The domain of medical diagnosis and predictive analytics is one of the key domains of research with enormous dimensions whereby the diseases of different types can be predicted. Nowadays, there is a huge panic of impact and rapid mutation of the COVID-19 virus impression. The world is getting affected by this virus to a huge extent and there is no vaccine developed so far. India is also having more than 10,000 patients with than 300 deceased. The global human community is having around 20 lacs of Coronavirus patients. The Generative Adversarial Network (GAN) is the contemporary high-performance approach in which the use of advanced neural networks is done for the cavernous analytics of the images and multimedia data. In this research work, the analytics of key points from medical images of the COVID-19 dataset is to be presented using which the diagnosis and predictions can be done for the patients. The GANs are used for the generation, transformation as well as presentation of the dataset and key points using advanced deep learning models which can analyze the patterns in the medical images including X-Ray, CT Scan, and many others. Using such approaches with the integration of GANs, the overall predictive analytics can be made high performance aware as compared to the classical neural networks with multiple layers. In this research manuscript, the inscription of work is projected on the benchmark datasets with the advanced scripting so that the predictive mining and knowledge discovery can be done effectively with more accuracy.
The pipeline leakage detection and leak localization trouble is a highly demanding and dangerous issue. Underground pipelines are a critical mode of transporting enormous fluid volumes (e.g., water) across extended distances. Solving this problem will save the country much money and resources, but it will also protect the environment. On the other hand, present leak detection technologies are insufficient for monitoring underground pipelines due to the extreme subterranean environmental conditions. This study proposes a hybrid wireless sensor network based on TDR (time domain reflectometry) and magnetic induction for monitoring underground pipelines to solve these problems. In this scenario, TDR is deployed beneath an MI-based wireless sensor network. TDR precisely locates the leak and dramatically decreases the amount of time required for inspection. We offer a wireless sensor network based on MI technology for low-cost, real-time leak detection in subsurface pipes. MISE-PIPE identifies leaks by integrating data from a range of different types of sensors installed within and around underground pipelines. Ad-hoc WSNs are used to measure pressure. (WDNs) is a hot topic that has piqued researchers' interest in recent years. Time and accuracy are critical components of leak localization, as they substantially impact the human population and economy. Statistical classifiers acting in the residual space are offered as a general method for leak localization. Classifiers are trained on leak data from all network nodes, taking demand uncertainty, sensor preservative noise, and leak magnitude on the account. Following leak identification and localization, all monitoring data is forwarded to the CH using the K-means clustering method, which serves two critical functions: optimal clustering and prolonging the Network Lifetime (NL) and preserving the QoS. The clustering method is optimized using the K-Means approach .
Breast cancer is the most deadly cancer and has highest mortality rate in women all over the world. Early prediction of breast cancer can improve the survival rate of the patient. Consequently, high accuracy in cancer prediction is important to avoid any mis-diagnosis. Machine learning algorithms can contribute in early prediction and diagnosis of breast cancer. In this study, we have used rough set based feature selector to extract relevant features from the breast cancer feature set and classify them using machine learning algorithm like Decision Tree, Naive Bayes, Support Vector Machine, K-Nearest Neighbor, Logistic Regression, Random Forest, Adaboost. The main aim is to predict cancerous breast nodules, using rough set driven feature selection and machine learning classification algorithms. The results were evaluated pertaining to accuracy, sensitivity and specificity and positive predictive value. It is observed that random forest outperformed all other classifiers and achieved the highest accuracy using the proposed approach (95.23%).
The current study proposes an alternative strategy for managing huge and intricate datasets by integrating a number of information removal strategies, including Correlation-based Feature Selection (CFS), Best-First Search (BFS), and Dominance-based Rough Set Approach (DRSA). The goal of this learning is to improve the classifier's classification presentation by removing uncorrelated or unpredictable information values. The planned approach, dubbed CFS-DRSA, entails numerous stages. The operations are carried out sequentially, with two critical feature extraction techniques applied throughout the process's initial phases. Data reduction can be accomplished in the first phase by utilising both the CFS approach and the BFS algorithm. Second, a DRSA is used with a data selection technique to get the most optimal dataset possible for the circumstance. As a result, the investigation's primary objective is to identify a solution to the problem. Machine learning techniques can be used to increase classification precision while minimising calculation time. By including a variety of characteristics and volumes into the design, the experimental strategy was used to authenticate the planned technique. It was able to demonstrate the method's dependability and reliability using widely used assessment methodologies. When compared to other well-known methods, such as deep learning, this is very remarkable (DL). On the overall, the concept is advantageous because it has been demonstrated to aid the classifier in accurately re occurring a relevant result. When applied to incessant value datasets in which the information opinions do not contain any period info and are potentially inaccurate and unclear, the suggested model CFS-DRSA is effective. To validate the performance of the CFS-DRSA technique, a detailed experimental analysis is carried out and the experimental result highlights the betterment of the CFS-DRSA technique.
Intrusion Detection Systems and Intrusion Prevention Systems are used to detect and prevent attacks/malware from entering the network/system. Honeypot is a type of Intrusion Detection System which is used to find the intruder, study the intruder and prevent the intruder to access the original system. It is necessary to build a strong honeypot because if it is compromised, the original system can be easily targeted by the attacker. To overcome such challenges an efficient honeypot is needed that can shut the attacker after extracting his attack technique and tools. In this paper, a Venus fly-trap optimization algorithm has been used for implementing the honeypot system along with Intrusion Detection System. Venus plants are a type of carnivorous plants that catch their prey intelligently. By adopting this feature we make an effective honeypot system that will intelligently interact with the attacker. A new fitness function has been proposed to identify size of the attacker. The effectiveness of the proposed fitness function has been evaluated by comparing it with state of the art. For comparison, remote-to-local attacks, probing attacks and DOS attacks are performed on both proposed and existing models. The proposed model is significant to catch/block all the intruders which were caught by the art and also the proposed model reduces the time of in-
Intrusion Detection Systems and Intrusion Prevention Systems are used to detect and prevent attacks/malware from entering the network/system. Honeypot is a type of Intrusion Detection System which is used to find the intruder, study the intruder and prevent the intruder to access the original system. It is necessary to build a strong honeypot because if it is compromised, the original system can be easily targeted by the attacker. To overcome such challenges an efficient honeypot is needed that can shut the attacker after extracting his attack technique and tools. In this paper, a Venus fly-trap optimization algorithm has been used for implementing the honeypot system along with Intrusion Detection System. Venus plants are a type of carnivorous plants that catch their prey intelligently. By adopting this feature we make an effective honeypot system that will intelligently interact with the attacker. A new fitness function has been proposed to identify size of the attacker. The effectiveness of the proposed fitness function has been evaluated by comparing it with state of the art. For comparison, remote-to-local attacks, probing attacks and DOS attacks are performed on both proposed and existing models. The proposed model is significant to catch/block all the intruders which were caught by the art and also the proposed model reduces the time of interaction between the attacker and honeypot system thereby giving minimum information to the attacker.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.