Claim Missing Document
Check
Articles

Found 3 Documents
Search

A comprehensive analysis of different models: skin cancer detection Thorat, Amruta; Jadhav, Chaya
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2404-2415

Abstract

Due to fast-growing worldwide air pollution and ozone layer destruction, an alarming number of people are found to have skin cancer, more than any other kind of cancer combined. It is known to be one of the deadliest malignancies; if not identified and cured in its early stages, it is likely to spread to other body parts. Early detection is critical and helps prevent cancer from spreading. This allows for early decisions on diagnostic and treatment options. Early diagnosis and discovery, combined with the right treatment, can save lives. In this paper, we have done a detailed survey on various techniques and models developed for skin cancer detection and also discussed different security-related issues. This work thoroughly explores the several types of models utilized to identify cancer in the skin.
Fake News Detection in Model Integral: A Hybrid CNN-BiLSTM Model Nyayadhish, Renuka; Jadhav, Chaya; Bhupati, Ch; Mabel Rose, R.A.; Prabhu, M
International Journal of Engineering, Science and Information Technology Vol 5, No 3 (2025)
Publisher : Malikussaleh University, Aceh, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52088/ijesty.v5i3.1058

Abstract

The act of recognizing news that intentionally spreads false information via social media or traditional news sources is known as fake news detection. The characteristics of fake news make it difficult to identify. The spread of fake news and misleading information has increased dramatically due to social media's role as a communication tool and the quick advancement of technology. There is an urgent need for automated and intelligent systems that can differentiate between authentic and fraudulent information due to the fast dissemination of unverified content. The proposed hybrid model efficiently captures regional and worldwide relationships in textual details to address this by combining multiscale residual CNN and BiLSTM layers. The BiLSTM layers manage contextual representations and sequential dependencies, while the CNN layers concentrate on extracting deep local features. The model's capacity to recognize patterns of deception in textual content and comprehend semantic flow is enhanced by this dual architecture. The Edge-IIoT set data and the IoT-23 information from Aposemat were utilized in this study to assess the suggested framework empirically. A concept based on information transfer and sophisticated adaptive systems, we provide an understanding of outliers management paradigm of "generation–spread–identification–refutation" for identifying false information during emergencies. Findings from experiments clearly illustrate the superiority of the BiLSTM approach, demonstrating not only its state-of-the-art efficacy in identifying fake news but also its significant edge over traditional machine learning algorithms. This highlights the BiLSTM approach's critical role in protecting our information ecosystems from the ubiquitous threat of misinformation.
Swarm Intelligence-Based Performance Optimization for Wireless Sensor Networks for Hole Detection Padmapriya, T; Jadhav, Chaya; Nyayadhish, Renuka; Kumar, Neeraj; Kaliappan, P
International Journal of Engineering, Science and Information Technology Vol 5, No 3 (2025)
Publisher : Malikussaleh University, Aceh, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52088/ijesty.v5i3.1127

Abstract

Extensive research into maintaining coverage over time has been spurred by the growing need for wireless sensor networks to monitor certain regions.  Coverage gaps brought on either haphazard node placement or failures pose the biggest threat to this objective.  In order to identify and fix coverage gaps, this study suggests an algorithm based on swarm intelligence.  Using both local and relative information, the swarm of agents navigates a potential field toward the nearest hole and activates in reaction to holes found.  In order to spread out effectively and speed up healing, the agents quantize their perceptions and approach holes from various angles. The need for wireless sensor networks to monitor certain areas has grown, leading to many studies on maintaining coverage over time. Random node deployment or failures create coverage gaps, which pose the biggest threat to this objective.  A swarm intelligence-based approach is proposed in this paper to identify and fix coverage deficiencies. Even with Their encouraging performance and operational quality, WSNs are susceptible to various security threats. The security of WSNs is seriously threatened by sinkhole attacks, one of these. In this research, a detection strategy against sinkhole attacks is proposed and developed using the Swarm Intelligence (SI) optimization algorithm. MATLAB has been used to implement the proposed work, and comprehensive Models have been run to assess its effectiveness in terms of energy consumption, packet overhead, convergence speed, detection accuracy, and detection time. The findings demonstrate that the mechanism we have suggested is effective and reliable in identifying sinkhole attacks with a high rate of detection accuracy.