Integration of artificial intelligence (AI) techniques in wireless infrastructure, real-time collection, and processing of end-user devices is now in high demand. It is now superlative to use AI to detect and predict pandemics of a colossal nature. The Coronavirus disease 2019 (COVID-19) pandemic, which originated in Wuhan China, has had disastrous effects on the global community and has overburdened advanced healthcare systems throughout the world. Globally; over 4,063,525 confirmed cases and 282,244 deaths have been recorded as of 11th May 2020, according to the European Centre for Disease Prevention and Control agency. However, the current rapid and exponential rise in the number of patients has necessitated efficient and quick prediction of the possible outcome of an infected patient for appropriate treatment using AI techniques. This paper proposes a fine-tuned Random Forest model boosted by the AdaBoost algorithm. The model uses the COVID-19 patient's geographical, travel, health, and demographic data to predict the severity of the case and the possible outcome, recovery, or death. The model has an accuracy of 94% and a F1 Score of 0.86 on the dataset used. The data analysis reveals a positive correlation between patients' gender and deaths, and also indicates that the majority of patients are aged between 20 and 70 years.
Recently Internet of Things (IoT) is being used in several fields like smart city, agriculture, weather forecasting, smart grids, waste management, etc. Even though IoT has huge potential in several applications, there are some areas for improvement. In the current work, we have concentrated on minimizing the energy consumption of sensors in the IoT network that will lead to an increase in the network lifetime. In this work, to optimize the energy consumption, most appropriate Cluster Head (CH) is chosen in the IoT network. The proposed work makes use of a hybrid meta-heuristic algorithm, namely, Whale Optimization Algorithm (WOA) with Simulated Annealing (SA). To select the optimal CH in the clusters of IoT network, several performance metrics such as the number of alive nodes, load, temperature, residual energy, cost function has been used. The proposed approach is then compared with several state-of-the-art optimization algorithms like Artificial Bee Colony (ABC) algorithm, Genetic Algorithm (GA), Adaptive Gravitational Search algorithm (AGSA), Whale Optimization Algorithm (WOA). The results prove the superiority of the proposed hybrid approach over existing approaches.
Classification of imbalanced data is a vastly explored issue of the last and present decade and still keeps the same importance because data are an essential term today and it becomes crucial when data are distributed into several classes. The term imbalance refers to uneven distribution of data into classes that severely affects the performance of traditional classifiers, that is, classifiers become biased toward the class having larger amount of data. The data generated from wireless sensor networks will have several imbalances. This review article is a decent analysis of imbalance issue for wireless sensor networks and other application domains, which will help the community to understand WHAT, WHY, and WHEN of imbalance in data and its remedies.
Cyber-attacks are evolving at a disturbing rate. Data breaches, ransomware attacks, cryptojacking, malware and phishing attacks are now rampant. In this era of cyber warfare, the software industry is also growing with an increasing number of software being used in all domains of life. This evolution has added to the problems of software vendors and users where they have to prevent a wide range of attacks. Existing watermark detection solutions have a low detection rate in the software. In order to address this issue, this paper proposes a novel blind Zero code based Watermark detection approach named KeySplitWatermark, for the protection of software against cyber-attacks. The algorithm adds watermark logically into the code utilizing the inherent properties of code and gives a robust solution. The embedding algorithm uses keywords to make segments of the code to produce a key-dependent on the watermark. The extraction algorithms use this key to remove watermark and detect tampering. When tampering increases to a certain user-defined threshold, the original software code is restored making it resilient against attacks. KeySplitWatermark is evaluated on tampering attacks on three unique samples with two distinct watermarks. The outcomes show that the proposed approach reports promising results against cyber-attacks that are powerful and viable. We compared the performance of our proposal with state-of-the-art works using two different software codes. Our results depict that KeySplitWatermark correctly detects watermarks, resulting in up to 15.95 and 17.43 percent reduction in execution time on given code samples with no increase in program size and independent of watermark size.
Coronavirus is a fatal disease that affects mammals and birds. Usually, this virus spreads in humans through aerial precipitation of any fluid secreted from the infected entity’s body part. This type of virus is fatal than other unpremeditated viruses. Meanwhile, another class of coronavirus was developed in December 2019, named Novel Coronavirus (2019-nCoV), first seen in Wuhan, China. From January 23, 2020, the number of affected individuals from this virus rapidly increased in Wuhan and other countries. This research proposes a system for classifying and analyzing the predictions obtained from symptoms of this virus. The proposed system aims to determine those attributes that help in the early detection of Coronavirus Disease (COVID-19) using the Adaptive Neuro-Fuzzy Inference System (ANFIS). This work computes the accuracy of different machine learning classifiers and selects the best classifier for COVID-19 detection based on comparative analysis. ANFIS is used to model and control ill-defined and uncertain systems to predict this globally spread disease’s risk factor. COVID-19 dataset is classified using Support Vector Machine (SVM) because it achieved the highest accuracy of 100% among all classifiers. Furthermore, the ANFIS model is implemented on this classified dataset, which results in an 80% risk prediction for COVID-19.
The pursuit to spot abnormal behaviors in and out of a network system is what led to a system known as intrusion detection systems for soft computing besides many researchers have applied machine learning around this area. Obviously, a single classifier alone in the classifications seems impossible to control network intruders. This limitation is what led us to perform dimensionality reduction by means of correlation-based feature selection approach (CFS approach) in addition to a refined ensemble model. The paper aims to improve the Intrusion Detection System (IDS) by proposing a CFS + Ensemble Classifiers (Bagging and Adaboost) which has high accuracy, high packet detection rate, and low false alarm rate. Machine Learning Ensemble Models with base classifiers (J48, Random Forest, and Reptree) were built. Binary classification, as well as Multiclass classification for KDD99 and NSLKDD datasets, was done while all the attacks were named as an anomaly and normal traffic. Class labels consisted of five major attacks, namely Denial of Service (DoS), Probe, User-to-Root (U2R), Root to Local attacks (R2L), and Normal class attacks. Results from the experiment showed that our proposed model produces 0 false alarm rate (FAR) and 99.90% detection rate (DR) for the KDD99 dataset, and 0.5% FAR and 98.60% DR for NSLKDD dataset when working with 6 and 13 selected features.
Recognizing human physical activities from streaming smartphone sensor readings is essential for the successful realization of a smart environment. Physical activity recognition is one of the active research topics to provide users the adaptive services using smart devices. Existing physical activity recognition methods lack in providing fast and accurate recognition of activities. This paper proposes an approach to recognize physical activities using only2-axes of the smartphone accelerometer sensor. It also investigates the effectiveness and contribution of each axis of the accelerometer in the recognition of physical activities. To implement our approach, data of daily life activities are collected labeled using the accelerometer from 12 participants. Furthermore, three machine learning classifiers are implemented to train the model on the collected dataset and in predicting the activities. Our proposed approach provides more promising results compared to the existing techniques and presents a strong rationale behind the effectiveness and contribution of each axis of an accelerometer for activity recognition. To ensure the reliability of the model, we evaluate the proposed approach and observations on standard publicly available dataset WISDM also and provide a comparative analysis with state-of-the-art studies. The proposed approach achieved 93% weighted accuracy with Multilayer Perceptron (MLP) classifier, which is almost 13% higher than the existing methods.2 of 18 emotional issues, and depression as well. Physical fitness can be tracked and analyzed by monitoring daily life physical activities.Physical activity recognition was initiated back in 2004 using on-body sensors. Researchers in [2] used the accelerometer's annotated data to recognize the physical activities. They made an Android-based system that collects raw data from the accelerometer and applied machine learning algorithms to predict physical activities. Authors in [3] recognized six basic activities, i.e., walking, jogging, sitting, standing, upstairs and downstairs. Authors in [4] used on-body sensors for activity recognition but found that it is very difficult to carry the sensors all the time. Many authors suggested that a smartphone is a non-obtrusive option for activity recognition [3,[5][6][7][8][9].The smartphone is playing a vital role in modern life. It provides services and applications such as health monitoring, early-stage disease detection, sports analysis, fitness tracking, and behavior analysis. Android-based smartphones have a built-in motion sensor that provides accurate and precise acceleration readings against physical activities. In early conditions, dedicated sensors were used for activity recognition. There exist several techniques for physical activity recognition such as on-body obtrusive and non-obtrusive sensors [10][11][12][13]. Non-obtrusive sensors are used in smart homes and smartphones. In smart homes, different motion and door sensors are installed at different locations and the primary objective is to recognize...
Wireless sensor network (WSN) is a collection of a huge number of autonomous sensor nodes having capabilities such as sensing, processing, and manipulation.In any WSN, routing protocols are the backbone for performing all type tasks such as sensing, controlling, and transmission of packets in ubiquitous environment. In this article, a LEACH protocol with Levenberg-Marquardt neural network (LEACH-LMNN) is considered to analyze the overall network lifetime. The aim of LEACH-LMNN protocol comprises two parts: selection of cluster head node using LMNN approach and the second part is to locate the shortest path from the cluster-head node to base-station node adopting various route discovery algorithms, that is, breadth-first search, Bellman-Ford, and Dijkstra.The simulation result shows that the LEACH-LMNN protocol with the Dijkstra shortest path algorithm outperforms other route discovery algorithms. In addition to this, this work also analyzes normal and anomaly detection based on intrusion detection system in wireless sensor networks using gated mechanism, that is, long short-term memory (LSTM) and gated recurrent unit (GRU) in deep learning models. The proposed model achieves the highest detection rate of 97.84% for GRU and 97.85% for LSTM as well as improves the false positive rate (FPR) of 5.87% and 3.88% FPR for GRU and LSTM, respectively. INTRODUCTIONWireless sensor networks is a collaboration of huge range of autonomous sensors. It communicates with each other via radio signals. 1,2 Each node has capability of sensing, processing, and communicating. The communication is done either directly if the base-station (BS) node is one-hop distant or via intermediate sensor nodes in multihop formation. The sensor routing protocols play a vital role in managing various processes of communication, manipulation, and other functional activities. Moreover, sensor routing protocols are a valuable part of signal processing and provide a platform for autonomous sensor nodes that do work collaboratively. [3][4][5] The communication between sensor nodes is responsible for energy depletion of those involved in communication. The consumption of energy is at highest level, while sensor node communicates with neighboring sensor nodes. The proper utilization of energy consumption of each node is a prime
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.