37 results on '"Srivastava, Gautam"'
Search Results
2. Federated Learning Systems: Mathematical Modeling and Internet of Things
- Author
-
Cruz, Quentin De La, Srivastava, Gautam, Donta, Praveen Kumar, editor, Hazra, Abhishek, editor, and Lovén, Lauri, editor
- Published
- 2024
- Full Text
- View/download PDF
3. An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
- Author
-
Selvarajan, Shitharth, Srivastava, Gautam, Khadidos, Alaa O., Khadidos, Adil O., Baza, Mohamed, Alshehri, Ali, and Lin, Jerry Chun-Wei
- Published
- 2023
- Full Text
- View/download PDF
4. Journey of customers in this digital era: Understanding the role of artificial intelligence technologies in user engagement and conversion
- Author
-
Bag, Surajit, Srivastava, Gautam, Bashir, Md Mamoon Al, Kumari, Sushma, Giannakis, Mihalis, and Chowdhury, Abdul Hannan
- Published
- 2022
- Full Text
- View/download PDF
5. Federated Learning Model with Augmentation and Samples Exchange Mechanism
- Author
-
Połap, Dawid, Srivastava, Gautam, Lin, Jerry Chun-Wei, Woźniak, Marcin, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Rutkowski, Leszek, editor, Scherer, Rafał, editor, Korytkowski, Marcin, editor, Pedrycz, Witold, editor, Tadeusiewicz, Ryszard, editor, and Zurada, Jacek M., editor
- Published
- 2021
- Full Text
- View/download PDF
6. An explainable transfer learning framework for multi-classification of lung diseases in chest X-rays.
- Author
-
Patel, Aryan Nikul, Murugan, Ramalingam, Srivastava, Gautam, Maddikunta, Praveen Kumar Reddy, Yenduri, Gokul, Gadekallu, Thippa Reddy, and Chengoden, Rajeswari
- Subjects
LUNG diseases ,X-rays ,COMPUTER-aided diagnosis ,LUNGS ,X-ray imaging ,ARTIFICIAL intelligence ,COMPUTER-assisted image analysis (Medicine) - Abstract
In the field of medical imaging, the increasing demand for advanced computer-aided diagnosis systems is crucial in radiography. Accurate identification of various diseases, such as COVID-19, pneumonia, tuberculosis, and pulmonary lung nodules, holds vital significance. Despite substantial progress in the medical field, a persistent research gap necessitates the development of models that excel in precision and provide transparency in decision-making processes. In order to address this issue, this work introduces an approach that utilizes transfer learning through the EfficientNet-B4 architecture, leveraging a pre-trained model to enhance the classification performance on a comprehensive dataset of lung X-rays. The integration of explainable artificial intelligence (XAI), specifically emphasizing Grad-CAM, contributes to model interpretability by providing insights into the neural network's decision-making process, elucidating the salient features and activation regions influencing multi-disease classifications. The result is a robust multi-disease classification system achieving an impressive 96% accuracy, accompanied by visualizations highlighting critical regions in X-ray images. This investigation not only advances the progression of computer-aided diagnosis systems but also sets a pioneering benchmark for the development of dependable and transparent diagnostic models for lung disease identification. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Artificial intelligence of medical things for disease detection using ensemble deep learning and attention mechanism.
- Author
-
Djenouri, Youcef, Belhadi, Asma, Yazidi, Anis, Srivastava, Gautam, and Lin, Jerry Chun‐Wei
- Subjects
ARTIFICIAL intelligence ,DEEP learning ,DISTRIBUTED sensors - Abstract
In this paper, we present a novel paradigm for disease detection. We build an artificial intelligence based system where various biomedical data are retrieved from distributed and homogeneous sensors. We use different deep learning architectures (VGG16, RESNET, and DenseNet) with ensemble learning and attention mechanisms to study the interactions between different biomedical data to detect and diagnose diseases. We conduct extensive testing on biomedical data. The results show the benefits of using deep learning technologies in the field of artificial intelligence of medical things to diagnose diseases in the healthcare decision‐making process. For example, the disease detection rate using the proposed methodology achieves 92%, which is greatly improved compared to the higher‐level disease detection models. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Overview and methods of correlation filter algorithms in object tracking
- Author
-
Liu, Shuai, Liu, Dongye, Srivastava, Gautam, Połap, Dawid, and Woźniak, Marcin
- Published
- 2021
- Full Text
- View/download PDF
9. Testing the Causal Map Builder on Amazon Alexa
- Author
-
Reddy, Thrishma, Srivastava, Gautam, Mago, Vijay, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Rocha, Álvaro, editor, Adeli, Hojjat, editor, Reis, Luís Paulo, editor, Costanzo, Sandra, editor, Orovic, Irena, editor, and Moreira, Fernando, editor
- Published
- 2020
- Full Text
- View/download PDF
10. Multi-agent Architecture for Internet of Medical Things
- Author
-
Połap, Dawid, Srivastava, Gautam, Woźniak, Marcin, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Rutkowski, Leszek, editor, Scherer, Rafał, editor, Korytkowski, Marcin, editor, Pedrycz, Witold, editor, Tadeusiewicz, Ryszard, editor, and Zurada, Jacek M., editor
- Published
- 2020
- Full Text
- View/download PDF
11. Suspicious activity detection using deep learning in secure assisted living IoT environments
- Author
-
Vallathan, G., John, A., Thirumalai, Chandrasegar, Mohan, SenthilKumar, Srivastava, Gautam, and Lin, Jerry Chun-Wei
- Published
- 2021
- Full Text
- View/download PDF
12. Privacy‐preserving remote sensing images recognition based on limited visual cryptography.
- Author
-
Zhang, Denghui, Shafiq, Muhammad, Wang, Liguo, Srivastava, Gautam, and Yin, Shoulin
- Subjects
REMOTE sensing ,VISUAL cryptography ,REMOTE sensing devices ,IMAGE encryption ,IMAGE recognition (Computer vision) ,ARTIFICIAL intelligence ,COMPUTER vision - Abstract
With the arrival of new data acquisition platforms derived from the Internet of Things (IoT), this paper goes beyond the understanding of traditional remote sensing technologies. Deep fusion of remote sensing and computer vision has hit the industrial world and makes it possible to apply Artificial intelligence to solve problems such as automatic extraction of information and image interpretation. However, due to the complex architecture of IoT and the lack of a unified security protection mechanism, devices in remote sensing are vulnerable to privacy leaks when sharing data. It is necessary to design a security scheme suitable for computation‐limited devices in IoT, since traditional encryption methods are based on computational complexity. Visual Cryptography (VC) is a threshold scheme for images that can be decoded directly by the human visual system when superimposing encrypted images. The stacking‐to‐see feature and simple Boolean decryption operation make VC an ideal solution for privacy‐preserving recognition for large‐scale remote sensing images in IoT. In this study, the secure and efficient transmission of high‐resolution remote sensing images by meaningful VC is achieved. By diffusing the error between the encryption block and the original block to adjacent blocks, the degradation of quality in recovery images is mitigated. By fine‐tuning the pre‐trained model from large‐scale datasets, we improve the recognition performance of small encryption datasets for remote sensing images. The experimental results show that the proposed lightweight privacy‐preserving recognition framework maintains high recognition performance while enhancing security. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
13. Special Section on "Advances in Cyber-Manufacturing: Architectures, Challenges, & Future Research Directions".
- Author
-
Srivastava, Gautam, Chun-Wei Lin, Jerry, Pu, Calton, and Yudong Zhang
- Subjects
DEEP learning ,ARTIFICIAL intelligence ,MACHINE learning ,SPARE parts ,MANUFACTURING processes - Published
- 2023
- Full Text
- View/download PDF
14. Exploring the Potential of Cyber Manufacturing System in the Digital Age.
- Author
-
AHMED, USMAN, CHUN-WEI LIN, JERRY, and SRIVASTAVA, GAUTAM
- Subjects
MANUFACTURING processes ,DIGITAL technology ,ARTIFICIAL intelligence ,CONTAINER industry ,INDUSTRIAL robots - Abstract
Cyber-manufacturing Systems (CMS) have been growing in popularity, transitioning from conventional manufacturing to an innovative paradigm that emphasizes innovation, automation, better customer service, and intelligent systems. A new manufacturing model can improve efficiency and productivity, and provide better customer service and response times. In addition, it may revolutionize the way products are produced, from design to completion. Therefore, it is likely that this newmanufacturing model will become increasingly popular. By building new technologies on top of existing CMS, these systems will ensure that data exchange and integration between decentralized systems are reliable and secure. Recently published case studies from industry and the literature support this claim; some challenges remain to be overcome. In general, the use of CMS can revolutionize the manufacturing industry. This study comprehensively analyzes these systems and their potential applications and implications. An overview of the field is then given and various aspects of CMS are also explored with more details. A taxonomy of the most common and current approaches to CMS is presented, including networked cyber-manufacturing systems, distributed cyber-manufacturing systems, cloud-based cyber-manufacturing systems, and cyber-physical systems (CPS). Furthermore, our survey identifies several popular open-source software and datasets and discusses how these resources can reduce barriers to CMS research. In addition, we identify several important issues and research opportunities associated with CMS, including better integration between hardware and software, improved security and privacy protocols, communication protocols, and improved data management systems. In summary, this paper presents a comprehensive overview of current technology and valuable insights are provided for the potential impact of CMS on society and industry. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. Deep Hierarchical Attention Active Learning for Mental Disorder Unlabeled Data in AIoMT.
- Author
-
AHMED, USMAN, CHUN-WEI LIN, JERRY, and SRIVASTAVA, GAUTAM
- Subjects
MENTAL health services ,PSYCHOTHERAPY ,ACTIVE learning ,MENTAL illness ,ARTIFICIAL intelligence ,DRUG labeling ,HIERARCHICAL Bayes model ,LATENT semantic analysis - Abstract
In the Artificial Intelligence of Medical Things (AIoMT), Internet-Delivered Psychological Treatment (IDPT) effectively improves the quality of mental health treatments. With the advent of COVID-19, psychological tasks have become overloaded and complicated for medical professionals due to the overlap of sentimental values. The development of an AIoMT tool requires labeling of data to achieve clinical-level performance. Text data requires an appropriate set of linguistic features for vector latent representation and segmentation. Emotional biases could lead to incorrect segmentation of patient-authorized texts, and labeling emotional data is time-consuming. In this article, we propose an assistant tool for psychologists to assist them in mental health treatment and note-taking. We first extend the word and emotion lexicon and then apply a hierarchical attention method to support data labeling. The learned latent representation uses word position prediction and sentence-level attention to create a semantic framework. The augmented vector representation helps in highlighting words and classifying nine different symptoms from the text written by the patient. Our experimental results show that the emotion lexicon helps to increase the accuracy by 5% without affecting the overall results, and that the hierarchical attention method achieves an F1 score of 0.89. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. When explainable AI meets IoT applications for supervised learning.
- Author
-
Djenouri, Youcef, Belhadi, Asma, Srivastava, Gautam, and Lin, Jerry Chun-Wei
- Subjects
DEEP learning ,SUPERVISED learning ,ARTIFICIAL intelligence ,INTERNET of things ,EVOLUTIONARY computation ,IMAGE databases - Abstract
This paper introduces a novel and complete framework for solving different Internet of Things (IoT) applications, which explores eXplainable AI (XAI), deep learning, and evolutionary computation. The IoT data coming from different sensors is first converted into an image database using the Gamian angular field. The images are trained using VGG16, where XAI technology and hyper-parameter optimization are introduced. Thus, analyzing the impact of the different input values in the output and understanding the different weights of a deep learning model used in the learning process helps us to increase interpretation of the overall process of IoT systems. Extensive testing was conducted to demonstrate the performance of our developed model on two separate IoT datasets. Results show the efficiency of the proposed approach compared to the baseline approaches in terms of both runtime and accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. Integrated Artificial Intelligence in Data Science.
- Author
-
Lin, Jerry Chun-Wei, Tomasiello, Stefania, and Srivastava, Gautam
- Subjects
ARTIFICIAL intelligence ,DATA science ,OPTIMIZATION algorithms ,MACHINE learning ,JOB analysis - Abstract
This document discusses the integration of artificial intelligence (AI) in data science and its potential to create a better society. It highlights the benefits of AI in various domains such as science, medicine, technology, and social sciences. The document also addresses the challenges of integrating multiple AI technologies from different fields and the open issues in this emerging field. The special issue presented in the document includes 22 papers covering topics such as job advertisement analysis, malware detection, image enhancement, machine learning techniques, and optimization algorithms. The authors declare no conflicts of interest. [Extracted from the article]
- Published
- 2023
- Full Text
- View/download PDF
18. Cyberbullying detection solutions based on deep learning architectures.
- Author
-
Iwendi, Celestine, Srivastava, Gautam, Khan, Suleman, and Maddikunta, Praveen Kumar Reddy
- Subjects
- *
DEEP learning , *MACHINE learning , *ARTIFICIAL intelligence , *CYBERBULLYING , *RECURRENT neural networks , *SOCIAL commentary - Abstract
Cyberbullying is disturbing and troubling online misconduct. It appears in various forms and is usually in a textual format in most social networks. Intelligent systems are necessary for automated detection of these incidents. Some of the recent experiments have tackled this issue with traditional machine learning models. Most of the models have been applied to one social network at a time. The latest research has seen different models based on deep learning algorithms make an impact on the detection of cyberbullying. These detection mechanisms have resulted in efficient identification of incidences while others have limitations of standard identification versions. This paper performs an empirical analysis to determine the effectiveness and performance of deep learning algorithms in detecting insults in Social Commentary. The following four deep learning models were used for experimental results, namely: Bidirectional Long Short-Term Memory (BLSTM), Gated Recurrent Units (GRU), Long Short-Term Memory (LSTM), and Recurrent Neural Network (RNN). Data pre-processing steps were followed that included text cleaning, tokenization, stemming, Lemmatization, and removal of stop words. After performing data pre-processing, clean textual data is passed to deep learning algorithms for prediction. The results show that the BLSTM model achieved high accuracy and F1-measure scores in comparison to RNN, LSTM, and GRU. Our in-depth results shown which deep learning models can be most effective against cyberbullying when directly compared with others and paves the way for future hybrid technologies that may be employed to combat this serious online issue. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. Temporal positional lexicon expansion for federated learning based on hyperpatism detection.
- Author
-
Ahmed, Usman, Lin, Jerry Chun‐Wei, and Srivastava, Gautam
- Subjects
COINCIDENCE ,HOLOCENE Epoch ,ARTIFICIAL intelligence ,LEXICON ,INFORMATION sharing ,PUBLISHED articles ,SECURE Sockets Layer (Computer network protocol) ,SUPERVISED learning - Abstract
Internet‐based information exchange has resulted in the propagation of false and misleading information, which is highly detrimental to individuals and humankind. Due to the speed and volume of social media news production, supervised artificial intelligence algorithms require many annotated data, which is difficult, costly, and time‐consuming. To address this issue, we offer a novel federated semi‐supervised framework based on self‐ensembling that utilizes the linguistic and stylometric information of annotated news articles and searches for hidden patterns in unlabeled data to denoise labels. Self‐ensembling predicts the labels of unlabeled data by using the outcomes of network‐in‐training from earlier epochs. These cumulative predictions should be a stronger predictor for unknown labels than the output of the most recent training epoch; hence, they may be utilized as a substitute for the labels of unlabeled data. The approach is distinctive in collecting all of the outputs from the neural network's past training periods. It utilizes them as an unsupervised target against which to assess the current output prediction of unlabeled articles. We intend to create a dataset centred on denoising to forward the study. The dataset is mapped using (1) the shifting focus time from published news articles and (2) the semi‐supervised method based on coincidence contexts for a neural contrast embedding model for learning low‐dimensional continuous vectors that generate a focus time‐based query in sequential news articles for temporal comprehension. The model achieved 0.83% F‐measure with lexicon expansion semi‐supervised learning. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. Towards an Advanced Deep Learning for the Internet of Behaviors: Application to Connected Vehicles.
- Author
-
MEZAIR, TINHINANE, DJENOURI, YOUCEF, BELHADI, ASMA, SRIVASTAVA, GAUTAM, and LIN, JERRY CHUN-WEI
- Subjects
DEEP learning ,ARTIFICIAL intelligence ,INTERNET ,INTERNET of things ,BIG data ,VEHICLES - Abstract
In recent years, intensive research has been conducted to enable people to live more comfortably. Developments in the Internet of Things (IoT), big data, and artificial intelligence have taken this type of research to a new level and led to the emergence of the Internet of Behaviors (IoB), which analyzes behavioral patterns. However, current IoB technologies are not capable of handling heterogeneous data. While it is quite common to have different formats of sensor data for the same behavioral observation, the use of these different data formats can significantly help to obtain a more accurate classification of the observation. Another limitation is that existing IoB deep learning models rely on inefficient hyperparameter tuning strategies. In this paper, we present an Advanced Deep Learning framework for IoB (ADLIoB) applied to connected vehicles. Several deep learning architectures are employed in this framework: CNN, Graph CNN (GCNN), and LSTM are used to train sensor data of different formats. In addition, a branch-and-bound technique is used to intelligently select hyperparameters. To validate ADLIoB, experiments were conducted on four databases for connected vehicles. The results clearly show that ADLIoB is superior to the baseline solutions in terms of both accuracy and runtime. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. AHDNN: Attention-Enabled Hierarchical Deep Neural Network Framework for Enhancing Security of Connected and Autonomous Vehicles.
- Author
-
Gupta, Koyel Datta, Sharma, Deepak Kumar, Dwivedi, Rinky, and Srivastava, Gautam
- Subjects
INTRUSION detection systems (Computer security) ,ARTIFICIAL intelligence ,PROCESS capability ,TRAFFIC engineering ,DATA integrity ,ROAD safety measures ,AUTONOMOUS vehicles - Abstract
The usage of the Internet of Things (IoT) in the field of transportation appears to have immense potential. Intelligent vehicle systems can exchange seamless information to assist cars to ensure better traffic control and road safety. The dynamic topology of this network, connecting a large number of vehicles, makes it vulnerable to several threats like authentication, data integrity, confidentiality, etc. These threats jeopardize the safety of vehicles, riders, and the entire system. Researchers are developing several approaches to combat security threats in connected and autonomous vehicles. Artificial Intelligence is being used by both scientists and hackers for protecting and attacking the networks, respectively. Nevertheless, wirelessly coupled cars on the network are in constant peril. This motivated us to develop an intrusion detection model that can be run in low-end devices with low processing and memory capacity and can prevent security threats and protect the connected vehicle network. This research paper presents an Attention-enabled Hierarchical Deep Neural Network (AHDNN) as a solution to detect intrusion and ensure autonomous vehicles' security both at the nodes and at the network level. The proposed AHDNN framework has a very low false negative rate of 0.012 ensuring a very low rate of missing an intrusion in normal communication. This enables enhanced security in vehicular networks. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
22. Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization.
- Author
-
Alterazi, Hassan A., Kshirsagar, Pravin R., Manoharan, Hariprasath, Selvarajan, Shitharth, Alhebaishi, Nawaf, Srivastava, Gautam, and Lin, Jerry Chun-Wei
- Subjects
PARTICLE swarm optimization ,ANT algorithms ,INTERNET of things ,INTERNET protocol address ,INTERNET security ,INTERNET protocols - Abstract
High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network's external foreign entities through the Internet (IP). IoT devices are in danger of security issues due to the surge in hacker attacks during Internet data exchange. If such strong attacks are to create a reliable security system, attack detection is essential. Attacks and abnormalities such as user-to-root (U2R), denial-of-service, and data-type probing could have an impact on an IoT system. This article examines various performance-based AI models to predict attacks and problems with IoT devices with accuracy. Particle Swarm Optimization (PSO), genetic algorithms, and ant colony optimization were used to demonstrate the effectiveness of the suggested technique concerning four different parameters. The results of the proposed method employing PSO outperformed those of the existing systems by roughly 73 percent. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
23. Secure Collaborative Augmented Reality Framework for Biomedical Informatics.
- Author
-
Djenouri, Youcef, Belhadi, Asma, Srivastava, Gautam, and Lin, Jerry Chun-Wei
- Subjects
AUGMENTED reality ,MEDICAL informatics ,INTELLIGENT agents ,DEEP learning ,ARTIFICIAL intelligence ,MEDICAL technology ,MULTIAGENT systems - Abstract
Augmented reality is currently of interest in biomedical health informatics. At the same time, several challenges have appeared, in particular with the rapid progress of smart sensor technologies, and medical artificial intelligence. This yields the necessity of new needs in biomedical health informatics. Collaborative learning and privacy are just some of the challenges of augmented reality technology in biomedical health informatics. This paper introduces a novel secure collaborative augmented reality framework for biomedical health informatics-based applications. Distributed deep learning is performed across a multi-agent system platform. The privacy strategy is then developed for ensuring better communications of the different intelligent agents in the system. In this research work, a system of multiple agents is created for the simulation of the collective behaviours of the smart components of biomedical health informatics. Augmented reality is also incorporated for better visualization of medical patterns. A novel privacy strategy based on blockchain is investigated for ensuring the confidentiality of the learning process. Experiments are conducted on real use cases of the biomedical segmentation process. Our strong experimental analysis reveals the strength of the proposed framework when directly compared to state-of-the-art biomedical health informatics solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. Sensor data fusion for the industrial artificial intelligence of things.
- Author
-
Djenouri, Youcef, Belhadi, Asma, Srivastava, Gautam, Houssein, Essam H., and Lin, Jerry Chun‐Wei
- Subjects
ARTIFICIAL intelligence ,MULTISENSOR data fusion ,MANUFACTURING processes ,KNOWLEDGE graphs ,INTELLIGENT sensors ,DEEP learning - Abstract
The emergence of smart sensors, artificial intelligence, and deep learning technologies yield artificial intelligence of things, also known as the AIoT. Sophisticated cooperation of these technologies is vital for the effective processing of industrial sensor data. This paper introduces a new framework for addressing the different challenges of the AIoT applications. The proposed framework is an intelligent combination of multi‐agent systems, knowledge graphs and deep learning. Deep learning architectures are used to create models from different sensor‐based data. Multi‐agent systems can be used for simulating the collective behaviours of the smart sensors using IoT settings. The communication among different agents is realized by integrating knowledge graphs. Different optimizations based on constraint satisfaction as well as evolutionary computation are also investigated. Experimental analysis is undertaken to compare the methodology presented to state‐of‐the‐art AIoT technologies. We show through experimentation that our designed framework achieves good performance compared to baseline solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. Speech Emotion Recognition Enhanced Traffic Efficiency Solution for Autonomous Vehicles in a 5G-Enabled Space–Air–Ground Integrated Intelligent Transportation System.
- Author
-
Tan, Liang, Yu, Keping, Lin, Long, Cheng, Xiaofan, Srivastava, Gautam, Lin, Jerry Chun-Wei, and Wei, Wei
- Abstract
Speech emotion recognition (SER) is becoming the main human–computer interaction logic for autonomous vehicles in the next generation of intelligent transportation systems (ITSs). It can improve not only the safety of autonomous vehicles but also the personalized in-vehicle experience. However, current vehicle-mounted SER systems still suffer from two major shortcomings. One is the insufficient service capacity of the vehicle communication network, which is unable to meet the SER needs of autonomous vehicles in next-generation ITSs in terms of the data transmission rate, power consumption, and latency. Second, the accuracy of SER is poor, and it cannot provide sufficient interactivity and personalization between users and vehicles. To address these issues, we propose an SER-enhanced traffic efficiency solution for autonomous vehicles in a 5G-enabled space–air–ground integrated network (SAGIN)-based ITS. First, we convert the vehicle speech information data into spectrograms and input them into an AlexNet network model to obtain the high-level features of the vehicle speech acoustic model. At the same time, we convert the vehicle speech information data into text information and input it into the Bidirectional Encoder Representations from Transformers (BERT) model to obtain the high-level features of the corresponding text model. Finally, these two sets of high-level features are cascaded together to obtain fused features, which are sent to a softmax classifier for emotion matching and classification. Experiments show that the proposed solution can improve not only the SAGIN’s service capabilities, resulting in a large capacity, high bandwidth, ultralow latency, and high reliability, but also the accuracy of vehicle SER as well as the performance, practicality, and user experience of the ITS [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
26. An Artificial Intelligence-Based Quorum System for the Improvement of the Lifespan of Sensor Networks.
- Author
-
Ponnan, Suresh, Saravanan, Aanandha K., Iwendi, Celestine, Ibeke, Ebuka, and Srivastava, Gautam
- Abstract
Artificial Intelligence-based Quorum systems are used to solve the energy crisis in real-time wireless sensor networks. They tend to improve the coverage, connectivity, latency, and lifespan of the networks where millions of sensor nodes need to be deployed in a smart grid system. The reality is that sensors may consume more power and reduce the lifetime of the network. This paper proposes a quorum-based grid system where the number of sensors in the quorum is increased without actually increasing quorums themselves, leading to improvements in throughput and latency by 14.23%. The proposed artificial intelligence scheme reduces the network latency due to an increase in time slots over conventional algorithms previously proposed. Secondly, energy consumption is reduced by weighted load balancing, improving the network’s actual lifespan. Our experimental results show that the coverage rate is increased on an average of 11% over the conventional Coverage Contribution Area (CCA), Partial Coverage with Learning Automata (PCLA), and Probabilistic Coverage Protocol (PCP) protocols respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
27. Artificial Intelligence-Based Surveillance System for Railway Crossing Traffic.
- Author
-
Sikora, Pavel, Malina, Lukas, Kiac, Martin, Martinasek, Zdenek, Riha, Kamil, Prinosil, Jiri, Jirik, Leos, and Srivastava, Gautam
- Abstract
The application of Artificial Intelligence (AI) based techniques has strong potential to improve safety and efficiency in data-driven Intelligent Transportation Systems (ITS) as well as in the emerging Internet of Vehicles (IoV) services. This paper deals with the practical implementation of deep learning methods for increasing safety and security in a specific ITS scenario: railway crossings. This research work presents our proposed system called Artificial Intelligence-based Surveillance System for Railway Crossing Traffic (AISS4RCT) that is based on a combination of detection and classification methods focusing on various image processing inputs: vehicle presence, pedestrian presence, vehicle trajectory tracking, railway barriers at railway crossings, railway warnings, and light signaling systems. The designed system uses cameras that are suitably positioned to capture an entire crossing area at a given railway crossing. By employing GPU accelerated image processing techniques and deep neural networks, the system autonomously detects risky and dangerous situations at railway crossing in real-time. In addition, camera modules send data to a central server for further processing as well as notification to interested parties (police, emergency services, railway operators). Furthermore, the system architecture employs privacy-by-design and security-by-design best practices in order to secure all communication interfaces, protect personal data, and to increase personal privacy, i.e., pedestrians, drivers. Finally, we present field-based results of detection methods, and using the YOLO tiny model method we achieve average recall 89%. The results indicate that our system is efficient for evaluating the occurrence of objects and situations, and it’s practicality for use in railway crossings. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
28. Industrial Internet of Things for smart manufacturing applications using Hierarchical Trustful Resource Assignment.
- Author
-
Pingli, Duan, Muthu, Bala Anand, Kadry, Seifedine Nimer, Kumar, Priyan Malarvizhi, Pandey, Hari Mohan, and Srivastava, Gautam
- Subjects
WIRELESS communications equipment ,HIGH performance computing ,PRIVACY ,COMPUTER simulation ,MANUFACTURING industries ,INTERNET of things ,ARTIFICIAL intelligence ,MEDICAL ethics ,DATA security ,ALGORITHMS ,MICROPROCESSORS ,COMMUNICATIONS software - Abstract
BACKGROUND: The manufacturing industry undergoes a new age, with significant changes taking place on several fronts. Companies devoted to digital transformation take their future plants inspired by the Internet of Things (IoT). The IoT is a worldwide network of interrelated physical devices, which is an essential component of the internet, including sensors, actuators, smart apps, computers, mechanical machines, and people. The effective allocation of the computing resources and the carrier is critical in the Industrial Internet of Things (IIoT) for smart production systems. Indeed, the existing assignment method in the smart production system cannot guarantee that resources meet the inherently complex and volatile requirements of the user are timely. Many research results on resource allocations in auction formats which have been implemented to consider the demand and real-time supply for smart development resources, but safety privacy and trust estimation issues related to these outcomes are not actively discussed. OBJECTIVES: The paper proposes a Hierarchical Trustful Resource Assignment (HTRA) and Trust Computing Algorithm (TCA) based on Vickrey Clarke-Groves (VGCs) in the computer carriers necessary resources to communicate wirelessly among IIoT devices and gateways, and the allocation of CPU resources for processing information at the CPC. RESULTS: Finally, experimental findings demonstrate that when the IIoT equipment and gateways are valid, the utilities of each participant are improved. CONCLUSION: This is an easy and powerful method to guarantee that intelligent manufacturing components genuinely work for their purposes, which want to integrate each element into a system without interactions with each other. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
29. ADA-SR: Activity detection and analysis using security robots for reliable workplace safety.
- Author
-
Zhang, Guangnan, Jing, Wang, Tao, Hai, Rahman, Md Arafatur, Salih, Sinan Q., AL-Saffar, Ahmed, Zhang, Renrui, Kumar, Priyan Malarvizhi, Pandey, Hari Mohan, and Srivastava, Gautam
- Subjects
WORK environment ,INDUSTRIAL safety ,THREE-dimensional imaging ,RESEARCH evaluation ,INFORMATION display systems ,USER interfaces ,SECURITY systems ,ARTIFICIAL intelligence ,ROBOTICS ,COMPARATIVE studies ,DESCRIPTIVE statistics ,RESEARCH funding ,INTERPERSONAL relations ,STATISTICAL correlation ,ARTIFICIAL neural networks ,VIDEO recording - Abstract
BACKGROUND: Human-Robot Interaction (HRI) has become a prominent solution to improve the robustness of real-time service provisioning through assisted functions for day-to-day activities. The application of the robotic system in security services helps to improve the precision of event detection and environmental monitoring with ease. OBJECTIVES: This paper discusses activity detection and analysis (ADA) using security robots in workplaces. The application scenario of this method relies on processing image and sensor data for event and activity detection. The events that are detected are classified for its abnormality based on the analysis performed using the sensor and image data operated using a convolution neural network. This method aims to improve the accuracy of detection by mitigating the deviations that are classified in different levels of the convolution process. RESULTS: The differences are identified based on independent data correlation and information processing. The performance of the proposed method is verified for the three human activities, such as standing, walking, and running, as detected using the images and sensor dataset. CONCLUSION: The results are compared with the existing method for metrics accuracy, classification time, and recall. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
30. Meta-Heuristic Feature Optimization for ontology-based data security in a campus workplace with robotic assistance.
- Author
-
Gong, Suning, Dinesh Jackson Samuel, R., Pandian, Sanjeevi, Kumar, Priyan Malarvizhi, Pandey, Hari Mohan, and Srivastava, Gautam
- Subjects
WORK environment ,SEMANTICS ,RESEARCH evaluation ,ARTIFICIAL intelligence ,MACHINE learning ,ROBOTICS ,SOFTWARE architecture ,DATA security ,INTELLECT ,INFORMATION retrieval ,ONTOLOGIES (Information retrieval) ,DATA mining ,ALGORITHMS - Abstract
BACKGROUND: For campus workplace secure text mining, robotic assistance with feature optimization is essential. The space model of the vector is usually used to represent texts. Besides, there are still two drawbacks to this basic approach: the curse and lack of semantic knowledge. OBJECTIVES: This paper proposes a new Meta-Heuristic Feature Optimization (MHFO) method for data security in the campus workplace with robotic assistance. Firstly, the terms of the space vector model have been mapped to the concepts of data protection ontology, which statistically calculate conceptual frequency weights by term various weights. Furthermore, according to the designs of data protection ontology, the weight of theoretical identification is allocated. The dimensionality of functional areas is reduced significantly by combining standard frequency weights and weights based on data protection ontology. In addition, semantic knowledge is integrated into this process. RESULTS: The results show that the development of the characteristics of this process significantly improves campus workplace secure text mining. CONCLUSION: The experimental results show that the development of the features of the concept hierarchy structure process significantly enhances data security of campus workplace text mining with robotic assistance. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
31. Robotic Mounted Rail Arm System for implementing effective workplace safety for migrant workers.
- Author
-
Wei, Hongbo, Rahman, Md Arafatur, Hu, Xu, Zhang, Lin, Guo, Lieyan, Tao, Hai, Salih, Sinan Q, Kumar, Priyan Malarvizhi, Pandey, Hari Mohan, and Srivastava, Gautam
- Subjects
INDUSTRIAL safety equipment ,PACKAGING equipment ,WORK environment ,NOMADS ,INDUSTRIAL safety ,TRAVEL ,ARTIFICIAL intelligence ,ROBOTICS ,AUTOMATION ,ORGANIZATIONAL effectiveness ,COST analysis ,RESEARCH funding ,TECHNOLOGY ,STATISTICAL models - Abstract
BACKGROUND: The selection of orders is the method of gathering the parts needed to assemble the final products from storage sites. Kitting is the name of a ready-to-use package or a parts kit, flexible robotic systems will significantly help the industry to improve the performance of this activity. In reality, despite some other limitations on the complexity of components and component characteristics, the technological advances in recent years in robotics and artificial intelligence allows the treatment of a wide range of items. OBJECTIVE: In this article, we study the robotic kitting system with a Robotic Mounted Rail Arm System (RMRAS), which travels narrowly to choose the elements. RESULTS: The objective is to evaluate the efficiency of a robotic kitting system in cycle times through modeling of the elementary kitting operations that the robot performs (pick and room, move, change tools, etc.). The experimental results show that the proposed method enhances the performance and efficiency ratio when compared to other existing methods. CONCLUSION: This study with the manufacturer can help him assess the robotic area performance in a given design (layout and picking a policy, etc.) as part of an ongoing project on automation of kitting operations. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
32. Need for developing a security robot-based risk management for emerging practices in the workplace using the Advanced Human-Robot Collaboration Model.
- Author
-
Zheyuan, Cui, Rahman, Md Arafatur, Tao, Hai, Liu, Yao, Pengxuan, Du, Yaseen, Zaher Mundher, Kumar, Priyan Malarvizhi, Pandey, Hari Mohan, and Srivastava, Gautam
- Subjects
ROBOTICS equipment ,WORK environment ,EXPERIMENTAL design ,SEMANTICS ,COMPUTER software ,INDUSTRIES ,TASK performance ,ARTIFICIAL intelligence ,ASSISTIVE technology ,INTERPROFESSIONAL relations ,COMMUNICATION ,RISK management in business ,OCCUPATIONAL adaptation ,JOB performance ,INFORMATION technology - Abstract
BACKGROUND: The increasing use of robotics in the work of co-workers poses some new problems in terms of occupational safety and health. In the workplace, industrial robots are being used increasingly. During operations such as repairs, unmanageable, adjustment, and set-up, robots can cause serious and fatal injuries to workers. Collaborative robotics recently plays a rising role in the manufacturing filed, warehouses, mining agriculture, and much more in modern industrial environments. This development advances with many benefits, like higher efficiency, increased productivity, and new challenges like new hazards and risks from the elimination of human and robotic barriers. OBJECTIVES: In this paper, the Advanced Human-Robot Collaboration Model (AHRCM) approach is to enhance the risk assessment and to make the workplace involving security robots. The robots use perception cameras and generate scene diagrams for semantic depictions of their environment. Furthermore, Artificial Intelligence (AI) and Information and Communication Technology (ICT) have utilized to develop a highly protected security robot based risk management system in the workplace. RESULTS: The experimental results show that the proposed AHRCM method achieves high performance in human-robot mutual adaption and reduce the risk. CONCLUSION: Through an experiment in the field of human subjects, demonstrated that policies based on the proposed model improved the efficiency of the human-robot team significantly compared with policies assuming complete human-robot adaptation. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
33. Energy grid management system with anomaly detection and Q-learning decision modules.
- Author
-
Syu, Jia-Hao, Srivastava, Gautam, Fojcik, Marcin, Cupek, Rafał, and Lin, Jerry Chun-Wei
- Subjects
- *
ANOMALY detection (Computer security) , *ENERGY management , *ENERGY subsidies , *ARTIFICIAL intelligence , *ENERGY security , *LEARNING Management System - Abstract
Stability and security issues in energy management have become widespread research topics, in which artificial intelligence techniques are often embedded in management systems to efficiently manage the smart grid. In this paper, we propose an energy grid management system with anomaly detection and Q-learning decision modules (EMSAD). The anomaly detection module is a multitask learning network that simultaneously classifies suppliers and predicts actual supply quantities. The Q-learning decision module then determines the operating reserve and subsidies to manage the energy grid. Experimental results show that the proposed anomaly detection module has an excellent performance in classifying malicious suppliers with F1-scores from 73.3% to 100.0%. The robustness evaluation also shows that EMSAD maintains high performance even in unseen environments without fine-tuning. Thus, the simulation results demonstrate the security, efficiency, transferability, and robustness of the proposed EMSAD in smart grid energy management. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. Special Issue on Synthetic Media on the Web.
- Author
-
Lu, Huimin, Xu, Xing, Guna, Jože, and Srivastava, Gautam
- Subjects
COMPUTER vision ,SOCIAL computing ,ARTIFICIAL intelligence - Abstract
The online generation and dissemination of synthetic media through Internet media such as Facebook, Twitter, Snapchat, and TikTok, can easily produce "fake news" with fast spread. With the latest advances of artificial intelligence technology, images, audio, videos, and textual information can easily be transformed or synthesized in real-time. It is time to understand any possible effects that synthetic media might have on people, societies, and how psychological and social media theories apply to this new technology. [Extracted from the article]
- Published
- 2022
- Full Text
- View/download PDF
35. Editorial.
- Author
-
Srivastava, Gautam, Hsu, Ching‐Hsien, and Kumar, Priyan Malarvizhi
- Subjects
- *
URBAN growth , *SMART cities , *COMPUTATIONAL intelligence , *ARTIFICIAL intelligence , *MACHINE learning - Published
- 2021
- Full Text
- View/download PDF
36. Explainable Artificial Intelligence for Cybersecurity.
- Author
-
Sharma, Deepak Kumar, Mishra, Jahanavi, Singh, Aeshit, Govil, Raghav, Srivastava, Gautam, and Lin, Jerry Chun-Wei
- Subjects
- *
ARTIFICIAL intelligence , *INTERNET security , *TRUST , *MACHINE learning - Abstract
Recently, numerous Machine Learning (ML) algorithms have been applied in many areas of cybersecurity. However, most of these systems can only be seen as a black box to users. To improve our understanding of such systems, adversarial machine learning approaches can be used. The main features are detected by analyzing the extent of such changes, which helps in identifying the main reasons for misclassification. In this paper, the presented approach has obtained satisfactory results that accurately explains the reasons for misclassifications. Some features of the presented method can be applied to any classifier with defined gradients without the need for modifications. The proposed model can be extended to perform more diagnoses and it can be used for a deeper analysis of systems, obtaining more than 95% accuracy classification on the used datasets in the experiments. [Display omitted] • Explains misclassifications by data-driven AI models using an adversarial approach. • Compute the minimum number of changes to input features required. • Increased average classification accuracy by 2.5% post modification. • Designed a black-box attack to test the correctness and trustworthiness. • Used explanation maps to examine the effectiveness of attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
37. Investigation of multiple heterogeneous relationships using a q-rung orthopair fuzzy multi-criteria decision algorithm
- Author
-
Gautam Srivastava, Jinqiu Li, Zaoli Yang, Harish Garg, Zehong Cao, Yang, Zaoli, Garg, Harish, Li, Jinqiu, Srivastava, Gautam, and Cao, Zehong
- Subjects
maclaurin symmetric mean operators ,0209 industrial biotechnology ,Computer science ,02 engineering and technology ,Function (mathematics) ,Multiple-criteria decision analysis ,Fuzzy logic ,Q-rung orthopair fuzzy set ,Set (abstract data type) ,020901 industrial engineering & automation ,Operator (computer programming) ,Artificial Intelligence ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Sensitivity (control systems) ,multiple heterogeneous relationships ,interaction operators ,Algorithm ,Software ,Membership function ,Decision analysis - Abstract
Refereed/Peer-reviewed Q-rung orthopair fuzzy (q-ROF) set is one of the powerful tools for handling the uncertain multi-criteria decision-making (MCDM) problems, various MCDM methods under q-ROF environment have been developed in recent years. However, most existing studies merely concerned about the relationship between the criteria but they have not investigated the interactions between membership function and non-membership function. To explore the multiple heterogeneous relationships among membership functions and criteria, we propose a novel decision algorithm based on q-ROF set to deal with these using interactive operators and Maclaurin symmetric mean (MSM) operators. Specifically, the new interaction laws in the membership pairs of q-ROF sets are explained, and their properties are analyzed as the initial stage. Then, taking into account the influence of two or more factors on decision analysis, a q-ROF interaction Maclaurin symmetry mean (q-ROFIMSM) operator is formed based on the proposed interaction law to identify these factors' interrelationship. Thirdly, based on the proposed operator with q-ROF information, a MCDM algorithm is developed and illustrated by numerical examples. An analysis of the feasibility, sensitivity, and superiority of the proposed framework is provided to validate our proposed method. usc
- Published
- 2020
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.