Articles published in IJEER

Special Issue on Mobile Computing assisted by Artificial Intelligent for 5G/ 6G/ Radio Communication


Transfer Learning Technique for Covid-19 Screening from CT-Scan: An Empirical Approach

As a result of the Covid-19 pandemic, the field of Medical Sciences has been challenged with new challenges and benchmarks for development. Front line workers are overcoming the Covid-19 challenge with four steps: Screening and Diagnosis, Contact Tracing, Drug and Vaccine Development, and Prediction & Forecasting. Following the above segments carefully can save millions of lives. Artificial Intelligence has proven invaluable in predicting critical factors in many fields. With the ability of AI to process huge databases and conclude with high precision, we are motivated to use AI to screen and diagnose the Covid-19 pandemic.

Read more

A Hybrid Feature Selection Approach based on Random Forest and Particle Swarm Optimization for IoT Network Traffic Analysis

The complexity and volume of network traffic has increased significantly due to the emergence of the “Internet of Things” (IoT). The classification accuracy of the network traffic is dependent on the most pertinent features. In this paper, we present a hybrid feature selection method that takes into account the optimization of Particle Swarms (PSO) and Random Forests. The data collected by the security firm, CIC-IDS2017, contains a large number of attacks and traffic instances

Read more

Enhancing Gastric Cancer Lymph Node Detection through DL Analysis of CT Images: A Novel Approach for Improved Diagnosis and Treatment

Although gastric cancer is a prevalent disease worldwide, accurate diagnosis and treatment of this condition depend on the ability to detect the lymph nodes. Recently, the use of Deep learning (DL) techniques combined with CT imaging has led to the development of new tools that can improve the detection of this disease. In this study, we will focus on the use of CNNs, specifically those built on the “MobileNet” and “AlexNet” platforms, to improve the detection of gastric cancer lymph nodes. The study begins with an overview of gastric cancer and discusses the importance of detecting the lymph nodes in the disease management cycle. CT and DL are discussed as potential technologies that can improve the accuracy of this detection.

Read more

A Novel Approach to Cervical Cancer Detection Using Hybrid Stacked Ensemble Models and Feature Selection

Around the world, millions of women are diagnosed with cervical cancer each year. Early detection is very important to produce a better overall quality of life for those diagnosed with the disease and reduce the burden on the healthcare system. In recent years, the field of machine learning (ML) has been developing methods that can improve the accuracy of detecting cervical cancer. This paper presents a new approach to this problem by using a combination of image segmentation and feature extraction techniques. The proposed approach is divided into three phases. The first stage involves image segmentation, which is performed to extract the regions of interest from the input image.

Read more

Cancer Symptoms Detection from Liver CT Images Using Multistage Pre-Processors

Visually cancer is the abnormal pattern with predefined structure could be found in liver Computed Tomography (CT) images. Using deep convolution neural network computation and image processing, this detected abnormal pattern cluster can be classified in different liver issue types. Full size liver CT scan images consisting different body parts, and these are ultrasonic based gray scaled image construction. The primary challenge in the cancer symptoms detection process is to extract the liver area out of image then finding out the actual area of abnormality to conclude whether abnormality is cancer or any other issues on liver.

Read more

High Switching Speed and Low Power Applications of Hetro Junction Double Gate (HJDG) TFET

Tunnel field effect transistor (TFET) technology is unique of the prominent devices in low power applications. The band-to-band tunnel switching mechanism is sets TFET apart from traditional MOSFET technology. It helps to reduce leakage currents. The major advantage is the Sub threshold slope smaller than 60mv/decade. Newer technologies are expected to change the gate, architectures, channel materials and transport mechanisms.

Read more

VMLHST: Development of an Efficient Novel Virtual Reality ML Framework with Haptic Feedbacks for Improving Sports Training Scenarios

This paper presents the development of a novel virtual reality (VR) machine learning (ML) framework that incorporates haptic feedback to improve sports training scenarios. The framework uses You Look Only Once (YoLo) for object detection, and combines it with ensemble learning to analyze the performance of athletes in a simulated environment and provide real-time feedbacks. The system includes haptic feedback devices that are controlled via Grey Wolf Optimization (GWO) to simulate the physical sensation of a real-world sports scenario, allowing athletes to experience the sensation of force, impact, and movements.

Read more

A Diabetic Retinopathy Detection Using Customized Convolutional Neural Network

The disease, Diabetic Retinopathy (DR) causes due to damage to retinal blood vessels in diabetic patients. DR occurs if you have type 1 or 2 diabetes along with high blood sugar. When the retinal blood vessels are damaged, they can become clogged, some of which can block the blood supply to the retina leading to blood loss, these new blood vessels may leak, and the creation of scar tissue can lead to loss of vision. It takes a lot of time and effort to examine and analyse fundus images the old-fashioned way to find differences in how the eyes are shaped. In this modern era, technology has evolved so fleet which has the solution to every problem.

Read more

Anomaly Based Intrusion Detection through Efficient Machine Learning Model

Machine learning is commonly utilised to construct an intrusion detection system (IDS) that automatically detects and classifies network intrusions and host-level threats. Malicious assaults change and occur in high numbers, needing a scalable solution. Cyber security researchers may use public malware databases for research and related work. No research has examined machine learning algorithm performance on publicly accessible datasets.

Read more

IARMTS: Design of an Interference-Aware Routing Model with Time Synchronization Capabilities for Dense Wireless Sensor Network Deployments

Performance of dense wireless sensor networks is often degraded due to communication interference and time synchronization issues. Existing machine learning & deep learning models that propose bioinspired & pre-emptive packet-analysis solutions for these tasks either have high complexity, or high deployment costs. Moreover, these models cannot be scaled for heterogeneous node & traffic types, which limits their applicability when applied to real-time scenarios. To overcome these issues, this text proposes design of an interference-aware routing model with time synchronization capabilities for dense wireless sensor network deployments.

Read more

Image Forgery Detection Using Integrated Convolution-LSTM (2D) and Convolution (2D)

Digital forensics and computer vision must explore image forgery detection and their related technologies. Image fraud detection is expanding as sophisticated image editing software becomes more accessible. This makes changing photos easier than with the older methods. Convolution LSTM (1D) and Convolution LSTM (2D) + Convolution (2D) are popular deep learning models. We tested them using the public CASIA.2.0 image forgery database. ConvLSTM (2D) and its combination outperformed ConvLSTM (1D) in accuracy, precision, recall, and F1-score. We also provided a related work on image forgery detection models and methods. We also reviewed publicly available datasets used in picture forgery detection research, highlighting their merits and drawbacks.

Read more

Machine Learning Technique for Predicting Location

In the current era of internet and mobile phone usage, the prediction of a person's location at a specific moment has become a subject of great interest among researchers. As a result, there has been a growing focus on developing more effective techniques to accurately identify the precise location of a user at a given instant in time. The quality of GPS data plays a crucial role in obtaining high-quality results. Numerous algorithms are available that leverage user movement patterns and historical data for this purpose. This research presents a location prediction model that incorporates data from multiple users.

Read more