20 research outputs found

    A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing its Impact

    Get PDF
    The unprecedented outbreak of the 2019 novel coronavirus, termed as COVID-19 by the World Health Organization (WHO), has placed numerous governments around the world in a precarious position. The impact of the COVID-19 outbreak, earlier witnessed by the citizens of China alone, has now become a matter of grave concern for virtually every country in the world. The scarcity of resources to endure the COVID-19 outbreak combined with the fear of overburdened healthcare systems has forced a majority of these countries into a state of partial or complete lockdown. The number of laboratory-confirmed coronavirus cases has been increasing at an alarming rate throughout the world, with reportedly more than 3 million confirmed cases as of 30 April 2020. Adding to these woes, numerous false reports, misinformation, and unsolicited fears in regards to coronavirus, are being circulated regularly since the outbreak of the COVID-19. In response to such acts, we draw on various reliable sources to present a detailed review of all the major aspects associated with the COVID-19 pandemic. In addition to the direct health implications associated with the outbreak of COVID-19, this study highlights its impact on the global economy. In drawing things to a close, we explore the use of technologies such as the Internet of Things (IoT), Unmanned Aerial Vehicles (UAVs), blockchain, Artificial Intelligence (AI), and 5G, among others, to help mitigate the impact of COVID-19 outbreak.This work was supported by the Qatar National Research Fund (a member of the Qatar Foundation) under Grant NPRP10-1205-160012

    Disaster and Pandemic Management Using Machine Learning: A Survey

    Get PDF
    This article provides a literature review of state-of-the-art machine learning (ML) algorithms for disaster and pandemic management. Most nations are concerned about disasters and pandemics, which, in general, are highly unlikely events. To date, various technologies, such as IoT, object sensing, UAV, 5G, and cellular networks, smartphone-based system, and satellite-based systems have been used for disaster and pandemic management. ML algorithms can handle multidimensional, large volumes of data that occur naturally in environments related to disaster and pandemic management and are particularly well suited for important related tasks, such as recognition and classification. ML algorithms are useful for predicting disasters and assisting in disaster management tasks, such as determining crowd evacuation routes, analyzing social media posts, and handling the post-disaster situation. ML algorithms also find great application in pandemic management scenarios, such as predicting pandemics, monitoring pandemic spread, disease diagnosis, etc. This article first presents a tutorial on ML algorithms. It then presents a detailed review of several ML algorithms and how we can combine these algorithms with other technologies to address disaster and pandemic management. It also discusses various challenges, open issues and, directions for future research

    A blockchain and deep neural networks-based secure framework for enhanced crop protection

    Get PDF
    The problem faced by one farmer can also be the problem of some other farmer in other regions. Providing information to farmers and connecting them has always been a challenge. Crowdsourcing and community building are considered as useful solutions to these challenges. However, privacy concerns and inactivity of users can make these models inefficient. To tackle these challenges, we present a cost-efficient and blockchain-based secure framework for building a community of farmers and crowdsourcing the data generated by them to help the farmers’ community. Apart from ensuring privacy and security of data, a revenue model is also incorporated to provide incentives to farmers. These incentives would act as a motivating factor for the farmers to willingly participate in the process. Through integration of a deep neural network-based model to our proposed framework, prediction of any abnormalities present within the crops and their predicted possible solutions would be much more coherent. The simulation results demonstrate that the prediction of plant pathology model is highly accurate

    Beyond Reality: The Pivotal Role of Generative AI in the Metaverse

    Full text link
    Imagine stepping into a virtual world that's as rich, dynamic, and interactive as our physical one. This is the promise of the Metaverse, and it's being brought to life by the transformative power of Generative Artificial Intelligence (AI). This paper offers a comprehensive exploration of how generative AI technologies are shaping the Metaverse, transforming it into a dynamic, immersive, and interactive virtual world. We delve into the applications of text generation models like ChatGPT and GPT-3, which are enhancing conversational interfaces with AI-generated characters. We explore the role of image generation models such as DALL-E and MidJourney in creating visually stunning and diverse content. We also examine the potential of 3D model generation technologies like Point-E and Lumirithmic in creating realistic virtual objects that enrich the Metaverse experience. But the journey doesn't stop there. We also address the challenges and ethical considerations of implementing these technologies in the Metaverse, offering insights into the balance between user control and AI automation. This paper is not just a study, but a guide to the future of the Metaverse, offering readers a roadmap to harnessing the power of generative AI in creating immersive virtual worlds.Comment: 8 pages, 4 figure

    Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey

    Get PDF
    Drone security is currently a major topic of discussion among researchers and industrialists. Although there are multiple applications of drones, if the security challenges are not anticipated and required architectural changes are not made, the upcoming drone applications will not be able to serve their actual purpose. Therefore, in this paper, we present a detailed review of the security-critical drone applications, and security-related challenges in drone communication such as DoS attacks, Man-in-the-middle attacks, De-Authentication attacks, and so on. Furthermore, as part of solution architectures, the use of Blockchain, Software Defined Networks (SDN), Machine Learning, and Fog/Edge computing are discussed as these are the most emerging technologies. Drones are highly resource-constrained devices and therefore it is not possible to deploy heavy security algorithms on board. Blockchain can be used to cryptographically store all the data that is sent to/from the drones, thereby saving it from tampering and eavesdropping. Various ML algorithms can be used to detect malicious drones in the network and to detect safe routes. Additionally, the SDN technology can be used to make the drone network reliable by allowing the controller to keep a close check on data traffic, and fog computing can be used to keep the computation capabilities closer to the drones without overloading them.The work of Vinay Chamola and Fei Richard Yu was supported in part by the SICI SICRG Grant through the Project Artificial Intelligence Enabled Security Provisioning and Vehicular Vision Innovations for Autonomous Vehicles, and in part by the Government of Canada's National Crime Prevention Strategy and Natural Sciences and Engineering Research Council of Canada (NSERC) CREATE Program for Building Trust in Connected and Autonomous Vehicles (TrustCAV)

    Interpreting Black-Box Models: A Review on Explainable Artificial Intelligence

    Get PDF
    Recent years have seen a tremendous growth in Artificial Intelligence (AI)-based methodological development in a broad range of domains. In this rapidly evolving field, large number of methods are being reported using machine learning (ML) and Deep Learning (DL) models. Majority of these models are inherently complex and lacks explanations of the decision making process causing these models to be termed as 'Black-Box'. One of the major bottlenecks to adopt such models in mission-critical application domains, such as banking, e-commerce, healthcare, and public services and safety, is the difficulty in interpreting them. Due to the rapid proleferation of these AI models, explaining their learning and decision making process are getting harder which require transparency and easy predictability. Aiming to collate the current state-of-the-art in interpreting the black-box models, this study provides a comprehensive analysis of the explainable AI (XAI) models. To reduce false negative and false positive outcomes of these back-box models, finding flaws in them is still difficult and inefficient. In this paper, the development of XAI is reviewed meticulously through careful selection and analysis of the current state-of-the-art of XAI research. It also provides a comprehensive and in-depth evaluation of the XAI frameworks and their efficacy to serve as a starting point of XAI for applied and theoretical researchers. Towards the end, it highlights emerging and critical issues pertaining to XAI research to showcase major, model-specific trends for better explanation, enhanced transparency, and improved prediction accuracy

    COVID-19 Associated Mucormycosis::A Review of an Emergent Epidemic Fungal Infection in 3 Era of COVID-19 Pandemic

    Get PDF
    At a time when the COVID-19's second wave is still picking up in countries like India, a number of reports describe the potential association with a rise in the number of cases of mucormycosis, commonly known as the black fungus. This fungal infection has been around for centuries and affects those people whose immunity has been compromised due to severe health conditions. In this article, we provide a detailed overview of mucormycosis and discuss how COVID-19 could have caused a sudden spike in an otherwise rare disease in countries like India. The article discusses the various symptoms of the disease, class of people most vulnerable to this infection, preventive measures to avoid the disease, and various treatments that exist in clinical practice and research to manage the disease

    A Hurst‐based diffusion model using time series characteristics for influence maximization in social networks

    No full text
    Online social networks have grown exponentially in the recent years while finding applications in real life like marketing, recommendation systems, and social awareness campaigns. An important research area in this field is Influence Maximization, which pertains to finding methods for maximizing the spread of information (influence) across an OSN. Existing works in IM widely use a pre-defined edge propagation probability for node activation. Hurst exponent (H), which depicts the self-similarity in the time series depicting a user's past interaction behaviour, has also been used as activation criteria. In this work, we propose a Time Series Characteristic based Hurst-based Diffusion Model (TSC-HDM), which calculates H based on the stationary or non-stationary characteristic of the time series. TSC-HDM selects a handful of seed nodes and activates a seed node's inactive successor only if H > 0.5. The proposed model has been tested on four real-world OSN datasets. The results have been compared against four other IM models – Independent Cascade, Weighted Cascade, Trivalency, and Hurst-based Influence Maximization. TSC-HDM is found to have achieved as much as 590% higher expected influence spread as compared to the other models. Moreover, TSC-HDM has attained 344% better average influence spread than other state-of-the-art models namely LIR, A-Greedy, LPIMA, Genetic Algorithm with Dynamic Probabilities, NeighborsRemove, DegreeDecrease, IGIM, IRR, and PHG

    Machine unlearning: Its need and implementation strategies

    No full text
    Generally when users share information about themselves on some online platforms, they knowingly or unknowingly allow this data to be used by the companies behind these companies for various purposes including selling this information to advertisers as well as using it to better enrich their predictive models. In the event of the user changing their minds on allowing such data about them to be able to be used by the companies, it becomes a strenuous task for the companies to get rid of the influence of this collected data, especially when it has been used to train their machine learning models. Recent legislations by governing bodies, like the European Union, grant people the right to choose where data about them may be used, including a right to have their data and its resulting influence be completely removed from a company's databases and machine learning models. To be able to do this at scale new machine unlearning solutions need to be invented. In this paper, we look at some of these early models of machine unlearning strategies that have been proposed
    corecore