1,248 research outputs found

    Recognition of Odor Characteristics Based on BP Neural Network

    Get PDF
    This paper introduces the basic principle and calculation steps of BP neural network algorithm for classification and prediction of odor characteristic parameters. Using the PEN3 electronic nose collects the volatile components of milk and programming BP neural network algorithm under MATLAB condition. This paper validate the use of BP neural network algorithm on milk quality prediction is effective

    Optimized Deeplearning Algorithm for Software Defects Prediction

    Get PDF
    Accurate software defect prediction (SDP) helps to enhance the quality of the software by identifying potential flaws early in the development process. However, existing approaches face challenges in achieving reliable predictions. To address this, a novel approach is proposed that combines a two-tier-deep learning framework. The proposed work includes four major phases:(a) pre-processing, (b) Dimensionality reduction, (c) Feature Extraction and (d) Two-fold deep learning-based SDP. The collected raw data is initially pre-processed using a data cleaning approach (handling null values and missing data) and a Decimal scaling normalisation approach. The dimensions of the pre-processed data are reduced using the newly developed Incremental Covariance Principal Component Analysis (ICPCA), and this approach aids in solving the “curse of dimensionality” issue. Then, onto the dimensionally reduced data, the feature extraction is performed using statistical features (standard deviation, skewness, variance, and kurtosis), Mutual information (MI), and Conditional entropy (CE). From the extracted features, the relevant ones are selected using the new Euclidean Distance with Mean Absolute Deviation (ED-MAD). Finally, the SDP (decision making) is carried out using the optimized Two-Fold Deep Learning Framework (O-TFDLF), which encapsulates the RBFN and optimized MLP, respectively. The weight of MLP is fine-tuned using the new Levy Flight Cat Mouse Optimisation (LCMO) method to improve the model's prediction accuracy. The final detected outcome (forecasting the presence/ absence of defect) is acquired from optimized MLP. The implementation has been performed using the MATLAB software. By using certain performance metrics such as Sensitivity, Accuracy, Precision, Specificity and MSE the proposed model’s performance is compared to that of existing models. The accuracy achieved for the proposed model is 93.37%

    Quality and Defect Prediction in Plastic Injection Molding using Machine Learning Algorithms based Gating Systems and Its Mathematical Models

    Get PDF
    To achieve high quality products from Plastic Injection Molding (PIM) process it is very essential to identify the defective operations in automatic manner which is most challenging task. This paper proposes a Machine Learning (ML) approach to detect the complex faults occurrence during the PIM process. During initial sampling process of molding to achieve high quality and low time consumption it is essential to concentrate on the suitable determination of parameter values by considering the properties of injection molding process. For that purpose, a novel machine learning algorithms based gating system is introduced in PIM (MLGS-PIM). Technical evaluation can be done using simulation which combines the CATIA and MATLAB. Therefore in MLGS-PIM, a holistic approach is introduced to improve and predict the process quality of the parameters which is based on machine learning approaches. The considered machine learning approaches for this process are Artificial Neural Network (ANN) and Support Vector Machine (SVM). This two learning models are combined to achieve high quality under various conditions. Such novel ML based technique helps to increase the quality characteristics of the injection molding process and it is predicted with various parameter values where the simulation data and measurements are handled in an intelligent manner. The materials which are considered in the PIM process are thermoplastic polystyrene, thermoplastic acrylonitrile butadiene styrene and thermoplastic polyvinyl chloride where three types are gating systems are applied with it and consists of 3, 4 and 5 gates and as well the parameters which are measured for the output analysis are sum rate, bit error rate and convergence plot. The results show that the performance of the proposed MLGS-PIM approach significantly increases the performance when compared with the earlier approaches such as AntLion Optimization and PSO-MSQPA

    Leveraging Artificial Intelligence and Geomechanical Data for Accurate Shear Stress Prediction in CO2 Sequestration within Saline Aquifers (Smart Proxy Modeling)

    Get PDF
    This research builds upon the success of a previous project that used a Smart Proxy Model (SPM) to predict pressure and saturation in Carbon Capture and Storage (CCS) operations into saline aquifers. The Smart Proxy Model is a data-driven machine learning model that can replicate the output of a sophisticated numerical simulation model for each time step in a short amount of time, using Artificial Intelligence (AI) and large volumes of subsurface data. This study aims to develop the Smart Proxy Model further by incorporating geomechanical datadriven techniques to predict shear stress by using a neural network, specifically through supervised learning, to construct Smart Proxy Models, which are critical to ensuring the safety and effectiveness of Carbon Capture and Storage operations. By training the Smart Proxy Model with reservoir simulations that incorporate varying geological properties and geomechanical data, we will be able to predict the distribution of shear stress. The ability to accurately predict shear stress is crucial to mitigating the potential risks associated with Carbon Capture and Storage operations. The development of a geomechanical Smart Proxy Model will enable more efficient and reliable subsurface modeling decisions in Carbon Capture and Storage operations, ultimately contributing to the safe and effective storage of CO2 and the global effort to combat climate change

    Using Artificial Intelligence and Cybersecurity in Medical and Healthcare Applications

    Get PDF
    Healthcare fields have made substantial use of cybersecurity systems to provide excellent patient safety in many healthcare situations. As dangers increase and hackers work tirelessly to elude law enforcement, cybersecurity has been a rapidly expanding field in the news over the past ten years. Although the initial motivations for conducting cyberattacks have generally remained the same over time, hackers have improved their methods. It is getting harder to identify and stop evolving threats using conventional cybersecurity tools. The development of AI methodologies offers hope for equipping cybersecurity professionals to fend against the ever-evolving threat posed by attackers. Therefore, an artificial intelligence- based Convolutional Neural Network (CNN) is introduced in this paper in which the cyberattacks are detected with more excellent performance. This paper presents unique conditions using the Ant Colony Optimization based Convolutional Neural Network (ACO-CNN) mechanism. This model has been built and supplied collaboratively with a dataset containing samples of web attacks for detecting cyberattacks in the healthcare sector. The results show that the created framework performs better than the modern techniques by detecting cyberattacks more accurately

    Non Linear Modelling of Financial Data Using Topologically Evolved Neural Network Committees

    No full text
    Most of artificial neural network modelling methods are difficult to use as maximising or minimising an objective function in a non-linear context involves complex optimisation algorithms. Problems related to the efficiency of these algorithms are often mixed with the difficulty of the a priori estimation of a network's fixed topology for a specific problem making it even harder to appreciate the real power of neural networks. In this thesis, we propose a method that overcomes these issues by using genetic algorithms to optimise a network's weights and topology, simultaneously. The proposed method searches for virtually any kind of network whether it is a simple feed forward, recurrent, or even an adaptive network. When the data is high dimensional, modelling its often sophisticated behaviour is a very complex task that requires the optimisation of thousands of parameters. To enable optimisation techniques to overpass their limitations or failure, practitioners use methods to reduce the dimensionality of the data space. However, some of these methods are forced to make unrealistic assumptions when applied to non-linear data while others are very complex and require a priori knowledge of the intrinsic dimension of the system which is usually unknown and very difficult to estimate. The proposed method is non-linear and reduces the dimensionality of the input space without any information on the system's intrinsic dimension. This is achieved by first searching in a low dimensional space of simple networks, and gradually making them more complex as the search progresses by elaborating on existing solutions. The high dimensional space of the final solution is only encountered at the very end of the search. This increases the system's efficiency by guaranteeing that the network becomes no more complex than necessary. The modelling performance of the system is further improved by searching not only for one network as the ideal solution to a specific problem, but a combination of networks. These committces of networks are formed by combining a diverse selection of network species from a population of networks derived by the proposed method. This approach automatically exploits the strengths and weaknesses of each member of the committee while avoiding having all members giving the same bad judgements at the same time. In this thesis, the proposed method is used in the context of non-linear modelling of high-dimensional financial data. Experimental results are'encouraging as both robustness and complexity are concerned.Imperial Users onl

    An Efficient Fuzzy Based Multi Level Clustering Model Using Artificial Bee Colony For Intrusion Detection

    Get PDF
    Network security is becoming increasingly important as computer technology advances. One of the most important components in maintaining a secure network is an Intrusion Detection System (IDS). An IDS is a collection of tools used to detect and report network anomalies. Threats to computer networks are increasing at an alarming rate. As a result, it is critical to create and maintain a safe computing environment. For network security, researchers employ a range of technologies, including anomaly-based intrusion detection systems (AIDS). These anomaly-based detections face a major challenge in the classification of data. Optimization algorithms that mimic the foraging behavior of bees in nature, such as the artificial bee colony algorithm, is a highly successful tool. A computer network's intrusion detection system (IDS) is an essential tool for keeping tabs on the activities taking place in the network. Artificial Bee Colony (ABC) algorithm is used in this research for effective intrusion detection. More and more intrusion detection systems are needed to keep up with the increasing number of attacks and the increase in Internet bandwidth. Detecting developing threats with high accuracy at line rates is the prerequisite for a good intrusion detection system. As traffic grows, current systems will be overwhelmed by the sheer volume of false positives and negatives they generate. In order to detect intrusions based on anomalies, this research employs an Efficient Fuzzy based Multi Level Clustering Model using Artificial Bee Colony (EFMLC-ABC). A semi-supervised intrusion detection method based on an artificial bee colony algorithm is proposed in this paper to optimize cluster centers and identify the best clustering options. In order to assess the effectiveness of the proposed method, various subsets of the KDD Cup 99 database were subjected to experimental testing. Analyses have shown that the proposed algorithm is suitable and efficient for intrusion detection system

    Bacteria classification using Cyranose 320 electronic nose

    Get PDF
    Background An electronic nose (e-nose), the Cyrano Sciences' Cyranose 320, comprising an array of thirty-two polymer carbon black composite sensors has been used to identify six species of bacteria responsible for eye infections when present at a range of concentrations in saline solutions. Readings were taken from the headspace of the samples by manually introducing the portable e-nose system into a sterile glass containing a fixed volume of bacteria in suspension. Gathered data were a very complex mixture of different chemical compounds. Method Linear Principal Component Analysis (PCA) method was able to classify four classes of bacteria out of six classes though in reality other two classes were not better evident from PCA analysis and we got 74% classification accuracy from PCA. An innovative data clustering approach was investigated for these bacteria data by combining the 3-dimensional scatter plot, Fuzzy C Means (FCM) and Self Organizing Map (SOM) network. Using these three data clustering algorithms simultaneously better 'classification' of six eye bacteria classes were represented. Then three supervised classifiers, namely Multi Layer Perceptron (MLP), Probabilistic Neural network (PNN) and Radial basis function network (RBF), were used to classify the six bacteria classes. Results A [6 Ă— 1] SOM network gave 96% accuracy for bacteria classification which was best accuracy. A comparative evaluation of the classifiers was conducted for this application. The best results suggest that we are able to predict six classes of bacteria with up to 98% accuracy with the application of the RBF network. Conclusion This type of bacteria data analysis and feature extraction is very difficult. But we can conclude that this combined use of three nonlinear methods can solve the feature extraction problem with very complex data and enhance the performance of Cyranose 320

    Reliable Machine Learning Model for IIoT Botnet Detection

    Get PDF
    Due to the growing number of Internet of Things (IoT) devices, network attacks like denial of service (DoS) and floods are rising for security and reliability issues. As a result of these attacks, IoT devices suffer from denial of service and network disruption. Researchers have implemented different techniques to identify attacks aimed at vulnerable Internet of Things (IoT) devices. In this study, we propose a novel features selection algorithm FGOA-kNN based on a hybrid filter and wrapper selection approaches to select the most relevant features. The novel approach integrated with clustering rank the features and then applies the Grasshopper algorithm (GOA) to minimize the top-ranked features. Moreover, a proposed algorithm, IHHO, selects and adapts the neural network’s hyper parameters to detect botnets efficiently. The proposed Harris Hawks algorithm is enhanced with three improvements to improve the global search process for optimal solutions. To tackle the problem of population diversity, a chaotic map function is utilized for initialization. The escape energy of hawks is updated with a new nonlinear formula to avoid the local minima and better balance between exploration and exploitation. Furthermore, the exploitation phase of HHO is enhanced using a new elite operator ROBL. The proposed model combines unsupervised, clustering, and supervised approaches to detect intrusion behaviors. The N-BaIoT dataset is utilized to validate the proposed model. Many recent techniques were used to assess and compare the proposed model’s performance. The result demonstrates that the proposed model is better than other variations at detecting multiclass botnet attacks
    • …
    corecore