{"title":"Classification of Diabetic Retinopathy using Stacked Autoencoder-Based Deep Neural Network","authors":"Yasir Eltigani Ali Mustaf, Bashir Hassan Ismail","doi":"10.53409/mnaa.jcsit1102","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit1102","url":null,"abstract":"Diagnosis of diabetic retinopathy (DR) via images of colour fundus requires experienced clinicians to determine the presence and importance of a large number of small characteristics. This work proposes and named Adapted Stacked Auto Encoder (ASAE-DNN) a novel deep learning framework for diabetic retinopathy (DR), three hidden layers have been used to extract features and classify them then use a Softmax classification. The models proposed are checked on Messidor's data set, including 800 training images and 150 test images. Exactness, accuracy, time, recall and calculation are assessed for the outcomes of the proposed models. The results of these studies show that the model ASAE-DNN was 97% accurate.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114137615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Lung Nodules using Improved Residual Convolutional Neural Network","authors":"Salah Eldeen Babiker","doi":"10.53409/mnaa.jcsit1103","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit1103","url":null,"abstract":"The most common cancer of the lung cannot be ignored and can cause late-health death. Now CT can be used to help clinicians diagnose early-stage lung cancer. In certain cases the diagnosis of lung cancer detection is based on doctors' intuition, which can neglect other patients and cause complications. Deep learning in most other areas of medical diagnosis has proven to be a common and powerful tool. This research is planned for improving the residual evolutionary neural network (IRCNN). These networks apply with some changes to the benign and malignant lung nodule to the CT image classification task. The segmenting of the nodule is performed here by clustering k-means. The LIDC-IDRI database analysed those networks. Experimental findings show that the IRCNN network archived the best performance of lung nodule classification, which findings best among established methods.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"64 2-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116845051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Genetic-Neuro Algorithm for Cloud Intrusion Detection System","authors":"Suresh Adithya Nallamuthu","doi":"10.53409/mnaa.jcsit20201203","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit20201203","url":null,"abstract":"The security for cloud network systems is essential and significant to secure the data source from intruders and attacks. Implementing an intrusion detection system (IDS) for securing from those intruders and attacks is the best option. Many IDS models are presently based on different techniques and algorithms like machine learning and deep learning. In this research, IDS for the cloud computing environment is proposed. Here in this model, the genetic algorithm (GA) and back propagation neural network (BPNN) is used for attack detection and classification. The Canadian Institute for Cyber-security CIC-IDS 2017 dataset is used for the evaluation of performance analysis. Initially, from the dataset, the data are preprocessed, and by using the genetic algorithm, the attack was detected. The detected attacks are classified using the BPNN classifier for identifying the types of attacks. The performance analysis was executed, and the results are obtained and compared with the existing machine learning-based classifiers like FC-ANN, NB-RF, KDBN, and FCM-SVM techniques. The proposed GA-BPNN model outperforms all these classifying techniques in every performance metric, like accuracy, precision, recall, and detection rate. Overall, from the performance analysis, the best classification accuracy is achieved for Web attack detection with 97.90%, and the best detection rate is achieved for Brute force attack detection with 97.89%.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114785325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Neural Network-Based Intrusion Detection System for Detecting Malicious Nodes in WSNs","authors":"C. Narmatha","doi":"10.53409/mnaa.jcsit20201301","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit20201301","url":null,"abstract":"The Wireless Sensor Networks (WSNs) are vulnerable to numerous security hazards that could affect the entire network performance, which could lead to catastrophic problems such as a denial of service attacks (DoS). The WSNs cannot protect these types of attacks by key management protocols, authentication protocols, and protected routing. A solution to this issue is the intrusion detection system (IDS). It evaluates the network with adequate data obtained and detects the sensor node(s) abnormal behavior. For this work, it is proposed to use the intrusion detection system (IDS), which recognizes automated attacks by WSNs. This IDS uses an improved LEACH protocol cluster-based architecture designed to reduce the energy consumption of the sensor nodes. In combination with the Multilayer Perceptron Neural Network, which includes the Feed Forward Neutral Network (FFNN) and the Backpropagation Neural Network (BPNN), IDS is based on fuzzy rule-set anomaly and abuse detection based learning methods based on the fugitive logic sensor to monitor hello, wormhole and SYBIL attacks.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129783215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Cloud Computing for Information Storing","authors":"S. Ravichandran","doi":"10.53409/mnaa.jcsit20201202","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit20201202","url":null,"abstract":"Cloud computing is a technique for storing the information virtually. It may comprise of database, storage, tools, servers, networking and software services. It deals with virtual storing and retrieving of data from anywhere by the help of internet. This paper uses cloud computing technique in education for uploading study materials, videos, sharing information to the students and for conducting tests. The symmetric key encryption technique is used in this concept, where one key is utilized for both decryption and encryption. The advanced encryption standard algorithm (AES) was used for securing the data in the cloud, where it gives high security and faster execution time. This technique is mainly based on improving the concept of virtual classroom by using cloud computing.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"80 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134411062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Recognition Framework based on Convolution Neural Network with modified Long Short Term memory Method","authors":"Sushmitha Parikibanda","doi":"10.53409/mnaa.jcsit20201304","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit20201304","url":null,"abstract":"For real-world applications, such as video monitoring, interaction between human machines and safety systems, face recognition is very critical. Deep learning approaches have demonstrated better results in terms of precision and processing speed in image recognition compared to conventional methods. In comparison to traditional methods. While facial detection problems with different commercial applications have been extensively studied for several decades, they still face problems with many specific scenarios, due to various problems such as severe facial occlusions, very low resolutions, intense lighting and exceptional changes in image or video compression artifacts, etc. The aim of this work is to robustly solve the issues listed above with a facial detection approach called Convolution Neural Network with Long short-term Model (CNN-mLSTM). This method first flattened the original frame, calculating the gradient image with Gaussian filter. The edge detection algorithm Canny-Kirsch Method will then be used to identify edge of the human face. The experimental findings suggest that the technique proposed exceeds the current modern methods of face detection.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132592211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Data Aggregation Technique for WSNs Using Lightweight Cryptographic Algorithm","authors":"","doi":"10.53409/mnaa/jcsit/e202203010116","DOIUrl":"https://doi.org/10.53409/mnaa/jcsit/e202203010116","url":null,"abstract":"","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121984341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Modified Recurrent Extreme Learning with PSO Machine Based on Feature Fusion with CNN Deep Features for Breast Cancer Detection","authors":"S. M, Manimurugan S","doi":"10.53409/mnaa.jcsit20201303","DOIUrl":"https://doi.org/10.53409/mnaa.jcsit20201303","url":null,"abstract":"Breast cancer is a prevalent cause of death, and is the only form of cancer that is common among women worldwide and mammograms-based computer-aided diagnosis (CAD) program that allows early detection, diagnosis and treatment of breast cancer. But the performance of the current CAD systems is still unsatisfactory. Early recognition of lumps will reduce overall breast cancer mortality. This study investigates a method of breast CAD, focused on feature fusion with deep features of the Convolutional Neural Network (CNN). First, present a scheme of mass detection based on CNN deep features and modified clustering of the Extreme Learning Machine (MRELM). It forecasts load through Recurrent Extreme Learning Machine (RELM) and utilizes Artificial Bee Colony (ABC) to optimize weights and biases. Second, a collection of features is constructed that relays deep features, morphological features, texture features, and density features. Third, MRELM classifier is developed to distinguish benign and malignant breast masses using the fused feature set. Extensive studies show the precision and efficacy of the proposed method of mass diagnosis and classification of breast cancer.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127753885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pamela D, Gerard Joe Nigel K, Kingston Stanley P, Stefy Mol Mathew
{"title":"A Distributed Control System for Monitoring and Controlling Different Processes","authors":"Pamela D, Gerard Joe Nigel K, Kingston Stanley P, Stefy Mol Mathew","doi":"10.53409/mnaa/jcsit/e202203014350","DOIUrl":"https://doi.org/10.53409/mnaa/jcsit/e202203014350","url":null,"abstract":"A set of controllers connected by a data network and appearing to function as one unit is known as a distributed control system (DCS). Despite having diverse roles, locations, configurations, and specifications, they are all connected by a common language of communication. In applications like chemical plants or oil refineries, where there are many input-output modules engaged in communication, DCS is favoured. They are multitasking systems that can handle sizable common databases and support numerous control loops through graphical function block representation. The necessity of the hour is process monitoring and control from a distance. One such option is DCS, which is used in most process control sectors. This idea is based on applying the Supervisory Control and Data Acquisition (SCADA) concept in the stations and using DCS to control the existing process stations in the lab (level and flow process). The process control panel for each station’s monitoring and control is developed with a user-friendly Front Panel. The Proportional Integral Derivative (PID) Controller is programmed using functional blocks for the level and flow process.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130967449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of the Impact of Digital Twin Technology on IoT, Industries, and Other Smart Environments","authors":"Mathupriya S, Saira Banu S, S. S, Arthi B","doi":"10.53409/mnaa/jcsit/e202203011723","DOIUrl":"https://doi.org/10.53409/mnaa/jcsit/e202203011723","url":null,"abstract":"A developing technology gaining interest from numerous researchers in current commercial and academic domains is known as “digital twinning” (DT). Growth has accelerated thanks to technological advances, particularly in the industrial industries. Data from both physical and virtual machines are combined in both directions. The Internet of Things (IoT) and Artificial Intelligence (AI) are two examples of the many difficulties, applications, and technical integrations that come with digital twinning. This work thoroughly reviews and explores the notion of digital twinning. The study topics that were the focus of this survey were health care, business, smart cities, and weatherbased applications. It reflects how people currently view the research field. Examining enabling twinning technologies, open problems, and applications of digital twinning are made easier by this study.","PeriodicalId":125707,"journal":{"name":"Journal of Computational Science and Intelligent Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116309828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}