scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Access in 2022"


Journal ArticleDOI
TL;DR: In this article , the authors divide the concepts and essential techniques necessary for realizing the Metaverse into three components (i.e., hardware, software, and contents) rather than marketing or hardware approach to conduct a comprehensive analysis.
Abstract: Unlike previous studies on the Metaverse based on Second Life, the current Metaverse is based on the social value of Generation Z that online and offline selves are not different. With the technological development of deep learning-based high-precision recognition models and natural generation models, Metaverse is being strengthened with various factors, from mobile-based always-on access to connectivity with reality using virtual currency. The integration of enhanced social activities and neural-net methods requires a new definition of Metaverse suitable for the present, different from the previous Metaverse. This paper divides the concepts and essential techniques necessary for realizing the Metaverse into three components (i.e., hardware, software, and contents) and three approaches (i.e., user interaction, implementation, and application) rather than marketing or hardware approach to conduct a comprehensive analysis. Furthermore, we describe essential methods based on three components and techniques to Metaverse’s representative Ready Player One, Roblox, and Facebook research in the domain of films, games, and studies. Finally, we summarize the limitations and directions for implementing the immersive Metaverse as social influences, constraints, and open challenges.

313 citations


Journal ArticleDOI
TL;DR: This paper divides the concepts and essential techniques necessary for realizing the Metaverse into three components (i.e., hardware, software, and contents) and three approaches and describes essential methods based on three components and techniques to Metaverse’s representative Ready Player One, Roblox, and Facebook research in the domain of films, games, and studies.
Abstract: Unlike previous studies on the Metaverse based on Second Life, the current Metaverse is based on the social value of Generation Z that online and offline selves are not different. With the technological development of deep learning-based high-precision recognition models and natural generation models, Metaverse is being strengthened with various factors, from mobile-based always-on access to connectivity with reality using virtual currency. The integration of enhanced social activities and neural-net methods requires a new definition of Metaverse suitable for the present, different from the previous Metaverse. This paper divides the concepts and essential techniques necessary for realizing the Metaverse into three components (i.e., hardware, software, and contents) and three approaches (i.e., user interaction, implementation, and application) rather than marketing or hardware approach to conduct a comprehensive analysis. Furthermore, we describe essential methods based on three components and techniques to Metaverse’s representative Ready Player One, Roblox, and Facebook research in the domain of films, games, and studies. Finally, we summarize the limitations and directions for implementing the immersive Metaverse as social influences, constraints, and open challenges.

241 citations


Journal ArticleDOI
TL;DR: Oy et al. as discussed by the authors proposed a new bio-inspired and population-based optimization algorithm named Ebola Optimization Search Algorithm (EOSA) based on the propagation mechanism of the Ebola virus disease.
Abstract: Nature computing has evolved with exciting performance to solve complex real-world combinatorial optimization problems. These problems span across engineering, medical sciences, and sciences generally. The Ebola virus has a propagation strategy that allows individuals in a population to move among susceptible, infected, quarantined, hospitalized, recovered, and dead sub-population groups. Motivated by the effectiveness of this strategy of propagation of the disease, a new bio-inspired and population-based optimization algorithm is proposed. This study presents a novel metaheuristic algorithm named Ebola Optimization Search Algorithm (EOSA) based on the propagation mechanism of the Ebola virus disease. First, we designed an improved SIR model of the disease, namely SEIR-HVQD: Susceptible (S), Exposed (E), Infected (I), Recovered (R), Hospitalized (H), Vaccinated (V), Quarantine (Q), and Death or Dead (D). Secondly, we represented the new model using a mathematical model based on a system of first-order differential equations. A combination of the propagation and mathematical models was adapted for developing the new metaheuristic algorithm. To evaluate the performance and capability of the proposed method in comparison with other optimization methods, two sets of benchmark functions consisting of forty-seven (47) classical and thirty (30) constrained IEEE-CEC benchmark functions were investigated. The results indicate that the performance of the proposed algorithm is competitive with other state-of-the-art optimization methods based on scalability, convergence, and sensitivity analyses. Extensive simulation results show that the EOSA outperforms popular metaheuristic algorithms such as the Particle Swarm Optimization Algorithm (PSO), Genetic Algorithm (GA), and Artificial Bee Colony Algorithm (ABC). Also, the algorithm was applied to address the complex problem of selecting the best combination of convolutional neural network (CNN) hyperparameters in the image classification of digital mammography. Results obtained showed the optimized CNN architecture successfully detected breast cancer from digital images at an accuracy of 96.0%. The source code of EOSA is publicly available at https://github.com/NathanielOy/EOSA_Metaheuristic .

186 citations


Journal ArticleDOI
TL;DR: A cascaded ensembled network that uses an integration of ConvNet and handcrafted features based multi-layer perceptron is proposed in this work and it is demonstrated that accuracy of ensembleled deep learning model is improved to 98.3% from 85.3%.
Abstract: Skin cancer is caused due to unusual development of skin cells and deadly type cancer. Early diagnosis is very significant and can avoid some categories of skin cancers, such as melanoma and focal cell carcinoma. The recognition and the classification of skin malignant growth in the beginning time is expensive and challenging. The deep learning architectures such as recurrent networks and convolutional neural networks (ConvNets) are developed in the past, which are proven appropriate for non-handcrafted extraction of complex features. To additional expand the efficiency of the ConvNet models, a cascaded ensembled network that uses an integration of ConvNet and handcrafted features based multi-layer perceptron is proposed in this work. This offered model utilizes the convolutional neural network model to mine non-handcrafted image features and colour moments and texture features as handcrafted features. It is demonstrated that accuracy of ensembled deep learning model is improved to 98.3% from 85.3% of convolutional neural network model.

129 citations


Journal ArticleDOI
TL;DR: Particle swarm optimization (PSO) is one of the most well-regarded swarm-based algorithms in the literature as mentioned in this paper , and many researchers have been modifying it resulting in a large number of PSO variants with either slightly or significantly better performance.
Abstract: Particle swarm optimization (PSO) is one of the most well-regarded swarm-based algorithms in the literature. Although the original PSO has shown good optimization performance, it still severely suffers from premature convergence. As a result, many researchers have been modifying it resulting in a large number of PSO variants with either slightly or significantly better performance. Mainly, the standard PSO has been modified by four main strategies: modification of the PSO controlling parameters, hybridizing PSO with other well-known meta-heuristic algorithms such as genetic algorithm (GA) and differential evolution (DE), cooperation and multi-swarm techniques. This paper attempts to provide a comprehensive review of PSO, including the basic concepts of PSO, binary PSO, neighborhood topologies in PSO, recent and historical PSO variants, remarkable engineering applications of PSO, and its drawbacks. Moreover, this paper reviews recent studies that utilize PSO to solve feature selection problems. Finally, eight potential research directions that can help researchers further enhance the performance of PSO are provided.

99 citations


Journal ArticleDOI
TL;DR: This paper attempts to provide a comprehensive review ofPSO, including the basic concepts of PSO, binary PSO , neighborhood topologies in PSO), recent and historical PSO variants, remarkable engineering applications of PSo, and its drawbacks.
Abstract: Particle swarm optimization (PSO) is one of the most well-regarded swarm-based algorithms in the literature. Although the original PSO has shown good optimization performance, it still severely suffers from premature convergence. As a result, many researchers have been modifying it resulting in a large number of PSO variants with either slightly or significantly better performance. Mainly, the standard PSO has been modified by four main strategies: modification of the PSO controlling parameters, hybridizing PSO with other well-known meta-heuristic algorithms such as genetic algorithm (GA) and differential evolution (DE), cooperation and multi-swarm techniques. This paper attempts to provide a comprehensive review of PSO, including the basic concepts of PSO, binary PSO, neighborhood topologies in PSO, recent and historical PSO variants, remarkable engineering applications of PSO, and its drawbacks. Moreover, this paper reviews recent studies that utilize PSO to solve feature selection problems. Finally, eight potential research directions that can help researchers further enhance the performance of PSO are provided.

84 citations


Journal ArticleDOI
TL;DR: In this article , the authors present a holistic vision of the transition towards a net-negative greenhouse gas emissions economy that can limit global warming to 1.5°C with a clearly defined carbon budget in a sustainable and cost-effective manner based on 100% renewable energy-industry-CDR systems.
Abstract: Research on 100% renewable energy systems is a relatively recent phenomenon. It was initiated in the mid-1970s, catalyzed by skyrocketing oil prices. Since the mid-2000s, it has quickly evolved into a prominent research field encompassing an expansive and growing number of research groups and organizations across the world. The main conclusion of most of these studies is that 100% renewables is feasible worldwide at low cost. Advanced concepts and methods now enable the field to chart realistic as well as cost- or resource-optimized and efficient transition pathways to a future without the use of fossil fuels. Such proposed pathways in turn, have helped spur 100% renewable energy policy targets and actions, leading to more research. In most transition pathways, solar energy and wind power increasingly emerge as the central pillars of a sustainable energy system combined with energy efficiency measures. Cost-optimization modeling and greater resource availability tend to lead to higher solar photovoltaic shares, while emphasis on energy supply diversification tends to point to higher wind power contributions. Recent research has focused on the challenges and opportunities regarding grid congestion, energy storage, sector coupling, electrification of transport and industry implying power-to-X and hydrogen-to-X, and the inclusion of natural and technical carbon dioxide removal (CDR) approaches. The result is a holistic vision of the transition towards a net-negative greenhouse gas emissions economy that can limit global warming to 1.5°C with a clearly defined carbon budget in a sustainable and cost-effective manner based on 100% renewable energy-industry-CDR systems. Initially, the field encountered very strong skepticism. Therefore, this paper also includes a response to major critiques against 100% renewable energy systems, and also discusses the institutional inertia that hampers adoption by the International Energy Agency and the Intergovernmental Panel on Climate Change, as well as possible negative connections to community acceptance and energy justice. We conclude by discussing how this emergent research field can further progress to the benefit of society.

78 citations


Journal ArticleDOI
TL;DR: A model using a fused machine learning approach for diabetes prediction based on the patient’s real-time medical record has a prediction accuracy of 94.87, which is higher than the previously published methods.
Abstract: In the medical field, it is essential to predict diseases early to prevent them. Diabetes is one of the most dangerous diseases all over the world. In modern lifestyles, sugar and fat are typically present in our dietary habits, which have increased the risk of diabetes. To predict the disease, it is extremely important to understand its symptoms. Currently, machine-learning (ML) algorithms are valuable for disease detection. This article presents a model using a fused machine learning approach for diabetes prediction. The conceptual framework consists of two types of models: Support Vector Machine (SVM) and Artificial Neural Network (ANN) models. These models analyze the dataset to determine whether a diabetes diagnosis is positive or negative. The dataset used in this research is divided into training data and testing data with a ratio of 70:30 respectively. The output of these models becomes the input membership function for the fuzzy model, whereas the fuzzy logic finally determines whether a diabetes diagnosis is positive or negative. A cloud storage system stores the fused models for future use. Based on the patient’s real-time medical record, the fused model predicts whether the patient is diabetic or not. The proposed fused ML model has a prediction accuracy of 94.87, which is higher than the previously published methods.

76 citations


Journal ArticleDOI
TL;DR: In this paper , the authors proposed a new metaheuristic optimization algorithm based on ancient war strategy, which is based on the strategic movement of army troops during the war and modeled the war strategy as an optimization process wherein each soldier dynamically moves towards the optimum value.
Abstract: This paper proposes a new metaheuristic optimization algorithm based on ancient war strategy. The proposed War Strategy Optimization (WSO) is based on the strategic movement of army troops during the war. War strategy is modeled as an optimization process wherein each soldier dynamically moves towards the optimum value. The proposed algorithm models two popular war strategies, attack and defense strategies. The positions of soldiers on the battlefield are updated in accordance with the strategy implemented. To improve the algorithm’s convergence and robustness, a novel weight updating mechanism and a weak soldier’s relocation strategy are introduced. The proposed war strategy algorithm achieves good balance of the exploration and exploitation stages. A detailed mathematical model of the algorithm is presented. The efficacy of the proposed algorithm is tested on 50 benchmark functions and four engineering problems. The performance of the algorithm is compared with ten popular metaheuristic algorithms. The experimental results for various optimization problems prove the superiority of the proposed algorithm.

71 citations


Journal ArticleDOI
TL;DR: This study presents a novel metaheuristic algorithm named Ebola Optimization Search Algorithm (EOSA) based on the propagation mechanism of the Ebola virus disease, which indicates that the performance of the proposed algorithm is competitive with other state-of-the-art optimization methods based on scalability, convergence, and sensitivity analyses.
Abstract: Nature computing has evolved with exciting performance to solve complex real-world combinatorial optimization problems. These problems span across engineering, medical sciences, and sciences generally. The Ebola virus has a propagation strategy that allows individuals in a population to move among susceptible, infected, quarantined, hospitalized, recovered, and dead sub-population groups. Motivated by the effectiveness of this strategy of propagation of the disease, a new bio-inspired and population-based optimization algorithm is proposed. This study presents a novel metaheuristic algorithm named Ebola Optimization Search Algorithm (EOSA) based on the propagation mechanism of the Ebola virus disease. First, we designed an improved SIR model of the disease, namely SEIR-HVQD: Susceptible (S), Exposed (E), Infected (I), Recovered (R), Hospitalized (H), Vaccinated (V), Quarantine (Q), and Death or Dead (D). Secondly, we represented the new model using a mathematical model based on a system of first-order differential equations. A combination of the propagation and mathematical models was adapted for developing the new metaheuristic algorithm. To evaluate the performance and capability of the proposed method in comparison with other optimization methods, two sets of benchmark functions consisting of forty-seven (47) classical and thirty (30) constrained IEEE-CEC benchmark functions were investigated. The results indicate that the performance of the proposed algorithm is competitive with other state-of-the-art optimization methods based on scalability, convergence, and sensitivity analyses. Extensive simulation results show that the EOSA outperforms popular metaheuristic algorithms such as the Particle Swarm Optimization Algorithm (PSO), Genetic Algorithm (GA), and Artificial Bee Colony Algorithm (ABC). Also, the algorithm was applied to address the complex problem of selecting the best combination of convolutional neural network (CNN) hyperparameters in the image classification of digital mammography. Results obtained showed the optimized CNN architecture successfully detected breast cancer from digital images at an accuracy of 96.0%. The source code of EOSA is publicly available at https://github.com/NathanielOy/EOSA_Metaheuristic.

64 citations


Journal ArticleDOI
TL;DR: In this paper , the authors provide an overview of recent techniques and technologies investigated in the literature, to implement high performance on-chip antennas for millimeter-wave (mmWave) and terahertz (THz) integrated-circuit (IC) applications.
Abstract: Antennas on-chip are a particular type of radiating elements valued for their small footprint. They are most commonly integrated in circuit boards to electromagnetically interface free space, which is necessary for wireless communications. Antennas on-chip radiate and receive electromagnetic (EM) energy as any conventional antennas, but what distinguishes them is their miniaturized size. This means they can be integrated inside electronic devices. Although on-chip antennas have a limited range, they are suitable for cell phones, tablet computers, headsets, global positioning system (GPS) devices, and WiFi and WLAN routers. Typically, on-chip antennas are handicapped by narrow bandwidth (less than 10%) and low radiation efficiency. This survey provides an overview of recent techniques and technologies investigated in the literature, to implement high performance on-chip antennas for millimeter-waves (mmWave) and terahertz (THz) integrated-circuit (IC) applications. The technologies discussed here include metamaterial (MTM), metasurface (MTS), and substrate integrated waveguides (SIW). The antenna designs described here are implemented on various substrate layers such as Silicon, Graphene, Polyimide, and GaAs to facilitate integration on ICs. Some of the antennas described here employ innovative excitation mechanisms, for example comprising open-circuited microstrip-line that is electromagnetically coupled to radiating elements through narrow dielectric slots. This excitation mechanism is shown to suppress surface wave propagation and reduce substrate loss. Other techniques described like SIW are shown to significantly attenuate surface waves and minimise loss. Radiation elements based on the MTM and MTS inspired technologies are shown to extend the effective aperture of the antenna without compromising the antenna’s form factor. Moreover, the on-chip antennas designed using the above technologies exhibit significantly improved impedance match, bandwidth, gain and radiation efficiency compared to previously used technologies. These features make such antennas a prime candidate for mmWave and THz on-chip integration. This review provides a thorough reference source for specialist antenna designers.

Journal ArticleDOI
TL;DR: A new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning.
Abstract: In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the dataset has been generated using a purpose-built IoT/IIoT testbed with a large representative set of devices, sensors, protocols and cloud/edge configurations. The IoT data are generated from various IoT devices (more than 10 types) such as Low-cost digital sensors for sensing temperature and humidity, Ultrasonic sensor, Water level detection sensor, pH Sensor Meter, Soil Moisture sensor, Heart Rate Sensor, Flame Sensor, etc.). Furthermore, we identify and analyze fourteen attacks related to IoT and IIoT connectivity protocols, which are categorized into five threats, including, DoS/DDoS attacks, Information gathering, Man in the middle attacks, Injection attacks, and Malware attacks. In addition, we extract features obtained from different sources, including alerts, system resources, logs, network traffic, and propose new 61 features with high correlations from 1176 found features. After processing and analyzing the proposed realistic cyber security dataset, we provide a primary exploratory data analysis and evaluate the performance of machine learning approaches (i.e., traditional machine learning as well as deep learning) in both centralized and federated learning modes. The Edge-IIoTset dataset can be publicly accessed from [1].

Journal ArticleDOI
TL;DR: In this article , the authors present a comprehensive review of EV off-board chargers that consist of ac-dc and dc-dc power stages from the power network to the EV battery.
Abstract: Wide-scale adoption and projected growth of electric vehicles (EVs) necessitate research and development of power electronic converters to achieve high power, low-cost, and reliable charging solutions for the EV battery. This paper presents a comprehensive review of EV off-board chargers that consist of ac-dc and dc-dc power stages from the power network to the EV battery. Although EV chargers are categorized into two types, namely, on-board and off-board chargers, it is essential to utilize off-board chargers for dc fast and ultra-fast charging so that volume and weight of EV can be reduced significantly. Here, we discuss the state-of-the-art topologies and control methods of both ac-dc and dc-dc power stages for off-board chargers, focusing on technical details, ongoing progress, and challenges. In addition, most of the recent multiport EV chargers integrating PV, energy storage, EV, and grid are presented. Moreover, comparative analysis has been carried out for the topologies and the control schemes of ac-dc rectifiers, dc-dc converters, and multiport converters in terms of architecture, power and voltage levels, efficiency, bidirectionality, control variables, advantages, and disadvantages which can be used as a guideline for future research directions in EV charging solutions.

Journal ArticleDOI
TL;DR: A highly accurate and computationally efficient model for the swift and accurate diagnosis of lung and colon cancers as an alternative to current cancer detection methods is proposed and has not only improved the overall accuracy from 89% to 98.4% but has also proved Computationally efficient.
Abstract: Cancer accounts for a huge mortality rate due to its aggressiveness, colossal potential of metastasis, and heterogeneity (causing resistance against chemotherapy). Lung and colon cancers are among the most prevalent types of cancer around the globe that can occur in both males and females. Early and accurate diagnosis of these cancers can substantially improve the quality of treatment as well as the survival rate of cancer patients. We propose a highly accurate and computationally efficient model for the swift and accurate diagnosis of lung and colon cancers as an alternative to current cancer detection methods. In this study, a large dataset of lung and colon histopathology images was employed for training and the validation process. The dataset is comprised of 25000 histopathology images of lung and colon tissues equally divided into 5 classes. A pretrained neural network (AlexNet) was tuned by modifying the four of its layers before training it on the dataset. Initial classification results were promising for all classes of images except for one class with an overall accuracy of 89%. To improve the overall accuracy and keep the model computationally efficient, instead of implementing image enhancement techniques on the entire dataset, the quality of images of the underperforming class was improved by applying a contrast enhancement technique which is fairly simple and efficient. The implementation of the proposed methodology has not only improved the overall accuracy from 89% to 98.4% but has also proved computationally efficient.

Journal ArticleDOI
TL;DR: In this article , a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning.
Abstract: In this paper, we propose a new comprehensive realistic cyber security dataset of IoT and IIoT applications, called Edge-IIoTset, which can be used by machine learning-based intrusion detection systems in two different modes, namely, centralized and federated learning. Specifically, the dataset has been generated using a purpose-built IoT/IIoT testbed with a large representative set of devices, sensors, protocols and cloud/edge configurations. The IoT data are generated from various IoT devices (more than 10 types) such as Low-cost digital sensors for sensing temperature and humidity, Ultrasonic sensor, Water level detection sensor, pH Sensor Meter, Soil Moisture sensor, Heart Rate Sensor, Flame Sensor, etc.). Furthermore, we identify and analyze fourteen attacks related to IoT and IIoT connectivity protocols, which are categorized into five threats, including, DoS/DDoS attacks, Information gathering, Man in the middle attacks, Injection attacks, and Malware attacks. In addition, we extract features obtained from different sources, including alerts, system resources, logs, network traffic, and propose new 61 features with high correlations from 1176 found features. After processing and analyzing the proposed realistic cyber security dataset, we provide a primary exploratory data analysis and evaluate the performance of machine learning approaches (i.e., traditional machine learning as well as deep learning) in both centralized and federated learning modes. The Edge-IIoTset dataset can be publicly accessed from http://ieee-dataport.org/8939 .

Journal ArticleDOI
TL;DR: In this article , the levelized cost of renewable energy (RWG) alternatives is investigated by using bipolar q-rung orthopair fuzzy (q-ROF) hybrid decision-making approach.
Abstract: Energy costs are the key factors regarding the selection of appropriate renewable energy (RWG) alternatives. All costs of a power plant, such as investment, operation, maintenance, and repair are considered in the scope of levelized costs. Therefore, for the effective determination of the selling price of the energy, levelized cost has a guiding role. Because the levelized costs of RWG alternatives develop the sustainable production and energy consumption for the long term, the leading indicators of these costs should be analyzed significantly. Accordingly, in this study, it is aimed to investigate the levelized cost of RWG alternatives by using bipolar q-rung orthopair fuzzy (q-ROF) hybrid decision-making approach. The novelty of this study is to recommend an integrated decision-making model based on bipolar and q-ROFSs with golden cut. At the first stage, bipolar q-ROF multi stepwise weight assessment ratio analysis (M-SWARA) is employed for weighting the selected criteria of levelized costs of RWG alternatives. At the following stage, bipolar q-ROF technique for order preference by similarity to ideal solution (TOPSIS) is considered to rank the alternatives in terms of the levelized cost performance. On the other side, vise kriterijumska optimizacija i kompromisno resenje (VIKOR) model is also considered to rank the alternatives. In addition to this issue, the sensitivity analysis is also performed with four cases comparatively. Hence, consistency, reliability and coherency of the proposed model can be measured. It is identified that capacity loss has the greatest importance regarding the levelized cost of RWG projects. Solar is found as the best clean energy type with respect to the levelized cost management performance. In this context, it would be appropriate for investors to design projects close to the center. This will contribute to increasing the efficiency and productivity of these projects.

Journal ArticleDOI
TL;DR: In this paper , the authors present a comprehensive review of EV off-board chargers that consist of ac-dc and dc-dc power stages from the power network to the EV battery.
Abstract: Wide-scale adoption and projected growth of electric vehicles (EVs) necessitate research and development of power electronic converters to achieve high power, low-cost, and reliable charging solutions for the EV battery. This paper presents a comprehensive review of EV off-board chargers that consist of ac-dc and dc-dc power stages from the power network to the EV battery. Although EV chargers are categorized into two types, namely, on-board and off-board chargers, it is essential to utilize off-board chargers for dc fast and ultra-fast charging so that volume and weight of EV can be reduced significantly. Here, we discuss the state-of-the-art topologies and control methods of both ac-dc and dc-dc power stages for off-board chargers, focusing on technical details, ongoing progress, and challenges. In addition, most of the recent multiport EV chargers integrating PV, energy storage, EV, and grid are presented. Moreover, comparative analysis has been carried out for the topologies and the control schemes of ac-dc rectifiers, dc-dc converters, and multiport converters in terms of architecture, power and voltage levels, efficiency, bidirectionality, control variables, advantages, and disadvantages which can be used as a guideline for future research directions in EV charging solutions.

Journal ArticleDOI
TL;DR: A systematic review of the security vulnerabilities in the Ethereum blockchain is presented and compared among the Ethereum smart contract analysis tools by considering various features to help the researchers to set the directions for future research in this domain.
Abstract: Blockchain is a revolutionary technology that enables users to communicate in a trust-less manner. It revolutionizes the modes of business between organizations without the need for a trusted third party. It is a distributed ledger technology based on a decentralized peer-to-peer (P2P) network. It enables users to store data globally on thousands of computers in an immutable format and empowers users to deploy small pieces of programs known as smart contracts. The blockchain-based smart contract enables auto enforcement of the agreed terms between two untrusted parties. There are several security vulnerabilities in Ethereum blockchain-based smart contracts, due to which sometimes it does not behave as intended. Because a smart contract can hold millions of dollars as cryptocurrency, so these security vulnerabilities can lead to disastrous losses. In this paper, a systematic review of the security vulnerabilities in the Ethereum blockchain is presented. The main objective is to discuss Ethereum smart contract security vulnerabilities, detection tools, real life attacks and preventive mechanisms. Comparisons are drawn among the Ethereum smart contract analysis tools by considering various features. From the extensive depth review, various issues associated with the Ethereum blockchain-based smart contract are highlighted. Finally, various future directions are also discussed in the field of the Ethereum blockchain-based smart contract that can help the researchers to set the directions for future research in this domain.

Journal ArticleDOI
TL;DR: A comparison of the MLCM results against statistics from the current techniques is presented to show the effectiveness in providing a concise and unambiguous understanding of a multi-label classifier behavior.
Abstract: Concise and unambiguous assessment of a machine learning algorithm is key to classifier design and performance improvement. In the multi-class classification task, where each instance can only be labeled as one class, the confusion matrix is a powerful tool for performance assessment by quantifying the classification overlap. However, in the multi-label classification task, where each instance can be labeled with more than one class, the confusion matrix is undefined. Performance assessment of the multi-label classifier is currently based on calculating performance averages, such as hamming loss, precision, recall, and F-score. While the current assessment techniques present a reasonable representation of each class and overall performance, their aggregate nature results in ambiguity when identifying false negative (FN) and false positive (FP) results. To address this gap, we define a method of creating the multi-label confusion matrix (MLCM) based on three proposed categories of multi-label problems. After establishing the shortcomings of current methods for identifying FN and FP, we demonstrate the usage of the MLCM with the classification of two publicly available multi-label data sets: i) a 12-lead ECG data set with nine classes, and ii) a movie poster data set with eighteen classes. A comparison of the MLCM results against statistics from the current techniques is presented to show the effectiveness in providing a concise and unambiguous understanding of a multi-label classifier behavior.

Journal ArticleDOI
TL;DR: The experimental results for various optimization problems prove the superiority of the proposed algorithm, which achieves good balance of the exploration and exploitation stages.
Abstract: This paper proposes a new metaheuristic optimization algorithm based on ancient war strategy. The proposed War Strategy Optimization (WSO) is based on the strategic movement of army troops during the war. War strategy is modeled as an optimization process wherein each soldier dynamically moves towards the optimum value. The proposed algorithm models two popular war strategies, attack and defense strategies. The positions of soldiers on the battlefield are updated in accordance with the strategy implemented. To improve the algorithm’s convergence and robustness, a novel weight updating mechanism and a weak soldier’s relocation strategy are introduced. The proposed war strategy algorithm achieves good balance of the exploration and exploitation stages. A detailed mathematical model of the algorithm is presented. The efficacy of the proposed algorithm is tested on 50 benchmark functions and four engineering problems. The performance of the algorithm is compared with ten popular metaheuristic algorithms. The experimental results for various optimization problems prove the superiority of the proposed algorithm.

Journal ArticleDOI
TL;DR: In this article , the authors proposed a highly accurate and computationally efficient model for the swift and accurate diagnosis of lung and colon cancers as an alternative to current cancer detection methods, which can substantially improve the quality of treatment as well as the survival rate of cancer patients.
Abstract: Cancer accounts for a huge mortality rate due to its aggressiveness, colossal potential of metastasis, and heterogeneity (causing resistance against chemotherapy). Lung and colon cancers are among the most prevalent types of cancer around the globe that can occur in both males and females. Early and accurate diagnosis of these cancers can substantially improve the quality of treatment as well as the survival rate of cancer patients. We propose a highly accurate and computationally efficient model for the swift and accurate diagnosis of lung and colon cancers as an alternative to current cancer detection methods. In this study, a large dataset of lung and colon histopathology images was employed for training and the validation process. The dataset is comprised of 25000 histopathology images of lung and colon tissues equally divided into 5 classes. A pretrained neural network (AlexNet) was tuned by modifying the four of its layers before training it on the dataset. Initial classification results were promising for all classes of images except for one class with an overall accuracy of 89%. To improve the overall accuracy and keep the model computationally efficient, instead of implementing image enhancement techniques on the entire dataset, the quality of images of the underperforming class was improved by applying a contrast enhancement technique which is fairly simple and efficient. The implementation of the proposed methodology has not only improved the overall accuracy from 89% to 98.4% but has also proved computationally efficient.

Journal ArticleDOI
TL;DR: This survey provides an overview of recent techniques and technologies investigated in the literature, to implement high performance on-chip antennas for millimeter-waves (mmWave) and terahertz (THz) integrated-circuit (IC) applications.
Abstract: Antennas on-chip are a particular type of radiating elements valued for their small footprint. They are most commonly integrated in circuit boards to electromagnetically interface free space, which is necessary for wireless communications. Antennas on-chip radiate and receive electromagnetic (EM) energy as any conventional antennas, but what distinguishes them is their miniaturized size. This means they can be integrated inside electronic devices. Although on-chip antennas have a limited range, they are suitable for cell phones, tablet computers, headsets, global positioning system (GPS) devices, and WiFi and WLAN routers. Typically, on-chip antennas are handicapped by narrow bandwidth (less than 10%) and low radiation efficiency. This survey provides an overview of recent techniques and technologies investigated in the literature, to implement high performance on-chip antennas for millimeter-waves (mmWave) and terahertz (THz) integrated-circuit (IC) applications. The technologies discussed here include metamaterial (MTM), metasurface (MTS), and substrate integrated waveguides (SIW). The antenna designs described here are implemented on various substrate layers such as Silicon, Graphene, Polyimide, and GaAs to facilitate integration on ICs. Some of the antennas described here employ innovative excitation mechanisms, for example comprising open-circuited microstrip-line that is electromagnetically coupled to radiating elements through narrow dielectric slots. This excitation mechanism is shown to suppress surface wave propagation and reduce substrate loss. Other techniques described like SIW are shown to significantly attenuate surface waves and minimise loss. Radiation elements based on the MTM and MTS inspired technologies are shown to extend the effective aperture of the antenna without compromising the antenna’s form factor. Moreover, the on-chip antennas designed using the above technologies exhibit significantly improved impedance match, bandwidth, gain and radiation efficiency compared to previously used technologies. These features make such antennas a prime candidate for mmWave and THz on-chip integration. This review provides a thorough reference source for specialist antenna designers.

Journal ArticleDOI
TL;DR: The challenges of next-generation smart-grids as it relate to the integration of AI, IoT and 5G for better smart grid architecture are discussed and possible solutions to some of the challenges and standards to support this novel trend are proposed.
Abstract: Smartgrid is a paradigm that was introduced into the conventional electricity network to enhance the way generation, transmission, and distribution networks interrelate. It involves the use of Information and Communication Technology (ICT) and other solution in fault and intrusion detection, mere monitoring of energy generation, transmission, and distribution. However, on one hand, the actual and earlier smartgrid, do not integrate more advanced features such as automatic decision making, security, scalability, self-healing and awareness, real-time monitoring, cross-layer compatibility, etc. On the other hand, the emergence of the digitalization of the communication infrastructure to support the economic sector which among them are energy generation and distribution grid with Artificial Intelligence (AI) and large-scale Machine to Machine (M2M) communication. With the future Massive Internet of Things (MIoT) as one of the pillars of 5G/6G network factory, it is the enabler to support the next generation smart grid by providing the needed platform that integrates, in addition to the communication infrastructure, the AI and IoT support, providing a multitenant system. This paper aim at presenting a comprehensive review of next smart grid research trends and technological background, discuss a futuristic next-generation smart grid driven by artificial intelligence (AI) and leverage by IoT and 5G. In addition, it discusses the challenges of next-generation smart-grids as it relate to the integration of AI, IoT and 5G for better smart grid architecture. Also, proffers possible solutions to some of the challenges and standards to support this novel trend. A corresponding future work will dwell on the implementation of the discussed integration of AI, IoT and 5G for next-generation smart grid, using Matlab, NS2/NS3, Open-daylight and Mininet as soft tools and compare with related literature.

Journal ArticleDOI
TL;DR: In this article , the authors evaluate students' perception of the application of the metaverse in the United Arab Emirates (UAE) for medical-educational purposes and find that US is an essential determinant of users' intention to use the UMS.
Abstract: Metaverse (MS) is a digital universe accessible through a virtual environment. It is established through the merging of virtually improved physical and digital reality. Metaverse (MS) offers enhanced immersive experiences and a more interactive learning experience for students in learning and educational settings. It is an expanded and synchronous communication setting that allows different users to share their experiences. The present study aims to evaluate students’ perception of the application of MS in the United Arab Emirates (UAE) for medical-educational purposes. In this study, 1858 university students were surveyed to examine this model. The study’s conceptual framework consisted of adoption constructs including Technology Acceptance Model (TAM), Personal innovativeness (PI), Perceived Compatibility (PCO), User Satisfaction (US), Perceived Triability (PTR), and Perceived Observability (POB). The study was unique because the model correlated technology-based features and individual-based features. The study also used hybrid analyses such as Machine Learning (ML) algorithms and Structural Equation Modelling (SEM). The present study also employs the Importance Performance Map Analysis (IPMA) to assess the importance and performance factors. The study finds US as an essential determinant of users’ intention to use the metaverse (UMS). The present study’s finding is useful for stakeholders in the educational sector in understanding the importance of each factor and in making plans based on the order of significance of each factor. The study also methodologically contributes to Information Systems (IS) literature because it is one of the few studies that have used a complementary multi-analytical approach such as ML algorithms to investigate the UMS metaverse systems.

Journal ArticleDOI
TL;DR: A systematic review of the security vulnerabilities in the Ethereum blockchain is presented in this paper , where the main objective is to discuss Ethereum smart contract security vulnerabilities, detection tools, real life attacks and preventive mechanisms.
Abstract: Blockchain is a revolutionary technology that enables users to communicate in a trust-less manner. It revolutionizes the modes of business between organizations without the need for a trusted third party. It is a distributed ledger technology based on a decentralized peer-to-peer (P2P) network. It enables users to store data globally on thousands of computers in an immutable format and empowers users to deploy small pieces of programs known as smart contracts. The blockchain-based smart contract enables auto enforcement of the agreed terms between two untrusted parties. There are several security vulnerabilities in Ethereum blockchain-based smart contracts, due to which sometimes it does not behave as intended. Because a smart contract can hold millions of dollars as cryptocurrency, so these security vulnerabilities can lead to disastrous losses. In this paper, a systematic review of the security vulnerabilities in the Ethereum blockchain is presented. The main objective is to discuss Ethereum smart contract security vulnerabilities, detection tools, real life attacks and preventive mechanisms. Comparisons are drawn among the Ethereum smart contract analysis tools by considering various features. From the extensive depth review, various issues associated with the Ethereum blockchain-based smart contract are highlighted. Finally, various future directions are also discussed in the field of the Ethereum blockchain-based smart contract that can help the researchers to set the directions for future research in this domain.

Journal ArticleDOI
TL;DR: In this article , the development of soft pneumatic actuators and robots up to the date of publication is summarized and a special emphasis on recent advances such as novel designs, differential simulators, analytical and numerical modeling methods, topology optimization, data-driven modeling and control methods, hardware control boards and nonlinear estimation and control techniques.
Abstract: Soft robotics is a rapidly evolving field where robots are fabricated using highly deformable materials and usually follow a bioinspired design. Their high dexterity and safety make them ideal for applications such as gripping, locomotion, and biomedical devices, where the environment is highly dynamic and sensitive to physical interaction. Pneumatic actuation remains the dominant technology in soft robotics due to its low cost and mass, fast response time, and easy implementation. Given the significant number of publications in soft robotics over recent years, newcomers and even established researchers may have difficulty assessing the state of the art. To address this issue, this article summarizes the development of soft pneumatic actuators and robots up until the date of publication. The scope of this article includes the design, modeling, fabrication, actuation, characterization, sensing, control, and applications of soft robotic devices. In addition to a historical overview, there is a special emphasis on recent advances such as novel designs, differential simulators, analytical and numerical modeling methods, topology optimization, data-driven modeling and control methods, hardware control boards, and nonlinear estimation and control techniques. Finally, the capabilities and limitations of soft pneumatic actuators and robots are discussed and directions for future research are identified.

Journal ArticleDOI
TL;DR: In this paper , the authors proposed a new data augmentation algorithm to enrich the speech emotions dataset with more samples through a careful addition of noise fractions, which can balance between exploration and exploitation of the search agents' positions to guarantee to reach the optimal global solution.
Abstract: One of the main challenges facing the current approaches of speech emotion recognition is the lack of a dataset large enough to train the currently available deep learning models properly. Therefore, this paper proposes a new data augmentation algorithm to enrich the speech emotions dataset with more samples through a careful addition of noise fractions. In addition, the hyperparameters of the currently available deep learning models are either handcrafted or adjusted during the training process. However, this approach does not guarantee finding the best settings for these parameters. Therefore, we propose an optimized deep learning model in which the hyperparameters are optimized to find their best settings and thus achieve more recognition results. This deep learning model consists of a convolutional neural network (CNN) composed of four local feature-learning blocks and a long short-term memory (LSTM) layer for learning local and long-term correlations in the log Mel-spectrogram of the input speech samples. To improve the performance of this deep network, the learning rate and label smoothing regularization factor are optimized using the recently emerged stochastic fractal search (SFS)-guided whale optimization algorithm (WOA). The strength of this algorithm is the ability to balance between the exploration and exploitation of the search agents’ positions to guarantee to reach the optimal global solution. To prove the effectiveness of the proposed approach, four speech emotion datasets, namely, IEMOCAP, Emo-DB, RAVDESS, and SAVEE, are incorporated in the conducted experiments. Experimental results confirmed the superiority of the proposed approach when compared with state-of-the-art approaches. Based on the four datasets, the achieved recognition accuracies are 98.13%, 99.76%, 99.47%, and 99.50%, respectively. Moreover, a statistical analysis of the achieved results is provided to emphasize the stability of the proposed approach.

Journal ArticleDOI
TL;DR: This paper proposes a secure ECC-based three-factor mutual authentication protocol that guarantees the privacy of patients for TMIS and has lower communication costs, and better security features compared to related existing protocols.
Abstract: In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting attention. TMIS is one of the technologies used in Wireless Body Area Network (WBAN) and can provide patients with a variety of remote healthcare services. In TMIS environments, sensitive data of patients are communicated via an open channel. An adversary may attempt various security attacks including impersonation, replay, and forgery attacks. Therefore, numberous authentication schemes have been suggested to provide secure communication for TMIS. Sahoo et al. proposed a mutual authentication scheme based on biometrics and Elliptic Curve Cryptography (ECC) in 2020. However, we find out that Sahoo et al.’s scheme cannot resist insider and privileged insider attacks and cannot guarantee patient anonymity. In this paper, we propose a secure ECC-based three-factor mutual authentication protocol that guarantees the privacy of patients for TMIS. We conduct informal security analysis to prove that our protocol is secure from various security attacks. In addition, we perform formal security analyses using the Automated Validation of Internet Security Protocols and Applications (AVISPA), Burrows-Abadi-Needham (BAN) logic, and the Real-Or-Random (ROR) model. Furthermore, we assess our protocol’s performance and compare it to other protocols. As a result, our protocol has lower communication costs, and better security features compared to related existing protocols. Therefore, our protocol is more appropriate for TMIS environments than other related protocols.

Journal ArticleDOI
TL;DR: In this paper , a new intelligent integration between an IoT platform and deep learning neural network (DNN) algorithm for the online monitoring of computer numerical control (CNC) machines is introduced.
Abstract: This paper introduces a new intelligent integration between an IoT platform and deep learning neural network (DNN) algorithm for the online monitoring of computer numerical control (CNC) machines. The proposed infrastructure is utilized for monitoring the cutting process while maintaining the cutting stability of CNC machines in order to ensure effective cutting processes that can help to increase the quality of products. For this purpose, a force sensor is installed in the milling CNC machine center to measure the vibration conditions. Accordingly, an IoT architecture is designed to connect the sensor node and the cloud server to capture the real-time machine’s status via message queue telemetry transport (MQTT) protocol. To classify the different cutting conditions (i.e., stable cutting and unstable cuttings), an improved model of DNN is designed in order to maintain the healthy state of the CNC machine. As a result, the developed deep learning can accurately investigate if the transmitted data of the smart sensor via the internet is real cutting data or fake data caused by cyber-attacks or the inefficient reading of the sensor due to the environment temperature, humidity, and noise signals. The outstanding results are obtained from the proposed approach indicating that deep learning can outperform other traditional machine learning methods for vibration control. The Contact elements for IoT are utilized to display the cutting information on a graphical dashboard and monitor the cutting process in real-time. Experimental verifications are performed to conduct different cutting conditions of slot milling while implementing the proposed deep machine learning and IoT-based monitoring system. Diverse scenarios are presented to verify the effectiveness of the developed system, where it can disconnect immediately to secure the system automatically when detecting the cyber-attack and switch to the backup broker to continue the runtime operation.

Journal ArticleDOI
TL;DR: Practical considerations to design and implement a reconfigurable intelligent surface (RIS) in the sub-6 GHz band are explained and the capability of the RIS in hand to reconfigure itself in order to anomalously reflect the incoming EM waves toward the direction of interest in which a receiver could be experiencing poor coverage is showcased.
Abstract: Here, we first aim to explain practical considerations to design and implement a reconfigurable intelligent surface (RIS) in the sub-6 GHz band and then, to demonstrate its real-world performance. The wave manipulation procedure is explored with a discussion on relevant electromagnetic (EM) concepts and backgrounds. Based on that, the RIS is designed and fabricated to operate at the center frequency of 3.5 GHz. The surface is composed of 2430 unit cells where the engineered reflecting response is obtained by governing the microscopic characteristics of the conductive patches printed on each unit cell. To achieve this goal, the patches are not only geometrically customized to properly reflect the local waves, but also are equipped with specific varactor diodes to be able to reconfigure their response when it is required. An equivalent circuit model is presented to analytically evaluate the unit cell’s performance with a method to measure the unit cell’s characteristics from the macroscopic response of the RIS. The patches are printed on six standard-size substrates which then placed together to make a relatively big aperture with approximate planar dimensions of $120 \times 120$ cm2. The manufactured RIS possesses a control unit with a custom-built system that can control the response of the reflecting surface by regulating the performance of the varactor diode on each printed patch across the structure. Furthermore, with an introduction of our test-bed system, the functionality of the developed RIS in an indoor real-world scenario is assessed. Finally, we showcase the capability of the RIS in hand to reconfigure itself in order to anomalously reflect the incoming EM waves toward the direction of interest in which a receiver could be experiencing poor coverage.