Arwa Mashat - Academia.edu (original) (raw)
Papers by Arwa Mashat
Journal of Cloud Computing
International Journal of Computational Intelligence Systems
In India, over 25,000 people have died from cardiovascular annually over the past 4 years , and o... more In India, over 25,000 people have died from cardiovascular annually over the past 4 years , and over 28,000 in the previous 3 years. Most of the deaths nowadays are mainly due to cardiovascular diseases (CVD). Arrhythmia is the leading cause of cardiovascular mortality. Arrhythmia is a condition in which the heartbeat is abnormally fast or slow. The current detection method for diseases is analyzing by the electrocardiogram (ECG), a medical monitoring technique that records heart activity. Since actuations in ECG signals are so slight that they cannot be seen by the human eye, the identification of cardiac arrhythmias is one of the most difficult undertakings. Unfortunately, it takes a lot of medical time and money to find professionals to examine a large amount of ECG data . As a result, machine learning-based methods have become increasingly prevalent for recognizing ECG features. In this work, we classify five different heartbeats using the MIT-BIH arrhythmia database . Wavelet s...
International Conference on Information Systems, 2018
Computer Systems Science and Engineering
Image enhancement is an important preprocessing task as the contrast is low in most of the medica... more Image enhancement is an important preprocessing task as the contrast is low in most of the medical images, Therefore, enhancement becomes the mandatory process before actual image processing should start. This research article proposes an enhancement of the model-based differential operator for the images in general and Echocardiographic images, the proposed operators are based on Grunwald-Letnikov (G-L), Riemann-Liouville (R-L) and Caputo (Li & Xie), which are the definitions of fractional order calculus. In this fractional-order, differentiation is well focused on the enhancement of echocardiographic images. This provoked for developing a non-linear filter mask for image enhancement. The designed filter is simple and effective in terms of improving the contrast of the input low contrast images and preserving the textural features, particularly in smooth areas. The novelty of the proposed method involves a procedure of partitioning the image into homogenous regions, details, and edges. Thereafter, a fractional differential mask is appropriately chosen adaptively for enhancing the partitioned pixels present in the image. It is also incorporated into the Hessian matrix with is a second-order derivative for every pixel and the parameters such as average gradient and entropy are used for qualitative analysis. The wide range of existing state-of-the-art techniques such as fixed order fractional differential filter for enhancement, histogram equalization, integer-order differential methods have been used. The proposed algorithm resulted in the enhancement of the input images with an increased value of average gradient as well as entropy in comparison to the previous methods. The values obtained are very close (almost equal to 99.9%) to the original values of the average gradient and entropy of the images. The results of the simulation validate the effectiveness of the proposed algorithm.
ACM Transactions on Asian and Low-Resource Language Information Processing
The rapid growth of Web 2.0, which enables people to generate, communicate, and share information... more The rapid growth of Web 2.0, which enables people to generate, communicate, and share information, has resulted in an increase in the total number of users. In developing countries, online users’ sentiment influences decision-making, social views, individual consumption decisions, and entity quality monitoring. As a result, more accurate sentiment analysis, particularly in their native language such as Hindi, is preferred over crude binary categorization. Because of the abundance of web-based data in Indian languages such as Hindi, Marathi, Kannada, Tamil, and so on. Analyzing this data and recovering valuable and relevant information from handwritten text has become extremely important. Despite years of research and development, no optical writing recognition (OCR) system has ever been certified as completely reliable. The first step in any pattern recognition system is feature selection. In many fields, feature selection is studied as a combinatorial optimization problem. The prim...
Computational Intelligence and Neuroscience
The internet of medical things (IoMT) is a smart medical device structure that includes apps, hea... more The internet of medical things (IoMT) is a smart medical device structure that includes apps, health services, and systems. These medical equipment and applications are linked to healthcare systems via the internet. Because IoT devices lack computational power, the collected data can be processed and analyzed in the cloud by more computationally intensive tools. Cloud computing in IoMT is also used to store IoT data as part of a collaborative effort. Cloud computing has provided new avenues for providing services to users with better user experience, scalability, and proper resource utilization compared to traditional platforms. However, these cloud platforms are susceptible to several security breaches evident from recent and past incidents. Trust management is a crucial feature required for providing secure and reliable service to users. The traditional trust management protocols in the cloud computing situation are centralized and result in single-point failure. Blockchain has em...
Journal of Circuits, Systems and Computers
Battlefield of Things (BoT) is a modern defense network that connects smart military devices to s... more Battlefield of Things (BoT) is a modern defense network that connects smart military devices to strategic networks. Cybersecurity plays a vital role in maintaining the security of BoT networks and provides encrypted communication networks with combat devices on an end-to-end or peer-to-peer basis. This paper proposes approaches to BoT networks that operate on a three-tier architecture, starting with an application and service layer, a network and cybersecurity layer, and finally, a battlefield layer; implements CNN-YOLO-based target detection; and also formulates information security policies, privacy, and IT laws to maintain algorithmic data access and authorization. It connects a battlefield combat equipment network to a command data center’s ground base station wireless, Bluetooth, sensor, radio, and ethernet cable. This paper analyzes prior Internet of Things (IoT) device attack strategies by collecting data sets of IoT security breaches from external sources. How the system sec...
Wireless Communications and Mobile Computing
The COVID-19 pandemic has affected people’s lives in all aspects. This pandemic has raised the us... more The COVID-19 pandemic has affected people’s lives in all aspects. This pandemic has raised the usage of ubiquitous networks such as mobile ad hoc networks (MANETs) for information exchange in various domains. MANET is a group of versatile nodes that communicates with each other without relying on a fixed physical framework. One of the prominent features of MANET is its versatile topology. Because of this striking feature, MANETs are employed in various domains like defense and combat operations, disaster management, healthcare, and environmental monitoring. In this paper, we enlighten the significance of MANET in the smart healthcare system. The COVID-19 pandemic outbreak demanded the reshaping of the healthcare systems to combat the pandemic and similar cataclysms. Existing healthcare systems are proved inefficient in dealing with pandemic situations, because they are not fully automated and also vulnerable to various security attacks. Therefore, it is vital to empower the healthca...
Sensors
The combination of edge computing and deep learning helps make intelligent edge devices that can ... more The combination of edge computing and deep learning helps make intelligent edge devices that can make several conditional decisions using comparatively secured and fast machine learning algorithms. An automated car that acts as the data-source node of an intelligent Internet of vehicles or IoV system is one of these examples. Our motivation is to obtain more accurate and rapid object detection using the intelligent cameras of a smart car. The competent supervision camera of the smart automobile model utilizes multimedia data for real-time automation in real-time threat detection. The corresponding comprehensive network combines cooperative multimedia data processing, Internet of Things (IoT) fact handling, validation, computation, precise detection, and decision making. These actions confront real-time delays during data offloading to the cloud and synchronizing with the other nodes. The proposed model follows a cooperative machine learning technique, distributes the computational l...
Complexity
COVID-19 is the worst contagious disaster in the history of humankind, triggering a worldwide sic... more COVID-19 is the worst contagious disaster in the history of humankind, triggering a worldwide sickness pandemic. In lacking specialized treatments or immunizations, finding and eliminating the infection source is the best option to decrease disease transmission and lower sickness and degree of fatality among the general public. Generally, few significant barriers are present in the existing system of monitoring the contamination. One of the obstacles is regarding health-related data storage. The user’s e-health data is kept in a traditional method that might have been compromised if shared with third parties. Secondly, the current disease tracking technologies fail to monitor diseases numerous ways. The tracing system is either personal or location-based. Apart from these, gathering individual consent and sharing their health data with unknown associations is a real-time problem. We propose a blockchain-based data system that maintains confidentiality with transparency. Users can ac...
Fractals
This paper studies the optical soliton wave solutions of the fractional complex paraxial wave dyn... more This paper studies the optical soliton wave solutions of the fractional complex paraxial wave dynamical (FPWD) model with Kerr media. This model investigates the frequency of the beam obeying that reveals non-dispersive and non-diffractive Spatio-temporal localized wave envelopes promulgating in optical Kerr media. This model is equivalently the well-known nonlinear Schrödinger equation. These two models concentrate on the nonlinear visual medium to increase its strength and increase the nonlinear optical operation’s efficiency. Three recent computational schemes are employed to investigate the considered model’s abundant wave solutions; these solutions are then used to evaluate the initial and boundary conditions. The solutions’ accuracy is investigated by calculating the absolute error between solutions exact and approximate solutions. Additionally, the solution’s stability is checked by employing Hamiltonian system properties. The results’ physical interpretation is explained thr...
Frontiers in Public Health
Natural Language Processing (NLP) is a group of theoretically inspired computer structures for an... more Natural Language Processing (NLP) is a group of theoretically inspired computer structures for analyzing and modeling clearly going on texts at one or extra degrees of linguistic evaluation to acquire human-like language processing for quite a few activities and applications. Hearing and visually impaired people are unable to see entirely or have very low vision, as well as being unable to hear completely or having a hard time hearing. It is difficult to get information since both hearing and vision, which are crucial organs for receiving information, are harmed. Hearing and visually impaired people are considered to have a substantial information deficit, as opposed to people who just have one handicap, such as blindness or deafness. Visually and hearing-impaired people who are unable to communicate with the outside world may experience emotional loneliness, which can lead to stress and, in extreme cases, serious mental illness. As a result, overcoming information handicap is a cri...
Mobile Information Systems
Providing an identity solution is essential for a reliable blockchain-based land registry system.... more Providing an identity solution is essential for a reliable blockchain-based land registry system. A secure, privacy-preserving, and efficient identity solution is essential but challenging. This paper examines the current literature and provides a systematic literature review in three stages based on the three research questions (RQ) that show the assessment and interpretation process step by step. Based on the parameters and RQ specified in the research methodology section, a total of 43 primary articles have been selected from the 251 articles extracted from various scientific databases. The majority of these articles are concerned with evaluating the existing self-sovereign identity (SSI) solutions and their role in the blockchain-based land registry system to address the compliance issues in the existing SSI solutions with SSI principles and find the best possible SSI solution to address the identity problems in the land registry. The existing digital identity solutions cannot h...
Computational Intelligence and Neuroscience
Cancer is a wide category of diseases that is caused by the abnormal, uncontrollable growth of ce... more Cancer is a wide category of diseases that is caused by the abnormal, uncontrollable growth of cells, and it is the second leading cause of death globally. Screening, early diagnosis, and prediction of recurrence give patients the best possible chance for successful treatment. However, these tests can be expensive and invasive and the results have to be interpreted by experts. Genetic algorithms (GAs) are metaheuristics that belong to the class of evolutionary algorithms. GAs can find the optimal or near-optimal solutions in huge, difficult search spaces and are widely used for search and optimization. This makes them ideal for detecting cancer by creating models to interpret the results of tests, especially noninvasive. In this article, we have comprehensively reviewed the existing literature, analyzed them critically, provided a comparative analysis of the state-of-the-art techniques, and identified the future challenges in the development of such techniques by medical professionals.
Wireless Communications and Mobile Computing
The land registry system is one of the essential components of any governance model required to a... more The land registry system is one of the essential components of any governance model required to ascertain the ownership records uniquely. This paper reviews the existing literature and provides a detailed literature review consisting of 3 stages based on three research questions (RQ) that highlight the step by step evaluation and analysis. We selected 48 primary articles out of 477 extracted from different scientific databases based on criteria and RQ defined in the research method section. The majority of these papers focus on assessing the identity issues related to the land registry system and reviewing the existing identity models to find the best possible identity model to resolve the identified identity problems in the land registry. This paper examines the current land registry model and its shortcomings. It explains the various blockchain types and their characteristics. It further evaluates the usability of blockchain technology in different aspects of the land registry. Id...
Computer Systems Science and Engineering
In today's digital era, the text may be in form of images. This research aims to deal with the pr... more In today's digital era, the text may be in form of images. This research aims to deal with the problem by recognizing such text and utilizing the support vector machine (SVM). A lot of work has been done on the English language for handwritten character recognition but very less work on the under-resourced Hindi language. A method is developed for identifying Hindi language characters that use morphology, edge detection, histograms of oriented gradients (HOG), and SVM classes for summary creation. SVM rank employs the summary to extract essential phrases based on paragraph position, phrase position, numerical data, inverted comma, sentence length, and keywords features. The primary goal of the SVM optimization function is to reduce the number of features by eliminating unnecessary and redundant features. The second goal is to maintain or improve the classification system's performance. The experiment included news articles from various genres, such as Bollywood, politics, and sports. The proposed method's accuracy for Hindi character recognition is 96.97%, which is good compared with baseline approaches, and system-generated summaries are compared to human summaries. The evaluated results show a precision of 72% at a compression ratio of 50% and a precision of 60% at a compression ratio of 25%, in comparison to state-of-the-art methods, this is a decent result.
Contrast Media & Molecular Imaging
The disorder of Alzheimer’s (AD) is defined as a gradual deterioration of cognitive functions, su... more The disorder of Alzheimer’s (AD) is defined as a gradual deterioration of cognitive functions, such as the failure of spatial cognition and short-term memory. Besides difficulties in memory, a person with this disease encounters visual processing difficulties and even awareness and identifying of their beloved ones. Nowadays, recent technologies made this possible to connect everything that exists around us on Earth through the Internet, this is what the Internet of Things (IoT) made possible which can capture and save a massive amount of data that are considered very important and useful information which then can be valuable in training of the various state-of-the-art machine and deep learning algorithms. Assistive mobile health applications and IoT-based wearable devices are helping and supporting the ongoing health screening of a patient with AD. In the early stages of AD, the wearable devices and IoT approach aim to keep AD patients mentally active in all of life’s daily activi...
Computational Intelligence and Neuroscience
Diverse variants of COVID-19 are repeatedly making everyday living unstable. In reality, the conc... more Diverse variants of COVID-19 are repeatedly making everyday living unstable. In reality, the conclusive retort of this highly contagious virus still is in incognito mode. The health experts’ primary guideline on the possible prevention of this disease outbreak, including a list of restrictions and confinements, is insufficient in case of any public congregation. As a result, the demand for precise and upgraded real-time COVID-19 tracking and prevention-based applications increases. However, most of the existing android-based applications face a lack of data security and reliability that cannot satisfy the additional quality of service (QoS) requirements. This paper proposes an easy-to-operate android-based multifunctional application to track individuals’ health situations, allow uploading scanning report by the authorized organization like universities, mosques, school, and hospitals and helps the users to maintain guidelines via manageable steps. This article offers a three-layere...
IEEE Access, 2022
Several researchers have reported the results of adding a variety of fibers to asphalt concrete d... more Several researchers have reported the results of adding a variety of fibers to asphalt concrete described as fiber-reinforced asphalt concrete (FRAC). This research paper finds the most suitable prediction model for Marshall Stability and the optimistic bitumen content useful in glass fiber-reinforced asphalt mix by performing Marshall Stability tests and further analyzing the data in consonance with published research. Four machine learning approaches were used to find the best prediction model i.e., Artificial Neural Network, Support Vector Machine, Gaussian Process, and Random Forest. Seven statistical metrics were used to evaluate the performance of the applied models i.e., Coefficient of correlation (CC), Mean absoluteerror (MAE), Root mean squared error (RMSE), Relative absolute error (RAE), Root relative squared error (RRSE), Scattering index (SI), and Bias. Test results of the testing stage indicated that the Support Vector Machine (SVM_PUK) model performs the best in validation amongst all applied models with CC values as 0.8776 MAE as 1.2294, RMSE as 1.9653, RAE as 38.33%, RRSE as 55.22%, SI as 1.0648 and Bias as 0.5005. The Taylor diagram of the testing dataset also confirms that the model based on SVM outperforms the other models. Results of sensitivity analysis show that the bitumen content of about 5% has a significant effect on the Marshall Stability. INDEX TERMS Glass fiber, Marshall stability, artificial neural network, support vector machine, Gaussian process, random forest.
Journal of Cloud Computing
International Journal of Computational Intelligence Systems
In India, over 25,000 people have died from cardiovascular annually over the past 4 years , and o... more In India, over 25,000 people have died from cardiovascular annually over the past 4 years , and over 28,000 in the previous 3 years. Most of the deaths nowadays are mainly due to cardiovascular diseases (CVD). Arrhythmia is the leading cause of cardiovascular mortality. Arrhythmia is a condition in which the heartbeat is abnormally fast or slow. The current detection method for diseases is analyzing by the electrocardiogram (ECG), a medical monitoring technique that records heart activity. Since actuations in ECG signals are so slight that they cannot be seen by the human eye, the identification of cardiac arrhythmias is one of the most difficult undertakings. Unfortunately, it takes a lot of medical time and money to find professionals to examine a large amount of ECG data . As a result, machine learning-based methods have become increasingly prevalent for recognizing ECG features. In this work, we classify five different heartbeats using the MIT-BIH arrhythmia database . Wavelet s...
International Conference on Information Systems, 2018
Computer Systems Science and Engineering
Image enhancement is an important preprocessing task as the contrast is low in most of the medica... more Image enhancement is an important preprocessing task as the contrast is low in most of the medical images, Therefore, enhancement becomes the mandatory process before actual image processing should start. This research article proposes an enhancement of the model-based differential operator for the images in general and Echocardiographic images, the proposed operators are based on Grunwald-Letnikov (G-L), Riemann-Liouville (R-L) and Caputo (Li & Xie), which are the definitions of fractional order calculus. In this fractional-order, differentiation is well focused on the enhancement of echocardiographic images. This provoked for developing a non-linear filter mask for image enhancement. The designed filter is simple and effective in terms of improving the contrast of the input low contrast images and preserving the textural features, particularly in smooth areas. The novelty of the proposed method involves a procedure of partitioning the image into homogenous regions, details, and edges. Thereafter, a fractional differential mask is appropriately chosen adaptively for enhancing the partitioned pixels present in the image. It is also incorporated into the Hessian matrix with is a second-order derivative for every pixel and the parameters such as average gradient and entropy are used for qualitative analysis. The wide range of existing state-of-the-art techniques such as fixed order fractional differential filter for enhancement, histogram equalization, integer-order differential methods have been used. The proposed algorithm resulted in the enhancement of the input images with an increased value of average gradient as well as entropy in comparison to the previous methods. The values obtained are very close (almost equal to 99.9%) to the original values of the average gradient and entropy of the images. The results of the simulation validate the effectiveness of the proposed algorithm.
ACM Transactions on Asian and Low-Resource Language Information Processing
The rapid growth of Web 2.0, which enables people to generate, communicate, and share information... more The rapid growth of Web 2.0, which enables people to generate, communicate, and share information, has resulted in an increase in the total number of users. In developing countries, online users’ sentiment influences decision-making, social views, individual consumption decisions, and entity quality monitoring. As a result, more accurate sentiment analysis, particularly in their native language such as Hindi, is preferred over crude binary categorization. Because of the abundance of web-based data in Indian languages such as Hindi, Marathi, Kannada, Tamil, and so on. Analyzing this data and recovering valuable and relevant information from handwritten text has become extremely important. Despite years of research and development, no optical writing recognition (OCR) system has ever been certified as completely reliable. The first step in any pattern recognition system is feature selection. In many fields, feature selection is studied as a combinatorial optimization problem. The prim...
Computational Intelligence and Neuroscience
The internet of medical things (IoMT) is a smart medical device structure that includes apps, hea... more The internet of medical things (IoMT) is a smart medical device structure that includes apps, health services, and systems. These medical equipment and applications are linked to healthcare systems via the internet. Because IoT devices lack computational power, the collected data can be processed and analyzed in the cloud by more computationally intensive tools. Cloud computing in IoMT is also used to store IoT data as part of a collaborative effort. Cloud computing has provided new avenues for providing services to users with better user experience, scalability, and proper resource utilization compared to traditional platforms. However, these cloud platforms are susceptible to several security breaches evident from recent and past incidents. Trust management is a crucial feature required for providing secure and reliable service to users. The traditional trust management protocols in the cloud computing situation are centralized and result in single-point failure. Blockchain has em...
Journal of Circuits, Systems and Computers
Battlefield of Things (BoT) is a modern defense network that connects smart military devices to s... more Battlefield of Things (BoT) is a modern defense network that connects smart military devices to strategic networks. Cybersecurity plays a vital role in maintaining the security of BoT networks and provides encrypted communication networks with combat devices on an end-to-end or peer-to-peer basis. This paper proposes approaches to BoT networks that operate on a three-tier architecture, starting with an application and service layer, a network and cybersecurity layer, and finally, a battlefield layer; implements CNN-YOLO-based target detection; and also formulates information security policies, privacy, and IT laws to maintain algorithmic data access and authorization. It connects a battlefield combat equipment network to a command data center’s ground base station wireless, Bluetooth, sensor, radio, and ethernet cable. This paper analyzes prior Internet of Things (IoT) device attack strategies by collecting data sets of IoT security breaches from external sources. How the system sec...
Wireless Communications and Mobile Computing
The COVID-19 pandemic has affected people’s lives in all aspects. This pandemic has raised the us... more The COVID-19 pandemic has affected people’s lives in all aspects. This pandemic has raised the usage of ubiquitous networks such as mobile ad hoc networks (MANETs) for information exchange in various domains. MANET is a group of versatile nodes that communicates with each other without relying on a fixed physical framework. One of the prominent features of MANET is its versatile topology. Because of this striking feature, MANETs are employed in various domains like defense and combat operations, disaster management, healthcare, and environmental monitoring. In this paper, we enlighten the significance of MANET in the smart healthcare system. The COVID-19 pandemic outbreak demanded the reshaping of the healthcare systems to combat the pandemic and similar cataclysms. Existing healthcare systems are proved inefficient in dealing with pandemic situations, because they are not fully automated and also vulnerable to various security attacks. Therefore, it is vital to empower the healthca...
Sensors
The combination of edge computing and deep learning helps make intelligent edge devices that can ... more The combination of edge computing and deep learning helps make intelligent edge devices that can make several conditional decisions using comparatively secured and fast machine learning algorithms. An automated car that acts as the data-source node of an intelligent Internet of vehicles or IoV system is one of these examples. Our motivation is to obtain more accurate and rapid object detection using the intelligent cameras of a smart car. The competent supervision camera of the smart automobile model utilizes multimedia data for real-time automation in real-time threat detection. The corresponding comprehensive network combines cooperative multimedia data processing, Internet of Things (IoT) fact handling, validation, computation, precise detection, and decision making. These actions confront real-time delays during data offloading to the cloud and synchronizing with the other nodes. The proposed model follows a cooperative machine learning technique, distributes the computational l...
Complexity
COVID-19 is the worst contagious disaster in the history of humankind, triggering a worldwide sic... more COVID-19 is the worst contagious disaster in the history of humankind, triggering a worldwide sickness pandemic. In lacking specialized treatments or immunizations, finding and eliminating the infection source is the best option to decrease disease transmission and lower sickness and degree of fatality among the general public. Generally, few significant barriers are present in the existing system of monitoring the contamination. One of the obstacles is regarding health-related data storage. The user’s e-health data is kept in a traditional method that might have been compromised if shared with third parties. Secondly, the current disease tracking technologies fail to monitor diseases numerous ways. The tracing system is either personal or location-based. Apart from these, gathering individual consent and sharing their health data with unknown associations is a real-time problem. We propose a blockchain-based data system that maintains confidentiality with transparency. Users can ac...
Fractals
This paper studies the optical soliton wave solutions of the fractional complex paraxial wave dyn... more This paper studies the optical soliton wave solutions of the fractional complex paraxial wave dynamical (FPWD) model with Kerr media. This model investigates the frequency of the beam obeying that reveals non-dispersive and non-diffractive Spatio-temporal localized wave envelopes promulgating in optical Kerr media. This model is equivalently the well-known nonlinear Schrödinger equation. These two models concentrate on the nonlinear visual medium to increase its strength and increase the nonlinear optical operation’s efficiency. Three recent computational schemes are employed to investigate the considered model’s abundant wave solutions; these solutions are then used to evaluate the initial and boundary conditions. The solutions’ accuracy is investigated by calculating the absolute error between solutions exact and approximate solutions. Additionally, the solution’s stability is checked by employing Hamiltonian system properties. The results’ physical interpretation is explained thr...
Frontiers in Public Health
Natural Language Processing (NLP) is a group of theoretically inspired computer structures for an... more Natural Language Processing (NLP) is a group of theoretically inspired computer structures for analyzing and modeling clearly going on texts at one or extra degrees of linguistic evaluation to acquire human-like language processing for quite a few activities and applications. Hearing and visually impaired people are unable to see entirely or have very low vision, as well as being unable to hear completely or having a hard time hearing. It is difficult to get information since both hearing and vision, which are crucial organs for receiving information, are harmed. Hearing and visually impaired people are considered to have a substantial information deficit, as opposed to people who just have one handicap, such as blindness or deafness. Visually and hearing-impaired people who are unable to communicate with the outside world may experience emotional loneliness, which can lead to stress and, in extreme cases, serious mental illness. As a result, overcoming information handicap is a cri...
Mobile Information Systems
Providing an identity solution is essential for a reliable blockchain-based land registry system.... more Providing an identity solution is essential for a reliable blockchain-based land registry system. A secure, privacy-preserving, and efficient identity solution is essential but challenging. This paper examines the current literature and provides a systematic literature review in three stages based on the three research questions (RQ) that show the assessment and interpretation process step by step. Based on the parameters and RQ specified in the research methodology section, a total of 43 primary articles have been selected from the 251 articles extracted from various scientific databases. The majority of these articles are concerned with evaluating the existing self-sovereign identity (SSI) solutions and their role in the blockchain-based land registry system to address the compliance issues in the existing SSI solutions with SSI principles and find the best possible SSI solution to address the identity problems in the land registry. The existing digital identity solutions cannot h...
Computational Intelligence and Neuroscience
Cancer is a wide category of diseases that is caused by the abnormal, uncontrollable growth of ce... more Cancer is a wide category of diseases that is caused by the abnormal, uncontrollable growth of cells, and it is the second leading cause of death globally. Screening, early diagnosis, and prediction of recurrence give patients the best possible chance for successful treatment. However, these tests can be expensive and invasive and the results have to be interpreted by experts. Genetic algorithms (GAs) are metaheuristics that belong to the class of evolutionary algorithms. GAs can find the optimal or near-optimal solutions in huge, difficult search spaces and are widely used for search and optimization. This makes them ideal for detecting cancer by creating models to interpret the results of tests, especially noninvasive. In this article, we have comprehensively reviewed the existing literature, analyzed them critically, provided a comparative analysis of the state-of-the-art techniques, and identified the future challenges in the development of such techniques by medical professionals.
Wireless Communications and Mobile Computing
The land registry system is one of the essential components of any governance model required to a... more The land registry system is one of the essential components of any governance model required to ascertain the ownership records uniquely. This paper reviews the existing literature and provides a detailed literature review consisting of 3 stages based on three research questions (RQ) that highlight the step by step evaluation and analysis. We selected 48 primary articles out of 477 extracted from different scientific databases based on criteria and RQ defined in the research method section. The majority of these papers focus on assessing the identity issues related to the land registry system and reviewing the existing identity models to find the best possible identity model to resolve the identified identity problems in the land registry. This paper examines the current land registry model and its shortcomings. It explains the various blockchain types and their characteristics. It further evaluates the usability of blockchain technology in different aspects of the land registry. Id...
Computer Systems Science and Engineering
In today's digital era, the text may be in form of images. This research aims to deal with the pr... more In today's digital era, the text may be in form of images. This research aims to deal with the problem by recognizing such text and utilizing the support vector machine (SVM). A lot of work has been done on the English language for handwritten character recognition but very less work on the under-resourced Hindi language. A method is developed for identifying Hindi language characters that use morphology, edge detection, histograms of oriented gradients (HOG), and SVM classes for summary creation. SVM rank employs the summary to extract essential phrases based on paragraph position, phrase position, numerical data, inverted comma, sentence length, and keywords features. The primary goal of the SVM optimization function is to reduce the number of features by eliminating unnecessary and redundant features. The second goal is to maintain or improve the classification system's performance. The experiment included news articles from various genres, such as Bollywood, politics, and sports. The proposed method's accuracy for Hindi character recognition is 96.97%, which is good compared with baseline approaches, and system-generated summaries are compared to human summaries. The evaluated results show a precision of 72% at a compression ratio of 50% and a precision of 60% at a compression ratio of 25%, in comparison to state-of-the-art methods, this is a decent result.
Contrast Media & Molecular Imaging
The disorder of Alzheimer’s (AD) is defined as a gradual deterioration of cognitive functions, su... more The disorder of Alzheimer’s (AD) is defined as a gradual deterioration of cognitive functions, such as the failure of spatial cognition and short-term memory. Besides difficulties in memory, a person with this disease encounters visual processing difficulties and even awareness and identifying of their beloved ones. Nowadays, recent technologies made this possible to connect everything that exists around us on Earth through the Internet, this is what the Internet of Things (IoT) made possible which can capture and save a massive amount of data that are considered very important and useful information which then can be valuable in training of the various state-of-the-art machine and deep learning algorithms. Assistive mobile health applications and IoT-based wearable devices are helping and supporting the ongoing health screening of a patient with AD. In the early stages of AD, the wearable devices and IoT approach aim to keep AD patients mentally active in all of life’s daily activi...
Computational Intelligence and Neuroscience
Diverse variants of COVID-19 are repeatedly making everyday living unstable. In reality, the conc... more Diverse variants of COVID-19 are repeatedly making everyday living unstable. In reality, the conclusive retort of this highly contagious virus still is in incognito mode. The health experts’ primary guideline on the possible prevention of this disease outbreak, including a list of restrictions and confinements, is insufficient in case of any public congregation. As a result, the demand for precise and upgraded real-time COVID-19 tracking and prevention-based applications increases. However, most of the existing android-based applications face a lack of data security and reliability that cannot satisfy the additional quality of service (QoS) requirements. This paper proposes an easy-to-operate android-based multifunctional application to track individuals’ health situations, allow uploading scanning report by the authorized organization like universities, mosques, school, and hospitals and helps the users to maintain guidelines via manageable steps. This article offers a three-layere...
IEEE Access, 2022
Several researchers have reported the results of adding a variety of fibers to asphalt concrete d... more Several researchers have reported the results of adding a variety of fibers to asphalt concrete described as fiber-reinforced asphalt concrete (FRAC). This research paper finds the most suitable prediction model for Marshall Stability and the optimistic bitumen content useful in glass fiber-reinforced asphalt mix by performing Marshall Stability tests and further analyzing the data in consonance with published research. Four machine learning approaches were used to find the best prediction model i.e., Artificial Neural Network, Support Vector Machine, Gaussian Process, and Random Forest. Seven statistical metrics were used to evaluate the performance of the applied models i.e., Coefficient of correlation (CC), Mean absoluteerror (MAE), Root mean squared error (RMSE), Relative absolute error (RAE), Root relative squared error (RRSE), Scattering index (SI), and Bias. Test results of the testing stage indicated that the Support Vector Machine (SVM_PUK) model performs the best in validation amongst all applied models with CC values as 0.8776 MAE as 1.2294, RMSE as 1.9653, RAE as 38.33%, RRSE as 55.22%, SI as 1.0648 and Bias as 0.5005. The Taylor diagram of the testing dataset also confirms that the model based on SVM outperforms the other models. Results of sensitivity analysis show that the bitumen content of about 5% has a significant effect on the Marshall Stability. INDEX TERMS Glass fiber, Marshall stability, artificial neural network, support vector machine, Gaussian process, random forest.