Emmanuel Gbenga Dada, David Opeoluwa Oyewola, Sanjay Misra
{"title":"Computer-aided diagnosis of breast cancer from mammogram images using deep learning algorithms","authors":"Emmanuel Gbenga Dada, David Opeoluwa Oyewola, Sanjay Misra","doi":"10.1186/s43067-024-00164-y","DOIUrl":"https://doi.org/10.1186/s43067-024-00164-y","url":null,"abstract":"Even though accurate detection of dangerous malignancies from mammogram images is mostly dependent on radiologists' experience, specialists occasionally differ in their assessments. Computer-aided diagnosis provides a better solution for image diagnosis that can help experts make more reliable decisions. In medical applications for diagnosing cancerous growths from mammogram images, computerized and accurate classification of breast cancer mammogram images is critical. The deep learning approach has been widely applied in medical image processing and has had considerable success in biological image classification. The Convolutional Neural Network (CNN), Inception, and EfficientNet are proposed in this paper. The proposed models attain better performance compared to the conventional CNN. The models are used to automatically classify breast cancer mammogram images from Kaggle into benign and malignant. Simulation results demonstrated that EfficientNet, with an accuracy between 97.13 and 99.27%, and overall accuracy of 98.29%, perform better than the other models in this paper. ","PeriodicalId":100777,"journal":{"name":"Journal of Electrical Systems and Information Technology","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three-phase balance relay using numerical techniques experimentally verified on synchronous machines","authors":"R. A. Mahmoud, E. S. Elwakil","doi":"10.1186/s43067-024-00163-z","DOIUrl":"https://doi.org/10.1186/s43067-024-00163-z","url":null,"abstract":"In this paper, a multifunction three-phase balance relay based on normalized correlation coefficients is proposed to detect and estimate imbalances and perturbations in synchronous machine output signals. Furthermore, fresh definitions of imbalance and disturbance indicators derived using the correlation estimators are introduced, taking into account the changes in the waveform phase displacement, frequency, amplitude, and shape of the machine three-phase waves. Experimental tests are performed on a motor–generator set connected to a three-phase load, which is used to identify and evaluate the imbalance and disturbance conditions of the voltage and current measurements. Extensive tests for different fault types have been presented. The practical results show that the proposed protection can respond quickly to faults, and assess online the level of the imbalance/disturbance with high accuracy. Its running time is within one cycle. In addition, the proposed algorithm’s reliability and accuracy are its most significant attributes, whose percentages exceed 96.6%. The present algorithm considers the impact of both negative and zero sequence components when measuring di-symmetry factors, while some conventional approaches merely rely on the negative sequence component computed for the machine voltages and currents.","PeriodicalId":100777,"journal":{"name":"Journal of Electrical Systems and Information Technology","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Apeksha Pandey, Manepalli Sai Teja, Parul Sahare, Vipin Kamble, Mayur Parate, Mohammad Farukh Hashmi
{"title":"Skin cancer classification using non-local means denoising and sparse dictionary learning based CNN","authors":"Apeksha Pandey, Manepalli Sai Teja, Parul Sahare, Vipin Kamble, Mayur Parate, Mohammad Farukh Hashmi","doi":"10.1186/s43067-024-00162-0","DOIUrl":"https://doi.org/10.1186/s43067-024-00162-0","url":null,"abstract":"Skin conditions are becoming increasingly prevalent across the world in current times. With the rise in dermatological disorders, there is a need for computerized techniques that are completely noninvasive to patients’ skin. As a result, deep learning models have become standard for the computerized detection of skin diseases. The performance efficiency of these models improves with access to more data with their primary aim being image classification. In this paper, we present a skin disease detection methodology using image processing techniques, non-local means denoising and convolutional neural network (CNN) backed by sparse dictionary learning. Here, the major benefit of using NLM denoising followed by sparse dictionary learning with CNNs in image classification lies in leveraging a multi-stage approach that enhances the quality of input data, extracts meaningful and discriminative features, and improves the overall performance of the classification model. This combined approach addresses challenges such as noise robustness, feature extraction, and classification accuracy, making it particularly effective in complex image analysis tasks. For denoising, the average Peak Signal to Noise Ratio (PSNR) obtained for images from HAM-10000 dataset is 33.59 dB. For the ISIC-2019 dataset, the average PSNR for the train folder is 34.37 dB, and for the test folder it is 34.39 dB. The deep learning network is trained for the analysis of skin cancer images using a CNN model and is achieving acceptable results in classifying skin cancer types. The datasets used contain high-resolution images. After all the tests, the accuracy obtained is 85.61% for the HAM-10000 dataset and 81.23% for the ISIC-2019 dataset, which is on par with existing approaches validated by benchmarking results.","PeriodicalId":100777,"journal":{"name":"Journal of Electrical Systems and Information Technology","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shaza M. Elnady, Anwer S. Abd El-Hameed, Eman G. Ouf
{"title":"Innovative K-band slot antenna array for radar applications","authors":"Shaza M. Elnady, Anwer S. Abd El-Hameed, Eman G. Ouf","doi":"10.1186/s43067-024-00159-9","DOIUrl":"https://doi.org/10.1186/s43067-024-00159-9","url":null,"abstract":"This article introduces a novel microstrip slot antenna array (SAA) configuration for radar applications. The proposed antenna is specifically designed for operation in the K-band, spanning from 23 to 24.3 GHz. The antenna structure comprises two substrates: the feed network and ground plane are on the bottom substrate, and the radiating slots are on the top layer of the first substrate. The incorporation of a unique grid feed configuration, featuring 50 Ohm center excitation for the first time, improves the feed mechanism of the microstrip SAA. This innovation contributes to achieving a compact size and high gain. To enhance the side lobe level, the design incorporates a substrate-integrated waveguide-backed cavity, which significantly reduces surface waves. The SAA consists of 25 radiating elements with a gain of 14 dBi. In the elevation and azimuth planes, the half-power beamwidths are measured at 12.1° and 69.1°, respectively. The proposed antenna array’s measured impedance bandwidth ranges from 23.15 to 24.75 GHz, guaranteeing a reflection coefficient (S11) of less than − 10 dB. The suggested antenna's applicability for automotive multi-input multi-output radar has been validated.","PeriodicalId":100777,"journal":{"name":"Journal of Electrical Systems and Information Technology","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"K-medoid clustering containerized allocation algorithm for cloud computing environment","authors":"Amany AbdElSamea, Sherif M. Saif","doi":"10.1186/s43067-024-00161-1","DOIUrl":"https://doi.org/10.1186/s43067-024-00161-1","url":null,"abstract":"Load balancing is critical for container-based cloud computing environments for several reasons. A lack of appropriate load balancing techniques could result in a decrease in performance and possible service interruptions as some nodes get overloaded, while others are left underutilized. Cloud service providers can reduce latency and boost system performance by strategically placing containers using clustering algorithms. These techniques aid in efficiently using resources and load balancing by clustering related containers together according to their shared attributes. Clustering strategies are effective in allocating and controlling resources to meet the demands of a changing workload. Algorithms for clustering combine related workloads or containers into clusters, improving performance isolation and maximizing resource usage. One popular methodology for data clustering is the K-Medoid Clustering Algorithm. It is especially helpful when working with categorical data or when the dataset contains outliers. K-medoids is an unsupervised clustering approach where the core of the cluster is made up of data points known as “medoids.” A medoid is a location in the cluster whose total distance to every object in the cluster—also known as its dissimilarity—is as small as possible. Any appropriate distance function may be used, such as the Manhattan distance, the Euclidean distance, or another one. Thus, by choosing K medoids from our data sample, the K-medoids method splits the data into K clusters. This work presents the K-Medoid clustering technique for containers, which can enhance load balancing, decrease resource execution times, and increase resource utilization rates all at the same time. The results of the experiment show that the proposed method outperforms MACO and FCFS in terms of throughput by about 70% when number of cloudlets increased. The relative improvement of execution time of the proposed K-medoid algorithm w.r.t FCFS is about 50%.","PeriodicalId":100777,"journal":{"name":"Journal of Electrical Systems and Information Technology","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smartphone-sensor-based human activities classification for forensics: a machine learning approach","authors":"Nchouwat Ndumgouo Ibrahim Moubarak, Njutapmvoui Mbah Mohamed Omar, Vepouyoum Njouokouo Youssef","doi":"10.1186/s43067-024-00157-x","DOIUrl":"https://doi.org/10.1186/s43067-024-00157-x","url":null,"abstract":"The accurate classification of human activities in crime scenes during forensics (criminalistics) is of utmost importance in classifying suspicious and unlawful activities, easing their acceptability and interpretability by judges during legal procedures in courts or by other non-experts in the field of forensics. This paper implements machine learning (ML) algorithms: support vector machine (SVM) and decision tree (DT), to demonstrate with a high accuracy, how data emanating from smartphones’ sensors reveal and isolate relevant information about static and dynamic human activities in criminalistics. Smartphones’ data from five different sensors (accelerometer, gravity, orientation, Gyroscope and light), related to ten recurrent crime scenes activities, grouped into three classes of events (normal, felony and none-felony events) are classified by the proposed algorithms, with novelty being the classification decisions based on the entire period of the events and not instantaneous decision makings. Three independent data-subsets were made, with permutations done between them and at each time, two sets used for training and the third set used for testing. Time- and frequency-domain features were initially used separately and then combined for the model training and testing. The best average training accuracies of 100% and 97.8% were obtained for the DT and SVM, respectively, and the testing accuracies of 89.1% were obtained for both algorithms. We therefore believe that these results will serve as a solid persuasive and convincing argument to judges and non-experts of the field of forensics to accept and easily interpret computer-aided classification of suspicious activities emanating from criminalistic studies.","PeriodicalId":100777,"journal":{"name":"Journal of Electrical Systems and Information Technology","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142203692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Egyptian car plate recognition based on YOLOv8, Easy-OCR, and CNN","authors":"Amany Sarhan, Rowyda Abdel-Rahem, Bassel Darwish, Arwa Abou-Attia, Ahmed Sneed, Shahd Hatem, Awatef Badran, Mohamed Ramadan","doi":"10.1186/s43067-024-00156-y","DOIUrl":"https://doi.org/10.1186/s43067-024-00156-y","url":null,"abstract":"This research presents an innovative approach to Egyptian car plate recognition using YOLOv8 and optical character recognition (OCR) technologies. Leveraging the powerful object detection capabilities of YOLOv8, the system efficiently detects car plates within images, videos, or real-time. Subsequently, OCR algorithms are applied to extract alphanumeric characters from the identified plates, facilitating accurate license plate recognition. The integration of YOLOv8 and OCR enhances the system's robustness in varying conditions, contributing to improved performance in real-world scenarios. This study advances the field of automatic license plate recognition, showcasing the potential for practical applications in traffic management, law enforcement, and security systems. A public dataset of Egyptian car plates is used for training and testing the model. Two OCR approaches are used and tested which proved their performance, while CNN-based approach reaches 99.4% accuracy.","PeriodicalId":100777,"journal":{"name":"Journal of Electrical Systems and Information Technology","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141935327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correction: Unveiling the evolution of generative AI (GAI): a comprehensive and investigative analysis toward LLM models (2021–2024) and beyond","authors":"Zarif Bin Akhtar","doi":"10.1186/s43067-024-00152-2","DOIUrl":"https://doi.org/10.1186/s43067-024-00152-2","url":null,"abstract":"","PeriodicalId":100777,"journal":{"name":"Journal of Electrical Systems and Information Technology","volume":"59 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141929149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The significance of artificial intelligence in zero trust technologies: a comprehensive review","authors":"Deepa Ajish","doi":"10.1186/s43067-024-00155-z","DOIUrl":"https://doi.org/10.1186/s43067-024-00155-z","url":null,"abstract":"In the era of cloud computing, cybersecurity has assumed paramount importance. As organizations transition to cloud-based solutions, cyberattackers increasingly target cloud services as a lucrative avenue for unauthorized access to sensitive information. The traditional security perimeter, once robust, now exhibits porosity, necessitating a reevaluation of security strategies to counter these evolving threats. This paper delves into the critical role of artificial intelligence (AI) within zero trust security technologies. The convergence of AI and zero trust has garnered significant attention, particularly in the domains of security enhancement, risk mitigation, and the redefinition of trust paradigms. My exploration aims to uncover how AI actively observes and supports various technologies in zero trust model. By evaluating existing research findings, I illuminate the transformative potential of AI in fortifying security within zero trust security models. This scholarly perspective underscores the critical interplay between AI and zero trust technologies, highlighting their collective potential in safeguarding digital ecosystems.","PeriodicalId":100777,"journal":{"name":"Journal of Electrical Systems and Information Technology","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141935328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of CRLH-TL BPF with controllable attenuation poles","authors":"Atsuya Hirayama, Hinata Ishikawa, Takanobu Ohno","doi":"10.1186/s43067-024-00154-0","DOIUrl":"https://doi.org/10.1186/s43067-024-00154-0","url":null,"abstract":"Compact and pole-controllable resonators and bandpass filter (BPF) using a composite right/left-handed transmission line (CRLH-TL) are designed in this study. The distributed constant line in the CRLH-TL has applied a tap-coupling technique, and one tap-coupled stub is loaded with the left-handed (LH) circuit. Attenuation poles are generated when the input susceptance of the stub diverges. In the tap-coupled CRLH-TL resonator, the attenuation pole is controlled at either the desired lower or higher region frequency than a resonant frequency by adjusting the circuit parameters. Also, the BPF constructed by the CRLH-TL resonators is designed based on a filter design theory, where the attenuation poles are located at lower and higher region frequencies than a negative-first-order frequency. The BPF with microstrip structure is fabricated using MEGTRON6 R-5775 ( $$varepsilon _text {r}$$ : 3.7, h: 0.63 mm, t: 18 μm), chip capacitors, and wire inductors. The simulated results show that the desired characteristics are approximately satisfied, i.e., we can design the CRLH-TL BPF which is controllable for the attenuation poles at both lower and higher region frequencies than a resonant frequency. The measured results are good agreement with the simulation. The negative-first-order frequency is generated at 2.00 GHz with 133 MHz bandwidth, i.e., the fractional bandwidth is 6.65 %. The resonator lengths in the BPF are shortened by 81.5 % and 75.0 % in comparison with a conventional half-wavelength ( $$lambda /2$$ ) openstub, and the size of the fabricated BPF is 0.18 $$lambda _text {g} times$$ 0.17 $$lambda _text {g}$$ . Therefore, a compact BPF with two controllable attenuation poles is realized by the tap-coupled CRLH-TL.","PeriodicalId":100777,"journal":{"name":"Journal of Electrical Systems and Information Technology","volume":"60 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141737751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}