A growing number of individuals and organizations are turning to machine learning (ML) and deep learning (DL) to analyze massive amounts of data and produce actionable insights. Predicting the early stages of serious illnesses using ML-based schemes, including cancer, kidney failure, and heart attacks, is becoming increasingly common in medical practice. Cervical cancer is one of the most frequent diseases among women, and early diagnosis could be a possible solution for preventing this cancer. Thus, this study presents an astute way to predict cervical cancer with ML algorithms. Research dataset, data pre-processing, predictive model selection (PMS), and pseudo-code are the four phases of the proposed research technique. The PMS section reports experiments with a range of classic machine learning methods, including decision tree (DT), logistic regression (LR), support vector machine (SVM), K-nearest neighbors algorithm (KNN), adaptive boosting, gradient boosting, random forest, and XGBoost. In terms of cervical cancer prediction, the highest classification score of 100% is achieved with random forest (RF), decision tree (DT), adaptive boosting, and gradient boosting algorithms. In contrast, 99% accuracy has been found with SVM. The computational complexity of classic machine learning techniques is computed to assess the efficacy of the models. In addition, 132 Saudi Arabian volunteers were polled as part of this study to learn their thoughts about computer-assisted cervical cancer prediction, to focus attention on the human papillomavirus (HPV).
The evolution of the utilization of technologies in nearly all aspects of life has produced an enormous amount of data essential in a smart city. Therefore, maximizing the benefits of technologies such as cloud computing, fog computing, and the Internet of things is important to manage and manipulate data in smart cities. However, certain types of data are sensitive and risky and may be infiltrated by malicious attacks. As a result, such data may be corrupted, thereby causing concern. The damage inflicted by an attacker on a set of data can spread through an entire database. Valid transactions that have read corrupted data can update other data items based on the values read. In this study, we introduce a unique model that uses fog computing in smart cities to manage utility service companies and consumer data. We also propose a novel technique to assess damage to data caused by an attack. Thus, original data can be recovered, and a database can be returned to its consistent state as no attacking has occurred.
The world has experienced a huge advancement in computing technology. People prefer outsourcing their confidential data for storage and processing in cloud computing because of the auspicious services provided by cloud service providers. As promising as this paradigm is, it creates issues, including everything from data security to time latency with data computation and delivery to end-users. In response to these challenges, the fog computing paradigm was proposed as an extension of cloud computing to overcome the time latency and communication overhead and to bring computing and storage resources close to both the ground and the end-users. However, fog computing inherits the same security and privacy challenges encountered by traditional cloud computing. This paper proposed a fine-grained data access control approach by integrating the ciphertext policy attribute-based encryption (CP-ABE) algorithm and blockchain technology to secure end-users’ data security against rogue fog nodes in case a compromised fog node is ousted. In this approach, we proposed federations of fog nodes that share the same attributes, such as services and locations. The fog federation concept minimizes the time latency and communication overhead between fog nodes and cloud servers. Furthermore, the blockchain idea and the CP-ABE algorithm integration allow for fog nodes within the same fog federation to conduct a distributed authorization process. Besides that, to address time latency and communication overhead issues, we equip each fog node with an off-chain database to store the most frequently accessed data files for a particular time, as well as an on-chain access control policies table (on-chain files tracking table) that must be protected from tampering by rogue fog nodes. As a result, the blockchain plays a critical role here because it is tamper-proof by nature. We assess our approach’s efficiency and feasibility by conducting a simulation and analyzing its security and performance.
On the edge of the worldwide public health crisis, the COVID-19 disease has become a serious headache for its destructive nature on humanity worldwide. Wearing a facial mask can be an effective possible solution to mitigate the spreading of the virus and reduce the death rate. Thus, wearing a face mask in public places such as shopping malls, hotels, restaurants, homes, and offices needs to be enforced. This research work comes up with a solution of mask surveillance system utilizing the mechanism of modern computations like Deep Learning (DL), Internet of things (IoT), and Blockchain. The absence or displacement of the mask will be identified with a raspberry pi, a camera module, and the operations of DL and Machine Learning (ML). The detected information will be sent to the cloud server with the mechanism of IoT for real-time data monitoring. The proposed model also includes a Blockchain-based architecture to secure the transactions of mask detection and create efficient data security, monitoring, and storage from intruders. This research further includes an IoT-based mask detection scheme with signal bulbs, alarms, and notifications in the smartphone. To find the efficacy of the proposed method, a set of experiments has been enumerated and interpreted. This research work finds the highest accuracy of 99.95% in the detection and classification of facial masks. Some related experiments with IoT and Block-chain-based integration have also been performed and calculated the corresponding experimental data accordingly. A System Usability Scale (SUS) has been accomplished to check the satisfaction level of use and found the SUS score of 77%. Further, a comparison among existing solutions on three emergent technologies is included to track the significance of the proposed scheme. However, the proposed system can be an efficient mask surveillance system for COVID-19 and workable in real-time mask detection and classification.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.