Cervical cancer (CC) is the leading cancer, which mainly affects women worldwide. It generally occurs from abnormal cell evolution in the cervix and a vital functional structure in the uterus. The importance of timely...
详细信息
Cervical cancer (CC) is the leading cancer, which mainly affects women worldwide. It generally occurs from abnormal cell evolution in the cervix and a vital functional structure in the uterus. The importance of timely recognition cannot be overstated, which has led to various screening methods such as colposcopy, Human Papillomavirus (HPV) testing, and Pap smears to identify potential threats and enable early intervention. Early detection during the precancerous phase is crucial, as it provides an opportunity for effective treatment. The diagnosis and screening of CC depend on colposcopy and cytology models. Deep learning (DL) is an appropriate technique in computer vision, which has developed as a latent solution to increase the efficiency and accuracy of CC screening when equated to conventional clinical inspection models that are vulnerable to human error. This study presents a Leveraging Swin Transformer with an Ensemble of Deep Learning Model for Cervical Cancer Screening (LSTEDL-CCS) technique for colposcopy images. The presented LSTEDL-CCS technique aims to detect and classify CC on colposcopy images. Initially, the wiener filtering (WF) model is used for image pre-processing. Next, the swin transformer (ST) network is utilized for feature extraction. For the cancer detection process, the ensemble learning method is performed by employing three models, namely autoencoder (AE), bidirectional gated recurrent unit (BiGRU), and deep belief network (DBN). Finally, the hyperparameter tuning of the DL techniques is performed using the pelican optimization algorithm (POA). A comprehensive experimental analysis is conducted, and the results are evaluated under diverse metrics. The performance validation of the LSTEDL-CCS methodology portrayed a superior accuracy value of 99.44% over existing models.
Nowadays, face recognition using video surveillance systems becomes one of the active research topics in security domains. Security plays a significant role in everyday life for secure and sustainable developments of ...
详细信息
Nowadays, face recognition using video surveillance systems becomes one of the active research topics in security domains. Security plays a significant role in everyday life for secure and sustainable developments of smart cities. The conventional techniques provide efficient recognition results only when the faces are captured with complete face images. However, they suffer to handle large pose variation images extracted from video sequences. Therefore, to deal with this issue, this paper specially designed a multidimensional face recognition model to recognize faces under multiple pose variations and angles. Three face video databases, namely facesurv database, IARPA Janus benchmark database and McGill database, are utilized for experimental evaluation. The videos of these three databases are converted into number of image frames through background subtraction process. From the image frames, the large pose variation images with different angles are identified and selected to process further. The video recorded under dynamic environment conditions diminishes recognition performance, so the image frames are processed through several preprocessing pipelines. The preprocessed images are then fed into the proposed optimal mask region-based convolutional neural network with modified short-term memory (OMRCNN-MBiLSTM) model, which learns the facial patterns present in the images more efficiently. The feature vectors learned by the proposed classifier are matched with the input face database to determine the identity of the person. With the ability to handle multiview and large pose variations, the proposed model accurately recognizes faces. The simulation result manifests the superiority of proposed model over other existing methods.
Steganography refers to hiding a secret message from various sources, such as images, videos, audio and so on. The advantage of steganography is to avoid data hacking in transmission medium during the transmission of ...
详细信息
Steganography refers to hiding a secret message from various sources, such as images, videos, audio and so on. The advantage of steganography is to avoid data hacking in transmission medium during the transmission of information sources. Video steganography is superior to image steganography since the videos can hide a substantial quantity of secret messages more than the image. Hence, this research introduced the video stereography technique, Arnold Transform with SqueezeNet-based pelican Whale optimizationalgorithm (AT+SqueezeNet_PWOA), for concealing the secret image on the video. To hide the secret image on the video, the proposed method follows three steps: key frame and feature extraction, pixel prediction and embedding. The extraction of the key frame process is carried out by the Structural Similarity Index Measure (SSIM), and then the neighborhood features and convolutional neural network (CNN) features are extracted from the frame to improve the robustness of the embedding process. Moreover, the pixel prediction is completed by the SqueezeNet model, wherein the learning factors are tuned by the PWOA. In addition, the embedding process is completed by applying the Arnold transform on the predicted pixel, and the transformed regions are combined with the secret image using the embedding function. Likewise, the extraction process extracts the secret image from the embedded video by substituting the predicted pixel and Arnold transform on the embedded video. The proposed method is used to hide chunks of secret data in the form of video sequences and it improves the performance. The Arnold transform used in this work provides security by encrypting the data. The use of SqueezeNet makes the proposed model a simple design and this reduces the computational time. Thus, the AT+SqeezeNet_PWOA attained better correlation coefficient (CC), peak signal-to-noise ratio (PSNR) and mean square error (MSE) of 0.908, 48.66 and 0.001 dB with the Gaussian noise.
Low-resource utilization and high-energy consumption have become progressively protuberant issues in cloud data centers. Virtual Machine (VM) migration is the key objective to resolve this issue. Moreover, extreme VM ...
详细信息
Low-resource utilization and high-energy consumption have become progressively protuberant issues in cloud data centers. Virtual Machine (VM) migration is the key objective to resolve this issue. Moreover, extreme VM migration might empower Service-Level Agreement (SLA) violations. Few works are considered for optimizing throughput and energy consumption. An efficient VM migration must consider different parameters like network communication overhead, migration overhead, resource utilization, energy consumption and quality of service which is a multi-objective issue. Hence, in this paper, a Modified pelicanoptimization-based Variable Load Mean Function (MPO-VLMF)-based host overload detection is presented and security enhancement is developed. The main motive of this study is to achieve host overload detection and security enhancement. To obtain host overload detection, the variable load mean function is developed. In this mean function, the weight parameter is selected by considering Modified pelicanoptimization (MPO). The Levy flight (LF) is considered for enhancing the updating process of pelicanoptimization (PO). To enhance the security of the system, the Digital Signature-based Encryption (DSE) is developed. Based on this proposed approach, security and host overload detection are obtained. The proposed technique is implemented and evaluated by performance measures. It is compared with the conventional approaches to justify the performance of the system.
The swift development of the Internet of Things (IoT) devices has created a pressing need for effective cybersecurity measures. They are vulnerable to different cyber threats that can compromise the functionality and ...
详细信息
Electric vehicles (EVs) are considered an essential mode of transportation due to their advantages, non-polluting and noise-free characteristics. The batteries are considered the primary power source for electric vehi...
详细信息
Electric vehicles (EVs) are considered an essential mode of transportation due to their advantages, non-polluting and noise-free characteristics. The batteries are considered the primary power source for electric vehicles, ensuring energy supply and thus improving the user experience. However, designing charging stations and uncontrolled charge scheduling are the barriers evaluated in charging stations. To solve these issues, a fuzzy-based pelican optimization algorithm (POA) is proposed in this work. Set of rules are generated in the fuzzy for optimal energy management inn charging station. POA schedules the EVs in the charging station based on arrival time and SOC to reduce the running cost. Demand in the charging station is based on the state of charge (SOC) of the EVs arriving at the charging station. Solar power with battery and ultracapacitor is used as an input source for charging stations. The energy management in the system is based on fuzzy to satisfy the load demand from PV and energy storage devices. This proposed method is implemented in the Simulink tool to evaluate the performance. This simulation result show the effectiveness of the proposed with optimal scheduling and energy management. By this method running cost are reduced compared to the existing algorithms.
Tidal energy is a new type of clean energy, the development and utilization of it has great scientific research potential, practical application value and broad development prospect. Because the generation process of ...
详细信息
Tidal energy is a new type of clean energy, the development and utilization of it has great scientific research potential, practical application value and broad development prospect. Because the generation process of tidal energy involves many complex ocean dynamic factors, and the method of predicting tidal energy is relatively simple, it is a meaningful work to research its prediction. Aiming at the nonlinear and nonstationary characteristics of tidal energy, propose a tidal energy prediction method based on improved time-varying filter- empirical mode decomposition with pelican optimization algorithm (POA-TVF-EMD) and confluent double- stream neural network (CNN-LSTM). Firstly, propose a sum of refined composite multiscale dispersion entropy and Spearman correlation coefficient as the fitness function of the search process, and use POA-TVF-EMD to decompose tidal energy into a string of intrinsic mode functions. Secondly, use CNN-LSTM to predict each component, and reconstruct the component prediction result to get the initial prediction result. Then, calculate the difference between the original signal and the initial prediction result to get the error result, bring the error result back to CNN-LSTM for prediction to get the error prediction result, and take the average of the error result and the error prediction result to get the error correction result. Finally, reconstruct the initial prediction result and the error correction result to get the final prediction result. Take tidal energy data in Texas, Caribbean and Washington as case study, and design ten prediction methods for comparative experiment. Take tidal energy data of Washington as an example, coefficient of determination, root mean square error, mean absolute error and mean absolute percentage error of the prediction results of proposed prediction method are 0.99873, 0.10695, 0.08189 and 0.00965 respectively. The experimental result shows that proposed prediction method is superior to all other comp
In recent times, network-based applications have rapidly grown in the field of information and communication technology(ICT), which enables individuals and organizations to connect and share their sensitive informatio...
详细信息
In recent times, network-based applications have rapidly grown in the field of information and communication technology(ICT), which enables individuals and organizations to connect and share their sensitive information seamlessly. The security of these network-based applications is imperative to avoid cyber-attacks during the exchange of sensitive information. The identification of anomalies in network events can be highly challenging due to the complex nature of traffic flows. To solve the challenges, network intrusion detection system (NIDS) technology is used;any network can profit from this system because it can monitor traffic and detect any irregularities. The existing NIDS systems driven by machine learning models do not provide sufficient ability to handle heterogeneous data and realize performance degradation while detecting some types of attacks. Therefore, this paper proposes an innovative meta-heuristic optimization and deep learning-based methodology for improving the performance of NIDS systems. Initially, the raw captured traffic data is fed into the pre-processing phase to attain data standardization and data balancing. Further, an extended pelican optimization algorithm (Ex-Pel) is employed to select the set of features from the pre-processed data optimally. Finally, the Self-Attention Assisted Weighted Auto Encoder (SAttn_WAE) is executed to detect the attacks precisely through the set of optimal features. The execution of the proposed methodology is carried out in the Python platform, and performance evaluation is done using accuracy, precision, recall, FAR, and F1-score metrics. The proposed model achieved an accuracy of 99.23%, precision of 99.78%, FAR of 0.67%, recall of 99.13%, and F1-score of 99.32%, which is comparatively better than existing models.
A wireless Sensor Network (WSN) is made up of many sensor nodes which gather and transmit data to a central location. The limited resources of the nodes create significant security challenges when deploying and commun...
详细信息
A wireless Sensor Network (WSN) is made up of many sensor nodes which gather and transmit data to a central location. The limited resources of the nodes create significant security challenges when deploying and communicating WSNs. The detection of unauthorized access is a crucial aspect of enhancing the security measures of WSNs. The utilization of network intrusion detection systems (IDS) has become an essential aspect of any communication network, as they offer valuable services to the network. Several studies in the field of machine learning have been conducted to explore the potential of utilizing this technology for intrusion detection in WSNs, yielding promising outcomes. These efforts still need to be more precise and efficient against network traffic unbalanced data issues. The paper presents a new model for detecting intrusion attacks that utilize a hybrid multilayer perceptron (MLP) and CatBoost classifier, as well as feature selection techniques. The proposed approach aims for good performance in identifying different forms of threats. The system performs data preprocessing on various datasets and reduces the dataset size using a feature selection algorithm. pelican optimization algorithm (POA) has been proposed for tuning the hyper-parameters of the classifier designs and selecting the relevant features from the dataset. The CSE-CIC-IDS2018, AWID, and UNSW-NB15 databases reutilized for conducting performance evaluations on the proposed framework. The tests included accuracy, precision, recall, FAR, DR and complexity time. The proposed model has a low FPR and high accuracy in binary classification, as shown.
Effective landslide representation from great spatial resolution images is significant in numerous applications. Many research works and techniques have been advertised. Still, these methods are very challenging to re...
详细信息
Effective landslide representation from great spatial resolution images is significant in numerous applications. Many research works and techniques have been advertised. Still, these methods are very challenging to relate in real time since they depend on remotely sensing landslides from a solitary sensor with an exact spatial resolution. Precisely identifying landslides over a vast region with intricate background entities is difficult. Machine Learning (ML) and Deep Learning (DL) have attained extraordinary performance in classifying images utilizing remotely sensed images from numerous platforms. Moreover, techniques built within DL architectures tend to implement encoder-decoder network structures, where constant convolutions effortlessly strain out numerous landslide features. This study develops a Bidirectional Atrous Spatial Pyramid Pooling-Based Semantic Segmentation and Classification Model (BASPP-SSCM) technique for landslide Remote Sensing Images. The main goal of the BASPP-SSCM technique is to segment and classify the landslide areas. In the preprocessing stage, the BASPP-SSCM model employs an adaptive Wiener filtering (AWF) technique to eliminate the noise. Next, for the semantic segmentation method, the BASPP-SSCM technique utilizes the DeepLabV3 method with the backbone of the ConvNeXtLarge model for determining the landslide region. Furthermore, the CapsNet model is utilized for the feature extraction process. Besides, the Rigdelet neural network (RNN) technique is employed for the landslide classification process. At last, the pelican optimization algorithm (POA) methodology is implemented to fine-tune the parameters involved in the RNN model. A wide range of investigations is performed to highlight the superiority of the BASPP-SSCM method using a benchmark dataset. The performance validation of the BASPP-SSCM method underscored a superior accuracy value of 98.23% of other existing approaches.
暂无评论