Journal of Computational Science and Intelligent Technologies最新文献

筛选
英文 中文
Classification of Diabetic Retinopathy using Stacked Autoencoder-Based Deep Neural Network 基于堆叠自编码器的深度神经网络对糖尿病视网膜病变的分类
Journal of Computational Science and Intelligent Technologies Pub Date : 1900-01-01 DOI: 10.53409/mnaa.jcsit1102
Yasir Eltigani Ali Mustaf, Bashir Hassan Ismail
{"title":"Classification of Diabetic Retinopathy using Stacked Autoencoder-Based Deep Neural Network","authors":"Yasir Eltigani Ali Mustaf, Bashir Hassan Ismail","doi":"10.53409/mnaa.jcsit1102","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit1102","url":null,"abstract":"Diagnosis of diabetic retinopathy (DR) via images of colour fundus requires experienced clinicians to determine the presence and importance of a large number of small characteristics. This work proposes and named Adapted Stacked Auto Encoder (ASAE-DNN) a novel deep learning framework for diabetic retinopathy (DR), three hidden layers have been used to extract features and classify them then use a Softmax classification. The models proposed are checked on Messidor's data set, including 800 training images and 150 test images. Exactness, accuracy, time, recall and calculation are assessed for the outcomes of the proposed models. The results of these studies show that the model ASAE-DNN was 97% accurate.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114137615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Classification of Lung Nodules using Improved Residual Convolutional Neural Network 基于改进残差卷积神经网络的肺结节分类
Journal of Computational Science and Intelligent Technologies Pub Date : 1900-01-01 DOI: 10.53409/mnaa.jcsit1103
Salah Eldeen Babiker
{"title":"Classification of Lung Nodules using Improved Residual Convolutional Neural Network","authors":"Salah Eldeen Babiker","doi":"10.53409/mnaa.jcsit1103","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit1103","url":null,"abstract":"The most common cancer of the lung cannot be ignored and can cause late-health death. Now CT can be used to help clinicians diagnose early-stage lung cancer. In certain cases the diagnosis of lung cancer detection is based on doctors' intuition, which can neglect other patients and cause complications. Deep learning in most other areas of medical diagnosis has proven to be a common and powerful tool. This research is planned for improving the residual evolutionary neural network (IRCNN). These networks apply with some changes to the benign and malignant lung nodule to the CT image classification task. The segmenting of the nodule is performed here by clustering k-means. The LIDC-IDRI database analysed those networks. Experimental findings show that the IRCNN network archived the best performance of lung nodule classification, which findings best among established methods.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"64 2-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116845051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Hybrid Genetic-Neuro Algorithm for Cloud Intrusion Detection System 云入侵检测系统的遗传-神经混合算法
Journal of Computational Science and Intelligent Technologies Pub Date : 1900-01-01 DOI: 10.53409/mnaa.jcsit20201203
Suresh Adithya Nallamuthu
{"title":"A Hybrid Genetic-Neuro Algorithm for Cloud Intrusion Detection System","authors":"Suresh Adithya Nallamuthu","doi":"10.53409/mnaa.jcsit20201203","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit20201203","url":null,"abstract":"The security for cloud network systems is essential and significant to secure the data source from intruders and attacks. Implementing an intrusion detection system (IDS) for securing from those intruders and attacks is the best option. Many IDS models are presently based on different techniques and algorithms like machine learning and deep learning. In this research, IDS for the cloud computing environment is proposed. Here in this model, the genetic algorithm (GA) and back propagation neural network (BPNN) is used for attack detection and classification. The Canadian Institute for Cyber-security CIC-IDS 2017 dataset is used for the evaluation of performance analysis. Initially, from the dataset, the data are preprocessed, and by using the genetic algorithm, the attack was detected. The detected attacks are classified using the BPNN classifier for identifying the types of attacks. The performance analysis was executed, and the results are obtained and compared with the existing machine learning-based classifiers like FC-ANN, NB-RF, KDBN, and FCM-SVM techniques. The proposed GA-BPNN model outperforms all these classifying techniques in every performance metric, like accuracy, precision, recall, and detection rate. Overall, from the performance analysis, the best classification accuracy is achieved for Web attack detection with 97.90%, and the best detection rate is achieved for Brute force attack detection with 97.89%.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114785325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Neural Network-Based Intrusion Detection System for Detecting Malicious Nodes in WSNs 基于神经网络的wsn恶意节点入侵检测系统
Journal of Computational Science and Intelligent Technologies Pub Date : 1900-01-01 DOI: 10.53409/mnaa.jcsit20201301
C. Narmatha
{"title":"A New Neural Network-Based Intrusion Detection System for Detecting Malicious Nodes in WSNs","authors":"C. Narmatha","doi":"10.53409/mnaa.jcsit20201301","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit20201301","url":null,"abstract":"The Wireless Sensor Networks (WSNs) are vulnerable to numerous security hazards that could affect the entire network performance, which could lead to catastrophic problems such as a denial of service attacks (DoS). The WSNs cannot protect these types of attacks by key management protocols, authentication protocols, and protected routing. A solution to this issue is the intrusion detection system (IDS). It evaluates the network with adequate data obtained and detects the sensor node(s) abnormal behavior. For this work, it is proposed to use the intrusion detection system (IDS), which recognizes automated attacks by WSNs. This IDS uses an improved LEACH protocol cluster-based architecture designed to reduce the energy consumption of the sensor nodes. In combination with the Multilayer Perceptron Neural Network, which includes the Feed Forward Neutral Network (FFNN) and the Backpropagation Neural Network (BPNN), IDS is based on fuzzy rule-set anomaly and abuse detection based learning methods based on the fugitive logic sensor to monitor hello, wormhole and SYBIL attacks.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129783215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Survey on Cloud Computing for Information Storing 信息存储的云计算研究综述
Journal of Computational Science and Intelligent Technologies Pub Date : 1900-01-01 DOI: 10.53409/mnaa.jcsit20201202
S. Ravichandran
{"title":"A Survey on Cloud Computing for Information Storing","authors":"S. Ravichandran","doi":"10.53409/mnaa.jcsit20201202","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit20201202","url":null,"abstract":"Cloud computing is a technique for storing the information virtually. It may comprise of database, storage, tools, servers, networking and software services. It deals with virtual storing and retrieving of data from anywhere by the help of internet. This paper uses cloud computing technique in education for uploading study materials, videos, sharing information to the students and for conducting tests. The symmetric key encryption technique is used in this concept, where one key is utilized for both decryption and encryption. The advanced encryption standard algorithm (AES) was used for securing the data in the cloud, where it gives high security and faster execution time. This technique is mainly based on improving the concept of virtual classroom by using cloud computing.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"80 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134411062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Face Recognition Framework based on Convolution Neural Network with modified Long Short Term memory Method 基于改进长短期记忆方法的卷积神经网络人脸识别框架
Journal of Computational Science and Intelligent Technologies Pub Date : 1900-01-01 DOI: 10.53409/mnaa.jcsit20201304
Sushmitha Parikibanda
{"title":"Face Recognition Framework based on Convolution Neural Network with modified Long Short Term memory Method","authors":"Sushmitha Parikibanda","doi":"10.53409/mnaa.jcsit20201304","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit20201304","url":null,"abstract":"For real-world applications, such as video monitoring, interaction between human machines and safety systems, face recognition is very critical. Deep learning approaches have demonstrated better results in terms of precision and processing speed in image recognition compared to conventional methods. In comparison to traditional methods. While facial detection problems with different commercial applications have been extensively studied for several decades, they still face problems with many specific scenarios, due to various problems such as severe facial occlusions, very low resolutions, intense lighting and exceptional changes in image or video compression artifacts, etc. The aim of this work is to robustly solve the issues listed above with a facial detection approach called Convolution Neural Network with Long short-term Model (CNN-mLSTM). This method first flattened the original frame, calculating the gradient image with Gaussian filter. The edge detection algorithm Canny-Kirsch Method will then be used to identify edge of the human face. The experimental findings suggest that the technique proposed exceeds the current modern methods of face detection.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132592211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Data Aggregation Technique for WSNs Using Lightweight Cryptographic Algorithm 基于轻量级加密算法的无线传感器网络数据聚合技术
Journal of Computational Science and Intelligent Technologies Pub Date : 1900-01-01 DOI: 10.53409/mnaa/jcsit/e202203010116
{"title":"A Data Aggregation Technique for WSNs Using Lightweight Cryptographic Algorithm","authors":"","doi":"10.53409/mnaa/jcsit/e202203010116","DOIUrl":"https://doi.org/10.53409/mnaa/jcsit/e202203010116","url":null,"abstract":"","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121984341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Modified Recurrent Extreme Learning with PSO Machine Based on Feature Fusion with CNN Deep Features for Breast Cancer Detection 一种基于CNN深度特征融合的改进循环极限学习PSO机用于乳腺癌检测
Journal of Computational Science and Intelligent Technologies Pub Date : 1900-01-01 DOI: 10.53409/mnaa.jcsit20201303
S. M, Manimurugan S
{"title":"A New Modified Recurrent Extreme Learning with PSO Machine Based on Feature Fusion with CNN Deep Features for Breast Cancer Detection","authors":"S. M, Manimurugan S","doi":"10.53409/mnaa.jcsit20201303","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit20201303","url":null,"abstract":"Breast cancer is a prevalent cause of death, and is the only form of cancer that is common among women worldwide and mammograms-based computer-aided diagnosis (CAD) program that allows early detection, diagnosis and treatment of breast cancer. But the performance of the current CAD systems is still unsatisfactory. Early recognition of lumps will reduce overall breast cancer mortality. This study investigates a method of breast CAD, focused on feature fusion with deep features of the Convolutional Neural Network (CNN). First, present a scheme of mass detection based on CNN deep features and modified clustering of the Extreme Learning Machine (MRELM). It forecasts load through Recurrent Extreme Learning Machine (RELM) and utilizes Artificial Bee Colony (ABC) to optimize weights and biases. Second, a collection of features is constructed that relays deep features, morphological features, texture features, and density features. Third, MRELM classifier is developed to distinguish benign and malignant breast masses using the fused feature set. Extensive studies show the precision and efficacy of the proposed method of mass diagnosis and classification of breast cancer.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127753885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Distributed Control System for Monitoring and Controlling Different Processes 一种用于监控不同过程的分布式控制系统
Journal of Computational Science and Intelligent Technologies Pub Date : 1900-01-01 DOI: 10.53409/mnaa/jcsit/e202203014350
Pamela D, Gerard Joe Nigel K, Kingston Stanley P, Stefy Mol Mathew
{"title":"A Distributed Control System for Monitoring and Controlling Different Processes","authors":"Pamela D, Gerard Joe Nigel K, Kingston Stanley P, Stefy Mol Mathew","doi":"10.53409/mnaa/jcsit/e202203014350","DOIUrl":"https://doi.org/10.53409/mnaa/jcsit/e202203014350","url":null,"abstract":"A set of controllers connected by a data network and appearing to function as one unit is known as a distributed control system (DCS). Despite having diverse roles, locations, configurations, and specifications, they are all connected by a common language of communication. In applications like chemical plants or oil refineries, where there are many input-output modules engaged in communication, DCS is favoured. They are multitasking systems that can handle sizable common databases and support numerous control loops through graphical function block representation. The necessity of the hour is process monitoring and control from a distance. One such option is DCS, which is used in most process control sectors. This idea is based on applying the Supervisory Control and Data Acquisition (SCADA) concept in the stations and using DCS to control the existing process stations in the lab (level and flow process). The process control panel for each station’s monitoring and control is developed with a user-friendly Front Panel. The Proportional Integral Derivative (PID) Controller is programmed using functional blocks for the level and flow process.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130967449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of the Impact of Digital Twin Technology on IoT, Industries, and Other Smart Environments 数字孪生技术对物联网、工业和其他智能环境的影响调查
Journal of Computational Science and Intelligent Technologies Pub Date : 1900-01-01 DOI: 10.53409/mnaa/jcsit/e202203011723
Mathupriya S, Saira Banu S, S. S, Arthi B
{"title":"A Survey of the Impact of Digital Twin Technology on IoT, Industries, and Other Smart Environments","authors":"Mathupriya S, Saira Banu S, S. S, Arthi B","doi":"10.53409/mnaa/jcsit/e202203011723","DOIUrl":"https://doi.org/10.53409/mnaa/jcsit/e202203011723","url":null,"abstract":"A developing technology gaining interest from numerous researchers in current commercial and academic domains is known as “digital twinning” (DT). Growth has accelerated thanks to technological advances, particularly in the industrial industries. Data from both physical and virtual machines are combined in both directions. The Internet of Things (IoT) and Artificial Intelligence (AI) are two examples of the many difficulties, applications, and technical integrations that come with digital twinning. This work thoroughly reviews and explores the notion of digital twinning. The study topics that were the focus of this survey were health care, business, smart cities, and weatherbased applications. It reflects how people currently view the research field. Examining enabling twinning technologies, open problems, and applications of digital twinning are made easier by this study.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116309828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信