26 research outputs found

    A new feature extraction approach based on non linear source separation

    Get PDF
    A new feature extraction approach is proposed in this paper to improve the classification performance in remotely sensed data. The proposed method is based on a primary sources subset (PSS) obtained by nonlinear transform that provides lower space for land pattern recognition. First, the underlying sources are approximated using multilayer neural networks. Given that, Bayesian inferences update unknown sources’ knowledge and model parameters with information’s data. Then, a source dimension minimizing technique is adopted to provide more efficient land cover description. The support vector machine (SVM) scheme is developed by using feature extraction. The experimental results on real multispectral imagery demonstrates that the proposed approach ensures efficient feature extraction by using several descriptors for texture identification and multiscale analysis. In a pixel based approach, the reduced PSS space improved the overall classification accuracy by 13% and reaches 82%. Using texture and multi resolution descriptors, the overall accuracy is 75.87% for the original observations, while using the reduced source space the overall accuracy reaches 81.67% when using jointly wavelet and Gabor transform and 86.67% when using Gabor transform. Thus, the source space enhanced the feature extraction process and allow more land use discrimination than the multispectral observations

    Malware Detection in Internet of Things (IoT) Devices Using Deep Learning

    Get PDF
    Internet of Things (IoT) devices usage is increasing exponentially with the spread of the internet. With the increasing capacity of data on IoT devices, these devices are becoming venerable to malware attacks; therefore, malware detection becomes an important issue in IoT devices. An effective, reliable, and time-efficient mechanism is required for the identification of sophisticated malware. Researchers have proposed multiple methods for malware detection in recent years, however, accurate detection remains a challenge. We propose a deep learning-based ensemble classification method for the detection of malware in IoT devices. It uses a three steps approach; in the first step, data is preprocessed using scaling, normalization, and de-noising, whereas in the second step, features are selected and one hot encoding is applied followed by the ensemble classifier based on CNN and LSTM outputs for detection of malware. We have compared results with the state-of-the-art methods and our proposed method outperforms the existing methods on standard datasets with an average accuracy of 99.5%.publishedVersio

    An Empirical Assessment of Performance of Data Balancing Techniques in Classification Task

    No full text
    Many real-world classification problems such as fraud detection, intrusion detection, churn prediction, and anomaly detection suffer from the problem of imbalanced datasets. Therefore, in all such classification tasks, we need to balance the imbalanced datasets before building classifiers for prediction purposes. Several data-balancing techniques (DBT) have been discussed in the literature to address this issue. However, not much work is conducted to assess the performance of DBT. Therefore, in this research paper we empirically assess the performance of the data-preprocessing-level data-balancing techniques, namely: Under Sampling (OS), Over Sampling (OS), Hybrid Sampling (HS), Random Over Sampling Examples (ROSE), Synthetic Minority Over Sampling (SMOTE), and Clustering-Based Under Sampling (CBUS) techniques. We have used six different classifiers and twenty-five different datasets, that have varying levels of imbalance ratio (IR), to assess the performance of DBT. The experimental results indicate that DBT helps to improve the performance of the classifiers. However, no significant difference was observed in the performance of the US, OS, HS, SMOTE, and CBUS. It was also observed that performance of DBT was not consistent across varying levels of IR in the dataset and different classifiers

    Identification, 3D-Reconstruction, and Classification of Dangerous Road Cracks

    No full text
    Advances in semiconductor technology and wireless sensor networks have permitted the development of automated inspection at diverse scales (machine, human, infrastructure, environment, etc.). However, automated identification of road cracks is still in its early stages. This is largely owing to the difficulty obtaining pavement photographs and the tiny size of flaws (cracks). The existence of pavement cracks and potholes reduces the value of the infrastructure, thus the severity of the fracture must be estimated. Annually, operators in many nations must audit thousands of kilometers of road to locate this degradation. This procedure is costly, sluggish, and produces fairly subjective results. The goal of this work is to create an efficient automated system for crack identification, extraction, and 3D reconstruction. The creation of crack-free roads is critical to preventing traffic deaths and saving lives. The proposed method consists of five major stages: detection of flaws after processing the input picture with the Gaussian filter, contrast adjustment, and ultimately, threshold-based segmentation. We created a database of road cracks to assess the efficacy of our proposed method. The result obtained are commendable and outperform previous state-of-the-art studies

    Leveraging Software-Defined Networking for a QoS-Aware Mobility Architecture for Named Data Networking

    No full text
    The internet’s future architecture, known as Named Data Networking (NDN), is a creative way to offer content-based services. NDN is more appropriate for content distribution because of its special characteristics, such as naming conventions for packets and methods for in-network caching. Mobility is one of the main study areas for this innovative internet architecture. The software-defined networking (SDN) method, which is employed to provide mobility management in NDN, is one of the feasible strategies. Decoupling the network control plane from the data plane creates an improved programmable platform and makes it possible for outside applications to specify how a network behaves. The SDN is a straightforward and scalable network due to its key characteristics, including programmability, flexibility, and decentralized control. To address the problem of consumer mobility, we proposed an efficient SDPCACM (software-defined proactive caching architecture for consumer mobility) in NDN that extends the SDN model to allow mobility control for the NDN architecture (NDNA), through which the MC (mobile consumer) receives the data proactively after handover while the MC is moving. When an MC is watching a real-time video in a state of mobility and changing their position from one attachment point to another, the controllers in the SDN preserve the network layout and topology as well as link metrics to transfer updated routes with the occurrence of the handoff or handover scenario, and through the proactive caching mechanism, the previous access router proactively sends the desired packets to the new connected routers. Furthermore, the intra-domain and inter-domain handover processing situations in the SDPCACM for NDNA are described here in detail. Moreover, we conduct a simulation of the proposed SDPCACM for NDN that offers an illustrative methodology and parameter configuration for virtual machines (VMs), OpenFlow switches, and an ODL controller. The simulation result demonstrates that the proposed scheme has significant improvements in terms of CPU usage, reduced delay time, jitter, throughput, and packet loss ratio

    Machine-Learning-Based COVID-19 Detection with Enhanced cGAN Technique Using X-ray Images

    No full text
    The coronavirus disease pandemic (COVID-19) is a contemporary disease. It first appeared in 2019 and has sparked a lot of attention in the public media and recent studies due to its rapid spread around the world in recent years and the fact that it has infected millions of individuals. Many people have died in such a short time. In recent years, several studies in artificial intelligence and machine learning have been published to aid clinicians in diagnosing and detecting viruses before they spread throughout the body, recovery monitoring, disease prediction, surveillance, tracking, and a variety of other applications. This paper aims to use chest X-ray images to diagnose and detect COVID-19 disease. The dataset used in this work is the COVID-19 RADIOGRAPHY DATABASE, which was released in 2020 and consisted of four classes. The work is conducted on two classes of interest: the normal class, which indicates that the person is not infected with the coronavirus, and the infected class, which suggests that the person is infected with the coronavirus. The COVID-19 classification indicates that the person has been infected with the coronavirus. Because of the large number of unbalanced images in both classes (more than 10,000 in the normal class and less than 4000 in the COVID-19 class), as well as the difficulties in obtaining or gathering more medical images, we took advantage of the generative network in this project to produce fresh samples that appear real to balance the quantity of photographs in each class. This paper used a conditional generative adversarial network (cGAN) to solve the problem. In the Data Preparation Section of the paper, the architecture of the employed cGAN will be explored in detail. As a classification model, we employed the VGG16. The Materials and Methods Section contains detailed information on the planning and hyperparameters. We put our improved model to the test on a test set of 20% of the total data. We achieved 99.76 percent correctness for both the GAN and the VGG16 models with a variety of preprocessing processes and hyperparameter settings

    Lightweight-BIoV: Blockchain Distributed Ledger Technology (BDLT) for Internet of Vehicles (IoVs)

    No full text
    The vast enhancement in the development of the Internet of Vehicles (IoV) is due to the impact of the distributed emerging technology and topology of the industrial IoV. It has created a new paradigm, such as the security-related resource constraints of Industry 5.0. A new revolution and dimension in the IoV popup raise various critical challenges in the existing information preservation, especially in node transactions and communication, transmission, trust and privacy, and security-protection-related problems, which have been analyzed. These aspects pose serious problems for the industry to provide vehicular-related data integrity, availability, information exchange reliability, provenance, and trustworthiness for the overall activities and service delivery prospects against the increasing number of multiple transactions. In addition, there has been a lot of research interest that intersects with blockchain and Internet of Vehicles association. In this regard, the inadequate performance of the Internet of Vehicles and connected nodes and the high resource requirements of the consortium blockchain ledger have not yet been tackled with a complete solution. The introduction of the NuCypher Re-encryption infrastructure, hashing tree and allocation, and blockchain proof-of-work require more computational power as well. This paper contributes in two different folds. First, it proposes a blockchain sawtooth-enabled modular architecture for protected, secure, and trusted execution, service delivery, and acknowledgment with immutable ledger storage and security and peer-to-peer (P2P) network on-chain and off-chain inter-communication for vehicular activities. Secondly, we design and create a smart contract-enabled data structure in order to provide smooth industrial node streamlined transactions and broadcast content. Substantially, we develop and deploy a hyperledger sawtooth-aware customized consensus for multiple proof-of-work investigations. For validation purposes, we simulate the exchange of information and related details between connected devices on the IoV. The simulation results show that the proposed architecture of BIoV reduces the cost of computational power down to 37.21% and the robust node generation and exchange up to 56.33%. Therefore, only 41.93% and 47.31% of the Internet of Vehicles-related resources and network constraints are kept and used, respectively

    Handling Missing Values Based on Similarity Classifiers and Fuzzy Entropy Measures

    No full text
    Handling missing values (MVs) and feature selection (FS) are vital preprocessing tasks for many pattern recognition, data mining, and machine learning (ML) applications, involving classification and regression problems. The existence of MVs in data badly affects making decisions. Hence, MVs have to be taken into consideration during preprocessing tasks as a critical problem. To this end, the authors proposed a new algorithm for manipulating MVs using FS. Bayesian ridge regression (BRR) is the most beneficial type of Bayesian regression. BRR estimates a probabilistic model of the regression problem. The proposed algorithm is dubbed as cumulative Bayesian ridge with similarity and Luca’s fuzzy entropy measure (CBRSL). CBRSL reveals how the fuzzy entropy FS used for selecting the candidate feature holding MVs aids in the prediction of the MVs within the selected feature using the Bayesian Ridge technique. CBRSL can be utilized to manipulate MVs within other features in a cumulative order; the filled features are incorporated within the BRR equation in order to predict the MVs for the next selected incomplete feature. An experimental analysis was conducted on four datasets holding MVs generated from three missingness mechanisms to compare CBRSL with state-of-the-art practical imputation methods. The performance was measured in terms of R2 score (determination coefficient), RMSE (root mean square error), and MAE (mean absolute error). Experimental results indicate that the accuracy and execution times differ depending on the amount of MVs, the dataset’s size, and the mechanism type of missingness. In addition, the results show that CBRSL can manipulate MVs generated from any missingness mechanism with a competitive accuracy against the compared methods
    corecore