Special Issue "Emerging Applications of Artificial Intelligence, Machine learning and Data Science"

Submission Deadline: 25 October 2021 (closed)
Guest Editors
Dr. Dharmendra Singh Rajput, Vellore Institute of Technology, India.
Dr. Syed Muzamil Basha, Sri Krishna College of Engineering and Technology Coimbatore, India.
Dr. Dr. Thippa Reddy G, Vellore Institute of Technology, India.
Dr. Saurabh Singh, Dingguk University, South Korea.

Summary

Today, artificial intelligence (AI) is the mainstream technology for all the companies, unicorns, and industries those are aiming to improvise to increase revenue. AI is the buzz word of the century, but most of them don't understand it well. Before understanding AI, understanding its subsets is important. Machine Learning (ML) and Deep Learning (DL). ML is an algorithmic approach to train & teach the machine to perform predictive tasks and test them to improve based on their performance. DL on the other hand structures algorithms in layers to create neural networks that can make the decisions on their own.

Even though humanity is ready to switch from gasoline to electricity, Data is the fuel for all, even to decide the next leader. There is no demand, it's is been flooded on daily basis. Processing those may bring peace or war, it depends on the purposes.

Data Science and its contribution to the field of AI is enormous. The research encompasses statistics, mathematics, and computer concepts to deal with big data to visualize the insights that may change the decision and may shape the future. The power of AI is intangible. Recognizing its potential and understanding it is important.


Keywords
• Artificial Intelligence
• Machine learning
• Deep Learning
• Data Science
• Industry 4.0

Published Papers

  • Deep Neural Network and Pseudo Relevance Feedback Based Query Expansion
  • Abstract The neural network has attracted researchers immensely in the last couple of years due to its wide applications in various areas such as Data mining, Natural language processing, Image processing, and Information retrieval etc. Word embedding has been applied by many researchers for Information retrieval tasks. In this paper word embedding-based skip-gram model has been developed for the query expansion task. Vocabulary terms are obtained from the top “k” initially retrieved documents using the Pseudo relevance feedback model and then they are trained using the skip-gram model to find the expansion terms for the user query. The performance of the… More
  •   Views:29       Downloads:22        Download PDF

  • A Study on Classification and Detection of Small Moths Using CNN Model
  • Abstract Currently, there are many limitations to classify images of small objects. In addition, there are limitations such as error detection due to external factors, and there is also a disadvantage that it is difficult to accurately distinguish between various objects. This paper uses a convolutional neural network (CNN) algorithm to recognize and classify object images of very small moths and obtain precise data images. A convolution neural network algorithm is used for image data classification, and the classified image is transformed into image data to learn the topological structure of the image. To improve the accuracy of the image classification… More
  •   Views:307       Downloads:316        Download PDF


  • Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique
  • Abstract The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable security. As consumers prefer to… More
  •   Views:311       Downloads:226        Download PDF

  • Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node
  • Abstract Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility. In such attacks, an adversary accesses a few network nodes, generates replication, then inserts this replication into the network, potentially resulting in numerous internal network attacks. Most existing techniques use a central base station, which introduces several difficulties into the system due to the network's reliance on a single point, while other ways generate more overhead while jeopardising network lifetime. In this research, an intelligent double hashing-based clone node identification scheme was used, which reduces communication and memory costs while performing the clone detection procedure.… More
  •   Views:300       Downloads:210        Download PDF

  • Emerging Applications of Artificial Intelligence, Machine learning and Data Science
  • Abstract There are various intense forces causing customers to use evaluated data when using social media platforms and microblogging sites. Today, customers throughout the world share their points of view on all kinds of topics through these sources. The massive volume of data created by these customers makes it impossible to analyze such data manually. Therefore, an efficient and intelligent method for evaluating social media data and their divergence needs to be developed. Today, various types of equipment and techniques are available for automatically estimating the classification of sentiments. Sentiment analysis involves determining people's emotions using facial expressions. Sentiment analysis can… More
  •   Views:292       Downloads:261        Download PDF

  • Training Multi-Layer Perceptron with Enhanced Brain Storm Optimization Metaheuristics
  • Abstract In the domain of artificial neural networks, the learning process represents one of the most challenging tasks. Since the classification accuracy highly depends on the weights and biases, it is crucial to find its optimal or suboptimal values for the problem at hand. However, to a very large search space, it is very difficult to find the proper values of connection weights and biases. Employing traditional optimization algorithms for this issue leads to slow convergence and it is prone to get stuck in the local optima. Most commonly, back-propagation is used for multi-layer-perceptron training and it can lead to vanishing… More
  •   Views:316       Downloads:246        Download PDF

  • Dorsal-Ventral Visual Pathways and Object Characteristics: Beamformer Source Analysis of EEG
  • Abstract In performing a gaming task, mental rotation (MR) is one of the important aspects of visuospatial processing. MR involves dorsal-ventral pathways of the brain. Visual objects/models used in computer-games play a crucial role in gaming experience of the users. The visuospatial characteristics of the objects used in the computer-game influence the engagement of dorsal-ventral visual pathways. The current study investigates how the objects’ visuospatial characteristics (i.e., angular disparity and dimensionality) in an MR-based computer-game influence the cortical activities in dorsal-ventral visual pathways. Both the factors have two levels, angular disparity: convex angle (CA) vs. reflex angle (RA) and dimensionality: 2D… More
  •   Views:283       Downloads:219        Download PDF

  • Generating Synthetic Data to Reduce Prediction Error of Energy Consumption
  • Abstract Renewable and nonrenewable energy sources are widely incorporated for solar and wind energy that produces electricity without increasing carbon dioxide emissions. Energy industries worldwide are trying hard to predict future energy consumption that could eliminate over or under contracting energy resources and unnecessary financing. Machine learning techniques for predicting energy are the trending solution to overcome the challenges faced by energy companies. The basic need for machine learning algorithms to be trained for accurate prediction requires a considerable amount of data. Another critical factor is balancing the data for enhanced prediction. Data Augmentation is a technique used for increasing the… More
  •   Views:262       Downloads:253        Download PDF

  • DLBT: Deep Learning-Based Transformer to Generate Pseudo-Code from Source Code
  • Abstract Understanding the content of the source code and its regular expression is very difficult when they are written in an unfamiliar language. Pseudo-code explains and describes the content of the code without using syntax or programming language technologies. However, writing Pseudo-code to each code instruction is laborious. Recently, neural machine translation is used to generate textual descriptions for the source code. In this paper, a novel deep learning-based transformer (DLBT) model is proposed for automatic Pseudo-code generation from the source code. The proposed model uses deep learning which is based on Neural Machine Translation (NMT) to work as a language… More
  •   Views:302       Downloads:342        Download PDF

  • Deep Learning Approach for Analysis and Characterization of COVID-19
  • Abstract Early diagnosis of a pandemic disease like COVID-19 can help deal with a dire situation and help radiologists and other experts manage human resources more effectively. In a recent pandemic, laboratories perform diagnostics manually, which requires a lot of time and expertise of the laboratorial technicians to yield accurate results. Moreover, the cost of kits is high, and well-equipped labs are needed to perform this test. Therefore, other means of diagnosis is highly desirable. Radiography is one of the existing methods that finds its use in the diagnosis of COVID-19. The radiography observes change in Computed Tomography (CT) chest images… More
  •   Views:517       Downloads:390        Download PDF

  • A Hybrid Approach for Network Intrusion Detection
  • Abstract Due to the widespread use of the internet and smart devices, various attacks like intrusion, zero-day, Malware, and security breaches are a constant threat to any organization's network infrastructure. Thus, a Network Intrusion Detection System (NIDS) is required to detect attacks in network traffic. This paper proposes a new hybrid method for intrusion detection and attack categorization. The proposed approach comprises three steps to address high false and low false-negative rates for intrusion detection and attack categorization. In the first step, the dataset is preprocessed through the data transformation technique and min-max method. Secondly, the random forest recursive feature elimination… More
  •   Views:503       Downloads:496        Download PDF

  • A New Fuzzy Adaptive Algorithm to Classify Imbalanced Data
  • Abstract Classification of imbalanced data is a well explored issue in the data mining and machine learning community where one class representation is overwhelmed by other classes. The Imbalanced distribution of data is a natural occurrence in real world datasets, so needed to be dealt with carefully to get important insights. In case of imbalance in data sets, traditional classifiers have to sacrifice their performances, therefore lead to misclassifications. This paper suggests a weighted nearest neighbor approach in a fuzzy manner to deal with this issue. We have adapted the ‘existing algorithm modification solution’ to learn from imbalanced datasets that classify… More
  •   Views:423       Downloads:346        Download PDF

  • Empirical Assessment of Bacillus Calmette-Guérin Vaccine to Combat COVID-19
  • Abstract COVID-19 has become one of the critical health issues globally, which surfaced first in latter part of the year 2019. It is the topmost concern for many nations’ governments as the contagious virus started mushrooming over adjacent regions of infected areas. In 1980, a vaccine called Bacillus Calmette-Guérin (BCG) was introduced for preventing tuberculosis and lung cancer. Countries that have made the BCG vaccine mandatory have witnessed a lesser COVID-19 fatality rate than the countries that have not made it compulsory. This paper’s initial research shows that the countries with a long-term compulsory BCG vaccination system are less affected by… More
  •   Views:519       Downloads:295        Download PDF

  • Transfer Learning Model to Indicate Heart Health Status Using Phonocardiogram
  • Abstract The early diagnosis of pre-existing coronary disorders helps to control complications such as pulmonary hypertension, irregular cardiac functioning, and heart failure. Machine-based learning of heart sound is an {efficient} technology which can help minimize the workload of manual auscultation by automatically identifying irregular cardiac sounds. Phonocardiogram (PCG) and electrocardiogram (ECG) waveforms provide the much-needed information for the diagnosis of these diseases. In this work, the researchers have converted the heart sound signal into its corresponding repeating pattern-based spectrogram. PhysioNet 2016 and PASCAL 2011 have been taken as the benchmark datasets to perform experimentation. The existing models, viz. MobileNet, Xception, Visual… More
  •   Views:373       Downloads:345        Download PDF

  • Robust and Efficient Reliability Estimation for Exponential Distribution
  • Abstract In modeling reliability data, the exponential distribution is commonly used due to its simplicity. For estimating the parameter of the exponential distribution, classical estimators including maximum likelihood estimator represent the most commonly used method and are well known to be efficient. However, the maximum likelihood estimator is highly sensitive in the presence of contamination or outliers. In this study, a robust and efficient estimator of the exponential distribution parameter was proposed based on the probability integral transform statistic. To examine the robustness of this new estimator, asymptotic variance, breakdown point, and gross error sensitivity were derived. This new estimator offers… More
  •   Views:838       Downloads:692        Download PDF

  • Towards Machine Learning Based Intrusion Detection in IoT Networks
  • Abstract The Internet of Things (IoT) integrates billions of self-organized and heterogeneous smart nodes that communicate with each other without human intervention. In recent years, IoT based systems have been used in improving the experience in many applications including healthcare, agriculture, supply chain, education, transportation and traffic monitoring, utility services etc. However, node heterogeneity raised security concern which is one of the most complicated issues on the IoT. Implementing security measures, including encryption, access control, and authentication for the IoT devices are ineffective in achieving security. In this paper, we identified various types of IoT threats and shallow (such as decision… More
  •   Views:1425       Downloads:1130        Download PDF

  • An Approach Using Fuzzy Sets and Boosting Techniques to Predict Liver Disease
  • Abstract The aim of this research is to develop a mechanism to help medical practitioners predict and diagnose liver disease. Several systems have been proposed to help medical experts by diminishing error and increasing accuracy in diagnosing and predicting diseases. Among many existing methods, a few have considered the class imbalance issues of liver disorder datasets. As all the samples of liver disorder datasets are not useful, they do not contribute to learning about classifiers. A few samples might be redundant, which can increase the computational cost and affect the performance of the classifier. In this paper, a model has been… More
  •   Views:707       Downloads:718        Download PDF

  • Performance Comparison of Deep CNN Models for Detecting Driver’s Distraction
  • Abstract According to various worldwide statistics, most car accidents occur solely due to human error. The person driving a car needs to be alert, especially when travelling through high traffic volumes that permit high-speed transit since a slight distraction can cause a fatal accident. Even though semi-automated checks, such as speed detecting cameras and speed barriers, are deployed, controlling human errors is an arduous task. The key causes of driver’s distraction include drunken driving, conversing with co-passengers, fatigue, and operating gadgets while driving. If these distractions are accurately predicted, the drivers can be alerted through an alarm system. Further, this research… More
  •   Views:921       Downloads:823        Download PDF

  • Early Tumor Diagnosis in Brain MR Images via Deep Convolutional Neural Network Model
  • Abstract Machine learning based image analysis for predicting and diagnosing certain diseases has been entirely trustworthy and even as efficient as a domain expert’s inspection. However, the style of non-transparency functioning by a trained machine learning system poses a more significant impediment for seamless knowledge trajectory, clinical mapping, and delusion tracing. In this proposed study, a deep learning based framework that employs deep convolution neural network (Deep-CNN), by utilizing both clinical presentations and conventional magnetic resonance imaging (MRI) investigations, for diagnosing tumors is explored. This research aims to develop a model that can be used for abnormality detection over MRI data… More
  •   Views:883       Downloads:702        Download PDF

  • Multi Sensor-Based Implicit User Identification
  • Abstract Smartphones have ubiquitously integrated into our home and work environments, however, users normally rely on explicit but inefficient identification processes in a controlled environment. Therefore, when a device is stolen, a thief can have access to the owner’s personal information and services against the stored passwords. As a result of this potential scenario, this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors. A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features, then further optimized… More
  •   Views:722       Downloads:598        Download PDF