{"title":"Text Embedding in Image using an Optimization Based Key Generation Method","authors":"M. Kherallah, Najiba Tagougui, Shihab A. Shawkat","doi":"10.1504/ijiei.2023.10057046","DOIUrl":"https://doi.org/10.1504/ijiei.2023.10057046","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67053075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly detection and oversampling approach for classifying imbalanced data using CLUBS technique in IoT healthcare data","authors":"Subha Sundaram, J. Sathiaseelan","doi":"10.1504/ijiei.2023.10057806","DOIUrl":"https://doi.org/10.1504/ijiei.2023.10057806","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67053285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Singh, Ashwin Kumar, Mohammad Mustafa Malik, Balika. J. Chelliah, R. Regin
{"title":"Similarity-Based Optimized and Adaptive Adversarial Attack on Image Classification Using Neural Network","authors":"N. Singh, Ashwin Kumar, Mohammad Mustafa Malik, Balika. J. Chelliah, R. Regin","doi":"10.1504/ijiei.2023.10055562","DOIUrl":"https://doi.org/10.1504/ijiei.2023.10055562","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67052764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly detection and oversampling approach for classifying imbalanced data using CLUBS technique in IoT healthcare data","authors":"S. Subha, J.G.R. Sathiaseelan","doi":"10.1504/ijiei.2023.133074","DOIUrl":"https://doi.org/10.1504/ijiei.2023.133074","url":null,"abstract":"Multiple data streams from sensing devices in intelligent settings have improved life quality thanks to the internet of things (IoT). Anomalies and imbalanced data sources are unavoidable due to system complexity and IoT device rollout issues. An imbalanced dataset has more data for one group than another, which may influence the results. IoT data streams are unbalanced, making anomaly detection harder. Data mining and machine learning classification approaches perform poorly on imbalanced datasets in the current setup. To address this, the proposed system suggests an effective anomaly detection method and oversampling approach (ADO) to improve IoT's ability to identify abnormal behaviours in imbalanced data. After clustering of lower and upper boundary standardisation (CLUBS) detects anomaly samples, the ADO technique provides synthetic samples for minority classes. ADO lowers class region overlaps and enhances classification methods. The experimental results using an imbalanced dataset and three classification algorithms, namely K-nearest neighbour (KNN), random forest (RF), support vector machine (SVM) and multilayer perceptron (MLP), show that the ADO approach increases classification accuracy (0.64% for KNN, 4.27% for RF and 6.33% for SVM) by removing anomalies and oversampling data.","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135058184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods of Anomaly Detection for the Prevention and Detection of Cyber Attacks","authors":"Ravi T.N, Girubagari N","doi":"10.1504/ijiei.2023.10059169","DOIUrl":"https://doi.org/10.1504/ijiei.2023.10059169","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135496952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dual Strategy Based Missing Completely at Random (MCAR) Type Missing Data Imputation on The Internet of Medical Things (IOMT)","authors":"Iris Punitha P, J.G.R. Sathiaseelan","doi":"10.1504/ijiei.2023.10059493","DOIUrl":"https://doi.org/10.1504/ijiei.2023.10059493","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text embedding in image using an optimisation-based key generation method","authors":"Shihab A. Shawkat, Najiba Tagougui, M. Kherallah","doi":"10.1504/ijiei.2023.133072","DOIUrl":"https://doi.org/10.1504/ijiei.2023.133072","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67053047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Venkatakrishnaiah, Jeyanthi S. B. Saravanan, K.Venkatapathi Raju
{"title":"Utilizing Recurrent Neural Network Technique for Predicting Strand Settlement on Brittle Sand and Geocell","authors":"R. Venkatakrishnaiah, Jeyanthi S. B. Saravanan, K.Venkatapathi Raju","doi":"10.1504/ijiei.2023.10056043","DOIUrl":"https://doi.org/10.1504/ijiei.2023.10056043","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67052833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure task scheduling in cloud computing with enhanced ordinal optimisation and integrated DNA, Morse code techniques","authors":"Monika Yadav, Atul Mishra","doi":"10.1504/ijiei.2023.132700","DOIUrl":"https://doi.org/10.1504/ijiei.2023.132700","url":null,"abstract":"This paper presents two innovative approaches to address the challenges of task scheduling, efficient resource utilisation, and security in cloud computing environments. The first approach proposes an optimal task-scheduling strategy for virtual machines in dynamic cloud scenarios, utilising an enhanced ordinal optimisation technique and linear regression to predict future dynamic workload. The second approach utilises Morse code encoding of DNA sequences to optimise scheduling outcomes while ensuring secure scheduling in the cloud environment, integrating ordinal optimisation techniques and the unique properties of DNA sequences. The effectiveness of both proposed approaches is evaluated by comparing them to conventional task-scheduling techniques. The results demonstrate that the proposed approaches achieve better performance in terms of scheduling efficiency and security. These approaches offer a comprehensive solution to address the critical aspects of task scheduling, efficient resource utilisation, and security in cloud computing environments.","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136028634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-authorisation blockchain-based access control for cloud healthcare system","authors":"A. Merabet, A. Lahoulou, Ahmed Alioua","doi":"10.1504/ijiei.2023.133073","DOIUrl":"https://doi.org/10.1504/ijiei.2023.133073","url":null,"abstract":"","PeriodicalId":44231,"journal":{"name":"International Journal of Intelligent Engineering Informatics","volume":null,"pages":null},"PeriodicalIF":6.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67053101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}