S. Shanthi , S. Saradha , J.A. Smitha , N. Prasath , H. Anandakumar
{"title":"An efficient automatic brain tumor classification using optimized hybrid deep neural network","authors":"S. Shanthi , S. Saradha , J.A. Smitha , N. Prasath , H. Anandakumar","doi":"10.1016/j.ijin.2022.11.003","DOIUrl":"10.1016/j.ijin.2022.11.003","url":null,"abstract":"<div><p>A significant topic of investigation in the area of medical imaging is brain tumor classification. Since precision is significant for classification, computer vision researchers have developed several approaches, but they still struggle with poor accuracy. In this paper, an automatic optimized hybrid deep neural network (OHDNN) is suggested for brain tumors. The proposed approach consists of two phases such as pre-processing and brain tumor classification. At first, the images are composed of the data, and then the collected imageries are pre-processed by using the following steps such as image enhancement and noise removal. Then the pre-processed images are fed to the classification stage. For the classification process, in this paper, OHDNN is used. The HDNN is a combination of a convolution neural network and long short-term memory (CNN-LSTM). Here, the CNN classifier is used for feature map generation and the classification process LSTM classifier is used. Besides, to improve the performance of the CNN-LSTM classifier, the parameter extant in the classifiers is randomly selected utilizing the adaptive rider optimization (ARO) algorithm. For the experimental process, an MRI image dataset is utilized. The experimental results show proposed approach attained the maximum accuracy of 97.5.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 188-196"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000239/pdfft?md5=4f4b0efe7d943431b7e6ab7b8342a453&pid=1-s2.0-S2666603022000239-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80694039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine learning and quantum computing for 5G/6G communication networks - A survey","authors":"Suriya M","doi":"10.1016/j.ijin.2022.11.004","DOIUrl":"https://doi.org/10.1016/j.ijin.2022.11.004","url":null,"abstract":"<div><p>Recently fifth generation (5G) and beyond applications are evolving, which demands more computational and complex data processing. Quantum computing and quantum learning algorithms are incorporated to enhance processing capabilities and data computation compared to conventional machine learning approaches. This study presents the significance of quantum computing and quantum machine learning models and their research challenges concerning 5G and beyond applications. The researchers focus on global coverage, enhanced spectrum support, increased energy and cost efficiency, high security, and dynamic intelligence, along with big data processing that demands complex data structures and algorithms.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 197-203"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000240/pdfft?md5=db0140218702517bb55e207933ca8c9e&pid=1-s2.0-S2666603022000240-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137227980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remora optimization algorithm-based optimized node clustering technique for reliable data delivery in VANETs","authors":"Swathi Konduru , M. Sathya","doi":"10.1016/j.ijin.2022.07.002","DOIUrl":"10.1016/j.ijin.2022.07.002","url":null,"abstract":"<div><p>Vehicular ad hoc Network (VANET) is one of the recently growing trends which motivate the provision of several service providers in the urban areas. In VANETs, the vehicles represent the nodes in the network topology that needs to guarantee better cooperation when there is a higher node density. Moreover, the problem of determining an optimal route and achieving network scalability is a herculean task. In this context, the incorporation of a potential clustering algorithm has the possibility of improving the road safety and facilitating a reliable option of promoting message routing. The clustering protocols are determined to be the ideal candidate for solving the problems of network scalability to guarantee reliable data dissemination. In this paper, Remora optimization algorithm-based Optimized Node Clustering (ROAONC) Technique is proposed for node clustering in VANETs to achieved optimal CH selection process. This ROAONC scheme was proposed for minimizing network overhead in the scenarios of unpredictable node density. The simulation results of this ROAONC scheme confirmed better performance in terms of transmission range, node density, network area and number of clusters compared to the competitive ant colony, grey wolf, grasshopper, and dragonfly optimization algorithm-based clustering protocols.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 74-79"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000082/pdfft?md5=1c34e7af1d5a3879e53b71b071d8e46a&pid=1-s2.0-S2666603022000082-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77721851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development and performance evaluation of Correntropy Kalman Filter for improved accuracy of GPS position estimation","authors":"Sirish Kumar Pagoti , Srilatha Indira Dutt Vemuri","doi":"10.1016/j.ijin.2022.01.002","DOIUrl":"10.1016/j.ijin.2022.01.002","url":null,"abstract":"<div><p>It is well known that a Global Positioning System (GPS) receiver needs to ‘see’ at least four satellites to provide a three-dimensional fix solution. However, if any GPS receiver is operated in urban canyons, the visibility further reduces. To improve the position estimation accuracy, a novel kinematic positioning algorithm designated as Correntropy Kalman Filter (CKF) is proposed in this study. Instead of minimum mean square error (MMSE), the correntropy criterion (CC) is used as the optimality criterion of CKF. Like the traditional Kalman Filter (KF), the prior estimate of the state and covariance matrix are computed in CKF, and a novel fixed-point algorithm is then used to update the posterior estimates. The data of a dual-frequency GPS receiver located at the Indian Institute of Science (IISc), Bangalore (13.021°N/77.5°E) is collected from Scripps Orbit and Permanent Array Centre (SOPAC) to implement the proposed algorithm. The results of the proposed CKF algorithm are promising and exhibit significant improvement in position estimation compared to the conventional methods.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 1-8"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000021/pdfft?md5=51aea651ebdade2d4c3fd01491e80616&pid=1-s2.0-S2666603022000021-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75487717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radix Trie improved Nahrain chaotic map-based image encryption model for effective image encryption process","authors":"Fazly Salleh Abas , R Arulmurugan","doi":"10.1016/j.ijin.2022.08.002","DOIUrl":"10.1016/j.ijin.2022.08.002","url":null,"abstract":"<div><p>As the intrinsic features of images include huge size and additional correlation prevailing among pixels, it is tedious to accomplish by using outdated models. The cryptographic features of Chaotic Maps (CM), including early criteria and random nature, aid in designing novel Image Encryption (IE) methods. In this paper, Nahrain Map with Radix Trie-based Image Encryption (NMRTIE) model is proposed to guarantee image encryption that resists known attacks that could be launched during its transmission in the cloud environment. The propounded NMRTIE model includes three essential phases: NCM-based Image Encryption (IE), Radix Trie (RT) based scrambling, and incessant diffusion. Initially, the NCM model uses more than one chaotic function to produce a sequence of keys. The RT model eases scrambling, where the rows and columns' pixels are swapped substantially. Lastly, the propounded diffusion scheme cooperates with NCM to produce key streams for remarkably hastening diffusion and dispersing effect. The propounded NMRTIE model is evaluated, and the results are confirmed based on numerous characteristics. The investigational consequence confirms that the propounded NMRTIE scheme is more appropriate than the associated approaches.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 102-108"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000100/pdfft?md5=a6ab2c96f5980eb523a11448d7bb76b4&pid=1-s2.0-S2666603022000100-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75100302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Premkumar , S.R. Ashokkumar , G. Mohanbabu , V. Jeevanantham , S. Jayakumar
{"title":"Security behavior analysis in web of things smart environments using deep belief networks","authors":"M. Premkumar , S.R. Ashokkumar , G. Mohanbabu , V. Jeevanantham , S. Jayakumar","doi":"10.1016/j.ijin.2022.10.003","DOIUrl":"10.1016/j.ijin.2022.10.003","url":null,"abstract":"<div><p>The advancements in modern wireless communications enhances the Internet of Things (IoT) which in turns the extensive variety of applications which covers smart home, healthcare, smart energy, and Industrial 4.0. The idea of the Web of Things (WoT) was established to expand the potential of these smart devices. It enables the devices that are connected through a common network. It has played a significant part in connecting all smart devices over the internet, allowing them to share services and resources globally. However, as devices become more connected, they become more exposed to various forms of malicious activities. The DDoS and DoS attacks are the major one that can disrupt the regular operation of network and expose the malicious information. So detecting and preventing the attacks in the WoT is a significant research area. The deep belief networks based intrusion detection system is proposed in this paper to detect the malicious activities like Normal, Botnet, Brute Force, Dos/DDos, Infiltration, PortScan and Web based attacks in WoTs. We examined the proposed method with the CICIDS2017 dataset for training and testing purposes and also achieved the average of 97.8% of accuracy and 97.6% of detection rate.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 181-187"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000203/pdfft?md5=729ad5f88bc4ff6261dceb331c08e6a0&pid=1-s2.0-S2666603022000203-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79314895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saifur Rahman Sabuj , Maisha Rubaiat , Mehzabien Iqbal , Monica Mobashera , Afrida Malik , Imtiaz Ahmed , Mohammad Abdul Matin
{"title":"Machine-type communications in NOMA-based terahertz wireless networks","authors":"Saifur Rahman Sabuj , Maisha Rubaiat , Mehzabien Iqbal , Monica Mobashera , Afrida Malik , Imtiaz Ahmed , Mohammad Abdul Matin","doi":"10.1016/j.ijin.2022.04.002","DOIUrl":"10.1016/j.ijin.2022.04.002","url":null,"abstract":"<div><p>Terahertz (THz) band is one of the most promising aspects of wireless communication systems because of its potential to meet the growing demands for the envisioned next-generation of cellular communications. THz band connectivity can alleviate bandwidth shortages and transmit power constraints using multiple-input multiple-output (MIMO) systems. To obtain better throughput and enhanced spectral efficiency, non-orthogonal multiple access (NOMA) configuration can be incorporated into MIMO systems, as NOMA uses non-orthogonal resource allocation by assigning the same carrier frequency to multiple devices in the power domain. In this paper, we focus on 2 × 1 MIMO-NOMA and cooperative 2 × 1 MIMO-NOMA systems for THz spectrum in the downlink transmission. In order to evaluate the effectiveness of the proposed system architecture, we derive accurate data rate, transmission latency, and reliability expressions for 2 × 1 MIMO-NOMA system consists of critical and non-critical devices by leveraging finite block length theory. Moreover, we derive the closed-form expressions for power splitting coefficients, data rate, transmission latency, and reliability for the considered cooperative 2 × 1 MIMO-NOMA system. Extensive numerical results are presented to validate the feasibility of the proposed 2 × 1 MIMO-NOMA as well as the cooperative 2 × 1 MIMO-NOMA systems in the THz band.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 31-47"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000045/pdfft?md5=ec5bae3460f4ee4ff6560e93d34c5dc8&pid=1-s2.0-S2666603022000045-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82178354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohd Javaid , Abid Haleem , Ravi Pratap Singh , Rajiv Suman , Shanay Rab
{"title":"Significance of machine learning in healthcare: Features, pillars and applications","authors":"Mohd Javaid , Abid Haleem , Ravi Pratap Singh , Rajiv Suman , Shanay Rab","doi":"10.1016/j.ijin.2022.05.002","DOIUrl":"10.1016/j.ijin.2022.05.002","url":null,"abstract":"<div><p>Machine Learning (ML) applications are making a considerable impact on healthcare. ML is a subtype of Artificial Intelligence (AI) technology that aims to improve the speed and accuracy of physicians' work. Countries are currently dealing with an overburdened healthcare system with a shortage of skilled physicians, where AI provides a big hope. The healthcare data can be used gainfully to identify the optimal trial sample, collect more data points, assess ongoing data from trial participants, and eliminate data-based errors. ML-based techniques assist in detecting early indicators of an epidemic or pandemic. This algorithm examines satellite data, news and social media reports, and even video sources to determine whether the sickness will become out of control. Using ML for healthcare can open up a world of possibilities in this field. It frees up healthcare providers' time to focus on patient care rather than searching or entering information. This paper studies ML and its need in healthcare, and then it discusses the associated features and appropriate pillars of ML for healthcare structure. Finally, it identified and discussed the significant applications of ML for healthcare. The applications of this technology in healthcare operations can be tremendously advantageous to the organisation. ML-based tools are used to provide various treatment alternatives and individualised treatments and improve the overall efficiency of hospitals and healthcare systems while lowering the cost of care. Shortly, ML will impact both physicians and hospitals. It will be crucial in developing clinical decision support, illness detection, and personalised treatment approaches to provide the best potential outcomes.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 58-73"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000069/pdfft?md5=2259f97c985b93b68b9b7921ffedeba9&pid=1-s2.0-S2666603022000069-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83431241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Henry Eric Kapalamula, Justice Stanley Mlatho, Paul Stone Macheso
{"title":"Design and implementation of a Social Distance Vest for Covid19 prevention (SODIV-COP)","authors":"Henry Eric Kapalamula, Justice Stanley Mlatho, Paul Stone Macheso","doi":"10.1016/j.ijin.2022.08.003","DOIUrl":"10.1016/j.ijin.2022.08.003","url":null,"abstract":"<div><p>According to research, it is discovered that amongst the Covid19 preventive measures, social distance is easily neglected especially in a public setting such as markets, trading centers, social and political gatherings. Furthermore, according to World Health Organization (WHO), not observing social distance is one the major ways that the corona virus is being transmitted. Hence, working on a vest that can help to remind individuals and alert them in cases where they are not observing social distance. The Social Distance Vest for Covid19 Prevention, is based on Arduino Uno microcontroller board, D6T-44L-06 thermal sensor which detects the presence of a person, HC-SR04 Ultrasonic sensor that calculates the distance from where the person is standing and an alert/warning system that is composed of a Light Emitting Diode and a buzzer. Finally, the whole system is mounted on a reflective vest. The prototype vest works perfectly, in that it is able to detect a person which was not possible in the previous covid 19 distance vests which had only messages, and it is able to calculate the distance from where humans are standing and finally, triggers an alarm in a case where the person is standing at a distance of less than 1 m. The varying temperature ranges were in an array form and from 35 to 38° Celsius it detected the obstacle to be a human and had some ranges of distance 0.334 m measured by the ultrasonic sensor. Key applications of the prototypes are in crowded places like stadiums hospitals and schools.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 113-118"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000112/pdfft?md5=7019b8e6ab6f3e3ee2b600b892d72157&pid=1-s2.0-S2666603022000112-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80030328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved constrained social network rating-based neural network technique for recommending products in E-commerce environment","authors":"Lohith Ottikunta","doi":"10.1016/j.ijin.2022.07.001","DOIUrl":"10.1016/j.ijin.2022.07.001","url":null,"abstract":"<div><p>In the modern world, the essentiality in the utilization of the e-commerce contents like movies, music and electronic goods becomes indispensable with diversified items searched over the internet. The relevant results of the items search are made feasible through the enforcement of filtering techniques since it determines relevant data for recommendation of an item. A diversified number of filtering schemes are available of filtering the data instead of accessing each data available on the internet for deriving associated results. The data access and efficiency, the process of identifying relevant results based on users’ preferences is challenging task. In this paper, the proposed Constrained Social Network Rating-based Neural Network Technique (CSNR-NNT) is presented with the key significances and implementation processes. This proposed CSNR-NNT significantly concentrates on the exploration of trustee information that aids in social content persuading selection process for facilitating superior recommendation. The proposed CSNR-NNT scheme utilized the benefits of neural learning for ensuring recommendation through the incorporation of distrust and trustee relation. This proposed CSNR-NNT scheme also aids in categorizing the positive and negative recommendation of the trustee based on the process of the prediction.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 80-86"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000070/pdfft?md5=87ad3ea9e9bff958fd0a38bc82a5cf98&pid=1-s2.0-S2666603022000070-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73240523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}