135 research outputs found
A patient agent controlled customized blockchain based framework for internet of things
Although Blockchain implementations have emerged as revolutionary technologies for various industrial applications including cryptocurrencies, they have not been widely deployed to store data streaming from sensors to remote servers in architectures known as Internet of Things. New Blockchain for the Internet of Things models promise secure solutions for eHealth, smart cities, and other applications. These models pave the way for continuous monitoring of patient’s physiological signs with wearable sensors to augment traditional medical practice without recourse to storing data with a trusted authority. However, existing Blockchain algorithms cannot accommodate the huge volumes, security, and privacy requirements of health data. In this thesis, our first contribution is an End-to-End secure eHealth architecture that introduces an intelligent Patient Centric Agent. The Patient Centric Agent executing on dedicated hardware manages the storage and access of streams of sensors generated health data, into a customized Blockchain and other less secure repositories. As IoT devices cannot host Blockchain technology due to their limited memory, power, and computational resources, the Patient Centric Agent coordinates and communicates with a private customized Blockchain on behalf of the wearable devices. While the adoption of a Patient Centric Agent offers solutions for addressing continuous monitoring of patients’ health, dealing with storage, data privacy and network security issues, the architecture is vulnerable to Denial of Services(DoS) and single point of failure attacks. To address this issue, we advance a second contribution; a decentralised eHealth system in which the Patient Centric Agent is replicated at three levels: Sensing Layer, NEAR Processing Layer and FAR Processing Layer. The functionalities of the Patient Centric Agent are customized to manage the tasks of the three levels. Simulations confirm protection of the architecture against DoS attacks. Few patients require all their health data to be stored in Blockchain repositories but instead need to select an appropriate storage medium for each chunk of data by matching their personal needs and preferences with features of candidate storage mediums. Motivated by this context, we advance third contribution; a recommendation model for health data storage that can accommodate patient preferences and make storage decisions rapidly, in real-time, even with streamed data. The mapping between health data features and characteristics of each repository is learned using machine learning. The Blockchain’s capacity to make transactions and store records without central oversight enables its application for IoT networks outside health such as underwater IoT networks where the unattended nature of the nodes threatens their security and privacy. However, underwater IoT differs from ground IoT as acoustics signals are the communication media leading to high propagation delays, high error rates exacerbated by turbulent water currents. Our fourth contribution is a customized Blockchain leveraged framework with the model of Patient-Centric Agent renamed as Smart Agent for securely monitoring underwater IoT. Finally, the smart Agent has been investigated in developing an IoT smart home or cities monitoring framework. The key algorithms underpinning to each contribution have been implemented and analysed using simulators.Doctor of Philosoph
An Optimized Ensemble Deep Learning Model For Brain Tumor Classification
Brain tumors present a grave risk to human life, demanding precise and timely
diagnosis for effective treatment. Inaccurate identification of brain tumors
can significantly diminish life expectancy, underscoring the critical need for
precise diagnostic methods. Manual identification of brain tumors within vast
Magnetic Resonance Imaging (MRI) image datasets is arduous and time-consuming.
Thus, the development of a reliable deep learning (DL) model is essential to
enhance diagnostic accuracy and ultimately save lives. This study introduces an
innovative optimization-based deep ensemble approach employing transfer
learning (TL) to efficiently classify brain tumors. Our methodology includes
meticulous preprocessing, reconstruction of TL architectures, fine-tuning, and
ensemble DL models utilizing weighted optimization techniques such as Genetic
Algorithm-based Weight Optimization (GAWO) and Grid Search-based Weight
Optimization (GSWO). Experimentation is conducted on the Figshare
Contrast-Enhanced MRI (CE-MRI) brain tumor dataset, comprising 3064 images. Our
approach achieves notable accuracy scores, with Xception, ResNet50V2,
ResNet152V2, InceptionResNetV2, GAWO, and GSWO attaining 99.42%, 98.37%,
98.22%, 98.26%, 99.71%, and 99.76% accuracy, respectively. Notably, GSWO
demonstrates superior accuracy, averaging 99.76\% accuracy across five folds on
the Figshare CE-MRI brain tumor dataset. The comparative analysis highlights
the significant performance enhancement of our proposed model over existing
counterparts. In conclusion, our optimized deep ensemble model exhibits
exceptional accuracy in swiftly classifying brain tumors. Furthermore, it has
the potential to assist neurologists and clinicians in making accurate and
immediate diagnostic decisions
Person recognition based on deep gait: a survey.
Gait recognition, also known as walking pattern recognition, has expressed deep interest in the computer vision and biometrics community due to its potential to identify individuals from a distance. It has attracted increasing attention due to its potential applications and non-invasive nature. Since 2014, deep learning approaches have shown promising results in gait recognition by automatically extracting features. However, recognizing gait accurately is challenging due to the covariate factors, complexity and variability of environments, and human body representations. This paper provides a comprehensive overview of the advancements made in this field along with the challenges and limitations associated with deep learning methods. For that, it initially examines the various gait datasets used in the literature review and analyzes the performance of state-of-the-art techniques. After that, a taxonomy of deep learning methods is presented to characterize and organize the research landscape in this field. Furthermore, the taxonomy highlights the basic limitations of deep learning methods in the context of gait recognition. The paper is concluded by focusing on the present challenges and suggesting several research directions to improve the performance of gait recognition in the future
Empowering COVID-19 Detection: Optimizing Performance Through Fine-Tuned EfficientNet Deep Learning Architecture
The worldwide COVID-19 pandemic has profoundly influenced the health and
everyday experiences of individuals across the planet. It is a highly
contagious respiratory disease requiring early and accurate detection to curb
its rapid transmission. Initial testing methods primarily revolved around
identifying the genetic composition of the coronavirus, exhibiting a relatively
low detection rate and requiring a time-intensive procedure. To address this
challenge, experts have suggested using radiological imagery, particularly
chest X-rays, as a valuable approach within the diagnostic protocol. This study
investigates the potential of leveraging radiographic imaging (X-rays) with
deep learning algorithms to swiftly and precisely identify COVID-19 patients.
The proposed approach elevates the detection accuracy by fine-tuning with
appropriate layers on various established transfer learning models. The
experimentation was conducted on a COVID-19 X-ray dataset containing 2000
images. The accuracy rates achieved were impressive of 100% for EfficientNetB4
model. The fine-tuned EfficientNetB4 achieved an excellent accuracy score,
showcasing its potential as a robust COVID-19 detection model. Furthermore,
EfficientNetB4 excelled in identifying Lung disease using Chest X-ray dataset
containing 4,350 Images, achieving remarkable performance with an accuracy of
99.17%, precision of 99.13%, recall of 99.16%, and f1-score of 99.14%. These
results highlight the promise of fine-tuned transfer learning for efficient
lung detection through medical imaging, especially with X-ray images. This
research offers radiologists an effective means of aiding rapid and precise
COVID-19 diagnosis and contributes valuable assistance for healthcare
professionals in accurately identifying affected patients.Comment: Computers in Biology and Medicine [Q1, IF: 7.7, CS: 9.2
MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek in WSNs
Wireless Sensor Networks (WSNs) play a pivotal role as infrastructures,
encompassing both stationary and mobile sensors. These sensors self-organize
and establish multi-hop connections for communication, collectively sensing,
gathering, processing, and transmitting data about their surroundings. Despite
their significance, WSNs face rapid and detrimental attacks that can disrupt
functionality. Existing intrusion detection methods for WSNs encounter
challenges such as low detection rates, computational overhead, and false
alarms. These issues stem from sensor node resource constraints, data
redundancy, and high correlation within the network. To address these
challenges, we propose an innovative intrusion detection approach that
integrates Machine Learning (ML) techniques with the Synthetic Minority
Oversampling Technique Tomek Link (SMOTE-TomekLink) algorithm. This blend
synthesizes minority instances and eliminates Tomek links, resulting in a
balanced dataset that significantly enhances detection accuracy in WSNs.
Additionally, we incorporate feature scaling through standardization to render
input features consistent and scalable, facilitating more precise training and
detection. To counteract imbalanced WSN datasets, we employ the SMOTE-Tomek
resampling technique, mitigating overfitting and underfitting issues. Our
comprehensive evaluation, using the WSN Dataset (WSN-DS) containing 374,661
records, identifies the optimal model for intrusion detection in WSNs. The
standout outcome of our research is the remarkable performance of our model. In
binary, it achieves an accuracy rate of 99.78% and in multiclass, it attains an
exceptional accuracy rate of 99.92%. These findings underscore the efficiency
and superiority of our proposal in the context of WSN intrusion detection,
showcasing its effectiveness in detecting and mitigating intrusions in WSNs.Comment: International Journal of Information Security, Springer Journal - Q1,
Scopus, ISI, SCIE, IF: 3.2 - Accepted on Jan 17, 202
Sequence-to-sequence learning-based conversion of pseudo-code to source code using neural translation approach
Pseudo-code refers to an informal means of representing algorithms that do not require the exact syntax of a computer programming language. Pseudo-code helps developers and researchers represent their algorithms using human-readable language. Generally, researchers can convert the pseudo-code into computer source code using different conversion techniques. The efficiency of such conversion methods is measured based on the converted algorithm's correctness. Researchers have already explored diverse technologies to devise conversion methods with higher accuracy. This paper proposes a novel pseudo-code conversion learning method that includes natural language processing-based text preprocessing and a sequence-to-sequence deep learning-based model trained with the SPoC dataset. We conducted an extensive experiment on our designed algorithm using descriptive bilingual understudy scoring and compared our results with state-of-the-art techniques. Result analysis shows that our approach is more accurate and efficient than other existing conversion methods in terms of several performances metrics. Furthermore, the proposed method outperforms the existing approaches because our method utilizes two Long-Short-Term-Memory networks that might increase the accuracy. © 2013 IEEE
An efficient hybrid system for anomaly detection in social networks
Anomaly detection has been an essential and dynamic research area in the data mining. A wide range of applications including different social medias have adopted different state-of-the-art methods to identify anomaly for ensuring user’s security and privacy. The social network refers to a forum used by different groups of people to express their thoughts, communicate with each other, and share the content needed. This social networks also facilitate abnormal activities, spread fake news, rumours, misinformation, unsolicited messages, and propaganda post malicious links. Therefore, detection of abnormalities is one of the important data analysis activities for the identification of normal or abnormal users on the social networks. In this paper, we have developed a hybrid anomaly detection method named DT-SVMNB that cascades several machine learning algorithms including decision tree (C5.0), Support Vector Machine (SVM) and Naïve Bayesian classifier (NBC) for classifying normal and abnormal users in social networks. We have extracted a list of unique features derived from users’ profile and contents. Using two kinds of dataset with the selected features, the proposed machine learning model called DT-SVMNB is trained. Our model classifies users as depressed one or suicidal one in the social network. We have conducted an experiment of our model using synthetic and real datasets from social network. The performance analysis demonstrates around 98% accuracy which proves the effectiveness and efficiency of our proposed system. © 2021, The Author(s)
Homeless in Dhaka: Violence, Sexual Harassment, and Drug-abuse
Bangladesh has experienced one of the highest urban population growth rates (around 7% per year) over the past three decades. Dhaka, the capital city, attracts approximately 320,000 migrants from rural areas every year. The city is unable to provide shelter, food, education, healthcare, and employment for its rapidly-expanding population. An estimated 3.4 million people live in the overcrowded slums of Dhaka, and many more live in public spaces lacking the most basic shelter. While a small but growing body of research describes the lives of people who live in urban informal settlements or slums, very little research describes the population with no housing at all. Anecdotally, the homeless population in Dhaka is known to face extortion, erratic unemployment, exposure to violence, and sexual harassment and to engage in high-risk behaviours. However, this has not been systematically documented. This cross-sectional, descriptive study was conducted to better understand the challenges in the lives of the homeless population in 11 areas of Dhaka during a 13-month period from June 2007 to June 2008. A modified cluster-sampling method was used for selecting 32 clusters of 14 female and male respondents, for a sample of 896. In addition to sociodemographic details, this paper focuses specifically on violence, drug-abuse, and sexual harassment. The findings showed that physical assaults among the homeless, particularly among women, were a regular phenomenon. Eighty-three percent of female respondents (n=372) were assaulted by their husbands, station masters, and male police officers. They were subjected to lewd gestures, unwelcome advances, and rape. Male respondents reported being physically assaulted while trying to collect food, fighting over space, or while stealing, by police officers, miscreants, or other homeless people. Sixty-nine percent of the male respondents (n=309) used locally-available drugs, such as marijuana and heroin, and two-thirds of injecting drug-users shared needles. The study determined that the homeless are not highly mobile but tend to congregate in clusters night after night. Income-generating activities, targeted education, gender-friendly community police programmes, shelters and crises centres, and greater community involvement are suggested as policy and programmatic interventions to raise the quality of life of this population. In addition, there is a need to reduce high rates of urban migration, a priority for Bangladesh
Automatic driver distraction detection using deep convolutional neural networks
Recently, the number of road accidents has been increased worldwide due to the distraction of the drivers. This rapid road crush often leads to injuries, loss of properties, even deaths of the people. Therefore, it is essential to monitor and analyze the driver's behavior during the driving time to detect the distraction and mitigate the number of road accident. To detect various kinds of behavior like- using cell phone, talking to others, eating, sleeping or lack of concentration during driving; machine learning/deep learning can play significant role. However, this process may need high computational capacity to train the model by huge number of training dataset. In this paper, we made an effort to develop CNN based method to detect distracted driver and identify the cause of distractions like talking, sleeping or eating by means of face and hand localization. Four architectures namely CNN, VGG-16, ResNet50 and MobileNetV2 have been adopted for transfer learning. To verify the effectiveness, the proposed model is trained with thousands of images from a publicly available dataset containing ten different postures or conditions of a distracted driver and analyzed the results using various performance metrics. The performance results showed that the pre-trained MobileNetV2 model has the best classification efficiency. © 2022 The Author(s
- …