List papers
Seq | # | Title | Abstract | Keywords | DOIX | Authors with affiliation and country |
---|---|---|---|---|---|---|
Seq | # | Title | Abstract | DOI | Keywords | Authors with affiliation and country |
1 | 1570825681 | An Optimized Ranking Based Technique towards Conversational Recommendation Models | Recommendations can be adjusted based on the liking of an individual by employing the technique of critiquing with conversational recommendation. For example, a product recommendation and a feature set are suggested to an individual. The individual can then either accept the suggestion or criticize it, producing a more refined suggestion. A modern embedding centered technique is incorporated into the recent model, latent linear critiquing (LLC). LLC aims to improve the embedding of the liking and critiques of an individual centered on particular product depictions (e.g., key phrases from individual feedbacks). This is achieved by exploring the arrangement of the embeddings to effectively improve the weightings following a linear programming (LP) design. In this paper, LLC is revisited. It has been observed that LLC is a grade centered technique which utilizes extreme weightings to enlarge estimated score gaps among favored and non-favored products. We observed that the final aim of LLC is the re-ranking rather than re-scoring. In this research article, an optimized ranking-based technique is proposed which aims to optimize embedding weights centered on noticed rank infringements from previous critiquing repetitions. The suggested model is evaluated on two recommendation datasets which comprise of individual feedbacks. Experimental outcomes reveal that ranking centered LLC usually performs better than scoring centered LLC and other standard approaches across diverse datasets, such as critiquing formats and several other performance measures. | http://dx.doi.org/10.12785/ijcds/150185 | Conversational Recommendation; Critiquing; Latent Linear Critiquing; Embedding | Sanjeev Dhawan (Department of Computer Science and Engineering, UIET, KUK, India); Kulvinder Singh (UIET, Kurukshetra University, India); Amit Batra (Kurukshetra University, India); Anthony Choi and Ethan Choi (Mercer University, USA) |
2 | 1570867135 | Multi-Voltage Design of RISC Processor for Low Power Application: A Survey | Power management is becoming important aspect as the size of transistor is shrinking. For processor design, Reduced Instruction Set Computer (RISC) architecture is preferable as compared to Complex Instruction Set Computer (CISC) architecture because of its simplicity and availability. To design the low power RISC processor, there are a few techniques that had been used earlier, such as a) pipelining and b) Common Power Format language to generate power intent of RISC processor design. In the present work, for designing a 16-bit RISC processor with low power consumption, a multi-voltage design technique has been used. In this technique, different supply voltages are provided to different blocks of the design. This technique is implemented with the help of Unified Power Format (UPF). Further, various operations such as ADD, SUB, INVERT, AND, OR, Right Shift, Left Shift, and Less Than are verified on modelsim for the designed 16-bit RISC processor. | Unified Power Format (UPF); Low Power Design; Multi-Voltage Design; Power Gating; Clock Gating; Retention | Dheeraj Kumar Sharma (National Institute of Technology, Kurukshetra, India); Rahul Vikram (Qualcomm Inc India, India) | |
3 | 1570869541 | Deep Learning Based Person Authentication System using Fingerprint and Brain Wave | The practice of automatically recognizing the correct person using computational methods based on features maintained in computer systems is known as person authentication. Security, robustness, privacy, and non-forgery are the critical aspects of any person authentication system. Traditional biometric-based systems are dependent on the use of a single modality, which may be lacking in the ability to provide high security. These systems are vulnerable to noise and can be readily exploited. An optimization enabled deep learning based multimodal person authentication system is presented to solve these disadvantages. Here, a combination of brainwave signals and fingerprint images are utilized for providing improved security. A Deep Maxout Network (DMN) is utilized for performing person authentication on both the modalities and the output obtained is fused together using cosine similarity to attain the final result. The African vultures-Aquila Optimization (AVAO) algorithm is a unique optimization algorithm for updating the DMN weights. To construct the algorithm, the African Vulture Optimization Algorithm (AVOA) techniques are updated according to the extended exploration capabilities of the Aquila Optimizer (AO). The presented multimodal person authentication system achieves an accuracy of 0.926, sensitivity of 0.940, specificity of 0.928, and F1-score of 0.921, demonstrating exceptional performance. The experimental study also indicates the performance evaluation comparison of AVAO with the prevailing techniques such as Multi-task EEG-based Authentication, Multi model-based fusion, Multi-biometric system, and Visual secret sharing and super-resolution model on the basis of various metrics. | Person authentication; multimodal; fingerprint; brain signal | Rasika Deshmukh (Fergusson College (Autonomous), Pune, India); Pravin Yannawar (Dr Babasaheb Ambedkar Marathwada University, Aurangabad, India) | |
4 | 1570871127 | Semi-symmetrical Coprime Linear Array with Reduced Mutual Coupling Effect and High Degrees of Freedom | Direction finding based on the coprime array has received a lot of interest because of the increased degrees of freedom and larger aperture size compared with the uniform linear array. In this paper, a new semi-symmetric coprime array (SSCA) configuration is proposed to reduce the mutual coupling impact for passive sensing by exploiting the relocation of the redundant elements. First, we examine the difference co-array of the prototype coprime array (PCA) and identify the redundant elements. The second subarray (N-subarray) is then split into two subarrays on opposite axis, and the zero-lag location is moved to a new location to construct large contiguous lags in the difference co-array. The investigation of the SSCA is performed. The analytical expressions of the contiguous lags, unique lags, and aperture size are derived. The numerical and simulation results show that the proposed SSCA array can achieve less mutual coupling leakage as compared to other array types | DOA; Coprime array; Mutual coupling; Difference co-array | Fatima A. Salman (Al-Nahrain University, Iraq); Bayan Mahdi Sabbar (University of Al-Mustaqbal, Iraq) | |
5 | 1570875973 | A Secure Cloud Framework for Big Data Analytics Using a Distributed Model | The paper aims to provide a framework for the secure processing and analysis of big data. It employs a double layer of security that is based on Elliptical Curve Cryptography (ECC) and Fully Homomorphic Encryption (FHE). FHE can be utilized as a capable public-key encryption that permits users to do computations on encrypted data. Additionally, a clustering method has been used to partition big data into smaller data sizes that are distributed among many virtual CPUs. In the defined distributed model, many VMs process different partitions of data parallelly and simultaneously to reduce the processing time of data. KMeans clustering algorithm is used in three datasets as an instance of data analytics to test the suggested framework. Furthermore, the produced results are compared with a centralized-based model to assess the productivity and efficiency of the distributed model. Besides, the \textit{principal component analysis} (PCA) is applied to the used clustering algorithm to diminish the required clustering time needed by the distributed model. The results indicate that the clustering time can be reduced up to 91\%, and even with 18\% more reduction in the execution time using the distributed model. The recommended solution can improve the effectiveness of big data analytics whereas guaranteeing the security of such data. | Cloud security; big data analytics; hybrid encryption; KMeans clustering; distributed computation | Zainab Salman (University of Bahrain & IT College, Bahrain); Alauddin Yousif Al-Omary (University of Bahrain, Bahrain); Mustafa Hammad (Mutah University, Jordan) | |
6 | 1570894322 | Routing Approaches used for Electrical Vehicles Navigation: A Survey | The growing demand for Electric Vehicles (EVs) depends on the high integration of this technology in many areas. Therefore, an important area of research raises interest in finding the optimal path-planning solution for electric vehicles. This paper discusses several reviews and analyzes some of the constraints of the techniques used to improve these systems. The paper discusses common models used in Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGV). This paper investigates the planning approaches that lead to finding the optimal route for the tour from the source to the destination. The review outlines the different models and systems of Unmanned Ariel Vehicles (UAV) and Unmanned Ground Vehicles (UGV). This paper can be considered as comprehensive survey research for EV routing techniques to assist researchers choose the appropriate approach for developing a system based on optimization techniques, machine learning, or Hybrid Approaches (HAs) techniques. Optimization techniques are mostly used to find the optimal path and achieve multi-objective goals. Some findings were approved as the best models inspired by natural biological as genetic algorithms, Particle Swarm Optimization, and Ant Colony Optimization. In addition to machine learning techniques as Reinforcement Learning. The hybrid approach techniques that combine optimization and machine learning techniques can increase robustness in solving routing problems. | Electronic Vehicles (EV); Unmanned Aerial Vehicles (UAV); Unmanned Ground Vehicles (UGV); Path Planning | Shaima Ebraheem Hejres (University Of Bahrain & Ministry Of Education, Bahrain); Amine Mahjoub (University of Bahrain, Bahrain); Nabil Hewahi (UOB, Bahrain) | |
7 | 1570899198 | Ontological Concepts and Logical Listeners for Dysarthric Speech Understanding | Depending on the social features of the speaker and the social setting in which they are speaking, the relationship between meaning and context might alter. In order to interpret the meaning from dysarthric speech, this paper proposes a theoretical framework for employing speech-event representations, also known as situational projections. The multi-layered approach has been broken down into four main components: a few-shot learner that builds up speaker familiarity; a situational projection component that marshals natural sentences and the built-up familiarity markers into a vector triple; a contextualizer that builds up ontological concepts of the input triple; and finally, a transducer that assumes the function of a logical listener. | Dysarthria; Speech meaning; Speech context; Familiarity; Situational Projection; Dialogue Acts | Benard Alaka and Bernard Shibwabo Kasamani (Strathmore University, Kenya) | |
8 | 1570900957 | Global Stock Price Forecasting during a Period of Market Stress using LightGBM | Accurately predicting future stock prices is crucial for investors, particularly during market stress, enabling informed decisions to mitigate losses and reduce financial exposure. While machine learning techniques have shown promise in this field, most studies have focused on local models. Global forecasting models, which are trained on a variety of time series, have demonstrated encouraging outcomes in outperforming local models. This article presents a global forecasting approach utilizing LightGBM to predict stock prices in the Moroccan market during highly volatile period. The study includes a sector-wise analysis, with the most volatile sector being evaluated, and correlated stocks from other sectors were considered to enhance the data. Compared to other deep learning models that use a local approach, our findings demonstrate the effectiveness of utilizing a global forecasting with optimized LightGBM for predicting stock prices. Additionally, incorporating data from multiple stocks improves accuracy of stock price prediction. | Stock market; Market stress; LightGBM; Global forecasting | Omaima Guennioui (Université Mohammed V de Rabat, Morocco); Dalila Chiadmi (Mohammadia School of Engineering & Mohammaed V Agdal University, Morocco); Mustapha Amghar (Ecole Mohammadia des Ingenieurs, Morocco) | |
9 | 1570901656 | Channel Modeling Techniques for Multiband Vehicle to Everything Communications: Challenges and Opportunities | Vehicle to everything (V2X), one of the most popular fifth generation (5G) application areas, demands a high data rate, extremely low latency, and high reliability. Investigations that enable exploiting the synergistic potential of the millimeter wave (mmWave) and sub-6 GHz frequencies play a prominent role in meeting these goals. The wireless channels through which communication signals propagate primarily determines overall system performance. Hence, a detailed study of the propagation channel behavior of these bands becomes an essential step to compare goals set by standards bodies with that of practically achievable performances. This evaluation yields a clue to select appropriate complementing technologies that can minimize the gaps. Currently, multidimensional research works are being carried out to overcome constraints at wireless channels and redeem the numerous potential of joint sub-6 GHz/mmWave bands. In this survey article, findings from existing works on V2X communication channel modeling approaches are summarized by focusing on challenges unaddressed and opportunities available. This paves ways to assess achieved targets and remaining ones with respect to the requirements of 5G multiband vehicular communications. Besides concisely organizing existing works, the role of the key technologies in achieving multiband-based V2X targets and procedures to schedule users when they dwell in a region where both bands co-exist are also highlighted. From an overall study, challenges existing till now and opportunities in hand to realize joint sub-6 GHz/mmWave frequency bands-based services for the near future luxurious vehicles are pointed out. Therefore, the autonomous driving potential of joint sub-6 GHz/mmWave can be realized when the channel dynamics are adequately modeled hence further studies considering the realistic propagation environment are required. | Channel Model; Propagation loss; Millimeter Wave; Multiband; Vehicular Communication | Degefe S Hisabo (AAiT, Ethiopia); Thomas Otieno Olwal (Tshwane University of Technology, South Africa); Murad Ridwan Hassen (Addis Ababa Institute of Technology, Addis Ababa University, Ethiopia) | |
10 | 1570905771 | A Fusion Architecture of BERT and RoBERTa for Enhanced Performance of Sentiment Analysis of Social Media Platforms | Natural language processing's subfield of sentiment analysis involves locating and categorizing the feelings, viewpoints, and attitudes expressed in text. Because it enables us to understand public opinion on a variety of topics, sentiment analysis has grown in importance as social media platforms become more widely used. In this research paper, we used two cutting-edge deep learning models, BERT and RoBERTa, and their fusion of both architectures to perform sentiment analysis on a dataset of tweets related to the COVID-19 pandemic. To eliminate noise and unrelated data, the dataset underwent pre-processing and cleaning. Then, using the dataset, we trained the BERT and RoBERTa models and assessed their performance. For sentiment analysis, both models achieved high F1-scores, recall, and accuracy for all three sentiment classes (negative, neutral, and positive). While there were some differences in how well these models performed across these metrics, both models did well and classified the sentiment of tweets in the dataset with high accuracy. Our study's findings show how well BERT and RoBERTa perform sentiment analysis on tweets about the COVID-19 pandemic. Our study also emphasizes how crucial it is to clean up and pre-process the dataset to get rid of extraneous data and noise that can harm the models' performance. The effectiveness of these models on datasets from other domains and topics can be investigated in further research. Future studies should also look into the models' interpretability and comprehend the features and patterns crucial to sentiment analysis. | Unsupervised learning; Sentiment Analysis; BERT; RoBERTa; Deep learning; performance parameters | Pranay BV Kumar (Kakatiya University, India); Manchala Sadanandam (Kakatiya University Warangal India, India) | |
11 | 1570906087 | Comparison of YOLO (v3, v5) and MobileNet-SSD (v1, v2) for Person Identification Using Ear-Biometrics | The ear is a visible organ with a unique structure for each person. As a result, it can be used as a biometric to circumvent the constraints of person identification. Deep learning methods like You Only Look Once (YOLO) and MobileNet have recently significantly aided real-time biometric recognition. As a result, in this paper, we approach identifying a person using YOLOV3, YOLOV5, MobileNet-SSDV1, and MobileNet-SSDV2 deep learning algorithms using their ear biometrics. The used ear biometric is a standard dataset (EarVN1.0 Dataset) from 164 individuals with a total of 27,592 images. We chose 10 people at random, totaling 2057 pictures. Of these, 85% were used for training, 5% for validation, and 10% for testing. The performance of the algorithms is determined based on their accuracy and how smoothly the ear of a person is detected. The training accuracy of the algorithms is thresholded at 99.87%. MobileNet-SSDv1, MobileNet-SSDv2, YOLOv3, and YOLOv5 have testing accuracy that is 88%, 91%, 95%, and 96%, respectively. We concluded that the YOLOv5 model outperforms the others in terms of accuracy and size (16MB) for person identification using ear biometrics. | Person Identification; Ear Biometric; Deep Learning; YOLO; MobileNet; SSD | Shahadat Hossain (International University of Business Agriculture and Technology, Bangladesh); Humaira Anzum (Ahsanullah University of Science and Technology, Bangladesh); Md. Shamim Akhter Phd. (Ahsanullah University of Science and Technology (AUST), Bangladesh) | |
12 | 1570907376 | Dynamic Traffic Management using Reinforcement Learning | Traffic congestion has become a major problem in this rapidly growing world. Everyone operating a vehicle, as well as the traffic police in charge of managing the traffic, finds it difficult to become stuck in heavy traffic. For this a set, predetermined timing for traffic flow for each direction at the junction is utilized by traditional traffic light controllers. However, the concept of a fixed time traffic signal controller does not work well in places with chaotic traffic patterns. A dynamic traffic control system is therefore required, which regulates the traffic signals in accordance with the volume of traffic. This paper proposes a model that uses reinforcement learning (RL) along with deep neural networks (DNN) to manage discretions (signal status) for the proffered environment with the help of Simulation of Urban MObility (SUMO). The main objective of this research study is to construct a model that can independently determine the best course of action and aims to provide better traffic management that will decrease the average waiting time, cause lower congestion, and provide a smooth flow of traffic. | Dynamic Traffic Management; Traffic Patterns; Reinforcement Learning; Simulation of Urban MObility; Deep Neural Networks; Deep Q-learning | Aryaan Shaikh (Vishwakarma Institute of Information Technology, Pune, India); Babasaheb Bhalekar and Pravin Futane (Vishwakarma Institute of Information Technology, India) | |
13 | 1570908321 | Forensics Analysis of Cloud-Computing Traffics | Forensics analysis of cloud-computing traffic involves investigating and analyzing network traffic in a cloud-computing environment to identify any suspicious or malicious activity. This can include identifying and analyzing network connections, identifying and analyzing data transfer patterns, and identifying and analyzing data payloads. It's also necessary to have a good understanding of cloud infrastructure and network protocols to effectively analyze cloud-computing IoT traffic. The increasing use of IoT device traffic in cloud computing environments has led to a need for effective forensic analysis methods in order to investigate and respond to security incidents. This thesis examines the challenges and considerations for forensic analysis in IoT-based cloud computing systems, including the unique characteristics of IoT devices and the distributed nature of cloud computing environments. We propose a framework for forensic analysis in IoT-based cloud computing systems that includes guidelines for data collection, preservation, and analysis. We also present case studies that demonstrate the effectiveness of the proposed framework in a real-world IoT-based cloud computing scenario. The results of this thesis contribute to a better understanding of the forensic challenges in IoTbased cloud computing systems and provide practical solutions to address them. | Cloud computing; IoT; Digital forensic; Data gathering; Data analysis | Moayad Almutairi, Shailendra Mishra and Mohammed Alshehri (Majmaah University, Saudi Arabia) | |
14 | 1570910069 | A Stable Method for Brain Tumor Prediction in Magnetic Resonance Images using Finetuned XceptionNet | Brain tumors can be a life-threatening condition, and early detection is crucial for effective treatment. Magnetic resonance imaging (MRI) is a valuable appliance for identifying the tumor's location, but manual detection is a time-engrossing and flaws-prone process. To overcome these challenges, computer-assisted approaches have been developed, and deep learning (DL) archetypes are now being pre-owned in medical imaging to discover brain tumors manoeuvre MRI carbon copies. In this, we propose a deep convolutional neural network (CNN) Xception net model for the efficient classification and detection of brain tumor images. The Xception net is a powerful CNN model that has shown promising results in various systems perceiving exercise, in conjunction with medical illustration scrutiny. We fine-tuned the Xception net model using a dataset of Magnetic Resonance Imaging (MRI) images of the brain, which were pre-processed and labeled by medical experts. To reckon the performance of our prototype, we counselled dossier using a variety of interpretation criterion, including accuracy, precision, recall, and F1 score. Our causatums view that the urged model achieved high accuracy in classifying brain tumor images. The archetype's strength to accurately and efficiently classify and detect brain tumors using MRI images can significantly improve patient outcomes by enabling early detection and treatment. Overall, our study demonstrates the persuasiveness of using the Xception net flawless for brain tumor ferreting out and alloting using MRI images. The proposed model has the potential to revolutionize the department of salutary exemplify and improve patient outcomes for brain tumor treatment. | Brain Tumor; Deep Convolution Neural Networks; Magnetic Resonance Imaging; XceptionNet | Shanmuga Sundari M, Divya Yeluri, Durga Kbks, Vidyullatha Sukhavasi, Dyva Sugnana Rao M and Sudha Rani M (BVRIT HYDERABAD College of Engineering for Women, India) | |
15 | 1570910099 | PrinciResnet Brain Tumor Classification Technique for Multimodal Input-level Fusion Network | Brain tumors are a leading cause of mortality in India, with over 28,000 cases reported annually, resulting in more than 24,000 deaths per year, according to the International Association of Cancer Registries. Early detection, segmentation, and accurate classification are crucial in effective tumor analysis, and various algorithms have been developed to achieve this. In this study, we propose a novel approach for the detection and classification of brain tumors using both single slices of MRI and CT, as well as input-level fused images of MRI & CT. Our approach involves the implementation of the PrinciResnet brain tumor classification technique, which is based on Principal Component Analysis (PCA) and Resnet techniques. We report that our approach significantly improves the accuracy, sensitivity, and specificity parameters to 90%, 96%, and 95%, respectively, based on a dataset of 600 fused slices and 1000 single slices obtained from reputable sources. Our findings hold promise for improving the diagnosis and treatment of brain tumors, which are a significant cause of mortality globally. | Resnet; PCA; Skip connection; Brain tumor; CT; MRI | Kannan G (B S Abdur Rahman Crescent Institute of Science & Technology, India); Padma Usha Manikumar, Sai Akshay S, Giri S and Shaik Mohammed Huzaifa (B S Abdur Rahman Crescent Institute of Science and Technology, India) | |
16 | 1570910238 | Design and Implementation of a Heterogeneous Distributed Database System for Students Absence Automation Using Portable Devices | Student absence declaration is one of the basic processes that occur on a daily basis in faculties, often relying on paper forms, which is inefficient when the faculty administration wants to gather absences from multiple departments (sites) and calculate the absence rates for the faculty. In response to these challenges, a heterogeneous distributed database system was designed for a faculty to declare and automate student absences using smartphones or laptops, as well as send absences in real time from inside lecture halls or laboratories in departments to the faculty administration to generate absence reports. The system employed a client-server model to deliver services through the local area network (LAN) and the internet to the various departments and the college administration. MSSQL database tables were designed and fragmented across faculty sites using horizontal fragmentation technology, then encrypted with the AES265 algorithm. The proposed system also involved the use of private SQLite or MSSQL databases for the lecture's Android or Windows devices, respectively. Faculty administration staff, on the other hand, used a secure website built with ASP.NET to access the MySQL database server, which contains the absence table that was populated from all sites. The system was protected against false absence declarations by utilizing the local server's timing factor, which allowed the lecturer to only declare absences on specific days and times. The experimental results showed high reliability and accuracy of the system and high satisfaction among the users about achieving the desired goals. The findings demonstrated a strong preference for the system among the lecturers over other systems that relied on student devices, biometric devices, and AI-based ones, while the faculty's administration staff preferred automatic absence collection by the distributed design of the system over manual collection. | Distributed Database; Heterogeneous Database; Smartphones; Portable Devices | Ahmed A Alsamman (College of Computer Science and Mathematics, University of Mosul) | |
17 | 1570911928 | An Efficient Spam and Phishing Email Filtering Approach using Deep Learning and Bio-inspired Particle Swarm Optimization | The exponential growth of spam and phishing emails significantly threatens users' privacy, security, and productivity. This research shows a deep learning model that demonstrated improved performance compared to similar state-of-the-art studies. Deep learning neural networks, with properly fine-tuned settings, can accurately sort emails into three categories: normal (ham), unwanted (spam), and deceptive (phishing). We use two popular techniques, Principal Component Analysis (PCA) and Particle Swarm Optimization (PSO), to select the essential features for email classification. Test results show that the PSO method outperforms the others, achieving an impressive 99.35% accuracy rate. The findings highlight the potential of deep learning algorithms for effective email filtering, helping to detect and reduce spam and phishing. Additionally, the study emphasizes the importance of feature selection in enhancing the performance of deep learning models for sorting emails as normal (ham), spam, or phishing. | Spam email; Phishing email; Artificial neural network; Particle swarm Optimization | Santosh Kumar Birthriya (National Institute of Technology Kurukshetra India, India); Priyanka Ahlawat (National Institute of Technology ( Institute of National Importance), India); Ankit Kumar Jain (National Institute of Technology, Kurukshetra, India) | |
18 | 1570912257 | Introduction of LSSVR for the Prediction of the Yellowness Index | Principal component regression (PCR), partial least square regression (PLSR), and least square support vector regression (LSSVR) have been widely applied as predictive models in various applications. However, studies employing regression models to estimate the yellowness index (YI) are scarce in the literature. This study, therefore, focuses on developing non-destructive YI measurements using regression models. The collected RGB calculated XYZ and obtained CIE LAB values were set as the input variables. Meanwhile, the YI value was denoted as the output variable. Results indicated that the LSSVR model outperforms PCR and PLSR models in predicting YI in which the root means square errors of LSSVR for training and testing datasets were found to be 261,406% to 294,218% and 725% to 772% lower than PLSR and PCR, respectively. LSSVR is also attributed to higher coefficients of determination (R2) for training and testing datasets compared to PLSR and PCR, whose R2 values are very close to 1. Nonetheless, the computational times of training and testing datasets for LSSVR are much longer than that of PLSR and PCR. Consequently, a highly accurate LSSVR model-based YI sensor shows promising applications particularly if the computational load can be further minimized. | Least square support vector regression; Yellow Color; Least square regression model; Partial least square regression; Principal component regression | Wan Sieng Yeo (Curtin University Malaysia, Malaysia); Agus Saptoro (Curtin University, Malaysia) | |
19 | 1570912268 | Big data (BD)-based approach to network security (NS) and intelligence | The purpose of this research is to analyze the importance of network security in today's society where the internet has become essential in everyday life. With the increasing global concerns about cybersecurity, it is crucial to use big data analysis technologies and machine learning techniques to examine and forecast the state of network security. The existing models for network security monitoring have challenges such as being resource-intensive, inaccurate analysis results, low processing efficiency, and unsuitability for real-time and large-scale scenarios. To overcome these challenges, the study proposes a new BP neural network-based model that incorporates the blocked fuzzy C-means clustering approach to enhance the input data's characteristics and improve the model's accuracy. The model's methodology is comprehensively explained, and testing is conducted to verify its accuracy and usefulness in perceiving network security scenarios. The proposed model has the potential to overcome the challenges faced by current network security monitoring models and provide a viable solution for network security analysis and prediction. | Mubarak Alquaifil, Shailendra Mishra and Mohammed Alshehri (Majmaah University, Saudi Arabia) | ||
20 | 1570912418 | On the Impact of Radio Hub Subnet Clustering for 100 cores Mesh Wireless NoC Architecture | The integration of numerous embedded cores onto a single die is made possible by the Network-on-chip (NoC), which serves as a crucial technology. The utilization of planar metal interconnects for implementing a NoC through existing methods is inadequate due to the considerable power consumption and high latency caused by the usage of multihop channels in data interchange. Therefore, to address scalability challenges that could impact on-chip communication systems in future manycore architectures have led to the proposal of the wireless Network-on-Chip or WiNoC design paradigm as a potential solution. The impact of radio hub subnet clustering on the 100 cores mesh Wireless NoC architecture is analyzed in this paper. This study investigates the overall delay in data transmission, network throughput, and energy consumption in the 100 cores mesh Wireless NoC architecture with 4 radio hubs by analyzing single, four, and nine-tile radio subnet clustering. The validation of the results involves simulating the 100-core mesh WiNoC architectures being tested using the cycle-accurate Noxim simulator, with both random and transpose traffic workloads. According to the simulation results, the architecture with a four-tile radio hub subnet clustering provides the most optimal performance for both random and transpose traffic distributions at PIR 0.013 flit/cycle/tile when compared to the other analyzed subnet clusterings. | Network-on-Chip; Wireless; Mesh Topology; Radio Hub; Subnet Clustering | Asrani Lit (Universiti Malaysia Sarawak (UNIMAS), Malaysia) | |
21 | 1570912771 | A Hybrid Approach Based on Boosting Algorithm for Effective Android Malware Detection | Mobile phones are being used much more often and play a crucial role in our everyday lives. These gadgets hold a tonne of personal information and provide a variety of functions and services. Mobile devices have become indispensable for those who utilise technology and communication since they are practical and effective. The complexity and sophistication of mobile apps is rising as a result of the diverse demands of consumers, and both hardware and software developers are working to increase battery life and performance of mobile devices. The market offers a variety of mobile operating systems, each with a unique platform and market share. However, mobile systems are vulnerable to virus assaults just like any other type of information system.The development of hardware technologies has increased the complexity and performance of mobile apps.Mobile devices come with a lot of advantages, but they also have a lot of drawbacks. The need to strike a balance between performance and battery life is one such difficulty. The complexity and power requirements of mobile apps are increasing as they grow more demanding, which reduces battery life. Additionally, the danger of security breaches and data theft rises with continued usage of mobile devices. Malicious actors may use mobile system flaws to obtain sensitive data, such as login passwords, financial information, and personal information.Mobile device makers and app developers are constantly changing their software to enhance security and performance in order to solve these issues. For instance, to safeguard user data, many mobile operating systems now have built-in security measures like firewalls, encryption, and two-factor authentication. To maximise battery life, designers are also creating mobile apps that utilise resources wisely and require less power.In conclusion, mobile devices are becoming an essential component of our life, providing efficiency and ease in technology and communication. As with any technology, they come with a number of drawbacks, such as security issues and battery life. Manufacturers and designers must prioritise security and performance as mobile technology develops in order to guarantee that consumers can continue to rely on mobile devices in their everyday lives. | Android; Cyber security; Malicious applications; Malware Detection; Mobile Malware; Mobile Application Security (Android,iOS) | Brijesh Y Sathwara (Gujarat Technological University - Graduate School of Engineering and Technology, India); Palvinder Singh Mann (Gujarat Technological University, India) | |
22 | 1570912877 | Techno-Economic and Environmental Benefit Analysis of PV and D-FACTS Enriched Modern Electric Distribution Grid with Practical Loads | In the current era, expansion in the power system has led to an increase in the Distributed Generation (DG) planning to accomplish the increase in demand. Hence because of the opted DG's inappropriate planning, the system gets unbalanced with an increase in losses, voltage profile imbalance along with reliability issues. Here, the modernized IEEE 69-bus network is considered for appropriate DG's planning. In this study, one important factor, which is the Line Fault Current Level (LFCLevel) along with Real & Reactive Losses (RLoss & QLoss), Voltage Deviation Profile (VDP), and Network Reliability (RN), is considered as an index in the objective function, which makes the proposed Multi-Objective Function (MOF) a novel MOF (nMOF). The cost-economic and Pollutant Gas Emissions (PGE) parameters are also examined in accordance with this nMOF optimized outcomes. In the proposed study, the DG's (PV and D-FACTS) are planned optimally with reconfiguration incorporating practical loads (industrial, commercial and residential) using an Adaptive Particle-Swarm Optimization approach (APSO). Then the techno-economic and environmental-benefit analysis of the results reveals that the losses (real and reactive), cost, and pollutant gas emissions are reduced with an improved balanced profile of voltage, LFCLevel, and RN. | Photovoltaic (PV); Distributed-Flexible AC Transmission System (D-FACTS); Tie-Switches (TS); novel Multi-Objective-Function (nMOF); Pollutant Gas Emissions (PGE); Adaptive Particle Swarm Optimization (APSO) | Bikash Kumar Saw (National Institute of Technology Durgapur, West Bengal, India); Aashish Kumar Bohre (NIT Durgapur, India) | |
23 | 1570912913 | Toward A Systematic Evaluation Approach Of Point-Of-Interest Recommendation Algorithms Of A Novel Smart Tourism Tool | Intelligent tourism can increase the interest of nomadic tourists in discovering new cities. However, many Points of Interest (POIs) are available, creating an information overload for tourists when choosing POIs to visit. For this reason, CARS (Context-Aware Recommendation Systems) can play an important role by exploiting the experiences of previous tourists and their contexts to recommend attractive POIs. Consequently, choosing the right POI recommendation algorithm (RA) for CARS is crucial because it involves the costly intervention of real tourists during the test phase. In order to make this phase more cost-effective, we can test several RAs simultaneously in order to assess their limitations in terms of cold start and tourist satisfaction. To compare these RAs, we propose in this article an approach called SEPRA (Systematic Evaluation for POI Recommendation Algorithms), which allows us to carry out an initial online evaluation of each tourist during their visit and a second offline evaluation of each CARS after the end of each POI path. To achieve this objective, we designed and implemented a new smart tourism tool that makes POI recommendations using two algorithms: the first is based on tourist/tourist similarity, and the second uses POI/POI similarity. These algorithms use memory-based collaborative filtering and are executed in parallel by our tool in the form of CARSs, incorporating time or weather as context variables. To evaluate these systems during their test phases, Our approach enables: (1) the calculation of prediction accuracy; (2) the examination of the relevance of the recommended POIs; and (3) the estimation of the acceptance rate of the recommendation process. Finally, the experimental results obtained with our approach show that the algorithm based on tourist similarity is more resistant to the cold start problem during the test phase and has a better satisfaction rate than the algorithm based on POI similarity. | Smart tourism; CARS; point of interest recommendation; collaborative filtering; online evaluation; offline evaluation | HadjHenni Mhamed (Djillali Liabes University of Sidi Bel Abbes, Algeria); Dennouni Nassim (Higher School of Management Tlemcen, Algeria); Slama Zohra (EEDIS Laboratory Djillali Liabes University Sidi Bel Abbes, Algeria) | |
24 | 1570913259 | Predicting Apple Yield Based On Occurrence of Phenological Stage in Conjunction With Soil And Weather Parameters | Accurate and reliable yield forecasting is required for efficient planning and management of an important crop like apple. Efforts have been made to predict apple yield, mostly through the use of statistical tools with limited indicator parameters. The proposed neural network (NN) based system predicts yield of apple crops in an orchard based on identification, characterization, time of arrival and duration of phenological stages interactively with soil and weather parameters. The task of automatic yield prediction in orchards is challenging. Despite the significant amount of work that has been put into developing automated methods for estimating yields, the majority of methods currently in use are based on fruit counting, which is only useful one to four weeks before harvest. Whereas, in the proposed system, we will be predicting yield, during each phenological phase, among six classes, taking into account time of phenological stage occurrence (i.e., early occurrence, normal occurrence, or delay occurrence), soil parameter, and parameter related to weather conditions. This model will help the growers to timely take decision to execute contingency plans in case of average or low yield. The f1-score of the proposed system is 0.94. It is compared with other popular machine learning (ML) algorithms like Logistic regression, Support vector machines (SVM) and K-nearest neighbors (KNN) | Artificial Neural Network; Deep Learning; Yield prediction | Rakesh Mohan Datt (Chitkara University, India); Vinay Kukreja (Chitkara University, Punjab, India) | |
25 | 1570913433 | Towards Robust and Low Latency Security Framework for IEEE 802.11 Wireless Networks | The vulnerability in wireless networks require additional security, integrity, and authentication. The outdated "Counter Mode Cipher Block Chaining Message Authentication Code Protocol" (CCMP) has lately taken the place of the flawed "Wired Equivalent Privacy" (WEP) protocol for authenticating IEEE 802.11 wireless local area networks (WLANs). IEEE 802.11s, a draught standard for wireless mesh networks, also recommended using CCMP (WMNs). Due to CCMP's two-pass operation, multi-hop wireless networks like WMN have a considerable latency problem. An increase in latency results in a decrease in service quality for real-time multimedia applications sensitive to delays. In addition to highlighting the CCMP's vulnerability to pre-computation time-memory trade-off (TMTO) attacks, this paper recommends improving WLAN packet security by implementing a per-packet security mechanism. Furthermore, suggested is a fresh, dependable, low-latency foundation for WMN. The security framework's architecture employs a piggyback challenge-response mechanism to ensure data secrecy and data integrity ۔The use of a secret nonce, a new encryption key for each packet, and packet-level authentication are all features of the Piggyback challenge-response protocol. By authenticating every packet, unauthorized access can be swiftly prevented. | Information Security; Social Network; Decentralization; Individual Servers; Decentralized Framework | Inam Ul Haq (2 KM Renala Bypass, Renala Khurd, Okara & University of Okara, Pakistan); Amna Nadeem (Lahore Garrison University, Pakistan); Yasir Ahmad (University of Okara, Pakistan); Saba Ramzan (Sharif College of Engineering Lahore, Pakistan); Nazir Ahmad (University of Okara, Pakistan) | |
26 | 1570914630 | A Novel Approach for Denoising ECG Signals Corrupted with White Gaussian Noise Using Wavelet Packet Transform and Soft-Thresholding | Purpose The electrocardiogram (ECG) is a popular technique for timely identification and assessment of heart problems. During recording, Various types of noise commonly contaminate ECG signals. which might lead to inaccurate diagnosis. When ambulatory patient monitoring and wireless recording are used, AWGN is one of the prominent noise that severely contaminates the ECG signal. Thus, precise ECG signals are essential for accurate heart disease diagnosis. Methods A wavelet denoising approach employing the Wavelet Packet Transform (WPT) is used to preprocess the obtained noisy data. WPT offers greater versatility due to more complete analysis of the signal. The Symlets 8 mother wavelet function is used to decompose ECG data into two levels. Using a two-level WPT decomposition, the noisy ECG signal is first divided into separate components including high- and- low frequency detail and approximation coefficients. The threshold value is then determined, and at every level, high frequency noise is effectively eliminated by applying thresholding technique to the detail coefficients, followed by the elimination of noise in the lower frequency range by thresholding the approximation coefficient. The inverse wavelet packet transform is used to rebuild the ECG signal from the retained coefficients Results Several tests were carried out to illustrate the effectiveness of the suggested strategy, and the results were compared with those of previously used signal denoising methods. When evaluated on the database of MIT-BIH, the suggested approach outperforms the existing state-of-the-art methodologies. Percentage root mean square difference (PRD), SNRimp, Signal to noise ratio (SNR) and Mean Squared Error (MSE) are used to assess the efficacy of denoising approach. Surrogated ECG signals with synthetic and gaussian white noise are employed. Conclusions Using the appropriate decomposition levels and mother wavelet, this proposed method developed a unique Wavelet Packet Transform approach for ECG signal denoising, in contrast to the already established techniques | Discrete Wavelet Transform (DWT); Wavelet Transform (WT); ECG; Noise reduction; denoising; Additive white Gaussian noise (AWGN) | Haroon Yousuf Mir (National Institute of Technology Srinagar Kashmir India, India); Omkar Singh (NIT Srinagar, India) | |
27 | 1570915212 | Detection of Roman Urdu fraud or spam SMS in Pakistan using machine learning | Over the past few years, mobile devices and their services have become widely used around the world. Almost everyone uses the Text Messaging Service (SMS) for communication purposes because it is easy to use and inexpensive. When a person tries to deceive another for the sake of profit (material or money), it is known as Fraud. Through SMS fraud, fraudsters often adopt various strategies to make their messages look credible and legitimate. Various popular organizations use SMS services to advertise their products and send messages to individuals about their services. As a result, one receives many junk messages. Spam message is a message sent to any user who does not want to have it on their phone. Spam or fraudulent messages can be threatening and can sometimes cause financial and confidential data loss. In Pakistan, messages are sent in English and Urdu (Pakistani national language) but most messages are sent using Roman Urdu (Urdu written using Latin / English characters). This research compares the strategies and algorithms used in the literature to detect spam / fraudulent messages written in English or in any local language such as Roman Urdu. The study also suggests a new way to detect fraudulent messages written directly in Roman Urdu. In the fraud detection process, three different monitoring machine learning classifiers are used in this study namely Support Vector Machine (SVM), Naïve Bayes (NB) and Decision Tree (J48). After using the model, we found that SVM performed better than the other two classifiers with 99.42% accuracy. | spam SMS; fraud; Roman Urdu; machine learning; Detection | Muhammad Ayaz, Sarwat Nizamani, Aftab Ahmed Chandio and Kirshan Luhana (University of Sindh, Pakistan) | |
28 | 1570915727 | Evolutional Based Optimization Analysis for Three-element Control System | Simultaneous controller tunings for multiple loops are challenging because the best parameter settings for all loops have to be obtained in the concurrent analysis, whereby all parameters are affecting to each other's and the output variables. This paper purposely presents the accomplishment of Proportional-Integral-Derivative (PID) controller tunings by applying multi-objective optimization algorithm to a multiple loop known as three-element loop for both its servo and regulatory control objectives. Secondly, the research highlights the determination of lower limit (LL) and upper limit (UL) bounds by using necessity criterion of Routh-Hurwitz stability analysis. This research starts with empirical model identification and controller settings via classical techniques and multi-objective optimization approach. The Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) were selected to search the most compatible optimized controller tunings in the simulation of steam boiler drum function and the optimization analysis were conducted by a developed Graphical User Interface (GUI). On the whole, various simulation analysis was relatively compared by respective performance indexes and curve responses. Overall results showed that the optimization analysis proposed the controller settings corresponds better performances, and in particular, GA has performed better than PSO even through both methods are capable to suggest the highly satisfactory performances. | Multiple loop; Upper and lower bounds; Multi-objective optimization; Graphical user interface; Curve and indexes performances | Ing Ming Chew (Curtin University Malaysia, Malaysia); Filbert H. Juwono (Xi'an Jiaotong - Liverpool University, China); Wei Kitt Wong (Curtin University, Malaysia) | |
29 | 1570916355 | Open research issues and tools for visualization and big data analytics | The new age of digital growth has marked all fields. This technological evolution has impacted data flows which have witnessed a rapid expansion over the last decade which makes the data traditional processing unable to catch up with the rapid flow of massive data. In this context, the implementation of a big data analytics system becomes crucial to make big data more relevant and valuable. Therefore, with these new opportunities appear new issues of processing very high data volumes requiring companies to look for big data-specialized solutions. These solutions are based on techniques to process these masses of information to facilitate decision-making. Among these solutions, we find data visualization which makes big data more intelligible allowing accurate illustrations that have become accessible to all. This paper examines the big data visualization project based on its characteristics, benefits, issues, and challenges. The project, also, resulted in the provision of tools surging for beginners as well as well as experienced users. | Big Data; DataViz; Cloud; Big Data Analytics; Business Intelligence | Rania Mkhinini Gahar (OASIS Research Laboratory, Tunisia); Olfa Arfaoui (RISC Laboratory, Tunisia); Minyar Sassi Hidri (Imam Abdulrahman Bin Faisal University, Saudi Arabia) | |
30 | 1570917966 | Exploring Sentence Embedding Representation for Arabic Question/Answering | Question Answering Systems (QAS) are made to automatically respond with precise information to user questions that are phrased in natural language. Due to its intricate and rich morphology, Arabic QAS poses a significant problem. Information retrieval, text summarization, and question-answering systems all fall under the category of natural language processing activities where text representation is a critical step. Comparing SE representation to more traditional approaches like bag-of-words and word embedding, it has demonstrated encouraging results. In this study, we introduce a novel QA approach for the Arabic language that is based on passage retrieval and SE representation. It consists of three steps: "Question classification and query formulation", "Documents and passages retrieval", and then "Answers extraction". In this work, we adopt the AraBert pre-trained model to compute vector representation. It allows us to consider implicit semantics and the words' context within the text. Furthermore, in order to collect potential passages for user questions, we investigate a method for retrieving Arabic passages using the BM25 model, a query expansion process, and SE representation. The final answer is extracted by fine-tuning AraBERT parameters by ranking passages and extracting the most relevant ones. We carry out a number of tests with the CLEF and TREC datasets by following two different taxonomies. The outcomes demonstrate the efficacy of our methodology. | Question Answering; Arabic; NLP; Word Embedding; Sentence Embedding; AraBERT | Imane Lahbari and Said Ouatik EL Alaoui (Ibn Tofail University, Morocco) | |
31 | 1570918691 | School Threat Assessment System (STAS) - Recognizing Psychosocial Attributes Indicative of Violent Behavior in Students using Deep Learning | According to the Center for Homeland Defense and Security, in the first half of 2022, 2 active school shooters and 151 non-active shooter events resulted in 150 victims; the previous year's statistic the highest it has been since 1970. Most students displayed signs of mental illness and troubled behavior that was often overlooked. This research seeks to identify signs of a threat in order to distinguish and assist students who are at risk for violent behavior. 30 randomly selected shooters were analyzed through the processing of news reports to identify recurring psychosocial attributes using a WordCloud generator. A feed forward neural network then uses these traits to recognize and categorize potential growing threats in a student body. Data is collected through deep learning graphological parameters in students' handwriting using a 2D convolutional neural network. This model, with an overall accuracy of 97%, classifies cases based on the combination of 28 features that appeared in the initially studied cases. It generates an accessible report that quickly identifies students in need of immediate support, reducing the number of active-shooter incidents. The School Threat Assessment System (STAS) is available online to school systems working to increase the safety of their students from within. | Convolutional Neural Network (CNN); Feed-Forward Network (FFN); Mental Illness; School Safety | Sara Elanchezhian (Thomas Jefferson High School for Science and Technology, USA); Prommy Sultana Hossain (George Mason University, USA); Jia Uddin (Woosong University, Korea (South) & Ai and BigData, Korea (South)) | |
32 | 1570922929 | Analytical comparison on detection of Sarcasm using machine learning and deep learning techniques | Sentiment Analysis is used in Natural Language processing to detect the opinion of the text/sentence put in by the user. A lot of challenges are faced while detecting the sentiment and one of them is the presence of sarcasm. Sarcasm is very difficult to detect and there could be ambiguity about the presence or absence of sarcasm. Various rule based methods have been used in the past by researchers to detect sarcasm. However, the results have not been promising. The models developed using machine learning classifiers have gained popularity over the statistical and rule based methods. Recently, deep learning techniques have been popularly used to detect the presence of sarcasm. In this paper, we have used eight machine language classifiers such as Naïve Bayes, Support Vector Machine, etc. to detect sarcasm. Deep learning techniques are also been used along with the machine learning techniques. An ensemble model has also been trained and tested on both the datasets. Bidirectional Encoder Representations from Transformers technique has given the best performance among the deep learning and machine learning techniques with an accuracy score of 92.73% and f-score of 93% on the news headlines dataset and an accuracy score of 75% and f-score of 74% on the reddit dataset. | Sarcasm Detection; Machine Learning; Ensemble model; Deep Learning; Social media | Ameya Parkar and Rajni Bhalla (Lovely Professional University, India) | |
33 | 1570923150 | Implementing Image Processing and Deep Learning Techniques to Analyze Skin Cancer Images | Skin cancer is one of the few malignancies that seem to be completely incurable. If not diagnosed and maneuvered at the inauguration, it spreads to several components of the human body. It emerges while the cell of the skin is in contact with sunshine, and develops primarily due to the rattling progression of skin cells. To facilitate things simpler and more rapid rescue lives, a responsible automatic system for Identifying skin lesions is essential for earlier detection. The strategy for successful skin cancer detection employs image processing and Deep Learning technique. In this article, we have experimented with an amalgamation of various Image Processing Techniques including hair removal, median filter, Gaussian blur, and techniques of Deep Learning for the image of skin cancer study. The investigation of histopathology images desires a professional physician to categorize the images precisely. The Convolution Neural Network is the preliminary classifier utilized here. It is a cutting-edge learner operated in image classification since it can categorize images without depending on not automatic feature extraction from an individual image. The main objective of this investigation is to enhance the heftiness of the classifier by approximating a distinguishable combination of different Image Processing and Deep Learning Techniques. | Image Processing Technique; Convolutional Neural Networks(CNN; Hair Removal Technique | Snowber Mushtaq (National Institute of Technology, India); Omkar Singh (National Institute of Technology Srinagar, India) | |
34 | 1570923393 | Deep Neural Network-based Current and Voltage Prediction Models for Digital Measuring Unit of Capacitive Resistivity Underground Imaging Transmitter Subsystem | Real-time monitoring of output electrical parameters of the transmitted signals in a capacitive resistivity underground imaging system is necessary because these are significant in the calculation of underground resistivity, however, machine learning has not yet been applied in this application to improve the accuracy of measurement. This study aims to develop and select the best prediction models that can be implemented for a digital measuring unit suitable for capacitive resistivity underground imaging. Three deep neural network models namely Elman recurrent neural network (ERNN), long short-term memory (LSTM), and gated recurrent unit (GRU) were explored to build prediction models for the current and voltage of the transmitter circuit. The prediction models' performance was assessed using mean squared error (MSE), which is reduced to its absolute lowest value. The result shows that the best-trained models for current and voltage prediction are the ERNN models with configurations of 900-600-500 hidden neurons network with training MSE of 9.82 × 10^-9 and the configured 1300-1000-900 hidden neurons with training MSE of 0.465, respectively. With the help of the prediction models, it would be possible to measure current and voltage output accurately, allowing simultaneous data acquisition while avoiding the need for a separate measuring device. | transmitter antenna; digital measuring circuit; recurrent neural network; long short-term memory; gated recurrent unit; underground imaging | Jonah Jahara G Baun, Adrian Genevie G. Janairo, Ronnie Concepcion II, Kate G Francisco, Mike Louie Cruz Enriquez, R-jay S Relano, Edwin Sybingco, Argel Bandala and Ryan Rhay P. Vicerra (De La Salle University, Philippines) | |
35 | 1570923741 | Using Cloud Services to Improve Weather Forecasting Based on Weather Big Data Scraped From Web Sources | Big Data (BD) scraping systems are among the recommended approaches for large-scale web data extraction. However, these systems for collecting large amounts of data face many challenges, including processing, storage, and data extraction reliability. Due to its potentials, cloud computing is becoming a viable solution to support BD scraping systems. This paper tenders a cloud based-web scraping framework for weather BD extraction and analysis. The aim is to extract weather BD from web sources, analyze this data and use it for visualization and forecasting purposes, and this by enabling elastic and on-demand resources. The framework is implemented using Selenium and Amazon Web Services and tested with Morocco weather data. The suggested cloud-based scrapper's performance and scalability analysis reveals that it provides more efficiency in terms of data collecting and analysis, as well as forecast quality, due to its capacity to leverage cloud resources. | Cloud computing; Weather Big Data; Weather forecasting; Web scraping | Abderrahim El Mhouti, Mohamed Fahim, Asmae Bahbah, Yassine El Borji, Adil Soufi and Mohamed Erradi (Abdelmalek Essaadi University, Morocco) | |
36 | 1570927026 | Studying Vibratory Patterns of Vocal Folds and their Impairments in Parkinson's Disease: A Theoretical Approach | Current vocal fold models emphasize either time or space during voice production but leave the source unconsidered. In the present review paper, we studied the vocal fold oscillations by dividing them into zone 1 and zone 2. Zone 1 includes the brain, neurons, and vagus nerve, and zone 2 comprises mechanical apparatus including lungs, voice box, and articulators. Then, a zonal view of changes in the voice, and vocal impairments due to Parkinson's disorder is demonstrated. The paper further examines various mathematical models analyzing vocal fold oscillations and their respective limitations. Since voice production is a cause-and-effect relationship, thus we used double point Green's Function method to solve the problem of vocal fold oscillation. This adds the causality factor and delay term to the problem and also illustrates the potential problems that could arise during the creation, conversion, or transition of impulses during speech production. Hence, our approach addresses the problem at the time when sound waves are in the form of electromagnetic impulses in the brain. Due to a lack of test subjects, however, we are unable to evaluate the experimental outcomes of this approach. Finally, the paper also mentions some unexplored limitations, which can be elucidated in the future. | Green's Function; Vocal Fold Vibrations; Acoustic models; Parkinson's Disease | Richa Indu and Sushil Chandra Chandra Dimri (Graphic Era Deemed to be University, India) | |
37 | 1570927848 | Optimized Deep Neural Networks Using Sparrow Search Algorithms for Hate Speech Detection | Deep learning has widespread use in various domains, including computer vision, audio processing, and natural language processing. The hyperparameters of deep learning algorithms have a significant impact on the performance of these algorithms. However, it can be challenging to calculate the hyperparameters of complicated machine learning models like deep neural networks due to the nature of the models. This research suggested a strategy for hyperparameter optimization utilizing the Long Short-Term Memory with Sparrow Search Algorithm (LSTM-SSA) model. The model that has been presented uses a deep neural network, which can recognize and classify instances of hate speech as either hate speech or neither. Experiments are conducted to validate the suggested technique in both straightforward and intricate network environments. The LSTM-SSA model is validated using a dataset consisting of hate speech, and an experimental investigation into the model's sensitivity, accuracy, and specificity is carried out. The outcomes of the experiments demonstrated that the suggested model might be improved upon, as it had an accuracy of 0.936. | Hate Speech; LSTM; NLP; social media; sparrow search algorithm | Ashwini Kumar (Graphic Era Deemed to Be University, Dehradun, India); Santosh Kumar (Graphic Era University, Dehradun, India) | |
38 | 1570928970 | Forecasting Students' Success to Graduate Using Predictive Analytics | Predictive analytics is the process of forecasting outcomes based on historical data. Execution of predictive analytics involves data collection, analysis and massaging, identifying machine learning, predictive modeling, predictions, and monitoring. Among phases, data analysis and massaging or data preprocessing plays a vital role in the prediction's result. This study aims to predict the student's probability of graduating on time using the student's demographic profile, previous academic achievement, and college admission result. The dataset was acquired from Caraga State University with 2207 samples of new entrants. This study implemented KNN to impute numerical data, while mode imputation was used for categorical values. Moreover, binary encoding was employed for nominal data to prevent algorithm ranked the values in order. Seven (7) algorithms were tested to the original dataset and compared to datasets integrated with LASSO (L1), Ridge (L2) regression, and Genetic Algorithm (GA) separately. The result shows that L1 with Decision Tree classifier has the lowest accuracy (58%) and AUC score (50%). It also has the smallest number of features selected (5). GA, on the other hand, selected thirty-three (33) features with AUC score of 71% and predicted 79% accurately using the Logistic Regression classifier. It exhibited 21% increase in AUC score compared to no feature selected dataset (NFS) with the same classifier. | feature selection; genetic algorithm; predictive analytics | Jayrhom R. Almonteros, Junrie B. Matias and Joanna Victoria S. Pitao (Caraga State University, Philippines) | |
39 | 1570930557 | Food Delivery Service Applications in Highly Urbanized Cities: A Scoping Review | In recent years, food delivery services utilizing apps and websites have gained immense popularity worldwide due to the convenience it provide in highly urbanized cities across various countries. This service involves delivering food from restaurants, fast-food chains, local food joints and groceries stores using mobile applications or websites to place orders. However, there are still issues with food delivery services, such as late deliveries, poor quality food, and problems with payment and delivery drivers. The objective of this study was to conduct a comprehensive and exploratory review of the literature related to food delivery service applications (FDSA) and eventually identify possible research topics to meet the research gap for future studies. It gathers and analyzes relevant information and insights from the collected literature and provides an overview of the existing reviews on content-context-process of food delivery service applications. There were 174 relevant empirical studies on food delivery service applications identified through Google Scholar as the primary search engine in compliance with the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) 2020 and the Content, Context, and Process (CCP) Framework. Through Google Scholar, 174 empirical studies were identified, with 30 eligible journals undergoing rigorous analysis. The results identified 5 content-related, 2 context-related, and 4 process-related aspects relevant to food delivery service applications. The scoping reviews of these literatures recommends for future studies on features-functionalities-designs of the FDSA, efficiency-effectivity-productivity of FDSA services and exploration of FDSA models to optimize its processes. | Food Delivery System Applications; PRISMA; Content Analysis | Clark James Semblante (Mindanao State University-Iligan Institute of Technology, Philippines); Paul B Bokingkito, Jr. (Mindanao State University - Iligan Institute of Technology, Philippines); Rogena Catanduanes (Mindanao State University-Iligan Institute of Technology, Philippines); Adrian B. Martin (Zamboanga Peninsula Polytechnic State University, Philippines); King Jehu II Radaza (Central Mindanao University, Maramag, Bukidnon, Philippines); Lemuel Clark Velasco (Mindanao State University-Iligan Institute of Technology & Premiere Research Institute of Science and Mathematics, Philippines) | |
40 | 1570931120 | An Intelligent Grading System for Automated Identification and Classification of Banana Fruit Diseases Using Deep Neural Network | This study proposes an intelligent system for automated illness diagnosis and categorization in banana fruit, as well as an integrated grading system. To accomplish accurate illness identification and grading, the suggested system incorporates computer vision methods, machine learning algorithms, and deep learning models. The system extracts key information from banana fruit images using image processing techniques, which are subsequently input into a trained classification model. The categorization model uses cutting-edge algorithms to categorise the banana fruit into several illness groups. Furthermore, the sophisticated grading system evaluates the severity and quality of the diseased fruit based on a variety of characteristics such as size, colour, and texture. The experimental findings reveal that the proposed method is successful, with high accuracy in illness diagnosis and accurate banana grading. This automated technology provides a time-efficient and cost-effective approach for disease control in banana plantations, allowing producers and agricultural stakeholders to make more informed decisions. | Diseases; Image processing; Deep Neural networks; Banana fruit; feature extraction and Classification | Himanshu Bhaidas Patel (KBNMU Jalgaon & D N PATEL COE SHAHADA, India); Nitin Jagannath Patil (D. N. Patel College of Engineering, India) | |
41 | 1570931849 | A Cooperative Relaxation-Based Method for Range Image Segmentation | In this work, we propose a combination of two methods for the segmentation of range images (Depth Image), based on the relaxation of the detection results of both edges and regions. The latter are obtained from two different representations of the data. The principle of the introduced method consists in matching the two detection results as a mutual self-regularization, and whose objective is to produce an optimal final segmentation with respect to a given criterion of optimality, expressed by a well appropriate objective function. The experimental results, using the ABW database, show the potential of the proposed method for efficient segmentation of range images. | Range Image; Edge detection; Region-based segmentation; Relaxation | Imene Belloum and Mourad Bouzenada (University Abdelhamid Mehri, Constantine2, Algeria); Smaine Mazouzi (Université 20 Août 1955 - Skikda, Algeria) | |
42 | 1570932547 | Real Time Oral Cavity Detection Leading to Oral Cancer using CNN | Oral cancer poses a substantial global health threat, as it continues to witness escalating incidence rates and consequential mortality on a widespread scale. To enhance patient outcomes, the crucial role of early detection cannot be overlooked. This research introduces an innovative real-time approach to detect various oral cavity conditions, focusing specifically on the prediction of oral cancer using a deep learning framework. Our methodology integrates patient questionnaires and oral cavity images, amalgamating them to improve the accuracy and reliability of our predictive model. The comprehensive questionnaires gather extensive data on dietary habits, lifestyle factors, and potential risk factors associated with oral cancer. Leveraging deep learning models such as ResNet101, ResNet50, ResNet152, and VGG19, we classify oral cavity images as either cancerous or non-cancerous. By considering the relative weightage of the questionnaire responses and image analysis predictions, we compute a final probability of oral cancer. A diverse dataset is utilized to evaluate the performance of our proposed model, assessing its accuracy, sensitivity, specificity, and overall predictive capability. The resulting system aims to provide healthcare professionals with a real-time prediction tool featuring a user-friendly interface, thereby facilitating early detection and intervention. The outcomes of this study significantly contribute to the advancement of oral cancer detection methods, offering the potential to enhance patient outcomes through timely intervention. | Convolutional Neural Networks; Deep Learning; Oral Cancer; Oral Potentially Malignant Disorder | Shruthi K (Siddaganga Institute of Technology & SIT, India); poornima a. s. Kulkarni, Musaddiq Shariff, Pradeep Singh S M, Subramanyam Subramanyam D P and Varun M H Varun (Siddaganga Institute of Technology, India) | |
43 | 1570934223 | Matrix Factorization and Cosine Similarity based Recommendation system for cold start Problem in e-commerce Industries | A recommendation system, also referred to as a recommender system, is a type of artificial intelligence (AI) algorithm that uses big data to suggest or recommend more products to new and existing customers. It uses data to forecast, focus, and locate what users are looking for among a constantly expanding array of possibilities. Many factors, including prior purchases, search history, demographic information, and other factors, may be used to identify them. It enables the customers to find goods and services for individuals that they unable to discover in order to assist them. At the initial level with a new customer, due to lack of knowledge, the Recommender System (RS) has a cold-start issue while making suggestions. There is no history of the choices or interactions of new users when they sign up to the system. It is impossible for the algorithm to provide tailored suggestions without this data. Additionally, when a new item is added to the system, it does not already have any interactions or preferences with other objects. This makes it difficult for the algorithm to suggest the item based on user preferences. The cold-start problem may limit the utility of RS since it makes it challenging for the system to provide trustworthy recommendations because it lacks information about people and products. Customers may not use the system again as a result of this, which could lead to a negative user experience. Recommender systems may employ a variety of strategies to circumvent the cold start problem, including content-based filtering, collaborative filtering, hybrid systems, knowledge-based systems, and demographic data. This paper proposed a Cosine Similarity (CS) and Matrix Factorization (MF) method to tackle the scarity problem which further resolves cold-start problems. | Recommendation System; Collaborative Filtering; Cold-Start; Matrix-Factorization; Cosine Similarity; Sparsity | Jameel Ahamed (Maulana Azad National Urdu University, India); Mumtaz Ahmed (Jamia Millia Islamia, India); Md Nadeem Noori (Maulana Azad National Urdu University, India) | |
44 | 1570939259 | Computer-Assisted Disease Diagnosis Application for Malaria Early Diagnosis Based on Modified CNN Algorithm | Since its emergence in the early 20th century, Malaria has been confirmed as a deadly disease that has spread throughout the world with very high mortality and morbidity. This is in accordance with the WHO report in 2018 which stated that worldwide there have been more than 220 million cases of malaria with a death rate of nearly 500 thousand cases. However, Malaria is actually a disease that can be cured and prevented if treatment initiatives are implemented early and effectively. Unfortunately, this disease is often ignored because it is considered the common cold and is only diagnosed when it has reached a critical phase. This research is expected to be an alternative for early diagnosis of malaria. Hence, confirming the presence of the malaria parasite earlier will make the treatment of this disease more effective in reducing mortality. This research is expected to produce website-based computer-assisted disease diagnosis (CAD) software enriched with deep learning algorithms to become an alternative for early diagnosis of malaria. This CAD system has the potential to provide fast and reliable malaria diagnosis and avoid detection errors by experts due to human error. In addition, this study applies a modified Pre-trained Convolutional Neural Network (CNN) architecture to improve the performance of the developed deep learning model. Based on the results obtained, this study succeeded in exceeding the benchmarks of previous studies with an accuracy value above 97%. This CAD software is also equipped with various features to make it easier to use. | Computer-assisted disease diagnosis (CAD); Convolutional Neural Network (CNN); Malaria; Pre-trained CNN; Thin Blood Images; Website | Zul Indra (Universitas Riau, Indonesia); Yessi Jusman (Universitas Muhammadiyah Yogyakarta, Indonesia); Elfizar Elfizar (University of Riau, Indonesia); Roni Salambue (Universitas Riau, Indonesia); Rahmad Kurniawan (Universitas Riau, Indonesia & Universiti Kebangsaan Malaysia, Malaysia); Tisha Melia (Universitas Riau, Indonesia) | |
45 | 1570939711 | IoMT-based Heart Rate Variability Analysis with Passive FBG Sensors for Improved Health Monitoring | The use of smart healthcare systems to monitor cardiac parameters has gained widespread popularity globally due to advancements in technology. The Internet of Medical Things (IoMT) has become an integral part of modern healthcare by facilitating the efficient monitoring of vital signs through advanced sensors. Heart rate variability (HRV) parameters, which provide valuable insights into a patient's condition, are now a crucial aspect of healthcare applications. Among the innovative solutions available, fiber Bragg grating (FBG) based optical sensors have emerged as a promising technology for continuous monitoring of various cardiac parameters. Recent technological breakthroughs have made these sensors highly accurate, enabling early detection and prediction of cardiac diseases, significantly impacting lives. This article focuses on the design, construction, and structural analysis of a passive optical FBG sensor capable of acquiring real-time HRV parameters such as heart rate, standard deviation of normal-to-normal intervals, root mean square of successive differences, and percentage of successive NN intervals differing by more than 50 ms. Additionally, advanced signal processing algorithms and an IoT-based architectural design are presented. An experimental study conducted in a laboratory involved five subjects, three males and two females, and demonstrated satisfactory performance with an error rate of less than 10% compared to a standard HR monitor. This intelligent system can detect arrhythmia, coronary heart disease, aortic diseases, and strokes, thereby making a significant contribution to healthcare. The combination of FBG sensors, IoT architecture, and advanced technology holds immense potential for enhancing cardiac monitoring and improving patient outcomes. | Fiber Bragg grating sensor; IoMT; SDNN; RMSSD; PNN50; PDMS | Maitri Mohanty (GIET University, Gunupur, India); Premansu Sekhara Rath (GIET University, India); Ambarish Gajendra Mohapatra (Silicon Institute of Technology, India) | |
46 | 1570942729 | Detection Tampering in Digital Video in Frequency Domain using DCT with Halftone | This In recent years, the rapid technological development and the emergence of mobile devices, cameras, etc., in addition to the availability of video production, editing, and formatting programs, made it easy to edit, manipulate, and fake or tamper video. As they know that pictures or videos give more information than texts; Video is a very important medium for transferring information from one place to another. One of the important types of evidence in road accidents and theft crimes. Moreover, when forensic analysis is required for any video, the source video is not available and the forensic experts must make decisions based on the existing video (under surveillance) and determine if this video is fake (tampered) or not fake. There are multiple methods to tamper video, including active and blind passive methods. In this research, we tried to combine the behavior of active methods in the process of embedding the halftone current frame of video in the DCT Coefficients of next frame of the same video with the behavior of passive methods by comparing the information embedded after extracting with the information of the current frame to determine whether there is a fake in the video or not & which frame contains tamper. The experimental results of the proposed method showed a high level of success in locating frames in which falsification or tampering occurred through copying, deletion or insertion, or even if copy-move regions. Also, in proposed method we attempted to post-processing the fake frames using the information included in the subsequent frame, if it is not faked. Finally, the original video, the embedded halftone video, and the tamper (fake) video after post processing were compared using PSNR and SSIM similarity scales. At last, the accuracy & precision scores of tampered & non tampered frames are computed. | Video tampering; DCT transform; Halftone algorithm; PSNR- SSIM Similarity measures; Gaussian filter | Wafaa Hasan Alwan (University of Kerbala, Iraq); Sabah M Alturfi (University of Karbala, Iraq) | |
47 | 1570945424 | applying hybrid clustering with evaluation by AUC classification metrics | Traditional metrics may not adequately assess performance in certain situations, whereas Area Under the Curve (AUC) offers a comprehensive perspective by considering sensitivity and specificity. This method enhances interpretability, addresses limitations, and promotes the development of robust clustering algorithms. Incorporating AUC into unsupervised learning is crucial for refining data analysis strategies. This paper highlights the advantages of using AUC classification metrics as an evaluation tool for clustering algorithms inspired by a recent novel contribution utilizing the AUCC technique. Hybrid clustering models merge the strengths of various clustering approaches to deliver more robust, accurate, and adaptable solutions. Since linkages significantly influence cluster structure and cohesion, selecting the appropriate linkage is essential for accurately discerning patterns in complex datasets. Consequently, we employed single and average linkage methods using Euclidean and Manhattan distance measures. The experiment was conducted on the NSL-KDD dataset for intrusion detection purposes. The results indicated variance in False Alarm Rate (FAR) and Detection Rate (DR) across different NSL-KDD training and testing subsets. | Ali F. Dakhil (University of Thi Qar, Iraq); Waffaa M. Ali (University of Shatrah, Iraq); Mustafa Asaad Hasan (University of Thi-Qar, Iraq) | ||
48 | 1570945880 | The Use of Motion Capture Technology in 3D Animation | Main Objective: This objective of this study is to provide a thorough overview of the process and development possibilities of motion capture (Mo-Cap), focusing on the relationship between accessibility, simplicity, and data quality. Background Problem: 3D modeling is popular for IT-based applications because of its reusability, detailed breakdown, and ability to depict depth. Motion capture is growing in popularity in animation production, because of its advantages like interactive features, lifelike representation, and automated functionality. Nonetheless, the fusion of motion capture and 3D animation presents intricate obstacles and developmental hurdles. Novelty: This research explores the application of Mo-Cap technology in the realm of 3D animation besides that the potential of algorithms in understanding human motion and improving motion capture technology is also discussed. Through a comprehensive review, this study identified the advantages and limitations of motion capture systems and the importance of balancing accessibility and quality in the process. Research Method: This study is a literature review that aims to identify challenges and opportunities in the application of motion capture for 3D animation. Finding/Result: This research provides an overview of motion capture in 3D animation, including the possibilities and challenges. The study also analyzes the advantages and disadvantages of different motion capture techniques systems and highlights the importance of simplifying the system without sacrificing quality. The results of this study emphasize the importance of considering real-time quality and usability when selecting a method for a particular application. Conclusion: Motion capture has a broad spectrum of uses in the field of 3D animation from high-cost film production to products targeted towards consumers. This study emphasizes the importance of balancing accessibility and quality in selecting motion capture systems and methods. In addition, this research reveals the potential of machine learning algorithms in driving the development of motion capture technology. In summary, this study offers an extensive examination of the motion capture procedure, as well as its potential and obstacles within the domain of 3D animation | motion capture; 3D-Model; 3D-Animation | Mars Caroline Wibowo (STEKOM University, Indonesia); Sarwo Nugroho (STEKOM University Semarang Indonesia, Indonesia); Agus Wibowo (University of Science and Computer Technology, Indonesia) | |
49 | 1570946234 | ArabAlg: A new Dataset for Arabic Speech Commands Recognition for Machine Learning Purposes | Automatic Speech Recognition (ASR) systems have witnessed significant advancements in recent years due to the emergence of deep learning techniques and the availability of large speech datasets. With the increasing demand for Arabic voice-enabled technologies, the availability of a high-quality and representative data set for the Arabic language becomes crucial. This paper presents the development of a new dataset called \textbf{ ArabAlg} specifically designed for Arabic Speech Commands Recognition (ASCR) to support the integration of Arabic voice recognition systems in smart devices in Internet of Things (IoT). This research focuses on collecting and annotating a diverse range of Arabic speech commands, encompassing various domains and applications. The dataset construction process involves recording and preprocessing several utterances from native Arabic speakers. To ensure precision and reliability, quality control measures are implemented during data collection and annotation. The resulting dataset provides a valuable resource for training and evaluating ASCR systems tailored for Arabic speakers using Machine Learning and Deep Learning. | Automatic Speech Recognition; Machine learning; Dataset for limited vocabulary; Arabic Speech Commands Recognition; Smart devices; Internet of Things | Nourredine Oukas (University of Bouira, Algeria & University of Boumerdes, Algeria); Samia Haboussi (University of Bouira, Algeria); Chafik Maiza and Nassim BenSlimane (Akli Mohand Oulhadj University of Bouira, Algeria) | |
50 | 1570946787 | Improving Detection and Prediction of Traffic Congestion in VANETs: An Examination of Machine Learning Algorithms | Traffic congestion remains a pressing challenge in urban areas, causing significant economic and environmental repercussions. To address this issue, accurate detection and prediction of traffic congestion are imperative for effective traffic management and planning. This research study investigates the efficacy of Support Vector Machines (SVM) and various other machine learning algorithms in augmenting traffic congestion detection and prediction for Vehicular Ad hoc Networks (VANETs). Leveraging historical congestion patterns, we train and evaluate the performance of the algorithms. Our results demonstrate the potential of SVM, coupled with advanced feature engineering techniques, to outperform other methods in accurately identifying and forecasting traffic congestion. The SVM classifier achieved an impressive classification accuracy of 0.99, showcasing its effectiveness in handling diverse traffic scenarios. Additionally, the K-Nearest Neighbors (KNN) and Ensemble Learning classifiers also yielded commendable accuracies of 0.99. Notably, the Decision Tree (DT) classifier attained a perfect accuracy score of 1.00, indicating its robustness in handling congestion patterns. The proposed approach not only achieves high detection accuracy but also exhibits remarkable robustness and scalability, enabling its application across various traffic scenarios. These findings contribute significantly to the development of intelligent traffic management systems, providing valuable insights into optimizing transportation networks. Ultimately, implementing our approach holds the potential to alleviate congestion, enhance travel efficiency, and foster urban sustainability | Traffic congestion; Support Vector Machines (SVM); Ensemble Learning | Mohammed S Jasim (Safx University, Tunisia); Nizar Zaghden (SETIT, Tunisia); M. Bouhlel (University of Sfax, Tunisia) | |
51 | 1570948906 | A Systematic Literature Review of an Advisory System | The growth of artificial intelligence (AI) driven technologies has been proposed as a means to improve the standard of people's lives. The advent of advisory system has manifested as significance element in artificial intelligence that effectively helping people in various field. This study initially presents 453 articles by examining the literature between 2015 and 2022. After a meticulous review process, the studies were filtered down to 59 articles for full analysis. This review provides significant contributions in finding into the exploration of advisory system, specifically in the existing framework of advisory system, technique applied in advisory system, domain in which the artificial intelligence technique is being applied in the advisory system and the validation technique use in validating the advisory system. | Advisory System; Advisory System Framework; Artificial Intelligence; Systematic Literature Review | Ain Nadhira Mohd Taib (University Malaysia Pahang Al-Sultan Abdullah, Malaysia); Fauziah Zainuddin (Universiti Malaysia Pahang, Malaysia); Rahmah Mokhtar (FSKKP & Universiy Malaysia Pahang, Malaysia); Kamalia Azma Kamaruddin (Universiti Teknologi MARA, Malaysia); Nadzirah Ahmad Basri (International Islamic University Malaysia, Malaysia) | |
52 | 1570948920 | Performance Evaluation of the "Incremental Conductance" and "Adaptive Hill Climbing" Maximum Power Point Trackers for Wind Energy Conversion System | A new design of Maximum Power Point Tracking (MPPT) algorithm is integrated towards the Wind Energy Conversion System (WECS) to grasp the ultimate possible power (Pmax). The controllers applied in this research are categorized in the form of what is called a Direct Power Control (DPC) used in checking the efficiency performance besides evaluating the controllers based on the uncertain rapid variations in the wind speed's profile. The aim of the research is to evaluate the efficiency and performance of the incremental conductance (INC) and the adaptive Hill-Climbing Search (HCS) for Wind Energy Conversion System (WECS) using uncertain rapid changes in the wind speed profiles. The Permanent Magnet Synchronous Generator (PMSG) has been chosen in the research modeling because of its reliability and robustness. The results derived from the execution of simulations revealed the fact that the speed of wind plays a crucial aspect in rotor's speed along the electromagnetic torque due to the relatively proportional relationship that takes place between the wind speed parameters and power factor. The controller is adapted to the WECS for analyzing the performance of the Incremental Conductance algorithm (INC), followed by adaptive Hill-Climbing Search (HCS). This study demonstrated that the adaptive HCS has shown high-efficiency performance under rapid changes in wind speed. As per the simulation of INC results, it shows a fast-tracking capability to stretch in approaching the peak maximum power point MPPT at the curve representing the power. | Incremental Conductance algorithm; HCS; wind power; MPPT; PMSG; WECS | Ahmed Badawi (UDST, Qatar); Mario I Elzein (University of Doha for Science and Technology, Qatar); Hassan Ali (UDST, QATAR); Alhareth Mohammed Zyoud (Birzeit University, Palestine) | |
53 | 1570952039 | Real Time System Based Deep Learning for Recognizing Algerian Sign Language | Sign language plays a crucial role in facilitating communication and interaction for the deaf community. However, the recognition of sign language poses unique challenges, especially in the context of Algerian Sign Language (ALGSL), where limited research has been conducted. Using recent advances in the field of deep learning, we present a novel ALGSL recoginition system using hand cropping and hand landmarks from successive video frames. Also, we propose a new key frame selection method to find a sufficient number of successive frames for the recognition decision, in order to cope with a near real-time system, where tradeoff between accuracy and response time is crucial to avoid delayed sign recognition. Our system is based on Autoencoder architecture enhanced by attention mechanism. The Autoencoder architecture combines both convolutional neural networks (CNN) for capturing spatial information and long-short-term memory (LSTM) for capturing temporal information. The proposed architecture is evaluated on our new ALGSL dataset and achieved an accuracy of 98,99%. Additionally, we test our architecture on different publicly datasets and shows outstanding results. Finally, we present the proposed ALGSL recognition system based on Autoencoder model. | Algerian Sign Language recognition; Deep learning; Convolutional neural networks; Long-short-term memory; Attention; Mediapipe | Ahmed Kheldoun, Imene Kouar and El Bachir Kouar (University of Medea, Algeria) | |
54 | 1570954343 | Optimizing Fog Computing Efficiency: Exploring the Role of Heterogeneity in Resource Allocation and Task Scheduling | Fog computing has emerged as a promising approach to address the stringent requirements of latency-sensitive applications in the Internet of Things (IoT) era. This research conducts a comprehensive and rigorous investigation into the performance characteristics of fog computing systems, with a specific focus on analyzing the impact of architectural heterogeneity. The study delves into the influence of architectural diversity, deadline constraints, and the count of Mobile Data Centers (MDCs) on key performance metrics. Employing extensive empirical analysis and meticulous experimental simulations, the research evaluates success ratios, rejection ratios, and resource utilization across diverse architectural models. The results underscore the paramount importance of adopting heterogeneous architectures and wider deadline ranges, resulting in significantly improved success ratios and reduced job rejections. Additionally, the study reveals the positive implications of increasing the number of MDCs on resource utilization and overall system performance. This research provides invaluable and actionable insights into optimizing fog computing systems, facilitating the development of highly efficient and effective solutions for real-world applications. | IoT; fog computing; scheduling; resource utilization | Nikita Sehgal (Giani Zail Singh Campus College of Engineering and Technology, Bathinda, India); Savina Bansal and Rakesh Kumar Bansal (GZSCCET, India & Maharaja Ranjit Singh Punjab Technical University Bathinda, India) | |
55 | 1570954496 | A Comprehensive Comparative Study of Machine Learning Algorithms for Water Potability Classification | Water quality prediction is of utmost importance due to the scarcity of clean water resources. Machine learning (ML) techniques, including neural networks, have gained significant importance in this field. In this study, seven ML algorithms, namely Bagging classifier, Multilayer Perceptron (MLP), Logistic regression (LR), J48, Random Forest (RF), IBk, and AdaBoostM1, were employed to assess water quality. Assessment metrics such as recall, precision, F-measure, true positive (TP) rate, false positive (FP) rate, receiver operating characteristic (ROC) area, and precision-recall curve (PRC) area were utilized to identify the most accurate model. Results revealed the superior performance of RF and MLP in multiple metrics. For RF, the precision was 0.657, recall was 0.665, and F-measure was 0.636, while for MLP, the precision was 0.654, recall was 0.663, and F-measure was 0.635. Additionally, the FP rate for RF was 0.452, and for MLP, it was 0.453. These findings highlight the effectiveness of RF, MLP, and neural networks in water quality prediction. The study contributes valuable insights for implementing accurate prediction models, supporting the sustainable management of water resources. | Artificial Intelligence; Neural Network; Water Potability; Machine Learning; Civil Engineering; Environmental Engineering | Fuad Ahmad Musleh (University of Bahrain, Bahrain) | |
56 | 1570954631 | A Dynamic Indoor Localization with Movement Validation and Fingerprinting Technique under IEEE 802.15.4 Network | The study of indoor localization has been extensively studied, either in terms of wireless technologies or localization techniques. The accuracy is then challenged when the monitored object is actively moving. Previously, we studied a continuous and low-power fingerprint-based indoor localization system using IEEE 802.15.4 (FILS15.4), which has been integrated into a smart environmental IoT platform. Although fingerprint-based localization offers a great advantage in its simplicity, it relies on real-time signal strength measurements and databases. Thus, it suffers challenges in accuracy when the object is continuously moving. In this study, we focus on developing dynamic positioning, where users continuously move from one room to another. Due to human movements, the fluctuation of the link quality indicator (LQI) can affect the detection accuracy. To avoid false detection, we propose a movement validation method by checking the variance of the LQI and accelerometer to differentiate the cause of fluctuations and increase the detection accuracy. For experiments, we run the test-bed of {\em FILS15.4} on a two-floor layout. Five to six receivers were allocated to detect multiple users. The results show that the system yields 96.2% accuracy using six receivers simultaneously. Thus, it gives sufficient detection accuracy even for dynamic conditions. | indoor positioning; accelerometer; motion sensing; IoT; energy efficient | Pradini Puspitaningayu (Universitas Negeri Surabaya, Indonesia); Nobuo Funabiki, Yuan-Zhi Huo and Yohanes Yohanie Fridelin Panduman (Okayama University, Japan) | |
57 | 1570954859 | Hybrid K-means and Principle Components Analysis (PCA) for Diabetes Prediction | Diabetes is the "silent killer," stealing the lives of millions of people worldwide. There are many reasons for diabetes, such as increasing glucose, Cholesterol, Systolic BP, and age. These are considered the four main reasons that cause diabetes. The challenge in diabetes is how to predict the human illness early to start treatment immediately after discovering diabetes; This can be the most challenging thing in diabetes discovery because tens of features may cause diabetes. This thesis proposes a model consisting of data mining and Machine Learning (ML) algorithms to predict if humans can have diabetes or not in the future. the prediction is made up of compensating two datasets one dataset is used to reconfirm the other dataset in making more accurate prediction; This can be performed using the k-means-PCA hybrid model and the highest weight selection of features that widely cause diabetes. The selected features help the ML algorithm predict the model's accuracy, which indicates the prediction model's accuracy. Simulation results show that the predict-diabetic patients increased from 53 from the original datasets to 142 after applying the proposed model. Simulation outcomes also prove that the Random Forest ML model gives the highest accuracy of other ML models, reaching 95.2%. | 10.12785/ijcds/1501121 | Artificial intelegence; Machine Learning; Healthcare; Diabetes | Ahmed Abed Mohammed (Islamic University, Najaf, Iraq); Putra Sumari (Universiti Sains Malaysia (USM) & School of Computer Science, Malaysia); Kassem Attabi (The Islamic University, Iraq) |
58 | 1570955906 | Rocking Across Borders: An Analysis of the Musical Differences between Bangladesh and West-Bengal Rock Songs using Spotify Audio Features | Over the last few decades, there has been a significant increase in the availability and utilization of large music collections. However, most studies of these collections have been limited to Western music, which hinders our ability to comprehend the diversity and commonality of music across all cultures. Based on popularity from Spotify, it has been discovered that Bangladeshi rock music is more popular than the rock music from West Bengal, India. Previous research suggests that listeners from diverse cultural backgrounds may have varying preferences when comes to music appreciation. This research aimed to explore the reasons behind the popularity of Bangladeshi rock music compared to West Bengal rock music. By extracting various features from songs, the study sought to identify what is the reason behind the popularity of Bangladeshi rock music and whether there are any differences in terms of musical features. | Data Mining; Musicological Analysis; Cultural Diversity; Feature Extraction; Hypothesis Testing; Pearson Correlation | Mohammed Raihan Ullah, Moshiur Rahman Autul, Durjoy Dey and Partha Protim Paul (Shahjalal University of Science and Technology, Bangladesh) | |
59 | 1570956161 | Mitigating Data Variability and Overfitting in Deep Learning Models for Atrial Fibrillation Detection Using Single-Lead ECGs | Despite the growing potential of deep learning in diagnosing Atrial Fibrillation (Afib), challenges such as overfitting and limited generalizability continue to persist. These limitations are accentuated in single-lead ECGs generated from wearable devices, which frequently suffer from inadequate annotation and substantial data variability. This study seeks to address these challenges by enhancing both the accuracy and generalizability of Afib detection algorithms. We introduce Afib-CNN, a specialized Convolutional Neural Network engineered for 9-second, single-lead ECGs. The architecture comprises ten convolutional blocks and three fully connected layers, focusing on computational efficiency. To mitigate data variability, we apply advanced pre-processing techniques like Moving Average by Convolution Filter (MAConv) and Minimum-Maximum Normalization. Further dataset refinement is achieved using z-score normalization and a shifted-length overlapping technique. The effectiveness of our model is rigorously validated across three distinct ECG databases, demonstrating robust intra- and inter-patient generalizability. Employing 10-fold stratified cross-validation, Afib-CNN exhibits exemplary performance, achieving mean F1 scores of 98\%, 97\%, and 99\% on the CinC2017, CPSC2018, and MIT-AFIB datasets, respectively. The model also attains an F1 score of 98\% on the CinC2017 test set. Comparative analyses demonstrate that Afib-CNN successfully balances high performance, computational efficiency, and robust generalization. These characteristics render it well-suited for practical clinical deployment. | Khadidja Benchaira (University Mohamed Khider & LESIA Laboratory, Algeria); Salim Bitam (University of Biskra & LESIA Laboratory, Algeria); Zineb Djihane Agli (University of Mohamed Khider Biskra, Algeria) | ||
60 | 1570958000 | Hybrid Deep Learning Approach for Classification and Analysis of X Posts on Russia Ukraine War | X (formerly Twitter) has become a vital information source on a variety of political, social, and economic concerns, as a consequence of its growth and popularity has resulted in an enormous number of people sharing their opinions on a wide range of topics. To determine people's emotions about the Russia-Ukraine war (RUW), this study examines trends in English-language tweets. In this work, we have engaged 34 countries to tweet opinions that produce a strong perception of the people about the war and message to the world what people famine from the countries and that affects their lives. To analyze positive and negative emotions in tweets, which are represented by hope and fear, the LSTM-CNN model is based on deep learning. A time series is calculated that correlates with the frequency of positive and negative tweets in different nations. Additionally, an approach based on the neighborhood average has been used for modelling and grouping the time series of various countries. In the results, the clustering method gives results as significant information, how people feel about this dispute and share their opinions about RUW is approached. This research study helps the uninfluenced press members to have an impartial source of information for their reports and articles. | Clustering; CNN; LSTM; Social Network Mining | Amrit Suman (Sharda University, Greater Noida, India); Sudeep Varshney and Kuldeep Chouhan (Sharda University, India); Preetam Suman (VIT Bhopal); Gunjan Varshney (UTU, India) | |
61 | 1570958321 | Phishing Website Classification using Machine Learning with Different Datasets | The classification of phishing websites through the analysis of their URLs is a technique used to enhance the capabilities of systems designed to detect malicious websites. However, the evolution of phishing sites has allowed them to achieve higher levels of sophistication, making proactive detection more complex. The central focus of this article revolves around the exploitation of deep learning models and machine learning techniques with lexical analysis of their URLs to facilitate the classification, detection, and preventive mitigation of phishing websites. Our study includes the evaluation of a selection of commonly castoff machine learning algorithms, specifically Random Forest, K-Nearest Neighbors, Support Vector Machines, Gradient Boosting, Decision Tree, Bagging, AdaBoost and ExtraTree, as well as the deep neural network model. To assess the effectiveness of these algorithms and models, we conduct our analysis using two distinct URL datasets, one from 2016 and the other from 2021. Through lexical analysis, we extract significant features from the URLs and then calculate the accuracy of each algorithm on both datasets. Our results reveal that some algorithms achieve remarkable accuracy scores of up to 99% when applied to the 2016 dataset. However, this score decreases to less than 91% when applied to the dataset collected in 2021. | Phishing; URL; Classification; Machine Learning; Deep Learnig | Habiba Bouijij (University of Mohammed V & ENSIAS, Morocco); Amine Berqia (University of Mohammed V, Morocco) | |
62 | 1570958381 | Ransomware Detection Dynamics: Insights and Implications | This study provides a multifaceted analysis of ransomware-related data, offering insights that underscore the complexity and evolving nature of cybersecurity threats. Our exploration of financial aspects revealed the absence of a fixed ransom amount associated with specific ransomware types, highlighting the adaptability of threat actors. Moreover, the correlation analysis unveiled a strong link between ransomware clusters and cryptocurrency transaction patterns, enhancing the potential for predictive and preventive cybersecurity measures. The temporal analysis emphasized critical time intervals during ransomware attacks, guiding the development of timely response strategies. Collectively, these findings emphasize the importance of data-driven, adaptive cybersecurity approaches to effectively address the ever-changing landscape of ransomware threats, safeguarding organizations and individuals against potential cyberattacks. | Cybersecurity; Ransomware Detection; Machine Learning; Feature Selection; UGRansome Dataset | Mike N Wa Nkongolo (University of Pretoria, South Africa) | |
63 | 1570958610 | Real-time Speech-based Intoxication Detection System: Vowel Biomarker Analysis with Artificial Neural Networks | Alcohol consumption can have impacts on the voice, and excessive consumption can lead to long-term damage to the vocal cords. A new procedure to automatically detect alcohol drinkers using vowel vocalizations is an earlier and lower-cost method than other alcohol drinker-detecting models and equipment. The hidden parameters of vowel sounds (such as frequency, jitter, shimmer, harmonic ratio, etc.) are significant for recognizing individuals who drink or do not drink. In this research, we analyze 509 multiple vocalizations of the vowels (/a, /e, /i, /o, and /u) from 290 multiple records of 46 drinkers and 219 multiple records of 38 non-drinkers. The age group is 22 to 34 years. Apply the 10-fold cross-validation vowelized dataset on intelligent machine learning models and incremental hidden layer neurons of artificial neural networks (IHLN-ANNs) with Backpropagation. The findings showed that experimental ML models such as Naïve Bayes (NB), Random Forest (RF), k-NN, SVM, and C4.5 (Tree) performed well. The RF model performed best, with 95.3% accuracy. We also applied the incremental hidden layer (HL) neurons BP-ANNs model (from 2 to 5). In this analysis, accuracy increased proportionally with the incremental neurons (2-5) in the HL of the ANN. Now of 5 neurons HL ANN, the model performed with a highly accurate 99.4% without an over-fit problem. It will implement smartphone apps for caution and alerts for alcohol consumers to avoid accidents. Voice analysis has been explored as a non-invasive and cost-effective means of identifying alcohol consumers. | Alcohol Consumers; Voice Parameters; Machine Learning; Neural Networks; ANN | Terlapu Panduranga Vital (jntuK, India & Aditya Institute of Engineering Technology and Management, India); Ram Prasad Reddy Sadi (Anil Neerukonda Institute of Technology and Sciences, India) | |
64 | 1570965876 | Performance Evaluation of Deep Learning Models for Face Expression Recognition | Face expression recognition is a crucial computer vision task with versatile applications. In this study. Explore the challenges and solutions Real-time emotion recognition is an important research problem. To solve this problem, transfer learning was used. we assess the performance of five deep learning models: CNN, VGG16, Inception V3, MobileNet V2, and DenseNet121. We evaluate their accuracy during training, validation, and testing, revealing their strengths and weaknesses. CNN delivered consistently high performance with 98% accuracy in testing, showcasing its efficacy in facial expression recognition. VGG16, a popular pre-trained model, achieved 97% accuracy in testing, making it a robust choice. Inception V3 demonstrated exceptional accuracy, with 99% in testing, highlighting its ability to capture intricate facial expression patterns. MobileNet V2, known for its efficiency, achieved 100% accuracy in testing, making it precise and computationally efficient. DenseNet121 yielded commendable results with 96% accuracy in testing, offering reliable performance. MobileNet V2 and Inception V3 particularly excelled with perfect or near-perfect accuracy across all phases. In this article CK+ Dataset used that consist of 981 images distributed into seven emtions. These findings aid researchers and developers in selecting suitable models based on their specific requirements, considering both accuracy and computational efficiency. Further fine-tuning may enhance these models for real-world applications. | Face Expression; Emotion Recognition; Deep Learning; Transfer learning | Raed Ibrahim Khalil, Sr (University of Almustaniriya, Iraq); Abbas Hussien Miry (Mustansiriyah University, Iraq); Tariq Mohammed Salman (Mustansiriyah University & College of Engineering, Iraq) | |
65 | 1570967983 | Exploring Progress in Forest Fire Detection, Prediction, and Behavior: An In-Depth Survey | Forest fires are a major environmental challenge that pose a threat to both human life and ecological health. To effectively prevent and manage forest fires, it is crucial to have reliable detection, prediction, and behavior analysis systems in place. This paper provides a comprehensive survey of the different approaches and techniques used for forest fire detection, prediction, and behavior analysis. It covers ground-based and aerial surveillance systems, remote sensing technologies, machine learning-based approaches, and social media-based systems. The paper also discusses the challenges and limitations of current systems and provides insights into future directions for research and development in this field. Overall, this paper highlights the importance of leveraging multiple data sources and analysis methods to improve our understanding of forest fire behavior and develop effective strategies for managing this environmental threat | Forest Fire; Ground Based System; Fire Behaviour analysis; Fire Managment; Fire Detection; Fire Prediction | Ahmad Alkhatib and Khalid Jaber (Al-Zaytoonah University of Jordan, Jordan); Hassan Al-zoubi (ZUJ, Jordan); Mohammad Abdallah (Al-Zaytoonah University of Jordan, Jordan); Mosa Salah (Al-zaytoonah University of Jordan, Jordan) | |
66 | 1570971343 | Reptile Search Algorithm for Association Rule Mining | Association rule mining (ARM) is a very popular, interesting, and active research area in data mining. It aims to find potentially useful connections between different attributes in a defined dataset. ARM is an NP-complete problem and become a fertile field for optimization applications. The Reptile Search Algorithm (RSA) stands out as an innovative bio-inspired meta-heuristic approach. It draws inspiration from the hunting and encircling behaviors exhibited by crocodiles in nature. It is a well-known optimization technique for solving NP-complete issues. Since its introduction by Abualigah et al. in 2022, the approach has attracted considerable attention from researchers and has extensively used to address diverse optimization issues in several disciplines. This is due to its satisfactory execution speed, efficient convergence rate, and superior effectiveness compared to other widely recognized optimization methods. This paper presents new version of the reptile search algorithm for resolving the association rules mining challenge. Our proposal inherits the trade-off between local and global search in optimization issues that the Reptile search algorithm demonstrated. In order to demonstrate the power of our proposal, a series of experiments are cried-out on a varied well-known, employing multiple comparison criteria. The outcomes show a clear superiority of the proposed approach in-face-of famous association rules mining algorithms in terms of CPU time, fitness criteria, and the quality of generated rules. | Data mining; Association rule mining; Bio-Inspired Approaches; Reptile Search Algorithm | Abderrahim Boukhalat (University of M'Sila & LIM Laboratory, University of Souk Ahras, Algeria); Heraguemi KamelEddine (National School of Artificial Intelligence, Algeria); Mohamed Benouis (M'sila University, Algeria); Brahim Bouderah (Pro, Algeria); Samir Akrouf (University Mohamed Boudiaf MSILA, Algeria) | |
67 | 1570972516 | Mapping crop types at a 10 m scale using Sentinel-2 data and machine learning methods | Crop classification plays a vital role in crop status monitoring, crop area estimation and food production. Remote sensing data is widely accepted for crop classification at the remote location. However, crop classification is challenging due to spectral and spatial similarities, complex land structure, temporal inconsistencies, and environmental parameters. Therefore, in the present study, an effort has been made to identify, classify and map multiple crops from the complex environment using the Sentinel-2 dataset and advanced machine learning methods such as random forest, Spectral Angle Mapper (SAM), Maximum Likelihood Classifier (MLC), K-means clustering and Iterative Self-Organizing Data Analysis Technique (ISODATA). The crop spectral features were identified using the Normalized Difference Vegetation Index (NDVI). The NDVI outcomes ranged between -0.91 and 0.54, which were then used to identify crop areas. Ground reference data, Google map, and Google Earth data were used to determine the crop classes, train the data, and validate the results. The five major crops viz. Cotton, Paddy, Orchard, Yellow split Pigeon peas, Chickpeas and Other crops were identified and classified efficiently. According to the experimental results, the random forest approach had the best overall accuracy, 87.71% and a kappa value of 0.86 than other methods. Alternatively, the ISODATA method provided overall accuracy of 85.01% with a kappa value of 0.82. The agricultural decision-makers can use the results of this study for decision-making and management. | Crop types mapping; Sentinel-2 data; Machine learning; Random Forest; NDVI | Atiya Khan (G H Rasisoni College Engineering Nagpur, India); Chandrashekhar Himmatrao Patil (Vishwanath Karad MIT World Peace University, India); Amol D. Vibhute (Symbiosis International Deemed University Pune, India); Shankar Mali (Vishwanath Karad MIT World Peace University, India) | |
68 | 1570974662 | RDMAA: Robust Defense Model against Adversarial Attacks in Deep Learning for Cancer Diagnosis | Attacks against deep learning (DL) models are considered a significant security threat. However, DL especially deep convolutional neural networks (CNN) has shown extraordinary success in a wide range of medical applications, recent stud-ies have recently proved that they are vulnerable to adversarial attacks. Adversari-al attacks are techniques that add small, crafted perturbations to the input images that are practically imperceptible from the original but misclassified by the net-work. To address these threats, in this paper, a novel defense technique against white-box adversarial attacks based on CNN fine-tuning using the weights of the pre-trained deep convolutional autoencoder (DCAE) called Robust Defense Model against Adversarial Attacks (RDMAA), for DL-based cancer diagnosis is introduced. Before feeding the classifier with adversarial examples, the RDMAA model is trained where the perpetuated input samples are reconstructed. Then, the weights of the previously trained RDMAA are used to fine-tune the CNN-based cancer diagnosis models. The fast gradient method (FGSM) and the project gra-dient descent (PGD) attacks are applied against three DL-cancer modalities (lung nodule X-ray, leukemia microscopic, and brain tumor magnetic resonance imag-ing (MRI)) for binary and multiclass labels. The experiment's results show that under attacks, the accuracy decreased to 35% and 40% for X-rays, 36% and 66% for microscopic, and 70% and 77% for MRI. In contrast, RDMAA exhibited substantial improvement, achieving a maximum absolute increase of 88% and 83% for X-rays, 89% and 87% for microscopic cases, and 93% for brain MRI. The RDMAA model is compared with another common technique (adversarial training) and outperforms it. Results show that DL-based cancer diagnoses are extremely vulnerable to adversarial attacks, even imperceptible perturbations are enough to fool the model. The proposed model RDMAA provides a solid foun-dation for developing more robust and accurate medical DL models. | Adversarial Attacks; Deep Learning; Cancer Diagnosis; Deep Convolutional Autoencoder | Atrab A. Abd El-Aziz (KafrelSheikh University, Egypt); Reda Abd Elwahab and Nour El Deen Mahmoud Khalifa (Cairo University, Egypt) | |
69 | 1570977603 | Efficient Heuristics for Timetabling Scheduling in Blended Learning | Blended learning, an innovative educational approach adopted by the Saudi Electronic University, combines traditional face-to-face teaching with online methods to improve educational outcomes. However, implementing it effectively faces challenges, especially in shifting physical classes to virtual formats for faculty and students spread across distant campuses, potentially compromising the core principles of blended learning and reducing its effectiveness. Ideally, each student would attend one face-to-face and one virtual session per course weekly. Yet, operational challenges emerge due to geographical disparities between faculty and student locations, necessitating the conversion of face-to-face sessions into virtual ones. To address these challenges, this study proposes two novel heuristic strategies for scheduling timetables in blended learning contexts. The first heuristic, called Minimum Load Accumulation Heuristic (MLAH), aims to evenly distribute teaching loads among faculty members and time slots while maximizing the number of groups assigned to faculty members from the same campus. The second heuristic, called Average Load Accumulation Heuristic (ALAH), calculates the average load of all faculty members and time slots and reduces the number of iterations searching for the minimum load, as performed by MLAH. These strategies aim to minimize the conversion of face-to-face sessions to virtual, ensure fair distribution of teaching responsibilities, and maintain a balanced allocation of face-to-face and virtual classes throughout the academic year. The paper demonstrates the effectiveness of these algorithms in producing high-quality solutions comparable to those generated by CPLEX, with significantly reduced computational complexity. | Mohamed Jarraya (Saudi Electronic University, Saudi Arabia) | ||
70 | 1570978987 | Blockchain Technology and Virtual Asset Accounting in the Metaverse: A Comprehensive Review of Future Directions | This research focuses on the metaverse's evolving trend and the potential application of blockchain technology in the accounting of virtual assets in this digital domain. The metaverse introduces a new economy in which users may earn real-world revenue through virtual activities, necessitating the need for efficient and dependable virtual asset accounting. Blockchain technology, with its decentralized and immutable record, appears to be a viable answer to these problems. This paper discusses the present status of blockchain technology for accounting for virtual assets in the metaverse as well as its potential role for businesses and the economy. It also determines the technology's issues and limits and makes recommendations for further development. The approach of this study is based on a comprehensive review of the existing literature on the interactions between blockchain technology, virtual asset accounting, and the metaverse. The findings indicate that blockchain technology has the potential to transform virtual asset accounting in the metaverse by improving security, transparency, and consistency. However, scalability and legal/regulatory issues must be overcome before it can completely achieve its promise. Accounting experts, developers, and stakeholders interested in the convergence of blockchain technology and the metaverse economy will find this paper useful. | Metaverse; Blockchain Innovation; Blockchain-based Accounting; Virtual Asset Accounting | Ahmad Mtair AL-Hawamleh (Institute of Public Administration IPA, Saudi Arabia); Marwan Altarawneh, Heba Hikal and Alya Elfedawy (Arab Open University, Saudi Arabia) | |
71 | 1570980501 | A Survey on the Machine Translation Methods for Indian Languages: Challenges, Availability, and Production of Parallel Corpora, Government Policies and Research Directions | Since 1991, machine translation has been a prominent research area in India, with IIT Kanpur pioneering the original work which has since been expanded to several universities. Only 10 percent of India's 1.3 billion inhabitants can read, write, and speak English with varying degrees of competence, which makes machine translation crucial in overcoming the linguistic barrier to the internet. The Indian market for commercial products and events is greatly influenced by local languages, making the development and translation of region-based content an essential research topic nowadays. However, Indic-to-Indic language direct translation has faced several challenges and is still going through the experimental phase. Several government-sponsored projects are being undertaken in this regard. Still, there are limited sentence-aligned parallel bi-text resources available for the majority of Indian language pairs. This paper presents a detailed survey of the current trends of research on machine translation between Indian languages, along with their challenges over time. It also presents a timeline of recent research conducted and key findings of past surveys conducted over a decade. Under a single canopy, this paper provides sources of data, the progress made in developing datasets for low-resource Indian languages, various models of translation, encouragement from Indian Govt., and finally, new research directions. | Machine Translation; RBMT; SMT; NMT; Low-Resource Indian languages; BLEU | Sudeshna Sani (Woxsen University, India & Koneru Lakshmaiah Education Foundation, India); Samudra Vijaya (Koneru Lakshmaiah Education Foundation, India); Suryakanth Gangashetty (Koneru Lakshmaiah Education Foundation Vaddeswaram AP, India) | |
72 | 1570981963 | Process and Impact Evaluation of Artificial Intelligence in Managerial Accounting: A Systematic Literature Review | This systematic literature review aims to examine how researchers have evaluated the role of Artificial Intelligence (AI) in Management Accounting (MA), focusing on process and impact evaluations. The findings of the nine recent research papers completed between 2019 and 2023 were incorporated in this review. The study followed a three-phase, structured process: planning the review, conducting it, and reporting the findings. The study utilized multiple databases to source relevant papers and applied stringent inclusion and exclusion criteria, followed by a thematic synthesis approach. The results showed that the reviewed articles highlighted four aspects of AI in MA process evaluation: technological acceptance and usability, ethical and security considerations, skills and competence, and the decision-making process. Two aspects were pinpointed under impact evaluation in the reviewed articles: enhancement of accounting practices and the evolution of roles and skills. Two important predictions that the papers repeatedly asserted were that AI adoption in MA is still in its early stages but will transform the field soon. It will dramatically enhance MA practices, simultaneously creating new challenges and skills requiring urgent attention. Ethical and security considerations were also stressed in the reviewed articles. As AI algorithms are developing rapidly, the findings are limited to only giving a broad picture of the recent state of the field. However, this paper identified aspects of AI in MA evaluation that should contribute to setting evaluation criteria, which would be useful for future assessments. In light of the high potential of AI in the field of MA, this paper contributes to developing a comprehensive overview of the use of AI in this field. Furthermore, systematic reviews on AI applications in the MA field are limited. Therefore, this research addresses this gap by systematically reviewing recently published research papers. | Managerial Accounting; Artificial intelligence Data Privacy; Business Intelligence; Decision-making; Machine learning; Ethical considerations | Dawla Almulla (University of Bahrain, Bahrain); Mohamed Abbas (Electricity & Water Authority, Bahrain); Adel Ismail Al-Alawi (University of Bahrain, Bahrain); Lamya Alkooheji (Bahrain) | |
73 | 1570982868 | A Parallel Approach of Cascade Modelling Using MPI4Py on Imbalanced Dataset | Machine learning is crucial in categorizing data into specific classes based on their features. However, challenges emerge especially in classification when dealing with imbalanced datasets in which the model exhibits bias towards the majority class. This research proposes a cascade and parallel architecture in the training process to enhance accuracy as well as speed compared to non-cascade and sequential respectively. This research will evaluate the performance of the SVM and Random Forest methods. The research finds that the Support Vector Machine (SVM) method with the Radial Basis Function (RBF) kernel notably increases accuracy by 1.25% over non-cascade classifiers. In addition, the use of Message Passing Interface for Python (MPI4Py) for training process across multiple cores or nodes proved that parallel processing significantly speeds up the training process up to 3.57 times faster than sequential training. These findings underscore the effectiveness of parallel processing in enhancing both the accuracy and efficiency of classification tasks in imbalanced data scenarios. | Cascade classifier; imbalanced data; MPI4Py; parallel processing; SVM | Suprapto Suprapto and Wahyono Wahyono (Universitas Gadjah Mada, Indonesia); Nur Rokhman (Gadjah Mada University, Indonesia); Faisal Dharma Adhinata (Institut Teknologi Telkom Purwokerto, Indonesia) | |
74 | 1570983167 | Microservices Adoption: An Industrial Inquiry into Factors Influencing Decisions and Implementation Strategies | Microservices Architecture (MSA) has emerged as a promising paradigm for building scalable and flexible software systems. While extensive research focuses on MSA's technical aspects, there remains a gap in understanding how practitioners make decisions to adopt and implement MSA in real-world organizational contexts. To address this gap, we conducted an in-depth qualitative study through 30 semi-structured interviews with experienced practitioners in the field. Our investigation unveils the intricate factors driving practitioners' decision-making processes during MSA adoption. We highlight the multifaceted influences of reusability, scalability, extensibility, maintainability, and other factors, shedding light on the motivations behind adopting MSA. Moreover, we delve into key strategies practitioners employ during MSA adoption, emphasizing the importance of the Modulith approach as a bridge between monolithic and MSA Our findings underscore the significance of practitioner experience in shaping MSA adoption decisions. | Microservices Architecture; Modulith; Decision-Making; Adoption; Industrial Inquiry; Qualitative Study | Mehdi Ait Said, Sr. (Hassan First University, Morocco); Abdellah Ezzati (FST SETTAT, Morocco); Soukaina Mihi (University Hassan first of Settat, Morocco); Lahcen Belouaddane (Hassan First University, Morocco) | |
75 | 1570987102 | The Interplay between Intellectual Capital, Business Intelligence Adoption, and the Decision to Innovate: Evidence from Jordan | This research explores the dynamic interplay among intellectual capital, the intention to adopt business intelligence (BI) technology, and the decision to innovate within the industrial landscape of Jordan. Using a quantitative approach, the study employs bootstrapping and PLS-SEM to analyze data from participants familiar with their companies' technological and innovation orientations. The findings reveal a noteworthy positive correlation between human capital and structural capital with the intention to adopt BI technology. Additionally, human capital demonstrates a significant positive association with the decision to innovate. The research further validates a positive relationship between the intention to adopt BI technology and the decision to innovate. The practical implications of these findings extend to decision-makers and managers in Jordan's industrial sector, underscoring the pivotal role of adopting business intelligence technology in fostering innovation. Significantly, by concentrating on innovation orientation in the Jordanian context, this paper contributes to the expanding body of research in developing countries. | Decision to Innovate; Business Intelligence; Intellectual Capital; Industrial Sector | Zaid Jaradat, ZJ (AlBayt University & School of Business, Jordan); Ahmad Mtair AL-Hawamleh (Institute of Public Administration IPA, Saudi Arabia); Marwan Altarawneh, Heba Hikal and Alya Elfedawy (Arab Open University, Saudi Arabia) | |
76 | 1570988504 | Exploring the Impact of Shifting ERP Systems to the Cloud | The demand for improving efficiency, productivity, and business processes through cloud-based enterprise resource planning (ERP) has grown substantially in recent decades. This study aimed to investigate the benefits and challenges of moving traditional ERP to the cloud, as well as the success factors that facilitate the transformation process. To the best of our knowledge, few studies have explored these areas in depth. To achieve the specified aims, semi-structured interviews were conducted with government, semi-government, and private companies that had moved their traditional ERP to the cloud. The data were analyzed using thematic analysis. It showed that the movement to the cloud would bring significant cost savings, standardization of business processes, improved accessibility, mobility, and usability and facilitate rapid implementations and upgrades and strict security standards. However, organizations may face challenges during the transformation process, such as customization limitations, organization, and user resistance, concerns about Internet reliability and security issues. To ensure the success of the transformation process, the following typical success factors were identified: business process re-engineering, careful planning of the transformation approach, the quality of the project team, and effective communication. This paper provides valuable insights for businesses considering implementing or migrating to cloud-based ERP. | Cloud-based ERP; cloud ERP benefit; success factors; on-premise systems | Zahyah H Alharbi, ZA (King Saud University, Saudi Arabia); Norah J AlMouteq (SAMI Advanced Electronics, Saudi Arabia) | |
77 | 1570989122 | Attendance System Optimization through Deep Learning Face Recognition | The significance of face recognition technology spans across diverse domains due to its practical applications. This study introduces an innovative face recognition system that seamlessly integrates Multi-task Cascaded Convolutional Neural Networks (MTCNN) for precise face detection, VGGFace for feature extraction, and Support Vector Machine (SVM) for efficient classification. The system demonstrates exceptional real-time performance in tracking multiple faces within a single frame, particularly excelling in attendance monitoring. Notably, the "VGGFace" model emerges as a standout performer, showcasing remarkable accuracy and achieving an impressive F-score of 95% when coupled with SVM. This underscores the model's effectiveness in recognizing facial identities, attributing its success to robust training on extensive datasets. The research underscores the potency of the VGGFace model, especially in collaboration with various classifiers, with SVM yielding notably high accuracy rates. | Attendance; Face Detection; Face Recognition; Feature Extraction; Transfer Learning | Mahmoud Emad Aldin Ali (Marwadi University & Syrian Virtual University, India); Anjali Diwan (Marwadi University, India); Dinesh Kumar (Bennett University, India) | |
78 | 1570989271 | Diagnosing Autism Spectrum Disorder using a Smart Model | The brain development and physical appearance of the face are both impacted by the neurologic disorder known as Autism Spectrum Disorder (ASD). Children with ASD exhibit different facial landmarks from children who normally grow with Typical Developing (TD), despite the fact that the disorder is thought to be inherited. When a child's behavioral traits and facial features are examined, the likelihood of an accurate diagnosis is highest. In this work, we provide a deep learning model-based method for diagnosing autism that divides children into two categories: possibly healthy and potentially unhealthy. The Tesorflow and Keras libraries are used by the suggested deep learning model to carry out feature extraction and picture classification. A dataset obtained from the Kaggle repository is used to train and evaluate the model. the dataset that was used to test this model consisted of 2,122 that is excluded from the original 2,940 images due to the quality and race. The testing of the proposed model results in an Area Under Curve (AUC) with 99.8% and accuracy of 97.3%. This model proves its high diagnosis accuracy, ease of use, and fast decision. | Autism Spectrum Disorder; Convolutional neural network; Deep learning; Keras; Tensorflow | Mazin Swadi (Deep Learning, Iraq); Muayad Sadik Croock (University of Technology, Iraq) | |
79 | 1570989432 | Meticulous review on Cutting-Edge Cervical Cancer cell Detection, Segmentation and Stratification of PapSmear Images using Image Processing and Machine learning Approach | Cervical cancer falls under the top most cancers found in women of developing countries since last many years. Classification of cervical cancer through a traditional microscopic approach is a monotonous and prolonged task. Most of the time hospital doctors cannot identify the cancer cells as sometimes the nucleus is difficult to see with naked eyes. Due to the different perspectives of doctors, cancer stages are classified falsely which leads to low recovery and late medication. The use of Image Processing and Machine Learning technologies can take off misclassification and inaccurate prediction. Although many deep learning techniques are available for cervical cancer cell detection and classification, performance of such techniques for prediction and classification with the real and sample dataset is the main challenge. In this paper, we did a thorough state-of-the-art review with the available current literature. The objective of this paper is to bring forth in-depth knowledge to novice researchers with the thorough understanding of the architecture of the computer assisted classification process. The current literature is studied, analyzed, and discussed with their approaches, results, and methodologies. | Image Processing; Machine Learning; Image Classification; Pattern Analysis; Feature evaluation; Feature selection | Barkha Bhavsar (KSV University, USA & LDRP Institute of Technology and Research, India); Bela Shrimali (Institute of Technology, Nirma University, India) | |
80 | 1570989890 | AlphaFedForensic: Safeguarding Privacy and Enhancing Forensic Analysis in Federated Learning on Edge Devices | In this paper, a novel federated learning algorithm for decentralized settings on edge devices— AlphaFedAvg—is introduced. Using an adaptive learning rate approach based on Lipschitz and Smoothness parameters, AlphaFedAvg dynamically modifies the learning rate for every node. Through federated averaging, the approach accomplishes model aggregation, exhibiting enhanced convergence and performance. An extensive test configuration includes using Kali Linux to simulate network assaults, an ESP32 microcontroller connected to a laptop equipped with a sound sensor, and Wireshark and Scapy for traffic analysis. The Alpha algorithm offers a privacypreserving solution by effectively identifying and thwarting network attacks without gaining access to user data. The algorithm's performance is demonstrated in a comprehensive report generated. Evaluation against IID and non-IID datasets, such as Edge-IIoTset, and comparison with other models validate AlphaFedAvg's efficacy in federated learning applications. | Federated Learning; Privacy-Preserving; Anomaly Detection | Karam Salih (Ninevah University, Iraq); Najla Badie Aldabagh (Mosul University, Iraq) | |
81 | 1570990010 | Analyzing the Impact of Discretization Techniques on Real Time Simulation of DC Servomotor Using FPGA | This paper explains the strategies to create a hardware-based real time model of DC servomotor by utilizing the FPGA technology that can accurately simulate the behavior of the servomotor in real-time. Such FPGA based hardware model is useful for testing control algorithms, validating designs, and optimizing performance for various applications because of its reconfiguration capabilities. Continuous-time model is discretized using both Backward Euler (BE) and Trapezoidal (TRZ) methods for the real-time implementation on FPGA. The discretized models are coded using ‘C', converted to hardware descriptive language using Vivado high level synthesis tools, and the performance is analyzed with change in step-size by comparing with the transfer function (TF) model. With 100 µsec step-size, TRZ response is found to be matching with the TF model, however, a step-size of 0.6 µsec was required for the BE. Also analyzed the closed loop speed control performance of the hardware-based real time DC servomotor models with discrete PID controller, again by varying the step-size. Both the BE and TRZ models could track the reference speed within 2 msec, because of the PID controller, however faster dynamics was observed in case of TRZ as compared to BE, especially with larger step-size. These analysis shows the effect of step-size and the discretization technique for the real-time modeling, however, with a suitable selected values, the developed FPGA model can be utilized efficiently for the development of suitable control algorithm. | Backward Euler; DC Servomotor; FPGA; High Level Synthesis; Discrete PID Controller; Trapezoidal | Mini K Namboothiripad (Agnel Charities FCRIT Vashi, India) | |
82 | 1570991406 | Efficient 3D Instance Segmentation for Archaeological Sites Using 2D Object Detection and Tracking | This paper introduces an efficient method for 3D instance segmentation based on 2D object detection, applied to the photogrammetric survey images of archaeological sites. The method capitalizes on the relationship between the 3D model and the set of 2D images utilized to compute it. 2D detections on the images are projected and transformed into a 3D instance segmentation, thus identifying unique objects within the scene. The primary contribution of this work is the development of a semi-automatic image annotation method, augmented by an object tracking technique that leverages the temporal continuity of image sequences. Additionally, a novel ad-hoc evaluation process has been integrated into the conventional annotation-training-testing cycle to determine the necessity of additional annotations. This process tests the consistency of the 3D objects yielded by the 2D detection. The efficacy of the proposed method has been validated on the underwater site of Xlendi in Malta, resulting in complete and accurate 3D instance segmentation. Compared to traditional methods, the object tracking approach adopted has facilitated a 90% reduction in the need for manual annotations, The approach streamlines precise 3D detection, establishing a robust foundation for comprehensive 3D instance segmentation. This enhancement enriches the 3D survey, providing profound insights and facilitating seamless exploration of the Xlendi site from an archaeological perspective. | Underwater archaeology; AI; Convolutional Neural Network (CNN); 3D Instance Segmentation; Underwater photogammetry. | Maad Al-Anni (Al-Iraqia University, Iraq); Pierre Drap (Aix Marseille University, France) | |
83 | f | Cyber Resilience Framework: Strengthening Defenses and Enhancing Continuity in Business Security | This study presents a comprehensive Cybersecurity Resilience Framework designed to fortify organizational defenses against the evolving landscape of cyber threats while enhancing business continuity. The aim is to provide businesses with a robust and adaptive strategy that extends beyond traditional cybersecurity paradigms. This study employs a methodology grounded in an extensive cybersecurity literature review to inform the conceptualization and iterative development of a resilient framework, integrating key elements from established sources and aligning with industry wisdom. By integrating governance and leadership principles, collaboration with external stakeholders, and continuous monitoring, the framework fosters a holistic approach to cyber resilience. Leveraging a behavioral perspective, the study explores human factors, user awareness, and decision-making processes, recognizing the critical role of organizational culture in fostering a cybersecurity-aware ethos. Findings reveal a roadmap that includes technology resilience, regular audits, and assessments, emphasizing evidence-based improvements. The framework addresses resource constraints, regulatory variability, and the dynamic threat landscape, promoting adaptability in the face of diverse organizational contexts. The significance of this study lies in its contribution to the ongoing evolution of cyber resilience strategies, offering organizations a practical guide to navigate the complexities of the digital realm. As businesses increasingly rely on interconnected technologies, this framework stands as a vital tool for enhancing security, safeguarding critical assets, and ensuring continuity in the face of an ever-changing cyber threat landscape. | Cyber Security; Threats; Risk Assessments; Resilience Framework; Business Security; Business Continuity | Ahmad Mtair AL-Hawamleh (Institute of Public Administration IPA, Saudi Arabia) | |
84 | 1570991633 | Revolutionizing Cloud-Based Task Scheduling: A Novel Hybrid Algorithm for Optimal Resource Allocation and Efficiency in Contemporary Networked Systems | Need for cloud computing has increased in the age of contemporary networked systems, driving the pursuit of optimal resource allocation and data processing. This is especially important in essential fields where security depends on computing performance, such as transportation systems. Even after much research has been done on the management of resources in cloud computing, finding algorithms that maximize job completion, minimize costs, and maximize resource consumption has remained a top priority. However, existing techniques have shown limitations, which calls for new ways. This is our work, which shown the novel hybrid approach that has the potential to completely change the game. The Neural Network Task Classification (N2TC) is the result of the merging of neural networks with genetic algorithms. This ground-breaking method skillfully applies the Genetic Algorithm Task Assignment (GATA) for resource allocation while utilizing neural networks for task categorization. Notably, our algorithm carefully considers execution time, response time, costs, and system efficiency in order to promote fairness, a defense against resource scarcity. Our method achieves a remarkable 13.3% cost reduction, a stunning 12.1% increase in response time, and a 3.2% increase in execution time. These strong indicators act as a wake-up call, announcing the power and revolutionary potential of our hybrid algorithm in transforming the paradigms around cloud-based task scheduling. This work represents a turning point in cloud computing, demonstrating an innovative combination of algorithms that not only overcomes current constraints but also ushers in a new era of efficacy and efficiency that has far-reaching implications outside the domain of transportation systems. | Cloud computing; Task Scheduling; Resource Allocation; Neural Network; Genetic Algorithm | Punit Mittal and Satender Kumar (Quantum University, India); Swati Sharma (Meerut Institute of Engineering and Technology, India) | |
85 | 1570994783 | Butterfly Image Identification Using Multilevel Thresholding Segmentation and Convolutional Neural Network Classification with Alexnet Architecture | Lepidoptera is the name for the broad group of butterflies. The ecology depends heavily on butterflies, thus it is problematic that so little is known about their many kinds. Understanding butterflies is a crucial part of education since they are a natural occurrence and may be used as teaching tools. A total of 419 butterfly photos were utilized in the data. The dataset is first input, and then it undergoes preprocessing steps like segmentation, scaling, and RGB to grayscale conversion. CNN with AlexNet architecture is used to classify the preprocessed dataset's output. The outcomes of the classification stage of the Alexnet architecture are Flatten, Danse, and ReLu (Convolution, Batch Normalization, Max_Pooling). The output data is assessed following the completion of the Alexnet CNN training process. The data's ultimate classification is based on species. High-accuracy picture classification can be achieved using the model without segmentation, however, this cannot be achieved with multilevel threshold segmentation. According to the test findings, the multilevel threshold segmentation model only attains 62% accuracy, but the segmentation-free model gets 83% accuracy. The test results demonstrate that combining AlexNet architecture with multilevel thresholding segmentation resulted in a classification model that is less accurate in identifying different species of butterflies. By comparing these test results, it is possible to draw the conclusion that the multilevel threshold segmentation model performs less well at information classification than the model without segmentation. | Convolutional Neural Network; Butterfly; Segmentation; Multilevel; Alexnet | Abdul Fadlil and Ainin Maftukhah (Universitas Ahmad Dahlan, Indonesia); Sunardi Sunardi (UAD, Indonesia); Tole Sutikno (Universitas Ahmad Dahlan & Universiti Teknologi Malaysia, Indonesia) | |
86 | 1570995610 | Automatic Detection of COVID-19 from Chest X-Ray Images using EfficientNet-B7 CNN Model with Channel-wise Attention | Since the outbreak of the global COVID-19 pandemic in Wuhan, China, in 2019, its impact has been seen worldwide. Early detection of COVID-19 is very important, as it keeps the infected people isolated from other people, thus minimizing the risk of further transmission. The standard diagnostic approach is based on RT-PCR. However, due to the scarcity of PCR kits in some regions and the costs associated with this technique, there is a growing demand for alternative solutions. Recently, diagnosis of COVID-19 by medical imaging has been recognized as a valid clinical practice. Meanwhile, the massive increase in COVID-19 cases has put considerable pressure on radiologists responsible for interpreting these scans. This paper introduces an automated detection approach as a rapid alternative for COVID-19 diagnosis. We present a deep CNN model to differentiate between normal and pneumonia cases, as well as patients with COVID-19. Our approach is based on EfficientNet-B7 architecture and improved with Squeeze and Excitation block as an attention mechanism. In addition, we propose an innovative architecture that combines CNN with SVM to achieve the best performance. Experimental results show that the proposed framework provides better performance than existing SOTA methods, with an average accuracy of 97.50%, while the precision and recall of COVID-19 are both 100% without any pre- or post-processing. | COVID-19; Chest X-ray; CNN; EfficientNet-B7; Squeeze and Excitation block; Support Vector Machine | Mohamed Rami Naidji (University of Djillali Liabes, Algeria); Zakaria Elberrichi (University Djillali Liabes, Algeria) | |
87 | 1570996865 | Approximate Computing-based Assistive Shopping Trolley for Visually Challenged People | Sighting is one of the five senses that help us to live in this world. According to the World Health Organization (WHO), more than 2 billion people face vision challenges that impose serious life problems. The visually challenged must utilize their senses, i.e., touch, smell, taste, and sound, to perform their daily tasks. Visually challenged people suffer from visual impairment, either partial or total. Their treatment could be corrective eyeglasses, assistive devices, and medical therapy. In this work, we target an assistive device, i.e., we propose, design and implement an approximate computing-based smart shopping cart for visually challenged people. The proposed assistive shopping cart utilizes the Internet of Things (IoT), e.g., Radio Frequency Identification (RFID) sensors, an Infrared (IR) Sensor, and an Arduino microcontroller. Audio was used during the shopping journey to tell the shopper his exact location on the mall, and the name and price of each item he scans. Combining many features in a single cart will result in a revolutionary device that might revolutionize the face of shopping for the visually impaired. The proposed cart improvements include obstacle detection, voice commands, and emergency assistance. The design cart emphasizes the potential of technology to bridge barriers and empower people with disabilities, as well as the beneficial influence that inclusive solutions may have on overall quality of life. | Approximate Computing; Assistive Technology; Internet of Things (IoT); Embedded System; Visually Impaired | Mahmoud Saleh Masadeh (Hijjawi Faculty for Engineering, Yarmouk University, Irbid, Jordan); Esraa Alkhdour, Heba AbuDiak and Rand Obaidat (Yarmouk University, Jordan) | |
88 | 1570997351 | DecentraLend: A Blockchain-based Monetization for Decentralized Lending System | The concept of borrowing or lending or renting goods or tools from others is commonly based on the centralized distribution, which means that the transaction of items takes place between a lender and a borrower. The popularity of the handheld digital devices among mass people and the availability of the secured tracking technologies, such as blockchain, bring the opportunity to introduce a new concept of the decentralized virtual lending or rental system. Since the blockchain eases the financial transactions secured and traceable for individuals, a lent item can be tracked by relating the possessor of that item to a financial transaction. In this paper, we proposed a decentralized virtual lending system based on blockchain for lending and borrowing physical items among individuals or companies. Our proposed system incorporates the monetary value of a physical item in the blockchain and tracks the current possessor and ensure safety of the lent item. Moreover, our proposed decentralized virtual lending system incorporated a recommendation mechanism for the users to borrow an item from the list of best alternatives without visiting a traditional rental company or the owner and allows an individual or a company to monetize by lending their goods and tools to others. | Decentralized app; Blockchain app; Decentralized monetization; Decentralized recommendation | Mostofa Kamal Rasel, Mahamudul Hasan, Mohammad Rifat Ahmmad Rashid, Md Hasanul Ferdaus and Mohammad Manzurul Islam (East West University, Bangladesh); Md Ali (Universiti Technology Malaysia, Malaysia); Maheen Islam (University of Dhaka & East West University, Bangladesh); Md Ariful Islam (East West University, Bangladesh) | |
89 | 1570997799 | Exploring Radio Frequency-Based UAV Localization Techniques: A Comprehensive Review | UAVs (unmanned aerial vehicles) and WSNs (wireless sensor networks) are now two well-established technologies for monitoring, target tracking, event detection, and remote sensing. Typically, WSN is made up of thousands or even millions of tiny, battery-operated devices that measure, gather, and send information from their surroundings to a base station or sink. Within the realm of wireless positioning and communication, UAVs have garnered a lot of interest because of their remarkable mobility and simplistic deployment to tackle the problems of imprecise sensor placement, inadequate infrastructure coverage, and the massive quantity of sensing data that WSN collect. A crucial prerequisite for many position-based WSN applications is node location or localization. The usage of UAVs for localization is more preferable than permanent terrestrial anchor nodes due to their high accuracy and minimal implementation complexity. The possible interference or signal block in such operating environment, however, might cause the Global Positioning System (GPS) to become ineffective or unobtainable. In these conditions, the need for innovative UAV-based sensor nodes location technologies has become essential. Radio frequency (RF) based localization techniques is reviewed in the current paper. We examine the available RF features for localization and look into the current approaches that work well for unmanned vehicles. The most recent research on RF-based UAV localization is reviewed, along with potential avenues for future investigation. | Unmanned Aerial Vehicles; Wireless Sensor Networks; Localization; Radio Frequency | Suha Abdulzahra (University of Babylon, Iraq); Ali Kadhum M. Al-Qurabat (University of Babylon & College of Science for Women, Iraq) | |
90 | 1570998404 | Human Detection in Clear and Hazy Weather Based on Transfer Learning With Improved INRIA Dataset Annotation | Human detection plays a pivotal role in many vision-based applications. Effectively detecting humans across diverse environments and situations significantly contributes to enhancing human safety. However, this effectiveness encounters challenges, particularly in hazy conditions that reduce visibility and blur images, thereby impacting the accuracy of existing detection algorithms. Additionally, the quality of dataset annotations significantly affects the accuracy of these systems. Poor annotations lead to insufficient training of detection models, resulting in higher error rates and reduced efficacy in real-world scenarios. To tackle these challenges, we've introduced new, more precise annotations for the INRIA dataset. These enhancements overcome limitations within the dataset, particularly instances where numerous individuals in images lacked proper labeling. This augmentation aims to improve training robust detection models and provide a more accurate evaluation of the model's performance. Our experiments have yielded notable improvements, showcasing a 20.37% increase in Average Precision and a substantial 68.19% reduction in False Negatives. Moreover, we've developed a deep-learning model for human detection, leveraging transfer learning to fine-tune the YOLOv4 model. Experimental results demonstrate that our proposed model accurately detects pedestrians under various weather conditions, including both clear and hazy scenarios. It achieves high average precision and F-Scores while maintaining efficient real-time operation at 55.4 FPS. These advancements significantly enhance the reliability and applicability of human detection systems. | Human Detection; CNN; Deep Learning; YOLOv4; Transfer Learning; INRIA Dataset | Yassine Bouafia (University of Batna2 & LaSTIC Laboratory, Algeria); Larbi Guezouli (HNS-RE2SD, Batna, Algeria & LEREESI Laboratory, Algeria); Hicham Lakhlef (Heudiasyc, University of Technology of Compiègne, France) |
90 papers.