27 research outputs found

    Biblio-Analysis of Cohort Intelligence (CI) Algorithm and its allied applications from Scopus and Web of Science Perspective

    Full text link
    Cohort Intelligence or CI is one of its kind of novel optimization algorithm. Since its inception, in a very short span it is applied successfully in various domains and its results are observed to be effectual in contrast to algorithm of its kind. Till date, there is no such type of bibliometric analysis carried out on CI and its related applications. So, this research paper in a way will be an ice breaker for those who want to take up CI to a new level. In this research papers, CI publications available in Scopus are analyzed through graphs, networked diagrams about authors, source titles, keywords over the years, journals over the time. In a way this bibliometric paper showcase CI, its applications and detail outs systematic review in terms its bibliometric details

    AHP validated literature review of forgery type dependent passive image forgery detection with explainable AI

    Get PDF
    Nowadays, a lot of significance is given to what we read today: newspapers, magazines, news channels, and internet media, such as leading social networking sites like Facebook, Instagram, and Twitter. These are the primary wellsprings of phony news and are frequently utilized in malignant manners, for example, for horde incitement. In the recent decade, a tremendous increase in image information generation is happening due to the massive use of social networking services. Various image editing software like Skylum Luminar, Corel PaintShop Pro, Adobe Photoshop, and many others are used to create, modify the images and videos, are significant concerns. A lot of earlier work of forgery detection was focused on traditional methods to solve the forgery detection. Recently, Deep learning algorithms have accomplished high-performance accuracies in the image processing domain, such as image classification and face recognition. Experts have applied deep learning techniques to detect a forgery in the image too. However, there is a real need to explain why the image is categorized under forged to understand the algorithm’s validity; this explanation helps in mission-critical applications like forensic. Explainable AI (XAI) algorithms have been used to interpret a black box’s decision in various cases. This paper contributes a survey on image forgery detection with deep learning approaches. It also focuses on the survey of explainable AI for images

    Design Patterns for Effective Technology Enabled Learning

    Full text link
    As always seen from past times, the most effective way of learning is via observing, imitating and participation. But with advent of technology in our daily lives, the use of information and communication technologies (ICT) in learning is quite essential. The use of technology has brought about radical changes in the field of distance education. Also for successful progress of any interactive learning environment, the role of an efficient Design is very crucial. In this paper we firstly discuss the role of an effective design pattern, secondly the need of Technology Enabled Learning (TEL) and finally elaborate on the various design patterns that can be applied in the field of TEL

    Bibliometric Analysis of Firefly Algorithm Applications in the Field of Wireless Sensor Networks

    Get PDF
    Wireless Sensor Network is a network of wireless sensor nodes that are capable of sensing information from their surroundings and transmit the sensed information to data collection point known as a base station. Applications of wireless sensor networks are large in number and forest fire detection, landslide monitoring, etc. are few applications to note. The research challenges in wireless sensor networks is the transmission of data from the sensor node to the base station in an energy-efficient manner and network life prolongation. Cluster-based routing techniques are extensively adopted to address this research challenge. Researchers have used different metaheuristic and soft computing techniques for designing such energy-efficient routing techniques. In the literature, a lot of survey article on cluster-based routing methods are available, but there is no bibliometric analysis conducted so far. Hence in this research article, bibliometric study with the focus on the firefly algorithm and its applications in wireless sensor network is undertaken. The purpose of this article is to explore the nature of research conducted concerning to authors, the connection between keywords, the importance of journals and scope for further research in soft computing based clustered routing methods. A detailed bibliometric analysis is carried out by collecting the details of published articles from the Scopus database. In this article, the collected data is articulated in terms of yearly document statistics, key affiliations of authors, contributing geographical locations, subject area statistics, author-keyword mapping, and many more essential aspects of bibliometric analysis. The conducted study helped in understanding that there is a vast scope for the research community to perform research work concerning firefly algorithm applications in the field of wireless sensor networks

    Automated Video and Audio based Stress Detection using Deep Learning Techniques

    Get PDF
    In today's world, stress has become an undoubtedly severe problem that affects people's health. Stress can modify a person's behavior, ideas, and feelings in addition to having an impact on mental health. Unchecked stress can contribute to chronic illnesses including high blood pressure, diabetes, and obesity. Early stress detection promotes a healthy lifestyle in society. This work demonstrates a deep learning-based method for identifying stress from facial expressions and speech signals.An image dataset formed by collecting images from the web is used to construct and train the model Convolution Neural Network (CNN), which then divides the images into two categories: stressed and normal. Recurrent Neural Network (RNN), which is used to categorize speech signals into stressed and normal categories based on the features extracted by the MFCC (Mel Frequency Cepstral Coefficient), is thought to perform better on sequential data since it maintains the past results to determine the final output

    Bibliometric of Feature Selection Using Optimization Techniques in Healthcare using Scopus and Web of Science Databases

    Get PDF
    Feature selection technique is an important step in the prediction and classification process, primarily in data mining related aspects or related to medical field. Feature selection is immersive with the errand of choosing a subset of applicable features that could be utilized in developing a prototype. Medical datasets are huge in size; hence some effective optimization techniques are required to produce accurate results. Optimization algorithms are a critical function in medical data mining particularly in identifying diseases since it offers excellent effectiveness in minimum computational expense and time. The classification algorithms also produce superior outcomes when an objective function is built using the feature selection algorithm. The solitary motive of the research paper analysis is to comprehend the reach and utility of optimization algorithms such as the Genetic Algorithm (GA), the Particle Swarm Optimization (PSO) and the Ant Colony Optimization (ACO) in the field of Health care. The aim is to bring efficiency and maximum optimization in the health care sector using the vast information that is already available related to these fields. With the help of data sets that are available in the health care analysis, our focus is to extract the most important features using optimization techniques and work on different algorithms so as to get the most optimized result. Precision largely depends on usefulness of features that are taken into consideration along with finding useful patterns in those features to characterize the main problem. The Performance of the optimized algorithm finds the overall optimum with less function evaluation. The principle target of this examination is to optimize feature selection technique to bring an optimized and efficient model to cater to various health issues. In this research paper, to do bibliometric analysis Scopus and Web of Science databases are used. This bibliometric analysis considers important keywords, datasets, significance of the considered research papers. It also gives details about types, sources of publications, yearly publication trends, significant countries from Scopus and Web of Science. Also, it captures details about co-appearing keywords, authors, source titles through networked diagrams. In a way, this research paper can be useful to researchers who want to contribute in the area of feature selection and optimization in healthcare. From this research paper it is observed that there is a lot scope for research for the considered research area. This kind of research will also be helpful for analyzing pandemic scenarios like COVID-19

    Bibliometric Analysis of Passive Image Forgery Detection and Explainable AI

    Get PDF
    Due to the arrival of social networking services such as Facebook and Instagram, there has been a vast increase in the volume of image data generated in the last decade. The use of image processing tools like GNU Gimp, Adobe Photoshop to create doctored images and videos is a major concern. These are the main sources of fake news and are often used in malevolent ways such as for mob incitement. Before a move can be taken based on a fake image, we should confirm its realness. This paper shows systematic mappings of existing literature for image forgery detection using deep learning and explainable AI. This uses the Scopus database for data analysis and various tools such as Sciencescape, Gephi, Tableau and VOS Viewer. The study discovered that the largest number of reviews on image forgery detection using deep learning and explainable AI had explored very recently. It was observed that USA universities/institutions are foremost in the research studies focusing on this research topic

    Bibliometric Analysis of Firefly Algorithm Applications in the Field of Wireless Sensor Networks

    Get PDF
    Wireless Sensor Network is a network of wireless sensor nodes that are capable of sensing information from their surroundings and transmit the sensed information to data collection point known as a base station. Applications of wireless sensor networks are large in number and forest fire detection, landslide monitoring, etc. are few applications to note. The research challenges in wireless sensor networks is the transmission of data from the sensor node to the base station in an energy-efficient manner and network life prolongation. Cluster-based routing techniques are extensively adopted to address this research challenge. Researchers have used different metaheuristic and soft computing techniques for designing such energy-efficient routing techniques. In the literature, a lot of survey article on cluster-based routing methods are available, but there is no bibliometric analysis conducted so far. Hence in this research article, bibliometric study with the focus on the firefly algorithm and its applications in wireless sensor network is undertaken. The purpose of this article is to explore the nature of research conducted concerning to authors, the connection between keywords, the importance of journals and scope for further research in soft computing based clustered routing methods. A detailed bibliometric analysis is carried out by collecting the details of published articles from the Scopus database. In this article, the collected data is articulated in terms of yearly document statistics, key affiliations of authors, contributing geographical locations, subject area statistics, author-keyword mapping, and many more essential aspects of bibliometric analysis. The conducted study helped in understanding that there is a vast scope for the research community to perform research work concerning firefly algorithm applications in the field of wireless sensor networks

    Multiple Image Splicing Dataset (MISD): A Dataset for Multiple Splicing

    No full text
    Image forgery has grown in popularity due to easy access to abundant image editing software. These forged images are so devious that it is impossible to predict with the naked eye. Such images are used to spread misleading information in society with the help of various social media platforms such as Facebook, Twitter, etc. Hence, there is an urgent need for effective forgery detection techniques. In order to validate the credibility of these techniques, publically available and more credible standard datasets are required. A few datasets are available for image splicing, such as Columbia, Carvalho, and CASIA V1.0. However, these datasets are employed for the detection of image splicing. There are also a few custom datasets available such as Modified CASIA, AbhAS, which are also employed for the detection of image splicing forgeries. A study of existing datasets used for the detection of image splicing reveals that they are limited to only image splicing and do not contain multiple spliced images. This research work presents a Multiple Image Splicing Dataset, which consists of a total of 300 multiple spliced images. We are the pioneer in developing the first publicly available Multiple Image Splicing Dataset containing high-quality, annotated, realistic multiple spliced images. In addition, we are providing a ground truth mask for these images. This dataset will open up opportunities for researchers working in this significant area

    Bibliometric Analysis of One-stage and Two-stage Object Detection

    Get PDF
    Object Detection using deep learning has seen a boom in the recent couple of years. Observing the trend and its research, it is important to summarize bibliometrics related to object detection which will help researchers contribute to this subject area. This paper details bibliometrics for one-stage object detection and two-stage object detection. This uses Scopus database for data analysis. This also uses tools like Sciencescape, Gephi, etc. It can be observed that the advancements to the field of object detection are seen in recent years and explored to its full extent. It is observed that Chinese universities and researchers are the foremost in the research studies focused on object detection
    corecore