Clustering is a fundamental data analysis task that presents challenges. Choosing proper initialization centroid techniques is critical to the success of clustering algorithms, such as k-means. The current work investigates six established methods (random, Forgy, k-means++, PCA, hierarchical clustering, and naive sharding) and three innovative swarm intelligence-based approaches—Spider Monkey Optimization (SMO), Whale Optimization Algorithm (WOA) and Grey Wolf Optimizer (GWO)—for k-means clustering (SMOKM, WOAKM, and GWOKM). The results on ten well-known datasets strongly favor swarm intelligence-based techniques, with SMOKM consistently outperforming WOAKM and GWOKM. This finding provides critical insights into selecting and evaluating centroid techniques in k-means clustering. The current work is valuable because it provides guidance for those seeking optimal solutions for clustering diverse datasets. Swarm intelligence, especially SMOKM, effectively generates distinct and well-separated clusters, which is valuable in resource-constrained settings. The research also sheds light on the performance of traditional methods such as hierarchical clustering, PCA, and k-means++, which, while promising for specific datasets, consistently underperform swarm intelligence-based alternatives. In conclusion, the current work contributes essential insights into selecting and evaluating initialization centroid techniques for k-means clustering. It highlights the superiority of swarm intelligence, particularly SMOKM, and provides actionable guidance for addressing various clustering challenges.
The segmentation methods for image processing are studied in the presented work. Image segmentation can be defined as a vital step in digital image processing. Also, it is used in various applications including object co-segmentation, recognition tasks, medical imaging, content based image retrieval, object detection, machine vision and video surveillance. A lot of approaches were created for image segmentation. In addition, the main goal of segmentation is to facilitate and alter the image representation into something which is more important and simply to be analyzed. The approaches of image segmentation are splitting the images into a few parts on the basis of image’s features including texture, color, pixel intensity value and so on. With regard to the presented study, many approaches of image segmentation are reviewed and discussed. The techniques of segmentation might be categorized into six classes: First, thresholding segmentation techniques such as global thresholding (iterative thresholding, minimum error thresholding, otsu's, optimal thresholding, histogram concave analysis and entropy based thresholding), local thresholding (Sauvola’s approach, T.R Singh’s approach, Niblack’s approaches, Bernsen’s approach Bruckstein’s and Yanowitz method and Local Adaptive Automatic Binarization) and dynamic thresholding. Second, edge-based segmentation techniques such as gray-histogram technique, gradient based approach (laplacian of gaussian, differential coefficient approach, canny approach, prewitt approach, Roberts approach and sobel approach). Thirdly, region based segmentation approaches including Region growing techniques (seeded region growing (SRG), statistical region growing, unseeded region growing (UsRG)), also merging and region splitting approaches. Fourthly, clustering approaches, including soft clustering (fuzzy C-means clustering (FCM)) and hard clustering (K-means clustering). Fifth, deep neural network techniques such as convolution neural network, recurrent neural networks (RNNs), encoder-decoder and Auto encoder models and support vector machine. Finally, hybrid techniques such as evolutionary approaches, fuzzy logic and swarm intelligent (PSO and ABC techniques) and discusses the pros and cons of each method.
In this paper describe to mathematical analysis for a three-phase, two level inverter designs. As we know the power electronic devices (inverter) to convert the DC power to AC power (controller on output voltage and frequency level). In Industrial applications, the inverters are used for adjustable speed (AC Drives). In this paper, the mathematical analyses for inverter design are done by using Software packages C++ Builder and visual C++ Language. For non- linear distortions described by the load power factor in power system networks. The P.F is reverse proportional with the harmonics distortion. Small P.F means much more of harmonic distortion, and lower power quality for consumers. to improve the P.F, and power quality in this paper the small capacitor installed as part of the rectified the load current has power (30 KW with P.F load 0.8), the fluctuations of the rectified voltage must not greater than +/- 10%.The power factor proportion of the load power, with Modulation coefficient p.u approximately unity. The calculation is achieved with different integrations steps with load power 30KW, 0.8 P.F. all results done Based on model and experimental data..
This work presents a healthcare monitoring system that can be used in an intensive care room. Biological information represented by ECG signals is achieved by ECG acquisition part . AD620 Instrumentation Amplifier selected due to its low current noise. The ECG signals of patients in the intensive care room are measured through wireless nodes. A base node is connected to the nursing room computer via a USB port , and is programmed with a specific firmware. The ECG signals are transferred wirelessly to the base node using nRF24L01+ wireless module. So, the nurse staff has a real time information for each patient available in the intensive care room. A star Wireless Sensor Network is designed for collecting ECG signals . ATmega328 MCU in the Arduino Uno board used for this purpose. Internet for things used For transferring ECG signals to the remote doctor, a Virtual Privet Network is established to connect the nursing room computer and the doctor computer . So, the patients information kept secure. Although the constructed network is tested for ECG monitoring, but it can be used to monitor any other signals. INTRODUCTION For elderly people, or the patient suffering from the cardiac disease it is very vital to perform accurate and quick diagnosis. Putting such person under continuous monitoring is very necessary. (ECG) is one of the critical health indicators that directly bene ¿ t from long-term monitoring. ECG signal is a time-varying signal representing the electrical activity of the heart. It is an effective, non- invasive diagnostic tool for cardiac monitoring[1]. In this medical field, a big improvement has been achieved in last few years. In the past, several remote monitoring systems using wired communications were accessible while nowadays the evolution of wireless communication means enables these systems to operate everywhere in the world by expanding internet benefits, applications, and services [2]. Wireless Sensor Networks (WSNs), as the name suggests consist of a network of wireless nodes that have the capability to sense a parameter of interest like temperature, humidity, vibration etc[3,4]. The health care application of wireless sensory network attracts many researches nowadays[ 5-7] . Among these applications ECG monitoring using smart phones[6,8], wearable Body sensors[9], remote patient mentoring[10],...etc. This paper presents wireless ECG monitoring system for people who are lying at intensive care room. At this room ECG signals for every patient are measured using wireless nodes then these signals are transmitted to the nursing room for remote monitoring. The nursing room computer is then connected to the doctors computer who is available at any location over the word by Virtual Privet Network (VPN) in such that the patients information is kept secure and inaccessible from unauthorized persons. II. M OTE H ARDWARE A RCHITECTURE The proposed mote as shown in Fig.1 consists of two main sections : the digital section which is represented by the Arduino UNO Board and the wireless module and the analog section. The analog section consists of Instrumentation Amplifier AD620 , Bandpass filter and an operational amplifier for gain stage, in addition to Right Leg Drive Circuit. The required power is supplied by an internal 3800MAH Lithium-ion (Li-ion) battery which has 3.7V output voltage.
The demand for a secured web storage system is increasing daily for its reliability which ensures data privacy and confidentiality. The proposed paper aims to find the most secure ways to maintain integrity and protect privacy and security in healthcare management systems. The Advanced Encryption Standard (AES) algorithm is used to encrypt data transferred by providing a means to check the integrity of information transmitted and make it more immune to cyberattack techniques, this was implemented by using Keyed-Hash Message Authentication Code (HMAC) and Secured Hash Algorithm-256 (SHA-256). The risk of exposure to attackers can be avoided by using honeypot systems combined with Intrusion detection systems (IDSs) as a firewall system is not effective against such attacks alone. The experimental results evaluate the proposed security health information management system by comparing the performance of the encryption algorithm based on encryption time, memory and CPU usage, and entropy for different plaintext lengths. In addition, it can be seen that when changing the AES key size, more memory and time are required the longer the key size is used. The 128 bits AES key is therefore advised if the system must operate in hard real-time.
This paper studies the impact of climate change on the electricity consumption by means of a fuzzy regression approach. The climate factors which have been considered in this paper are humidity and temperature, whereas the simultaneous effect of these two climate factors is considered. The impacts of other climate variables, like the wind, with a minor effect on energy consumption are ignored. The innovation which applies in this paper is the division of the year into two parts by using the temperature-day graph in the year. To index the humidity, data of the minimum humidity per day are used. For temperature, the maximum temperature of the first part of the year (warm days) and the minimum of the second part (cold days) are used. The indicator for the consumption is the daily peak load. The model results show high sensitivity to the temperature but low sensitivity to the humidity. Moreover, it is concluded that the model structure cannot be the same and for the cold par additional variables such as gas consumption should be considered.
Every day, a tremendous amount of image data is generated as a result of recent advances in imaging and computing technology. Several content-based image retrieval (CBIR) approaches have been introduced for searching image collections. These methods, however, involve greater computing and storage resources. Cloud servers can address this issue by offering a large amount of computational power at a low cost. However, cloud servers are not completely trustworthy, and data owners are concerned about the privacy of their personal information. In this research, we propose and implement a secure CBIR (SCBIR) strategy for searching and retrieving cipher text image databases. In the proposed scheme, the extract aggregated feature vectors to represent the related image collection and use a safe Asymmetric Scalar-Product-Preserving Encryption (ASPE) approach to encrypt these vectors while still allowing for similarity computation. To improve search time, all encrypted features are recursively clustered using the k-means method to create a tree index. The results reveal that SCBIR is faster at indexing and retrieving than earlier systems, with superior retrieval precision and scalability. In addition, our paper introduces the watermark to discover any illegal distributions of the images that are received by unlawful data users. Particularly, the cloud server integrates a unique watermark directly into the encrypted images before sending them to the data users. As a result, if an unapproved image copy is revealed, the watermark can be extracted and the unauthorized data users who spread the image can be identified. The performance of the proposed scheme is proved, while its performance is demonstrated through experimental results.
Cryptography is one of the technological means to provide security to data being transmitted on information and communication systems. When it is necessary to securely transmit data in limited bandwidth, both compression and encryption must be performed. Researchers have combined compression and encryption together to reduce the overall processing time. In this paper, new partial encryption schemes are proposed to encrypt only part of the compressed image. Soft and hard threshold compression methods are used in the compression step and the Advanced Encryption Standard (AES) cipher is used for the encryption step. The effect of different threshold values on the performance of the proposed schemes are studied. The proposed partial encryption schemes are fast, secure, and do not reduce the compression performance of the underlying selected compression methods.
Due to the recent improvements in imaging and computing technologies, a massive quantity of image data is generated every day. For searching image collection, several content-based image retrieval (CBIR) methods have been introduced. However, these methods need more computing and storage resources. Cloud servers can fill this gap by providing huge computational power at a cheap price. However, cloud servers are not fully trusted, thus image owners have legal concerns about the privacy of their private data. In this paper, we proposed and implemented a privacy-preserving CBIR (PP-CBIR) scheme that allows searching and retrieving image databases in a cipher text format. Specifically, we extract aggregated feature vectors to represent the corresponding image collection and employ the asymmetric scalar-product-preserving encryption scheme (ASPE) method to protect these vectors while allowing for similarity computation between these encrypted vectors. To enhance search time, all encrypted features are clustered by the k-means algorithm recursively to construct a tree index. Results show that PP-CBIR has faster indexing and retrieving with good retrieval precision and scalability than previous schemes.
In this paper, a new nonlinear dynamic system, new three-dimensional fractional order complex chaotic system, is presented. This new system can display hidden chaotic attractors or self-excited chaotic attractors. The Dynamic behaviors of this system have been considered analytically and numerically. Different means including the equilibria, chaotic attractor phase portraits, the Lyapunov exponent, and the bifurcation diagrams are investigated to show the chaos behavior in this new system. Also, a synchronization technique between two identical new systems has been developed in master- slave configuration. The two identical systems are synchronized quickly. Furthermore, the master-slave synchronization is applied in secure communication scheme based on chaotic masking technique. In the application, it is noted that the message is encrypted and transmitted with high security in the transmitter side, in the other hand the original message has been discovered with high accuracy in the receiver side. The corresponding numerical simulation results proved the efficacy and practicability of the developed synchronization technique and its application
The use of image communication has increased in recent years. In this paper, new partial encryption schemes are used to encrypt only part of the compressed data. Only 6.25-25% of the original data is encrypted for four different images, resulting in a significant reduction in encryption and decryption time. In the compression step, an advanced clustering analysis technique (Fuzzy C-means (FCM)) is used. In the encryption step, the permutation cipher is used. The effect of number of different clusters is studied. The proposed partial encryption schemes are fast and secure, and do not reduce the compression performance of the underlying selected compression methods as shown in experimental results and conclusion.
Recently, the incorporation of state-of-the-art technology such as Electronic Healthcare Records (EHRs), networks, and cloud computing has transformed the traditional healthcare system. However, security problems have arisen as a result of the integration of technology. Secure remote user authentication is a core part of the healthcare system to validate the user's identification via an unsecure communication network. Since then, several remote user authentication schemes have been presented, each with its own set of pros and limitations. As a result, security, malicious attacks and privacy concerns are considered one of the main challenges related to the healthcare system. In this paper, we propose a safe user authentication scheme for patients in the healthcare system that overcomes these flaws and confirms the security of the proposed work using scyther, a formal security tool. In the healthcare environment, our work provides an effective means to construct an environment capable of setting, registering, storing, searching, analyzing, authentication, and verifying electronic healthcare information in order to protect the information of patients. Furthermore, our suggested scheme uses symmetric encryption based on the crypto- hash function for accessing the anomaly of the patient's identity and One-Time Password (OTP). Towards the end of the study, the performance analysis results indicate a delicate balance of security and performance that is frequently lacking in previous works.
This article emphasizes on a strategy to design a Super Twisting Sliding Mode Control (STSMC) method. The proposed controller depends on the device of Field Programmable Gate Array (FPGA) for controlling the trajectory of robot manipulator. The gains of the suggested controller are optimized using Chaotic Particle Swarm Optimization (PSO) in MATLAB toolbox software and Simulink environment. Since the control systems speed has an influence on their stability requirements and performance, (FPGA) device is taken in consideration. The proposed control method based on FPGA is implemented using Xilinx block sets in the Simulink. Integrated Software Environment (ISE 14.7) and System Generator are employed to create the file of Bitstream which can be downloaded in the device of FPGA. The results show that the designed controller based of on the FPGA by using System Generator is completely verified the effectiveness of controlling the path tracking of the manipulator and high speed. Simulation results explain that the percentage improvement in the Means Square Error (MSEs) of using the STSMC based FPGA and tuned via Chaotic PSO when compared with the same proposed controller tuned with classical PSO are 17.32 % and 13.98 % for two different cases of trajectories respectively.
In this paper, we focus on ensuring encrypted vehicular communication using wireless controller area network performance at high node densities, by means of Dedicated Short-Range Communication (DSRC) algorithms. We analyses the effect of the vehicular communication parameters, message-rate, data-rate, transmission power and carrier sensing threshold, on the application performance. After a state-of-the-art analysis, we propose a data-rate DSRC algorithm. Simulation studies show that DSRC performs better than other decentralized vehicular communication algorithms for a wide range of application requirements and densities. Vehicular communication plays one of the most important roles for future autonomous vehicle. We have systematically investigated the impact of vehicular communication using the MATLAB application platform and achieved an accuracy of 93.74% after encrypting all the communications between the vehicles and securing them by applying the encryption on V2V communication in comparison with the existing system of Sensor Networks which stands at 92.97%. The transmission time for the encryption is 165 seconds while the rate of encryption is as low as 120 Mbps for the proposed awareness range of vehicles to vehicle using DSRC algorithm in Wireless-Controller Area Network for communication. Experimental results show that our proposed method performs 3% better than the recently developed algorithms.