A mechanism to effectively detect malicious traffic in the present context where new cyber criminals and threatening actors are emerging every day, has become a compelling need. These invaders use ...overwhelming tactics that mask the nature of attacks and make bad acts seem innocuous. A growing number of trustworthy electronic systems and facilities have been introduced with the fast development of pervasive digital technologies. However threats to cyber-security continue to grow, posing hindrance in the efficient use of digital services. The detection and classification of malicious traffic due to security threats can be done by an efficacious traffic detection approach. The development of a smart, precise malicious traffic detection system has therefore become a subject of extensive research. Current traffic detection systems are typically employed in conventional network traffic detection. These systems sometimes face failure and cannot recognize many known or modern security threats. This is because they rely on conventional algorithms which focus less on precise selection and classification of functions. As a result, several well-known traffic signatures remain unidentified and latent. Hence, there is a need to evaluate each significant malicious traffic detection system based on the performance of the system. In this research work, the author has used the Fuzzy AHP methodology which is designed to address the issues related to the vagueness, uncertainties and total awareness of languages. In addition, the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) was implemented in order to assess the order of preference. Furthermore, the Multi-Criteria Decision-Making (MCDM) method was used for classifying the impact of the alternatives according to their overall performance. The study's conclusive evaluations will be a corroborative reference for the practitioners working in the domain of assessing and selecting the most effective traffic detection approach for more reliable, efficient and systematic design.
Deep Learning (DL) algorithms enabled computational models consist of multiple processing layers that represent data with multiple levels of abstraction. In recent years, usage of deep learning is ...rapidly proliferating in almost every domain, especially in medical image processing, medical image analysis, and bioinformatics. Consequently, deep learning has dramatically changed and improved the means of recognition, prediction, and diagnosis effectively in numerous areas of healthcare such as pathology, brain tumor, lung cancer, abdomen, cardiac, and retina. Considering the wide range of applications of deep learning, the objective of this article is to review major deep learning concepts pertinent to brain tumor analysis (e.g., segmentation, classification, prediction, evaluation.). A review conducted by summarizing a large number of scientific contributions to the field (i.e., deep learning in brain tumor analysis) is presented in this study. A coherent taxonomy of research landscape from the literature has also been mapped, and the major aspects of this emerging field have been discussed and analyzed. A critical discussion section to show the limitations of deep learning techniques has been included at the end to elaborate open research challenges and directions for future work in this emergent area.
Potato leaf disease detection in an early stage is challenging because of variations in crop species, crop diseases symptoms and environmental factors. These factors make it difficult to detect ...potato leaf diseases in the early stage. Various machine learning techniques have been developed to detect potato leaf diseases. However, the existing methods cannot detect crop species and crop diseases in general because these models are trained and tested on images of plant leaves of a specific region. In this research, a multi-level deep learning model for potato leaf disease recognition has developed. At the first level, it extracts the potato leaves from the potato plant image using the YOLOv5 image segmentation technique. At the second level, a novel deep learning technique has been developed using a convolutional neural network to detect the early blight and late blight potato diseases from potato leaf images. The proposed potato leaf disease detection model was trained and tested on a potato leaf disease dataset. The potato leaf disease dataset contains 4062 images collected from the Central Punjab region of Pakistan. The proposed deep learning technique achieved 99.75% accuracy on the potato leaf disease dataset. The performance of the proposed techniques was also evaluated on the PlantVillage dataset. The proposed technique is also compared with the state-of-the-art models and achieved significantly concerning the accuracy and computational cost.
The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks. Network attacks refer to all types of ...unauthorized access to a network including any attempts to damage and disrupt the network, often leading to serious consequences. Network attack detection is an active area of research in the community of cybersecurity. In the literature, there are various descriptions of network attack detection systems involving various intelligent-based techniques including machine learning (ML) and deep learning (DL) models. However, although such techniques have proved useful within specific domains, no technique has proved useful in mitigating all kinds of network attacks. This is because some intelligent-based approaches lack essential capabilities that render them reliable systems that are able to confront different types of network attacks. This was the main motivation behind this research, which evaluates contemporary intelligent-based research directions to address the gap that still exists in the field. The main components of any intelligent-based system are the training datasets, the algorithms, and the evaluation metrics; these were the main benchmark criteria used to assess the intelligent-based systems included in this research article. This research provides a rich source of references for scholars seeking to determine their scope of research in this field. Furthermore, although the paper does present a set of suggestions about future inductive directions, it leaves the reader free to derive additional insights about how to develop intelligent-based systems to counter current and future network attacks.
The purpose of this research was to provide a “systematic literature review” of knee bone reports that are obtained by MRI, CT scans, and X-rays by using deep learning and machine learning techniques ...by comparing different approaches—to perform a comprehensive study on the deep learning and machine learning methodologies to diagnose knee bone diseases by detecting symptoms from X-ray, CT scan, and MRI images. This study will help those researchers who want to conduct research in the knee bone field. A comparative systematic literature review was conducted for the accomplishment of our work. A total of 32 papers were reviewed in this research. Six papers consist of X-rays of knee bone with deep learning methodologies, five papers cover the MRI of knee bone using deep learning approaches, and another five papers cover CT scans of knee bone with deep learning techniques. Another 16 papers cover the machine learning techniques for evaluating CT scans, X-rays, and MRIs of knee bone. This research compares the deep learning methodologies for CT scan, MRI, and X-ray reports on knee bone, comparing the accuracy of each technique, which can be used for future development. In the future, this research will be enhanced by comparing X-ray, CT-scan, and MRI reports of knee bone with information retrieval and big data techniques. The results show that deep learning techniques are best for X-ray, MRI, and CT scan images of the knee bone to diagnose diseases.
In the past, many image encryption schemes have been developed through the swapping operations at the different levels of granularity. These levels span bits, Deoxyribonucleic acid (DNA) molecules, ...pixels, blocks of pixels. In this study, a new scheme for the encryption of color images based on the DNA strands level scrambling (DNASLS) and chaotic system has been proposed. After a color image is input, it is decomposed into the red, green and blue components. After it, these components are merged to form a big single image. Intertwining logistic map (ILM) has been used for the random data which generates three streams of random numbers. These streams have been further manipulated in such a way that nine streams are spawned out of them. One stream out of these nine streams has been used for the generation of a key image. Two streams have been used to DNA-encode the big single image and the key image. Afterwards, the strands of DNA-encoded single image are swapped with each other. Four streams determine the addresses of two DNA encoded pixels for the selection. A yet another stream is being used to select a particular strand from the DNA strands. To create the diffusion effects, an XOR operation has been done between the DNA encoded image after the swapping of strands and the DNA encoded key image. Finally, the last and ninth stream has been used to decode the DNA-encoded pixels into the decimal form. Purely random numbers with no inter-dependence have been employed in the entire encryption process. The effects of plaintext sensitivity have been achieved through the incorporation of Secure Hash Algorithm-256 or SHA-256 hash codes. In the end, the experiment and the security analysis have been performed. The results of the validation metrics like information entropy(7.9973), average key sensitivity(99.61%) and mean absolute error(84.7158) demonstrate the security, defiance to the number of attacks and a potential for real world application of the proposed image cipher.
Automation in agriculture nowadays is the main focus and area of development for various countries. The population rate of the world is increasing rapidly and will be double in upcoming decades and ...the need of food is also increasing accordingly. To meet this rapid growth in demand, agriculture automation is the best solution. Traditional strategies employed by farmers are not efficient enough to fulfill the rising demand. Improper use of nutrients, water, fertilizers and pesticides disturbs the agricultural growth and the land remains barren with no fertility. This research paper presents different control strategies used to automate agriculture such as: IoT, aerial imagery, multispectral, hyperspectral, NIR, thermal camera, RGB camera, machine learning, and artificial intelligence techniques. Problems in agriculture like plant diseases, pesticide control, weed management, irrigation and water management can easily be solved by different automated and control techniques mentioned above. Automation by advance control strategies of agricultural methods have verified to increase the crops yield and also the soil fertility become strong. This research paper reviews and observe the work of different researchers to present a brief summary about the trends in smart agriculture and also provides the work flow and revenue of smart agriculture system in <xref rid="fig15" ref-type="fig">figure 15 using technologies verified by researchers in their research papers.
In artificial intelligence, deep learning (DL) is a process that replicates the working mechanism of the human brain in data processing, and it also creates patterns for decision making. Deep ...learning or neural networks have been deployed in several fields, such as computer vision, natural language processing, and speech recognition. It has been used in many healthcare applications for the diagnosis and treatment of many chronic diseases. These algorithms have the power to avoid outbreaks of illness, recognize and diagnose illnesses, minimize running expenses for hospital management and patients. This paper discusses the deep learning methods used in different healthcare fields, i.e., identifying depression, heart diseases, physiological signals, lymph node metastases from breast cancer, etc. These diseases are categorized into the central nervous system, cardiovascular system, and respiratory system. For each category, after summarizing the studies, comparison tables are laid down using some important factors. Different applications, tools, methods, and data sets used for DL models are leveraged. Finally, research opportunities and challenges being faced for deep learning models are discussed.
The rapid advancement of deepfake technology poses an escalating threat of misinformation and fraud enabled by manipulated media. Despite the risks, a comprehensive understanding of deepfake ...detection techniques has not materialized. This research tackles this knowledge gap by providing an up-to-date systematic survey of the digital forensic methods used to detect deepfakes. A rigorous methodology is followed, consolidating findings from recent publications on deepfake detection innovation. Prevalent datasets that underpin new techniques are analyzed. The effectiveness and limitations of established and emerging detection approaches across modalities including image, video, text and audio are evaluated. Insights into real-world performance are shared through case studies of high-profile deepfake incidents. Current research limitations around aspects like cross-modality detection are highlighted to inform future work. This timely survey furnishes researchers, practitioners and policymakers with a holistic overview of the state-of-the-art in deepfake detection. It concludes that continuous innovation is imperative to counter the rapidly evolving technological landscape enabling deepfakes.