• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.028 seconds

Water Detection in an Open Environment: A Comprehensive Review

  • Muhammad Abdullah, Sandhu;Asjad, Amin;Muhammad Ali, Qureshi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2023
  • Open surface water body extraction is gaining popularity in recent years due to its versatile applications. Multiple techniques are used for water detection based on applications. Different applications of Radar as LADAR, Ground-penetrating, synthetic aperture, and sounding radars are used to detect water. Shortwave infrared, thermal, optical, and multi-spectral sensors are widely used to detect water bodies. A stereo camera is another way to detect water and different methods are applied to the images of stereo cameras such as deep learning, machine learning, polarization, color variations, and descriptors are used to segment water and no water areas. The Satellite is also used at a high level to get water imagery and the captured imagery is processed using various methods such as features extraction, thresholding, entropy-based, and machine learning to find water on the surface. In this paper, we have summarized all the available methods to detect water areas. The main focus of this survey is on water detection especially in small patches or in small areas. The second aim of this survey is to detect water hazards for unmanned vehicles and off-sure navigation.

Optimized Deep Learning Techniques for Disease Detection in Rice Crop using Merged Datasets

  • Muhammad Junaid;Sohail Jabbar;Muhammad Munwar Iqbal;Saqib Majeed;Mubarak Albathan;Qaisar Abbas;Ayyaz Hussain
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.57-66
    • /
    • 2023
  • Rice is an important food crop for most of the population in the world and it is largely cultivated in Pakistan. It not only fulfills food demand in the country but also contributes to the wealth of Pakistan. But its production can be affected by climate change. The irregularities in the climate can cause several diseases such as brown spots, bacterial blight, tungro and leaf blasts, etc. Detection of these diseases is necessary for suitable treatment. These diseases can be effectively detected using deep learning such as Convolution Neural networks. Due to the small dataset, transfer learning models such as vgg16 model can effectively detect the diseases. In this paper, vgg16, inception and xception models are used. Vgg16, inception and xception models have achieved 99.22%, 88.48% and 93.92% validation accuracies when the epoch value is set to 10. Evaluation of models has also been done using accuracy, recall, precision, and confusion matrix.

Predicting Brain Tumor Using Transfer Learning

  • Mustafa Abdul Salam;Sanaa Taha;Sameh Alahmady;Alwan Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.73-88
    • /
    • 2023
  • Brain tumors can also be an abnormal collection or accumulation of cells in the brain that can be life-threatening due to their ability to invade and metastasize to nearby tissues. Accurate diagnosis is critical to the success of treatment planning, and resonant imaging is the primary diagnostic imaging method used to diagnose brain tumors and their extent. Deep learning methods for computer vision applications have shown significant improvements in recent years, primarily due to the undeniable fact that there is a large amount of data on the market to teach models. Therefore, improvements within the model architecture perform better approximations in the monitored configuration. Tumor classification using these deep learning techniques has made great strides by providing reliable, annotated open data sets. Reduce computational effort and learn specific spatial and temporal relationships. This white paper describes transfer models such as the MobileNet model, VGG19 model, InceptionResNetV2 model, Inception model, and DenseNet201 model. The model uses three different optimizers, Adam, SGD, and RMSprop. Finally, the pre-trained MobileNet with RMSprop optimizer is the best model in this paper, with 0.995 accuracies, 0.99 sensitivity, and 1.00 specificity, while at the same time having the lowest computational cost.

Nuclear power utilization as a future alternative energy on icebreakers

  • M. Bayraktar;M. Pamik
    • Nuclear Engineering and Technology
    • /
    • v.55 no.2
    • /
    • pp.580-586
    • /
    • 2023
  • Diversified fuel types such as methanol, hydrogen, liquefied natural gas, ammonia, biofuels, have been come to fore in consideration of the limitations, regulations, environmental perception and efficient use of resources on maritime sector. NE is described as a substantial alternative energy source on the marine vessels in the sense of de-carbonization and fuel efficiency activities carried out by IMO. Although NPVs have been constructed for the merchant, navy and supply fields over the years, their numbers are few and working ranges are quite limited. NE generation techniques, reactor types, safety and security issues in case of any leakage or radiation pollution are analyzed and comparisons are performed between fossil-based fueled and NP based on icebreakers. The comparison are conducted on the basis of dimensions, resistances and operational competences by the VIKOR. NP icebreakers operated in recent years occupy a notable position in the ranking, although fossil fueled ones are most prevalent. Consequently, refueling period and emissions are the principal benefits of NPVs. Nevertheless, the use of such systems on marine vessels especially for merchant ships may come to the fore when all concerns in terms of safety, security and society are resolved since the slightest mistake can have irreversible consequences.

IEEE 802.15.4e TSCH-mode Scheduling in Wireless Communication Networks

  • Ines Hosni;Ourida Ben boubaker
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.156-165
    • /
    • 2023
  • IEEE 802.15.4e-TSCH is recognized as a wireless industrial sensor network standard used in IoT systems. To ensure both power savings and reliable communications, the TSCH standard uses techniques including channel hopping and bandwidth reserve. In TSCH mode, scheduling is crucial because it allows sensor nodes to select when data should be delivered or received. Because a wide range of applications may necessitate energy economy and transmission dependability, we present a distributed approach that uses a cluster tree topology to forecast scheduling requirements for the following slotframe, concentrating on the Poisson model. The proposed Optimized Minimal Scheduling Function (OMSF) is interested in the details of the scheduling time intervals, something that was not supported by the Minimal Scheduling Function (MSF) proposed by the 6TSCH group. Our contribution helps to deduce the number of cells needed in the following slotframe by reducing the number of negotiation operations between the pairs of nodes in each cluster to settle on a schedule. As a result, the cluster tree network's error rate, traffic load, latency, and queue size have all decreased.

Special Quantum Steganalysis Algorithm for Quantum Secure Communications Based on Quantum Discriminator

  • Xinzhu Liu;Zhiguo Qu;Xiubo Chen;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1674-1688
    • /
    • 2023
  • The remarkable advancement of quantum steganography offers enhanced security for quantum communications. However, there is a significant concern regarding the potential misuse of this technology. Moreover, the current research on identifying malicious quantum steganography is insufficient. To address this gap in steganalysis research, this paper proposes a specialized quantum steganalysis algorithm. This algorithm utilizes quantum machine learning techniques to detect steganography in general quantum secure communication schemes that are based on pure states. The algorithm presented in this paper consists of two main steps: data preprocessing and automatic discrimination. The data preprocessing step involves extracting and amplifying abnormal signals, followed by the automatic detection of suspicious quantum carriers through training on steganographic and non-steganographic data. The numerical results demonstrate that a larger disparity between the probability distributions of steganographic and non-steganographic data leads to a higher steganographic detection indicator, making the presence of steganography easier to detect. By selecting an appropriate threshold value, the steganography detection rate can exceed 90%.

A Novel Whale Optimized TGV-FCMS Segmentation with Modified LSTM Classification for Endometrium Cancer Prediction

  • T. Satya Kiranmai;P.V.Lakshmi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.53-64
    • /
    • 2023
  • Early detection of endometrial carcinoma in uterus is essential for effective treatment. Endometrial carcinoma is the worst kind of endometrium cancer among the others since it is considerably more likely to affect the additional parts of the body if not detected and treated early. Non-invasive medical computer vision, also known as medical image processing, is becoming increasingly essential in the clinical diagnosis of various diseases. Such techniques provide a tool for automatic image processing, allowing for an accurate and timely assessment of the lesion. One of the most difficult aspects of developing an effective automatic categorization system is the absence of huge datasets. Using image processing and deep learning, this article presented an artificial endometrium cancer diagnosis system. The processes in this study include gathering a dermoscopy images from the database, preprocessing, segmentation using hybrid Fuzzy C-Means (FCM) and optimizing the weights using the Whale Optimization Algorithm (WOA). The characteristics of the damaged endometrium cells are retrieved using the feature extraction approach after the Magnetic Resonance pictures have been segmented. The collected characteristics are classified using a deep learning-based methodology called Long Short-Term Memory (LSTM) and Bi-directional LSTM classifiers. After using the publicly accessible data set, suggested classifiers obtain an accuracy of 97% and segmentation accuracy of 93%.

Empirical Investigations to Plant Leaf Disease Detection Based on Convolutional Neural Network

  • K. Anitha;M.Srinivasa Rao
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.115-120
    • /
    • 2023
  • Plant leaf diseases and destructive insects are major challenges that affect the agriculture production of the country. Accurate and fast prediction of leaf diseases in crops could help to build-up a suitable treatment technique while considerably reducing the economic and crop losses. In this paper, Convolutional Neural Network based model is proposed to detect leaf diseases of a plant in an efficient manner. Convolutional Neural Network (CNN) is the key technique in Deep learning mainly used for object identification. This model includes an image classifier which is built using machine learning concepts. Tensor Flow runs in the backend and Python programming is used in this model. Previous methods are based on various image processing techniques which are implemented in MATLAB. These methods lack the flexibility of providing good level of accuracy. The proposed system can effectively identify different types of diseases with its ability to deal with complex scenarios from a plant's area. Predictor model is used to precise the disease and showcase the accurate problem which helps in enhancing the noble employment of the farmers. Experimental results indicate that an accuracy of around 93% can be achieved using this model on a prepared Data Set.

Wearable and Implantable Sensors for Cardiovascular Monitoring: A Review

  • Jazba Asad;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.171-185
    • /
    • 2023
  • The cardiovascular syndrome is the dominant reason for death and the number of deaths due to this syndrome has greatly increased recently. Regular cardiac monitoring is crucial in controlling heart parameters, particularly for initial examination and precautions. The quantity of cardiac patients is rising each day and it would increase the load of work for doctors/nurses in handling the patients' situation. Hence, it needed a solution that might benefit doctors/nurses in monitoring the improvement of the health condition of patients in real-time and likewise assure decreasing medical treatment expenses. Regular heart monitoring via wireless body area networks (WBANs) including implantable and wearable medical devices is contemplated as a life-changing technique for medical assistance. This article focuses on the latest development in wearable and implantable devices for cardiovascular monitoring. First, we go through the wearable devices for the electrocardiogram (ECG) monitoring. Then, we reviewed the implantable devices for Blood Pressure (BP) monitoring. Subsequently, the evaluation of leading wearable and implantable sensors for heart monitoring mentioned over the previous six years, the current article provides uncertain direction concerning the description of diagnostic effectiveness, thus intending on making discussion in the technical communal to permit aimed at the formation of well-designed techniques. The article is concluded by debating several technical issues in wearable and implantable technology and their possible potential solutions for conquering these challenges.

An Optimized Deep Learning Techniques for Analyzing Mammograms

  • Satish Babu Bandaru;Natarajasivan. D;Rama Mohan Babu. G
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.39-48
    • /
    • 2023
  • Breast cancer screening makes extensive utilization of mammography. Even so, there has been a lot of debate with regards to this application's starting age as well as screening interval. The deep learning technique of transfer learning is employed for transferring the knowledge learnt from the source tasks to the target tasks. For the resolution of real-world problems, deep neural networks have demonstrated superior performance in comparison with the standard machine learning algorithms. The architecture of the deep neural networks has to be defined by taking into account the problem domain knowledge. Normally, this technique will consume a lot of time as well as computational resources. This work evaluated the efficacy of the deep learning neural network like Visual Geometry Group Network (VGG Net) Residual Network (Res Net), as well as inception network for classifying the mammograms. This work proposed optimization of ResNet with Teaching Learning Based Optimization (TLBO) algorithm's in order to predict breast cancers by means of mammogram images. The proposed TLBO-ResNet, an optimized ResNet with faster convergence ability when compared with other evolutionary methods for mammogram classification.