{"title":"Text Embedding in Image using an Optimization Based Key Generation Method","authors":"M. Kherallah, Najiba Tagougui, Shihab A. Shawkat","doi":"10.1504/ijiei.2023.10057046","DOIUrl":"https://doi.org/10.1504/ijiei.2023.10057046","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":"1 1","pages":""},"PeriodicalIF":6.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67053075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly detection and oversampling approach for classifying imbalanced data using CLUBS technique in IoT healthcare data","authors":"Subha Sundaram, J. Sathiaseelan","doi":"10.1504/ijiei.2023.10057806","DOIUrl":"https://doi.org/10.1504/ijiei.2023.10057806","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":"11 1","pages":"255-271"},"PeriodicalIF":6.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67053285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Singh, Ashwin Kumar, Mohammad Mustafa Malik, Balika. J. Chelliah, R. Regin
{"title":"Similarity-Based Optimized and Adaptive Adversarial Attack on Image Classification Using Neural Network","authors":"N. Singh, Ashwin Kumar, Mohammad Mustafa Malik, Balika. J. Chelliah, R. Regin","doi":"10.1504/ijiei.2023.10055562","DOIUrl":"https://doi.org/10.1504/ijiei.2023.10055562","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":"1 1","pages":""},"PeriodicalIF":6.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67052764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly detection and oversampling approach for classifying imbalanced data using CLUBS technique in IoT healthcare data","authors":"S. Subha, J.G.R. Sathiaseelan","doi":"10.1504/ijiei.2023.133074","DOIUrl":"https://doi.org/10.1504/ijiei.2023.133074","url":null,"abstract":"Multiple data streams from sensing devices in intelligent settings have improved life quality thanks to the internet of things (IoT). Anomalies and imbalanced data sources are unavoidable due to system complexity and IoT device rollout issues. An imbalanced dataset has more data for one group than another, which may influence the results. IoT data streams are unbalanced, making anomaly detection harder. Data mining and machine learning classification approaches perform poorly on imbalanced datasets in the current setup. To address this, the proposed system suggests an effective anomaly detection method and oversampling approach (ADO) to improve IoT's ability to identify abnormal behaviours in imbalanced data. After clustering of lower and upper boundary standardisation (CLUBS) detects anomaly samples, the ADO technique provides synthetic samples for minority classes. ADO lowers class region overlaps and enhances classification methods. The experimental results using an imbalanced dataset and three classification algorithms, namely K-nearest neighbour (KNN), random forest (RF), support vector machine (SVM) and multilayer perceptron (MLP), show that the ADO approach increases classification accuracy (0.64% for KNN, 4.27% for RF and 6.33% for SVM) by removing anomalies and oversampling data.","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135058184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods of Anomaly Detection for the Prevention and Detection of Cyber Attacks","authors":"Ravi T.N, Girubagari N","doi":"10.1504/ijiei.2023.10059169","DOIUrl":"https://doi.org/10.1504/ijiei.2023.10059169","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135496952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dual Strategy Based Missing Completely at Random (MCAR) Type Missing Data Imputation on The Internet of Medical Things (IOMT)","authors":"Iris Punitha P, J.G.R. Sathiaseelan","doi":"10.1504/ijiei.2023.10059493","DOIUrl":"https://doi.org/10.1504/ijiei.2023.10059493","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text embedding in image using an optimisation-based key generation method","authors":"Shihab A. Shawkat, Najiba Tagougui, M. Kherallah","doi":"10.1504/ijiei.2023.133072","DOIUrl":"https://doi.org/10.1504/ijiei.2023.133072","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":"11 1","pages":"229-254"},"PeriodicalIF":6.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67053047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure task scheduling in cloud computing with enhanced ordinal optimisation and integrated DNA, Morse code techniques","authors":"Monika Yadav, Atul Mishra","doi":"10.1504/ijiei.2023.132700","DOIUrl":"https://doi.org/10.1504/ijiei.2023.132700","url":null,"abstract":"This paper presents two innovative approaches to address the challenges of task scheduling, efficient resource utilisation, and security in cloud computing environments. The first approach proposes an optimal task-scheduling strategy for virtual machines in dynamic cloud scenarios, utilising an enhanced ordinal optimisation technique and linear regression to predict future dynamic workload. The second approach utilises Morse code encoding of DNA sequences to optimise scheduling outcomes while ensuring secure scheduling in the cloud environment, integrating ordinal optimisation techniques and the unique properties of DNA sequences. The effectiveness of both proposed approaches is evaluated by comparing them to conventional task-scheduling techniques. The results demonstrate that the proposed approaches achieve better performance in terms of scheduling efficiency and security. These approaches offer a comprehensive solution to address the critical aspects of task scheduling, efficient resource utilisation, and security in cloud computing environments.","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136028634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Venkatakrishnaiah, Jeyanthi S. B. Saravanan, K.Venkatapathi Raju
{"title":"Utilizing Recurrent Neural Network Technique for Predicting Strand Settlement on Brittle Sand and Geocell","authors":"R. Venkatakrishnaiah, Jeyanthi S. B. Saravanan, K.Venkatapathi Raju","doi":"10.1504/ijiei.2023.10056043","DOIUrl":"https://doi.org/10.1504/ijiei.2023.10056043","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":"1 1","pages":""},"PeriodicalIF":6.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67052833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sajjad Memon, Muhammad Ali Memon, Faheem Abassi, Fayaz Ahmed Memon, Majid Hussain Memon, Muhammad Ali Nizamani
{"title":"Real-time indoor positioning and route guidance system by using beacons","authors":"Sajjad Memon, Muhammad Ali Memon, Faheem Abassi, Fayaz Ahmed Memon, Majid Hussain Memon, Muhammad Ali Nizamani","doi":"10.1504/ijiei.2023.132698","DOIUrl":"https://doi.org/10.1504/ijiei.2023.132698","url":null,"abstract":"Real-time tracking of objects an indoor environment has become important in numerous industries, including shopping, logistics, advertising, and healthcare. This paper represents a smartphone-based real time indoor positioning and route guidance system that employs BLE beacons. The system's main goal is to track a target's real-time location, such as a smartphone user, and guide them in a specific direction. The system combines location data and some contextual of pedestrians' movement directions to assist pedestrians in navigating to their destinations, such as the building's exit. The system is consists of three components: beacon devices, a user's smartphone app that communicates with beacons and gives navigation guidance to users, and the building's floor plan database. Localisation approach based on the received signal strength indicator (RSSI) is used. In addition, a new building's floor plan based on database approach is proposed. The experimental results have shown that even with only two placed beacons, the proposed system could achieve satisfactory accuracy.","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136028016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}