420 research outputs found

    A Systematic Survey of Classification Algorithms for Cancer Detection

    Get PDF
    Cancer is a fatal disease induced by the occurrence of a count of inherited issues and also a count of pathological changes. Malignant cells are dangerous abnormal areas that could develop in any part of the human body, posing a life-threatening threat. To establish what treatment options are available, cancer, also referred as a tumor, should be detected early and precisely. The classification of images for cancer diagnosis is a complex mechanism that is influenced by a diverse of parameters. In recent years, artificial vision frameworks have focused attention on the classification of images as a key problem. Most people currently rely on hand-made features to demonstrate an image in a specific manner. Learning classifiers such as random forest and decision tree were used to determine a final judgment. When there are a vast number of images to consider, the difficulty occurs. Hence, in this paper, weanalyze, review, categorize, and discuss current breakthroughs in cancer detection utilizing machine learning techniques for image recognition and classification. We have reviewed the machine learning approaches like logistic regression (LR), Naïve Bayes (NB), K-nearest neighbors (KNN), decision tree (DT), and Support Vector Machines (SVM)

    An AI-Layered with Multi-Agent Systems Architecture for Prognostics Health Management of Smart Transformers:A Novel Approach for Smart Grid-Ready Energy Management Systems

    Get PDF
    After the massive integration of distributed energy resources, energy storage systems and the charging stations of electric vehicles, it has become very difficult to implement an efficient grid energy management system regarding the unmanageable behavior of the power flow within the grid, which can cause many critical problems in different grid stages, typically in the substations, such as failures, blackouts, and power transformer explosions. However, the current digital transition toward Energy 4.0 in Smart Grids allows the integration of smart solutions to substations by integrating smart sensors and implementing new control and monitoring techniques. This paper is proposing a hybrid artificial intelligence multilayer for power transformers, integrating different diagnostic algorithms, Health Index, and life-loss estimation approaches. After gathering different datasets, this paper presents an exhaustive algorithm comparative study to select the best fit models. This developed architecture for prognostic (PHM) health management is a hybrid interaction between evolutionary support vector machine, random forest, k-nearest neighbor, and linear regression-based models connected to an online monitoring system of the power transformer; these interactions are calculating the important key performance indicators which are related to alarms and a smart energy management system that gives decisions on the load management, the power factor control, and the maintenance schedule planning

    SUTMS - Unified Threat Management Framework for Home Networks

    Get PDF
    Home networks were initially designed for web browsing and non-business critical applications. As infrastructure improved, internet broadband costs decreased, and home internet usage transferred to e-commerce and business-critical applications. Today’s home computers host personnel identifiable information and financial data and act as a bridge to corporate networks via remote access technologies like VPN. The expansion of remote work and the transition to cloud computing have broadened the attack surface for potential threats. Home networks have become the extension of critical networks and services, hackers can get access to corporate data by compromising devices attacked to broad- band routers. All these challenges depict the importance of home-based Unified Threat Management (UTM) systems. There is a need of unified threat management framework that is developed specifically for home and small networks to address emerging security challenges. In this research, the proposed Smart Unified Threat Management (SUTMS) framework serves as a comprehensive solution for implementing home network security, incorporating firewall, anti-bot, intrusion detection, and anomaly detection engines into a unified system. SUTMS is able to provide 99.99% accuracy with 56.83% memory improvements. IPS stands out as the most resource-intensive UTM service, SUTMS successfully reduces the performance overhead of IDS by integrating it with the flow detection mod- ule. The artifact employs flow analysis to identify network anomalies and categorizes encrypted traffic according to its abnormalities. SUTMS can be scaled by introducing optional functions, i.e., routing and smart logging (utilizing Apriori algorithms). The research also tackles one of the limitations identified by SUTMS through the introduction of a second artifact called Secure Centralized Management System (SCMS). SCMS is a lightweight asset management platform with built-in security intelligence that can seamlessly integrate with a cloud for real-time updates

    Terrain classification using machine learning algorithms in a multi-temporal approach A QGIS plug-in implementation

    Get PDF
    Land cover and land use (LCLU) maps are essential for the successful administration of a nation’s topography, however, conventional on-site data gathering methods are costly and time-consuming. By contrast, remote sensing data can be used to generate up-to-date maps regularly with the help of machine learning algorithms, in turn, allowing for the assessment of a region’s dynamics throughout time. The present dissertation will focus on the implementation of an automated land use and land cover classifier based on remote sensing imagery provided by the mod ern sentinel-2 satellite constellation. The project, with Portugal at its focus, will expand on previous approaches by utilizing temporal data as an input variable in order to harvest the contextual information contained in the vegetation cycles. The pursued solution investigated the implementation of a 9-class classifier plug-in for an industry standard, open-source geographic information system. In the course of the testing procedure, various processing techniques and machine learning algorithms were evaluated in a multi-temporal approach. Resulting in a final overall accuracy of 65,9% across the targeted classes.Mapas de uso e ocupação do solo são cruciais para o entendimento e administração da topografia de uma nação, no entanto, os métodos convencionais de aquisição local de dados são caros e demorados. Contrariamente, dados provenientes de métodos de senso riamento remoto podem ser utilizados para gerar regularmente mapas atualizados com a ajuda de algoritmos de aprendizagem automática. Permitindo, por sua vez, a avaliação da dinâmica de uma região ao longo do tempo. Utilizando como base imagens de sensoriamento remoto fornecidas pela recente cons telação de satélites Sentinel-2, a presente dissertação concentra-se na implementação de um classificador de mapas de uso e ocupação do solo automatizado. O projeto, com foco em Portugal, irá procurar expandir abordagens anteriores através do aproveitamento de informação contextual contida nos ciclos vegetativos pela utilização de dados temporais adicionais. A solução adotada investigou a produção e implementação de um classificador geral de 9 classes num plug-in de um sistema de informação geográfico de código aberto. Durante o processo de teste, diversas técnicas de processamento e múltiplos algoritmos de aprendizagem automática foram avaliados numa abordagem multi-temporal, culminando num resultado final de precisão geral de 65,9% nas classes avaliadas

    Deep Neural Networks for Visual Bridge Inspections and Defect Visualisation in Civil Engineering

    Get PDF

    EG-ICE 2021 Workshop on Intelligent Computing in Engineering

    Get PDF
    The 28th EG-ICE International Workshop 2021 brings together international experts working at the interface between advanced computing and modern engineering challenges. Many engineering tasks require open-world resolutions to support multi-actor collaboration, coping with approximate models, providing effective engineer-computer interaction, search in multi-dimensional solution spaces, accommodating uncertainty, including specialist domain knowledge, performing sensor-data interpretation and dealing with incomplete knowledge. While results from computer science provide much initial support for resolution, adaptation is unavoidable and most importantly, feedback from addressing engineering challenges drives fundamental computer-science research. Competence and knowledge transfer goes both ways

    An adaptive and distributed intrusion detection scheme for cloud computing

    Get PDF
    Cloud computing has enormous potentials but still suffers from numerous security issues. Hence, there is a need to safeguard the cloud resources to ensure the security of clients’ data in the cloud. Existing cloud Intrusion Detection System (IDS) suffers from poor detection accuracy due to the dynamic nature of cloud as well as frequent Virtual Machine (VM) migration causing network traffic pattern to undergo changes. This necessitates an adaptive IDS capable of coping with the dynamic network traffic pattern. Therefore, the research developed an adaptive cloud intrusion detection scheme that uses Binary Segmentation change point detection algorithm to track the changes in the normal profile of cloud network traffic and updates the IDS Reference Model when change is detected. Besides, the research addressed the issue of poor detection accuracy due to insignificant features and coordinated attacks such as Distributed Denial of Service (DDoS). The insignificant feature was addressed using feature selection while coordinated attack was addressed using distributed IDS. Ant Colony Optimization and correlation based feature selection were used for feature selection. Meanwhile, distributed Stochastic Gradient Decent and Support Vector Machine (SGD-SVM) were used for the distributed IDS. The distributed IDS comprised detection units and aggregation unit. The detection units detected the attacks using distributed SGD-SVM to create Local Reference Model (LRM) on various computer nodes. Then, the LRM was sent to aggregation units to create a Global Reference Model. This Adaptive and Distributed scheme was evaluated using two datasets: a simulated datasets collected using Virtual Machine Ware (VMWare) hypervisor and Network Security Laboratory-Knowledge Discovery Database (NSLKDD) benchmark intrusion detection datasets. To ensure that the scheme can cope with the dynamic nature of VM migration in cloud, performance evaluation was performed before and during the VM migration scenario. The evaluation results of the adaptive and distributed scheme on simulated datasets showed that before VM migration, an overall classification accuracy of 99.4% was achieved by the scheme while a related scheme achieved an accuracy of 83.4%. During VM migration scenario, classification accuracy of 99.1% was achieved by the scheme while the related scheme achieved an accuracy of 85%. The scheme achieved an accuracy of 99.6% when it was applied to NSL-KDD dataset while the related scheme achieved an accuracy of 83%. The performance comparisons with a related scheme showed that the developed adaptive and distributed scheme achieved superior performance

    Fusion Iris and Periocular Recognitions in Non-Cooperative Environment

    Get PDF
    The performance of iris recognition in non-cooperative environment can be negatively impacted when the resolution of the iris images is low which results in failure to determine the eye center, limbic and pupillary boundary of the iris segmentation. Hence, a combination with periocular features is suggested to increase the authenticity of the recognition system. However, the texture feature of periocular can be easily affected by a background complication while the colour feature of periocular is still limited to spatial information and quantization effects. This happens due to different distances between the sensor and the subject during the iris acquisition stage as well as image size and orientation. The proposed method of periocular feature extraction consists of a combination of rotation invariant uniform local binary pattern to select the texture features and a method of color moment to select the color features. Besides, a hue-saturation-value channel is selected to avoid loss of discriminative information in the eye image. The proposed method which consists of combination between texture and colour features provides the highest accuracy for the periocular recognition with more than 71.5% for the UBIRIS.v2 dataset and 85.7% for the UBIPr dataset. For the fusion recognitions, the proposed method achieved the highest accuracy with more than 85.9% for the UBIRIS.v2 dataset and 89.7% for the UBIPr dataset

    EG-ICE 2021 Workshop on Intelligent Computing in Engineering

    Get PDF
    The 28th EG-ICE International Workshop 2021 brings together international experts working at the interface between advanced computing and modern engineering challenges. Many engineering tasks require open-world resolutions to support multi-actor collaboration, coping with approximate models, providing effective engineer-computer interaction, search in multi-dimensional solution spaces, accommodating uncertainty, including specialist domain knowledge, performing sensor-data interpretation and dealing with incomplete knowledge. While results from computer science provide much initial support for resolution, adaptation is unavoidable and most importantly, feedback from addressing engineering challenges drives fundamental computer-science research. Competence and knowledge transfer goes both ways
    • …
    corecore