The increase in population growth and demand is rapidly depleting natural resources. Irrigation plays a vital role in the productivity and growth of agriculture, consuming no less than 75% of fresh water utilization globally. Irrigation, being the largest consumer of water across the globe, needs refinements in its process, and because it is implemented by individuals (farmers), the use of water for irrigation is not effective. To enhance irrigation management, farmers need to keep track of information such as soil type, climatic conditions, available water resources, soil pH, soil nutrients, and soil moisture to make decisions that resolve or prevent agricultural complexity. Irrigation, a data-driven technology, requires the integration of emerging technologies and modern methodologies to provide solutions to the complex problems faced by agriculture. The paper is an overview of IoT-enabled modern technologies through which irrigation management can be elevated. This paper presents the evolution of irrigation and IoT, factors to be considered for effective irrigation, the need for effective irrigation optimization, and how dynamic irrigation optimization would help reduce water use. The paper also discusses the different IoT architecture and deployment models, sensors, and controllers used in the agriculture field, available cloud platforms for IoT, prominent tools or software used for irrigation scheduling and water need prediction, and machine learning and neural network models for irrigation. Convergence of the tools, technologies and approaches helps in the development of better irrigation management applications. Access to real-time data, such as weather, plant and soil data, must be enhanced for the development of effective irrigation management applications.
Diagnosis and treatment of hepatocellular carcinoma or metastases rely heavily on accurate segmentation and classification of liver tumours. However, due to the liver tumor’s hazy borders and wide range of possible shapes, sizes, and positions, accurate and automatic tumour segmentation and classification remains a difficult challenge. With the advancement of computing, new models in artificial intelligence have evolved. Following its success in Natural language processing (NLP), the transformer paradigm has been adopted by the computer vision (CV) community of the NLP. While there are already accepted approaches to classifying the liver, especially in clinical settings, there is room for advancement in terms of their precision. This paper makes an effort to apply a novel model for segmenting and classifying liver tumours built on deep learning. In order to accomplish this, the created model follows a three-stage procedure consisting of (a) pre-processing, (b) liver segmentation, and (c) classification. In the first phase, the collected Computed Tomography (CT) images undergo three stages of pre-processing, including contrast improvement via histogram equalization and noise reduction via the median filter. Next, an enhanced mask region-based convolutional neural networks (Mask R-CNN) model is used to separate the liver from the CT abdominal image. To prevent overfitting, the segmented picture is fed onto an Enhanced Swin Transformer Network with Adversarial Propagation (APESTNet). The experimental results prove the superior performance of the proposed perfect on a wide variety of CT images, as well as its efficiency and low sensitivity to noise.
Decoupled data and control planes in Software Defined Networks (SDN) allow them to handle an increasing number of threats by limiting harmful network links at the switching stage. As storage, high-end servers, and network devices, Network Function Virtualization (NFV) is designed to replace purpose-built network elements with VNFs (Virtualized Network Functions). A Software Defined Network Function Virtualization (SDNFV) network is designed in this paper to boost network performance. Stateful firewall services are deployed as VNFs in the SDN network in this article to offer security and boost network scalability. The SDN controller’s role is to develop a set of guidelines and rules to avoid hazardous network connectivity. Intruder assaults that employ numerous socket addresses cannot be adequately protected by these strategies. Machine learning algorithms are trained using traditional network threat intelligence data to identify potentially malicious linkages and probable attack targets. Based on conventional network data (DT), Bayesian Network (BayesNet), Naive-Bayes, C4.5, and Decision Table (DT) algorithms are used to predict the target host that will be attacked. The experimental results shows that the Bayesian Network algorithm achieved an average prediction accuracy of 92.87%, Native–Bayes Algorithm achieved an average prediction accuracy of 87.81%, C4.5 Algorithm achieved an average prediction accuracy of 84.92%, and the Decision Tree algorithm achieved an average prediction accuracy of 83.18%. There were 451 k login attempts from 178 different countries, with over 70 k source IP addresses and 40 k source port addresses recorded in a large dataset from nine honeypot servers.
Social media websites are becoming more prevalent on the Internet. Sites, such as Twitter, Facebook, and Instagram, spend significantly more of their time on users online. People in social media share thoughts, views, and facts and create new acquaintances. Social media sites supply users with a great deal of useful information. This enormous quantity of social media information invites hackers to abuse data. These hackers establish fraudulent profiles for actual people and distribute useless material. The material on spam might include commercials and harmful URLs that disrupt natural users. This spam content is a massive problem in social networks. Spam identification is a vital procedure on social media networking platforms. In this paper, we have proposed a spam detection artificial intelligence technique for Twitter social networks. In this approach, we employed a vector support machine, a neural artificial network, and a random forest technique to build a model. The results indicate that, compared with RF and ANN algorithms, the suggested support vector machine algorithm has the greatest precision, recall, and F-measure. The findings of this paper would be useful in monitoring and tracking social media shared photos for the identification of inappropriate content and forged images and to safeguard social media from digital threats and attacks.
Unbalanced load condition is one of the major issues of all commercial, industrial and residential sectors. Unbalanced load means that, when different loads are distributed on a three-phase four-wire system, unequal currents pass through the three phases. Due to it, a heavy current flows in the neutral wire, which not only adds the losses, but also puts constraints on three phases’ loads. In this paper, we have presented a practical approach for load balancing. First, we have considered the existing three-phase load system where the supply is a three-phase unbalanced supply. Before balancing the load, it is necessary to compensate the current in neutral wire. A nature-inspired moth–flame optimization (MFO) algorithm is used to propose a scheme for balancing of current in neutral wire. The information of a distributed single-phase load was used to balance the currents in a three-phase system. The feeder phase and load profiles of each single-phase load are used to reconfigure the network using an optimization process. By balancing the current of three phases, the current of the neutral conductor in substation transformers was reduced to almost zero.
A MANET consists of a group of mobile nodes. In a MANET, scalability and mobility have a greater influence on routing performance. The clustering technique plays a vital role in enhancing the routing mechanism and improving the network lifetime of a large-scale network like a MANET. The clustering process will degrade network performance if the malicious node is chosen as the Cluster Leader (CL). Thus, the secure clustering process in a MANET is a very challenging task. To overcome this problem, the following key factors like Trust Value (TV), Residual Energy Level (REL), and Mobility (M) of the node are used as decision-making parameters to elect a Cluster Leader (CL). In this work, we have proposed a soft computing-based neuro-fuzzy model, ANFIS-based Energy-Efficient Secure Clustering Model (ANFIS-EESC), with a primary objective of forming energy-aware stable trust-based clustering in a MANET. Moreover, we have proposed two working novel algorithms: Weight-Based Trust Estimation (WBTE) algorithm and the Fuzzy-Based Clustering (FBC) algorithm. The primary objective of the WBTE algorithm is to measure the trustworthiness of the nodes and to mitigate the malicious nodes. Fuzzy-Based Clustering (FBC) algorithm is a fuzzy logic-based cluster formation algorithm. In our proposed work, each non-CL in the system applies the cluster density of CL and mobility for each CL node using the Mamdani Fuzzy Inference system, and makes the decision to join as a member with a CL that holds maximum value. Simulation results show that the proposed work enhances the network performance by electing a more stable trust-aware and energy-aware node as Cluster leader (CL). We compare the performance parameters of the proposed work, such as packet delivery rate, energy consumption, detection rate, and reaffiliation, with the existing work, Weighted Clustering Algorithm (WCA). The network lifetime is 39% greater in the proposed ANFIS-EESC model than in the other existing work, WCA. Moreover, ANFIS-EESC shows an enhancement of 22% to 32% in packet delivery ratio and 32% and 39% in throughput. From the above analysis, it has been proved that the proposed work gives a better performance in terms of reliability and stability when compared to the existing work, WCA.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.