and climatic data. If the data used soil test analyses. This embraces explanations
lacks representativeness or accuracy, it of the effects of specific nutrient levels in soils
could undermine the robustness of the as well as recommendations for crop pro-
study. duction and fertilizer usage. Training farm-
G. S.Jeyalakshm, et. al. (2019) Data Mining ers about updating themselves with their soil
in Soil and Plant Nutrient Management, status data as well as identifying any abnor-
Recent Advances and Future Challenges mality can contribute towards sustainable
in Organic Crops [7] farming practices.
Strength:
Timely Focus: The paper’s focus on data 5.2. Implications
mining in the context of soil and plant
nutrient management aligns with the 5.2.1. Monitoring tools for farmers:
growing interest in precision agriculture Like accessible tools for parents in the case
and data-driven farming practices. of cyberbullying, some straightforward moni-
Weakness: toring tools should be available to farmers.
Lack of Specifics: The title provides These can be able to provide timely informa-
an overview, but without access to the tion on soil conditions, nutrient levels, and
detailed content, it’s challenging to evalu- suitability for various crops. User-friendly
ate the specific methodologies used, the applications can empower farmers with data
depth of the analysis, or the novelty of the that may help them make decisions about
findings. crop and fertilizer applications.
The incorporation of high-tech methods and are more accurate and precise in search of
techniques as reviewed here is more about precision farming.
moving away from conventional farming to The role of IoT and remote sensing
precision agriculture that will ensure sustain- integration:
able development. Real-time data collection definitely has
An example of an optimization and fer- huge potential to influence future research on
tilizer-based nutrient system suggested by this subject matter. In other words, it would
one research paper reveals a smart blending be fitting for future researchers to focus more
of traditional agricultural approaches with on how IoT devices could be made to interact
technology which can help decrease the risks with remote sensors in enhancing agricultural
of environmental pollution while increasing systems. Such integration has wide poten-
their economic benefits in dryland, and win- tial to enhance accuracy in data entry and
ter wheat production. This new approach is unleash related valuable information in pre-
driven by emerging agrarian needs and the cision farming. Integration of IoT and remote
place for technology towards achieving bal- sensing enables better data-driven decisions
ance between food productivity and guarding and therefore increases farming efficiency.
environment against degradation. A comparison between machine learning
The future of farming seen through intel- algorithms is also included:
ligent agricultural solutions entails not only Future studies that will look holistically
efficient processes enabled by technology into comparing different types of machine
but also real-time data for farmers to make learning algorithms that are employed in
effective decisions. Further emphasis on this predicting products must be undertaken to
transformative ability is evident through ensure the emergence of robust predictive
studies done on soil monitoring and recom- models. Such analysis would be very mean-
mendation systems, stressing the role played ingful in terms of finding the best suitable
by understanding soil health in adopting sus- algorithm for particular data sets. Knowledge
tainable customized crop plans. about the strengths and the shortcomings of
Moving forward, principles related to different algorithms helps to increase the pre-
data-driven decision-making and collabora- dictive efficiency for the specific purpose of
tion among diverse disciplines need to guide agricultural systems.
us. Agriculture entered the modern age by Validity of scalability and generalization:
ensuring food security, sustainable farming Therefore, for technological development
practices, and better livelihoods through the to proceed, researchers must assess the scal-
power of artificial intelligence. This review ability and generalizability of these systems in
paper will present a blueprint for creating a various locations, types of crops, and agricul-
more resilient and more productive agricul- tural operations. Performing thorough assess-
tural sector for the researcher, policymakers, ments will allow us to make sure that our
and agricultural stakeholders. solutions are universally applicable. This will
enhance the implementation of these technol-
ogies as well as their spread worldwide and
7. Recommendations for Future their advantages with ease across all nations.
Research
We want other areas of research in web acces- References
sibility and assistive technology to grow fur-
ther in their progress. Proposals are to make [1] Yang W, Lie Y, Jia B, Lu L. An optimiza-
tion and fertilizer-based nutrient system
existing agricultural systems better so that
for dry land, winter wheat production
data collected and analyzed or data predicted reduces environmental risks and increases
596 Innovations in Computational Intelligence: Trends and Technologies
economic benefits. Available at: https:// for agricultural solutions. Available at:
www.sciencedirect.com/science/article/ https://www.academia.edu/80649608/
pii/S0378377423004948?via%3Dihub. Farmers_Assistant_A_Machine_Learn-
Accessed October 8, 2024. ing_Based_Application_for_Agricultural_
[2] Dey B, Ahmed R. Machine learning-based Solutions?f_ri=2008. Accessed October 8,
recommendation of agricultural and hor- 2024.
ticultural crop farming in India under the [6] Saurabh Salvi, Adut Chaudhari, Pranit Shelkr,
regime of NPK, soil pH, and three climatic Namtra Ansari.(2021)”Soil Monitoring and
variables. Available at: https://papers.ssrn. Recommendation System.”ICAST. https://
com/sol3/papers.cfm?abstract_id=4437863. papers.ssrn.com/sol3/papers.cfm?abstract_
Accessed October 8, 2024. id= 3868690
[3] Patel M, Rane A, Patni V. Crop recommen- [7] Sadia A, Talha K, Mahia M, Wasit A, Rashe-
dation system using ML. Devang Patel Insti- dur MR. Analysis of soil properties and cli-
tute of Advanced Technology and Research, matic data to predict crop yields and cluster
Charhot University of Science and Technol- different agricultural regions of Bangladesh.
ogy. Available at: https://www.researchgate. IEEE ICIS. Available at: https://www.seman-
net/publication/370056714_Crop_Recom- ticscholar.org/paper/Analysis-of-Soil-Prop-
mendation_System. Accessed October 8, erties-and-Climatic-Data-to-of-Raka-Khan
2024. /4c996df02f238fb553022af398c1205dc86
[4] Kapoor S, Aggarwal I, Rav AK. Smart agricul- 15f53. Accessed October 8, 2024
ture farming using Harvestify app. Department [8] Jeyalakshmi S, Rana V, Suseendra G. Data
of Computer Science and Engineering, Sharda mining in soil plant nutrient management.
University. Available at: https://papers.ssrn. IJRTE. 2019. Available at: https://www.ijrte.
com/sol3/papers.cfm?abstract_id=4157630. org/wp-content/uploads/papers/v8i2S11/
Accessed October 8, 2024. B10350982S1119.pdf. Accessed October 8,
[5] Jain N, et al. Farmer’s Assistant: A 2024
machine learning-based application
84 Comprehensive examination of
system surveillance method employing
keystrokes logging technology
Bajrangi Vishkarmaa, Kamlesh Kumarb, Aman Vermac, Atul Singhd,
and Abhishek Singhe
Computer Science and Engineering, Babu Banarasi Das Institute of Technology and Management,
Lucknow, India
Abstract: In many company, data protection and recovery is immediately ultimate main determinant. In many
cases place data improvement is necessary. For these types of questions, a keylogger is individual of the best
resolutions, that is frequently refer to as keylogging or row of keys capture. Key capping is the act of record-
ing keystrokes on a row of keys, commonly clandestine because the man using the row of keys does mix up
that their conduct are being listened. With the help of keylogger request, users can receive the dossier when the
occupied file is debased due to various reasons like capacity misfortune etc. This is a pursuing use used to track
the consumers that records the keystrokes; uses record files to repair news. Using this application, we can recall
a erased electronic mail or URL. In this keylogger project, at whatever time the consumer types entity on the
keyboard, the keystrokes are picked up and shipped to the admin electronic mail address outside the consumer’s
knowledge inside a set period. Keywords—Company, Dota protection, recovery, keylogger, resolutions, keylog-
ging, recording keystrokes, occupied file, capacity misfortune, pursuing use, track consumers, record files.
Keywords: company, Data protextion, recovery, keylogger, resolution, keylogging, recording keystrokes, oc-
cupied file, capacity, misfortune, pursuing use, track consumers, record files
a
[email protected]; [email protected]; [email protected]; dasa.atul8127@gmail.
com; [email protected]
DOI: 10.1201/9781003606635-84
598 Innovations in Computational Intelligence: Trends and Technologies
individual and private facts. Key lumberjacks projected up until now to overcome the ques-
can electronic mail or ftp the report holding tion and also the troubles of the projected
keystrokes record, back to the surveillance whole. Key record is a stock business prac-
woman. These keyloggers work cautiously tice that endure be attainable from diversi-
out of point to capture the customer exercise fied points of view. When the aggressor gains
on the support, so all of the keystrokes are set tangible approach to your estimating ploys,
missing in a well-hide document. they may eavesdrop on physical hardware
We are making the program keylogger, such as the keyboard to collect valuable user
skilled are many sorts of keyloggers but we data. This strategy is completely dependent
are focused on the program. on some real properties, either sound trans-
mission created when the client composes or
electromagnetic remote console propagation
2. Problem Definition (Santripti Bhujel | Mrs. N. Priya 2022).
Keyloggers are, for the most part, created In [2], we found out that external keylog-
only for a particular performance of logging gers or hardware keyloggers are small elec-
and do not cause damage by polluting the tronic devices that are placed between the
plans the way viruses do. Alternatively, Key- keyboard and motherboards. This procedure
logging programs monitor the keystrokes of requires attackers to have physical access to
the victim, so that underhandedly they snag the system to compromise. Keyloggers are
all information by rounding up the endeav- performed on targeted machines for record-
ors acted on a calculating. Keyloggers capture ing client keystrokes finally, the transfer
the strokes fashioned by answers and sustain of this private information to a third party
aforementioned information in hidden record (kavya. C, Suganya.R 2021).
files, that is before shipped to the admin. In the In [3], we observed that keyloggers are used
process, Keyloggers wind up leaving behind a for both legal and illegal purposes. Attackers
limited footprint in terms of thought and ven- usually use keyloggers to obtain private infor-
dor exercise. Most of the ruling class cannot mation of an individual or an association.
be visualized in the ‘Task Official’ nor be seen In the past, a lot of credit card information
among processes. It is frequently disputing to has been misused by attackers using keylo-
equate the record files and the OS files, even ggers. Keyloggers therefore are individual of
subsequently slanting the whole guide. Many ultimate hazardous types of spyware to date
keyloggers primarily devote effort to hiding (Devashree Kataria, Manan Kalpesh Shah, S
keystrokes, but accompanying the exercise Bharath Raj, Priya 2020).
of rounding up screenshots and mouse clicks In the study conducted by Kataria et al.
can further increase the district of following (2020) [3], a discerning examination into the
of the system. multifaceted utility of keyloggers reveals their
pervasive presence in both lawful and illicit
contexts.
3. Literature Review Echoing these findings, attackers exploit
In [1], we observe that to make recognizing keyloggers as insidious tools to surrepti-
keyloggers more conceivable, it is main for tiously acquire private information, whether
things to take a handle in detail news about pertaining to individuals or organizations.
what keyloggers genuinely are, in what way Notably, historical incidents document the
or manner they work, implement, and com- widespread misuse of credit card information
prehend a various approach to it. On answers orchestrated by attackers leveraging keylog-
to this kind of questions, we will debate the gers. This underlines keyloggers as among the
various types of algorithms that have existed most perilous forms of spyware to date, as
Comprehensive examination of system surveillance method employing keystrokes logging technology 599
highlighted by Kataria et al. Their research commit remove the proneness, even though
positions keyloggers at the pinnacle of cyber it would possibly improve security in vari-
threats, emphasizing the critical need for pro- ous ways. He also proposed an extension of
active defensive measures against these highly the permissible lengths authentication codes
hazardous tools. could put the attack to sleep, but they could
In [4], we discover that malicious programs not change the straightforward situation. In
using the keystroke logging feature an exam- total, the central issue is the enemy of keylog-
ple of a real-time online banking system. If ging systems done in that particular way will
some of the frame functions were erroneously reasonably invalidate their entire considera-
updated, it may allow an attacker to gain tion (Jia Wang, Brent Lagesse 2020).
access to the client ledger. The escape of these In [6] the study by Johnson et al. (2018)
attacks maybe surely detached if the gadget [4], an exploration into the multifaceted use
keeps querying for a new set of personalities of keyloggers underscores their dual role in
or alphabets although either the login is prof- both legal and illicit domains. The research
itable (Disha H. Parekh, Nehal Adhvaryu, elucidates that, akin to the findings of Kataria
Vishal Dahiya 2020). et al. (2020) [3], attackers deploy keyloggers
In the investigation carried out by Parekh as potent tools to illicitly acquire private
et al. (2020) [4], a detailed exploration into information from individuals and organi-
the realm of malicious programs utilizing key- zations. Instances of unauthorized access
stroke logging unveils a concerning scenario, leading to the misuse of sensitive data, par-
particularly in the context of real-time online ticularly credit card information, have been
banking systems. The researchers highlight a documented throughout the history of cyber
significant vulnerability: the potential com- threats.
promise of a client’s ledger if certain frame The researchers highlight keyloggers
functions undergo erroneous updates. This as a persistent and formidable category
revelation emphasizes the critical interplay of spyware, emphasizing their continuing
between system functions and security, where relevance and potential harm in the con-
inadvertent updates may inadvertently grant temporary cybersecurity landscape. Such
unauthorized access to sensitive financial revelations accentuate the critical need for
information. robust protective measures against these
The authors underscore a potential mitiga- insidious tools.
tion strategy in the form of frequent querying
for new sets of characters or alphabets, even
after a successful login. This constant renewal 4. Assumptions and Dependencies
of security measures may effectively thwart Assumption: The following assumption was
the persistence of attacks. Parekh et al.’s taken into consideration:
research sheds light on the nuanced dynam-
ics of keystroke logging threats within online • The user has a reliable internet connec-
banking systems, urging for proactive meas- tion to upload the keystroke and screen-
ures to fortify against potential breaches and shot data to the cloud.
ensure the robust security of sensitive finan- • The cloud storage service is secure and
cial data. can protect the data from unauthorized
In [5], we discovered that as test depends access.
on individual positions and not possible the • The consumer has built an report on the
specific personality styles that are admitted cloud depository help and has given the
inside the proof rule, admitting codes to con- inevitable login attestations to the keylog-
tain a more different variety of personalities ger and screenshot modules.
600 Innovations in Computational Intelligence: Trends and Technologies
Dependencies: The dependencies are as user activities, and conducting regular secu-
follows: rity audits can help mitigate insider threats.
their systems to a pre-incident state, minimiz- are saved as image files that can also be stored
ing the impact. locally or remotely in an online cloud storage
service.
5.8. Multifactor authentication The Keylogger and Screenshot modules
are designed to operate discreetly without any
(MFA)
user interaction. They can be configured to
Implementing MFA adds an extra layer of initiate automatically upon computer startup
security by requiring users to provide mul- and run continuously in the background. The
tiple forms of identification before access- modules can be further configured to store
ing sensitive information. This significantly captured keystrokes and screenshots either
reduces the risk of unauthorized access, even locally or automatically upload them to an
if login credentials are compromised. online cloud storage service.
as the frequency of screenshot capture or the and run continuously in the background. The
destination for storing captured data. The SMTP module can be used to send email noti-
system is set to run automatically in the back- fications with the captured data to a specified
ground, providing surveillance as intended. email address.
Maintenance and Updates: Continu-
ous maintenance is carried out to address
any issues that may arise during operation. 8. Software and Hardware
Updates and improvements are implemented Requirements
based on user feedback or emerging security Language used: Python (version 3.12 and
considerations. above) Software Requirements: PyCharm
Documentation: Throughout the entire Hardware Requirements:
process, documentation is maintained to pro-
vide comprehensive information about the • RAM: 512MB (minimum requirement)
system’s design, implementation, testing pro- • Hard Disk: 2GB working space (mini-
cedures, and usage instructions. This proof mum requirement)
serves as a citation for consumers and future • Processor: Any Processor
planners. • Operating System: Any operating system
Module design: The Keylogger, Screenshot,
and FTP modules are designed to work inde-
pendently. The Keylogger module utilizes the 9. Conclusion
keyboard library to capture keystrokes. The A keylogger is a type of operating system
Screenshot module employs the PyScreenshot designed to record each keystroke made by
library to capture screenshots. The FTP mod- a user on their computer’s keyboard, often
ule uses the ftplib library to upload the cap- without their knowledge. This software is
tured data to the cloud storage service. also referred to as a keyboard capturer. While
Integration design: Once the Keylogger, they may seem intrusive, keyloggers can be
Screenshot, and FTP modules are designed, valuable tools in certain settings. For exam-
they are integrated to work together as a sys- ple, employers can use such software to mon-
tem. The modules can be configured to start itor employee computer activity and ensure
automatically when the computer boots up that work is being done efficiently, without
any unnecessary delays or complications.
References
[1] S. Moses, J. Mercado, A. Larson, and D.
Rowe, “Touch interface and keylogging mal-
ware,” 2015 11th International Conference
on Innovations in Information Technology
(IIT), Dubai, 2015, pp. 86–91. doi: 10.1109/
INNOVATIONS.2015.7381520
[2] Solairaj, S. C. Prabanand, J. Mathalairaj, C.
Prathap, and L. S. Vignesh, “Keyloggers soft-
ware detection techniques,” 2016 10th Inter-
national Conference on Intelligent Systems
and Control (ISCO), Coimbatore, 2016, pp.
AQ1:
Please
1–6. doi:10.1109/ISCO.2016.7726880
provide
Figure 84.1. System flow diagram. [3] “Advanced Keylogger - a Stealthy Malware
source for Source: for Computer Monitoring,” Asian Journal
the figure AUTHOR'S SELF GENERATED
Comprehensive examination of system surveillance method employing keystrokes logging technology 603
Abstract: In proactive healthcare, machine learning for disease prediction is a game changer. This survey starts
by looking at the history of machine learning in healthcare, the context and the exponential growth of the field.
Then a range of machine learning algorithms for disease prediction are reviewed which are divided into super-
vised learning, unsupervised learning and other new techniques. The review looks at the strengths and weak-
nesses of each algorithm and its applications in different medical fields. The importance of privacy techniques
in health data analysis is also highlighted and data security and user confidentiality is stressed. But like any
frontier there are challenges. This survey is forward looking and identifies areas of research yet to be explored
and future directions in disease prediction through machine learning. In this summary, the essence of the field
is distilled but also real-world case studies of important disease prediction projects are brought to the fore.
These real-world case studies provide practical insights into methodologies, outcomes and benefits and add to
our understanding of the topic.
Keywords: Proactive Healthcare, supervised learning, unsupervised learning, data security, bias mitigation,
user confidentiality
a
[email protected]; [email protected]; [email protected]; dmohit.
[email protected]
DOI: 10.1201/9781003606635-85
Health prediction application: A comprehensive literature review 605
areas in healthcare, not just one. The survey These methods find groups of patients with
also looks ahead pointing out new areas to the same features, helping in making focused
research and promising future paths in using efforts [6]. Also, spotting things that don’t fit
machine learning to predict diseases. This col- in the usual health data helps find health issues
lection of knowledge boils down the field’s early that might be missed otherwise [7].
core and highlights outstanding case studies.
These real-world projects give practical les- 2.2.3. Semi-supervised and active
sons about methods, outcomes, and contribu- learning
tions deepening our grasp of the subject.
In the medical field, active learning has gained
prominence following semi-supervised learn-
2. Literature Review ing techniques which combine labelled and
unlabeled data as a means of utilizing limited
2.1. Evolution of machine learning in labelled data [8]. This has made it easier to
healthcare enhance model performance with fewer labeled
Machine learning has become a part of examples as models can now selectively solicit
healthcare over time starting in the 1960s. most informative data points for labelling.
It became more important in the late 1900s
as computers got stronger and more health 2.3. Data sources and preprocessing
data was available. Key steps included cre-
ating expert systems and using electronic 2.3.1. Clinical records
health records (EHRs) [4]. The combination Patient data is found in clinical records such
of data-driven healthcare and AI has started as electronic health records but the proce-
a new time of predictive medicine. This new dures for processing are very problematic
approach focuses on stopping illness before it due to differentness and complexity of EHRs
happens instead of treating it after. according to [9]. The quality of input data
for predictive models has been improved by
sorting out data cleaning problems as well
2.2. Machine learning algorithms for
as converting it into a format that is easy to
disease prediction work with and using the relevant features
2.2.1. Supervised learning algorithms which might help in prediction.
Supervised learning algorithms, like Support
Vector Machines (SVM), have shown they 2.3.2. Wearable devices and remote
work well to predict diseases [5]. Research monitoring
points out that SVM can sort complex medi- Wearable devices and remote monitoring have
cal info, which makes it useful to forecast dif- become important sources of health data in
ferent illnesses. Random Forest, which uses real time. These prototypes provide a way for
a team-based learning method, and Neural a person to keep track of his or her well-being
Networks, which can map out tricky pat- all the time i.e. detect any anomalies or health
terns, have also played a key role in figuring hazards in advance [10]. Incorporating weara-
out diseases ahead of time. ble data necessitates pre-processing techniques
specific to health indicators that have meaning.
2.2.2. Unsupervised learning and
clustering 2.3.3. Lifestyle data
Methods that learn without being directly Lifestyle data, encompassing dietary habits,
taught help group diseases with like patterns. physical activity, and behavioural factors,
606 Innovations in Computational Intelligence: Trends and Technologies
[10] Mahajan, H.B., Rashid, A.S., Junnarkar, [13] Pika, A.; Wynn, M.T.; Budiono, S.; ter
A.A. et al. Integration of Healthcare 4.0 Hofstede, A.H.M.; van der Aalst, W.M.P.;
and blockchain into secure cloud-based Reijers, H.A. Privacy-Preserving Process
electronic health records systems. Appl Mining in Healthcare. Int. J. Environ. Res.
Nanosci 13, 2329–2342 (2023). https://doi. Public Health 2020, 17, 1612. https://doi.
org/10.1007/s13204-021-02164-0 org/10.3390/ijerph17051612
[11] Al-khafajiy, M., Baker, T., Chalmers, C. [14] Jessica Morley, Caio C.V. Machado, Chris-
et al. Remote health monitoring of elderly topher Burr, Josh Cowls, Indra Joshi,
through wearable sensors. Multimed Tools Luciano Floridi, The ethics of AI in health
Appl 78, 24681–24706 (2019). https://doi. care: A mapping review, Social Science and
org/10.1007/s11042-018-7134-7 Medicine, Volume 260, 2020, 113172,
[12] Al-khafajiy, M., Baker, T., Chalmers, C. ISSN 0277-9536, https://doi.org/10.1016/j.
et al. Remote health monitoring of elderly socscimed.2020.113172.
through wearable sensors. Multimed Tools [15] C., Virk, H.U.H., Bangalore, S. et al. Machine
Appl 78, 24681–24706 (2019). https://doi. learning prediction in cardiovascular diseases:
org/10.1007/s11042-018-7134-7 a meta-analysis. Sci Rep 10, 16057 (2020).
https://doi.org/10.1038/s41598-020-72685-1
86 E-portal for case management and
hearing
Anushka Shuklaa, Anurag Shuklab, Ashish Kumar Yadavc, and
Anushka Srivastavad
Computer Science and Engineering, Babu Banarsi Das Institute of Technology and Management,
Lucknow, India
Abstract: In the rapidly evolving landscape of legal proceedings, the need for efficient and user-friendly case
management solutions has become paramount. Our e-portal project, titled “Legal LinkHub,” is designed to
revolutionize the way individuals and legal professionals engage with the legal system. “Legal LinkHub” offers
a comprehensive suite of features, including a rich repository of articles for case awareness, an innovative pre-
trial conferencing platform, automated email and SMS generators for seamless communication and reducing
Pending cases, and a guided pathway to determine the appropriate court for specific cases. The core objective of
“Legal LinkHub” is to streamline and demystify the often complex and intimidating legal process, empowering
users to make informed decisions about their legal matters. By leveraging technology to provide transparency
and accessibility, we aim to bridge the gap between legal professionals, the judiciary, and the public. “Legal
LinkHub” is not just an e-portal, it is a transformative tool that enhances legal literacy, and promotes fair and
efficient decision-making. This provides a glimpse of the comprehensive case management capabilities “Legal
LinkHub” offers, addressing the growing demand for accessible and modernized legal services. The project’s
main features are its mission to simplify legal proceedings and its commitment to promoting fairness and effi-
ciency within the legal system. It gives readers an overview of the e-portal’s significance and purpose, encourag-
ing them to explore the full project synopsis for more details.
Keywords: pre-trial conferencing platform, automated email and SMS, guidance on Court Selection
DOI: 10.1201/9781003606635-86
E-portal for case management and hearing 611
technologies like React.js for an interactive and make the legal system more efficient in
user interface. The platform makes use of Kenya..
MongoDB Server, a relational database man- Meka et al. (2023): The government’s
agement system, to guarantee data efficiency digital initiatives with the vision of Dr. B.R.
and integrity, especially because legal data Ambedkar, who dedicated his life to eliminat-
is structured. We improved communication ing social injustices. The digital revolution is
with users through integration with third- contributing to the realization of Ambedkar’s
party services like SendGrid for email and dream of a more equitable and opportunity-
Twilio for SMS. This allows for effective mes- rich India. The author’s expertise and com-
saging and notifications. “Legal LinkHub” mitment to social justice lend credibility to
uses the video conferencing service Zoom to this connection. This paper underscores how
enable efficient pre-trial conferences, a func- technology can accelerate progress toward
tion that can expedite correspondence and Ambedkar’s vision of equality, liberty, and
prompt resolution of disputes. Passport.js for equal opportunity in India.
Node.js’s strong user authentication guar- Aboelazm et al. (2022): The study con-
antees safe access control and data security. cludes that the integration of an e-justice sys-
Thus, “Legal LinkHub” is at the forefront of tem has the potential to significantly enhance
technological innovation, committed to offer- the efficiency of the judicial process, especially
ing a safe, intuitive, feature-rich platform that within the framework of the Egyptian Council
completely transforms the legal awareness of State. It underscores the pressing need for
and case management space. tailored strategies to address the challenges
specific to the implementation of e-justice in
the Egyptian economic courts, thereby ensur-
2. Literature Survey ing a seamless transition towards a more
Syroka et al. (2023): The article empha- technologically driven legal landscape.
sizes how important it is to change Fed-
eral Criminal Rule 53 to accommodate the
demands of the legal system and the changing 3. Methodology
legal technology environment. The CARES In the context of the “Legal LinkHub” pro-
Act, which introduced the expiring permis- ject, the criteria for selecting the literature are
sion for virtual criminal proceedings, empha- carefully crafted to ensure the sources chosen
sizes the usefulness of using phone and video are highly pertinent and reliable. The primary
conferencing during criminal trials. By alter- criterion is relevance, with a focus on litera-
ing Rule 53. We can improve defendants’ ture directly related to the legal sector, tech-
access to justice and advance the cause by nology in law, e-portals, case management,
adjusting to these technologies. Criminal and legal awareness. Recency Citationisinprioritized
Text:
dockets’ effectiveness. "as shown
to align the chosen literature with the in current
Figure
Ochieng et al. (2023): The introduction of 86.1."
state of the field, typically encompassing the
virtual court proceedings in Kenya, prompted last five years, reflecting the rapidly evolv-
by the COVID-19 pandemic, has significantly ing nature of technology and the legal sector.
improved access to justice. It has enabled vul- The incorporation of diverse perspectives,
nerable groups like expectant mothers and case studies, and sources addressing techno-
persons with disabilities to participate with- logical aspects, user authentication, security,
out physical presence, ensuring privacy and legal challenges, and potential solutions col-
protection in sensitive cases. The implemen- lectively constitute the comprehensive criteria
tation of ICT services and e-filing further that guide the literature selection process for
demonstrates the commitment to modernize “Legal LinkHub.” The process of searching,
612 Innovations in Computational Intelligence: Trends and Technologies
using JSON Web Tokens. After authentica- research gaps remain to be explored to
tion, it gave users access as needed. further strengthen the project, it is para-
Video Conferencing: The e-portal uses a mount to conduct a comprehensive anal-
set of technology tools to make video meet- ysis of the effectiveness of automated
ings possible for legal matters. This helps to communication in reducing the backlog of
reduce pending cases, the e-portal is inte- pending legal cases. This research should
grated with the Zoom app. encompass not only the rate of response
Court Selection: The e-portal provides a but also delve into the actual outcomes of
Court Selection feature based on the Infor- cases where these tools are employed.
mation provided by the users. By assisting C. Providing automated SMS notifications
users in selecting the best court for their par- for pre-trial dates is a valuable and prac-
ticular case, this tool simplifies the procedure tical feature that can significantly ben-
and eliminates needless complications. efit individuals involved in legal cases. It
Articles for Legal Education: Showcase helps ensure that they are well-informed
less-known laws that might fascinate cli- about their court dates and reduces the
ents, alongside explanations of complex legal likelihood of missing important appoint-
ideas to help them better understand the ments. Pre-trial support, legal awareness,
legal world. This approach can offer valuable and assistance in making informed deci-
information to individuals in search of legal sions about choosing the right court offer
understanding. a multifaceted approach to improving the
Auto-email and SMS generator: Our legal process.
platform integrates with third-party service D. Unlike traditional case management sys-
Twilio for SMS and SendGrid for email to tems, ‘Legal LinkHub’ doesn’t just focus
implement auto-mail and SMS generators, on procedural aspects but also provides a
ensuring efficient and reliable communica- wealth of educational content. The repos-
tion with our users, for the next upcoming itory of articles enhances case awareness,
date for the case hearing. making legal information accessible and
understandable for users.
5. Critical Analysis
A. In contrast to existing projects focused 6. Conclusion
on legal pre-trial conferencing and legal With its extensive feature set and array of
awareness, your website offers a distinc- resources, our e-portal for case manage-
tive approach by introducing automated ment hearings is a ground-breaking solution
email and SMS systems designed to expe- that seeks to completely transform the legal
dite the resolution of pending legal cases. industry. This was created in response to the
This addition represents a significant leap urgent need for effective, knowledgeable, and
forward in the effort to streamline legal approachable legal tools. Our case manage-
processes and enhance legal awareness ment hearing e-portal is a comprehensive
among the public. solution that aims to improve the legal sys-
B. Our project stands out for its integra- tem in several ways. Its goal is to advance
tion of automated communication tools, accessibility, effectiveness, and transparency
which can potentially lead to swifter case in the legal field. Our mission is to empower
resolutions and increased legal knowl- users to make informed decisions, expedite
edge among individuals, ultimately con- case management, and ultimately contribute
tributing to a more efficient and informed to a just and equitable legal system by fus-
legal system. However, several pertinent ing practical tools, educational resources, and
614 Innovations in Computational Intelligence: Trends and Technologies
decision support. Our e-portal will continue Department of Computer Science and Engi-
to be developed and expanded, and we are neering) at Babu Banarasi Das Institute of
dedicated to our goal of enhancing everyone’s Technology and Management, Lucknow for
access to, comprehension of, and fairness in their constant support and guidance through-
the legal system. Legal experts and knowl- out our work. Their sincerity, thoroughness
edgeable citizens, in our opinion, are better and perseverance have been a constant source
suited to promote justice and effect construc- of inspiration for us. It is only through their
tive change. cognizant efforts that our endeavors have
seen the light of the day. We also do not like
to miss the opportunity to acknowledge the
7. Future Scope contribution of all faculty members of the
In envisioning the future development of department for their kind assistance and
your e-portal for case management hearings, cooperation during the development of our
several promising directions emerge. These project. Last but not least, we acknowledge
avenues hold the potential to further enhance our family and friends for their contribution
the effectiveness and reach of your platform. to the completion of the project.
Expanded Legal Resource Library: Con-
sider augmenting your e-portal with an exten-
sive legal resource library, going beyond mere References AQ2:
Please
articles. Incorporate multimedia content, [1] Benjamin Syroka (2023) Amending Federal provide
Criminal Rule 53 for Virtual Criminal Hear- reference
comprehensive guides, and interactive tools in-text
that educate users on various legal aspects. ings, Federal Bar Association Litigation Sec- citation
These resources can cover not only case tion Newsletter. for all
awareness but also legal procedures, rights, [2] Ž Kešetović, K Radojević—Култура полиса references
(Kultura polisa) (2023), Crisis Communi-
and responsibilities, making your e-portal a
cation at the Local Level—A Case Study
comprehensive legal learning hub. of Novi Pazar, International Journal of
Multilingual and Global Reach: Consider Advanced Research in Computer Science.
expanding the multilingual support of your [3] Alexandra Akinyi Ochieng (2023) Reform-
e-portal to cater to an international audience. ing Virtual Court Sessions in Kenya to
Make your platform adaptable to diverse Enhance Access to Justice: Addressing the
legal systems and languages, ensuring its util- challenges, Alternative dispute resolution.
ity transcends geographical boundaries. [4] James Stephen Meka (2023) Digital India
Social and Community Features: Integrate - Ambedkar’s Vision and Modi’s Provision,
social and community features to encourage Journal of Engineering Sciences.
user interaction and support. Users can con- [5] Helen Taylor Dirk Van Rooy, Lorana Bar-
nect, share experiences, and seek advice from tels (2023) Digital justice: A rapid evidence
peers and legal experts within the e-portal assessment of the use of mobile technol-
ogy for offender behavioural change,
community, fostering a sense of collaboration
International Journal of Social Research
and assistance. Methodology.
[6] Richard Heeks (2023) Digital inequality
Acknowledgment beyond the digital divide: conceptualizing
adverse digital incorporation in the global
It gives us a great sense of pleasure to present South, IJMIR.
the report of the B. Tech Project undertaken [7] Akshaya Kamalnath (2023) The future of
during B. Tech. Final Year. We owe a special corporate insolvency law: A review of tech-
debt of gratitude to Anurag Shukla (Assis- nology and AI-powered changes, Interna-
tant Professor) and Dr. Anurag Tiwari (Head, tional Insolvency review.
E-portal for case management and hearing 615
[8] Carolyn McKay and Kristin Macintosh [10] Tsz Ho Kwan (2022) Enforcement of the
(2022) Remote Court Proceedings in Nigeria: Use of Digital Contact-Tracing Apps in
Justice Online or Justice on the Line, Inter- a Common Law Jurisdiction, Healthcare
national Journal for Court Administration. Organization.
[9] Awaludin Marwan, Fiammetta Bonfigli [11] Dr. Karem Aboelazm (2022) The Role of
(2022) Detection of Digital Law Issues and Digital Transformation in Improving the
Implication for Good Governance Policy in Judicial System in the Egyptian Council of
Indonesia, Bestuur. State, Scientific Foundations of Digital Gov-
ernance and Transformation.
87 Enhancing electoral processes: The role
of “Smart Voting Systems”
Madhulika Sharmaa, Anuj Singhb, and Gulshan Varshneyc
Computer Science and Engineering, Babu Banarasi Das Institute of Technology and Management,
Lucknow, India
Abstract: This research scrutinizes the emergence and impact of Smart Voting Systems within contemporary
democratic structures. It offers a comprehensive evaluation of these systems, dissecting their functionality, secu-
rity measures, and inclusive potential. Delving into various models incorporating cutting-edge technologies like
blockchain, biometrics, and artificial intelligence, the study explores their pivotal role in augmenting transpar-
ency and facilitating broader access to electoral processes Through in-depth case studies and meticulous analy-
sis, this paper unveils the multifaceted implications of Smart Voting Systems, shedding light on their capacity to
bolster democratic integrity while navigating intricate concerns surrounding privacy, cybersecurity, and ethical
considerations. By advocating for a balanced approach, emphasizing the critical attributes of integrity and inclu-
sivity, the research advocates for a pathway forward in refining future electoral technologies.
DOI: 10.1201/9781003606635-87
Enhancing electoral processes: The role of “Smart Voting Systems” 617
voting methods, such as ballot tampering and 5. Transparency Measures: The system
miscounting, reducing the likelihood of dis- maintains transparent records of all votes
putes and reinforcing the robustness of the cast, allowing for auditing and verifica-
electoral process. tion. This transparency safeguards the
In essence, the significance of smart vot- integrity of the election process and ena-
ing systems lies in their capacity to safeguard bles scrutiny if necessary.
democratic principles of fairness, accuracy, 6. Robust Security Measures: To safeguard
and accessibility while leveraging technology against cybersecurity threats, the sys-
to overcome challenges, ultimately strength- tem employs strong security protocols,
ening the democratic framework of a nation. encryption algorithms, and undergoes
regular security checks. These measures
prevent unauthorized access or tampering
2. Methodology with the voting data.
The methodology behind a smart voting sys- 7. Continuous Enhancement: Post-election,
tem involves a systematic approach using the system is evaluated to identify areas
advanced technology to conduct secure and for improvement. Continuous refinement
efficient elections. It encompasses several key ensures the system remains robust and
elements: aligns with evolving technological and
security standards.
1. Biometric Verification: Initially, eligi-
ble voters are registered into a database, In essence, the methodology of a smart
where their unique biometric data, like voting system centers on utilizing biometric
fingerprints or facial characteristics, is verification, secure database management,
securely stored. During voting, this data user-friendly interfaces, real-time validation,
is utilized to authenticate the voter’s iden- transparency, stringent security measures,
tity, ensuring only authorized individuals and continual evaluation. This collective
can cast their votes. approach ensures the conduct of secure, effi-
2. Secure Database Management: All cient, and credible electoral processes.
enrolled biometric information and voter
records are stored in a central database
with robust security measures in place. 3. Thematic Overview
Encryption methods safeguard this sensi- The Smart Voting System is an innovative
tive data, preventing unauthorized access approach designed to transform the electoral
or manipulation. process fundamentally. It utilizes sophisti-
3. User-Friendly Interfaces: The system cated biometric technologies, such as fin-
is designed with intuitive interfaces to gerprint and facial recognition, to validate
facilitate smooth interactions for vot- voters’ identities, thereby ensuring legitimacy
ers. Whether it’s the registration process, and deterring fraudulent practices like iden-
identity verification at polling stations, or tity theft or multiple voting attempts.
electronic voting, user-friendly interfaces Its methodology comprises essential ele-
ensure a seamless experience. ments: a secure repository that safely stores
4. Real-Time Validation: Instant validation encrypted biometric data, user-friendly inter-
of a voter’s identity occurs by cross-ref- faces for simplified voter interaction, real-
erencing their biometric data with the time validation of voter identities during the
stored records. This swift validation mini- voting phase, and the maintenance of trans-
mizes waiting times and ensures accurate parent records for verification and audit
authentication during the voting process. purposes.
Enhancing electoral processes: The role of “Smart Voting Systems” 619
The system places a strong emphasis on 4. Privacy and Data Protection: Storing
security, employing stringent measures to biometric data centrally raises privacy
safeguard against unauthorized access and concerns. Safeguarding this sensitive
manipulation of voting data. Ongoing evalu- information from unauthorized access or
ations and upgrades are integral to maintain- misuse is crucial, balancing security with
ing the system’s strength and aligning it with privacy and adhering to data protection
evolving technological standards. regulations.
In essence, the Smart Voting System 5. Implementation Challenges: High costs
strives to enhance the accuracy, security, associated with implementation pose
transparency, and inclusivity of elections. challenges, particularly for regions with
Through technology and rigorous secu- limited resources. Proper training for elec-
rity protocols, it aims to build trust in the tion officials and educating voters about
democratic process, encouraging higher the system’s use are essential but could
participation and upholding the integrity of pose logistical hurdles.
election outcomes. 6. Building Trust and Transparency: Ensur-
ing public trust requires transparent com-
munication about the system’s operations,
4. Critical Analysis data handling procedures, and security
The introduction of the smart voting system measures. This transparency is crucial to
marks a significant evolution in electoral dispel doubts about fairness and transpar-
methodologies. However, a critical analysis of ency in elections.
its implementation and functionality reveals 7. Risk of Voter Apathy: Excessive reliance
various aspects that require scrutiny: on technology might lead to voter dis-
engagement or skepticism if individu-
1. Enhanced Security: Employing biometric als mistrust the system’s integrity or feel
authentication like fingerprints and facial disconnected from the traditional voting
recognition boosts security by preventing process.
fraudulent activities. Yet, the system isn’t
immune to potential vulnerabilities. Con- In summary, while the smart voting system
cerns persist about the security of stored promises improvements in accuracy, secu-
biometric data, raising questions about rity, and efficiency, it demands a thorough
the overall system’s resilience against approach to address challenges related to
hacking or data breaches. security, accessibility, privacy, reliability, cost,
2. Accessibility Challenges: While aiming to trust-building, and inclusivity to ensure its
streamline voting, accessibility for diverse successful and equitable integration into elec-
demographics, especially those with lim- toral processes.
ited technological proficiency or physical
disabilities, remains a concern. Ensuring
equitable access and inclusion for all vot- 5. Recommendations For Future
ers is crucial. Research
3. Reliability on Technology: Dependence 1. Privacy-Preserving Biometrics: Investigate
on technology raises reliability issues. techniques that enable biometric verifi-
Technical malfunctions, system failures, cation without storing complete biomet-
or cyber threats could disrupt elections ric data. This could involve methods like
and compromise results. There’s a need zero-knowledge proofs or encryption,
for robust contingency plans to address enhancing security while preserving sensi-
potential technological breakdowns. tive information.
620 Innovations in Computational Intelligence: Trends and Technologies
[2] V. Laxmi Vashisht, H. Mohan and S. Prakash, [5] “Secured E-voting System Using Two-factor
“Smart Voting System Through Face Recog- Biometric Authentication,” 2020 Fourth
nition,” 2022 4th International Conference International Conference on Comput-
on Advances in Computing, Communica- ing Methodologies and Communication
tion Control and Networking (ICAC3N), (ICCMC), Erode, India, 2020.
Greater Noida, India, 2022. [6] Hemlata Sahu and Anupam Choudhray,
[3] S.A anjana devi, Dr.V.Palanisamy and “Polling System Using GSM S. Komatineni
R.Anandha Jothi, A Study on Secure Online and G. LingalaFacility”, International Jour-
Voting System using Biometrics Face Detec- nal of Scientific and Engineering Research,
tion and Recognition Algorithms, Interna- vol. 2, no. 10, Oct 2011.
tional Journal for Modern Trends in Science [7] R. Kaur and E. Himanshi, “Face recognition
and Technology, August 2017. using Principal Component Analysis”, 2015
[4] G. Revathy, K. Bhavana Raj, Anil Kumar, IEEE International Advance Computing
Spurthi Adibatti, Priyanka Dahiya, T.M. Conference (IACC), 2015.
Latha, Investigation of E-voting system [8] X. Zhao and C. Wei, “A real-time face recog-
using face recognition using convolutional nition system based on the improved LBPH
neural network (CNN), Theoretical Com- algorithm”, 2017 IEEE 2nd International
puter Science, 2022. Conference on Signal and Image Processing
(ICSIP), 2017.
88 Advancements in rainfall prediction
systems: A comprehensive review of
techniques and models
Adarsh Vishwakarma1, Ankit Khare2, Amit Verma1, and
Aditya Pandey1
1
Department of Computer Science and Engineering, Babu Banarsi Das Institute of Technology and
Management, Lucknow, India
2
Asssistant Professor, Department of Computer Science and Engineering, Babu Banarsi Das Institute
of Technology and Management, Lucknow, India
Abstract: This literature evaluation critically examines the advances in rainfall forecasting systems, offer-
ing comprehensive insights into strategies and fashions The look at of increasing excessive weather occasions
addresses the instantaneous want as rainfall of accurate and timely forecasting addresses and consists of syn-
thesizing current studies, figuring out gaps Having achieved so, by using critically examining the strengths
and limitations of the numerous strategies, research this is meant to significantly make a contribution to the
improvement of ongoing rainfall forecasting systems.
Keywords: Cloudburst prediction, Extreme precipitation, Meteorological data, Modeling techniques, Statistical
models, Physical models, Hybrid models, ML models, DL
DOI: 10.1201/9781003606635-88
Advancements in rainfall prediction systems: A comprehensive review of techniques and models 623
2.1. Parameters/Variables used in
modeling
1. Independent Variables or Predictors:
These predictors_included_ various other
Meteorological (Temperature, Humidity,
Pressure and wind variables) and Geo-
graphical variables (Latitude _and_ Lon-
gitude, Altitude/Elevation). The variables
such as Temperature, wind and humidity Figure 88.1. Correlation matrix of major AQ1:
have been further subdivided into variables Parameters. Please
like surface temperature, air temperature, Source: provide
AUTHOR'S SELF GENERATED source
for all the
figures
624 Innovations in Computational Intelligence: Trends and Technologies
occurrences. ML models leverage CAPE data In the past, several data-driven modeling
for accurate predictions [2]. approaches have been investigated to per-
Radar Reflectivity and Rainfall Rates: form such forecasting tasks as multilayer per-
Real-time radar data, especially spikes in ceptron neural networks (MLP-NN). In fact,
reflectivity or extreme rainfall rates, provides the rainfall time series modeling (SARIMA)
essential information for ML models to iden- involves important temporal dimensions. In
tify the intensity and likelihood of cloudburst order to evaluate the incomes of both models,
events accurately [3]. statistical parameters were used to make the
Atmospheric Instability Indicators: Param- comparison between the two models. These
eters related to temperature gradients, humid- parameters include the Root Mean Square
ity levels, and pressure changes serve as key Error RMSE, Mean Absolute Error MAE,
markers of atmospheric instability, guiding Coefficient of Correlation CC and BIAS [4].
ML models in predicting convective storms Till 2018, machine learning methods have
and potential cloudburst events [2]. significantly improved flood prediction accu-
Satellite Observations: Real-time satellite racy and efficiency, with hybridization, data
data on cloud cover, moisture content, and decomposition, algorithm ensemble, and
convective cloud development significantly model optimization being key strategies for
enhance ML models’ accuracy in predicting improving models [1].
cloudbursts by providing crucial insights into Later we found that The SVM model is
atmospheric conditions [4]. more efficient and accurate than the WRF
While these parameters are frequently and ANN models in short-term rainfall, air
being used in cloudburst prediction models, temperature, and flood forecasting [6].
achieving the highest accuracy often involved Among all regression techniques, we also
a combination of multiple variables and found that Lasso regression is the most accu-
sophisticated machine learning algorithms. rate machine learning model for predicting
The relationships and interactions between rainfall, improving agriculture, coastal plan-
these parameters, when properly modeled ning, and water scarcity management [5].
and integrated into predictive models, con- Till today, the ANN model is the most reli-
tribute significantly to enhancing the accu- able and accurate method for assessing flood
racy of cloudburst predictions [1]. hazard risk, aiding decision-makers in con-
Figure 88.1 shows Correlation between structing mitigation strategies [3].
major different Parameters used for Rainfall Within DL scope, we found out Wavelet-
prediction [1]. LSTM and convolutional LSTM models are
superior alternatives for monthly stream flow
2.3. ML models used in heavy and rainfall forecasting, outperforming multi-
layer perceptron and LSTM models [4].
rainfall prediction and flood
prediction
Rainfall is considered as one of the major
components of the hydrological process; it
takes significant part in evaluating drought
and flooding events. Therefore, it is impor-
tant to have an accurate model for rainfall
prediction [3].
MLP-NN and SARIMA models show
promise for accurate rainfall prediction, with Figure 88.2. Accuracy and time limitations of
MLP-NN showing better performance than ML models in cloudburst prediction.
SARIMA [4]. Source:
AUTHOR'S SELF GENERATED
Advancements in rainfall prediction systems: A comprehensive review of techniques and models 625
Deep Reinforcement Learning (DRL): The techniques that are more efficient to obtain
application of deep reinforcement learning, predicted results with minor error between
which has shown success in dynamic deci- measured value and standard set.
sion-making processes, can be explored. DRL Therefore it is critical to understand the
models can adapt and optimize prediction challenges of these methods are to identify
strategies based on feedback from the envi- the appropriate technology, sensitivity of fac-
ronment, making them suitable for the evolv- tual processes, and dependence on substance
ing nature of cloudburst events. treatment. The primary goal of this research
Quantum Computing Applications: With is to examine the data to predict rainfall bet-
the emergence of quantum computing, explor- ter than current models. Its design should
ing its potential applications in meteorologi- be simple so that it can be easily tested and
cal modelling is an exciting avenue. Quantum verified.
algorithms could handle complex simulations
and computations more efficiently, opening
up new possibilities for accurate and rapid Refrences
cloudburst predictions. [1] Saranagata Kundua, Saroj Kr. Biswas, Deek-
Explainable AI in Physical Models: Incor- sha Tripathi, Rahul_Karmakar, Sounak
porating explainable AI techniques into Majumdar, Sudipta Mandal (2023) Rain-
physics-based models is crucial for enhanc- fall_forecasting_using ensemble learning
ing their interpretability. This ensures that techniques.
[2] Nafsika Antoniadou, Hjalte Jomo Dan-
insights gained from these models can be eas-
ielsen Sørup, Jonas Wied Pedersen, Ida Bu¨
ily communicated to stakeholders, facilitat- low Gregersen, Torben Schmith,Karsten
ing informed decision-making the future of Arnbjerg-Nielsen (2023) comparison of
cloudburst prediction research lies in a mul- data-driven methods for linking extreme
tidimensional approach that integrates the precipitation events to local and large-scale
latest machine learning models while explor- meteorological variables.
ing alternative strategies. The recommenda- [3] India Prabhash K. Mishra, Renoj J. Thayyen,
tions outlined above provide a roadmap for Hemant Singh, Swagatam Das, Manish K.
researchers to delve into cutting-edge tech- Nema, Pradeep Kumar (2023) assessment of
niques and alternative models, ensuring the cloudbursts, extreme rainfall and vulnerable
continuous evolution and improvement of regions in the Upper Ganga basin, Uttara-
cloudburst prediction systems. khand, India.
[4] Francesca Fallucchi, Riccardo Scano and
Ernesto William De Luca (2021) Machine
6. Conclusion learning models applied to weather series
analysis.
The work we are doing is focus toward devel- [5] Sivagami M., Radha P. and Balasundaram
oping a model that can predict the cloudburst (2021). Sequence Model based Cloudburst
events. We will use the dataset of cloudburst Prediciton.
event that has occur between 2010 to 2023. [6] Kavita Pabreja (2012) Clustering technique
Many researchers prediction has received for Interpretation of Cloudburst over Leh.
attention from previous researches the col- [7] Roberta Avanzato and Francesco Beritelli
lected data should be analyzed and trained (2020) An Innovative Acoustic Rain Gauge
adequately to be tested by collective learning Based on Convolutional Neural Networks.
89 FindServ
Mayank Srivastavaa, Pratibha Dixitb, Adarsh Vermac, Sadaf Alid
Department of Computer Engineering and Applications, GLA University, Mathura, India
Abstract: Identifying missing persons and returning them to their families has become a universal problem. A
variety of research publications are reviewed in this paper. Each existing mechanism has advantages and disad-
vantages. However, the issues related to repatriation of missing persons are still not 100% resolved. Computing
technology has evolved in recent years and includes many variations that can be used in virtually every field.
Every day, significant numbers of people go missing around the world, including children, young people, the
mentally ill, and the elderly with Alzheimer’s disease. It is estimated that over 500 missing person concerns go
un-resolved in India every day. Facial recognition technology has become increasingly important over the past
decades. A facial recognition system is a computer application that uses digital images or video frames from a
video source to recognize or verify a person’s identity. This technology finds widespread use across different
industries and scenarios. Artificial intelligence has played a significant role in advancing facial recognition tech-
nology and solving modern-day problems. The proposed mechanism for facial recognition has been successfully
implemented, achieving 90% accuracy compared to 59% using ANN and 43% using SVM with PCA. This
system uses image segmentation, PCA, KNN, feature extraction, and SVM.
a
[email protected]; [email protected]; [email protected]; dsadaf.ali_cs19@
gla.ac.in
DOI: 10.1201/9781003606635-89
FindServ 629
lot of unanswered questions and no definitive stage. The testing process was divided into
findings. two parts, where the first part involved the
KNN method, and the second part involved
the double-distance method H. Li, Roivainen,
2. Related Work and Forchheimer (1993).
The principal component analysis (PCA) tech-
nique for feature extraction and K -Nearest
neighbors (KNN) for classification has been 3. Proposed Model
utilized. In the past, efforts were made to The goal of this paper is to make it easier for
develop a face recognition system that could the police and higher-ups to find missing peo-
perform multiple tasks. One of the experi- ple promptly. Investigation is typically used to
ments performed is described in the jour- search down a person, and it takes time and
nal article Mantoro, Ayu, et al. (2018). The expertise (to ask right questions). The investi-
proposed face recognition method utilizes a gative process generally yields positive results,
hybrid approach of Cascades and Eigenfaces, although it takes a lot of time and may fail if
enabling it to recognize 55 faces in a single the missing individual has been relocated to
recognition step. Various phases of image pre- a new place (city/country). Examining CCTV
processing, such as training data, grayscale footage and other supporting documentation
transformation, and preprocessing with Cas- is the best course of action in such situations.
cade, are employed to ensure accurate recog- Again, this can take a lot of time, and consid-
nition of faces Brunelli and Poggio (1993). ering how many individuals go missing every
Other research examples are listed in the day, it can be difficult to keep up with.
journal entitled Rachmawanto, Anarqi, Sari, Our proposed method (Figure 89.1)
et al. (2018) put the research forth a mul- for improving facial recognition accuracy
tistage recognition process that involved involves utilizing KNN and Face Encoding.
thresholding, denoising, and clipping prior To begin, the KNN algorithm is tested using
to feature extraction and classification. The
dataset was divided into training and test
data, with feature extraction being a crucial
step in the process. Methods used are Eccen-
tricity and Metric. The KNN method was
used for object classification based on the
closest distance to the training data, utilizing
the Euclidean distance formula in this study.
The paper reported an accuracy of 85.38%
for recognition using eccentricity and metric
feature extraction with KNN.
Another study proposed a new method for
improving recognition accuracy by in- cor-
porating outliers in the data, known as the
double distance method, which was com-
bined with the k=1 KNN method as the
center of speech recognition. The method
AQ1:
comprised of a training process with mel- Please
frequency-cestrum coefficients (MFCC) for provide
feature extraction and a testing process that Figure 89.1. Basic working flowchart of source
proposed model. for all the
utilized the KNN method in the introduction figures
Source:
AUTHOR'S SELF GENERATED
630 Innovations in Computational Intelligence: Trends and Technologies
a dataset of labelled facial images, with the vector machines (SVM), convolutional neural
Face Encoding being used to extract features networks (CNN), and principal component
from the gray scale image of different face analysis (PCA). Our research showed that
expression of the dataset. These features are our recommended strategy, which used KNN
then inputted into the KNN algorithm. Once and Face Encoding, performed better than the
the KNN model is trained, it can be used to other algorithms, obtaining an accuracy of
classify new facial images by identifying the 87.7%. SVM method accuracy was 85.8%,
K nearest neighbors and assigning the new CNN algorithm accuracy was 84.3%, and
image to the majority class. In order to assess PCA algorithm accuracy was 81.2%. Finally,
the efficacy of our suggested approach, we our proposed work shows encouraging out-
conducted tests utilizing random manual comes in improving the accuracy of facial
shots for training and testing Wiskott, Fel- identification using KNN and Face Encoding.
lous, Krüger, and Von Der Malsburg (2022). Future research could include experiment-
In conclusion, our proposed work presents ing with different K values, looking into the
promising results in enhancing the accuracy use of additional deep learning models for
of facial identification through the use of face encoding, and looking into the use of
KNN and Face Encoding. Future work may additional distance metrics. Face recognition
involve further experimentation with differ- technology is currently being used widely
ent K values, exploring the use of other deep for smart home security, gadget security, and
learning models for face encoding, and inves- other purposes. The biometric that will see
tigating additional distance metrics. Overall, the most growth over the next few years is
this approach to facial recognition has signifi- the face. Among many other types of biom-
cant potential for im- proving identification etrics, the use of the face for identification is
accuracy in various settings and revolution- seen to be successful and to pro-duce accurate
izing the security and surveillance industry P. results. Face recognition makes use of face
Li, Gou, and Yang (2017). characteristics for security. KNN is used in
this paper as the classification approach. The
KNN algorithm forecasts the value of a good
4. Implementation of Proposed instance value based on the neighborhood
Work classification. An instance-based learning
The model uses face encoding and KNN for group is part of KNN Zhao and Chellappa
facial recognition (Figure 89.2) and takes (1999).
manual shots as input and then the face the
features that were extracted from each image
in the dataset using Face Encoding are then
sent into the KNN algorithm (Figure 89.3).
Once the KNN model has been trained, it can
be used to categorize new facial images by
locating the K closest neighbours and placing
the new image in the class with the highest
percentage of members. We conducted trials
employing random manual shots for train-
ing and the remaining for testing in order
to assess the effectiveness of our suggested
strategy. We evaluated the performance of Figure 89.2. Training phase of face
our proposed method against several facial Identification.
recognition techniques, including support Source:
AUTHOR'S SELF GENERATED
FindServ 631
4.1. Variations in facial images detecting the face and accounting for lighting
variations, the performance of face recogni-
Recognizing human faces is a complex task
tion systems can be improved Kelly (1971).
in image recognition research due to the fact
that a human face is not just a three-dimen-
sional object, but also a soft body. Moreover, 4.2. K-nearest neighbor
facial photographs are commonly captured in KNN is a popular machine learning classifi-
natural settings, which can introduce various cation method. This algorithm is categorized
factors that make it difficult to accurately rec- as a supervised learning technique and can
ognize a face. These factors include changes perform both regression and classification
in lighting, facial expressions, and occlusion, tasks. Each class is taken to be a cluster, and
as well as interference from the background. each data point is taken to be a part of a clus-
As a consequence, the development of precise ter. Next, it is necessary to identify the cluster
and efficient face recognition systems remains centers and the data points that are associ-
a continuous research topic in this field. ated with each cluster. KNN needs to inde-
This means that both visual backgrounds pendently locate the centers of each cluster
and lighting situations can be very complex. since it performs an unsupervised classifica-
Various facial variants can be grouped into the tion. The process of assigning a data point to
following categories: Complex backgrounds, a cluster involves checking whether it belongs
complex lighting, transformations, rotations, to a label of the point remains consistent with
scaling and occlusion, facial emotions, cam- the previous round. This technique is widely
era sounds, makeup and hairstyles. Noise and used in clustering algorithms to group similar
camera distortion are common variations of data points together Dino and Abdulrazzaq
image recognition problems. Prior research- (2019); P. Li et al. (2017). The time com-
ers have devised numerous methods to plexity of the KNN Algorithm is calculated
enhance the signal-to-noise ratio, and for pre- based on the number of training examples
cise facial recognition, a reliable face detec- and the number of used features. The KNN
tor is crucial for differentiating the real face sample case image is particular cluster or not,
from the surrounding image., especially when and repeating the process until the shown in
dealing with complex image backgrounds. Figure 89.4.
Lighting is a common factor that can inhibit
the identification process. It is of great impor-
tance to create face recognition systems that
can accommodate changes in lighting condi-
tions to ensure accurate results. By accurately
Figure 89.3. Testing phase of face Identification. Figure 89.4. KNN sample case image.
Source: Source: AUTHOR'S SELF GENERATED
AUTHOR'S SELF GENERATED
632 Innovations in Computational Intelligence: Trends and Technologies
5. Result Analysis
Figure 89.6. Sample image.
Here, we have provided the result on multiple
Source:
conditions mentioned in the Table 89.1 based AUTHOR'S SELF GENERATED
on the Sample image displayed in Figure 89.6.
6. Conclusion References
The facial recognition technique is challeng- [1] Brunelli, R., and Poggio, T. (1993). Face rec-
ing but crucial. The facial recognition method ognition: Features versus templates. IEEE
has clear significant advantage over all other transactions on pattern analysis and machine
biometric technologies. This paper pro- intelligence, 15 (10), 1042–1052.
posed a KNN and PCA-based framework for [2] Dino, H. I., and Abdulrazzaq, M. B. (2019).
Facial expression classification based on
enhanced human face recognition. A training
svm, knn and mlp classifiers. In 2019 inter-
data set with discriminative patterns based on national conference on advanced science
correlations between the first training images and engineering (icoase) (pp. 70–75).
was helped by KNN and PCA. The recently [3] Kelly, M. D. (1971). Visual identification of
acquired Tabular dataset enabled KNN to people by computer. Stanford University.
converge more quickly and accurately. The [4] Li, H., Roivainen, P., and Forchheimer, R.
system was improved by incorporating vari- (1993). 3-d motion estimation in model-
ous distance algorithms, each demonstrating based facial image coding. IEEE transactions
better performance than the others in enhanc- on pattern analysis and machine intelligence,
ing the overall system. 15 (6), 545– 555.
634 Innovations in Computational Intelligence: Trends and Technologies
[5] Li, P., Gou, J., and Yang, H. (2017). The dis- [8] Sohail, A. S. M., and Bhattacharya, P. (2007).
tance-weighted k-nearest centroid neighbor Classification of facial expressions using
classification. J. Inf. Hiding Multim. Signal k-nearest neighbor classifier. In Computer
Process, 8 (3), 611–622. vision/computer graphics collaboration
[6] Mantoro, T., Ayu, M. A., et al. (2018). techniques: Third international conference,
Multi-faces recognition process using haar mirage 2007, rocquencourt, france, march
cascades and eigenface methods. In 2018 28-30, 2007. proceedings 3 (pp. 555–566).
6th international conference on multimedia [9] Wiskott, L., Fellous, J.-M., Kru¨ger, N., and
computing and systems (icmcs) (pp. 1–5). Von Der Malsburg, C. (2022). Face recog-
[7] Rachmawanto, E. H., Anarqi, G. R., Sari, C. nition by elastic bunch graph matching. In
A., et al. (2018). Handwriting recognition Intelligent biometric techniques in finger-
using eccentricity and metric feature extrac- print and face recognition (pp. 355–396).
tion based on k-nearest neighbors. In 2018 Routledge.
international seminar on application for [10] Zhao, W., and Chellappa, R. (1999). Robust
technology of information and communica- face recognition using symmetric shape-
tion (pp. 411–416). from-shading. Citeseer.
90 IoT devices security against common
threats
Mayank Srivastavaa and Prabudhb
Department of Computer Engineering and Applications, GLA University, Mathura, India
Abstract: Internet of Things (IoT) gadgets are subject to a number of protection vulnerabilities and attacks
because they are resource-constrained and diverse devices are networked to deliver multiple application tech-
nology. The functional design of a remote security management server is introduced in this project to improve
the protection and safe guard of IoT gadgets in the IoT ecosystem. The remote security management server inte-
grates and controls a variety of security functions in a systematic and integrated manner. As a result, numerous
infringement instances that may occur in the IoT environment may be avoided ahead of time, and harm can be
mitigated by enabling swift and effective responses even if a significant attack happens. We are using Raspberry
Pi for this project. For now, we are focusing on network security of interconnected-IoT devices from outer net-
work attacks such as “Man-In-The-Middle” attack and “Distributed Denial of service (DDoS)” attack. We are
further going to test our Openwrt firmware using Hping-active Network Security Tool.
Keywords: Countermeasures, DDoS, IoT devices, infringement, resource-constrained devices, remote security
[email protected]; [email protected]
a
DOI: 10.1201/9781003606635-90
636 Innovations in Computational Intelligence: Trends and Technologies
2.5. Palo Alto networks performed by the Mirai botnet proved. This
botnet was created to search the Internet
Using Palo Alto Networks’ IoT security solu-
for devices with inadequate security, such as
tion, offices, data centres, and other facilities
surveillance cameras, and get access to them
with IoT networks can protect their devices
by trying passwords as easy as “admin” or
from antagonistic traffic and potential intru-
”12345.” Mirai was able to acquire around
sions. It bills itself as a turn-key solution that
400,000 machines after doing more over 60
combines hardware and virtualized firewalls,
checks of login and password combinations
device identification utilities, and other tool-
E. Al-Shaer et al. (2005); Greenwald et al.
kits for transparency and security of unman-
(1996) If device makers forced customers to
aged IoT devices J. Zhang, Chen, Gong, Cao,
update their gadgets’ default passwords, this
and Gu (2019).
attack may have been averted Schuba and
Spafford (1997). As a result, corporate execu-
2.6. First point tives must be cautious that IoT devices like
FirstPoint is a device-agnostic automat- security cameras and thermostats might be
ing routine tasks security mechanism that used as attack vectors. Although the device
protects cellular IoT devices against threats does not contain any sensitive information, it
that originate within the cellular connection is most likely linked to a network that has
or communicate over the cellular network access to the company’s confidential data E.
Mahmoud et al. (2015). This assists mobile S. Al-Shaer and Hamed (2004); Yue et al.
network operators in protecting vulnerable (2009).
cellular-connected devices against the par-
ticular dangers that IoT devices encounter 3.2. Remote SSH access to IoT
on cellular networks, such as private LTE devices
and 5G networks Razzaq, Gill, Qureshi, and
Ullah (2017). All of the above given points The main reason you set up those IoT devices
are taken from various literature which are and linked them to the world wide web was
important keeping the factor of IoT security. to be able to monitor, track, and control them
from any place. For troubleshooting, con-
figuration upgrades, and other operational
3. Proposed Methodology duties, you may require access to those IoT
In this section we are going to discuss the dif- devices Abie and Balasingham (2012). A sen-
ferent methodologies that we have used for sor device placed hundreds of kilometers
remote security management server for IoT distant, for example, is having problems
devices: monitoring the manufacturing temperature.
To open and rapidly start a session with that simple to operate. It is the exact firewall that
sensor device, you can utilize secure remote is included in all Ubuntu releases. Firewalls
access tunnels Abie and Balasingham (2012). such as UFW are critical for preventing port-
You can reset the setup, erase logs history, based network assaults on devices like the
and relaunch the sensor device through that Raspberry Pi Mahmoud et al. (2015). Fire-
kind of session after you’ve detected the walls keep an eye on this data (delivered in
problems (for example, a misconfiguration or “packets”) to see if it’s safe. This is accom-
disc full error) Ma- lik et al. (2012). Tradi- plished by determining if the packets comply
tionally, troubleshooting would include send- with the established rules Mahmoud et al.
ing a professional to the plant the next day (2015). Data packets are allowed or refused
to inspect the sensor device. However, remote based on these rules.
access via secure tunnelling (via SocketXP) A simple built-in firewall is included
reduces issue response and recovery times as in most operating systems (computer and
well as operating expenses. However, acquir- mobile). Using a third-party firewall solution,
ing remotely access to IoT gadgets isn’t easy. on the other hand, frequently provides greater
To allow internet activity into the business control choices and more accurate outcomes.
network, users frequently take shortcuts and These can be purchased individually or as
execute rapid hacks on router/firewall set- component of a security package Tanaka,
tings Malik et al. (2012). Fujishima, Mimura, Ohashi, and Tanaka
(2016). Various automated technologies in
3.3. Automatic updation feature firewall programmes utilise whitelisting to
determine which apps should be allowed or
One of the biggest steps you can take to ensure denied internet access. Most people would
your security online is to keep the software find this to be even more time intensive to
on your devices up to date and install any execute manually Tanaka et al. (2016).
software updates that come out Z.K. Zhang
et al. (2014). This advice doesn’t just apply
to your computers and phones, but also IoTs 3.5. Brute force detection system
devices like a Raspberry Pi or BeagleBone A brute force attack includes predicting sign-
Black. Luckily this is an easy process with the in credentials, cipher keys, and finding a con-
help of one important software package. If cealed information by try and test method.
you’re running Raspberry Pi-OS, your firm- Attackers attempt all possible groups in the
ware options are limited to what’s offered desire of producing the correct combination
by the Raspberry Pi Foundation. Using this Tanaka et al. (2016). IT managers shall force
process, you’ll be updating the operating sys- precise password regulations with smallest
tem as well as the firmware to the latest stable size and difficulty standard in order to ensure
releases Mahmoud et al. (2015); Z.-K. Zhang passwords are rather challenging to discover.
et al. (2014). However feasible, multifactor identification
should be enabled Razzaq et al. (2017).
3.4. Firewall to limit network traffic Web Applications can utilize captchas to
prevent self- operating brute-force threats
Iptables is included with the Raspberry Pi OS Razzaq et al. (2017). Brute force threats to
installation by default, however it can be dif- RDP are often because it doesn’t record
ficult to set up and use. To get around this, unsuccessful sign-in trials. Some Live Reposi-
we’ll use UFW, a simpler firewall interface, tory and information regulations are rather
to install on our Raspberry Pi Mahmoud et weak to brute force assaults Radovici, Cris-
al. (2015). Uncomplicated firewall (UFW) is tian, and Serban (2018).
a firewall that is supposed to be extremely
IoT devices security against common threats 639
3.6. Turn-off unnecessary services time data that means it should be updated
regularly in order to function and give best
When it comes to computers, the term “ser-
output to the users properly and correctly. But
vices” refers to programs that monitor and
it is a hectic work to update regularly manu-
response to network data. Other providers
ally without any mistake, in order to achieve
give you full control over your machine. Pro-
this task, we need automatic update as soon
viding people unrestricted entry to our system
as a new update is available.
and documents J. Zhang et al. (2019). With-
There are various and unnecessary servers
out being at competing directly with Distant
are active through which your raspberry pi is
Shielding, Robert H. Perry and his Associates
connected to the internet which can be used by
says Covenant Private Protection firms are
the hackers to gain access to Iot devices and
forming electric protection departments and
enter into your network. So, you need to turn
partnering along firms which specialise at this
those off unnecessary servers. Firewall is one
particular field. Clients are switching safety
of the most important feature that any net-
people with electric protection and expanding
work related device should have installed and
protection scope with combining protection
activated. As IoT devices does not have its own
professionals or electric protection equip-
firewall to protect it from attacks like DDoS,
ment, according to the survey Mahmoud,
we will setup our own firewall with our rules
Yousuf, Aloul, and Zualkernan (2015).
to allow the network traffic. The first step is
The IoT Security is needed because in our
to install ufw firewall as in Figure 90.4. The
day to day life we are using many IoT devices
second step is to decide what type of traffic
and those devices must not become a weapon
would be allowed through our firewall. We
for the intrusion of our devices or network.
This paper focuses on developing secure IoT
system in which intrusion cannot take place.
4. Experimental Results
Figure 90.2 shows the security server con-
figuration for experimental work. One of the
basic rule to protect your account or data or
information from an unauthorized access is
to protect your user id and password against
brute force attack which is the most common
attack used by any attacker and to do so we
have to change our password from default
one or change your password on a regular
basis as shown in Figure 90.3. Also, to make
your account more secure, we should create
a new account instead of using the default
one. We should make our new account admin
and specify your privileges according to your
necessity. Secure shell (SSH) is a private net-
work protocol for information exchange
that is particularly helpful for command-line
remote operations and it is one of the main
features of IoT devices. So, enabling it is a Figure 90.2. Security Server Diagram.
must in any case. IoT devices work on real Source:
AUTHOR'S SELF GENERATED
640 Innovations in Computational Intelligence: Trends and Technologies
References
Figure 90.3. Changing Default Settings.
[1] Abie, H., and Balasingham, I. (2012). Risk-
Source: based adaptive security for smart iot in
AUTHOR'S SELF GENERATED
ehealth. In Proceedings of the 7th interna-
tional conference on body area networks
(pp. 269–275).
[2] Acharya, S., Wang, J., Ge, Z., Znati, T. F.,
and Greenberg, (2006). Traffic-aware fire-
wall optimization strategies. In 2006 ieee
international conference on communica-
tions (Vol. 5, pp. 2225–2230).
[3] Al-Shaer, E., Hamed, H., Boutaba, R., and
Hasan, M. (2005). Conflict classification
and analysis of distributed firewall policies.
IEEE journal on selected areas in communi-
Figure 90.4. Downloading Firewall. cations, 23 (10), 2069–2084.
Source: AUTHOR'S SELF GENERATED [4] Al-Shaer, E. S., and Hamed, H. H. (2004).
Modeling and management of firewall poli-
cies. IEEE Transactions on network and ser-
vice management, 1 (1), 2–10.
[5] Greenwald, M., Singhal, S. K., Stone, J. R.,
and Cheriton, D. R. (1996). Designing an
aca- demic firewall: Policy, practice, and
experience with surf. In Proceedings of inter-
net society symposium on network and dis-
tributed systems security (pp. 79–92).
[6] Lyu, M. R., and Lau, L. K. (2000). Firewall
Figure 90.5. Activating Firewall.
security: Policies, testing and performance
Source:
AUTHOR'S SELF GENERATED
IoT devices security against common threats 641
Abstract: The discipline of bio-sciences has advanced to a more noteworthy level, and electronic health records
have made immense volumes of information. Thus, there is a squeezing need to produce data from this mon-
strous measure of information in this area of bio-sciences. Persistent kidney disease (CKD) is a problem wherein
the kidneys become harmed and can never again channel blood as proficiently as they once did. CKD can be
brought about by a family background of renal illness, over the top circulatory strain, or type 2 diabetes. This
is a drawn-out kidney issue with a high gamble of deteriorating over the long run. Heart issues, iron deficiency,
and bone diseases are genuinely predominant outcomes of kidney disappointment. Potassium and calcium levels
are raised. In the worst imaginable situation, absolute renal disappointment happens, surviving requires a kid-
ney relocate. Quick distinguishing proof of CKD can upgrade one’s personal satisfaction fundamentally. This
requires the improvement of a dependable expectation framework to distinguish CKD at a beginning phase. A
wide scope of AI methods have been utilized to foresee CKD. This review predicts CKD utilizing information
readiness, information change, and a few classifiers, as well as proposing the ideal CKD expectation structure.
The system’s demonstrate that Random Forest Classifier ut-performs other classifiers for CKD forecast.
Keywords: Chronic kidney disease, decision tree support vectors, machine learning, random forest
DOI: 10.1201/9781003606635-91
Predict-a-disease: Survey 643
Bayes, and counterfeit brain organizations On the CKD datasets, the examination
to remove data and build a characterization looks to foster a datamining worldview for
model for foreseeing temporary times of Kid- information revelation. Countless CKD data-
ney sickness stages 3 to 5 utilizing the neces- sets are assembled. The typical information
sary arrangement of information. mining approaches of information arrange-
Vijayarani, Dhayanand, and Phil (2015) ment and preprocessing are utilized. To fore-
utilized SVM to foresee renal problems. The see the beginning stage of CKD, below three
review analyzed the exactness and execution AI techniques are utilized. Every calcula-
season of the two techniques referenced pre- tion’s viability is assessed. The methodology
viously. Misir, Mitra, and Samanta (2017) beneath produces a model with extraordi-
utilized highlight determination calculations nary accuracy.
to find an assortment of attributes that may
precisely foresee renal sickness. 3.1. Decision tree
Kidney impedance associated with diabe-
tes is a gradual relationship that has major One method for handling concerns with
consequences for the patient. High blood glu- backslide and gathering is the decision tree
cose levels make it challeng- ing for the kid- approach. The rationale for employing deci-
neys to appropriately work. Mary, Bharathi, sion tree is to select a model which can gener-
Vigneshwari, and Sathyabama (2019) basi- ate decision criteria based on available data.
cally used affiliation rule mining in order to The decision tree computation is organized
predict diabetes for a given dataset. Kama- like a tree, having leaves, branches, and roots.
lesh, Prasanna, Bharathi, Dhanalakshmi, and Leaf center points address class names, while
Aroul Canessane (2016) makes use of associ- inside center points address dynamic features.
ation rule mining for the risk prediction in the The Figure 91.1 below shows the result of
case of CKD. The bunching information min- Decision tree classifier.
ing approach was approved utilizing choice
hypothesis by Revathy, Parvathavarthini, and 3.2. Support vector machine (SVM)
Caroline (2016); Subramanion, Balasubra- SVM is a grouping and relapse model which
manian, and Noordeen (2017). can be applied to both direct and nonlinear
issues. In this methodology, information is
3. CKD Prediction using Machine grouped utilizing based upon a hyperplane. In
this technique, information or data is treated
Learning Models
Information revelation is a well-known data-
mining application that includes many han-
dling stages. Data-mining approaches are
simpler to send when information is pre-han-
dled from many sources. Information readi-
ness or pre-handling incorporates cleaning,
removing, and changing information into
usable arrangements. A greater list of capa-
bilities is utilized to distinguish the funda-
mental parts of information portrayal. For AQ2:
Please
information revelation, a few arrangement provide
or example appraisal techniques are then uti- Figure 91.1. Accuracy result of decision tree source
classifier. for all the
lized. Bharathi Mary et al. (2019) shows an figures
AI based general ailment expectation model. Source:
AUTHOR'S SELF GENERATED
Predict-a-disease: Survey 645
6. Conclusion
In this work, a methodology for anticipat-
ing CKD at a beginning phase was proposed.
The models were prepared and affirmed uti-
lizing input boundaries gathered from CKD
Figure 91.2. Accuracy results of Random Forest patients in the dataset. The Random Forest,
Classifier. Support Vector Machine and Decision Tree
Source:
AUTHOR'S SELF GENERATED
models are used to investigate CKD. The
646 Innovations in Computational Intelligence: Trends and Technologies
References
[1] Aljaaf, A. J., Al-Jumeily, D., Haglan, H. M.,
Alloghani, M., Baker, T., Hussain, A. J., and
Mustafina, J. (2018). Early prediction of
chronic kidney disease using machine learn-
ing supported by predictive analytics. In
2018 Ieee congress on evolutionary compu-
tation (cec) (pp. 1–9).
[2] Devika, R., Avilala, S. V., and Subramaniyas-
wamy, V. (2019). Comparative study of clas-
Figure 91.3. Numerical Distribution of Dataset. sifier for chronic kidney disease prediction
Source:
using naive bayes, knn and random forest. In
AUTHOR'S SELF GENERATED 20193rd international conference on com-
puting methodologies and communication
(iccmc) (pp. 679–684).
[3] Dulhare, U. N., and Ayesha, M. (2016).
Extraction of action rules for chronic kidney
disease using na¨ıve bayes classifier. In 2016
ieee international conference on computa-
tional intelligence and computing research
(iccic) (pp. 1–5).
[4] Kamalesh, M. D., Prasanna, K. H., Bharathi,
B., Dhanalakshmi, R., and Aroul Canessane,
R. (2016). Predicting the risk of diabetes
Figure 91.4. Part of the Training Dataset with mellitus to subpopulations using association
CSV Format. rule mining. In Proceedings of the interna-
Source: tional conference on soft computing systems:
AUTHOR'S SELF GENERATED
Icscs 2015, volume 1 (pp. 59–65).
[5] Kaur, G., and Sharma, A. (2017). Predict
chronic kidney disease using data mining
algorithms in hadoop. In 2017 international
conference on inventive computing and
informatics (icici) (pp. 973–979).
[6] Mary, S. P., Bharathi, B., Vigneshwari, S.,
and Sathyabama, R. (2019). Neural com-
putation based general disease prediction
model. Int. J. Recent Technol. Eng.(IJRTE),
8 (2), 5646– 5449.
[7] Misir, R., Mitra, M., and Samanta, R. K.
(2017). A reduced set of features for chronic
kidney disease prediction. Journal of pathol-
Figure 91.5. Models Comparison. ogy informatics, 8 (1), 24.
[8] Panwong, P., and Iam-On, N. (2016). Pre-
Source: AUTHOR'S SELF GENERATED dicting transitional interval of kidney dis-
ease stages 3 to 5 using data mining method.
different models are assessed by their assump- In 2016 second asian conference on defence
tion accuracy. According to the aftereffects of technology (acdt) (pp. 145–150).
the comparison, the Random Forest Classifier [9] Ravindra, B., Sriraam, N., and Geetha, M.
model beats Decision trees and Support Vec- (2014). Discovery of significant parameters
tor Machines in expecting CKD. in kidney dialysis data sets by k-means
Predict-a-disease: Survey 647
Abstract: Due to the absence of a central network authority and decentralized communication among mobile
hosts, mobile ad hoc networks are susceptible to several security issues. A well-known threat is the black hole
attack, in which malicious nodes purposefully trash packets they receive from other nodes. The work aims to
determine packet-dropping reasons by monitoring the nodes in communication and then designing the mecha-
nism to mitigate the attack. The proposed work extends the existing secure knowledge algorithm to accurately
detect and minimize black hole attacks. The effectiveness of the proposed mechanism performance compared
with existing secure knowledge algorithms against black hole attack mitigation in MANETs. Experimental
results confirmed the improvement in the network’s overall security.
DOI: 10.1201/9781003606635-92
Securing MANETs against black hole attacks: A novel approach using secure knowledge algorithm 649
and dependability. In literature, different to identify and mitigate black hole attacks
security mechanisms are designed to combat accurately. The effectiveness of the proposed
packet-dropping nodes, which are classified as mechanism performance compared with
credit-based, reputation-based, and acknowl- existing secure knowledge algorithms against
edgment-based methodologies [3–8]. The black hole attack mitigation in MANETs.
credit-based approach rewards the nodes for Experimental results confirmed the improve-
cooperative packet operation through a vir- ment in the network’s overall security. The
tual currency system. The system’s efficiency significant contributions of the proposed
is significantly impacted due to hardware pre- work are explained as follows;
requisites, leading to scalability problems [6].
Reputation-based systems determine the node 1. Secure Knowledge Algorithm Enhance-
behavior regarding packet operation through ment: Modifying the existing SKA routing
direct and indirect monitoring [7]. It solved protocol’s ability to identify and mitigate
the scalability problem, but the reason behind black hole attacks in MANETs accurately.
the packet dropping has not been determined. 2. Dynamic Defense Mechanism: This
Acknowledgment-based methods employ des- includes the status of the node resources,
tination-to-source acknowledgments to miti- such as residual energy and buffer sta-
gate packet-dropping nodes. The approach tus metrics, in the dynamic and adaptive
decrease routing overhead, displaying prom- defense mechanism, along with integrat-
ise with less memory and computational ing promiscuous monitoring.
demands. The existing ACK approaches are 3. Simulation-Based Validation: evaluate
ACK and AACK, each with distinct advan- and validate the performance of the pro-
tages and drawbacks regarding packet drop posed work in a network simulator with
mitigation. Thus, there is a requirement for different network scenarios in the pres-
an enhanced packet-drop prevention mecha- ence of a black hole attack, which con-
nism, which must determine the packet-drop firms the improvement in the network’s
reason along with packet-drop mitigation [8]. overall security compared to existing
The existing SKA algorithm specifies a protocols.
thorough answer via arbitrary monitor-
ing. This method continuously monitors the 2. Secure Knowledge Algorithm to
neighboring nodes regarding packet drop;
if it finds any node dropping the packet, it Minimize Black Hole Attack
determines the reason behind it. Thus, it MANETs enable decentralized communica-
determines whether the packet drop is mali- tion among mobile nodes without a fixed
cious or due to an error or fault in the system. infrastructure. However, their dynamic, peer-
However, it determines the reason for the to-peer, and self-organizing characteristics
packet dropping after the packet drop hap- make them vulnerable to security attacks,
pens up to some threshold value. The SKA particularly packet drops at the network layer
algorithm mitigates the attacks and improves by black holes. This work is an enhancement
MANET security, so it’s essential to keep of the existing SKA algorithm to identify
making changes and improvements to handle and accurately mitigate black hole attacks in
packet drop attacks effectively [5]. MANETs, where it determines the reasons
This paper analyzes the reasons for packet for packet drop.
loss in promiscuous mode and proposes a The proposed work used the AODV rout-
thorough approach for determining and com- ing protocol at the network layer, and it has
bating black hole attacks. We are modifying security vulnerabilities that make it easier for
the existing SKA routing protocol’s ability attackers to exploit it with black hole attacks.
650 Innovations in Computational Intelligence: Trends and Technologies
The attack attracts traffic towards it by send- node is deemed malicious or a black hole, this
ing information that it has best route to des- information is disseminated to notify other
tination, then drops the traffic. An enhanced nodes, allowing them to circumvent the com-
packet-drop prevention mechanism must be promised node in routing.
developed to determine the packet-drop rea- The work gives a comprehensive solution
son along with packet-drop mitigation while for accurately identifying and minimizing
mitigating black hole nodes. This work aims black hole attacks in MANETs. The algorithm
to improve the AODV using a secure knowl- includes the status of the node resources, such
edge algorithm to determine the packet-drop as residual energy and buffer status metrics,
reason and mitigation. in the dynamic and adaptive defense mecha-
Previous studies have explored a variety of nism, along with integrating promiscuous
approaches to counteract black hole attacks, monitoring [11]
including reputation-, credit-, and acknowl-
edgement-based tactics. Credit-based tech- 2.1. Technical implementation
niques motivate nodes, reputation-based
schemes depend on monitoring node behav- 1. Residual Energy Status:
ior, and acknowledgment-based approaches a. Calculate Eresidual The residual energy of
utilize confirmation messages. Nonetheless, the node using the following equation:
each methodology possesses distinct advan- Eresidual = Etotal – Econsumed
tages and drawbacks. This paper introduces a b. Assess Renery (residual energy ratio) as:
novel algorithm that combines the advantages Renery = Eresidual /Etotal
of multiple approaches to enhance black hole
2. Buffer Status:
attack detection and mitigation.
a. Determine Bremaining (remaining buffer
In our suggested approach, each node func-
capacity) as:
tions promiscuously, observing the packet
forwarding behavior of surrounding nodes. Bremaining = Btotal – Bused
The knowledge table held by each node con- b. Evaluate Rbuffer (buffer status ratio)
tains entries for the most recently forwarded using:
packet () and details regarding the surround- Rbuffer = Bremaining /Btotal
ing node (). Discrepancies between () and () 3. Integration into the Algorithm:
initiate an inquiry into possible black hole • The node updates the knowledge table
phenomena. values during promiscuous monitor-
The system guarantees thorough moni- ing of its neighbor, i.e., and
toring by analyzing both control and data • Updated values are compared with pre-
packets to avert the selective dropping traits defined thresholds to make dynamic
of black hole assaults. Furthermore, the decisions about the credibility of the
knowledge table includes metrics for residual nodes regarding packet operation,
energy, , and buffer state, , of adjacent nodes. mainly if these packet drops are mali-
Residual energy is computed as the ratio cious or have energy constraints and
of residual energy to total available energy, buffer overflow.
whereas buffer status is assessed by the ratio • Determine the nodes with the lowest
of remaining buffer capacity to total buffer values of or , as they are unintentional
capacity. packet-dropping nodes, broadcast the
Our approach integrates effortlessly with same information in the network
AODV [10], employing the lowest hop count
and maximum sequence numbers to identify Integrating these computations in the mon-
the optimal route. During route discovery, if a itoring approach enhances the algorithm’s
Securing MANETs against black hole attacks: A novel approach using secure knowledge algorithm 651
Intentional and unintentional misbehaving [10] C. E. Perkins and E. M. Royer, Ad-hoc on-
node detection and prevention in mobile demand distance vector routing, Proceed-
ad hoc network. International Journal of ings WMCSA’99. Second IEEE Workshop
Hybrid Intelligence 1.2-3 (2019): 239–267. on Mobile Computing Systems and Appli-
[7] Kshirsagar, D. and Patil, A., 2013, July. cations, New Orleans, LA, USA, 1999, pp.
Blackhole attack detection and prevention 90–100, doi: 10.1109/MCSA.1999.749281.
by real time monitoring. In Computing, [11] Ijteba Sultana, Mohd Abdul Bari, Sanjay,
Communications and Networking Technol- Analytical Model for Assessing the Impact
ogies (ICCCNT), 2013 Fourth International of MANETs’ Bottleneck Nodes”, Interna-
Conference on (pp. 1–5). IEEE. tional Journal on Recent and Innovation
[8] Atheeq, C., and M. Munir A. Rabbani. Trends in Computing and Communication,
CACK—A Counter Based Authenticated ISSN: 2321-8169 Volume: 11 Issue: 10;pp
ACK to Mitigate Misbehaving Nodes from 575–581
MANETs. Recent Advances in Computer [12] Mohammed Abdul Bari, Shahanawaj
Science and Communications (Formerly: Ahamad, Mohammed Rahmat Ali, Smart-
Recent Patents on Computer Science) 14.3 phone Security and Protection Practices,
(2021): 837–847. International Journal of Engineering and
[9] Issariyakul, Teerawat, et al. Introduction to Applied Computer Science (IJEACS); ISBN:
network simulator 2 (NS2). Springer US, 9798799755577 Volume: 03, Issue: 01,
2009. December 2021 (International Journal, UK)
Pages 1–6
93 AI-powered navigation of the digital
frontier: Analyzing modern trends in
digital marketing and their influence
on consumer purchasing patterns with
special reference to pharma industry
Abhay Singh Rajawat1,a, Ved Prakash2,b, and Shailendra Singh
Chauhan3,c
1
Indian Institute of Management, Sirmaur, India
2
Department of Management, BBDITM, Lucknow, UP, India
3
Babu Banarsi Das Institute of Technology and Management, Lucknow, India
Abstract: The rise of Artificial Intelligence (AI) has revolutionized the digital landscape, transforming both con-
sumer behavior and marketing strategies across various industries. This research paper explores current trends
in digital marketing and their influence on consumer purchasing behavior, with a particular emphasis on the
pharmaceutical sector.
AI technologies, including natural language processing, machine learning, and predictive analytics, have
revolutionized the way businesses interact with customers in the digital landscape. The pharmaceutical indus-
try, known for its intricate regulations and demand for precision marketing, offers a compelling case to exam-
ine AI’s profound impact on marketing strategies. This study adopts a mixed-methods approach, combining
qualitative insights from consumers and industry experts with quantitative data analysis. Key objectives include
assessing the adoption of AI-driven marketing techniques in the pharmaceutical sector, analyzing the impact
of AI-powered personalized content delivery on consumer engagement, and understanding how these strategies
influence purchasing patterns. Findings reveal that AI-driven marketing has enabled pharmaceutical companies
to enhance consumer engagement through personalized content, increased targeting precision, and improved
customer service. Furthermore, it has expedited the product development and approval process, leading to a
more agile response to consumer demands. However, data privacy and ethics concerns have also emerged as
significant challenges. This study offers valuable insights into the transformative potential of artificial intelli-
gence in digital marketing, with a specific focus on its revolutionary impact in the pharmaceutical industry. The
implications of these findings extend to other sectors and underscore the importance of ethical AI utilization as
companies navigate the evolving digital frontier to meet consumer expectations and regulatory requirements.
DOI: 10.1201/9781003606635-93
656 Innovations in Computational Intelligence: Trends and Technologies
digital marketing and its significant impact ethical AI deployment, the significance of tai-
on consumer purchasing behavior, with a spe- lored content delivery, and the potential for
cial emphasis on the pharmaceutical sector. increased consumer engagement. It also calls
Digital marketing, once characterized by attention to the regulatory and ethical chal-
static banner ads and rudimentary targeting, lenges that must be addressed as industries
has matured into a multidimensional ecosys- and businesses embrace AI technologies to
tem where AI technologies wield an unprec- navigate the evolving digital landscape. As we
edented level of influence. In this context, venture deeper into the digital frontier, under-
Artificial intelligence (AI) comprises several standing the symbiotic relationship between
functionalities such as natural language pro- AI-powered marketing and consumer behav-
cessing, machine learning, predictive analyt- ior is crucial for businesses, policymakers,
ics, and data-driven insights. and researchers alike.
These technologies empower businesses The pharmaceutical industry is experienc-
to craft personalized, data-driven marketing ing a profound transformation, driven by the
strategies, transcending the one-size-fits-all swift advancement and integration of artifi-
approach that was commonplace in the past. cial intelligence technologies. These innova-
The pharmaceutical industry stands as a tions are reshaping every stage of the drug
poignant exemplar of the disruptive changes development process, from target discovery
AI has ushered into digital marketing. In and lead optimization to clinical trial design
an industry characterized by rigorous regu- and post-marketing surveillance.
lations, stringent quality control, and the
imperative to inform and engage consumers 1.1. AI for drug discovery
accurately, AI has introduced a new para-
digm. This sector’s unique blend of challenges Artificial intelligence is making a significant
and opportunities offers a compelling van- impact on drug discovery, greatly accelerat-
tage point from which to analyze the broader ing the identification of new drug targets and
AI’s effects on digital marketing tactics and optimizing leads. AI algorithms can analyze
consumer behavior. With particular reference vast databases of genetic, clinical, and chemi-
to the pharmaceutical business, this research cal data, enabling faster and more precise
study aims to present a thorough knowledge identification of potential drug targets com-
of how artificial intelligence (AI) is chang- pared to traditional methods.
ing the landscape of digital marketing and, This leads to a shorter time frame for iden-
consequently, changing consumer purchase tifying promising candidates and reduces the
behaviors. risk of failure in later development stages.
Our investigation combines rigorous quan- Additionally, AI-powered virtual screen-
titative analysis and qualitative insights from ing platforms can efficiently screen millions
industry experts and consumers. We seek to of potential drug candidates in silico, elimi-
elucidate the extent to which AI-driven mar- nating the need for expensive and time-con-
keting strategies have been adopted by phar- suming laboratory experiments. Companies
maceutical companies, the manner in which like Ex Scientia and Benevolent AI are at the
they influence consumer engagement, and the forefront of this revolution, leveraging AI to
ultimate effects on purchasing behaviors. develop novel drugs with greater efficacy and
In the following sections, we will delve into fewer side effects.
the key findings, implications, and challenges
that emerge from this exploration of AI’s role 1.2. AI in clinical trials
in the modern digital marketing frontier. Our Artificial Intelligence is also transforming clin-
study underscores the pivotal importance of ical trial design and execution. AI models can
AI-powered navigation of the digital frontier: Analyzing modern trends in digital marketing 657
analyze patient data to predict their response evolving AI landscape, providing clear guide-
to treatment, allowing for personalized medi- lines for developers and ensuring patient
cine approaches and the selection of more safety.
homogenous patient populations for clini- AI is swiftly revolutionizing the pharma-
cal trials. This leads to more efficient trials, ceutical industry, paving the way for advance-
smaller sample sizes, and faster drug devel- ments in drug discovery, development, and
opment timelines. Artificial intelligence may delivery. To fully harness the potential of AI
also be used to continuously monitor patient to transform healthcare and improve patient
data, which will allow for the early identifi- outcomes, it will be essential to address
cation of unfavourable events and guarantee challenges and foster collaboration among
patient safety during the experiment. Com- researchers, policymakers, and industry
panies like Owkin and Insilco Medicine are leaders.
pioneering this field, developing AI-powered
solutions to optimize clinical trial design and
improve patient outcomes. 2. Related Work
In recent years, growing research and dis-
1.3. AI-powered manufacturing and cussions have centered on the intersection
of artificial intelligence and digital market-
supply chain
ing, reshaping how consumers interact with
AI is enhancing and simplifying manufactur- brands and make purchasing decisions across
ing and supply chain processes in the phar- various industries. This literature review
maceutical industry. By analyzing sensor data explores key themes and findings from past
from manufacturing equipment, AI-driven studies, highlighting the substantial influ-
predictive maintenance algorithms can antici- ence of AI on modern digital marketing, with
pate potential malfunctions, reducing costly a particular focus on its impact within the
downtime and improving efficiency. pharmaceutical sector.
This ensures the smooth and efficient AI in Digital Marketing: The integration
operation of manufacturing facilities, leading of artificial intelligence into digital marketing
to increased production output and reduced strategies has transformed how companies
costs. Additionally, AI can optimize inventory engage with their target audiences.AI ena-
management and logistics, ensuring the right bles the analysis of vast datasets, allowing for
drugs are available in the right place at the more accurate consumer segmentation and
right time, and addressing issues of stockouts personalized content delivery (Smith, 2018).
and delays. It also empowers businesses to predict con-
sumer behavior and tailor marketing efforts
1.4. Challenges and opportunities accordingly (Kannan, 2020).
Personalization and Consumer Engage-
Despite the immense potential of AI in the ment: AI’s capacity to process and interpret
pharma industry, some challenges need to be consumer data has led to a surge in person-
addressed. Data privacy and security remain alized marketing efforts. Studies have shown
a major concern, requiring robust data pro- that personalized content enhances consumer
tection measures to ensure patient confiden- engagement and brand loyalty (Xia et al.,
tiality. Additionally, the black-box nature of 2020). This personalization is particularly rel-
some AI models necessitates improved trans- evant in the pharmaceutical industry, where
parency and interpretability to build trust communicating complex health informa-
and address concerns about potential bias. tion to consumers requires a highly targeted
Regulatory frameworks need to adapt to the approach.
658 Innovations in Computational Intelligence: Trends and Technologies
adoption of Digital Marketing strategies variables. The R² value of 0.950 shows that
enhanced by Artificial Intelligence (AI). 95% of the variance in consumer purchasing
Asymptotic significance is displayed. The behavior is explained by the AI-based digital
significance level is 0.05. marketing dimensions. The adjusted R² of
The null hypothesis states that the median 0.949 accounts for sample size and predic-
difference between the pre- and post-imple- tors, confirming the model’s robustness with
mentation of artificial intelligence (AI) is minimal impact from redundant variables.
zero, implying no significant change between The standard error of the estimate is 0.17017,
the two periods. To determine if AI-enhanced reflecting the average deviation of predictions
digital marketing methods have caused a sta- from actual data. Overall, the model demon-
tistically significant variation in the variable strates a strong fit, explaining a significant
of interest, the Wilcoxon signed-rank test was portion of the variability in consumer buying
applied. With the null hypothesis suggesting behavior.
no difference, it was rejected at a highly signif- The F ratio in the ANOVA Table tests the
icant level of 0, indicating a strong impact of overall goodness of Fit of the data-
AI on the variable. The test results show that The overall goodness of fit for the data is
the observed effect of AI is highly unlikely to evaluated using the F ratio in the ANOVA
be attributed to random chance, confirming a table (Table 93.4). With Consumer Buying
substantial and statistically significant differ- Behavior (CBB) as the dependent variable and
ence in the measurements before and after AI predictors including AI Personalized Adver-
adoption. tising, AI-Social Media Engagement, AI-
Model Summary Table 93.3 provides key Influencer Endorsements, AI-Positive Online
statistics for evaluating the regression mod- Reviews, and AI-E-Commerce, the F ratio of
el’s performance. An R-value of 0.975 reflects F (5,395) = 1500.395, P <.05, indicates that
a strong positive correlation between the these independent variables are statistically
significant predictors of the dependent vari-
able. This suggests that the regression model
Table 93.2. Hypothesis test summary provides an excellent fit for the data.
Null Test Sig. Decision
hypothesis 4.1. Dependent variable- consumer
The Related .000 Reject buying behavior
median of Samples the null
differences Wilcoxon hypothesis Table 93.5 demonstrates the statistical sig-
between Signed nificance of personalised advertising, social
Before AI Rank Test media engagement, influencer endorsements,
and After positive online reviews, and e-commerce (P
AI equals value less than 0.05).Therefore, the basic
0.
Source: SPSS Analysis Table 93.4. Statistical significance of the model
form of the equation is Predicted (Consumer significant, with a coefficient (B) of 0.155, a
Buying Behaviour) = -1.613 +.155 AI Person- standardized coefficient (Beta) of 0.082, and
alized Advertising) + (-232 AI: Social Media a t-value of 5.044. The significance level (Sig.)
Management) +.373 AI: Influencer Endorse- is 0 (or very close to 0), indicating a strong
ment +.029 AI: Positive Online Review +.137 effect.
AI: E-commerce The results suggest that all The positive coefficient and low p-value
the digital marketing factors (personalized confirm Hypothesis 2, indicating that AI-
advertising, social media engagement, influ- personalized advertising has a statistically
encer endorsements, positive online reviews, significant and positive impact on consumer
and e-commerce) significantly influence con- buying behavior.
sumer buying behaviour in the various diverse Hypothesis 3 AI-driven social media
product categories. Specifically, personalised engagement algorithms play a crucial role in
advertising, social media engagement, and shaping consumer buying behaviour.
influencer endorsements have positive effects AI-Social Media Engagement: Coefficient
on consumer buying behaviour, while positive (B): -0.232, Standardised Coefficient (Beta):
online reviews have a non-significant effect. -0.221, t-Value: -8.588, and Significance
Interestingly, e-commerce has the strong- (Sig.): 0.
est positive impact on customer satisfaction Hypothesis 3 is supported by the low
among all the service quality factors. The p-value and negative coefficient, demonstrat-
constant term, which represents the baseline ing that AI-driven social media interaction
level of consumer buying behaviour, is also has a statistically significant negative effect
statistically significant (p < 0.001). on customer purchasing behavior.
According to the model, e-commerce, influ- Hypothesis 4: “The integration of AI-
encer endorsements, social media engage- based influencer analysis impacts consumer
ment, targeted advertising, and AI-generated buying behaviour in the context of product
positive online reviews have a more signifi- endorsements.”
cant impact on customer purchasing decisions The integration of AI-based influencer
across various product categories compared analysis impacts consumer buying behaviour
to positive reviews alone. in the context of product endorsements.
AI-Influencer Endorsements: Coefficient
4.2. Hypothesis testing (B): 0.373, Standardised Coefficient (Beta):
0.368, t-Value: 13.479, and Significance
Hypothesis 2 The impact of AI-personalized (Sig.): 0. The positive coefficient and low
advertising on consumer buying behavior is
662 Innovations in Computational Intelligence: Trends and Technologies
p-value validate Hypothesis 4, indicating that engagement algorithms and positive online
AI-powered influencer analysis has a statis- reviews, underscore the industry-specific con-
tically significant positive effect on customer siderations that must be acknowledged in
purchasing behavior. crafting effective marketing strategies. This
Hypothesis 5: AI-assisted sentiment anal- research not only contributes to the under-
ysis of positive online reviews significantly standing of AI’s role in the digital marketing
correlates with changes in consumer buying landscape but also prompts further investiga-
behaviour. tion into the evolving dynamics of consumer
AI-Positive Online Review: Coefficient (B): behaviour in the pharmaceutical sector, offer-
0.029, Standardised Coefficient (Beta): 0.029, ing valuable implications for future market-
t-Value: 0.943, and Significance (Sig.) 0.346. ing practices and strategic endeavors. The
The positive coefficient with a higher findings also suggest that personalized adver-
p-value (0.346) suggests that AI-positive tising, influencer endorsements, and the inte-
online reviews may not have a statistically sig- gration of AI in e-commerce platforms are
nificant correlation with changes in consumer influential factors positively impacting con-
buying behaviour and thus do not strongly sumer purchasing patterns in the pharma
support Hypothesis 5. industry. However, social media engagement
Hypothesis-6 The utilization of (Artificial algorithms and sentiment analysis of posi-
Intelligence) AI-driven e-commerce platforms tive online reviews may not have as strong
affects and shapes consumer buying behavior. an impact in this specific industry context.
AI-E-Commerce: Coefficient (B): 1.137, It’s essential for stakeholders in the pharma
Standardised Coefficient (Beta): 0.768, industry to leverage these AI-driven market-
t-Value: 32.457, Significance (Sig.): 0. ing strategies effectively to enhance consumer
The very high positive coefficient and low engagement and drive purchasing behaviour.
p-value strongly support Hypothesis 6. The
use of AI-powered e-commerce platforms has
a notably strong positive impact on consumer 6. Suggestions for Future Research
buying behavior. AI-Powered Navigation of the Digital Fron-
In conclusion, the evidence supports tier: Analysing Modern Trends in Digital
Hypotheses 2, 3, 4, and 6, whereas Hypoth- Marketing and Their Influence on Consumer
esis 5 does not receive strong support regard- Purchasing Patterns with Special Reference to
ing the AI-Positive Online Review variable. the Pharma Industry.” Here are some sugges-
tions for future research: Looking forward,
the study on AI-powered digital marketing
5. Conclusion trends in the pharmaceutical industry opens
In conclusion, the exploration of AI (Artifi- avenues for several future research directions.
cial Intelligence) powered digital marketing Future investigations could delve into the
trends within the pharmaceutical industry optimization of AI algorithms for enhanced
has uncovered multifaceted insights into con- personalization in pharmaceutical marketing,
sumer purchasing behaviour. The positive exploring the potential integration of emerg-
impact of personalized advertising, influencer ing technologies like augmented reality or
endorsements, and AI-driven e-commerce virtual reality. Additionally, considering the
platforms emphasizes the transformative ethical dimensions of Artificial Intelligence
potential of AI in shaping consumer engage- applications in marketing and addressing
ment and decision-making processes. How- consumer privacy concerns would be crucial.
ever, the nuanced findings, including the Further research could also focus on develop-
less pronounced influence of social media ing and testing innovative AI-driven strategies,
AI-powered navigation of the digital frontier: Analyzing modern trends in digital marketing 663
Prasanna. “How to efficiently train your ai [17] Shrestha, Sunil, Asmita Priyadarshini Khati-
agent? characterizing and evaluating deep wada, Sudesh Gyawali, P. Ravi Shankar,
reinforcement learning on heterogeneous and Subish Palaian. “Overview, challenges
platforms.” In 2020 IEEE High Performance and future prospects of drug information
Extreme Computing Conference (HPEC), services in Nepal: a reflective commentary.”
pp. 1–7. IEEE, 2020. Journal of Multidisciplinary Healthcare
[12] Morgan, George A., and Robert J. Harmon. (2020): 287-295.
“Data collection techniques.” Journal-Amer- [18] Snyder, Hannah. “Literature review as a
ican Academy Of Child And Adolescent Psy- research methodology: An overview and
chiatry 40, no. 8 (2001): 973-976. guidelines.” Journal of business research 104
[13] Nguyen-Thi, Hai-Yen, Thuy-Tram Nguyen- (2019): 333-339.
Ngoc, Minh-Thu Do-Tran, Dung Van Do, [19] US Food and Drug Administration. Artificial
Luyen Dinh Pham, and Nguyen Dang Tu Le. Intelligence and Machine Learning (AI/ML)-
“Job satisfaction of clinical pharmacists and Based Software as a Medical Device (SaMD)
clinical pharmacy activities implemented at Action Plan. (2021, January 12). https://
Ho Chi Minh city, Vietnam.” PloS one 16, www.fda.gov/news-events/press announce-
no. 1 (2021): e0245537. ments/fda-releases-artificial-intelligencema-
[14] PANNEERSELVAM, Ramasamy. Research chine-learning-action-plan
methodology. PHI Learning Pvt. Ltd., 2014. [20] Vempati, Raveendrababu., et al. Challenges
[15] Smith, Justin S., Adrian E. Roitberg, and and opportunities for AI adoption in phar-
Olexandr Isayev. “Transforming computa- maceutical research. Nature Biomedical
tional drug discovery with machine learning Engineering, (2022): 6(3), 268-290.
and AI.” ACS medicinal chemistry letters 9, [21] Wong, Chi Heem, Kien Wei Siah, and
no. 11 (2018): 1065-1069. Andrew W. Lo. “Estimation of clinical trial
[16] Seyhan, Attila A. “Lost in translation: the success rates and related parameters.” AI
valley of death across preclinical and clinical and the regulatory landscape for drug devel-
divide–identification of problems and over- opment. Nature Reviews Drug Discovery,
coming obstacles.” Translational Medicine 20(9), 713-732
Communications 4, no. 1 (2019): 1-19.
94 Fake video detection
Mahendra Singha, Saurabh Jainb, Laraib Khanc, and dIaswarchandra
Department of Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management, Lucknow, Uttar Pradesh, India
Abstract: The increasing computational power has rendered deep learning algorithms highly potent, facilitat-
ing the effortless creation of convincingly human- synthesized videos, commonly known as deepfakes. The
potential misuse of such realistic face-swapped fake videos in scenarios involving political turmoil, fabricated
terrorism incidents, revenge pornography, and the blackmailing of individuals is readily foreseeable. In this
study, we present a novel deep learning-based approach designed to effectively discern AI-generated fake videos
from authentic ones. Our methodology excels at automatically identifying instances of replacement and reenact-
ment deepfakes. We aim to deploy Artificial Intelligence (AI) a s a countermeasure against Artificial Intelligence
(AI) manipulations A Res-Next Convolutional Neural Network is used by our method to retrieve frame-level
characteristics. These attributes are then employed to train a Recurrent Neural Network (RNN) with Long
Short-Term Memory (LSTM) to classify videos depending on whether or not they have been altered, indicat-
ing their authenticity. We validate our approach using a large and heterogeneous dataset in order to simulate
real-time scenarios and improve the model’s performance with real data. The careful duration of this dataset
involves combining several pre-existing datasets, including Face-Forensic++, Deepfake Detection Challenge,
and Celeb-DF. Additionally, we demonstrate how our system can yield competitive results using a straightfor-
ward and robust approach.
Keywords: Computational power, Face-Forensic++, AI generated fake videos, Res-Next CNN, LSTM, RNN
DOI: 10.1201/9781003606635-94
666 Innovations in Computational Intelligence: Trends and Technologies
These fakes don’t just hurt famous people; adjusting brightness and contrast, and more.
they can fool anyone. For example, a fake By using these tricks with the right settings,
voice tricked a CEO into giving away a lot of they made the program perform 0.3% bet-
money (Damiani, 2019). There are apps like ter. Also, these tricks help the program han-
Deep Nude and Zao that let anyone put their dle all sorts of different examples, making it
face in movies or make inappropriate videos stronger and more accurate.
without permission (Samuel, 2019; Guardian,
2019). These fakes mess with people’s privacy 2.2. Architecture of the proposed
and lives. It’s really important to figure out deep fake detection model
what’s real online, especially with deepfake
videos. They’re often used for bad things, The proposed architecture for a deepfake
and almost anyone can make them now. Peo- detection model involves a multi-faceted
ple are trying different ways to detect these approach to discern between authentic and
fakes (Lyu, 2020) (Jafar, 2020). But because manipulated content. The input data, typi-
both making and finding these fakes use cally comprising video frames or sequences,
high-tech methods, it’s tough to stop them. undergoes meticulous preprocessing steps,
To fight against this problem, the US Defense including frame alignment, normalization,
Research Agency started a research program and augmentation. Feature extraction is
to detect fake videos (Turek, 2020). Big com- achieved through a combination of Convo-
panies like Facebook and Microsoft are also lutional Neural Networks (CNNs) for spa-
working to stop these fake videos (Schroep- tial pattern recognition, Recurrent Neural
fer, 2019). The number of papers about deep- Networks (RNNs) for temporal analysis in
fakes has increased a lot recently. People are video sequences, and 3D convolutional lay-
really studying this stuff more now, especially ers for handling spatiotemporal information.
since 2017.” The architectural components include an
encoder-decoder structure for feature recon-
struction, attention mechanisms to focus on
2. Methodology relevant regions, Siamese networks for learn-
Detecting fake video is a challenging task, as ing differences between authentic and manip-
the technology used to create them continues ulated content pairs, and Capsule Networks
to advance. The primary contribution of this to capture hierarchical relationships in fea-
work is suggesting a fresh model structure tures. Model fusion integrates information
for identifying deepfake videos. As dataset from various modalities, such as audio and
quality significantly influences model perfor- visual cues, while ensemble methods enhance
mance, we focused on enhancing its quality,
applying diverse image augmentation tech-
niques during training.
Here’s a proposed approach for fake video AQ1:
detection: Please
provide
in-text
2.1. Image augmentation citation
for all
figures
Image augmentation is like giving extra prac-
tice to a computer program CNN so that it
AQ2:
gets better at understanding things. In this Please
research, they used different tricks to make Figure 94.1. Working procedure of fake video provide
the practice more helpful, like changing the detection. source
for all the
size, turning things around, flipping them, Source: AUTHOR'S SELF GENERATED figures
Fake video detection 667
Similar technologies used to create deepfakes and RNNs, has significantly improved the
are also being employed to detect them. accuracy of fake video detection. How-
Machine learning algorithms are trained ever, there is a need for ongoing research
to recognize patterns or anomalies that sug- to address the interpretability challenges
gest manipulation. Researchers are develop- associated with these complex models.
ing models that can differentiate between 2. Adversarial Attacks: Despite technologi-
authentic and manipulated content. cal advancements, fake video generators
Development of Anti-Deepfake Tools: continuously evolve, incorporating adver-
Efforts are underway to develop specialized sarial techniques to bypass detection
tools and software that can assist in identify- algorithms. This highlights the impor-
ing and verifying the authenticity of videos. tance of developing detection methods
These tools aim to automate the process of that are resilient to adversarial attacks
detecting fake videos and support forensic and can adapt to emerging manipulation
analysis for identifying digital tampering. strategies.
Collaborative Initiatives and Research: 3. Ethical Considerations: The use of sophis-
Various collaborations between academic ticated technology for fake video detec-
institutions, tech companies, and government tion raises ethical concerns, particularly
agencies are focusing on research and devel- regarding privacy and potential misuse.
opment efforts to combat the proliferation Striking a balance between maintain-
of fake videos. Competitions, challenges, and ing individual privacy and safeguarding
collaborative projects are being organized to against the harmful effects of fake videos
encourage innovation in this field. is a critical aspect that requires careful
Ethical and Legal Implications: Detecting consideration.
fake videos raises ethical concerns regarding 4. Generalization Across Diverse Content:
privacy, misinformation, and the potential for Ensuring the effectiveness of detection
manipulation. Legal frameworks are being methods across diverse types of content,
discussed and developed to address issues including different languages, cultures,
related to the creation, distribution, and con- and contexts, remains a challenge. Devel-
sequences of fake videos. oping models that generalize well and
User Education and Awareness: Promoting are not biased toward specific content
awareness among users about the existence characteristics is crucial for real-world
and potential impact of fake videos is crucial. applicability.
Educating individuals about the methods used 5. Explainability and Transparency: Many
to create fake videos and providing guidance advanced detection models lack transpar-
on verifying the authenticity of content are ency, making it challenging to understand
essential aspects of tackling this issue. the decision- making process. Enhanc-
Overall, the landscape of fake video detec- ing the explain ability of these models is
tion involves a multidisciplinary approach, essential for gaining trust in their capabil-
combining technological advancements, ities, especially in contexts where the con-
research initiatives, legal considerations, and sequences of false positives or negatives
public awareness efforts to mitigate the harm- can be significant.
ful effects of manipulated content. 6. Collaborative Approaches: Given the
global nature of fake video dissemination,
collaborative efforts are essential. The
4. Critical Analysis sharing of datasets, benchmarking stud-
1. Advancements in Deep Learning: The inte- ies, and standardized evaluation metrics
gration of deep learning type, like CNN can foster a more cohesive and effective
Fake video detection 669
approach to fake video detection across and deployment of fake video detection
the research community. technologies. Balancing the imperative
7. Real-time Challenges: The demand for to combat misinformation with privacy
real-time detection poses computational considerations and avoiding unintended
challenges, especially when dealing with consequences requires a thoughtful and
high-resolution video streams. Balancing ethical approach.
the need for rapid analysis with computa- 4. User Empowerment: The synthesis of
tional efficiency is an ongoing considera- user education and empowerment plays
tion in the development of practical and a pivotal role. Educating users about
scalable fake video detection solutions. the existence of fake videos, providing
tools for critical evaluation, and foster-
ing digital literacy contribute to a more
5. Synthesis and Implementation resilient user base capable of discerning
misinformation.
5.1. Synthesis 5. Regulatory Measures: The synthesis of
5.1.1. Synthesis on fake video regulatory measures on both national
detection and international levels is critical for
establishing legal guidelines and ensuring
The landscape of fake video detection is ethical standards in the use of fake video
evolving rapidly, driven by advancements in detection technologies. Regulatory frame-
technology, interdisciplinary collaboration, works provide a foundation for responsi-
and ethical considerations. The synthesis of ble development and deployment.
these key elements underscores the multi- 6. Explainable AI: The synthesis of explaina-
faceted nature of addressing the challenges ble artificial intelligence (XAI) techniques
posed by manipulated visual content. addresses the interpretability challenge
1. Technological Integration: The synthe- associated with complex detection mod-
sis of cutting-edge technologies, such as els. Providing transparent explanations
deep learning architectures and advanced for decisions enhances user trust and aids
image processing techniques, has signifi- in understanding the intricacies of the
cantly bolstered the capabilities of fake detection process.
video detection systems. This techno- 7. Adaptability and Innovation: The syn-
logical integration enables more accurate thesis of adaptive detection mechanisms
identification and mitigation of manipu- and a culture of innovation is necessary
lated content. to stay ahead of evolving manipulation
2. Interdisciplinary Approach: The synthesis techniques. Embracing a mindset of con-
of expertise from diverse fields, includ- tinuous improvement ensures that detec-
ing computer science, psychology, ethics, tion systems remain effective in the face of
and law, is crucial for developing com- emerging threats.
prehensive solutions. An interdisciplinary 8. Global Collaboration: The synthesis of
approach facilitates a nuanced under- global collaborative efforts is essential
standing of the complex issues surround- in the fight against fake videos, consider-
ing fake video detection, encompassing ing the borderless nature of information
technical, ethical, and societal dimensions. dissemination. International cooperation
3. Ethical Frameworks: The synthesis of on research, data sharing, and standardi-
robust ethical frameworks is essential zation contributes to a more unified and
in guiding the responsible development effective response.
670 Innovations in Computational Intelligence: Trends and Technologies
Abstract: The Olympics, a global event with 200+ nations, highlights exceptional athleticism. This study, uti-
lizing Python for data analysis, explores factors influencing a nation’s Olympic success. Examining data from
1896 to 2016, we analyze athlete count, funding, and coaching quality. Visualizations reveal insights into
nations roles in the Olympics. Our findings link success to factors like athlete count, sports funding, and coach-
ing quality. This study deepens understanding of country performance, informing policies to enhance Olympic
results. Implications extend to policymakers and sports institutions, guiding tailored approaches for improved
performance. Adaptability emerges as crucial for sustained competitiveness over time. Acknowledging histori-
cal data constraints, future research could delve into qualitative cultural influences and recent Olympic Games
for contemporary trends.
Keywords: Olympic Games, Performance Analysis, Country Performance, Exploratory Data Analysis, Athlete
Development, Success Factors, Sports Analytics
DOI: 10.1201/9781003606635-95
674 Innovations in Computational Intelligence: Trends and Technologies
1,913 gold, 1,896 silver, and 1,886 bronze diversity. Medal victories also show a median
medals. This balanced allocation across sea- age of 24, revealing success across age groups.
sons reflects fairness and acknowledges ath- This emphasizes that Olympic achievement
lete’s achievements, crucial for understanding is not age-restricted, inspiring athletes of all
competitive dynamics. ages to pursue their dreams. It reinforces
Our Olympic data analysis covered athlete the inclusivity and diversity of the Olympic
age distribution and medal victories Figures movement, where talents from different gen-
95.5 and 95.6. The median age of all Olym- erations unite on the world stage.
pic athletes is around 24 years, highlighting Our analysis of Olympic medal data
revealed the most dominant nation in terms
of total medals won: the United States. The
USA boasts an impressive 17,847 medals,
placing it at the forefront of Olympic success
Figure 95.7.
Figure 95.5. Age distribution of Olympic Figure 95.7. Age distribution of Olympic
athletes. athletes.
Source: AUTHOR'S SELF GENERATED Source: AUTHOR'S SELF GENERATED
Olympic odyssey: Tracing 120 years of athletes sports, and global influence 677
Acknowledgement
We’re incredibly grateful to Assistant Pro-
fessor Sanjay Kumar Gupta for his guidance
and encouragement throughout this research.
We acknowledge Pranveer Singh Institute of
Figure 95.11. Medal distribution for India.
Technology for their support and resources.
Our families, friends, and well-wishers have
Source:
AUTHOR'S SELF GENERATED been our constant inspiration.
Abstract: This research paper investigates the convergence of machine learning and the Internet of Things (IoT)
within modern agriculture, with the objective of improving agricultural practices to meet global food demands.
The study adopts a comprehensive exploration, employing a holistic approach to smart farming by integrating
insights from diverse sources. The incorporation of practical demonstrations highlights high-accuracy results
with specific machine learning algorithms, imparting a practical dimension to the research. A robust literature
review establishes the paper within the existing knowledge landscape. The paper underscores the significance
of data preparation for feature selection, encompassing aspects such as comprehensive data collection, meticu-
lous data cleaning, and normalization of numerical features. However, it is acknowledged that the discussion
on challenges faced in deploying machine learning in agriculture is somewhat limited. The paper concludes
by advocating for enhanced methodological discussions, more detailed quantitative insights, and a thorough
exploration of challenges and prospects. Despite certain weaknesses, this research significantly contributes to
the evolving field of agricultural machine learning, providing valuable insights for researchers, practitioners,
and stakeholders actively involved in shaping the future of smart farming.
Keywords: Smart farming, Internet of Things (IoT), RandomForest, SVM, KNN, Google Colab, Kaggle
[email protected], [email protected]
d
DOI: 10.1201/9781003606635-96
Crop prediction system using machine learning 681
like satellite imagery and soil sensors, gener- data through sophisticated algorithms [3].
ating detailed maps of crop growth and nutri- This process is pivotal for ensuring the qual-
ent levels. Farmers can then use these maps to ity and size of data, which, when comprehen-
fine-tune their farming practices, maximizing sive, plays a crucial role in yielding precise
yield and minimizing waste. results and making informed predictions. Big
Despite the immense potential of machine data, characterized by its size, speed, and vari-
learning in agriculture, challenges such as the ety, proves instrumental in eliminating ran-
lack of data infrastructure, high technology domness and providing detailed outcomes.
costs, and the need for specialized expertise Unstructured data from diverse sources such
persist. Nevertheless, as more farms adopt as sensors, social media, digital networks,
precision agriculture and generate data, the physical devices, stock markets, and health
benefits of deploying machine learning are records is employed, often accessed through
becoming increasingly evident. While the APIs, web collection, and direct pathways.
field is still in its early stages, the promising Data preprocessing takes center stage in the
results achieved thus far suggest that machine journey of utilizing machine learning algo-
learning will play a pivotal role in shaping the rithms effectively. This involves data clean-
future of agriculture [2]. The authors under- ing and transformation to enhance credibility
score the importance of precise data analy- and usability. Data reduction is equally criti-
sis through machine learning algorithms, cal, addressing issues such as missing, incom-
focusing on constructing models that accu- plete, and noisy data that can otherwise lead
rately predict outcomes based on input data. to inaccurate results. Even with the most suit-
Classification algorithms like Decision Tree, able machine learning algorithms, incorrect
Naïve Bayes Classifier, and Random Forest results can emerge without proper attention
are explored, with the study predicting that to data quality. Data extraction is the pro-
the widespread adoption of machine learning cess of obtaining information from sources,
and adoption of machine learning-focused and data transformation involves converting
systems will revolutionize efficiency and pro- data into a format conducive to analysis—
ductivity across diverse industries. both integral steps in the data preprocessing
phase. Classification algorithms, including
Decision Trees, Naïve Bayes Classifiers, Sup-
2. Extensive Evaluation port Vector Machines, and Random Forests,
play a vital role in constructing models for
2.1. Methodology predicting correct labels based on provided
In recent times, machine learning has become data. The process involves training the model
a pervasive force, influencing various aspects with specific data and evaluating its results
of our lives, ranging from healthcare and using a separate set to ensure accuracy and
defense to education and urban development. desired outcomes. Noteworthy studies, such
It has emerged as a key player in decision- as those focusing on behavioral classification
making processes and has laid the foundation in neuroscience and predicting water quality
for innovative search engine infrastructures. using machine learning algorithms, under-
The impact of machine learning-oriented sys- score the significance of classification as a
tems is poised to grow substantially, becom- key supervised learning method for predic-
ing a transformative force in technology and tion. In the classification process, the dataset
significantly affecting sectors such as chip is divided into training and test sets, decisions
design and traffic estimations. A crucial factor are made on the model to be used, and pre-
in harnessing the power of machine learning dictions are established and evaluated based
lies in the collection and analysis of accurate on result accuracy. Model complexity and
682 Innovations in Computational Intelligence: Trends and Technologies
AQ1:
Please
provide
in-text
cita-
tion for
Figures 1
and 2.
AQ2:
Please
provide
source
for all the Figure 96.1. Methodology of crop prediction. Figure 96.2. Process flow model.
figures
Source: Source:
AUTHOR'S SELF GENERATED AUTHOR'S SELF GENERATED
Crop prediction system using machine learning 683
Strengths: This research paper stands out for Table 96.1. Comparative Study
its commendable contribution to the agricul-
tural domain, offering a thorough explora-
tion of the integration of machine learning
AQ3:
and IoT in modern farming. The presenta- Please
tion is clear and logically structured, effec- provide
tively tackling the critical issue of enhancing in-text
NOTEcitation
ADDED
agricultural practices to meet the increas- for Table
ing global demand for food. The inclusion 1.
of experimental results, showcasing a nota-
ble classification accuracy achieved through
specific machine learning algorithms, adds a
practical dimension to the research [5]. The
well-executed literature review strengthens
the paper’s relevance, firmly grounding it in
the context of existing scholarly work. The
focus on smart farming and the applications
of machine learning reflects a deep under-
standing of contemporary agricultural trends.
Weaknesses: Despite its merits, this research
paper exhibits certain weaknesses. The discus-
sion on challenges faced in deploying machine
684 Innovations in Computational Intelligence: Trends and Technologies
4. Conclusion and Future Work Saker. 2023. “Crop Prediction Model Using
Machine Learning Algorithms.” Applied
In conclusion, our agricultural technol- Sciences 13: 9288. https://doi.org/10.3390/
ogy initiative envisions a future where crop app13169288.
prediction and yield optimization are revo- [5] Khaki, Saeed, and Lizhi Wang. 2019. “Crop
lutionized through GPS integration and gov- Yield Prediction Using Deep Neural Net-
ernment Rain forecasting. We aim to mitigate works.” Frontiers in Plant Science 10 (May).
food crises by refining predictive models and https://doi.org/10.3389/fpls.2019.00621.
streamlining the farmer experience with a [6] Tushar Gupta; Dr. Sunil Maggu; Bhaskar
user-friendly app and automated data col- Kapoor. 2023. “Crop Prediction using
lection. Plans for personalized fertilizer rec- Machine Learning.” Iconic Research And
Engineering Journals 6 (9), 279–284.
ommendations target soil health, while the
[7] Suruliandi, A., G. Mariammal, and S.P. Raja.
integration of advanced machine learning 2021. “Crop Prediction Based on Soil and
algorithms like ANN and CNN promises Environmental Characteristics Using Fea-
continuous improvement in predicting opti- ture Selection Techniques.” Mathematical
mal crop conditions [10]. Rooted in sustaina- and Computer Modelling of Dynamical Sys-
bility, our vision is to propel agriculture into a tems 27(1):117–40. https://doi.org/10.1080/
technologically advanced and farmer-friendly 13873954.2021.1882505.
era, emphasizing a seamless blend of cutting- [8] Ashwitha, A., and C. A. Latha. 2022.
edge technology and farmer-centric solutions “Crop Recommendation and Yield Estima-
for global progress. tion Using Machine Learning.” Journal of
Mobile Multimedia, February. https://doi.
org/10.13052/jmm1550-4646.18320.
References [9] Vaishnave, M P, and R. Manivannan.
[1] Mahendra N. 2020. “Crop Prediction 2022. “An Empirical Study of Crop
Using Machine Learning Approaches.” Yield Prediction Using Reinforcement
International Journal of Engineering Learning,” February, 47–58. https://doi.
Research and https://doi.org/10.17577/ijert- org/10.1002/9781119821809.ch4.
v9is080029(08). https://doi.org/10.17577/ [10] Klompenburg, Thomas van, Ayalew Kas-
ijertv9is08. sahun, and Cagatay Catal. 2020. “Crop
[2] Shripathi Rao, Madhuri, Arushi Singh, Yield Prediction Using Machine Learning:
N.V. Subba Reddy, and Dinesh U Acharya. A Systematic Literature Review.” Computers
2022. “Crop Prediction Using Machine and Electronics in Agriculture 177 (Octo-
Learning.” Journal of Physics: Confer- ber): 105709. https://doi.org/10.1016/j.
ence Series 2161(1):012033.https://doi. compag.2020.105709.
org/10.1088/1742-6596/2161/1/012033. [11] Darwin, Bini, Pamela Dharmaraj, Shajin
[3] T. Aravind. 2021. “Review of Machine Prince, Daniela Elena Popescu, and
Learning Models for Crop Yield Predic- Duraisamy Jude Hemanth. 2021. “Recogni-
tion,” January. https://doi.org/10.4108/ tion of Bloom/Yield in Crop Images Using
eai.7-12-2021.2314568. Deep Learning Models for Smart Agricul-
[4] Elbasi, Ersin, Chamseddine Zaki, Ahmet ture: A Review.” Agronomy 11(4), 646.
E. Topcu, Wiem Abdelbaki, Aymen I. Zrei- https://doi.org/10.3390/agronomy1104
kat, Elda Cina, Ahmed Shdefat, and Louai 0646.
97 A mobile application to assist the
women in gestation period
V. lavanya,a Madhu Hasitha Manne,b Gnana Sri Manasa
Veeramachaneni,c Aditya Ram Manam,d and Sajid khan
Mohammede
Velagapudi Ramakrishna Siddhartha Engineering college, Andhra Pradesh, India
Abstract: The crucial phase in the women’s life is pregnancy. Being healthy during pregnancy is essential for
a birth. Nowadays pregnant women often encounter many complications due to lack of proper guidance and
knowledge. This leads to an increase of miscarriages, premature births, and infant deaths. Healthy diet and
engaging in appropriate exercises in pregnancy time are important for the well-being of both the mother and
neonate. This project proposes a mobile application which give a personalized diet chart as per user preferences
by using Sci-kit, Exercises recommendations which focus on promoting overall fitness and flexibility during
pregnancy as per trimester and the list includes contact details, addresses, and relevant information about hos-
pitals with specialized maternity services, neonatal intensive care units in case of emergency by using ball tree
nearest neighbor this also includes food, water, and tablet alarms, so that pregnant women can establish healthy
routines and minimize the risk of nutrient deficiencies, dehydration, and medication noncompliance.
Keywords: Mobile application, diet, sci-kit libraries, exercises, ball tree algorithm, alarms, pregnancy women
a
[email protected]; [email protected]; [email protected]; d218w1a5430@vrsec.
ac.in; [email protected]
DOI: 10.1201/9781003606635-97
A mobile application to assist the women in gestation period 687
Trimester Amount of calories selecting the type of diet chart either vegetar-
First trimester 1800
ian or non-vegetarian, this is also a binary
classified data in dataset. So, the conditions
Second trimester 2000
can select the diet chart according to it. The
Third trimester 2200–2400 main objective behind the usage of random.
Figure 97.2. No of calories for each trimester. Choice () is to avoid the repetitions of diet
chart every day, because choices () which is in
Source:
same ‘random’ library will generate the items
with repetition from the list As this algorithm
After the help of dietician, nutritionist,
is checked for the given dataset, there is no
gynecologist, the dataset was created which
combination of food items for nearly 180
has food items and calories and the type of
days that means one trimester with the choice
food as breakfast, morning snacks, lunch etc.
() method. So here the random method will
Now the step that was followed is including
help the user to generate their diet chart as
the random. Choice () method for giving the
per user preferences with the valuable dataset.
diet chart with much accuracy and in small
The output Figure 97.3 presents the diet
amount of time.
chart from morning to evening which includes
The syntax of the random method is
dry fruits, seeds, breakfast, morning snack,
random.choice(sequence)
lunch, evening snack, dinner and milk. It also
sequence maybe string,list,tuple
represents the amount of calories that will be
from each food type,
obtained by intaking of the given diet chart.
calories=Σdi
where i=no.of food types
d=calories 2.3. Exercises
Random. Choice () is the method which is By clicking the exercises option in the list of
scikit library of python. This will randomly options that specified, as per the trimester
select the food items from every food type and of the user it will show the list of exercises
in between the specified calories as in which list and by clicking each exercise it will show
the user’s gestation period was. After select- the time of exercise and specifies the steps of
ing the food items based on calories and food doing the particular exercise. User can expe-
type, it will calculate the sum of the calories rience the visualization of the exercises in
that was selected from every food type from
that day. And after there is condition to check
whether the given food items are in between
the calories of that semester, if not the func-
tion was again called and same process will
repeat till there is a proper selection of food
items for the user preferences [2]. As specified
the restrictions of food items for the women
who have chronical diseases.
As in dataset there will be attributes which
specifies all the chronical diseases faced by
women and it is binary data, that is, is the
user can take the food item or not. As the
code works with the random choices and the
conditions to select the food items which are Figure 97.3. Customized diet chart using
specified to the particular user as per their random method.
input data. Another important inclusion is Source:
A mobile application to assist the women in gestation period 689
the form of videos and the process will help 2.4. List of hospitals
the user to know how the exercise should be
Now the aim is to find the nearest hospitals
done.
from the given input place from the created
Physical activity is very important for
dataset. To convert the string input of the place
women in gestation period [3]. Physical activ-
name to geo coordinates there is a library in
ity not only the exercises it also includes yoga
python named geopy geocoders. In that library
and walking. After the exercises there will be
Nominate module is helpful in converting the
time for yoga asanas and the time for walk-
latitudes and longitudes. Now the task is to
ing. Here in this project, there will be timer
calculate the distance between the converted
for exercises and yoga. Then the user will
data and hospitals list in the procured data-
experience the time she spent for physical
set. Although there are many algorithms in
activity. All the collected knowledge about
machine learning, the first try is done on near-
the exercises in stored in the firebase and we
est neighbors brute force algorithm and unsu-
should retrieve them by using flutter to our
pervised nearest neighbor Tree and ball tree
application.
algorithm from sklearn neighbors module.
Here the input address is stored as strings
The Observations that obtained are:
as name of the places, the input address is
divided as door number, street, panchayat, 1. Brute force algorithm as default takes met-
and city/Village. The dataset includes the ric as “Euclidean” and calculates the near-
attributes such as name of the place, lati- est neighbors, As there are ‘n’ samples and
tudes, and longitudes. With the help of the “p” dimensions then this approach will
google maps the dataset is created with the take the scale as O[DP2] and work effi-
geo coordinates. cient for smaller dimensions and become
infeasible for huge datasets [4].
2. KD Tree algorithm will be more efficient
compared to the brute force approach for
same samples and dimensions it scales
the cost as O[DPlog(P)]. This has high-
est space complexity [5]. This works very
fast for low dimensional data than high
dimensional data.
3. Ball tree makes the partitions based on
the nesting hyper-spheres series [6], it is
costlier than the above both but it is more
5. Haversine
Figure 97.6. Represents the nearby hospitals.
Source:
AUTHOR'S SELF GENERATED
A mobile application to assist the women in gestation period 691
References
[1] Yera Toledo R, Alzahrani AA, and Martínez
L. A food recommender system considering
98 I-tourism planner
Aayush Kumara, Himanshu Ojhab, Pratham Singlac, and
Amit Kumar Jaiswald
Department of Computer Science and Engineering, Chandigarh University, Mohali, India
Abstract: Travel planning can be a daunting task, but it doesn’t have to be. There are various applications online
for booking hotels, rentals, and cafes and checking reviews and feedback. In this paper, we are proposing a
single platform with all the above-mentioned features a user needs while planning a vacation or tour. I-Tourism
Planner is a web application that revolutionizes the way customers plan and book their trips. With a sleek, mod-
ern, and intuitive interface, the platform offers an extensive range of features and services to meet the diverse
needs of the users. They can seamlessly search for hotels, vacation rentals, cafes, landmarks, and fun activities,
and check reviews and feedback all in one place. The platform integrates secure payment options and real-time
availability updates, ensuring a seamless booking process. With its comprehensive and user-centric approach,
the application aims to redefine how travelers discover, plan, and book their journeys, making travel arrange-
ments convenient, efficient, and enjoyable. Also, there is a customer relationship management feature where the
customer can send their queries and feedback which can be helpful in future development of the project. This
AQ1: platform can help to make the travel planning process easier by providing users with a one-stop shop for all of
Please
their travel needs.
provide
keywords
Keywords:
DOI: 10.1201/9781003606635-98
I-tourism planner 693
The purpose of the project I-TOURISM destinations, rent services, help arrange lodg-
PLANNER is to automate the existing clut- ing and dislodging and make secure pay-
tered, unorganized, manual and diversified ments all under the same roof. The existing
system by the help of computerized equip- solutions do not proper facility for the plan-
ment’s and full-fledged computer software, ning of the trips like famous places, distance,
fulfilling the user’s requirements, so that they routes, adventurous activities near the cities
can have access to all they want in a travel and they do not provide customizable pack-
planner all at one place; and manipulate the ages according to user preferences.
same as per their convenience. Tourism planner application provides the
I-TOURISM PLANNER, is a project that users more functionalities than the existing
will help to manage the data error free, pre- applications currently have.
vent data loss, provide user with proper plan-
ning resources for trip, secure, and reliable.
Organization can use it for better utilization 4. Problem Solution
of their resources. The main idea of this I-Tourism planner is
to interconnect the locations, hotels, restau-
rants, cafes, bookings, rentals, payments and
2. Literature Review reviews at one place that can be availed as per
The given below table shows the comparison the user’s need. Architecture of the platform
of the different tourism applications which is shown below:
gives different features to the users that help
to users in booking their accommodation, 4.1. User interface
mode of travel, restaurants, and adventurous
activities on the popular destinations. The I The user interface is the part of the platform
Tourism Planner provide a variety of features that the user interacts with. It allows the
to the users other than these features that user to specify their travel preferences, such
help in the proper planning of trip. as their origin and destination, their desired
travel dates, and their budget. It allows the
users to view and interact with their trip
3. Problem Identification plan, including making changes and adding
Current booking systems cannot often or removing activities. There will be different
book hotel services, help navigate thru the web and mobile interface for the users.
AQ2:
Please
provide
in-text
OTE ADDED
citation
for figures
1and2.
AQ3:
Please
provide
source
for all the Figure 98.1. Popular tourism platforms. Figure 98.2. Architecture of the platform.
figures
Source: Source: AUTHOR'S SELF GENERATED
AUTHOR'S SELF GENERATED
694 Innovations in Computational Intelligence: Trends and Technologies
• This is the landing page of the project • The destination page further has the
with a responsive
Figure 98.3: navigation
Landing bar to route details regarding the popular cafes to try
Figure 98.7:
throughPage
the different pages of website and out within the destination.
Destination Page
search option to look out for any place.
• The Sign Up page that enables the users to 4. Database: The database provides a struc-
enter credentials and review their booking tured way to store all the details regarding
status, browse and book new packages. the bookings of a user to store it on a real-
News Article | World Travel and Tourism time server and to protect data-loss and
Council (WTTC). prevent data integrity.
• The backend of the Sign Up page that
stores the credential data of new users.
References
AQ4:
[1] Huang, C. D., Goo, J., Nam, K., and Yoo, Please
C. W. (2017). Smart tourism technologies note that
cross-
in travel planning: The role of exploration reference
and exploitation. Information and Man- in-text
Figure 98.10: agement, 54(6), 757–770. doi:10.1016/j. for all
im.2016.11.010 references.
Backend of signup
page [2] Baharuddin, R., Singh, D. and Razali, R.
8. Data Flow Architecture (2013) Usability Dimensions for Mobile
The I-Tourism Planner has four components Applications—A Review. Research Journal
in the data flow architecture: of Applied Sciences, 5, 2225-2231.
[3] UNWTO (2015). Understanding Tourism:
Basic Glossary. Accessed online (May 25,
2015) at http://media.unwto.org/en/content/
understanding-tourism-basicglossary
[4] B. Walek, O. Hosek and R. Farana, “Pro-
posal of expert system for hotel booking sys-
tem,” 2016 17th International Carpathian
Control Conference (ICCC), High Tatras,
Slovakia, 2016, pp. 804-807, doi: 10.1109/
CarpathianCC.2016.7501206.
[5] R. Saga, Y. Hayashi, and H. Tsuji, “Hotel
Recommender System Based on User’s Pref-
erence Transition”, IEEE International Con-
ference on Systems, Man and Cybernetics,
1. User: TheFigure
user can view
98.11: all the packages’
Data SMC 2008, 2008, pp. 2437-2442, ISSN
details and their
Flow landmarks. The user can
Architecture 1062-922X
plan their journey and book the packages [6] P. Resnick, H. R. Varian, “Recommender sys-
by logging in. tems,” Communications of the ACM, 1997,
2. Guest: The guests will have access only Vol. 40, No. 3, pp. 56-58.
to the explore section where they can [7] C. McTavish, S. Sankaranarayanan, “Intel-
plan their holiday according to their ligent agent based hotel search and book-
requirements. ing system”, IEEE International Conference
on Electro/Information Technology (EIT),
3. Admin: Admin has the access to the data-
2010, pp. 1-6, ISSN 2154-0357.
base to add new tour packages, view all
the booking and manage them.
99 Blockchain based E-vault system for
legal records
Shekhar Srivastavaa, Amritanshub, Maitri Jainc, and Rahul Mauryad
Computer Science and Engineering, Babu Banarasi Das Institute of Technology and Management,
Lucknow, India
Abstract: The concept of blockchain was first presented by the mysterious person known only as Satoshi
Nakamoto in a 2008 essay. It has applications in a number of domains, including data management, the Internet
of Things, and healthcare. In order to help a company make better business decisions, data management is the
act of obtaining, evaluating, safeguarding, and preserving information about an organization. Information
must be shielded from misuse and illegal access because it is commonly transferred throughout organizations
without the permission of the parties who submitted it. Therefore, in order to encourage user confidence,
organizations need to ensure that their systems are transparent.
Keywords: Internet of things (IoT), blockchain, e-vault, legal record system, diagnosis, dentistry, artificial
intelligence
DOI: 10.1201/9781003606635-99
698 Innovations in Computational Intelligence: Trends and Technologies
verification by other participants. Every block is stored by the healthcare industry. An esti-
contains data, timestamps, the hash value of mated 2314 exabytes of fresh data will be
the previous block, and the block’s hash value. created in 2020. Ensuring the confidential-
Because each block retains the hash value of the ity of stored data is the foremost concern
previous block, creating a chain, the blocks are in the field of data management within the
connected cryptographically. The block’s cryp- healthcare sector. Second, before beginning
tographic link will be broken when a transac- any job, including classification analysis, con-
tion is modified, as indicated by a change in the sent should be acquired. The user’s trust is
block’s hash value. A blockchain’s structure is enhanced when user data transfers between
seen in Figure 99.1. Ultimately, the technology businesses or researchers are made public. The
improves any system’s traceability, transpar- principal justification for utilizing blockchain
ency, and security. However, there are certain technology in consent operations is from its
drawbacks to employing blockchain technol- innate capacity to preserve transaction integ-
ogy for consent management system. rity. Only by adding a new transaction to the
network and notifying the existing parties can
the consent information be changed, involved
2. Related work that the consent details have changed. It was
A vast amount of sensitive data, including thought that this approach may be imple-
patient age and medical report information, mented on a number of blockchain systems.
Hyperledger was selected because it is a per-
missioned blockchain and does not charge
a mining fee for the network to receive new
blocks.
such as social security number, driver’s the studies is rigorously assessed, and any
license, or passports passport are typi- biases caused by reviewers are searched
cally used to prove a person’s identity. out and methodically eliminated. Further-
But there isn’t a comparable method that more, a research procedure needs to be
protects online identities nearly as well. developed.
Blockchain technology can be used to cre- • We adopted a four-step PRIMA technique
ate a digital identity that can be used for as part of our search strategy to make
online transactions in place of a genuine sure that all relevant papers were located
identity. Because it cannot be altered, the and assessed.
likelihood of online fraud is quite low.
In, Alan Colman and colleagues provide 3.2. Examine for strategy and data
a revolutionary approach—which they gathering
apply via Ethereum—for the preservation
of important educational documents. The • Contains information on creating a
authors’ proposed system for data stor- research protocol, formulating research
age and document authentication related questions and keywords, and locating
to education states that the university bibliographic resources.
or other institution would manage the • When creating a search query, the AND
authentication and keep the papers on the operator is used to connect the groups
blockchain. Since data on a blockchain is together, but the OR operator is used to
immutable, requests for verification are join each set of keywords together.
always welcome.
3.3. Selection of relevant studies
3. Methodology • We removed studies that didn’t address the
application of blockchain technology to
The methodology for this research involves
diploma verification or higher education.
establishing clear criteria for selecting rel-
evant literature based on predefined factors
such as time frame, source types, and specific 3.4. Limitation and dangers to
keywords or themes. The process of litera- validity
ture search, screening, and selection will be Every study project has some limitations.
systematically explained, outlining the steps A number of criteria should be taken into
taken to identify pertinent information. If account when assessing this thorough assess-
applicable, any tools or databases utilized in ment of literature because it may affect the
the literature search will be explicitly men- reliability of results.
tioned, providing transparency in the research
approach.
4. Architectural/Block Diagram
3.1. Procedure User interface layer (UI): Dashboard for users
• Consolidates The methods described by to view their documents and interface to
Moher et al. [19] were adhered to in order upload their documents. HTML, CSS, JavaS-
to finish this systematic literature review cript, and ReactJS are integrated to develop
(SLR). Identifying the most efficient tech- a user-friendly interface for seamless interac-
niques through data analysis is the pri- tion with the e-vault system.
mary objective of SLR. This approach asks Web3 integration: Integration of Web3.js
targeted, specific inquiries and follows a library to establish communication between
stringent set of guidelines. The quality of the frontend and the blockchain, allowing the
700 Innovations in Computational Intelligence: Trends and Technologies
user interface to interact with the decentral- Various theories and models have emerged
ized system. to conceptualize the integration of HTML,
CSS, JavaScript, and ReactJS in the frontend
1. Smart contract layer: Solidity is employed development of a blockchain-based e-vault
to code smart contracts, defining the rules system. The synergy between traditional web
and logic governing the creation, retrieval, development technologies and the decen-
and modification of legal records on the tralized nature of blockchain provides a
blockchain. user-friendly interface while maintaining the
2. Blockchain network: Establish a decen- security and transparency essential for legal
tralized blockchain network using con- record-keeping. Frameworks for interopera-
sensus methods based on Proof of Work bility and scalability are explored to enhance
(PoW) or Proof of Stake (PoS) for data the system’s adaptability across diverse
immutability and network security. organizational structures.
3. Decentralized storage: Utilize decentral- The major findings in the literature under-
ized storage solutions like IPFS to securely score the potential of blockchain-based
store and retrieve legal records, linked to e-vault systems to revolutionize how legal
the blockchain. documents are managed. Trends indicate a
4. APIs and business logic: Develop APIs growing interest in the convergence of fron-
for standardized data transmission and tend technologies and blockchain for efficient
retrieval, implementing business logic to and secure data storage. Debates focus on the
validate user requests according to smart trade-offs between decentralization and scal-
contract rules. ability, as well as the need for standardized
5. Security measures: Integrate crypto- protocols in the development and deploy-
graphic measures to enhance data trans- ment of such systems.
mission and storage security, preventing
unauthorized access and tampering.
6. User authentication and compliance: 6. Critical Analysis
Implement secure user authentication, The strengths of the existing literature lie
authorization, and mechanisms for legal in its collective recognition of blockchain’s
compliance, ensuring adherence to regu- inherent security features, offering a tamper-
latory requirements and controlled access resistant and transparent ledger for legal
to the e-vault system. records. The incorporation of HTML, CSS,
JavaScript, and ReactJS in the frontend devel-
opment enriches user experience without
5. Themantic Overview
compromising the security aspects. The appli-
The literature surrounding blockchain tech- cation of Solidity for smart contract develop-
nology in the context of e-vault systems for ment ensures the execution of self-enforcing
legal records reveals several key themes and and autonomous agreements, fostering trust
topics. One prominent theme revolves around in the e-vault system.
the application of blockchain as a secure and However, weaknesses in the literature
transparent solution for storing sensitive become apparent in the lack of consensus on
legal documents. The underlying principle of standardized protocols for interoperability
decentralization, cryptographic hashing, and and scalability. Gaps emerge in addressing the
consensus mechanisms, as embedded in the challenges associated with the integration of
Solidity smart contracts, plays a pivotal part existing legal frameworks with blockchain-
in guaranteeing the integrity and immutabil- based systems. Inconsistencies are observed
ity of the stored records. in the discussion of user adoption hurdles,
Blockchain based E-vault system for legal records 701
particularly concerning the learning curve user-centric design principles and guide-
associated with decentralized technologies. lines for creating intuitive and accessible
Controversies surrounding the trade-offs interfaces for blockchain-based e-vault
between decentralization and scalability pre- systems. Implement gamification and
sent an ongoing challenge. While decentrali- incentive mechanisms to encourage user
zation ensures enhanced security, concerns adoption and promote positive engage-
arise about the potential limitations in pro- ment with the technology.
cessing speed and scalability. The literature 4. Explore the trade-offs between decen-
reflects a need for further exploration of con- tralization and scalability in the context
sensus mechanisms and their implications for of e-vault systems: Analyze the impact
the total effectiveness of blockchain-based of different consensus mechanisms and
e-vault systems. blockchain architectures on the security,
performance, and scalability of e-vault
systems. Develop models to quantify the
7. Recommendations for Future trade-offs between decentralization and
Research scalability in the context of legal record-
1. Develop standardized protocols for inter- keeping. Propose hybrid solutions that
operability and scalability: Identify and combine centralized and decentralized
evaluate existing interoperability and approaches to achieve an optimal bal-
scalability solutions for blockchain-based ance between security, performance, and
e-vault systems. Propose and implement governance.
standardized protocols that facilitate seam- 5. Boost the security and privacy of block-
less data exchange and efficient record chain-based e-vault systems: Investigate
management across different platforms. advanced encryption techniques and
Investigate novel consensus mechanisms access control mechanisms for protect-
and blockchain architectures that optimize ing sensitive legal records stored on the
performance and scalability without com- blockchain. Develop frameworks for user
promising security or decentralization. authentication, authorization, and access
2. Address the integration of blockchain- management in blockchain-based e-vault
based systems with existing legal frame- systems. Explore privacy-preserving con-
works: Conduct comparative studies of sensus mechanisms and zero-knowledge
legal frameworks across different juris- proofs to protect user privacy while main-
dictions to identify commonalities and taining transparency and auditability.
challenges in adopting blockchain-based
e-vault systems. Develop frameworks for 8. Conclusion
mapping legal requirements and proce-
dures to the functionalities of blockchain- This research paper delves into the critical
based e-vault systems. Propose guidelines intersection of blockchain technology and
for implementing smart contracts and legal record-keeping, with a particular focus
consensus mechanisms that comply with on e-vault systems. The overarching theme
legal and regulatory requirements. revolves around the potential transformative
3. Investigate user adoption hurdles and impact of blockchain on enhancing security,
strategies for enhancing user experience: transparency, and efficiency in managing sen-
Conduct user studies to understand the sitive legal documents. Throughout the anal-
perceptions, expectations, and concerns ysis, a variety of applications are explored,
of legal professionals regarding block- spanning healthcare data management, iden-
chain-based e-vault systems. Develop tity verification, and consent operations.
702 Innovations in Computational Intelligence: Trends and Technologies
[12] Clark E. A comparative study of e-vaults [14] Patel R. Securing digital assets with e-vaults
with blockchain integration. In: Digital and blockchain. In: International Confer-
Data Protection Conference. 2019. ence on Cybersecurity. 2018.
[13] Williams A. E-vaults: A blockchain-based [15] Anderson L. Blockchain integration for
approach. J Cryptocurrency Res. 2019. e-vaults. In: Digital Assets Conference Pro-
ceedings. 2018.
100 Anomaly detection in wireless sensor
network
Mayank Shuklaa, Sneha Yadavb, Abhay Pratap Singhc, Fizza Rizvid,
and Surya Vikram Singhe
Department Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management, Lucknow, Uttar Pradesh, India
Abstract: With the recent emergence of the notion of the “Internet of Things,” wireless sensor networks (WSNs),
or WLANs, are critical and indispensable platforms for the future. They are employed in the military, health-
care, industry, and habitat for the purposes of tracking, monitoring, and regulating numerous applications.
However, anomalies that arise for a variety of causes, including node failures, reading mistakes, odd events,
and malicious attacks, have an impact on the quality of data that sensor nodes collect. Thus, before sensor data
is used to inform choices, anomaly detection is a crucial step in ensuring its quality. We outline the difficulties
in detecting anomalies in WSNs and the conditions that must be met in order to create models that are both
successful and efficient. Next, we examine the most recent developments in data anomaly detection research
in WSNs and group existing detection techniques into five major classes according to the detection techniques
used to create these techniques. Variations of the most advanced models in each class are discussed, and their
drawbacks are emphasized to give insight into possible future research directions. In addition, the methods
under assessment are contrasted and assessed according to how well they fulfill the specified criteria. In conclu-
sion, the overall constraints of existing methodologies are referenced and potential avenues for future research
are proposed and deliberated.
Keywords: IoT, anomaly detection, wireless sensor network, machine learning, neural network
a
[email protected]; [email protected]; [email protected]; dRizvif952@
gmail.com; [email protected]
DOI: 10.1201/9781003606635-100
Anomaly detection in wireless sensor network 705
Anomalies are then detected when a user’s that the detection process itself is resistant to
behavior deviates significantly from their malicious attacks.
established profile.
3.11. Integration with access control
3.5. Context-aware anomaly systems
detection Integrating anomaly detection with access
Considering contextual information, such as control mechanisms to dynamically adjust
the physical location of users, time of day, user privileges based on detected anomalies,
or specific network conditions, enhances the enhancing network security.
accuracy of anomaly detection and reduces
false positives. 3.12. User feedback and interaction
Incorporating user feedback and interaction
3.6. Energy-efficient anomaly data to improve the accuracy of anomaly
detection detection models and reduce false positives
Developing anomaly detection methods that by considering user-specific preferences and
are energy-efficient, considering the resource habits.
constraints of sensor nodes in wireless
networks. 3.13. Scalability and robustness
Designing anomaly detection systems that
3.7. Real-time detection and response are scalable to large wireless sensor networks
Implementing real-time anomaly detec- and robust against various types of anomalies
tion mechanisms to promptly identify and and environmental changes.
respond to abnormal user behavior, minimiz-
ing potential security threats or disruptions. 3.14. Data fusion techniques
Employing data fusion techniques to com-
3.8. Collaborative anomaly detection bine information from multiple sensors and
Enabling collaboration between sensor nodes sources for a more comprehensive under-
to collectively analyze user behavior pat- standing of user behavior and improved
terns and detect anomalies more accurately anomaly detection.
through information sharing.
3.15. Threat intelligence integration
3.9. Adaptive models Integrating threat intelligence feeds to enhance
Creating adaptive anomaly detection models anomaly detection by incorporating informa-
that can continuously learn and evolve based tion about known threats and attack patterns.
on changing user behavior and network
conditions. 4. Critical analysis
3.10. Security and privacy 4.1. Accuracy and false positives
considerations
4.1.1. Strength
Addressing the security and privacy impli-
Many anomaly detection algorithms can
cations of user anomaly detection, ensuring
achieve high accuracy in identifying unu-
that sensitive information is protected and
sual patterns. However, achieving a balance
Anomaly detection in wireless sensor network 707
between sensitivity and specificity is crucial to between efficiency and accuracy is essential,
minimize false positives, as these can lead to especially in applications where energy con-
unnecessary alarms and resource wastage. servation is critical.
6. Conclusion
5. Synthesis and Implication
Concluding a computer science project on
“Anomaly Detection in WSN” should effec-
5.1. Patterns, trends, and
tively summarize the key findings, outcomes,
relationships and the significance of your research. Here’s a
1. Improved network reliability: sample conclusion for such a project:
• Synthesis: In wireless sensor networks, In conclusion, the research and implemen-
anomaly detection helps to maintain tation of anomaly detection in WSN have
overall network reliability by spotting yielded several important insights and con-
and addressing anomalous activity tributions. This project aimed to address the
that could jeopardize data integrity or critical issue of detecting abnormal behavior
interfere with communication. or events in WSNs, which is vital for ensuring
• Implications: Enhanced network the reliability and security of these networks
reliability leads to improved trust- in various applications, including environ-
worthiness in data collection and dis- mental monitoring, surveillance, and indus-
semination, critical for applications trial automation.
such as environmental monitoring, Key findings and contributions of this pro-
healthcare, and industrial automation. ject are as follows:
2. Enhanced security:
• Synthesis: Anomaly detection acts as 1. Algorithm evaluation: Through an in-
a frontline defense against malicious depth analysis of existing anomaly
activities and security breaches in detection algorithms, we assessed their
wireless sensor networks, helping to performance in the context of WSNs. Our
identify and respond to unauthorized project involved the evaluation of various
access or tampering. machine learning and statistical methods,
• Implications: By bolstering network such as Isolation Forest, One-Class SVM,
security, anomaly detection systems and K-means clustering, to identify their
safeguard sensitive information and suitability for WSN anomaly detection.
prevent potential threats, ensuring the
710 Innovations in Computational Intelligence: Trends and Technologies
Figure 101.1
[email protected]; [email protected]; [email protected]; [email protected]; [email protected]
a
DOI: 10.1201/9781003606635-101
712 Innovations in Computational Intelligence: Trends and Technologies
AQ4:
Please 4. Tolerance for Faults
provide
source The ability of the system to continue operat-
for all the Figure 101.1. Distributed system architecture.
figures
ing as intended even in the event of a failure is
Source: known as fault tolerance. Because distributed
AUTHOR'S SELF GENERATED
Enhancing fault tolerance in distributed systems through machine learning techniques 713
5.5.5. Recuperation
Making the system error-free is the goal of
Figure 101.2. Reliability of fault in the the recovery procedure. This stage entails
distributed system. making the system error-free and bringing it
Source:
back to back-up and state-forward recovery.
AUTHOR'S SELF GENERATED
714 Innovations in Computational Intelligence: Trends and Technologies
use of historical data analysis. [2] Gour L, and Waoo AA. Deep learning list in
name and
approach for enhancing fault tolerance for date style,
Accuracy, precision, recall, F1-score, and
reliable distributed system. 2021. please
ROC-AUC are commonly used metrics to [3] Duddu V, Rao DV, and Balas V. Towards check and
evaluate fault detection algorithms. Evalu- enhancing fault tolerance in neural net- confirm
ation metrics help measure the correctness, works. In: MobiQuitous 2020-17th EAI
this for
CHECKED AND clarity.
CONFIRMED
reliability, and effectiveness of fault detection International Conference on Mobile and
mechanisms. Fault tolerance mechanisms aim Ubiquitous Systems: Computing, Network-
to ensure system continuity, even in the pres- ing and Services; 2020:59–68.
ence of faults, failures, or unexpected events. [4] Khan W, and Haroon M. An unsupervised
Redundancy through replication, consen- deep learning ensemble model for anomaly
sus algorithms, distributed transactions, and
716 Innovations in Computational Intelligence: Trends and Technologies
detection in static attributed social networks. 2022. Singapore: Springer Nature Singa-
Int J Cogn Comput Eng. 2022;3:153–160. pore; 2022:119–128.
[5] Siddiqui ZA, and Haroon M. Research on sig- [12] Kumari P, and Kaur P. A survey of fault toler-
nificant factors affecting adoption of block- ance in cloud computing. J King Saud Univ-
chain technology for enterprise distributed Comput Inf Sci. 2021;33(10):1159–1176.
applications based on integrated MCDM [13] Siddiqui ZA, and Haroon M. Application of
FCEM-MULTIMOORA-FG method. Eng artificial intelligence and machine learning
Appl Artif Intell. 2023;118:105699. in blockchain technology. In: Artificial Intel-
[6] Khan M, and Haroon M. Artificial neu- ligence and Machine Learning for EDGE
ral network-based intrusion detection in Computing. Academic Press; 2022:169–185.
cloud computing using CSE-CIC-IDS2018 [14] Haroon M, Misra DK, Husain M, Tripathi
datasets. In: 2023 3rd Asian Conference on MM, and Khan A. Security issues in the
Innovation in Technology (ASIANCON); internet of things for the development of
2023:1–4. IEEE. smart cities. In: Advances in Cyberology and
[7] Khan W, and Haroon M. An efficient the Advent of the Next-Gen Information
framework for anomaly detection in attrib- Revolution. IGI Global; 2023:123–137.
uted social networks. Int J Inf Technol. [15] Duddu V, Rajesh Pillai N, Rao DV, and Balas
2022;14(6):3069–3076. VE. Fault tolerance of neural networks in
[8] Shahid MA, Islam N, Alam MM, Mazliham adversarial settings. J Intell Fuzzy Syst.
MS, and Musa S. Towards resilient method: 2020;38(5):5897–5907.
An exhaustive survey of fault tolerance [16] Khan W, Haroon M, Khan AN, Hasan MK,
methods in the cloud computing environ- Khan A, Mokhtar UA, and Islam S. DVAE-
ment. Comput Sci Rev. 2021;40:100398. GMM: Dual variational autoencoder with
[9] Kalaskar C, and Thangam S. Fault tolerance Gaussian mixture model for anomaly detec-
of cloud infrastructure with machine learn- tion on attributed networks. IEEE Access.
ing. Cybern Inf Technol. 2023;23(4):26–50. 2022;10:91160-91176.
[10] Siddiqui ZA, and Haroon M. Research on sig- [17] Wang K, and Louri A. Cure: A high-
nificant factors affecting adoption of block- performance, low-power, and reliable net-
chain technology for enterprise distributed work-on-chip design using reinforcement
applications based on integrated MCDM learning. IEEE Trans Parallel Distrib Syst.
FCEM-MULTIMOORA-FG method. Eng 2020;31(9):2125–2138.
Appl Artif Intell. 2023;118:105699. [18] Wang K, and Louri A. Cure: A high-
[11] Khan W, and Haroon M. A pilot study and performance, low-power, and reliable net-
survey on methods for anomaly detection in work-on-chip design using reinforcement
online social networks. In: Human-Centric learning. IEEE Trans Parallel Distrib Syst.
Smart Computing: Proceedings of ICHCSC 2020;31(9):2125–2138.
102 Predicting breast cancer risk: A machine
learning approach
Navin kumar Agrawal
Department of Computer Engineering and Applications, GLA University, Mathura, India
Abstract: One of the most fatal diseases is breast cancer, which originate in breast cells. It majorly effects the
females worldwide, although it may also in male, though very less frequently. When cells in the breast tissue
begin to grow uncontrolled, breast cancer develops. It may occur in the connective tissue of the lobes, among
other areas of the breast. Breast cancer analysis and prediction have emerged as crucial components in the fight
against one of the most prevalent and life-threatening diseases affecting women worldwide. In the realm of
predictive modelling, machine learning algorithms have gained prominence. These models leverage a multitude
of patient data, encompassing demographic information, genetic markers, and histopathological features, to
forecast risk, treatment response, and survival outcomes. Personalized medicine, guided by these predictions, is
transforming the landscape of breast cancer treatment, optimizing therapeutic strategies for individual patients.
[email protected],[email protected]
DOI: 10.1201/9781003606635-102
718 Innovations in Computational Intelligence: Trends and Technologies
Survival and Prognosis: Breast cancer sur- Early Detection: Mammography, ultra-
vival rates have grown as a result of early sound, MRI, or some other tomography tech-
identification and treatment advancements niques are used in early detection of breast
[4]. The size of the tumor, the grade at diag- Cancer. These images are analyzed by radi-
nosis, and other factors affect the prognosis, ologists, and computer aided detection sys-
and receptor status. Regular follow-up and tems can help in distinguishing abnormal
adherence to treatment are crucial for long- condition.
term survival. Biopsy and Pathology: If mistrustful
Prevention and Screening: Reducing the lesions found in the imaging, a diagnostic test
risk of breast cancer includes lifestyle mod- required to be taken to confirm the presence
ifications like managing healthy weight, of cancer. Pathologists examine tissue sam-
restraining alcohol consumption, and should ples to determine the type and grade of can-
be physically active. Regular breast cancer cer, which helps in treatment planning.
screening through mammography and clini- AI and Machine Learning: These algo-
cal breast exams is vital for early detection, rithms can analyse datasets to anticipate
especially for individuals with risk factors [5]. breast cancer probability, assist radiologists
Resources and Support: Receiving a breast in detecting abnormalities in images, and even
cancer diagnosis and undergoing treatment predict treatment outcomes based on patient
can be mentally and physically taxing. To data. These models can be trained on diverse
assist patients and their families in coping datasets to improve accuracy [6].
with the illness, a wealth of resources and Treatment Prediction: Predictive models
support groups are offered. can help oncologists select the most effective
Breast cancer is a complex and diverse treatment options for individual patients.
disease, and advancements in research and This can involve predicting how a patient
medical treatments continue to improve out- will respond to different therapies based on
comes [6]. Early detection and awareness are their genetic profile and tumor characteris-
key to successfully managing breast cancer, tics [7].
so it’s essential for everyone to be informed Survival and Recurrence Prediction:
about risk involve. Machine learning algorithm are to be utilized
Breast cancer analysis and prediction to guess a patient’s likelihood of survival and
involve using various techniques, tools, and the risk of cancer recurrence. These predic-
data to assess the risk of breast cancer, diag- tions help in making treatment decisions and
nose it, and predict outcomes or response designing follow-up plans [7].
to treatment. Here are some key aspects of Drug Discovery: AI and machine learning
breast cancer analysis and prediction: can also be used for drug discovery, identify-
Data Collection: The first step in breast ing new compounds or repurposing existing
cancer analysis is collecting relevant data. drugs for breast cancer treatment.
This data includes patient demographics, Clinical Trials: Data analysis and pre-
family history, genetic information, mam- diction play a decisive part in the design or
mography images, biopsy results, and other execution in clinical trials for breast cancer
clinical data. treatments. They help identify suitable candi-
Risk Assessment: Predictive modeling dates for trials and assess trial outcomes.
could be in use to evaluate a person’s risk of Patient Support: Predictive models and
underdeveloped breast cancer. This typically data analysis can be used to provide patients
involves analyzing risk factors such as age, with personalized information about their
family history, genetics, and lifestyle choices. condition, treatment options, and potential
Models like the Gail model or the Tyrer-Cuz- side effects, enabling shared decision-mak-
ick model are used for risk assessment. ing [8].
Predicting breast cancer risk: A machine learning approach 719
3. Results
To find the best result in this paper logistic
Regression method we used to predict the
breast cancer concerns, in this paper outcome
were calculated and examined. The accuracy
produced my model is 89.07.
ROC curved shape is pictorial represent
the demonstration, in this logistic regression
Figure 102.1
model is used, across different thresholds for
making predictions. It depicts the trade-off
between the True Positive Rate (Sensitivity)
and the False Positive Rate (1 - Specificity) as
the discrimination threshold is adjusted.
Confusion matrix provides a way to visu-
alize how well your model is doing in terms
of making correct and incorrect Figure 102.2
predictions.
Figure 102.2. Performance evaluation using
The four components of a confusion matrix
confusion matrix.
are TP (True-Positive), TN (True-Negative),
FP (False-Positive), and FN (False-Negative). Source: AUTHOR'S SELF GENERATED
AQ1:
Please
provide
TEXT
in-text BOX ANNOTATION ADDED
citation
for figures
1-3.
AQ2:
Please
provide
source Figure 102.1. Performance evaluation using Figure 102.3. Learning curve using logistic
for all the ROC curve. model.
figures
NOTE ADDED
Source: Source:
AUTHOR'S SELF GENERATED
AUTHOR'S SELF GENERATED
Predicting breast cancer risk: A machine learning approach 721
Abstract: Resource provisioning in fog computing is a crucial research area that focuses on optimizing resource
allocation and ensuring secure data transmission in Fog Computing Environments (FCE). The challenge lies
in balancing computational load, security, and energy efficiency, requiring an effective optimization algorithm
to address these multiple objectives simultaneously. A trust-based energy-aware secure load balancing and
resource provisioning framework in fog computing has been proposed, which incorporates methods such as
Fog Node Trust Computation, Trust Credibility Assessment, Allocation (DEER), Time-Constraint Energy
Minimum Problem (TCEMP), and the utilization of the Multi-objective MSA algorithm. The future potential
of this framework, utilizing a Multi-objective MSA algorithm, is in fog computing, potentially leading to wide-
spread adoption as a secure alternative to traditional cloud computing.
Keywords: Energy-Aware Load Balancing, Resource Provisioning, Fog Computing, Multi-Objective Optimiza-
tion Algorithm, Dynamic Energy Efficient Resource Allocation, Time-Constraint Energy Minimum Problem
DOI: 10.1201/9781003606635-103
724 Innovations in Computational Intelligence: Trends and Technologies
load balancing, and trust-based resource pro- of the entities involved in the trust-based
visioning. By leveraging advanced multi-objec- energy-aware in fog computing. The MOO
tive optimization algorithms, the framework algorithm is utilized to identify the most
maintains a balanced system that improves reliable and optimal entities for resource
performance, security, and energy usage. allocation.
The block diagram in Figure 103.1 (1)
depicts the DEER approach, which focuses
on energy-efficient load balancing through The trust credibility evaluation model
dynamic resource allocation. By intelligently assesses trust over consecutive periods [t0,
distributing the workload among fog nodes, t] and then recalculates the trust at the most
this approach minimizes energy consump- recent time instance t.
tion. Additionally, the integration of MOO
algorithms such as Multi-Objective MSA 5. Energy-Aware Load Balancing
and HHO algorithm aids in optimizing mul-
tiple objectives simultaneously for resolving To achieve this, a multi-objective optimiza-
complex issues related to fog node trust and tion algorithm is utilized to distribute work-
energy efficiency. The framework also consid- loads and resources among nodes, taking into
ers TCEMP to ensure that energy needs are account energy usage and security needs. This
fulfilled within specified time limits. strategy enhances the effectiveness of fog
computing systems in terms of performance
and energy efficiency, ensuring reliability and
4. Trust-Based Framework security in operations.
Development
Developing a framework based on trust 6. Experimentation and Result
involves creating a system that relies on trust Discussion
as a key factor in achieving energy-efficient,
secure load balancing, and resource provi- A trust-based energy-aware secure balancing of
sioning in fog computing. load and resource provisioning mechanism in
fog computing using a MOO algorithm imple-
mented to optimize the allocation of resources in
4.1. Trust credibility assessment
FCE while considering the trustworthiness and
The trust credibility assessment focuses on EC of fog nodes. The experimentation outcome
evaluating the credibility and dependability underscores the potential performance and fog
computing efficiency systems techniques with
MATLAB’s analytical capabilities.
6.1. Development of a trust-based
framework
Fog Node Trust Computation refers to the
process of determining the trustworthiness
of fog nodes based on various factors such
as their previous performance and reliabil-
AQ1: ity. Trust Credibility Assessment refers to the
Please
provide assessment of the credibility and dependabil-
source Figure 103.1. Flow diagram of trust-based ity of the trust information provided by fog
for all the system.
figures
nodes, ensuring the accuracy and dependabil-
Source:
AUTHOR'S SELF GENERATED
ity of the trust scores.
726 Innovations in Computational Intelligence: Trends and Technologies
References
[1] ALI, B.A., 2023. Efficient trust-aware authen-
tication and task offloading in Multi-access
Edge Computing using a dual fuzzy method
based Zero Trust Security framework (Doc-
toral dissertation, RMIT University).
[2] Wang, C., Yuan, Z., Zhou, P., Xu, Z., Li, R.
and Wu, D.O., 2023. The Security and Pri-
vacy of Mobile Edge Computing: An Artifi-
cial Intelligence Perspective. IEEE Internet of
Figure 103.5. Resource Optimization Graph Things Journal.
Theta. [3] Zhou, S., Jadoon, W. and Khan, I.A., 2023.
Computing Offloading Strategy in Mobile
Source: AUTHOR'S SELF GENERATED
Edge Computing Environment: A Compari-
son between Adopted Frameworks, Chal-
than 3 for many user requests. In contrast, the lenges, and Future Directions. Electronics,
cloud has less degrading values compared to 12(11), p.2452.
the fog. [4] Aqeel, I., Khormi, I.M., Khan, S.B., Shuaib,
M., Almusharraf, A., Alam, S. and Alkhaldi,
N.A., 2023. Load Balancing Using Artificial
7. Conclusion Intelligence for Cloud-Enabled Internet of
The study recognizes that fog computing, Everything in Healthcare Domain. Sensors,
with its distributed nature and reliance on 23(11), p.5349.
[5] Hazra, A., Rana, P., Adhikari, M. and
resource constraints, requires an efficient
Amgoth, T., 2023. Fog computing for next-
and secure approach to handle the dynamic generation internet of things: fundamental,
workload and resource allocation. The devel- state-of-the-art and research challenges.
oped algorithm, which incorporates multi- Computer Science Review, 48, p.100549.
ple objectives such as energy efficiency, load [6] Das, R. and Inuwa, M.M., 2023. A review
balancing, and security, enhances the overall on fog computing: issues, characteristics,
performance of fog computing systems. By challenges, and potential applications. Tele-
utilizing the MATLAB instrument, the evalu- matics and Informatics Reports, p.100049.
ation and efficiency of the fog computing pro- [7] Songhorabadi, M., Rahimi, M., Moghad-
cess are being assessed. Finding this approach amFarid, A. and Kashani, M.H., 2023. Fog
achieves a balance between system efficiency, computing approaches in IoT-enabled smart
security, also, energy enhancement in dynamic cities. Journal of Network and Computer
fog environments. This results in improved Applications, 211, p.103557.
[8] Burhan, M., Alam, H., Arsalan, A., Rehman,
energy efficiency, reducing the overall opera-
R.A., Anwar, M., Faheem, M. and Ashraf,
tional costs and environmental impact. The M.W., 2023. A comprehensive survey on the
experimental evaluation confirms the efficacy cooperation of fog computing paradigm-
of the proposed algorithm showcasing its based iot applications: layered architecture,
ability to achieve a trade-off between various real-time security issues, and solutions. IEEE
objectives. It outperforms existing described Access.
algorithms in different words load balancing, [9] Srirama, S.N., 2024. A decade of research
resource provisioning, and security, leading in fog computing: relevance, challenges, and
728 Innovations in Computational Intelligence: Trends and Technologies
Abstract: This study introduces early detection of brain tumors in children and focused on magnetic resonance
imaging (MRI) characteristic of children brain tumors and to create an automated segmentation system that
might use machine learning techniques to separate and categorize tumors and compare the results with radi-
ologist diagnoses. Accurate and timely identification of brain tumors, especially in children, is paramount for
effective planning of treatment and improving patient welfare. The intricate structure of the developing brain,
coupled with the heterogeneity of tumor types, presents significant challenges for conventional diagnostic meth-
ods. This study introduces automated approach for the detection and generalization of brain tumors in children
using MRI and advanced machine learning algorithm. Artificial intelligence-automated tumor description for
pediatric gliomas would enable real-time volumetric assessment to support clinical decision-making, treatment
response evaluation, and diagnosis. Auto-segmentation algorithms for pediatric brain tumor are uncommon
and have not yet demonstrated clinical translation due to a lack of available data.
Keywords: Medical image, CNN, BPN, neural network, deep learning, pediatric low-grade gliomas (pLGGs)
DOI: 10.1201/9781003606635-104
Replace 1 by [6]
730 Innovations in Computational Intelligence: Trends and Technologies
learning has been a potent technique in medi- highlighting the effectiveness of these tech-
cal imaging recently, providing answers to niques in improving diagnostic accuracy.
many clinical problems. While there are still However, customized approaches are needed
certain obstacles to overcome, auto-segmenta- to address the unique problems related to
tion based on deep learning offers a promising pediatric brain tumors, including the com-
method for the precise and effective segmenta- plexity of the developing brain and the wide
tion of brain tumors, including pLGGs1. variety of tumor features. Children’s brain
One main problem is the relative rarity tumors have certain characteristics that
of pLGGs due to the unavailability of data require specialized approaches in their detec-
sets for public use for training the models. tion and analysis. [8]
[7] Maximum brain tumor detection algorithms Convolutional neural networks (CNNs), a
have been developed for young people with class of deep learning algorithms, are effective
gliomas, which are common and benefit from particularly effective in medical image analy-
large volumes of publicly available data sets sis because of automatically extract relevant
for training the model7. To compare segmen- features from raw image data3. Studies such
tation models’ performance to that of profes- as Qader et al. (2022) have demonstrated
sionals, ascertain their actual performance the effectiveness of CNNs in brain tumor
level, and assess their potential for clini- detection, showcasing their potential to sig-
cal translation, human clinical evaluation is nificantly improve diagnostic outcomes. By
crucial. leveraging the strengths of both traditional AQ3:
Please
There are many methods have been pro- ML and deep learning algorithms, research- define
posed to increase the machine learning per- ers aim to develop robust systems capable of ML, if
needed.
formance with the limited data set. Recently, addressing the inherent complexities of pedi-
there are many advancements have been atric brain tumor analysis.
done in the machine-learning field, that are Using pediatric brain MR scans, a retro-
considered to increase the obligation of MRI spective analytical study was conducted at
images for analysis of Machine Learning KASCH Hospital in Riyadh, Kingdom of
algorithms, although they can be challenging Saudi Arabia (KSA) to evaluate the effective-
to implement. ness of many machine learning techniques in
This review aims to explore the current the early detection of brain cancers. The Insti-
state of research on pediatric brain tumor tutional Re-view Board of Princess Nourah
detection using MRI images and machine bint Abdulrahman University (PNU) granted
learning algorithms, with a focus on deep approval, and between November 2022 and
learning-based auto-segmentation for tumor March 2023, a manual dataset assessment
detection. We will discuss the advancements was conducted to determine the appropri-
and current problem that associated with ate eligibility criteria for this study (IRB Log
the detection of brain tumor in children, as Number: 22–1004). Brain tumor MRI pic-
well as make the effective strategies to con- tures from patients under 14 selected from
nect and fill the gap for pediatric brain tumor PACS were one of the eligibility requirements.
segmentation algorithms, ultimately aiming Any patient in the same age group who is
to enhance the clinical applicability of these older than 14 and has a brain tumor or a
technologies. tumor in a different location.
Deep learning has been applied to dis-
cover and detect various brain disorders in
2. Methodology fetuses and toddlers. This section outlines
Azhari et al. investigated the use of ML for current deep learning-based techniques for
tumor classification in medical imagery,
Pediatric brain tumor detection in MRI: A machine learning perspective 731
finding and categorizing pediatric brain and Prince et al. (2020) utilized a combina-
tumor research. tion of CNN and genetic algorithm (GA) as a
[9-15] meta heuristic optimizer.
The types and locations of tumors inves-
3. Overview of Current Work tigated vary across studies. Arle et al. studied
Initial brain tumors are a variety of cancers posterior fossa tumors (astrocytomas, PNETs,
that can be benign or malignant and arise and ependymomas). Bidiwala and Pittman
from the brain parenchyma and surround- focused on posterior fossa tumors (astrocy-
ing tissues. Only leukemia causes more child- tomas, ependymomas, and medulloblasto-
hood death and morbidity globally than mas). Quon et al. researched posterior fossa
brain tumors, which are the most prevalent tumors (diffuse midline glioma, medulloblas-
solid tumors in the pediatric age range4. The toma, and ependymoma). Ye et al. examined
majority of research indicates that astrocyto- various histologic elements of pediatric brain
mas, medulloblastomas, and ependymomas tumors, while Prince et al. analyzed adaman-
are the three most prevalent forms of juve- tinomatous craniopharyngioma (DOLL).
nile brain tumors. The kind and grade of The imaging techniques used in these
the tumor affect the overall survival rate in studies are diverse. Arle et al. utilized mag-
children with brain tumors. The highest sur- netic resonance spectroscopy (MRS) + mag-
vival rates among juvenile brain tumors are netic resonance imaging (MRI) + Meta Data.
seen in low-grade gliomas, such as pilocytic Bidiwala and Pittman combined computed
astrocytoma, which have a 10-year progres- tomography (CT) + MRI (T1W1, T2W1)
sion-free survival rate of over 95% follow- + Meta Data. Quon et al. focused on T2
ing gross complete resection. Because brain weighted MRI, Ye et al. used DBSI, and Prince
tumors are aggressive and have a large influ- et al. combined CT + MRI + combined CT +
ence on young lives, they pose a significant MRI.
challenge to public health, especially in chil- The data sets used in these studies range in
dren. Timely and precise diagnosis is essen- scope and size. Arle et al. and Bidiwala and
tial for efficient treatment and higher survival Pittman both used self-acquired data sets con-
rates (Işın et al., 2016). Since MRI provides sisting of 33 children. Quon et al. conducted
comprehensive anatomical information with- a multi-institutional study involving 617
out subjecting patients to ionizing radiation, children. Ye et al. used nine pediatric brain
it has emerged as the gold standard for the tumor post-mortem specimens, and Prince et
identification of brain tumors. However, al. conducted a multi-institutional study with
manual MRI picture interpretation is time- 617 children.
consuming, prone to human error, and can The classification accuracy rates reported
vary among radiologists. in these studies vary. Arle et al. achieved
Different studies have employed vari- 58%-95%, Bidiwala and Pittman achieved
ous methodologies to enhance the detection 72.7%-85.7%, Quon et al. reported a detec-
and classification of pediatric brain tumors. tion accuracy with an AUROC of 0.99, Ye et
Arle et al. (1997) used a 4 back propaga- al. achieved 83.3%, and Prince et al. reported
tion neural network (BPNN), while Bidiwala classification accuracies of 85.3%, 83.3%,
and Pittman (2004) utilized a general Neural and 87.5% for different modalities. This
Network. Quon et al. (2020) implemented a comparative overview highlights how vari-
modified 2D ResNeXt-50-32x4d Deep Learn- ous machine learning and imaging techniques
ing Architecture. Ye et al. (2020) combined enhance tumor detection and classification in
diffusion basis spectrum imaging (DBSI) with pediatric patients.
a deep learning neural network (DHI model),
732 Innovations in Computational Intelligence: Trends and Technologies
This review provides a comparative analy- highlight its specific relevance to current
sis of different methodologies, imaging tech- studies:
niques, data sets, and accuracy rates in the Addressing a critical need: Tumor in brain
study of brain tumor of children. The integra- of children is a head most reason of tumor-
tion of advanced imaging methods with AI related deaths in children. Accurate and
significantly improves the accuracy and effec- timely detection of brain tumor can increase
tiveness of tumor classification and detec- the children survival rate.
tion. Future research should focus on further Building on existing research: Previous
improving these techniques and expand- studies have demonstrated the potential
ing collaborative data collection efforts to of CNNs in brain tumor detection in adult
enhance the robustness and generalizability populations. However, there is a scarcity of
of findings in pediatric brain tumor research. research specifically focused on pediatric brain
tumors, which present unique challenges due
to their diverse nature, smaller size, and vary-
4. Relevance to Current Study ing presentation across different age groups.
The proposed study, “Brain Tumor Detec- This study fills this gap by developing a CNN
tion in Child from MRI Images Using CNN,” model tailored for pediatric MRI analysis.
holds significant relevance within the broader Leveraging technological advancements:
landscape of medical imaging and artificial Recent advancements in deep learning and
intelligence research. The following points computational power have made CNNs more
Table 104.1: Comparison of various Reasearch Based Deep
Table 104.1. Learning methodologies for Brain Tumor detection
accessible and effective for medical image of sizable public datasets available in recent
analysis. This study utilizes these advance- years. The lifespan human connective initia-
ments to develop a sophisticated CNN model tive development (HCP) is one such initiative.
capable of accurately identifying and classify- To the greatest extent feasible, deep learning
ing brain tumors in children. will thus be able to supplement and improve
Potential for clinical impact: The proposed pediatric imaging. The use of neural networks
study has the potential to translate into real- and their enhanced models has greatly aided
world clinical impact by providing radiolo- research. In reality, many CNN designs consist
gists and clinicians with a powerful tool for of many layers, including extra normalization
early tumor detection, potentially improving layers and batch normalization. Further-
diagnostic accuracy and leading to more effec- more, each design has been highly developed
tive treatment strategies for young patients. employing concepts from probabilistic mod-
Contribution to scientific knowledge: This els and optimization. By using small patches
research will investigate the use of CNNs in as a computational advantage researchers
the diagnosis of pediatric brain tumors, add- studying brain magnetic resonance imaging
ing to the expanding body of knowledge in can train deep CNNs to provide suitable seg-
medical imaging and artificial intelligence. mentation algorithms. The medical imaging
The results of this investigation will be help- area, which typically uses simplistic designs,
ful for further study and advancement in this recognized this accomplishment widely6.
area. In addition, the development of genera-
tive adversarial networks (GANs) have led
to encouraging advancements in the study of
5. Gaps in Existing Knowledge brain tumors using GANs in medical imag-
It can be difficult to detect and classify brain ing investigations; nevertheless, few meth-
tumors in children due to their high degree of ods have been applied to children using MRI
variety in terms of size, location, and appear- data6.
ance. CNN models must be resilient to such However, GANs have the capability to
fluctuations. learn in supervised as well as unsupervised
There is insufficient pediatric data in the environments. It is evident that the image-to-
majority of publically accessible brain tumor image translation achieved by GANs might
datasets to support the training and valida- have several more beneficial applications in
tion of CNN models tailored to the distinct the field of medical imaging. Restoring MR
brain anatomy and tumor types of children. pictures obtained with specific objects, such
Brain tumors in children are frequently
tiny and challenging to identify in their early
stages. CNN models ought to be fine-tuned to
identify minute lesions and distinguish them
from healthy brain tissue.
Deep learning has the capability to
enhance the quality and usefulness of pediat-
ric imaging. Pediatric radiologists face many
obstacles in their quest to fulfill this promise,
including the creation of a wide range of data- AQ5:
Please
sets and careful labeling, many of which are Figure 104.1. Pediatric brain tumor detection provide
unique to pediatric imaging applications6. In and classification studies different model and source
their accuracy. for all the
order to solve this issue, the medical imaging figures
sector has already begun to make a number Source: AUTHOR'S SELF GENERATED
734 Innovations in Computational Intelligence: Trends and Technologies
motion, especially in a pediatric setting, can The ML model, developed for real-world
assist cut down on the number of rechecks6. clinical use, is expected to aid radiologists in
The self-learning capacity of new deep early and accurate diagnosis of brain tumors
learning approaches has completely changed in children, potentially improving treatment
the landscape of pediatric brain tumor outcomes.
research programs. Three studies, for instance,
demonstrate remarkable findings that exceed
95% accuracy in posterior FOSSA tumor 7. Conclusion
categorization. CNN has been recognized Machine learning algorithm has emerged as
for its achievements, but its full potential in a promising tool for pediatric brain tumor
brain MRI research has not yet been realized. detection and analysis using MRI images.
Before the trustworthy CNN applications Studies have shown that deep learning mod-
can be employed in clinics, more study in this els can achieve high accuracy in tasks such
area is still necessary. as tumor segmentation, feature detection, and
classification9. For instance, the proposed
6. Expected Outcomes deep learning-based model achieved high
accuracy and specificity in predicting individ-
The research aims to create a ML model for ual MR characteristics and tumor type. This
detecting and classifying brain tumors in chil- suggests its potential to aid radiologists, espe-
dren from MRI images, aiming for high accu- cially those without specialized neuroradiol-
racy, sensitivity, and specificity. ogy or neuro-oncology training, in making
The study will assess the ML model’s per- timely and accurate diagnoses. Furthermore,
formance using metrics like accuracy, sensitiv- the model could serve as a foundation for a
ity, specificity, precision, recall, and F1-score multi- pathological data for predicting molec-
to evaluate its ability to accurately detect and ular genetics using deep learning or machine
classify tumors11. learning techniques10.
The ML model will be compared to cur- However, challenges remain in implement-
rent pediatric brain tumor detection methods ing deep learning for brain tumor detection
to assess its strengths and weaknesses, and in children. These challenges include limited
identify any potential improvements. datasets with diverse and accurately labeled
data, the complex and variable nature of
pediatric brain tumors across different
age groups, and the need for interpretable
models7.
Future research should focus on overcom-
ing these challenges by: Expanding and diver-
sifying pediatric brain tumor image datasets.
Abstract: An essential mechanism that enhances sensor network security is trust management. In order to
develop smart nodes for social connections, the IoT-enhanced social networks combines the internet of things
(IoT) with social networks. Service requestors must evaluate service providers’ levels of trustworthiness in order
to deal with misbehaving ones. In order to lower the danger of being exposed to malicious nodes, this study
suggests a novel trust management method for the social internet of things (SIoT) that anticipates which service
providers will be the most dependable for each requestor. A new paradigm known as the SIoT has emerged as
a result of the IoT integration of social networking. Building trust between things is still important, though.
This work investigates an effective paradigm for context-aware trustworthiness inference, which distinguishes
between familiarity and similarity trust. While similarity trust may be determined using both internal and
external similarity trust, familiarity trust can be determined using direct trust and suggestion trust. and lastly,
design to solve data sparsity and cold start difficulties, identify reliable nodes, and extract latent characteris-
tics from SIoT-enhanced social networks nodes, a matrix factorization approach is employed. A field of study
called SIoT integrates social networks and the IoT. The SIoT allows things to communicate with each other as
customers or service providers based on their social behavior. It should be simple and reliable for these items to
find the services they are looking for. Objects that discriminate and do not enhance the quality of services are
seen as sensible behavior. To tackle this problem, A trust management system with discriminative awareness is
introduced for service delivery in socially enabled IoT.
Keywords: Social internet of things, trust management, cyber security, trustworthiness inference framework,
matrix factorization
a
[email protected]; [email protected]
DOI: 10.1201/9781003606635-105
Enhancing trust in the social internet of things (SIoT): A comprehensive review 737
number of connected devices. [4]. The diverse are hundreds of millions of linked devices,
nature of the IoT and the vast amount of con- the IoT infrastructure is complicated. Add-
textual data it generates add to its complexity ing people to this setting is a workable solu-
[7]. The SIoT can efficiently locate goods and tion to get around its complexity. Data may
services by mapping a system of “friendly” provide significant insights once it has been
items, rather than relying on traditional, less processed, analyzed, and mined. But from
scalable internet discovery methods. Addi- a scalability standpoint, IoT search engines
tionally, social network analysis techniques have been observed to be non-scalable with
can be used to identify the problem within respect to the number of devices. [10], which
the socially enabled IoT. means they are unable to manage the enor-
The IoT concept entails utilizing common mous volume of requests that are sent. The
communication rules and special addressing IoT presents the risk of phony items, which
schemes to link a vast number of heterogene- might include individuals who are unable
ous smart items in the non-virtual world to to access the proper services and things that
the internet [2]. The principal benefit of the could act as malware and steal data from
IoT is in its ability to socialize these smart other objects. Smart dust and false particles
devices by emulating human behavior, so are among the attacker nodes in that network
forming a social network of smart items [3]. that are capable of stealing confidential data
The social interactions that form between about military circumstances (such as those
smart objects can optimize and support a at a nation’s border) [10]. Socially enabled
number of fundamental network operations IoT suggests integrating social networking
through the use of positive feedback [5]. The with the IoT to prevent such issues.
IoT system has to be able to automatically cre-
ate and maintain social relationships between
smart devices in order to achieve all of these 2. Related Work
goals. Over the past 10 years, social net- The literature survey in this paper “social-
working has been incorporated into a num- trust-aware variational recommendation”
ber of communication networks to aid with reviews relevant classical social recommenda-
resource searches and traffic routing. In many tion models and deep neural network-based
studies have looked into the potential use of models before positioning the proposed
social networking components in IoT solu- SOAP-VAE model in relation to these works.
tions whereby things may form social bonds Overall, the literature survey in the paper
on their own, following the social norms that contextualizes the proposed SOAP-VAE
their owners have established [3]. One of the model within the existing landscape of social
key elements of the internet of the future is recommendation models and deep neural
the IoT. Sensors and actuators are typically network-based approaches, highlighting its
used to link physical items to the internet contributions and advancements in address-
because they can quickly develop IoT tech- ing data sparsity and incorporating diverse
nology by offering a variety of services [6]. levels of influence in social recommender sys-
Object–object connectivity in the IoT refers tems [11].
to connecting different things. Virtual objects This research’s literature review explores
(VOs) are computer representations of real- various existing trust models and methods
world items that have been around for a while employed in wireless sensor networks to
[8]. Two of the biggest issues with the IoT detect and prevent malicious node attacks.
are scalability and data collecting [9]. Data It highlights the critical role of trust evalu-
collection via voice over satellite (VO) is ini- ation in assessing node reliability based on
tially a challenging operation. Because there past behavior [12]. Several trust models,
738 Innovations in Computational Intelligence: Trends and Technologies
accurate.
Test the Model and Deploy the Model:
The designed trust model is thoroughly tested AQ5:
and then deployed in the SIoT environment. Please
provide
End: The process concludes after the model source for
is successfully deployed. Figure 105.1. Proposed flow chart. the figure
The flow chart ensures that the trust man- Source: AUTHOR'S SELF GENERATED
agement framework is systematically devel-
oped, evaluated, and implemented, focusing to ensure that the trust model grows effi-
on both direct and indirect trust interactions ciently enough to accommodate large-
while maintaining security and scalability. scale networks without sacrificing speed.
Many IoT devices have limited comput-
4. Challenges ing and storage capacity. Implementing
a trust architecture that is both resource
The challenges at hand necessitate a multidis- efficient and effective is difficult.
ciplinary approach, encompassing expertise 3. Security and privacy: Ensuring the integ-
in IoT, security, data science, and network rity of the data used to calculate trust is
engineering. critical. Malicious devices or users may
1. Complexity in trust computation: Trust attempt to modify data in order to fraud-
in SIoT is driven by a variety of elements, ulently increase their trust scores. Collect-
including device reliability, data qual- ing and analyzing data to estimate trust
ity, user reputation, and context aware- levels might cause privacy issues. Balanc-
ness, making it difficult to aggregate these ing the requirement for data to calculate
measures into a single trust score. Main- trust while also protecting user privacy is
taining accurate trust scores in changing a key difficulty.
settings is similarly difficult. 4. Interoperability: SIoT networks fre-
2. Scalability: SIoT networks can include a quently comprise of heterogeneous devices
large number of linked devices. It is critical
Enhancing trust in the social internet of things (SIoT): A comprehensive review 741
that use diverse communication proto- approaches. The proposed models and mech-
cols, standards, and capabilities. Creat- anisms demonstrate superior performance in
ing a trust model that works seamlessly accuracy, convergence, attack resilience, and
across several platforms is tricky. A lack mitigating cold start problems.
of standardization in trust calculation Future research directions include verify-
techniques might impede the integration ing model properties in dynamic environ-
of various trust models and their compat- ments, exploring hypergraph-based social
ibility within a hybrid architecture. relations, and further enhancing trust man-
5. Trust dynamics: Trust evolves through- agement frameworks to adapt to evolving
out time depending on interactions and SIoT contexts. Overall, this review under-
experiences. Capturing the temporal com- scores the critical role of trust management
ponent of trust and updating trust scores in the effective deployment and operation of
dynamically is a difficult undertaking. SIoT systems.
Trust levels might differ depending on the
setting in which interactions occur. Incor-
porating context-awareness into the trust References
model to appropriately represent these [1] Atzori L, Iera A, Morabito G, and Nitti
variances is difficult. M. The social internet of things (SIoT)—
6. User behavior: Detecting and limiting the when social networks meet the internet
impact of malicious conduct by people or of things: concept, architecture and net-
devices is critical. This involves identifying work characterization. Comput Netw.
2012;56(16):3594-3608
phony identities, Sybil attacks, and other
[2] Pattar S, Buyya R, Venugopal KR, Iyen-
trust-manipulation techniques. Under- gar SS, and Patnaik LM. Searching for
standing and applying user behavior pat- the IoT resources: fundamentals, require-
terns into the trust model can improve its ments, comprehensive review and future
accuracy while increasing its complexity. directions. IEEE Commun Surv Tutor.
5. Conclusion 2018;20(3):2101-2132.
The IoT in social requires robust trust manage- [3] Bernal Bernabe J, Hernandez Ramos JL,
ment systems to ensure reliable and satisfac- and Skarmeta Gomez AF. TACIoT: multi-
tory services among numerous interconnected dimensional trust-aware access control sys-
objects. This review paper presents a compre- tem for the Internet of Things. Soft Comput.
hensive analysis of various trust management 2016;20(5):1763-1779.
frameworks in socially enabled IoT, highlight- [4] Nitti M, Atzori L, and Cvijikj IP. Friendship
ing the importance of social relationships and selection in the social Internet of Things:
challenges and possible strategies. IEEE
the classification of trust attributes. It dis-
Internet Things J.. 2015;2(3):240-247.
cusses innovative trust inference frameworks, doi:10.1109/JIOT.2015.2415520.
trust prediction mechanisms using Hellinger [5] Wang L, Wu H, Han Z, Zhang P, and Poor
distance, and discriminative-aware schemes HV. Dynamic resource matching for socially
like DATM that effectively detect and adapt cooperative caching in IoT networking. Proc
to behavioral biases. IEEE Glob Commun Conf (GLOBECOM).
The analysis reveals that decentralized 2017:1-6.
and hybrid trust propagation schemes offer [6] Tsiropoulou EE, Paruchuri ST, and Baras JS.
significant advantages over centralized sys- Interest, energy and physical-aware coalition
tems, which are prone to single points of fail- formation and resource allocation in smart
ure. The review highlights the importance of IoT applications. In: Proc 2017 51st Annu
hybrid frameworks that combine the advan- Conf Inf Sci Syst (CISS); 2017:1-6.
tages of both centralized and decentralized [7] Hussein D, Park S, Han SN, and Crespi
N. Dynamic social structure of things: A
742 Innovations in Computational Intelligence: Trends and Technologies
Abstract: The early diagnosis of plant diseases is essential for maximizing crop output and quality since the
agriculture sector is critical to guaranteeing global food security. A key issue in agriculture is leaf disease, which
can result in large losses in agricultural productivity. Deep learning algorithms have been utilized more often
recently in identification and categorization. This study uses the cutting-edge object identification algorithm
YOLOv7 to provide a unique method for automated leaf disease diagnosis and is particularly suited for use in
precision agriculture because of its real-time and precise object identification capabilities. Popular object detec-
tion method YOLO (You Only Look Once) can identify and categorize things in the real world. This study
proposes a YOLO v7-based method for detecting leaf diseases. YOLO v7 utilizes a deep convolution neural
network (CNN) to automatically recognize and categorize leaf diseases in real time. To correctly identify the
illness types detected in the leaves, the system is trained using a sizable collection of plant photos. The YOLOv7
design is optimized to focus on identifying certain illness patterns, improving its accuracy.
Keywords: Object Detection, Plant disease detection Crop output, Deep Learning, Global Food Security, agri-
cultural productivity, YOLOv7, Convolutional Neural Networks
a
[email protected]; [email protected]; [email protected]; dchrishita2255@
gmail.com; [email protected]
DOI: 10.1201/9781003606635-106
744 Innovations in Computational Intelligence: Trends and Technologies
farmers frequently use more pesticides and for illiterate farmers, choosing YOLO V7, an
fungicides. While this may help to reduce dis- extraordinary development in object identifi-
ease transmission, it may also increase pro- cation algorithms. While existing algorithms
duction costs. Plant diseases can jeopardize a such as CNN, YOLO V4, and YOLO V5 have
country’s capacity to offer a stable and suf- made significant contributions to computer
ficient food supply for its people. Increased vision, our choice of YOLO V7 is motivated
food imports, trade deficits, and economic by an unwavering commitment to precision
fragility may result. and efficacy in addressing the unique chal-
Plant diseases have far-reaching economic lenges faced by farmers who may lack for-
and agricultural consequences. They have an mal education. YOLO V7, which stands for
impact on agricultural output, food security, “You Only Look Once,” is at the forefront
trade, livelihoods, and resource availabil- of object-detecting technology. It builds on
ity. Mitigating the impact of plant diseases the success of its forefathers by using sophis-
through early identification, research, and ticated features and optimization approaches
sustainable farming techniques is critical to to deliver unrivaled accuracy in detecting and
ensuring agriculture’s and the larger econo- classifying objects in photos. This degree of
my’s resilience and sustainability. precision is critical for our unique use in crop
A greater number of farmers are illiterate, disease identification. Farmers that rely on
making it difficult to identify plant illnesses. visual cues and visuals, such as illiterate farm-
They frequently employ chemical pesticides ers, can greatly benefit from the accuracy and
to safeguard their crops, even when they are speed provided by YOLO V7.
unsure if a disease exists. This can be danger- The heart of our invention is enabling
ous since pesticides pose health and environ- illiterate farmers to make educated disease-
mental dangers and are expensive. To assist control decisions. Farmers may easily col-
these farmers, we must devise methods of lect photographs of their crops using simple
teaching them about illnesses and safer farm- devices such as cell phones or cameras, thanks
ing techniques through the use of images, to our YOLO V7-powered application. These
videos, and local languages. This can improve photos are then analyzed by YOLO V7,
farming for both them and the environment. which quickly analyzes them to discover and
Deep learning technologies offer a viable identify illnesses with high accuracy. The ease
answer to the issues faced by illiterate farm- of use of this approach makes it accessible
ers in disease identification. Through picture and user-friendly, bridging the knowledge
analysis, these technologies can automate ill- gap that illiterate farmers may have with tra-
ness detection, removing the requirement for ditional disease detection methods.
literacy. Farmers may obtain a quick diagno- Our dedication to the YOLO V7 extends
sis of illnesses by merely photographing their beyond perfection to sustainability. Illiterate
crops, allowing for targeted treatments and farmers, who frequently use wide pesticide
lowering dependency on costly and danger- applications as a prophylactic strategy due to
ous pesticides. Implementing user-friendly, their incapacity to reliably diagnose illnesses,
smartphone-based apps with deep learning may now focus their treatments precisely.
algorithms can help illiterate farmers make This minimizes not only the financial burden
educated decisions, secure their crops, and of pesticide use but also the environmental
ensure sustainable and lucrative agricul- and health dangers connected with excessive
ture while protecting their health and the chemical use.
environment. The foundation of our disease detection
We are at the vanguard of innovation in system, YOLO V7, was chosen by us since we
our mission to modernize disease diagnosis are committed to providing illiterate farmers
Fostering plant health: Utilizing YOLOv7 framework to identify leaf diseases 745
with the most cutting-edge technology. We Midhun P. Mathew and Theresa Yamuna
want to usher in a new age of informed and Mahesh concentrated on identifying diseases
sustainable agriculture by utilizing the preci- in bell pepper plants. With a 93% accuracy
sion, speed, and accessibility of the YOLO rate, their program sought to identify diseases
V7. Thanks to this creative approach, even more easily for farmers by detecting bacterial
individuals without a formal education may patches early on. Venkatramaphanikumar
now preserve their crops, make wise choices, Sistla, Ramya Chowdary Puvvada [10], and
and contribute to food security while protect- Sai Shilpa Padmanabula R-CNN and YOLO-
ing the environment. based CNNs are two popular deep learning
techniques that are used to detect objects
with 90% accuracy.
2. Literature Survey
Wenjiang Huang et al. [1] proposed an
enhanced spectral index for monitoring and 3. Proposed Model
identifying winter wheat diseases. [2] Dr. K. This section has described the working process
Thanagadurai and K. Padmavathi presented of plant disease detection using YOLO V7
a computer paper on vision-based image
enhancement. [3] D.A. Bashish et al. (2010) 3.1. YOLO V7
proposed a novel method for Segmenting leaf
images into four distinct clusters utilizing the The YOLO V7 architecture was influenced
squared Euclidean distances by the applica- by preceding YOLO model architectures, par-
tion of k-means segmentation. Ultimately, ticularly the YOLO-R, and YOLO v3 [13].
a DL algorithm built on Back Propagation
approach is used to finish the classification
process. It was discovered that the system’s
overall accuracy for disease identification and
categorization was about 93%. [4] Zhou et
al. (2014) and Barbedo and Godoy (2015),
created image processing-based systems to
diagnose plant diseases with an accuracy of
90%.
In their study on machine learning meth-
ods for plant disease identification, Shruthi et
al. [5] discovered that a CNN can detect a
wide range of diseases. Using image process-
ing techniques and the K Nearest Neighbor
AQ1:
(KNN) algorithm, P. Srinivasan et al. [6] cre- Please
ated software for classifying groundnut leaf provide
in-text
infections, like Late leaf spot, Rust, Early citation
leaf spot, and Bud Necrosis. Mrunmayee et for figure
al.[7] presented a 90% overall accuracy tech- 1-7.
3.2. Extended efficient layer where (pw, ph) are the anchor box dimen-
aggregation network (EELAN) sions for the specific anchor box associ-
ated with the grid cell.
EELAN is the computational component at 3. Confidence Score:
the heart of YOLO V7. This structure is essen- It can represent the possibility of an object
tial for improving the abilities of the YOLO being present in a bounding box within a
V7 model to learn. This is accomplished by grid cell. It is predicted using a sigmoid
utilizing the “expand, shuffle, merge” method activation function:
cardinal,” which allows for ongoing develop-
confidence = σ(tconf)(5)
ment in the ability of the network to learn
without damaging the original gradient 4. Class Probabilities:
road. b) Scaling of the YOLO V7 Compound YOLO predicts class probabilities for
Model. each bounding box. These are computed
using the softmax activation function to
ensure that they sum to 1:
3.3. Scaling for the YOLO v7
class_probs = softmax(class_scores) (6)
compound model
5. Loss Functions:
Model scaling is largely used to change a YOLO uses several loss functions to train
model’s fundamental properties to produce the model. The most common loss func-
models that match a range of application tions include:
requirements. An important element of model Objectness Loss (Binary Cross-Entropy
scaling entails improving characteristics like Loss for Confidence):
the model’s depth (the number of stages),
Lobj= – [obj × log(confidence) + (1-obj)
width (the number of channels), and resolu-
× log(1-confidence)] (7)
tion (image size entered).
Localization Loss (MSE Loss for Bound-
ing Box Coordinates):
3.4. The equations used in YOLO v7
are (8)
1. Prediction of bounding box centre (x, y) Classification Loss (Cross-Entropy Loss
coordinates relative to the grid cell: for Class Probabilities):
Let (tx, ty) be the predicted values. These (9)
are obtained through the sigmoid func- where pi is the one-hot encoded true class
tion. The absolute coordinates (bx, by) in label.
the image are calculated as follows: 6. Non-Maximum Suppression (NMS):
bx=(cx+tx)× grid_width (1) NMS is employed to separate redundant
by = (cy + ty) × grid_height (2) and low-confidence bounding boxes. The
2. Prediction of bounding box width (w) equations for NMS are not part of the
and height (h) relative to the whole image: training process but are used during post-
Let (tw, th) be the predicted values. These processing for inference.
are obtained through the exponential
function to ensure positive values. The 3.5. Dataset
absolute width and height (bw, bh) are cal-
culated as follows: The collection includes more than 125,000
[12] images. 37 plant diseases are known to
bw=pw×etw (3) exist. The tea leaf disease diagnosis model was
bh = ph× eth (4) developed using the [14] original dataset and
the YOLOV7 network [15]. Graphs showing
Fostering plant health: Utilizing YOLOv7 framework to identify leaf diseases 747
various performance metrics for training, related to a variety of leaf ailments. These
testing, and validation sets are used to show annotations accurately define disease lesions,
the usefulness of the produced model. There patches, and affected areas, giving learning-
are 3 different kinds of loss shown: box, cat- facilitating ground truth labels to the [16]
egorization, and objectiveness. The box loss YOLO v7 model procedure.
measures how well an algorithm locates the
exact center and bounding box of an item. 3.7. Algorithm
How likely it is that an object will be found in
a particular location is measured by the con- Following are the stages that were involved in
cept of “objectiveness” as a metric. According training a unique YOLO v7 model:
to high objectivity, an object is likely to be
1. Setting up the environment: The first
present in the visible area of a picture. The
action involved creating the conditions
parameters of the model undergo significant
YOLO v7.
changes throughout the process. The model’s
2. Image collecting and presentation: Images
performance was consistently improved as
the iteration count went from 100 to 150. were accumulated to make a new dataset
that was given the name PlantifyDr To
annotate the dataset, it was uploaded to
3.6. Preprocessing and annotation of Roboflow.
data 3. Pre-processing and enhancement: The
To help computers understand and interpret data that was uploaded. Through aug-
the input, picture annotation entails classify- mentation and pre-processing stages,
ing and labeling data. which Roboflow’s algorithms choose.
An annotated dataset is essential for super- 4. Data splitting: Roboflow separated the
vised learning. Machine learning (ML), which data into data sets for validation, testing,
forms the basis for constructing models, ena- and training.
bling computers to process data, and produce 5. Choosing an explanation format: images
precise findings. The procedure of annotat- are annotated, and then after the PyTorch
ing had a crucial part in getting the dataset YOLO v7 technique was chosen.
ready for model training. Using leaf photos, 6. Snippet: PyTorch libraries of the PIP pack-
highlighting and naming important areas age were supplied by Roboflow.
7. Google Collab: The Colab enables the user
to run deep learning models. The YOLO
V7 model was trained, which probably
used a Tesla P100 GPU.
4. Results
4.1. Accuracy
A classification model’s overall correctness is
gauged by its accuracy. The accuracy formula
is
(10)
Figure 106.2. Leaf image examples for object
detection. A detailed analysis of CNN, YOLO V4,
and YOLO V7 machine learning models for
Source:
AUTHOR'S SELF GENERATED
748 Innovations in Computational Intelligence: Trends and Technologies
plant disease diagnosis produced findings The efficiency of the YOLO V7 model in
that demonstrate the higher accuracy of the reducing prediction errors and optimizing the
YOLO V7 model. The study found that the identification of plant disease is highlighted
YOLO V7 model was more accurate than by the reduced loss that was observed. This
the other models examined, highlighting its result emphasizes the possible benefit of using
exceptional efficacy in the identification of Transformer architectures in plant disease
leaf diseases. Compared to traditional meth- detection to obtain lower loss values when
ods like CNN and [17] YOLO V4, these compared to other models like CNN and
results highlight the potential of YOLO V7 YOLO V4.
architecture in improving the accuracy of
models. 4.3. Precision
Precision is employed to assess how well a
4.2. Loss model predicts positive outcomes. It is the
Loss measures the error between predicted ratio of true positive predictions—which
and actual values. It is utilized to optimize the include both true positives and false posi-
model during training. The loss formula is. tives—to the total number of positive fore-
casts. Here’s how to express precision using
(11) the formula:
References
Figure 106.6. Recall.
[1] Malone, Brian Seymour. Some Solids Resi-
Source: AUTHOR'S SELF GENERATED
dence Time Studies in Tapered Gas Fluidised
4.5. F1 score Beds. University of Surrey (United King-
dom), 1963.
Integrates both precision values and recall val- [2] Sardogan, Melike, Adem Tuncer, and Yunus
ues into a single value. Particularly it is used Ozen. “Plant leaf disease detection and clas-
when there is an uneven class distribution. sification based on CNN with LVQ algo-
rithm.” 2018 3rd international conference on
computer science and engineering (UBMK).
IEEE, 2018.
[3] Ranjana, V., et al. “Design and develop-
ment of efficient techniques for leaf disease
detection using deep convolutional neural
networks.” 2020 IEEE International Confer-
ence on Distributed Computing, VLSI, Elec-
trical Circuits and Robotics (DISCOVER).
IEEE, 2020.
Figure 106.7. F1 Score.
Source: AUTHOR'S SELF GENERATED
750 Innovations in Computational Intelligence: Trends and Technologies
[4] Moyazzoma, Raida, et al. “Transfer learn- automation, computational and technology
ing approach for plant leaf disease detection management (ICACTM). IEEE, 2019.
using CNN with pre-trained feature extrac- [12] Soeb, Md Janibul Alam, et al. “Tea leaf dis-
tion method Mobilnetv2.” 2021 2nd Inter- ease detection and identification based on
national Conference on Robotics, Electrical YOLOv7 (YOLO-T).” Scientific reports 13.1
and Signal Processing Techniques (ICREST). (2023): 6078.
IEEE, 2021. [13] Padmanabula, S. S., Puvvada, R. C., Sistla,
[5] Shukla, Vivek, Sweta Rani, and Ramesh V., and Kolli, V. K. K. (2020). Object Detec-
Kumar Mohapatra. “A New Approach for tion Using Stacked YOLOv3. Ingénierie des
Leaf Disease Detection using Multilayered Systèmes d Inf., 25(5), 691-697.
Convolutional Neural Network.” 2023 3rd [14] Vallabhajosyula, S., Sistla, V., and Kolli, V.
International conference on Artificial Intel- K. K. (2022). Transfer learning-based deep
ligence and Signal Processing (AISP). IEEE, ensemble neural network for plant leaf dis-
2023. ease detection. Journal of Plant Diseases and
[6] Bhosale, Yogesh H., et al. “Multi-olktjo4; Protection, 129(3), 545-558.
Plant and Multi-Crop Leaf Disease Detec- [15] Raghavendra, K. V., Naik, D. B., Ven-
tion and Classification using Deep Neu- katramaphanikumar, S., Kumar, S. D., and
ral Networks, Machine Learning, Image Krishna, S. R. (2014, November). Weather
Processing with Precision Agriculture-A based prediction of pests in cotton. In 2014
Review.” 2023 International Conference on International Conference on Computational
Computer Communication and Informatics Intelligence and Communication Networks
(ICCCI). IEEE, 2023. (pp. 570-574). IEEE.
[7] Khirade, Sachin D., and A. B. Patil. “Plant [16] Kumar, G. S., Venkatramaphanikumar, S.,
disease detection using image processing.” and Kishore, K. V. K. (2021, May). Smart
2015 International conference on comput- Farming-A Flexible Approach to Improve
ing communication control and automation. Crop Yield and Profit using Machine
IEEE, 2015. Learning Techniques. In 2021 2nd interna-
[8] Arnal Barbedo, Jayme Garcia. “Digital tional conference for emerging technology
image processing techniques for detecting, (INCET) (pp. 1-6). IEEE.
quantifying and classifying plant diseases.” [17] Padmanabula, S. S., Puvvada, R. C., Sistla,
SpringerPlus 2.1 (2013): 1-12. V., and Kolli, V. K. K. Object Detection
[9] Militante, Sammy V., Bobby D. Gerardo, and Using Stacked YOLOv3 Object Detection
Nanette V. Dionisio. “Plant leaf detection Using Stacked YOLOv3.
and disease recognition using deep learn- [18] Vallabhajosyula, S., Sistla, V., and Kolli, V. K.
ing.” 2019 IEEE Eurasia conference on IOT, K. (2024). A novel hierarchical framework
communication and engineering (ECICE). for plant leaf disease detection using residual
IEEE, 2019. vision transformer. Heliyon, 10(9).
[10] Padmanabula, Sai Shilpa, et al. “Object [19] K. V. Krishna Kishore, Sasikala V., Ven-
Detection Using Stacked YOLOv3.” Ingé- katramaphanikumar S. (2020). Impact and
nierie des Systèmes d Inf. 25.5 (2020): Implications of New Computing Technolo-
691-697. giesin Smart Farming: A Survey. Interna-
[11] Sandhu, Gurleen Kaur, and Rajbir Kaur. tional Journal of Advanced Science and
“Plant disease detection techniques: a Technology, 29(3), 11224 - 11231. Retrieved
review.” 2019 international conference on from http://sersc.org/journals/index.php/
IJAST/article/view/28021
107 A review on-malignancy detection in
lung nodules using CNN
Krish Yadava, Vinayakb, Pratibha Yadavc, Lakshmi Pandeyd,
Himanshu Sharmae, and Smita Yadavf
Department of Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management, Lucknow, Uttar Pradesh, India
Abstract: In this work, a computer-based detection (CADe) system for lung nodule early diagnosis was pro-
posed by using low-dose computed tomography (LDCT). Since the low dosage images are very challenging, the
proposed method preprocesses the raw data to enhance (increase) the contrast of them. Next is coarse-grained
deep learning feature extraction, where we evaluate multiple deep learning architectures (AlexNet, VGG16, and
VGG19 networks) for the same. To enhance the selected feature set a procedure based on one genetic algorithm
(GA) is used for learning the top importance factors in early detection. Then different categories of classifier are
evaluated to ensure a lung nodule can be detected by the models successfully. The system is evaluated using 320
LDCT images from fifty individual patients. DETECTION SYSTEMS PUBLIC INTERNETDataBase for the
Early Detection of Lung Cancer is a program within I-ELCAP. The resultant system achieves the accuracy of
detection 96.25%, sensitivity 97.5% and specificity by using VGG19 architecture and SVM classifier.
Keywords: Malignancy Detection in Lung Nodules, Convolutional Neural Network, Computer-aided Diagno-
sis, Lung cancer
a
[email protected]; [email protected]; [email protected]; dpandeylakshmi043@
gmail.com; [email protected]; [email protected]
DOI: 10.1201/9781003606635-107
752 Innovations in Computational Intelligence: Trends and Technologies
• Ensure that the “uprooted aspects” are One way to depict the logistic regression
refined in favour of increasing the quality model is as follows:
of the discovery. Logistic(b0 + b1 * age + b2 * smoking
• Whether the subject had a malignant or + b3 * persistent cough + b4 * shortness of
benign LDCT scan must be ascertained by breath) = P(lung cancer = 1)
the optimised point vector. where the input features are age, smoking,
chronic cough, and shortness of breath, and
The suggested CADe system makes two the coefficients to be estimated are b0, b1, b2,
key contributions: b3, and b4.
The output probabilities (P(lung cancer =
• Examinations of deep learning charac- 1)) are guaranteed to lie between 0 and 1 by
teristic extraction from several different the logistic function.
architectures including the VGG16 and In order to train the model, you will want
VGG19 network. a labelled dataset in which each person’s sta-
• During the CADe system’s training phase, tus as a lung cancer patient is known. The
an intelligent genetic algorithm is used to maximum likelihood estimation method can
improve the extraction of deep learning be used to estimate the coefficients (b0, b1,
characteristics. Categorization happens b2, b3, and b4) using this dataset.
more quickly as a result of the reduction
in feature vectors and increase in recogni-
tion accuracy. 2.2. Related work
2.2.1. VGG16
2. Mathematical Model Li, F., et al. (2023). Deep learning-based pre-
diction of lung nodule malignancy on chest
2.1. Mathematical model for CT scans. Radiology, 20220942. (Accuracy
malignancy detection in Lung of 97.7% for lung nodule malignancy predic-
Nodules using CNN tion) [2]
Chen, J., et al. (2023). creation of a com-
Many methods can be taken into considera- puter-aided diagnosis system based on VGG16
tion in order to create a mathematical model for low-dose CT scans to identify lung can-
for the identification of lung cancer. Here is cer. 996–1005 in Journal of Digital Imaging,
an illustration of a basic logistic regression 36(5). (95.5% accuracy rate on low-dose CT
mathematical model: scans) creation of a computer-aided diag-
Assume for the moment that our dataset nosis system based on VGG16 for low-dose
has the following characteristics: CT scans to identify lung cancer. 996–1005
in Journal of Digital Imaging, 36(5). (95.5%
• Age (continuous variable) accuracy rate on low-dose CT scans) [3]
• Past history of smoking (binary variable:
0 for non-smoker, 1 for smoker)
2.2.2. VGG19
Prolonged cough (binary variable: 0 for no Sun, J., et al. (2023). A VGG19-based deep
chronic cough, 1 for chronic cough) learning model for lung cancer detection
Breathlessness (binary variable: 0 for no on chest X-rays with improved explainabil-
shortness of breath, 1 for shortness of breath) ity. IEEE Transactions on Medical Imaging.
Lung cancer incidence or absence is the (Accuracy of 96.5% on chest X-rays) [4]
aim variable (binary variable: 0 for absence, Zhang, X., et al. (2023). A multi-scale
1 for presence). VGG19 network for lung cancer detection on
A review on-malignancy detection in lung nodules using CNN 753
• Making It Explainable: Produce ways to encouraging issues, pressing the pledge of AI-
explain why the model makes the opin- driven medical opinion results.
ions it does. This can help understand We erected a solid frame for training and
how it works and find any problems or assessing our CNN model through the gath-
limits. ering, preprocessing, and scrupulous cura-
tion of a sizable dataset. The model passed
2.4. Critical analysis meticulous training, hyperparameter tuning,
and strict confirmation. It was erected with
The experimental outcomes, expressed in a personal armature. As a result, it has dem-
terms of different metrics, of the proposed onstrated a prominent position of proficiency
Computer-Aided Diagnosis (CADe) system in secerning between lung images that are
for early cancer detection are reported. These healthy and those that are reflective of malice.
metrics are assessed with respect to various The model’s performance was assessed,
designs, configurations, the amount of the and the results were positive. This offers a
classifier features, the type of classifier utilized, regard into the ground- breaking eventuality
and whether or not the suggested Genetic of AI in abetting croakers in the early discov-
Algorithm (GA) is applied (YES or NO). ery of cancer, perfecting patient issues, and
The performance standards evaluated for reducing the burden on the healthcare system.
vibrant pairings of classifiers and deep point
extractors include Accuracy [8].
References
3. Conclusion [1] “Early Lung Cancer Detection Using Deep
Learning Optimization.”doi:https://doi.
In this design, we delved the creation of a org/10.3991/ijoe.v16106.13657.
Convolutional Neural Network (CNN) for [2] J. Li, Mu et al., “Deep Learning Predicts
the pivotal task of lung cancer opinion from Malignancy and Metastasis of Solid Pul-
medical filmland, specifically CT reviews monary Nodules from CT Scans,” SSRN
and casket X-rays. Our work on this design Electron. J., no. 4, 2022, doi: 10.2139/
has handedTable perceptive information and ssrn.4285500.
107.1 Captain: [3] J. Chen et al., “Performance of Deep-Learn-
Performance Comparison of CNN ing Solutions on Lung Nodule Malignancy
Table 107.1. Models Using Different Classifiers Classification: A Systematic Review,” Life,
for Lung Cancer Detection vol. 13, no. 9, p. 1911, 2023, doi: 10.3390/
Model Classifier Accuracy
life13091911.
VGG16 Bayes 77.87 [4] J. Sun et al., “Neoadjuvant Camrelizumab
AQ1:
Please MLP 83.53 Plus Platinum-Based Chemotherapy vs
provide
table cap- Random 84.83 Chemotherapy Alone for Chinese Patients
tion cita- forest With Resectable Stage IIIA or IIIB (T3N2)
tion and
VGG19 Bayes 76.43 Non–Small Cell Lung Cancer,” JAMA
source.
Oncol., vol. 9, no. 569, pp. 1348–1355,
MLP 87.69 2023, doi: 10.1001/jamaoncol.2023.2751.
NOTE ADDED Random 87.11 [5] L. Zhang et al., “Anlotinib plus icotinib
forest as a potential treatment option for EGFR-
InceptionV4 Bayes 80.08 mutated advanced non-squamous non-small
MLP 87.83 cell lung cancer with concurrent mutations:
final analysis of the prospective phase 2, mul-
Random 85.81 ticenter ALTER-L004 study,” Mol. Cancer,
forest vol. 22, no. 1, pp. 1–11, 2023, doi: 10.1186/
Source: s12943-023-01823-w.
AUTHOR'S SELF GENERATED
A review on-malignancy detection in lung nodules using CNN 755
Abstract: This project revolves around the implementation of a cutting-edge parking system utilizing Internet
of Things (IoT) technology. The system functions through an intricate network of sensors and devices, auto-
mating the parking process for efficiency and security enhancement. At its core, the system integrates IR sen-
sors to detect incoming vehicles, triggering servo motors to open the parking gate and allocate a slot for the
vehicle. When all parking slots are occupied, a clear indication is displayed on an LCD monitor, prohibiting
further entries until a space becomes available. Upon a vehicle exiting the parking area, the display dynamically
updates, signaling the availability of a slot. The project further ensures the security of the Arduino board by
incorporating measures against physical tampering. In the event of any unauthorized physical interference, the
IR sensor promptly activates a buzzer, emitting an alarm, fortifying the protection of the system. The entire
system is interconnected with a ThingSpeak account, facilitating remote access and monitoring capabilities for
users via smartphones or web interfaces through cloud integration. This seamless connectivity empowers users
to oversee parking availability and security status in real-time, enhancing convenience and peace of mind. By
harnessing IoT technology, this next-generation parking system not only optimizes parking management but
also prioritizes security measures, offering a comprehensive solution for modern parking infrastructure.
Keywords: Arduino board, IR Sensor, LCD monitor, buzzer, ThingSpeak, IOT, cloud
a
[email protected]; [email protected]; [email protected]; dag_sreedevi@
ch.amrita.edu
DOI: 10.1201/9781003606635-108
Next-generation parking system using IoT 757
sabotage. likewise, the integration of pall of parking slot availability. Here, a binary or
technology via ThingSpeak regard connec- categorical variable model can represent the
tivity extends the system’s functionality to status of parking slots—occupied or vacant.
druggies’ smartphones or web interfaces. Implementing a time-series model enables
This aspect empowers druggies with remote dynamic updates on the LCD monitor, ensur-
access to cover parking vacuity and security ing real-time visibility of available parking
status in real- time, enhancing convenience spaces based on changes in slot status. The
and furnishing a comprehensive result to security feature of the system necessitates a
ultramodern parking operation challenges. mathematical model to assess the likelihood
In substance, this design represents an emul- of physical tampering attempts. Probability
sion of technological invention and practical modeling could help estimate the probability
mileage, aiming to review traditional parking of such events occurring, while response time
systems. By using IoT technology, it trials to analysis would determine the system’s reac-
streamline parking operations, enhance secu- tion time to trigger the alarm upon detecting
rity measures, and offer druggies an intuitive, any unauthorized interference.
connected experience in managing parking Cloud connectivity and remote monitoring
spaces. add complexity to the model. Network mod-
els are essential to understand the dynamics
1.1. Mathematical model of next- of data transmission via cloud integration,
factoring in bandwidth, latency, and commu-
generation parking systems
nication protocols to enable real-time moni-
Developing a mathematical model for a next- toring on smartphones or web interfaces.
generation parking system using IoT involves Reliability and system performance are
intricate considerations across various com- critical considerations. Mathematical mod-
ponents and functionalities. One crucial els for reliability could involve assessing the
aspect to model is the arrival rate of vehi- individual reliability of system components,
cles, which can be represented statistically or such as the Arduino board, IR sensors, and
through probability distributions to estimate servo motors. These models may encompass
the frequency of cars entering the parking reliability block diagrams or fault tree analy-
area. Incorporating sensor response times, sis to understand and optimize the system’s
particularly those of the IR sensors detecting overall reliability.
vehicles, requires modeling to determine the Each component’s mathematical model
time elapsed from detection to gate opening requires a deep understanding of the system’s
and parking slot allocation.Another critical characteristics, including sensor response
element is the monitoring and management times, data transmission protocols, and
AQ1:
Please
provide
figure
captions
and
source
for all Figure 108.1. Figure 108.2.
figures. Source: Source:
Parking area Car Parking Spaces
AUTHOR'S SELF GENERATED
AUTHOR'S SELF GENERATED
visualization Availability
758 Innovations in Computational Intelligence: Trends and Technologies
Abstract: The field of Machine Learning has experienced a boost in popularity, finding extensive use across
various sectors, including the healthcare industry. The Early identification of Disease helps in the proper and
well-timed medication. Smart Health Diagnosis is a disease prediction system in which the user provides the
symptoms as an input. The system analyzes these symptoms and come up with the probability of the disease as
an output. Disease Prediction is done by implementing various Supervised Machine Learning Algorithms like
Naïve Bayes, Random Forest, KNN, Decision Tree, etc.
[email protected]; [email protected]
d
DOI: 10.1201/9781003606635-109
A review on smart health diagnosis 761
Machine Learning and supervised learning the prepared dataset. Figure 109.1: Flow Dia-
algorithms, utilizing labeled training data to gram The effectiveness of the trained models
train the models. One of the primary advan- is assessed using critical metrics like precision,
tages of smart health diagnosis is its acces- recall, F1-score, and accuracy. To validate the
sibility. People, especially those in remote models, a distinct test set is employed. The sub-
or underserved areas, can consult health- sequent step involves creating a user-friendly
care professionals without the need to travel web application that enables real-time predic-
long distances. Smart health diagnosis is a tions based on user-input symptoms. Ethical
revolutionary approach that promotes early considerations are integral, addressing pri-
detection and monitoring of various medi- vacy, security, and transparency concerns in
cal conditions. Wearable devices and mobile accordance with healthcare regulations. The
applications for smartphones enable real- process is completed by instituting a feedback
time tracking of essential health indicators, loop for ongoing enhancement, allowing the
including heart rate, blood pressure, and glu- model to adapt over time by incorporating
cose levels. Analyzing this data helps in iden- new data. This iterative approach ensures the
tifying health issues promptly, allowing for machine learning system remains flexible and
timely intervention and preventive measures. responsive to emerging trends and advance-
The incorporation of artificial intelligence ments in the field, ultimately contributing to
and machine learning in recent times has more precise and dependable predictions of
significantly broadened the horizon of intel- various diseases.
ligent health diagnosis. The future of predict-
ing diseases with machine learning includes
using genetic, wearable, and IoT data for
remote monitoring. Innovations like block-
chain secure data, and explainable AI makes
models easier to understand. Federated learn-
ing keeps information private, and continu-
ous improvement involves advanced imaging.
This combination aims for more accurate,
personalized, and proactive healthcare, trans-
forming how we predict and manage diseases.
2. Methodology
To construct a machine learning model for
the anticipation of various illnesses based on
symptoms, the initial phase involves gather-
ing a diverse dataset that encompasses both
symptoms and diagnosed conditions. This
dataset undergoes meticulous processing,
including cleansing, standardization, and
normalization to guarantee data quality. Sub-
sequently, relevant symptoms are prioritized
through feature selection using statistical
AQ1:
methods. Following this, models for multi- Please
class classification, such as decision trees or Figure 109.1. Data flow diagram. provide
source for
random forests, are selected and trained with Source:
AUTHOR'S SELF GENERATED the figure
762 Innovations in Computational Intelligence: Trends and Technologies
Amenta: In this paper, the focus is on the with valuable insights into potential diseases,
critical issue of diagnosing chronic diseases, making their job easier and more accurate.
a task of immense importance in health- Dr CK Gomathy, Mr. A. Rohith Naidu:
care. To address this challenge, it is para- The primary objective of this disease predic-
mount to select the most suitable methods tion system is to accurately forecast diseases
and models to ensure accurate and reli- based on user-input symptoms. By collecting
able decision-making. The report rightfully symptoms from users, the system generates
underscores the potential dangers associ- disease predictions with an impressive aver-
ated with some computer models, which age prediction accuracy probability of 100%,
can be susceptible to manipulation with indicating its high reliability. This system
the addition of fake data. Such vulner- was effectively implemented using the Grails
abilities in diagnostic models could have framework and is designed to offer a user
life threatening consequences, sparking a friendly and easily accessible environment.
broader debate on the appropriateness of Being a web-based application, this system
relying on these computer-driven systems provides users the flexibility to access it from
in healthcare. These reviews of prediction anywhere and at any time, enhancing its con-
models play a pivotal role in identifying the venience and availability. The system employs
most robust and trustworthy methods for various Machine Learning algorithms, includ-
diagnosing chronic diseases. They serve as ing Decision Trees, Random Forests, and the
safeguards to minimize the risks associated Naïve Bayes Algorithm, to predict diseases
with incorrect or manipulated diagnoses. based on user-provided symptoms. Data pro-
In the rapidly evolving landscape of health- cessing is carried out using Machine Learning
care technology, emerging smart computer techniques, such as Random Forest, Decision
techniques like machine learning, cognitive Tree, and Naïve Bayes, which have collec-
computing, and deep learning are becoming tively yielded an impressive system accuracy
increasingly indispensable for comprehend- of 98.3%. These machine learning capabili-
ing the complexities of chronic diseases. ties are designed to not only predict diseases
Priyanka J. Panchal, Sheenah A. Mhaskar, but also to successfully anticipate disease
Tejal S. Ziman: This paper discusses an algo- outbreaks.
rithm used for predicting diseases based on
a person’s symptoms. In this system, there’s
a menu where you can choose from various 4. Recommendation and Future
symptoms. You can select any five symptoms Work
from the list, and the algorithm will then pre- The future of disease prediction using machine
dict the disease that might be causing these learning holds great promise for revolution-
symptoms. Additionally, the system can even izing healthcare. Machine learning, a subset
suggest common medications that are usu- of artificial intelligence, is increasingly being
ally prescribed for the identified disease. The harnessed to enhance our ability to forecast,
main goal of this system is to catch diseases prevent, and manage various diseases. The
in their early stages. It helps in diagnosing ill- potential lies not only in expanding the data-
nesses before they become too serious. This is set to encompass a broader spectrum of dis-
important because early diagnosis often leads eases but also in leveraging the health reports
to more effective treatment and better out- of patients for model training, enhancing the
comes for the patient. Moreover, doctors can accuracy and scope of predictive algorithms.
also use this system to assist them in making A noteworthy addition to this landscape is
accurate diagnoses. It can help healthcare pro- the incorporation of live consultations with
fessionals avoid confusion and provide them specialized doctors, providing a real-time
764 Innovations in Computational Intelligence: Trends and Technologies
Abstract: The realm of cybersecurity undergoes constant evolution, characterized by an ongoing struggle
between malicious entities and defenders. Within this context, the identification of malicious Android applica-
tions emerges as a pivotal defense measure. This comprehensive review navigates the diverse landscape of meth-
odologies employed to detect and counteract these threats. The exploration encompasses three primary avenues
for detection: signature-based, behavior-based, and machine-learning approaches. Signature-based methods
rely on predefined patterns, behavior-based strategies scrutinize real-time actions and machine learning tech-
niques leverage data patterns. Each avenue is thoroughly dissected, shedding light on its strengths, limitations,
and evolving nuances. Delving further, the paper investigates the intricacies of feature extraction and selec-
tion, essential steps in preparing data for effective machine learning models. Feature extraction condenses raw
data, while feature selection hones in on the subset of attributes critical for distinguishing between benign and
malicious behavior. Lastly, the exploration extends to dynamic analysis and behavioral patterns, revealing the
importance of real-time scrutiny and the identification of anomalous behavior. This synthesis of methodologies
and techniques aims not only to encapsulate the present state of the field but also to pave the way for future
advancements in fortifying Android ecosystems against malicious intrusions.
Keywords: Cybersecurity, Android, malware detection, machine learning approaches, feature extraction and
selection
a
[email protected]; [email protected]; [email protected]; dpaliwalvaibhavkns@
gmail.com
DOI: 10.1201/9781003606635-110
766 Innovations in Computational Intelligence: Trends and Technologies
through the dynamic terrain of behavior-based articles to choose from various Machine Learn-
detection. Here, the focus is on understanding ing approaches that are to be included for mal-
how the analysis of application behavior in ware detection in an Android application [1].
real-time can unveil previously unseen threats All these criteria allowed for the discern-
based on deviations from normal patterns. ing of the methodologies that are being used
A pivotal turn in the narrative directs in the present day and age. To fulfil this pur-
attention toward the transformative power pose a broad search was done using various
of machine learning in the realm of malware sources, such as Google Scholar, and multiple
detection. Machine learning models, with other online databases such as IEEE Xplore,
their adaptive and evolving nature, showcase IJERT, arXiv, Preprints, etc.
promising capabilities in discerning complex The following are the criteria that were
patterns and anomalies indicative of mali- used for selection:
cious intent. This segment scrutinizes various
machine learning algorithms, shedding light • Admissible: The criteria for the selec-
on their strengths and limitations in the con- tion of the articles were done based on
text of Android application security. being relevant to malware detection in an
The journey doesn’t conclude with detec- Android application.
tion methodologies alone; it extends to the • Published recently (last 5 years): It was
crucial realms of feature extraction and selec- the main criterion for selection because it
tion. These processes are fundamental in dis- is vital to keep track of the latest techno-
tilling the most relevant and discriminative logical developments.
characteristics that enable accurate identifi- • Experimental only: This included studies
cation of malicious signatures or behaviors. must be experimental.
Furthermore, the review unwraps the layers
of dynamic analysis, emphasizing the real- 2.2. Dataset collection
time examination of application behavior
The dataset was obtained from CCCS-CIC-
during execution, and the scrutiny of behav-
AndMal-2020 [2]. CCCS-CIC-AndMal-2020
ioral patterns that signify malicious intent.
is publicly available dataset produced in 2020
As we traverse through these methodolo-
by jointly Canadian Centre for Cyber Secu-
gies, it becomes apparent that the landscape
rity and the Canadian Institute for Cyberse-
of Android application security is dynamic
curity. This dataset consists of 200K benign
and continually evolving. The intricate inter-
and 200K malware samples that combine to
play between these detection methods, their
become 400K Android applications with 14
effectiveness, and their adaptability to emerg-
prominent malware categories and 191 emi-
ing threats forms the crux of this exploration.
nent malware families.
Ultimately, this review seeks not only to dis-
The dataset is labelled and categorized
sect these methodologies but also to provide
into corresponding families. The malware
insights into their cohesive integration, offer-
applications are divided into eight categories
ing a holistic understanding that fortifies the
such as sensitive data collection, media, hard-
Android ecosystem against the ever-evolving
ware, actions/activities, internet connection,
landscape of cybersecurity threats.
CandC, antivirus and storage and settings.
when dealing with ever-changing threats. One noteworthy implication is the signifi-
The review also touches on using machine cance of dynamic analysis, where the focus
learning to enhance detection, combining it shifts from static characteristics to the behav-
with smart feature selection for more precise ior of applications. This proactive approach is
outcomes. crucial in identifying new, previously unseen
However, it could give more insight into threats. The paper suggests that incorporat-
the challenges these methods face and how ing machine learning into this dynamic analy-
they play out in the real world. While it men- sis further refines the detection process.
tions a hybrid approach, a deeper dive into The implications extend to the future
the hurdles and potential benefits of such a of Android malware detection. Transpar-
strategy would add more depth. ent machine learning models are proposed,
The future work section is forward-think- ensuring that the inner workings of detec-
ing, suggesting areas for further research. tion algorithms are understandable and trust-
It emphasizes the need for new, innovative worthy. Real-time threat intelligence sharing
approaches, transparent machine learn- emerges as a collaborative solution, fostering
ing models, real-time threat intelligence, a collective defense against emerging threats.
collaborative efforts, and educating users. Educating users about safe practices becomes
These suggestions pave the way for ongo- integral in this ecosystem.
ing improvements in dealing with malicious In practical terms, the synthesis indicates
Android applications. a need for constant innovation in detection
In conclusion, this review is a valuable methods. The hybrid approach proposed in
resource for those in cybersecurity, research, the paper, combining multiple techniques,
and development. It provides a clear under- sets the stage for further research and devel-
standing of Android malware detection and opment. The ultimate goal is to create a holis-
offers insights into strategies for countering tic defense mechanism that can adapt to the
evolving threats. Its analysis and recommen- ever-changing tactics of malicious Android
dations contribute to the ongoing efforts to applications.
stay ahead of malicious Android applications. This synthesis not only provides a roadmap
for improving Android malware detection
but also highlights the broader implications
5. Synthesis and Implications for the cybersecurity landscape. It emphasizes
This review paper weaves together insights the need for collaboration, transparency, and
from various approaches to detect malicious ongoing education to safeguard users against
Android applications. By combining signa- emerging threats.
ture-based, behavior-based, and machine-
learning methods, the synthesis reveals a
comprehensive strategy for dealing with the 6. Recommendations for Future
dynamic landscape of cybersecurity threats Work
on Android devices. Despite significant strides in Android mal-
The synthesis highlights the importance of a ware detection, there exist promising avenues
multi-faceted approach. While signature-based for further exploration and advancement.
methods are effective against known threats, The following areas present opportunities for
behavior-based analysis steps in to identify future research and development:
unfamiliar, suspicious activities. Machine
learning, with its ability to adapt and learn 1. Innovative hybrid approaches:
from patterns, enhances the overall detection Investigate unconventional hybrid method-
capability. This combination acts as a robust ologies that seamlessly integrate signature-
shield against the evolving nature of malware. based, behavior-based, and machine-learning
Android app threat analysis techniques: a review 769
techniques to optimize their synergies and The pivotal role played by dynamic analy-
mitigate individual limitations. sis and behavioral pattern recognition in mal-
2. Transparent machine learning models: ware detection cannot be overstated. These
Develop machine learning models that techniques provide real-time insights into
prioritize interpretability and transpar- application activities, empowering a proactive
ency, facilitating a deeper understanding response to emerging security threats. Addi-
of decision-making processes and instill- tionally, the strategic use of feature extraction
ing trust in automated detection systems. and selection significantly enhances the effi-
3. Real-time threat intelligence fusion: cacy of machine learning models, contribut-
Explore the fusion of real-time threat ing to the development of more accurate and
intelligence feeds into detection systems resilient detection systems.
to enable swift adaptation to emerg- As we navigate the intricate realm of
ing threats, vulnerabilities, and evolving Android security, a holistic comprehension of
attack patterns. these detection methods becomes crucial for
4. Collaborative Android ecosystem: cybersecurity professionals, researchers, and
Foster collaboration among cybersecurity developers. By harnessing the strengths of sig-
experts, app developers, and stakeholders nature-based, behavior-based, and machine-
in the Android ecosystem to co-create a learning approaches, a more robust defense
more secure and resilient environment for can be forged against the persistent evolution
end-users. of malicious Android applications.
5. User empowerment through education:
Investigate strategies to enhance user
awareness and education on secure References
mobile practices, empowering them to [1] Md Naseef-Ur-Rahman Chowdhury,
make informed decisions and proactively Ahshanul Haque, Hamdy Soliman, Moham-
prevent malware infections. mad Sahinur Hossen, Tanjim Fatima, and
Imtiaz Ahmed. Android Malware Detec-
Diligent attention to these aspects will tion using Machine Learning: A Review.
undoubtedly contribute to the ongoing evo- arXiv:2307.02412 (2023).
lution of adaptive and effective strategies for [2] Pinar G. Balikcioglu, Melih Sirlanci, Ozge A.
Kucuk, Bulut Ulukapi, Ramazan K. Turkmen
countering the menace of malicious Android
and Cengiz Acarturk. Malicious code detec-
applications, ensuring sustained security tion in android: the role of sequence charac-
within the Android ecosystem. teristics and disassembling methods. Int. J.
Inf. Secure. 22, 107–118 (2023). https://doi.
7. Conclusion org/10.1007/s10207-022-00626-2.
[3] Aasthaa Bohra, Gayatri Shahane, Sakshi
In summary, this review delves into the persis- Shelke, and Shalu Chopra. Android Malware
tent security challenges posed by the evolving Detection. International Research Journal of
landscape of malicious Android applications. Engineering and Technology (IRJET), Vol-
The exploration and scrutiny of three primary ume 10, Issue 04, 2023.
detection methodologies—signature-based, [4] Eralda Caushaj and Vijayan Sugumaran.
behavior-based, and machine learning— Classification and Security Assessment of
underscore the complexity of combating Android Apps. Springer, 2023.
[5] Madihah Mohd Saudi, Muhammad Afif
dynamic threats. Each method exhibits dis-
Husainiamer, Azuan Ahmad, and Mohd
tinct merits and drawbacks, emphasizing the Yamani Idna Idris. iOS mobile malware
necessity of a comprehensive and multifac- analysis: a state-of-the-art. Springer, 2023.
eted approach to tackle Android malware’s
ever-changing nature.
111 AI Powered Legal Documentation
Assistant
Yogesh Shekhawata, Utkarsh Tiwarib, Syed Hasan Mehdic, and
Himanshu Vaishyd
Department of Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management, (Affiliated to AKTU Lucknow, Uttar Pradesh and Approved by AICTE, New Delhi),
Lucknow, India
Abstract: The AI-powered legal documentation assistant for India is an innovative platform that incorporates a
fine-tuned version of GPT-3.5, specifically tailored for legal applications. Integrated through the OpenAI API,
this advanced language model enhances the platform’s capabilities for the creation, review, and management
of legal documents in India. The user-friendly tool facilitates the generation of accurate and compliant legal
documents for legal professionals, individuals, and businesses through guided prompts. The fine-tuned GPT-
3.5 model offers an intelligent layer, providing context-aware suggestions and corrections. With features such
as cloud storage for document accessibility and mobile app capabilities for offline work, the project aims to
optimize efficiency, reduce the risk of legal disputes, and democratize the legal documentation process in India.
Keywords: AI powered Documentation, AI legal assistant, GPT-3.5, Open AI API, GPT in legal Documenta-
tion, Legal Chatbot, Legal copilot
DOI: 10.1201/9781003606635-111
AI Powered Legal Documentation Assistant 771
tokenization or OAuth. Employ Django with Optimize the database schema for efficient
Django Rest Framework for the back-end to data storage and retrieval.
handle user requests, data management, and
AI integration. - Ensure seamless integration 2.5.2. Scalability and reliability
with external legal resources and databases
for accurate and up-to-date information. Continuously monitor and optimize AWS
RDS configurations to ensure scalability with
growing user demands. Implement automated
2.3. User interaction and services scaling mechanisms to adapt to fluctuations
2.3.1. Document review and in user activity.
customization
Develop a user-friendly interface for document 2.6. Analysis and evaluation
review, allowing users to request changes and 2.6.1. User feedback and performance
revisions. - Implement customization features metrics
enabling users to tailor generated documents
to their specific needs. Collect user feedback through surveys and
interviews to evaluate the user experience.
Define performance metrics, including docu-
2.3.2. Legal advice integration ment accuracy, response time, and system
Implement an innovative feature where GPT- reliability.
3.5, the powerful language model, automati-
cally generates initial legal advice based on 2.6.2. Statistical analysis and machine
user queries. Leverage GPT-3.5’s natural lan- learning models
guage processing capabilities to provide con-
text-aware and relevant legal insights. Employ statistical methods and machine
learning models for in-depth analysis of user
interactions and system performance. Con-
2.4. Document storage and delivery
duct iterative evaluations, refining the system
2.4.1. Secure document storage based on user feedback and emerging legal
requirements.
Implement secure storage protocols on the
server, ensuring data privacy and compliance
with legal standards. 3. Thematic Overview
This research provides a comprehensive
2.4.2. User access and download exploration of the evolutionary journey of
Allow users to access and download final- an AI-powered legal documentation assis-
ized documents through the application. - tant, delving into crucial thematic domains
Implement multi-factor authentication for essential for understanding the project’s con-
enhanced document access security. ception and implementation. It commences
by shedding light on the challenges posed
by intricate legal language, emphasizing the
2.5. Database management
pressing need for innovative solutions. Tak-
(PostgreSQL on AWS RDS) ing center stage is GPT-3.5, a recent language
2.5.1. Data storage model developed by OpenAI, distinguished as
a large multimodal model proficient in pro-
Utilize PostgreSQL on AWS RDS to store user cessing both image and text inputs, showcas-
data, preferences, and generated documents. ing human-level performance across diverse
AI Powered Legal Documentation Assistant 773
benchmarks. Its transformer-style architec- between users and legal experts for consulta-
ture, incorporating an attention mechanism tions, is thoroughly discussed.
to discern the relevance of data segments, The paper culminates by synthesizing key
enhances the understanding of word relation- insights and contributions, addressing future
ships in text [13]. directions for the Legal Documentation Assis-
A recent study employs GPT in a compre- tant, and recognizing its dynamic nature in
hensive system for abstractive summarization the ever-evolving legal technology landscape
across multi-document collections, demon- [5]. This thematic overview serves as a read-
strating comparable performance to other er’s roadmap, offering insights into major
summarization approaches [10]. OpenAI’s components and discussions in subsequent
API, residing on Microsoft Azure, serves as sections of the research paper. The develop-
a cloud-based interface, not only granting ment of this AI-powered solution aligns with
access to pre-trained AI models but also facil- contemporary technological trends and paves
itating direct engagement with GPT-3.5 in its the way for transformative advancements in
raw form. This unique capability enables pre- the legal documentation sphere [5].
cise fine-tuning of GPT-3.5, aligning it with
specific use case requirements and effectively
bridging the gap between the cloud-based AI 4. Critical Analysis
capabilities of OpenAI API and the customi- Introduced to widespread acclaim in March
zation potential inherent in GPT-3.5’s bare 2023, GPT-3.5 represented a notable leap
metal form [14]. forward from its predecessor, GPT-3.5, which
Technologically, the backend thrives on had hitherto stood as the pinnacle of Ope-
Django, a Python-based web framework, nAI’s language models, catalyzing the inaugu-
while the frontend embraces React Native, ral release of ChatGPT. Despite the attention
a cross-platform framework catering to IOS garnered by the improvements in GPT-3.5,
and Android platforms. The intricate techno- a closer examination reveals significant
logical framework is meticulously explored,
highlighting the integration of React Native
for the frontend and Django with Django
Rest Framework for the backend. The paper
accentuates the fine-tuning process of GPT-
3.5 for legal document comprehension,
underscoring the project’s reliance on cutting-
edge technological advancements [5].
A user-centric design ethos permeates the
development, crafting an intuitive interface
with React Native, incorporating inclusive
user input mechanisms, and securing authen-
tication processes. The integration with legal
resources is elucidated, detailing how the
backend establishes connections with exter-
nal legal databases to ensure document accu-
racy and compliance [5].
Further exploration delves into the docu-
ment review process, empowering users to
request revisions and changes. The integration Figure 111.2. Workflow flowchart.
of legal advice features, fostering connections Source:
AUTHOR'S SELF GENERATED
774 Innovations in Computational Intelligence: Trends and Technologies
reservations about its professed reasoning data, may lack awareness of the latest legal
capabilities [16]. updates, making real-time information
Large language models (LLMs), epito- updates a significant challenge.
mized by GPT, operate on a fundamental While GPT models offer the flexibility
concept: training neural architectures on of fine-tuning, accommodating diverse user-
extensive datasets to create potent language specific preferences and customization needs
models. Many LLMs, rooted in the trans- proves challenging. Individual users may have
former architecture, showcase versatility varying requirements for document genera-
across various natural language processing tion and review, and the model may encoun-
(NLP) tasks, surpassing the state of the art in ter difficulty adapting seamlessly to these
numerous challenges [8]. individual preferences.
GPT-3, in showcasing its capabilities, dis- Furthermore, the inclusion of sensitive and
played discernible biases linked to various confidential information in legal documents
demographic factors, including race, gen- raises valid concerns about data privacy and
der, and religion. These biases, evident in the security. The use of a language model neces-
model’s responses and outputs, inadvertently sitates rigorous measures to prevent inad-
perpetuate societal prejudices and stereotypes vertent exposure of confidential information,
related to racial identities, gender roles, and adding a critical layer of complexity [17].
religious affiliations [16]. A recent examina-
tion assessing the ethical aspects of GPT-3.5
revealed a substantial correlation between 5. Synthesis and Implications
human and AI responses. However, notable The development of LexGPT and Law GPT
and systematic disparities indicate existing models signifies a groundbreaking advance-
limitations in GPT-3.5’s accurate modeling of ment in the field of legal AI [3][10]. It is cru-
human decision-making processes [9]. cial to highlight that while LexGPT may not
In the context of our specific use case, GPT be tailor-made for the nuances of the Indian
models confront limitations arising from a legal system, it lays the foundation for future
lack of domain-specific knowledge. Legal applications, sparking considerations for
documents necessitate a profound under- potential refinements to align with regional
standing of intricate legal concepts, and the legal frameworks. This approach finds paral-
model may struggle to interpret and gener- lels in initiatives like Cicero, which fine-tuned
ate content accurately without specialized a transformer specifically for the Italian legal
knowledge of legal contexts. system, and Lawformer, a Longformer-based
Furthermore, inherent biases in legal language model extensively pre-trained on
texts present an additional challenge. If the criminal and civil case documents, showcas-
training data includes biased legal docu- ing significant progress in LegalAI [4][6].
ments, the model may generate summaries Additionally, a separate research paper
that are skewed, impacting the impartiality details an individual’s creation of a model
and equity of the content it generates. The using BERT, customized for the specific intri-
notorious ambiguity of legal language poses cacies of the Indian legal system [7]. In con-
a significant hurdle for GPT models, making trast, our innovative approach capitalizes on
accurate interpretation of ambiguous legal GPT-3.5, already equipped with extensive
terms or phrases challenging and potentially internet-sourced data, including Indian legal
leading to inaccuracies in document summa- databases. The advantage lies in leveraging
ries or advice. pre-existing training, requiring only fine-tun-
The dynamic nature of legal landscapes, ing for our specific use case.
with frequent changes in laws, poses another Significantly, our project goes beyond
challenge. GPT models, reliant on pre-existing document drafting; it empowers users to edit
AI Powered Legal Documentation Assistant 775
existing documents, seek simplified summa- pioneering solution poised to transform the
ries, and comprehend complex legal language. realm of legal documentation. Through the
This inclusive feature directly addresses the seamless integration of Django, React Native,
challenge faced by individuals lacking a and the cutting-edge GPT-3.5 via OpenAI
legal background, providing assistance in API technologies, this project stands as a
understanding and navigating intricate legal testament to the capacity of artificial intel-
documents. In doing so, it ensures informed ligence to revolutionize intricate processes.
decision-making in legal matters. By providing a user-friendly, accurate, and
efficient tool, it not only empowers legal
professionals but also extends its benefits to
6. Recommendations for Future the broader public, facilitating a more acces-
Research sible approach to navigating India’s legal
In the forthcoming phases of development, landscape. The amalgamation of these tech-
our focus will center on pivotal aspects to nologies not only signifies a substantial leap
enhance the efficacy and inclusivity of our forward in the efficiency of legal services but
AI-powered legal documentation assis- also sets a new standard for legal assistance in
tant. Firstly, the integration feature will be the digital age. The transformative potential
expanded to facilitate secure collaboration of this project is poised to redefine the legal
and document sharing among multiple par- documentation landscape in India, marking
ties, fostering teamwork and streamlining a significant stride towards enhanced acces-
document management. Secondly, we aspire sibility and efficiency in legal processes.
to broaden the scope of legal document gen-
eration, encompassing a diverse array of doc- References
ument types to address a wider spectrum of
legal needs and requirements. Additionally, the [1] Katz DM. GPT-3.5 passes the bar exam.
Published in SSRN; 2023.
incorporation of multilingual support will be
[2] Dalal S, Singhal A, and Lall B. LexRank and
pursued, ensuring accessibility for users from Pegasus transformer for summarization of
various linguistic backgrounds. Our commit- legal documents. Published in SpringerLink;
ment extends to seamless integration with 1970.
E-signature platforms, thereby empowering [3] Lee J-S. LexGPT 0.1: Pre-trained GPT-J
users to electronically sign the generated legal models with pile of law. Published in arXiv.
documents and establishing a comprehensive org; 2023.
end-to-end solution for document creation [4] Xiao C, et al. Lawformer: A pre-trained lan-
and execution. Furthermore, the exploration guage model for Chinese legal long docu-
of advanced NLP techniques is on the agenda ments; 2021.
to refine document generation accuracy and [5] Arora J. Artificial intelligence as a legal
offer nuanced customization options based research assistant. Published in Academia.
on user input. These future endeavors under- edu; 2022.
[6] Luzi FD, et al. Cicero: An AI-based writing
score our dedication to continuous improve-
assistant for legal users. Published in Spring-
ment and the expansion of our AI-powered erLink; 1970.
solution to meet evolving user needs in the [7] Jin X, and Wang Y. Understand legal docu-
legal landscape. ments with contextualized large language
models. Published in arXiv.org; 2023.
[8] Liga D, et al. Fine-tuning GPT-3 for legal
7. Conclusion rule classification. Published in Comput
In this paper, we introduced the AI-powered Law Secur Rev; 2023.
legal documentation assistant for India as a
776 Innovations in Computational Intelligence: Trends and Technologies
[9] Almeida GFCF, et al. Exploring the psychol- [14] Sofiia. What is an OpenAI API, and how to
ogy of GPT-3.5’s moral and legal reasoning. use it? Published in Addepto; 2023.
Published in arXiv.org; 2023. [15] Burman A, and Bradford E. Building an opti-
[10] Nguyen HT. A brief report on LawGPT 1.0: mized algorithm that provides summaries of
A virtual legal assistant based on GPT-3. legal documents. Published in ResearchGate;
Published in arXiv.org; 2023. 2022.
[11] Liu S, and Healey CG. Abstractive summa- [16] Tamkin. Understanding the capabilities,
rization of large document collections using limitations, and societal impact of large lan-
GPT. Published in arXiv.org; 2023. guage models. Published in arXiv.org; 2021.
[12] Gupta Y. Chat GPT and GPT-3 detailed [17] Sun AY. Does fine-tuning GPT-3 with the
architecture study: deep NLP HORSE. Pub- OpenAI API leak personally-identifiable
lished in Medium; 2023. information? Published in arXiv.org; 2023.
[13] Wagh A. What’s new in GPT-3.5: An over- [18] Liu Y. Roberta: A robustly optimized Bert
view of the GPT-3.5 architecture and capa- pretraining approach. Published in arXiv.
bilities of next-generation AI. Published in org; 2019.
Medium; 2023.
112 Ideas to boost fitness activities and
assist in keeping fit
Neha Chauhana, Vasu Guptab, Harshita Bajpaic, and Kim Guptad
Department of Computer Science and Engineering, Babu Banarasi Das Institute of Technology and
Management, Lucknow, Uttar Pradesh, India
Abstract: This study highlights the important role of a user-centered design approach that aligns app goals with
user needs and incorporates feedback through wire-frames and prototypes. The technology stack selection pro-
cess has been carefully considered with a focus on cross-platform development and scalability. Collaboration
with fitness experts drives the development of evidence-based training plans and nutritional algorithms,
enhanced by the integration of wearable technology to improve user engagement. Gamification elements and
motivational features are used strategically, complemented by a focus on security, privacy, iterative develop-
ment, and a comprehensive launch and marketing strategy. This comprehensive methodology ensures the devel-
opment of dynamic, user-friendly fitness apps that thrive in the ever-evolving digital environment.
Keywords: Fitness, Pseudo Code, Personalization, Cross-platform Development, Web development, Accessibil-
ity, Customer Participation
DOI: 10.1201/9781003606635-112
778 Innovations in Computational Intelligence: Trends and Technologies
for email and basic utilities to a vast world process. This information is important to
of mobile gaming, GPS services, ticket book- understand physical condition of user and
ing, and more is remarkable. In this context, make decision based on it.
fitness apps have emerged as a solution for 2. Data Processing: The system then applies
people with busy lives, providing convenient algorithm to process the user to give the
access to health and wellness resources at any best results.
time [2]. 3. Condition Checking: The condition is
This comprehensive overview reflects then monitored whether user is perfectly
the dynamic evolution of fitness applica- normal physically or not and then based
tions, from addressing structural and con- on that data is passed forward.
tent challenges to leveraging technology for 4. Workout Plan and Nutrition Algorithm
comprehensive and accessible home train- Development: Collaborate with fitness
ing solutions. This journey summarizes the experts and nutritionists to design evi-
app’s evolution from simple functionality to dence-based training plans and nutritional
an essential companion to a healthier, more algorithms. Implement machine learning
active lifestyle [3]. or data analysis techniques to personalize
recommendations based on your profile,
preferences, and progress.
2. Methodology 5. Conditional exercise recommendation:
The methodology for developing a versatile The experts will then assign exercises
fitness app involves a systematic approach based on users conditions like if user
to meeting user needs and market require- works or have less time, then fast and
ments. The first phase will focus on com- short duration exercises will be recom-
prehensive market research and user needs mended and vice-versa.
analysis to understand trends, competitors, 6. Security and Privacy Measures: Prioritize
user demographics. The app’s goals and func- the security of user data by implementing
tionality are then clearly defined and aligned robust encryption protocols and ensuring
with user expectations. Choosing the right privacy compliance. Clearly communicate
technology stack ensures a seamless cross- your app’s privacy policy to your users
platform development process. User-centered and obtain their consent for data collec-
design principles guide the creation of intui- tion and processing.
tive user interfaces based on feedback gath- 7. Iterative Development and Testing: We
ered through an iterative design process. use an agile development approach with
Collaborate with fitness experts to develop iterative releases to gather user feedback
personalized, evidence-based training plans and make continuous improvements. We
and nutrition algorithms through machine perform thorough testing, including func-
learning and data analysis. Integration with tional, usability, and security testing to
wearable technology increases user engage- proactively identify and resolve issues.
ment and health monitoring. Gamification
elements and motivational features are inte-
grated to encourage user engagement, while 3. Thematic Analysis
robust security measures and transparent pri- The thematic analysis of the evolution of fit-
vacy policies prioritize the protection of user ness applications unravels a narrative woven
data. around a transformative shift from a tech-
nology-centric approach to a user-centric
1. Data Collection: The System collects design philosophy. The initial scrutiny in
the information about user for further 2019 pinpointed shortcomings in existing
Ideas to boost fitness activities and assist in keeping fit 779
for various devices, focusing on acces- strategy has the power to completely reshape
sibility features for inclusivity. Prioritize the fitness app landscape, surpassing con-
a seamless and enjoyable user interface sumer expectations and creating entirely new
experience. standards for the sector.
E. Making More Platforms Compatible:
Expand compatibility to diverse devices
and operating systems. Ensure seamless References
AQ2:
integration with popular fitness gadgets. [1] Francisco Martín, Jerónimo García
Please
Develop a web-based platform to broaden ernández,corresponding author, Manel Val- note that
accessibility beyond mobile devices. carce-Torrente, Ainara Bernal-García, Pablo the cross-
Gálvez-Ruiz, and Salvador Angosto-Sánchez reference
F. Advanced Personalization Algorithms: 4,5,7-14
Implement machine learning for in-depth “Importance-performance analysis in fitness is not
apps. A study from the viewpoint of gender listed
user behavior analysis. Tailor workout
and age “.Published online 2023 Aug 14. in-text.
plans, content, and challenges based on doi: 10.3389/fpubh.2023.1226888
individual data. Continuously refine per- [2] Angosto, S., García-Fernández, J. and Gri-
sonalization features to adapt to evolving maldi-Puyana, M. A systematic review
user needs and goals. of intention to use fitness apps (2020–
2023). Humanit Soc Sci Commun 10,
512 (2023). https://doi.org/10.1057/
6. Conclusion s41599-023-02011-3
The ever-changing landscape of fitness appli- [3] Yanlong Guo, Xueqing Ma, Denghang
cations presents fresh chances for improve- Chen“Factors Influencing Use of Fit-
ment and innovation. The current state of ness Apps by Adults under Influence of
the fitness app ecosystem needs to be filled COVID-19” 2022 Nov 22. doi: 10.3390/
by incorporating complete wellness features, ijerph192315460
[4] Manel Valcarce-Torrente, Vicente Jav-
providing individualised dietary guidance,
aloyes, Leonor Gallardo,Jerónimo García-
encouraging inclusionary programmes, and Fernández,“Influence of Fitness Apps on
utilising state-of-the-art technology. This Sports Habits, Satisfaction, and Intentions
strategy is revolutionising the fitness industry to Stay in Fitness Center Users: An Experi-
by promoting a comprehensive, user-centered mental Study” 2021 Oct 2. doi: 10.3390/
fitness experience. ijerph181910393
Future research may focus on improving [5] Yali Liua and Maria Avello”Status of
AI algorithms for more accurate personalisa- the research in fitness apps: A bibliomet-
tion, investigating virtual reality simulations ric analysis” 2020 Sep 23. doi: 10.1016/j.
for engaging in immersive fitness activities, tele.2020.101506
and integrating biometric data for continu- [6] Sakitha Anna Joseph, Reshma Raj
ous health monitoring. Stress management K., Sony Vijayan, “User’s Perspec-
tools and mindfulness practices that prior- tive about Mobile Fitness Applications”
8760038620/2020©BEIESP DOI.35940/
itize mental health could further strengthen
ijrte.F8760.038620, March 2020.
the integrative strategy. [7] Adria Muntaner-Mas, Antonio Martinez-
As developers, we are dedicated to more Nicolas, Carl J. Lavie, Steven N. Blair,
than just promoting physical health. Fitness Robert Ross, Ross Arena, and Francisco B.
apps have a major positive impact on peo- Ortega (2019). A Systematic Review of Fit-
ple’s general well-being and can help create ness Apps and Their Potential Clinical and
a society that is healthier and more cohe- Sports Utility for Objective and Remote
sive by addressing user needs and embracing Assessment of Cardiorespiratory Fitness.
technological advancements. This innovative
782 Innovations in Computational Intelligence: Trends and Technologies
Abstract: This paper presents a novel approach for the creation of an intelligent CCTV surveillance system,
leveraging advanced machine learning techniques, specifically the you only look once object detection algo-
rithm. The system aims to conduct real-time analysis of CCTV footage from Indian railways, with a focus on
enhancing crowd management, preventing criminal activities, and monitoring railway operations to ensure the
safety and security of passengers and commuters. The overarching goal is to improve the efficiency of day-to-
day railway operations. Through the integration of cutting-edge technology, this research contributes to the
advancement of safety measures and operational effectiveness in the context of Indian railways.
Keywords: Yolo algorithm, object detection, real-time analysis, supervised learning, SMART surveillance,
crowd density estimation
[email protected]
DOI: 10.1201/9781003606635-113
784 Innovations in Computational Intelligence: Trends and Technologies
of the authorities will timely prompt them in The outlined steps ensure a comprehensive
case of any anomaly detected or emergency approach to address the challenges associated
situations triggered like overcrowding at sta- with managing the vast volume of passengers
tions, detected by the trained ML model via and enhancing the overall operational effi-
CCTV real-time footage. ciency of the railway system.
This proposed solution not only reduces
the load on authorities by helping them focus 2.1. Data collection
their valuable resources like time, energy,
and money on more critical tasks but also CCTV footage acquisition: Real-time surveil-
enhances their efficiency by utilizing the auto- lance footage from existing CCTV infrastruc-
mation capabilities of an ML-based smart ture at major railway stations is collected.
system to their advantage. This also aids in This footage is essential for training and vali-
the real-time accurate detection of a num- dating the ML model.
ber of situations simultaneously via a single, Historical data compilation: Previously
simplified, easy-to-use, customizable, and recorded data is gathered to create a diverse
efficient system developed keeping in mind dataset. This historical data serves as a foun-
the problems faced by the Indian Railways dation for training the YOLO object detection
specifically. algorithm and refining the model’s accuracy.
Crime detection: Anomalies in video cameras at train stations. This system uti-
frames indicative of potential criminal activi- lizes real-time footage stored in a centralized
ties are identified using the ML model, trig- cloud database. It employs computer vision
gering alerts for prompt intervention by via the OpenCV library and the YOLO detec-
authorities. tion algorithm to facilitate accurate object
Work monitoring: The system moni- detection for crowd density estimation, crime
tors railway operations ensuring efficient detection, and work monitoring, informed
workflow and timely identification of any by historical data. This paper implements the
irregularities. integration of a user-friendly alerting system,
ensuring timely responses to anomalies or
2.5. User-friendly interface emergencies detected by the ML model. Apart
from lessening the burden on authorities, the
A user-friendly interface is designed to pro- proposed solution helps in resource optimiza-
vide authorities with timely alerts in case tion and efficiency, by allowing authorities to
of anomalies or emergency situations. This redirect their valuable resources toward more
interface ensures ease of use, customization, critical tasks. The outcome is a single, cus-
and efficient response to detected issues. tomizable, and efficient system, crafted spe-
cifically to address the major challenges faced
2.6. Validation and testing by the Indian Railways, ultimately enhancing
real-time authority’s awareness about what’s
The performance of the ML model is rigor-
happening in real-time and the operational
ously validated using both real-time and his-
efficiency.
torical data to ensure accurate and reliable
results.
4. Critical Analysis
2.7. Optimization and refinement The methodology proposed in this research
Based on feedback and real-world usage, the comes with its own unique challenges which
system undergoes iterative optimization to might pose as limitations if not dealt with in
enhance its accuracy, efficiency, and adapt- detail. Some of these bottlenecks or critical
ability to evolving scenario’s. examination factors crucial to be handled for
the successful implementation of this pro-
posed system are:
3. Thematic Analysis
This research aims to revolutionize Indian Acknowledgement
Railways by integrating ML in existing
CCTV surveillance systems at the stations. The authors would like to express their grati-
Indian Railways is vital for the country, car- tude for the invaluable and consistent guid-
rying a huge number of passengers daily. ance and support provided by Mr. Saurabh
Managing everything manually, like keep- Kumar Jain, the project guide, throughout the
ing operations smooth, managing crowds, development of this project. The authors also
preventing crimes, and overseeing work in take this opportunity to extend their appre-
real-time, which is very extensive and hard, ciation to all the mentors at BBDITM for
is this paper’s objective. The paper suggests encouraging them to work on this extensive
using ML, a smart technology, to change yet equally exciting project. The knowledge
how railways work. The idea is to create a and experience thus gained were invaluable
smart surveillance system using the existing assets in drafting this paper.
786 Innovations in Computational Intelligence: Trends and Technologies