International Journal of Intelligent Networks最新文献

筛选
英文 中文
Unsupervised machine learning technique for classifying production zones in unconventional reservoirs 非常规油藏生产区划分的无监督机器学习技术
International Journal of Intelligent Networks Pub Date : 2023-01-01 DOI: 10.1016/j.ijin.2022.11.007
Karrar A. Abbas , Amir Gharavi , Noor A. Hindi , Mohamed Hassan , Hala Y. Alhosin , Jebraeel Gholinezhad , Hesam Ghoochaninejad , Hossein Barati , James Buick , Paria Yousefi , Reham Alasmar , Salam Al-Saegh
{"title":"Unsupervised machine learning technique for classifying production zones in unconventional reservoirs","authors":"Karrar A. Abbas ,&nbsp;Amir Gharavi ,&nbsp;Noor A. Hindi ,&nbsp;Mohamed Hassan ,&nbsp;Hala Y. Alhosin ,&nbsp;Jebraeel Gholinezhad ,&nbsp;Hesam Ghoochaninejad ,&nbsp;Hossein Barati ,&nbsp;James Buick ,&nbsp;Paria Yousefi ,&nbsp;Reham Alasmar ,&nbsp;Salam Al-Saegh","doi":"10.1016/j.ijin.2022.11.007","DOIUrl":"https://doi.org/10.1016/j.ijin.2022.11.007","url":null,"abstract":"<div><p>Significant amounts of information are rapidly increasing in bulk as a consequence of the rapid development of unconventional tight reservoirs. The geomechanical and petrophysical characteristics of the wellbore rocks influence the sweet and non-sweet areas of tight unconventional reservoirs. Using standard approaches, such as data from cores and commercial software, it is difficult and costly to locate productive zones. Furthermore, it is difficult to apply these techniques to wells that do not have cores. This study presents a less costly way for the systematic and objective detection of productive and non-productive zones via well-log data using clustering unsupervised and supervised machine learning algorithms. The method of cluster analysis has been used in order to classify the productive and non-productive reservoir rock groups in the tight reservoir. This was accomplished by assessing the variability of the reservoir characteristics data that are forecasted by looking at the dimensions of the well logs. The Support vector machine as a supervised machine learning algorithm is then used to evaluate the classification accuracy of the unsupervised algorithms based on the clustering labels. The application made use of approximately ten different variables of rock characteristics including zonal depth, effective porosity, permeability, shale volume, water saturation, total organic carbon, young's modulus, Poisson's ratio, brittleness index, and pore size. The findings show that both clustering techniques identified the sweet areas with high accuracy and were less time-consuming.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 29-37"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50194732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing vulnerability scoring for information security in intelligent computers 提高智能计算机信息安全漏洞评分
International Journal of Intelligent Networks Pub Date : 2023-01-01 DOI: 10.1016/j.ijin.2023.09.002
Qingkun Zhu
{"title":"Enhancing vulnerability scoring for information security in intelligent computers","authors":"Qingkun Zhu","doi":"10.1016/j.ijin.2023.09.002","DOIUrl":"https://doi.org/10.1016/j.ijin.2023.09.002","url":null,"abstract":"<div><p>Rapid computer and internet technology advancements have catalyzed continuous breakthroughs and innovations in related fields, significantly impacting social production and individual lifestyles. A critical challenge addressed here is the inadequacy of existing methods for assessing computer vulnerabilities. The vulnerability scoring model for intelligent vehicles (VSMIV) is proposed to solve the issue in intelligent computers. A key aspect involves optimizing the attack vector and attack complexity of common vulnerabilities and exposures (CVEs) to align with the specific behaviour of intelligent computers. The model's effectiveness is enhanced by integrating four distinct indicators: property security, privacy security, functional security, and life security. The diversity ratings indicate that the VSMIV scoring system has the highest diversity of system distribution at 95%, followed by CVSS<sub>IoT</sub> at 88%, and CVSS with a slightly lower diversity score of 85%. The proposed methodology holds promise in establishing a new paradigm for strengthening the security of computer systems, thereby stimulating their flexibility in the face of emerging threats.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 253-260"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50194835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing 一种新的有效的轻量级同态密码算法用于云计算中的数据安全
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.04.001
Fursan Thabit , Ozgu Can , Sharaf Alhomdy , Ghaleb H. Al-Gaphari , Sudhir Jagtap
{"title":"A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing","authors":"Fursan Thabit ,&nbsp;Ozgu Can ,&nbsp;Sharaf Alhomdy ,&nbsp;Ghaleb H. Al-Gaphari ,&nbsp;Sudhir Jagtap","doi":"10.1016/j.ijin.2022.04.001","DOIUrl":"10.1016/j.ijin.2022.04.001","url":null,"abstract":"<div><p>Cloud computing is a technology in which the resources are delivered as services. Users can access them anywhere, anytime via the Internet without any need to know the infrastructure knowledge, experience, or even authority that provides such services. It has become an important medium for enterprises to develop their networks because of these resources. With the growing need for cloud computing, security is becoming important for both individuals and business needs. Many researchers have studied the security of cloud computing. Still, security gaps or threats are increasing as the demand for cloud computing connectivity increases. Because a third party mostly provides cloud platforms to the cloud client, data protection in the cloud is the primary issue. This paper presents a novel, effective lightweight homomorphic cryptographic algorithm which contains two layers of encryption. The first layer uses the new effective, light-weight cryptographic algorithm and the second layer multiplicative homomorphic schemes considered for improving security data in cloud computing. This approach offers both symmetric and asymmetric cryptography features. The proposed approach's performance is evaluated using a variety of metrics, including memory, computational time and (key sensitivity), statistical analysis, image histogram, and entropy change analysis. The proposed algorithm's experimental findings showed a high level of security and an apparent improvement in encryption execution time, memory usage, and throughput. When compared to the cryptographic systems widely used in cloud computing.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 16-30"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000033/pdfft?md5=742bb8b72e5d6808048aeee52d95b60f&pid=1-s2.0-S2666603022000033-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73726481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An optimal construction of smart aged homes based on SDLC using smart sensors and agent networks 一种基于SDLC的智能老年住宅优化构建方法,采用智能传感器和智能体网络
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.09.003
R. Subha , Jun Zhang
{"title":"An optimal construction of smart aged homes based on SDLC using smart sensors and agent networks","authors":"R. Subha ,&nbsp;Jun Zhang","doi":"10.1016/j.ijin.2022.09.003","DOIUrl":"10.1016/j.ijin.2022.09.003","url":null,"abstract":"<div><p>With the increased growth of the added population group and advancements in health informatics, the smart aged home needs to be equipped with intelligent systems and various electronic devices. Industry 5.0 is yet another revolution that bought about the transformation in the practices concerning the use of intelligent technology with smart sensors and agent networks. Smart sensors enabled industry 5.0 is equipped with automation and self-monitoring ability that assists with analyzing the issues without the intervention of human beings. We, in this paper, proposed an iterative development process based on the smart sensor and agent networks of the SDLC software development models. The proposed model is developed by synchronizing the smart aged home with the cyber-physical system of industry 5.0. The quality value matrix is introduced as a tool to identify the requirements of the residents and the stakeholders. The feasibility of the proposed work is assessed with the help of an agent-based simulation system.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 138-142"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000161/pdfft?md5=d22f609597bb46dbb1ec27cfd354bd20&pid=1-s2.0-S2666603022000161-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78703689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new secure 2PL real-time concurrency control algorithm (ES2PL) 一种新的安全2PL实时并发控制算法(ES2PL)
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.05.001
Ebrahim Abduljalil , Fursan Thabit , Ozgu Can , Pritam R. Patil , S.B. Thorat
{"title":"A new secure 2PL real-time concurrency control algorithm (ES2PL)","authors":"Ebrahim Abduljalil ,&nbsp;Fursan Thabit ,&nbsp;Ozgu Can ,&nbsp;Pritam R. Patil ,&nbsp;S.B. Thorat","doi":"10.1016/j.ijin.2022.05.001","DOIUrl":"10.1016/j.ijin.2022.05.001","url":null,"abstract":"<div><p>A secure concurrency control algorithms must be devoid of covert channels originating from data conflicts between transactions, in addition to ensuring database integrity. Current secure concurrency control algorithms mistreat transactions with higher access classes. Because it better solves the priority inversion problem. A widely used concurrency control algorithm is the two-phase locking with high priority (2 PL-HP). The inclusion of cyclic restart, deadlock, unnecessary abort, pseudo-priority inversion, and starvation, on the other hand, may reduce its performance. In this paper, a new enhanced of secure two-phase locking protocol with multilevel secure distributed database systems is presented, the idea of enhanced secure Two-Phase locking protocol by adding the security level to assign the priority to the transaction. The enhanced add a secure manager to decide the level of the security and give the instruction to process the transaction in real lock with data x/virtual lock with version data x0 or decided to Abort the transaction based on the security level. The suggested study intends to reduce transaction miss rate by addressing the following issues: deadlock by splitting the execution stage into locking and processing phases, it reduces unnecessary cycle restart, transaction aborts by checking the security priority level (high, medium, low), and generating virtual lock and versions data. Finally, simulation performance confirms that improvement in transactions miss's percent and reduction in transactions' rollbacks compared to other secure concurrency control.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 48-57"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000057/pdfft?md5=d2e2e645ad1d978c06bc941ecae293c4&pid=1-s2.0-S2666603022000057-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91479633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PE-DeepNet: A deep neural network model for pulmonary embolism detection PE-DeepNet:用于肺栓塞检测的深度神经网络模型
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.10.001
Damian Lynch , Suriya M
{"title":"PE-DeepNet: A deep neural network model for pulmonary embolism detection","authors":"Damian Lynch ,&nbsp;Suriya M","doi":"10.1016/j.ijin.2022.10.001","DOIUrl":"10.1016/j.ijin.2022.10.001","url":null,"abstract":"<div><p>Machine learning in medical image processing has shown to be a useful way for discovering patterns in both poorly labelled and unlabeled datasets. Venous thromboembolism, which includes deep vein thrombosis and pulmonary embolism, is a major cause of death in patients and requires quick detection by specialists. Using an artificial neural network, the suggested study was carried out to aid doctors in identifying and forecasting the risk level of pulmonary embolism in patients. This research presents a hybrid deep learning convolutional neural network model called PE-DeepNet (Pulmonary Embolism detection using Deep neural Network) to perform quick and accurate pulmonary embolism detection. The experiment uses a case study from the standard RSNA STR Pulmonary Embolism Chest CT scan image dataset. The proposed work results in an accuracy of 94.2%, an improvement over existing CNN models with minor trainable parameters.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 176-180"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000185/pdfft?md5=fe8baf48f3fa5865d5ca0cb0c3b749a2&pid=1-s2.0-S2666603022000185-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87178258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhancing investigations in data migration and security using sequence cover cat and cover particle swarm optimization in the fog paradigm 在雾模式下,利用序列覆盖cat和覆盖粒子群优化加强数据迁移和安全性的研究
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.11.002
T. Saravanan , S. Saravanakumar
{"title":"Enhancing investigations in data migration and security using sequence cover cat and cover particle swarm optimization in the fog paradigm","authors":"T. Saravanan ,&nbsp;S. Saravanakumar","doi":"10.1016/j.ijin.2022.11.002","DOIUrl":"10.1016/j.ijin.2022.11.002","url":null,"abstract":"<div><p>In recent years, fog and mobile edge computing have grown rapidly due to the large amount of data generated by the Internet of Thing (IoT) devices. It provides a variety of services within the end user IoT environment, but suffers from inefficient scheduling, which results in more significant delays than cloud computing. In this research we propose a data migration procedure that beats the metrics of delay, response time, and load balancing rate in the fog computing paradigm. It is possible to reduce the amount of replicated and integrated data by using Sequence Cover Cat Swarm Optimization (SCCSO) and Sequence Cover Particle Swarm Optimization (SCPSO) by using appropriate Virtual machines (VMs) which lock highly used machines and give service to low used machines in cloud communication storage.; this allows us to obtain resources efficiently in the fog environment. After being tested in the iFogsim climate, The protocols performed better in the iFogsim climate in terms of response time, scheduling time load balancing rate and delay than the other scheduling algorithms.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 204-212"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000227/pdfft?md5=8aba7309e338c223536254e7fb1f2c20&pid=1-s2.0-S2666603022000227-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76561016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Internet of Things in the global healthcare sector: Significance, applications, and barriers 物联网在全球医疗保健领域:意义、应用和障碍
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.10.002
Mohd Javaid , Abid Haleem , Ravi Pratap Singh , Shanay Rab , Mir Irfan Ul Haq , Ankush Raina
{"title":"Internet of Things in the global healthcare sector: Significance, applications, and barriers","authors":"Mohd Javaid ,&nbsp;Abid Haleem ,&nbsp;Ravi Pratap Singh ,&nbsp;Shanay Rab ,&nbsp;Mir Irfan Ul Haq ,&nbsp;Ankush Raina","doi":"10.1016/j.ijin.2022.10.002","DOIUrl":"10.1016/j.ijin.2022.10.002","url":null,"abstract":"<div><p>Internet of Things (IoT) is a modern paradigm with broad applications in various industries, including healthcare and its associated fields. The full implementation of this technology in the healthcare field is a shared goal, as it enables medical services to operate more efficiently and patients to receive quality care. There are various IoT technology-based healthcare system applications for improving the efficacy and quality of diagnosis &amp; treatments. Globally, the healthcare sector is in a peculiar state. The global population is ageing, and the number of lifestyle and chronic diseases is increasing, whereas individual aspirations are increasing, whereas healthcare is getting expensive. Technological interventions can help to solve this problem. One aspect of problem-solving can be bringing health checkups from the hospital to the patients. This paper aims to study the IoT and its implementation in healthcare. Smart Features, Supportive Enablers, and Operative Work-Process Flow of IoT in the Healthcare Domain are discussed diagrammatically. In this paper, we identified and studied the significant applications of IoT for Healthcare. Various barriers and future challenges in adopting IoT in Healthcare services are also discussed. IoT in healthcare is beneficial at various stages of the patient healthcare-system relationship. Thus, Healthcare providers can obtain necessary health data via real-time monitoring of a patient's condition through intelligent medical devices linked to a mobile application. A physician can assess the patient's condition to develop a better treatment process. In healthcare, this technology can result in significant advancements in patient care management.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 165-175"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000197/pdfft?md5=1b1ac58f01a3ad7de1cbd4179dd96387&pid=1-s2.0-S2666603022000197-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87234135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Artificial intelligence (AI) applications for marketing: A literature-based study 人工智能(AI)应用于市场营销:基于文献的研究
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.08.005
Abid Haleem , Mohd Javaid , Mohd Asim Qadri , Ravi Pratap Singh , Rajiv Suman
{"title":"Artificial intelligence (AI) applications for marketing: A literature-based study","authors":"Abid Haleem ,&nbsp;Mohd Javaid ,&nbsp;Mohd Asim Qadri ,&nbsp;Ravi Pratap Singh ,&nbsp;Rajiv Suman","doi":"10.1016/j.ijin.2022.08.005","DOIUrl":"10.1016/j.ijin.2022.08.005","url":null,"abstract":"<div><p>Artificial Intelligence (AI) has vast potential in marketing. It aids in proliferating information and data sources, improving software's data management capabilities, and designing intricate and advanced algorithms. AI is changing the way brands and users interact with one another. The application of this technology is highly dependent on the nature of the website and the type of business. Marketers can now focus more on the customer and meet their needs in real time. By using AI, they can quickly determine what content to target customers and which channel to employ at what moment, thanks to the data collected and generated by its algorithms. Users feel at ease and are more inclined to buy what is offered when AI is used to personalise their experiences. AI tools can also be used to analyse the performance of a competitor's campaigns and reveal their customers' expectations. Machine Learning (ML) is a subset of AI that allows computers to analyse and interpret data without being explicitly programmed. Furthermore, ML assists humans in solving problems efficiently. The algorithm learns and improves performance and accuracy as more data is fed into the algorithm. For this research, relevant articles on AI in marketing are identified from Scopus, Google scholar, researchGate and other platforms. Then these articles were read, and the theme of the paper was developed. This paper attempts to review the role of AI in marketing. The specific applications of AI in various marketing segments and their transformations for marketing sectors are examined. Finally, critical applications of AI for marketing are recognised and analysed.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 119-132"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000136/pdfft?md5=8b54967bcc5b749f2f1bf4f9c2dfbab9&pid=1-s2.0-S2666603022000136-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88368944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
An efficient automatic brain tumor classification using optimized hybrid deep neural network 基于优化混合深度神经网络的高效脑肿瘤自动分类
International Journal of Intelligent Networks Pub Date : 2022-01-01 DOI: 10.1016/j.ijin.2022.11.003
S. Shanthi , S. Saradha , J.A. Smitha , N. Prasath , H. Anandakumar
{"title":"An efficient automatic brain tumor classification using optimized hybrid deep neural network","authors":"S. Shanthi ,&nbsp;S. Saradha ,&nbsp;J.A. Smitha ,&nbsp;N. Prasath ,&nbsp;H. Anandakumar","doi":"10.1016/j.ijin.2022.11.003","DOIUrl":"10.1016/j.ijin.2022.11.003","url":null,"abstract":"<div><p>A significant topic of investigation in the area of medical imaging is brain tumor classification. Since precision is significant for classification, computer vision researchers have developed several approaches, but they still struggle with poor accuracy. In this paper, an automatic optimized hybrid deep neural network (OHDNN) is suggested for brain tumors. The proposed approach consists of two phases such as pre-processing and brain tumor classification. At first, the images are composed of the data, and then the collected imageries are pre-processed by using the following steps such as image enhancement and noise removal. Then the pre-processed images are fed to the classification stage. For the classification process, in this paper, OHDNN is used. The HDNN is a combination of a convolution neural network and long short-term memory (CNN-LSTM). Here, the CNN classifier is used for feature map generation and the classification process LSTM classifier is used. Besides, to improve the performance of the CNN-LSTM classifier, the parameter extant in the classifiers is randomly selected utilizing the adaptive rider optimization (ARO) algorithm. For the experimental process, an MRI image dataset is utilized. The experimental results show proposed approach attained the maximum accuracy of 97.5.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 188-196"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000239/pdfft?md5=4f4b0efe7d943431b7e6ab7b8342a453&pid=1-s2.0-S2666603022000239-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80694039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信