ASPG Menu
search

American Scientific Publishing Group

verified Journal

Journal of Intelligent Systems and Internet of Things

ISSN
Online: 2690-6791 Print: 2769-786X
Frequency

Continuous publication

Publication Model

Open access · Articles freely available online · APC applies after acceptance

Journal of Intelligent Systems and Internet of Things

Volume 16 / Issue 1 ( 21 Articles)

Full Length Article DOI: https://doi.org/10.54216/JISIoT.160121

Performance Enhancement of Intelligent Healthcare-Based Recommendation System with IFODNN Model

Several diseases have been identified as fatal conditions affecting individuals during their middle and old ages worldwide. In recent years, chronic and pulmonary diseases have exhibited the highest mortality rates among all known conditions in this category. Machine Learning (ML) tools have efficiently studied the causes of these harmful diseases, including analyzing large databases. These databases may contain unreliable and redundant features that affect prediction accuracy and speed. Applying, the feature-based extraction and selection methods to remove inconsistent components is essential. This article implements a deep neural network (DNN) technique for diagnosis to classify different diseases. However, the DNN model faces a challenge, specifically hallucination, in accurately classifying diseases. To overcome this, a hybrid optimization DNN model has been introduced. This model is useful for recommending treatments based on the diagnosed diseases. The hybrid optimization DNN model, referred to as the Intelligent Healthcare Recommendation (IHCR) model, is designed to predict and recommend treatments for chronic and pulmonary disease patients. The research model effectively extracts features at a specific level and selects valuable features to provide accurate recommendations. This recommendation phase is followed by a statistical analysis based on probability, which evaluates patients' risk levels. Reliant on the data from the risk analysis (RA), patients are given recommendations regarding the severity and performance of the related diseases for early treatment. The proposed work has been estimated using dissimilar databases based on muti-diseases, and the outcomes appear encouraging. This research aims to develop the IHCR model for chronic and pulmonary diseases. The performance of the implemented recommendation models is evaluated using parameters like RMSE, specificity (SP), sensitivity (SN), and accuracy (Acc). The results of the recommendation model show an Acc of 96.81–97%.
Gauri Sood, Neeraj Raheja
visibility 2646
download 2771
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160120

Natural Language Processing Driven Applied Linguistics for Sarcasm Detection Using Artificial Hummingbird Algorithm with Deep Learning

Natural Language Processing (NLP)-driven applied linguistics for sarcasm detection includes computational models to understand and identify sarcastic expressions within text. This interdisciplinary method integrates linguistics principles with advanced NLP techniques to identify subtle and nuanced cues indicative of sarcasm correctly. It includes computational approaches like linguistic feature extraction, machine learning models, and sentiment analysis. Furthermore, deep learning (DL) algorithms, including transformers and recurrent neural networks (RNNs), hold significant potential in capturing complex linguistic nuances inherent in sarcastic expression. These approaches can learn the hierarchical representation of text, which enables capturing context dependency, which is crucial for accurately detecting sarcasm. The applications of NLP-driven applied linguistics for sarcasm detection show great potential in various domains namely social media analysis, online content moderation, and customer feedback interpretation. By automating sarcasm detection, this system can enhance communication understanding, improve sentiment analysis accuracy, and contribute to better decision-making processes in various contexts. This study develops automated Sarcasm Detection using the Artificial Hummingbird Algorithm with Deep Learning (ASD-AHADL) technique. The ASD-AHADL technique applies the optimal DL model for detecting sarcastic content. To achieve this, the ASD-AHADL technique undergoes data preprocessing and the BERT-based word embedding process at the initial stage. Followed by the ASD-AHADL technique uses attention-gated recurrent unit long short-term memory (AGRU-LSTM) for the sarcasm detection process. At last, the AHA-based parameter tuning process is involved to fine-tune the parameters based on the DL algorithm. The experimental study of the ASD-AHADL technique has been tested under a social media dataset. The outcomes indicated that the solution of the ASD-AHADL technique was significant compared to others.
Maryam Alsolami
visibility 2216
download 3063
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160119

An Optimized Convolutional Neural Network for Alzheimer’s disease Detection

Alzheimer’s disease (AD) is a serious diseases distressing society. AD is a complex disease associated with many risk factors, such as aging, genetics, head trauma, and vascular disease. AD is also influenced by environmental factors such as heavy metals and trace metals. The pathology of AD, including amyloid-peptide (Aβ) protein, neurofibrillary tangles (NFTs), and synaptic loss, is still unknown. There are many explanations for the causes of AD. Cholinergic dysfunction is a main danger factor for Alzheimer's disease, whereas others believe that abnormalities in the production and treating of Aβ protein are the primary cause. However, there is currently no accepted hypothesis explaining the pathogenesis of AD. Magnetic resonance imaging is used to diagnose Alzheimer's disease. Our new AD pathogenesis showed 99.77% accuracy with 0.2% efficiency loss and outperformed VGG16, MobileNet2, and Inception V3 without the Adam optimizer and folder hierarchy.
Amena Mahmoud, Abdulaziz Shehab, A. S. Abohamama et al.
visibility 2111
download 2583
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160118

On Developing a Temporally Ordered Energy Efficient Routing Model (TO-EER) using Bio-Inspired Optimization for MANET

Mobile Ad-hoc Network is a structure of dynamic cellular network devices with no fixed architecture. Due to the network's constantly changing environment, characterized by frequent changes in its topology routing becomes a major challenge in MANET, which can reduce the overall network efficacy. As routing protocol plays a vital role in MANET, the energy-efficient routing model can enhance network longevity with a minimal rate of energy consumption. This paper uses a Temporally Ordered Routing Algorithm (TORA) to attain a higher scalability rate and an Elephant Herding Optimization (EHO) model to employ energy-efficient routing protocol features. The computations of the proposed model include the length of the route (LR) in optimal route selection and the energy level of routes (ER). It devises the routing problem as an optimization issue and further incorporates EHO for route selection, enhancing the weighted rate of LR and ER. The experimentations are carried out using the NS-3 simulation tool and factors such as latency, packet success rate, throughput, reliability, and energy depletion rate. Through a comparative analysis of the results with the previous works, the effectiveness of the proposed model is demonstrated.
Hemalatha M., M. Mohanraj
visibility 2091
download 2682
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160117

Cat-Feed-Nets: A Novel Cat Evoked Deep Feedforward Networks for Detection of Dos Attacks in IoT-Cloud Environment

Internet of things (IoT) is an intelligent combination of embedded systems, cloud computing and wireless communications. However, the data privacy and leakage problems are considered as the major deadlocks for deploying the IoT devices in the real time fields. Nevertheless, the complication of Distributed Denial of Service (DDoS) hazard on the IoT devices recent surge has seen an uptick, making it prone to numerous threat complications. For this reason, prompt detection of these attacks plays a pivotal role to safeguard the user’s data. The AI methodology of Machine and Deep Learning Models engaged for the designing the intelligent systems to provide the secured environment to safeguard the network against the various attacks. However, the computational overhead of deep learning model handicaps to deploy it in the IoT-Cloud environment. To tackle this issue, the present article suggests the novel hybrid learning based detection system called CAT-FEED-NETS that incorporates the Deep feed forward neural networks (DFFNN) where the hyper parameters are tuned by the Cat Swarm Intelligence Algorithms. Comprehensive trials and analysis are performed using NSL-KDD and UNSW datasets and criteria to assess the efficacy of quality measurements such as accuracy, precision recall, F1-score and model building time (MBT) is evaluated and analysed. Evaluation results are weighted against the various DL algorithms with the suggested model exhibiting better results than the other models by producing 0.96 accuracy, 0.956 precision, 0.955 recall and 0.9834s of MBT respectively. The proposed framework had proved its superiority in predicting the cloud attacks than the other existing frameworks.
P. Jagdish Kumar, S. Neduncheliyan
visibility 2261
download 2502
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160116

Multi-objective Optimization in Satellite-Assisted UAVs

Nowadays, Vehicular communication is used in intelligent transmission applications. The number of vehicles used in a particular region has numerously increased energy consumption, computation delay, and computation overhead. In this paper, Multi-Objective Optimization in Satellite Assisted UAVs (MO-SAUVs) is proposed under an improved Ant Colony Optimization (IACO) algorithm. The procedures that are considered for the process of MO are optimal logistics distribution, path prediction-based pheromone deposition, and evaporation. Using this method, effective region selection for the UAVs is performed which leads to improving the network energy efficiency by decreasing energy consumption and delay. The simulation is performed in NS2 and the proposed MO-SAUAVs method is compared with the TA-SAUAVs method and PL-SAUAVs method according to different parameters. The results show that the proposed MO-SAUAVs method achieves lower computation delay (70ms to 110ms), higher energy efficiency (6% to 16%), lower energy consumption (7% to 14%), and packets lower computation overhead (500 packets to 700) when we were compared with TA-SAUAVs and PL-SAUAVs.
Mohammed Ahmed Jubair, Shaima Miqdad Mohamed Najeeb, Kifaa Hadi Thanoon et al.
visibility 2453
download 3199
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160115

A New Descriptor Based on Machine Learning for Intrusion Detection in Wireless Sensor Networks WNSs

Wireless sensor networks have become a vital component of the infrastructure for many modern applications. With the increasing use of wireless sensor networks, the challenges facing these networks in the field of security are escalating and growing, and with the rapid advancement of wireless communication technology, these networks are exposed to increasing, complex and continuous threats. Our research is characterized by innovation in the field of security technology to enhance protection, repel attacks and detect intrusions, among these innovations are intrusion detection systems based on machine learning as a creative and new solution. In this research, we highlight the effectiveness of different machine learning algorithms, such as supervised and unsupervised learning, in detecting anomalies and intrusions within wireless sensor networks, as our goal focuses on enhancing the security of wireless sensor networks (WSNs) by adopting intrusion detection systems (IDS) based on machine learning techniques. In this context, with a focus on using the WSN-DS dataset. The results of this research showed that machine-learning models could improve the security efficiency of wireless sensor networks by achieving accuracy ranging from 91% to 99.7% and testing time ranging from 0.006 to 0.1249, which enhances the ability to effectively retrieve and detect threats in real time.
Esraa Saleh Alomari, Oday Ali Hassen, Wisam Makki Salim et al.
visibility 2390
download 3176
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160114

Improving Non-Dominated Sorting Genetic Algorithm for IOT Service Composition Considering National Energy Consumption and User Experience

This paper proposes an enhanced Non-Dominated Sorting Genetic Algorithm -II algorithm to optimize IoT service composition by incorporating national energy consumption requirements and user experience, areas often overlooked in traditional models that primarily focus on time, cost, and quality. The original NSGA-II algorithm is prone to premature convergence and local optima issues during population iteration. To address these limitations, we introduce a novel evaluation model and improve the elite retention strategy of the NSGA-II algorithm. The improved algorithm balances exploration and exploitation through dynamic crowding distance adjustment and adaptive selection pressure, enhancing diversity and avoiding local optima. Experimental results demonstrate that the I-NSGA algorithm not only reduces running time by 5.916% but also achieves a smoother Pareto surface, indicating a more optimal distribution of solutions. The novelty of this approach lies in its comprehensive inclusion of energy consumption and user experience, the timeliness in addressing emerging IoT optimization challenges, and the relevance to current IoT service composition needs.  This validates the effectiveness and advancement of the proposed model and algorithm, providing a robust and efficient solution for IoT service composition optimization.
M. Bheemalingaiah, G. Sreenivasulu, L. Venkateswa Reddy et al.
visibility 2080
download 2763
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160113

Human to Chatbot Text Classification Using Multi-Source AI Chatbots and Machine Learning Models

The fast growth of artificial intelligence technologies, especially language processing technology has obscured the lines in between human-generated text comparing to chatbot-generated message.  Recognizing which generated such, a text is essential for applications like information generating and manipulated text in order to guarantee authenticity between communicated parties. This research applies to a set of machine learning models to identify text as either human-written or chatbot-generated. The methodology of this research starts with a dataset including text generated from different Large Language Models (LLMs) along with a text generated by a human.  After that, Tf-Idf ranking vectorization was used to define word embedding has and represent the text numerically. Then, different Machine Learning (ML) models leveraged recognize whether a human or a chatbot generated a text. The ML models applied include Logistic Regression, Random Forest, Decision Tree, Gradient Boosting, Naïve Bayes, and XGBoost.  For this study accuracy, precision, recall, F1-score were used to evaluate the system. The dataset first was split into 80% for training and 20% for testing. Out of all implemented models, the Random Forest model reported the best with accuracy of 88%. Logistic Regression reported a close accuracy of 85%. The Random Forest model showed an 8% improvement compared to previous studies that reported an accuracy of 80%. Confusion matrices revealed that the Random Forest model provided high precision and recall, minimizing classification misleading of human or chatbot text. The research focused on studying the ability of ML models in identifying human vs. chatbot-generated text. The results showed the RF model was the best among other models with 88% accuracy. This accuracy shows a possible usage of such models in real-world applications that requires the confidentiality of human writing.
Mohammed Salah Ibrahim, Jabbar Abed Eleiwy, Hassan Mohamed Muhi-Aldeen et al.
visibility 2576
download 3847
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160112

Efficient CH selection for Traffic Congestion Reduction and To Improve Network Connectivity in Vehicular Adhoc Networks

Vehicular ad hoc network (VANET) is an innovative technology that has attracted many researchers and the industrial sector. The increase in vehicle movement and the requirement for effective traffic management systems have resulted in the development of VANETs. The Super Cluster Head based Efficient Traffic Control (SCHETF) model aims to alleviate traffic congestion and decrease energy consumption in VANETs through a novel integration of Cluster Head (CH) election, cluster gateway formation, and effective data transmission. SCHETF utilizes a parameter-driven CH election process that considers factors such as network connectivity, distance, speed, and trust levels. This approach guarantees the most suitable CH selection, reducing energy expenditure while enhancing network efficiency. The model assesses network connectivity through indicators like traffic flow and lane weights, ensuring precise determination of link reliability. Metrics for distance and speed are normalized to evaluate the changing behavior of vehicles, while trust ratings are given based on historical and community information to improve reliability. The creation of cluster gateways reduces unnecessary cluster formations by implementing Cluster Gateway Creation (CGC) at strategic sites, lessening communication load, and boosting cluster stability. Efficient data transmission is accomplished by appointing several Cluster Gateway (CGW) within clusters. A backoff timer mechanism gives priority to the CGW that is farthest from the CH for message forwarding, avoiding unnecessary repetitions and guaranteeing effective message dispatch. The model is smart clustering and gateway strategies lessen signaling load during handovers and enhance resource management in dynamic vehicular settings. The SCHETF model offers a thorough framework for tackling the challenges faced by VANETs, providing scalable and energy-efficient communication options. This improves data distribution, assures dependable connectivity, and plays a crucial role in the progress of intelligent transportation systems. The model has been put into practice through experimentation in Network Simulator 2 (NS2). The parameters considered in this study encompass energy efficiency, throughput, packet delivery ratio, end-to-end delay, packet loss, and routing overhead. To undertake a comparison study, the developed SCHETF findings are compared to older approaches such as Evolutionary Algorithm-based Vehicular Clustering Technique (EAVCT), Region Collaborative Management for Dynamic Clustering (RCMDC), and Novel Hypergraph Clustering Model (NHGCM). The outcomes indicate that the suggested SCHETF strategy outperforms previous methods.
Mohammed I. Khalaf, Ahmed Jamal Ahmed, Hazim Noman Abed et al.
visibility 2098
download 3032
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160111

Implement Intelligent YOLOv8 for Car Crowd Detection and Counting in the Roads

Car crowd management refers to the process of efficiently and safely managing the movement and flow of cars in crowded areas, such as parking lots, traffic intersections, event venues, and busy streets. Effective car crowd management is essential to ensure smooth traffic flow, prevent accidents, reduce congestion, and optimize the utilization of available parking spaces. It is a critical aspect of urban planning and traffic management to enhance the overall transportation experience and safety for both drivers and pedestrians. Deep learning methods are used to create an artificial system that is shown in this study. Proposed in detecting cars in streets and traffic intersections, in addition to determining the quantity of cars based on the YOLOv8 algorithm. Where the proposed system was trained on three types of datasets for the purpose of testing the algorithm used to determine the number of cars in each direction of the traffic intersection and then give priority to the most crowded direction with cars and then less and less. Where the system reached a high accuracy in detecting cars, reaching 98%, and through it conclude that the YOLOv8 algorithm used was suitable to be employed in solving the problem of determining the priority of traffic by identifying places of congestion with high accuracy.
Noor Abdul Khaleq Zghair, Rand A. Atta, Hussein M. Hasan et al.
visibility 2106
download 4948
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160110

Robust Zero-Day Attack Detection with Optimal Deep Learning for Securing Internet of Things Environment

The Internet of Things (IoT) aims to provide connectivity between all computing entities. However, this facilitates cyberthreats, which exploits the existence of vulnerability over a period. The zero-day threat is one of the vulnerabilities that can result in zero-day attacks that are destructive to the network security and an enterprise. This attack may have potentially compromised critical infrastructure, far-reaching consequences, national security, and even personal privacy. To alleviate the risks, organizations and manufacturers should prioritize proactive security measures, involving robust authentication mechanisms, ongoing monitoring, and timely software updates, to defend the IoT ecosystem from emerging threats. In present scenario, deep learning (DL)-based models have improved robustness in learning data giving it an improved capability to identify unknown information, since it can able to extract knowledge of non-linear data to identify unknown information. The study presents a Robust Zero-Day Attack Detection with Optimal Deep Learning (RZDAD-ODL) technique for the IoT framework. The primary intention of the RZDAD-ODL model lies in the automatic and effectual detection of zero-day attacks in the IoT framework. In the presented RZDAD-ODL technique, the honey badger algorithm (HBA) can be used for the optimum range of the features. Besides, the RZDAD-ODL technique exploits the conditional variational autoencoder (CVAE) model for attack detection and its parameter tuning process can be performed by using a rider optimization algorithm (ROA). The experimentation results of the RZDAD-ODL system can be validated on a benchmark dataset. Extensive comparison studies reported the better attack detection performance of the RZDAD-ODL model over other current techniques.
Nahla J. Abid, Nawaf Alhebaishi, Turki Althaqafi
visibility 2649
download 4020
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160109

Multi-Dimensional Trust based Data Dissemination mechanism (MDTD) for Ensuring Authentication by Eliminating Blackhole Attack in VANET

Vehicular Ad Hoc Networks also known as VANET, and it is a special type of ad hoc networks since it is deployed on demand.  Here the nodes are representing as vehicles, and they are communicating with each other to ensure the reliable and secure safety driving. Since it is open environment, ensuring secure routing is always a challenging task. Routing is one of the essential things in ad hoc networks because it is carrying road safety information always. However, most of the time, it is affected by attacks. Black hole is one of the attacks where the malicious nodes that is black hole vehicles advertise itself that having the shortest path to the destination by the way it tries to disturb the entire environment. In this paper, multi-dimensional trust-based data dissemination mechanism is proposed. The main objective is to ensure authentication by eliminating black hole attack. The proposed method makes use of multiple trusts such as direct, indirect, integrity, intimacy, and mobility over Dynamic Source Routing (DSR) protocol by the way authentication can be achieved. Simulation results shows that the proposed model works efficiently compare with existing models.
C. Balakumar, S. Vydehi
visibility 1996
download 2581
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160108

Enhanced Feature Selection Approach using Artificial Hummingbirds with Genetic Algorithm

Feature selection (FS) is a crucial preprocessing step in data mining to eliminate redundant or irrelevant features from high-dimensional data. Many optimization algorithms for FS often lack balance in their search processes. This paper proposes a hybrid algorithm, the Artificial Hummingbird Algorithm based on the Genetic Algorithm (AHA-GA), to address this imbalance and solve the FS problem. The main goal of AHA-GA is to select the most crucial characteristics to improve overall model categorization. The UCI datasets are used to assess the performance of the proposed FS method. The proposed feature selection algorithm was compared with five feature selection optimization algorithms: BWOAHHO, HSGW, WOA-CM, BDA-SA, and ASGW. AHA-GA achieved a classification accuracy of 96% across 18 datasets, which was higher than BWOAHHO (93.2%), HSGW (92.5%), WOA-CM (94.4%), BDA-SA (93%), and ASGW (91.6%). When comparing the proposed AHA-GA algorithm to the results obtained by the other five algorithms in terms of selected attribute size, the average feature sizes were as follows: AHA-GA (15.10889), BWOAHHO (16.74222), HSGW (19.43111), WOA-CM (17.05389), BDA-SA (17.275), and ASGW (19.7585). The statistical and experimental tests demonstrated that the proposed AHA-GA performs better than competitive algorithms in selecting effective features.
Ismael Salih Aref, Dheyab Salman Ibrahim, Bashar Talib Al-Nuaimi
visibility 2298
download 3440
Full Length Article DOI: https://doi.org/10.54216/JISIoT.160107

Leveraging Variational Autoencoder with Hippopotamus Optimizer-Based Dimensionality Reduction Model for Attention Deficit Hyperactivity Disorder Diagnosis Data

Adverse Drug Reactions (ADRs) are very hazardous to patients. Thus, the detection of ADR intends to automatically distinguish, which is an intensive study for public health monitoring functions.  Detecting ADRs is the most significant information to determine the patient’s opinion on some drugs. As patients can experience projected and occasionally unpredicted negative results from taking some drugs, late detection of ADRs may place life-threatening dangers to patients; posing significant financial, social, and legal consequences to the regulatory agencies and manufacturing companies. The usage of medical data, like states and electronic health records (EHR), became normal in offering a richer understanding of health services and assisting ADR analysis. Developments in deep learning (DL) and machine learning (ML) have made several analytic models have the potential to apply higher-dimensional data to predict adverse effects. In this study, we present a Hippopotamus Optimizer-Based Feature Selection for Adverse Drug Reaction Detection Using a Variational Autoencoder (HOFS-ADRDVAE) model. The main intention of the HOFS-ADRDVAE model is to provide an automatic system for the detection of ADR using state-of-the-art techniques. Initially, the data normalization stage employs min-max normalization for converting input data into a beneficial format. In addition, the feature selection process has been executed by the hippopotamus optimization (HO) algorithm. Besides, the proposed HOFS-ADRDVAE model designs a variational autoencoder (VAE) technique for the classification procedure. At last, the Hunger Games search (HGS) algorithm-based hyperparameter selection process is executed to optimize the classification results of the VAE system. A wide-ranging experiment was implemented to point out the performance of the HOFS-ADRDVAE method. The experimental outcomes specified that the HOFS-ADRDVAE model emphasized improvement over another existing method.
N. Deepaletchumi, R. Mala
visibility 2439
download 2788