Innovations in Intelligent Computing and Communication
Innovations in Intelligent Computing and Communication
Innovations in
Intelligent Computing
and Communication
First International Conference, ICIICC 2022
Bhubaneswar, Odisha, India, December 16–17, 2022
Proceedings
Communications
in Computer and Information Science 1737
Innovations in
Intelligent Computing
and Communication
First International Conference, ICIICC 2022
Bhubaneswar, Odisha, India, December 16–17, 2022
Proceedings
Editors
Mrutyunjaya Panda Satchidananda Dehuri
Utkal University Fakir Mohan University
Bhubaneswar, Odisha, India Balasore, Odisha, India
© The Editor(s) (if applicable) and The Author(s), under exclusive license
to Springer Nature Switzerland AG 2022
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, expressed or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
ICIICC 2022 was organized successfully due to support and hard work of many
people. First and foremost, we thank all the authors for their research contributions to
the conference, and for their presentations and discussion during the conference. Our
thanks go to the Technical Program Committee members and reviewers for their sincere
efforts in carefully reviewing the submitted articles. We would also like to thank SERB,
Government of India, and WB-OHEPEE, Utkal University, for providing seminar grants
to conduct the conference successfully. Our special thanks go to the following keynote
speakers for exciting and motivational keynote addresses:
We express our sincere thanks to the session chairs and local organizing commit-
tee members for helping us to formulate a rich technical program. We are immensely
grateful to our Honorable Vice-Chancellor, Registrar, Comptroller of Finance, Direc-
tors, and other administrative officers of Utkal University for allowing us to organize the
conference.
vi Preface
Finally, our sincere gratitude goes to Lakhmi C. Jain, Founder of KES International,
UK, for his continuous support and kind guidance in the process of technical collabora-
tions, and to the Springer CCIS series team, for their guidance in bringing the conference
proceedings in a timely manner and with good quality.
We hope that the readers of this proceedings will find it enjoyable.
Chief Patron
Sabita Acharya Utkal University, India
Patrons
Durga Sankar Pattnaik Utkal University, India
Avaya Kumar Nayak Utkal University, India
Shri Gautama Pradhan Utkal University, India
Convenor
Mrutyunjaya Panda Utkal University, India
Finance Committee
Biswojit Nayak Utkal University, India
Sanjaya Kumar Sarangi Utkal University, India
Publishing Committee
Prafulla Kumar Behera Utkal University, India
Manas Ranjan Patra Berhampur University, India
Satchidananda Dehuri Fakir Mohan University, India
Haraprasad Naik Utkal University, India
Sanjaya Kumar Sarangi Utkal University, India
N. Adhikari Utkal University, India
Organizing Committee
Prafulla Kumar Behera Utkal University, India
Mrutyunjaya Panda Utkal University, India
N. Adhikari Utkal University, India
Lalatendu Muduli India
Biswojit Nayak Utkal University, India
Haraprasad Naik Utkal University, India
Purna Chandra Sethi Rama Devi Women’s University, India
viii Organization
Advisory Committee
Ajith Abraham Machine Intelligence Research Labs, USA
Ganapati Panda IIT Bhubaneswar, India
P. K. Meher NTU, Singapore
S. K. Patra IIIT Vadodara, India
Milli Pant IIT Roorkee, India
S. K. Udgata University of Hyderabad, India
A. K. Bisoi Utkal University, India
J. Dandpat Utkal University, India
P. K. Hota Utkal University, India
N. Das Utkal University, India
S. K. Pradhan Utkal University, India
B. S. Panda IIT New Delhi, India
B. Majhi VSSUT, India
P. K. Mohapatra Utkal University, India
Prasanta K. Jana IIT(ISM) Dhanbad, India
Srikanta Patnaik SOA, India
B. K. Tripathy VIT, India
Program Chairs
Mrutyunjaya Panda Utkal University, India
Satchidananda Dehuri Fakir Mohan University, India
Prafulla Kumar Behera Utkal University, India
Manas Ranjan Patra Berhampur University, India
George A. Tsihrintzis University of Piraeus, Greece
Sung-Bae Cho Yonsei University, South Korea
Carlos A. Coello Coello Cinvestav-IPN, Mexico
Keynote Speakers
Ajith Abraham Machine Intelligence Research Labs, USA
Sung-Bae Cho Yonsei University, South Korea
Carlos A. Coello Coell Cinvestav-IPN, Mexico
Aniket Mohanty University of Auckland, New Zealand
Ganapati Panda IIT Bhubaneswar, India
Umamaheswar A. Kakinada Charter Communications, USA
Saroj Kumar Meher Indian Statistical Institute, Bangalore, India
Siba Ku. Udgata University of Hyderabad, India
Bhawani Sankar Panda IIT Delhi, India
Sadhna Rana Tata Consultancy Services, India
x Organization
Sponsors
Science and Engineering Research Board (SERB), Government of India
Odisha Higher Education Programme for Excellence and Equity (WB-OHEPEE), Utkal
University, India
Keynote Address
Industry 4.0 Meets Data Science: The Pathway for Society
5.0
Ajith Abraham
Sung-Bae Cho
Aniket Mohanty
Ganapati Panda1,2
1
IIT, Bhubaneswar
2 C.V. Raman Global University, Bhubaneswar, India
S. K. Meher
Siba K. Udgata
Umamaheswar A. Kakinada
B. S. Panda
Intelligent Computing
Communications
Abstract. Emotion and feelings are recently becoming popular concepts in the
everyday life. It not only affects human health but also plays an essential role in
the decision-making processes. For this reason, emotion classification is one of the
important aspects to deal with the problems like mental disorders, suicidal activ-
ities and judgmental process. Electroencephalogram (EEG) signal is one of the
physiological signals which can be collected from the human brain activity while
a person performing various mental and physical task. In this paper, the DEAP
dataset has been implemented with the deep learning model for the classification
process. In the process of developing models, for the extraction of the impor-
tant features from the unprocessed EEG signals, Fast Fourier Transformation is
used. Three ensemble deep learning models are tested and compared to get the
best accuracy result for emotion classification. Furthermore, by the best model we
can classify four emotional regions in the valance-arousal plane: HVHA, HVLA,
LVHA and LVLA can be classified. The experimental results show that among
all the three deep learning models, 1D-CNN-GRU achieved the highest training
accuracy of 96.54% as compared to LSTM and 1D-CNN, which is the best model
to classify emotions in this context.
1 Introduction
Now a days several industries have adopted the implementation of emotion recognition
and classification on their employees. When the human resources fields start gain the
emotional state of the employee, they could take the advantages from it to improve the
quality of taking decision regarding their organization and it will also help to make judg-
ment regarding employees’ work. Emotion is physiological process triggered due to the
environmental and personal conditions, which affects the mood, behavior, character and
motivations. It also plays an important role in the daily conversation and behavior which
affects the decision-making process, personal and professional workflow. Nowadays,
the emotional state of a person takes a very crucial position in life, which is associated
with their mental and physical health, daily lifestyle, decisions about the future and
many more. The Valence, Arousal, and Dominance (VAD) dimensions are another way
to divide up emotion. A measure of pleasantness known as valence can originate from
very good (pleasure) or very negative emotions (displeasure). Arousal, on the other hand,
is the level of feeling that a situation elicits and can range from positive excitement to
calmness (negative). Last but not least, dominance is the degree of control demonstrated
in response to a stimulus [1]. The popular Circumplex Model of Affect is depicted in
Fig. 1 and categories emotions into two groups: Low valence or negative valence emo-
tions (such as fear, tension, rage, sadness, boredom, etc.) and High valence or pleasant
valence emotions (happy, calm, delighted, excited, etc.).
are chosen from RNN. All the models are tested in the training and testing process to
check the accuracy and loss value and will be compared.
The remainder of the paper is structured as follows. Section 2 discusses the related
works which helped us to get the fundamental knowledge about the research work.
Section 3 describes System Model and Methodology. Section 4 describes the Dataset
description used in the paper. In Sect. 5, the complete environmental setup and results
were elaborated, including the model accuracy and data loss. Section 6 concludes the
paper with detailed future work and limitations.
2 Related Works
The C-RNN deep learning hybrid model, which combines CNN & RNN, was introduced
by Xiang Li et al. (2016) for the aim of recognizing emotions [3]. The data is pre-
processed using continuous wavelet transformation & body production before being
taught inside the model. For the arousal and valence dimensions, this test’s overall
performance is 74.12% and 72.06%, respectively. In their deep learning architecture,
they used DEAP dataset [4] for emotion recognition, Alhagry et al. (2017) recommended
LSTM. According to this method, the average accuracy for the arousal, valence, and
liking classes is 85.65%, 85.45%, and 87.99%, respectively.
Lin et al. performed emotional state classification in CNN using end -to-end learning
method and DEAP Dataset [5]. The datasets were turned into six grayscale images that
included frequency and time information, and the previously identified characteristics
were then taught using the AlexNet version. For arousal and valence, this study gives
accuracy of 87.30% and 85.50%, respectively. Li et al. (2017) used the DEAP dataset to
perform their emotion recognition task using a hybrid CNN and LSTM RNN (CLRNN)
[6]. Already converted into a series of Multidimensional Feature Images is the dataset.
With the hybrid neural networks suggested inside the study, every event may be accu-
rately classified as having a common emotion 75.21% of the time. In order to accomplish
emotion classification tasks, Acharya et al. (2020) examined the general performance
of CNN and LSTM models and performed feature extraction using FFT [7]. The test
outcome was excellent for LSTM and CNN model with an accuracy of 88.6% and 87.2%
respectively for the liking emotion.
Zhang et al. (2020) discussed different deep learning models like CNN, DNN, LSTM,
and combination of CNN and LSTM model along with their applications to the research
field of EEG-based emotion classification [8]. This study made substantial use of the
DEAP dataset, and many capabilities, including mean, maximum value, standard devi-
ation, minimum value, skewness, and kurtosis, were retrieved from it. The CNN model
with 90.12% accuracy and CNN-LSTM model with 94.17% accuracy shows excellent
ability to complete this task. Anubhav et al. (2020) investigated the EEG signals with
the goal of creating a headgear version for tracking real-time emotions [9]. From the
DEAP dataset band energy and frequency domain were recovered, and the accuracies
for valence and arousal dimensions were calculated with accuracy of 94.69% 93.13%
respectively using LSTM.
A 2D-CNN structure was suggested by Dar et al. (2020) to systematic EEG indica-
tions for emotion recognition [10]. The DREAMER & AMIGOS datasets are utilized
6 S. K. Dash et al.
for this test and before being input into CNN, each statistic is converted into 2D function
matrix (PNG format). The multi-modal emotion reputation system also uses different
peripheral physiological markers, such as ECG and GSR, in addition to EEG. Only
76.65% accuracy can be attained using the EEG modality, and multi-modal fusion is
required to achieve the overall maximum accuracy of 90.8% and 99.0% for DREAMER
and AMIGOS dataset respectively.
A. 1D-CNN Model
1D-CNN is used to extract the significant features from the DEAP dataset. CNN
works good on the time series data which are the 1D signals. In Conv1D the kernel
slides along one dimension only. This is one of the key justifications for using
1D-CNN in our research. As shown in Fig. 3, out of the 10 classes, we employed
three conv1D, three dense layers that were completely coupled, and one dense
layer with SoftMax activation. The first convolution layer employs the Rectified
linear unit (ReLU) as its activation function and has 164 filters and a kernel of
size 3. After hyperparameter tuning, optimization with Grid Search and manual
adjustments, the number and size of filters are determined. A shape of (70,1) with
the same padding and stride of one is feed into Conv1D’s first layer. To reduce
network overfitting, dropout on the dense layer outputs is implemented with 0.2
dropout probability. Following this dense layer of 21 ReLU-activated neurons with
a 0.2 dropout probability is a layer of 42 Tanh-activated neurons with a 0.2 dropout
probability. At the end Dense layer of 10 neurons with a SoftMax activation function
produces the network’s final output.
B. LSTM Model
Long Short-Term Memory Networks (LSTMs) is one type of recurrent neural net-
work (RNN), first introduced in 1997 by Hochreiter and Schmidhuber [12]. It solves
the problem of short-term memory. It has a built-in gate that can recognize which
information in a sequence has to be kept and which information can be discarded.
8 S. K. Dash et al.
Figure 4 shows the model architecture of LSTM, which consists of two dense lay-
ers, four LSTM layers, and one bi-directional layer. The initial bi-directional LSTM
layer contains 164 units. It involves adding a second LSTM layer on top of the first
one in the network. The first receives the input sequence, and the second receives
a reverse copy to the next layer. The dropout layer, which has a probability of 0.6,
comes next. Inputs are randomly set to 0 which helps to prevent overfitting. The
following layer is a 256-neuron LSTM layer, followed by a 0.6 dropout layer. Two
LSTM layers with 82 neurons each make up the next four layers, which are then fol-
lowed by a dropout layer. There were 0.6 and 0.4 percent dropout rates, respectively.
42 neurons make up the final LSTM layer with a dropout layer of 0.4 following that
21 units of dense layers is applied. ReLU is the activation method employed in this
case. The SoftMax activation function is then applied to dense layer of 10 classes,
which gives a multiclass probability distribution. Using argmax find out the class
output is done after knowing the probability of all the classes.
C. 1D-CNN-GRU Model
This variant is a hybrid model of the 1D-CNN and GRU of deep learning architec-
tures. The network’s first input size is 256 units, followed by two seconds of the
time-stamped signal with 256 data points, 128 units of convolutional filters, and
a kernel size of 3. Rectified linear unit (ReLU) activation function is used in the
first convolution layer. The precise number and size of filters are identified after
extensive hyperparameter optimization using Grid Search and manual adjustments.
Conv1D’s first layer receives as its input a shape of the form (70,1) with the same
padding. The outputs of the first layer are normalized using a batch normalized
layer, which has a mean value zero and a standard deviation value of one. The input
is down sampled in the following layer, dropout of 0.2 after a Max pooling 1D layer
with a pool size of 2 and the second convolutional layer, which is same as the first
one. The implementation of GRU comes after the convolutional layers with an input
length of 256 units and 32 units. At the end of every GRU layers a dropout layer of
0.2 has been set. A flattening operation is implemented to send the features into the
Ensemble Learning Model for EEG Based Emotion Classification 9
1D feature vector prior to dense layer. The dense layer is set to 32 units and ReLU is
used as the activation function. To represent the 4 labels of classification 4 units of
dense layer has been set. The activation function for the dense layer is SoftMax. In
this model 379,594 units of trainable parameter used. The details model architecture
of 1D-CNN-GRU is given in Fig. 5.
4 Dataset Description
The DEAP dataset [13] used in the experiment is publicly available for researchers for
their experiments. This data set contains both EEG and EMG signals. To collect the data
32 participants as engaged. In the dataset the physiological recordings and participant
evaluations of 32 individuals (s01-s32) are covered. These physiological clips are already
in BioSemi.bdf format and have not been processed. For each of them, 40 films were
presented which makes 40 channels in total. Depending on the rating, the emotion is
either stronger or weaker; the stronger the emotion, the higher the rating. Table 1 contains
each subject’s information, which contains two arrays: data and label, which contains
the array shape and the content of each file.
The data was filtered by a band-pass filter with a bandwidth of 4–45 Hz and down
sampled by 128 Hz. In addition to these, the collection includes listings and links to
YouTube music videos. Questions to ask before testing are contained in the participant
questionnaire file, each trial or video was given a rating on a scale of 1 to 9. The dataset is
10 S. K. Dash et al.
divided into four classes, which is subsequently labelled as: High-Valence Low-Arousal
(HVLA), Low-Valence High-Arousal (LVHA), and Low-Valence Low-Arousal (LVLA)
are four different types of arousal The Table 2 contains all the four classes and two labels,
the threshold value for this classification is 5. If the value is greater than 5, then it will
be classified as high and low if it is less than 5.
In our paper we have selected 14 channels AF3, AF4, F3, F4, F7, F8, FC5, FC6,
T7, T8, P7, P8, O1, O2 and 5 bands 4, 8, 12, 16, 25, 45 to reduce the computational
cost as well as for the better result for emotion classification [14]. This entire channel
selection process is based on the significance of the brain regions that make up emotional
states. When we divided the label into the four categories of HVHA, HVLA, LVHA, and
LVLA, the paper was considered to be complete. But for now, as a result, models will
be compared on the basis of an increase in training accuracy while decreasing validation
loss for the selection of a better classification model.
Google Collaboratory was used to compute 1D – CNN, LSTM, GRU classifiers because,
it uses Jupyter notebook service that needs no installation and gives unrestricted access
to computing tools, such as GPUs. Python is the python version (3.7.13). The current
version of TensorFlow is 2.8.0. Pandas: 1.3.5, numpy: 1.21.6, sklearn: 1.0.2, plotly: 5.5.0.
A laptop is used to run the code. Nvidia K80s, T4s, P4s, and P100s are common GPUs
seen in CoLab. To get an amazing result, hyperparameter should be tuned adequately.
Conv1D layers are utilized in the CNN architecture because they are best suited for
data in time series. Both maximum and average pooling were used, however maximum
pooling produced better results, as predicted by the literature. For the CNN, LSTM,
and 1D-CNN-GRU architectures, the finalized epoch size is 200 and batch size of 256.
The models are trained on 80–20 train–test splits and 10-fold cross validation is also
employed to determine the best metrics-accuracy. To update the weights during back-
propagation, used Adam as the optimizer and category cross entropy as the loss function.
In both cases, SoftMax performs the activation of the last layer. Separate decisions were
made for each of the three models, including the number of layers, hidden layers, filter
size, number of filters, pool size for the CNN model, and hidden neurons, dropout rates,
and layers for the LSTM and GRU models separately. Both grid search and manual
testing are used to finalize everything.
Ensemble Learning Model for EEG Based Emotion Classification 11
Overall performance of the three models can be elaborated and analyzed on the
basic of accuracy and loss value. Table 3 contains test accuracy and test loss of each
model. It can be inferred that, the 1D-CNN-GRU model architecture provide the best
test accuracy of 96.54%, 41.3% of test loss with an 80–20 train test split as compared
to the LSTM model architecture’s accuracy of 89.6%, test loss of 39.6% with an 80–20
train test split and the 1D-CNN model architecture’s accuracy of 90.65%, test loss of
42.2% with an 80–20 train test split. All these three experiments were designed to test
the overall performance of each model for classification of emotion.
Figure 6, Fig. 7, Fig. 8 shows model accuracy and model loss of LSTM, 1D-CNN,
1D-CNN-LSTM respectively. In model accuracy curves the train and test curve goes
up award direction with increase of epoch, where as in model loss figure it goes down
with increase of epoch. Curves were found to have a minor variation, The 1D-CNN
model starts learning earlier than the LSTM model and where as it took the CNN model
about 50 epochs to reach a stable point, the LSTM model took about 130 epochs. No
overfitting took place, and the training process came to an end after 165 epochs. Each
training period takes between 16 and 330 ms. Figure 9 shows test model of LSTM,
1D-CNN and 1D-CNN-GRU, which makes a curve between test loss and test accuracy,
when the accuracy increases the value loss decreases by the increase of epoch.
Ensemble Learning Model for EEG Based Emotion Classification 13
Dropout and batch normalisation layers have a big impact on the model’s accuracy.
Additionally, we constructed a confusion matrix in Fig. 10 to explore the discrepancy
between the predicted and actual value. Each model’s F1-Score and recall value are close
to one, which shows that this model has good quality.
14 S. K. Dash et al.
6 Conclusion
In this paper we have discussed the simplest feature extraction method with the best
classification model for emotion classification using DEAP dataset. In this paper, we
have described three deep learning models: 1D-CNN, LSTM, and 1D-CNN-GRU. As
compared to normal feature extraction strategies, FFT increased accuracy and extracted
crucial characteristics. The 1D-CNN design has proven to be best model to extract EEG
signal features. The 1D-CNN architecture has a classification accuracy of 90.8% which
is somewhat better than the 89.2% classification accuracy of the LSTM model. From all
the three models the 1D – CNN – GRU gives the best accuracy of 96.54%.
Bi-LSTMs were able to preserve data from the past as well as the future, which
contributed to increase the accuracy in the LSTM model. Even though the emotion
classification test showed that our model worked remarkably well, we still wish to assess
it further in additional datasets like DREAMER and AMIGOS and enhance our model.
More particular, while this version no longer undergoes testing on various people, it was
best trained using the DEAP dataset only.
In future we would try to work on quick output of the EEG data processing in real-
time online analysis systems, which limits calculation time. We will concentrate on a
multi-task cascaded-hybrid LSTM and CNN model in the future, which will combine
their features and improve the efficacy of the emotion classification model. The system
to detection of emotion can improve human experiences by minimizing the gap between
16 S. K. Dash et al.
computational technology and human emotions and allowing computers, BCI system and
robots to receive emotional feedback in real-time. Even with the help of this technology,
therapists can more thoroughly evaluate their patients and learn how to spot depression
early and prevent it before any outward situation occurs.
References
1. Alarcao, S.M., Fonseca, M.J.: Emotions recognition using EEG signals: a survey. IEEE Trans.
Affect. Comput. 10(3), 374–393 (2017)
2. Teplan, M.: Fundamentals of EEG measurement. Measur. Sci. Rev. 2(2), 1–11 (2002)
3. Li, X., Song, D., Zhang, P., Yu, G., Hou, Y., Hu, B.: Emotion recognition from multi-channel
EEG data through convolutional recurrent neural network. In: 2016 IEEE International
Conference on Bioinformatics and Biomedicine (BIBM), pp. 352–359. IEEE (2016)
4. Alhagry, S., Fahmy, A.A., El-Khoribi, R.A.: Emotion recognition based on EEG using LSTM
recurrent neural network. Int. J. Adv. Comput. Sci. Appl. 8(10), 355–358 (2017)
5. Lin, W., Li, C., Sun, S.: Deep convolutional neural network for emotion recognition using
EEG and peripheral physiological signal. In: Zhao, Y., Kong, X., Taubman, D. (eds.) ICIG
2017. LNCS, vol. 10667, pp. 385–394. Springer, Cham (2017). https://doi.org/10.1007/978-
3-319-71589-6_33
6. Li, Y., Huang, J., Zhou, H., Zhong, N.: Human emotion recognition with electroencephalo-
graphic multidimensional features by hybrid deep neural networks. Appl. Sci. 7(10), 1060
(2017)
7. Acharya, D., et al.: Multi-class emotion classification using EEG signals. In: Garg, D., Wong,
K., Sarangapani, J., Gupta, S.K. (eds.) IACC 2020. CCIS, vol. 1367, pp. 474–491. Springer,
Singapore (2021). https://doi.org/10.1007/978-981-16-0401-0_38
8. Zhang, Y., et al.: An investigation of deep learning models for EEG-based emotion recognition.
Front. Neurosci. 14, 622759 (2020)
9. Nath, D., Singh, M., Sethia, D., Kalra, D., Indu, S.: An efficient approach to EEG-based
emotion recognition using lstm network. In: 2020 16th IEEE International Colloquium on
Signal Processing and its Applications (CSPA), pp. 88–92. IEEE (2020)
10. Dar, M.N., Akram, M.U., Khawaja, S.G., Pujari, A.N.: CNN and LSTM-based emotion
charting using physiological signals. Sensors 20(16), 4551 (2020)
11. Chollet, F. (2017). Keras (2015)
12. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780
(1997)
13. https://www.eecs.qmul.ac.uk/mmv/datasets/deap/readme.html
14. Al-Qazzaz, N.K., Sabir, M.K., Ali, S., Ahmad, S.A., Grammer, K.: Effective EEG channels
for emotion identification over the brain regions using differential evolution algorithm. In:
2019 41st Annual International Conference of the IEEE Engineering in Medicine and Biology
Society (EMBC), pp. 4703–4706. IEEE (2019)
Foundation for the Future of Higher Education
or ‘Misplaced Optimism’? Being Human
in the Age of Artificial Intelligence
Rekhi Centre of Excellence for the Science of Happiness, Indian Institute of Technology
Kharagpur, Kharagpur, West Bengal, India
[email protected]
Abstract. Several publications from across the globe have noted the rapid growth
of the field of Artificial Intelligence in Education (AIEd). Even though it has been
around for over 30 years, many professors are still confused about its implementa-
tion in their classrooms. This research surveys the existing literature on this issue
by means of a systematic review. Only 112 of the 2984 articles identified between
2006 and 2021 met the exclusion and inclusion criteria necessary for incorporation
in the final synthesis. Descriptive results show that STEM and subjects related to
computer science predominate in AIEd articles and that ‘quantitative methods’
predominate in empirical research. The findings are arranged into 4 categorical
groupings: (1) intelligent tutoring systems; (2) personalization and adaptive sys-
tems; (3) evaluation and assessment; and (4) prediction and profiling, all of which
can be applied to institutional and administrative services, academic support ser-
vices, and assessment and evaluation. The findings call for firm attention towards
the lack of critical thinking on the challenges and risks of AIEd and towards the
necessity for more comprehensive research on ethical and pedagogical techniques
in the deployment of AIEd in higher education.
1 Introduction
In recent years, there has been a lot of buzz about how artificial intelligence (AI) may
be used in classrooms. The 2018 Horizon report cites artificial intelligence and adaptive
learning technologies as major advances in EdTech [1, 27]. Experts forecast a 43%
increase in the use of AI in education between 2018 and 2022. Netherlands’ Technical
University of Eindhoven has announced plans to hire 50 new faculty members to work
for a new ‘Institute for Artificial Intelligence Systems’ dedicated to AI education and
research [2, 3, 28]. Studies on the implementation of AI in classrooms date back around
30 years [4, 29].
This year will be the 20th time the AIEd conference has been conducted by the
International AIEd Society [5, 6, 30]. The development of AI applications in higher
education raises new ethical challenges and risks [7, 31]. Managers, for instance, may
be tempted to replace training with more profitable automated AI solutions in times of
financial strain [8, 32]. Chatbots, expert systems, and intelligent tutors could cause con-
cern among educators, teaching assistants, counsellors, and administrators who work in
the education sector [9, 33]. While AI has the potential to enhance learning analytics,
the fact that these systems demand huge volumes of data, particularly sensitive informa-
tion about professors and students, creates major privacy and data protection problems.
Several groups, including the Analysis & Policy Observatory in Australia, have recently
published a framework for the ethical regulation of AI in educational settings [10, 34].
Every AI researcher has to be concerned about how their findings will be interpreted
morally. We are interested in learning about the novel ethical risks and repercussions that
have been envisioned by researchers and authors working in the field [11, 12, 35]. The
goal of this research article is to offer a synopsis of studies that examine AI’s potential
contributions to higher education.
Using a systematic review, this paper focuses on the following three areas of inquiry:
Though the origins of AI lie in computer science and engineering, other disciplines,
including philosophy, cognitive science, neurology, and economics, have had substantial
impacts on the area. Even though many academics are unaware of the breadth and,
more crucially, what is included, AI-based educational and pedagogical tools are being
introduced into higher education.
considered an agent [18, 41]. Specialists in the subject make a distinction between weak
and strong artificial intelligence as well as particular and wide artificial intelligence.
Whether computers can think for themselves, as opposed to just acting logically and
mimicking the human mind, is still a philosophical question open to debates and discus-
sions [19, 42]. An AI as advanced and comprehensive as this one appears unlikely to
appear very soon. In academia, intelligent agents and information systems are referred
to as GOFAI, which stands for “good old-fashioned AI”. John Haugeland, a philosopher,
came up with this term [20, 43].
There are now three types of AI software solutions utilized in education: intelli-
gent virtual reality, intelligent aid for group learning, and intelligent personal tutors.
Intelligent tutoring systems (ITS) have the potential to mimic in-person, one-on-one
tutoring [21, 44]. Based on learner models, algorithms, and neural networks, they could
choose the student’s learning path and the content to be taught. Cognitive scaffolding and
teacher-student communication are two further benefits [22, 45]. The vast majority of
research indicates that education is best accomplished in a group setting. Collaboration
and discussion are crucial to the educational process. It is essential, however, to facilitate
and govern digital teamwork [23, 46]. Assisting adaptive group construction based on
learner models, AIEd may also promote online group engagement or summarise talks
that a human teacher may use to guide students toward the course’s aims and objectives
[24, 47]. Collaborative learning may be aided by all these methods. Intelligent virtual
reality (IVR), which also makes use of ITS, is used to immerse students in realistic VR
and game-based learning environments [25, 48]. In remote or online labs, simulated
humans may play the roles of teachers, facilitators, or even other students [26, 49].
Artificial intelligence can provide immediate assessments and suggestions [21, 50].
Instead of relying only on periodic assessments, teachers may integrate AIEd into their
lesson plans for continuous monitoring of student progress [8, 51]. Algorithms have
been employed with a high degree of accuracy to predict whether a student would fail
an assignment or withdraw from a course [19, 52]. Learner-facing, teacher-facing, and
system-facing are the three primary perspectives from which to examine AI technologies
in education [13, 53].
Learner-facing artificial intelligence technologies include software used by students
to study a subject, such as adaptive or personalized learning management systems [18,
54]. Teacher-facing technology help reduce the workload of the educator by automating
tasks like course management, student assessment, instructor feedback, and plagiarism
checking [23, 55]. Teachers may monitor their students’ progress in their lessons with
the help of AIEd technologies and then respond accordingly with guidance and support.
System-facing helps managers and administrators gather data at the institutional level
[8, 56].
In this paper, we apply the concept of the student life cycle to the setting of higher edu-
cation as a theoretical model for describing the many services anchored in AI, available
both for administrative and institutional purposes and to support the academic teaching
and learning process.
20 A. Alam and A. Mohanty
3 Methods
A systematic review seeks to address specific issues by using a clear, consistent, and
repeatable search strategy to identify relevant studies for inclusion or exclusion. Next,
we summarise the findings, discuss how they may be used in practice, and call attention
to any gaps or inconsistencies by retrieving and codifying data from the included study.
This article provides a map of 112 papers dealing with AI in academic settings.
Although problems exist in the peer-review process, our assessment restricted itself to
articles published in peer-reviewed journals due to their credibility and rigorous review
standards. The first search was performed in January of 2021 and 2984 records were
located. After weeding out the duplicates, it was agreed that only articles published in
2006 or later would be included. It was also decided that the corpus would only include
articles that dealt with the application of AI to academic settings.
At this stage of screening, sensitivity rather than specificity was necessary, therefore
articles were included rather than rejected after being examined by a team of four coders.
Sessions were held often to discuss the first 80 entries and determine their inclusion or
exclusion. The coding decisions made by the four coders (A, B, C, and D) were evaluated
using Cohen’s kappa (κ), a coefficient for consistency across raters, to determine inter-
rater reliability. Random selection led to the examination of twenty papers. Overall, the
Kappa values for the four coders were quite high (between 0.81 and 0.89). Therefore, it
is reasonable to conclude that there is high inter-rater reliability.
After the first screening, 268 articles met the criteria to go on to the full-text phase.
Unfortunately, 81 publications could not be retrieved due to issues with the library’s order
system or with contacting the authors. A total of 189 articles were retrieved, screened,
and coded, however only 112 were included in the final synthesis.
EPPI Reviewer, a tool used for systematic reviews, was loaded with all of the articles.
Articles were evaluated according to their research methodology (empirical vs. descrip-
tive, academic setting) and primary author’s area of study. AI applications were also
considered. The concept of AI and any references to its benefits and downsides in the
papers were also coded. Descriptive analysis was conducted in R, using the tidyr tool
for handling data.
3.4 Limitations
Although every effort was made to ensure the accuracy of the included studies, the
methods used in each research always result in some degree of error, and this systematic
Foundation for the Future of Higher Education 21
review is no exception. Although the three databases of educational research that were
chosen are large and worldwide in reach, this analysis did not include research on AI that
had been published in other languages. This was accomplished by focusing on English-
language, peer-reviewed papers. Papers published in journals that were not indexed in any
of the three databases were not included in this review. Additional databases, publication
types, and language versions of publications might be used in future research to increase
the study’s breadth. This would need a thorough evaluation of the project’s available
resources and the feasibility of conducting the review.
4 Results
The term artificial intelligence (AI) is used to describe computer systems or intelligent
agents that exhibit human-like intelligence by mimicking human cognitive abilities such
as learning, memory, perception, and interaction with the environment, as well as lan-
guage [15, 57]. Artificial intelligence, or AI, refers to machines that can simulate human
intelligence. The purpose of this wide-ranging academic discipline is to learn about the
inner workings of the human brain so that we might apply those discoveries to the devel-
opment of better technological tools [8, 58]. Artificial intelligence (AI) may play the
role of either a teacher or a student in a language class.
The incorporation of agent-based, individualized instruction raises serious concerns
about personal data privacy [19, 59]. Agents may pick up on a wide variety of learner
attributes, like preferences and aptitude, without any human input. Data pertaining to an
individual’s identity is, in fact, confidential [4, 60].
Many learners are uncomfortable with the idea that their individual characteristics
may be made public. If they are struggling academically, students with special education
needs may feel their teachers will treat them differently. For this reason, the issue of
privacy must be resolved before employing agent-based systems [24, 60]. Many public
schools cannot afford the time and money needed to develop and execute AI-based
techniques, which is another barrier to its usage [13, 61].
We have utilized the concept of a student’s life-cycle as a framework to define the
many AI-based services provided at the institutional and administrative level, such as
admission, counselling, and library services, and at the academic support level, such
as evaluation, feedback, and tutoring [26, 62]. The following four domains of artificial
intelligence use were identified using a comprehensive literature study and iterative
coding procedure: affirmative action and personalization, evaluation and assessment,
profiling and prediction, and intelligent tutoring systems [5, 63].
Many AI tools rely on learner models or profiles to make predictions, such as which
students are more likely to enroll in a program or to drop out, and to provide stu-
dents with timely assistance, feedback, and guidance on content-related concerns as
they go through their studies [12]. Dropout/retention, student models/performance, and
admission/scheduling are the three main subsets of profiling/prediction [24, 32].
22 A. Alam and A. Mohanty
Research in this area has made use of machine learning strategies for classifying
patterns, modelling student profiles, and making forecasts. Several machine learning
techniques, such as artificial neural networks (ANN), support vector machines (SVM),
random forests, and neural networks, are used to assess the overall prediction accuracy of
conventional logistic regression. In terms of percentage classification accuracy, machine
learning approaches exceed logistic regression [12, 33]. Classifier performance may also
be evaluated using the F1-score, which takes into consideration the proportion of cor-
rectly classified positive cases, erroneously classified negative instances, and incorrectly
classified positive instances [3, 34].
It is crucial to have a reliable evaluation of students’ academic performance for use
in admissions decisions and to boost educational services [5, 35]. The applications might
be sorted using the support vector machine (SVM) method, which has a 95% accuracy
rate. SVM may be used to find geographical patterns that provide prospective students
from specific places an edge in the college admissions process [19, 36].
Using a model trained with data from one state or province, an ANN may make
predictions about registration rates in other parts of the country [14, 37]. A student’s
course selection might be affected by several factors, including the quality of the course
and the instructor, the amount of work involved, the mode of delivery, and the scheduling
of the examination. Since admissions decisions can often be predicted with high accuracy,
an AI solution might free up administrative staff from routine tasks so that they can focus
on more complex cases [21, 38].
As a consequence of studies on student attrition and re-enrollment, early warning
systems have been developed to spot potentially disengaged freshmen. Predicting attri-
tion may be done using classification methods like logistic regression, decision trees
(DT), and artificial neural networks (ANN) [26, 39]. Students’ demographic, academic,
and economic characteristics should all be included in the data (e.g., age, sex, ethnicity,
GPA, etc.). The ANN model has the highest performance with an accuracy rating of over
80% which is checked after 10 rounds of cross-validation [15, 40].
Technology based on AI is helping with student profiling and modelling learning
behaviours for the purpose of predicting academic achievement [20, 41]. Several machine
learning algorithms are used to analyze student behavioural data from the virtual learning
environment to predict student involvement [6, 42]. Smart prescriptive algorithms enable
automated detection of disinterested learners and prompt intervention. Students’ progress
on projects is evaluated in workshops using face tracking and hand tracking [20, 43].
The outcomes supplied by multimodal data may help educators get insight into critical
features of project-based learning activities. How undergraduates learn to code may be
analyzed by looking at the code transcripts they write for software development projects
[11, 44]. Algorithms based on artificial intelligence may predict students’ academic
motivation based on their actions in a virtual classroom [21, 45]. Studying AI-based
models helps tremendously in creating intelligent tutoring systems and flexible learning
environments [5, 46].
first known ITS was the SCHOLAR system, which was established in 1970 and allowed
for question-and-answer sessions between professors and students but did not provide
continuous interaction [9, 47]. ITS is more efficient than other methods of instruction,
including lectures, textbooks, online reading, and homework [14, 48]. ITS provides stu-
dents with course materials and supports them via adaptive feedback, question-specific
strategies, and the capacity to identify when a student is struggling [7, 49]. The ITS
enables this by keeping tabs on where each student is at any given time.
Errors may be identified and corrected with the help of a discussion between the
learner and the machine using an instructional conversation toolkit-based tutoring system
or a pervasive interactive teaching robot with question recognition-based speech [9, 50].
The ITS acts as a peer mentor, collaborating with a student to find solutions to their
issues. They can talk, sign, and organize their messages. They do not get tutoring but
rather engage in cooperative problem-solving [24, 51]. A possible label for this scenario
is ‘cooperation amongst peers’. With the data gathered from each student’s participation
in the course, ITS can tailor their assistance to each individual’s needs while they are
enrolled in an online course [17, 52]. With this information, the system can recommend
the best books to read, exercises to do, and other individualized plans of action. A smart
assistant is stationed in a simulated statistical mechanics laboratory, where it presents
activities, assesses students’ understanding of the topic, and tailors its presentation of
the information to each individual learner [19, 53].
The basic purpose of ITS is to promote academically fruitful conversation movements
in online collaborative learning debates [23, 54]. It helps to encourage collaborative writ-
ing by automatically generating questions, providing automated feedback, and analyzing
the process. Teachers are able to act when necessary, thanks to intelligent assistants who
compile summaries of each student’s progress and engagement in group work, alert
notifications based on the identification of conflict situations, and data regarding each
student’s preferred method of learning [17, 55]. The ITS breaks up the tutoring obliga-
tions of the instructors by automating chores and offering timely feedback, leaving the
instructors responsible for supplying new clues and the correct responses. As a result, it
makes the lives of teachers easier [13, 56].
Artificial intelligence is used to determine how well students have retained the infor-
mation and applied what they have learned [5, 57]. Learners may benefit from using
tools like Latent Semantic Analysis and ePortfolios to map out unique courses of study.
Semantic web technology may be used to translate student credentials from different
universities to facilitate credit transfers [8, 58]. Course descriptions and syllabi may be
made available using these technologies as well. Algorithms may be used to pair up
prospective students with the skills and knowledge employers are looking for, allowing
instructors to tailor their lessons to the specific demands of the workforce. When it comes
to making judgments and evaluations, AI programs are highly precise and efficient. How-
ever, due to the calibration and training requirements of supervised machine learning
systems, they are best suited for large-enrollment classes or programs. Automated grad-
ing and feedback systems, assessing students’ knowledge, engagement, and academic
24 A. Alam and A. Mohanty
integrity, and evaluating teachers’ efficacy are the four main types of AI assessment and
evaluation used in the classroom [21, 59, 64].
Student essays may be graded automatically with the use of open-source Java soft-
ware used in automated grading, commonly known as Automated Essay Scoring (AES)
systems [18, 60]. Using AES would be challenging in small schools because of the large
number of pre-scored exams required for calibration, and AES may not be appropriate
for all forms of writing. One of the benefits of using algorithms to analyze text responses
is that it shifts the focus of evaluation away from students’ knowledge and abilities and
toward their ability to rewrite and improve their work [18, 61].
Intelligent agents provide reminders or help to pupils when they become lost or stuck
in their tasks. Aspiring pilots may now use software that will alert them if they start to
lose situational awareness in the air [23, 62]. The cognitive load on students is reduced
since lexical properties in machine learning systems give automatic feedback and help
students create better essays [8, 18]. For example, an adaptive testing-based automated
feedback system selects the most appropriate answers for each student based on Bloom’s
taxonomy of cognitive domains and then recommends related reading and exercises [9,
22]. Tools have been developed to help students evaluate their conceptual understanding
and get individualized instruction. These formulas factor in students’ performance on
tests and other assessments, as well as their activity in the virtual learning environment
[11, 16]. Academic integrity is assessed by using machine learning algorithms to identify
instances of possible plagiarism in student work [8, 17]. Data mining techniques are used
to analyze course evaluations and determine an instructor’s effectiveness based on several
different classification strategies [7, 18]. Comparatively speaking, using an algorithm to
evaluate instructional approaches yields more accurate results [19, 26].
This article looks at the field of AIEd. In this research, we provide a summary of the
many ways AI might be used to improve the educational experience for college stu-
dents, teachers, and administrators. Profiling and prediction, intelligent tutoring systems,
assessment and evaluation, and adaptive systems and customization were the four main
themes under which they were studied. In order to better conceptualize and comprehend
Foundation for the Future of Higher Education 25
AIEd practice and research, a framework was developed via a systematic review. On
the other hand, there is still a substantial window of opportunity for educators to pursue
innovative and significant research and practice with AIEd that may have an effect on
teaching and learning in higher education due to the scarcity of longitudinal studies, the
predominance of descriptive and pilot studies from a technological standpoint, and the
predominance of quantitative methods, particularly quasi-experimental methods. There
is a dearth of research on the effects of policies and their actual implementation.
Throughout the various stages of a student’s academic career, AI-based tools and
services can be extremely helpful for all parties involved. This is important for uni-
versities with a large student body, like open and remote learning colleges. It could be
helpful to provide options for adaptable, interactive, and personalized education. This
may, for example, relieve teachers of the burden of manually grading hundreds, if not
thousands, of assignments, enabling them to focus on their core duty, i.e., providing
sympathetic human instruction. It is crucial to underline the need of considering not just
the technological elements of AIEd, but also the pedagogical, ethical, social, cultural,
and economic ones. The danger, of course, is in taking data and code at face value. Due
to education’s inherent complexity, it cannot be reduced to a set of purely quantitative
variables and methods. Digital data, like all digital technologies, may seem like a simple
technological solution to educational problems, but despite the promising results, they
do not offer such a solution.
Pedagogically sound goals, rather than technically feasible ones, should be pursued.
In China, teachers are already able to see data about their students’ participation and
emotions in class thanks to face recognition technology displayed on a dashboard. Some-
times, even the most sophisticated AI systems may make a mistake. An AI system cannot
acquire intelligence without the training data used to develop it. Every one of the many
issues discussed in the new UNESCO study on the prospects and obstacles of AIEd
for sustainable development is laden with important educational, societal, and ethical
implications. For example, it discusses how to assure inclusion and equality in AIEd,
how to educate teachers for AI-powered education, how to construct high-quality and
inclusive data systems, and how to be ethical and transparent while collecting, utilizing,
and distributing data.
The most surprising aspect of this assessment is the astounding lack of critical con-
sideration of the potential dangers and educational implications of using AI technologies
in higher education. Recently conducted empirical research seldom addressed privacy
problems in terms of ethical consequences. Educators and learning designers need to
perform more research on how to include AI applications throughout the student lifecy-
cle in order to take advantage of the immense potential that these technologies have for
constructing intelligent learning and teaching systems. Our systematic review’s absence
of authors with links to education departments demonstrates the need for a pedagogical
lens to be applied to these innovations in technology. Possible consequences of this the-
oretical vacuum for the whole area of educational technology are discussed. More than
forty percent of the studies in three premier journals for educational technology lacked
any practical application. Explicit educational views were missing from the papers that
were reviewed. Unfortunately, there is currently no evidence to back the development
26 A. Alam and A. Mohanty
References
1. Chatterjee, S., Bhattacharjee, K.K.: Adoption of artificial intelligence in higher education: a
quantitative analysis using structural equation modelling. Educ. Inf. Technol. 25(5), 3443–
3463 (2020)
2. Alam, A.: Challenges and possibilities in teaching and learning of calculus: a case study of
India. J. Educ. Gifted Young Sci. 8(1), 407–433 (2020)
3. Bates, T., Cobo, C., Mariño, O., Wheeler, S.: Can artificial intelligence transform higher
education? Int. J. Educ. Technol. High. Educ. 17(1), 1–12 (2020). https://doi.org/10.1186/s41
239-020-00218-x
4. Dilmurod, R., Fazliddin, A.: Prospects for the introduction of artificial intelligence technolo-
gies in higher education. Academicia: Int. Multi. Res. J. 11(2), 929–934 (2021)
5. Knox, J.: Artificial intelligence and education in China. Learn. Media Technol. 45(3), 298–311
(2020)
6. Alam, A.: Designing XR into higher education using immersive learning environments (ILEs)
and hybrid education for innovation in HEIs to attract UN’s education for sustainable devel-
opment (ESD) Initiative. In: 2021 International Conference on Advances in Computing,
Communication, and Control (ICAC3), pp. 1–9. IEEE (2021)
7. Guan, C., Mou, J., Jiang, Z.: Artificial intelligence innovation in education: a twenty-year
data-driven historical analysis. Int. J. Innovation Stud. 4(4), 134–147 (2020)
8. Chen, X., Xie, H., Zou, D., Hwang, G.J.: Application and theory gaps during the rise of
artificial intelligence in education. Comput. Educ.: Artif. Intell. 1, 100002 (2020)
9. Alam, A.: Educational robotics and computer programming in early childhood education:
a conceptual framework for assessing elementary school students’ computational thinking
for designing powerful educational scenarios. In: 2022 International Conference on Smart
Technologies and Systems for Next Generation Computing (ICSTSN), pp. 1–7. IEEE (2022)
10. Alyahyan, E., Düştegör, D.: Predicting academic success in higher education: literature review
and best practices. Int. J. Educ. Technol. High. Educ. 17(1), 1–21 (2020). https://doi.org/10.
1186/s41239-020-0177-7
11. Rampersad, G.: Robot will take your job: innovation for an era of artificial intelligence. J.
Bus. Res. 116, 68–74 (2020)
12. Chen, L., Chen, P., Lin, Z.: Artificial intelligence in education: a review. Ieee Access 8,
75264–75278 (2020)
13. Cope, B., Kalantzis, M., Searsmith, D.: Artificial intelligence for education: knowledge and
its assessment in AI-enabled learning ecologies. Educ. Philos. Theory 53(12), 1229–1245
(2021)
14. Alam, A.: Mapping a sustainable future through conceptualization of transformative learning
framework, education for sustainable development, critical reflection, and responsible citi-
zenship: an exploration of pedagogies for twenty-first century learning. ECS Trans. 107(1),
9827 (2022)
15. Yilmaz Ince, E., Kabul, A., Diler, İ: Distance education in higher education in the COVID-19
pandemic process: A case of Isparta Applied Sciences University. Int. J. Technol. Educ. Sci.
4(4), 345–351 (2020)
16. Alam, A. (2022). Employing Adaptive Learning and Intelligent Tutoring Robots for Virtual
Classrooms and Smart Campuses: Reforming Education in the Age of Artificial Intelligence.
In: Shaw, R.N., Das, S., Piuri, V., Bianchini, M. (eds) Advanced Computing and Intelligent
Technologies. Lecture Notes in Electrical Engineering, vol 914. Springer, Singapore
Foundation for the Future of Higher Education 27
17. Holmes, W., Bialik, M., Fadel, C.: Artificial Intelligence in Education (2020)
18. Wang, T., Cheng, E.C.K.: Towards a tripartite research agenda: a scoping review of artificial
intelligence in education research. In: Cheng, E.C.K., Koul, R.B., Wang, T., Xinguo, Y.
(eds.) Artificial Intelligence in Education: Emerging Technologies, Models and Applications.
LNDECT, vol. 104, pp. 3–24. Springer, Singapore (2022). https://doi.org/10.1007/978-981-
16-7527-0_1
19. Nemorin, S., Vlachidis, A., Ayerakwa, H.M., Andriotis, P.: AI hyped? A horizon scan of
discourse on artificial intelligence in education (AIED) and development. Learn., Media
Technol. 1–14 (2022). https://doi.org/10.1080/17439884.2022.2095568
20. Alam, A.: Cloud-based e-learning: scaffolding the environment for adaptive e-learning
ecosystem based on cloud computing infrastructure. In: Computer Communication, Net-
working and IoT: Proceedings of 5th ICICC 2021, vol. 2, pp. 1–9. Springer Nature Singapore,
Singapore (2022)
21. Holmes, W., Porayska-Pomsta, K. (eds.): The Ethics of Artificial Intelligence in Education:
Practices, Challenges, and Debates. Taylor & Francis (2022)
22. Chen, X., Zou, D., Xie, H., Cheng, G., Liu, C.: Two decades of artificial intelligence in
education. Educ. Technol. Soc. 25(1), 28–47 (2022)
23. Paek, S., Kim, N.: Analysis of worldwide research trends on the impact of artificial intelligence
in education. Sustainability 13(14), 7941 (2021)
24. Akgun, S., Greenhow, C.: Artificial intelligence in education: addressing ethical challenges
in K-12 settings. AI and Ethics 2, 431–440 (2021). https://doi.org/10.1007/s43681-021-000
96-7
25. Bhimdiwala, A., Neri, R.C., Gomez, L.M.: Advancing the design and implementation of
artificial intelligence in education through continuous improvement. Int. J. Artif. Intell. Educ.
32(3), 756–782 (2022)
26. Alam, A.: Test of knowledge of elementary vectors concepts (TKEVC) among first-semester
bachelor of engineering and technology students. Periódico Tchê Química 17(35), 477–494
(2020)
27. Ouyang, F., Jiao, P.: Artificial intelligence in education: the three paradigms. Comput. Educ.:
Artif. Intell. 2, 100020 (2021)
28. Holmes, W., et al.: Ethics of AI in education: towards a community-wide framework. Int. J.
Artif. Intell. Educ. 32(3), 504–526 (2022)
29. Megahed, N.A., Abdel-Kader, R.F., Soliman, H.Y.: Post-pandemic education strategy: frame-
work for artificial intelligence-empowered education in engineering (AIEd-Eng) for lifelong
learning. In: International Conference on Advanced Machine Learning Technologies and
Applications, pp. 544–556. Springer, Cham (2022)
30. Dickler, R., Dudy, S., Mawasi, A., Whitehill, J., Benson, A., Corbitt, A.: Interdisciplinary
approaches to getting ai experts and education stakeholders talking. In: Rodrigo, M.M., Mat-
suda, N., Cristea, A.I., Dimitrova, V. (eds.) Artificial Intelligence in Education. Posters and
Late Breaking Results, Workshops and Tutorials, Industry and Innovation Tracks, Practition-
ers’ and Doctoral Consortium. AIED 2022. Lecture Notes in Computer Science, vol. 13356.
Springer, Cham (2022). https://doi.org/10.1007/978-3-031-11647-6_20
31. Alam, A.: Positive psychology goes to school: conceptualizing students’ happiness in 21st
century schools while ‘minding the mind!’are we there yet? evidence-backed, school-based
positive psychology interventions. ECS Trans. 107(1), 11199 (2022)
32. Wang, T., Cheng, E.C.K.: An investigation of barriers to Hong Kong K-12 schools
incorporating artificial intelligence in education. Comput. Educ.: Artif. Intell. 2, 100031
(2021)
33. Chan, L., Hogaboam, L., Cao, R.: Artificial intelligence in education. In: Applied Artificial
Intelligence in Business, pp. 265–278. Springer, Cham (2022)
28 A. Alam and A. Mohanty
34. Khosravi, H., et al.: Explainable artificial intelligence in education. Comput. Educ.: Artif.
Intell. 3, 100074 (2022)
35. Alam, A.: A digital game based learning approach for effective curriculum transaction for
teaching-learning of artificial intelligence and machine learning. In: 2022 International Con-
ference on Sustainable Computing and Data Communication Systems (ICSCDS), pp. 69–74.
IEEE (2022)
36. Schiff, D.: Out of the laboratory and into the classroom: the future of artificial intelligence in
education. AI & Soc. 36(1), 331–348 (2020). https://doi.org/10.1007/s00146-020-01033-8
37. Sadiku, M.N., Musa, S.M., Chukwu, U.C.: Artificial Intelligence in Education. iUniverse
(2022)
38. Lameras, P., Arnab, S.: Power to the teachers: an exploratory review on artificial intelligence
in education. Information 13(1), 14 (2021)
39. Ezzaim, A., Kharroubi, F., Dahbi, A., Aqqal, A., Haidine, A.: Artificial intelligence in
education-State of the art. Int. J. Comput. Eng. Data Sci. 2(2), 1–11 (2022)
40. Alam, A.: Possibilities and apprehensions in the landscape of artificial intelligence in edu-
cation. In: 2021 International Conference on Computational Intelligence and Computing
Applications (ICCICA), pp. 1–8. IEEE (2021)
41. Bozkurt, A., Karadeniz, A., Baneres, D., Guerrero-Roldán, A.E., Rodríguez, M.E.: Artificial
intelligence and reflections from educational landscape: a review of AI studies in half a
century. Sustainability 13(2), 800 (2021)
42. Sharples, M.: Automated essay writing: an AIED opinion. Int. J. Artif. Intell. Educ. 32(4),
1119–1126 (2022). https://doi.org/10.1007/s40593-022-00300-7
43. Biswas, G., Bull, S., Kay, J., Mitrovic, A. (eds.): AIED 2011. LNCS (LNAI), vol. 6738.
Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21869-9
44. Ye, R., Sun, F., Li, J.: Artificial intelligence in education: origin, development and rise. In:
Liu, X.-J., Nie, Z., Jingjun, Y., Xie, F., Song, R. (eds.) ICIRA 2021. LNCS (LNAI), vol.
13016, pp. 545–553. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-89092-6_49
45. Alam, A.: Should robots replace teachers? Mobilisation of AI and learning analytics in edu-
cation. In: 2021 International Conference on Advances in Computing, Communication, and
Control (ICAC3), pp. 1–12. IEEE (2021)
46. Zhang, K., Aslan, A.B.: AI technologies for education: Recent research & future directions.
Comput. Educ.: Artif. Intell. 2, 100025 (2021)
47. Khazanchi, R., Khazanchi, P.: Artificial intelligence in education: a closer look into intelligent
tutoring systems. In: Handbook of research on critical issues in special education for school
rehabilitation practices, pp. 256–277. IGI Global (2021)
48. Nalbant, K.G.: The importance of artificial intelligence in education: a short review. J. Rev.
Sci. Eng. 2021, 1–15 (2021)
49. Zheng, Y., Zhou, Z., Blikstein, P.: Towards an inclusive and socially committed community
in artificial intelligence in education: a social network analysis of the evolution of authorship
and research topics over 8 years and 2509 papers. In: Rodrigo, M.M., Matsuda, N., Cristea,
A.I., Dimitrova, V. (eds.) Artificial Intelligence in Education. AIED 2022. Lecture Notes in
Computer Science, vol. 13355. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-
11644-5_34
50. Lameras, P., Paraskakis, I., Konstantinidis, S.: A rudimentary progression model for artificial
intelligence in education competencies and skills. In: Auer, M.E., Tsiatsos, T. (eds.) IMCL
2021. LNNS, vol. 411, pp. 927–936. Springer, Cham (2022). https://doi.org/10.1007/978-3-
030-96296-8_84
51. Alam, A.: Social robots in education for long-term human-robot interaction: socially sup-
portive behaviour of robotic tutor for creating robo-tangible learning environment in a guided
discovery learning interaction. ECS Trans. 107(1), 12389 (2022)
Foundation for the Future of Higher Education 29
52. Hamal, O., El Faddouli, N.E., Harouni, M.H.A., Lu, J.: Artificial intelligent in education.
Sustainability 14(5), 2862 (2022)
53. Campbell, C.: Artificial intelligence in education: contributors, collaborations, research
topics, and challenges. Educ. Technol. Soc. 25(1), 28–47 (2022)
54. Ungerer, L., Slade, S.: Ethical considerations of artificial intelligence in learning analytics in
distance education contexts. In: Prinsloo, P., Slade, S., Khalil, M. (eds.) Learning Analytics
in Open and Distributed Learning: Potential and Challenges, pp. 105–120. Springer Nature
Singapore, Singapore (2022). https://doi.org/10.1007/978-981-19-0786-9_8
55. Corbeil, M.E., Corbeil, J.R.: Establishing trust in artificial intelligence in education. In: Pal-
iszkiewicz, Joanna, Chen, Kuanchin (eds.) Trust, Organizations and the Digital Economy:
Theory and Practice, pp. 49–60. Routledge, New York (2021). https://doi.org/10.4324/978
1003165965-5
56. Xia, Q., Chiu, T.K., Lee, M., Sanusi, I.T., Dai, Y., Chai, C.S.: A self-determination theory
(SDT) design approach for inclusive and diverse artificial intelligence (AI) education. Comput.
Educ. 189, 104582 (2022)
57. Alam, A.: Possibilities and challenges of compounding artificial intelligence in India’s
educational landscape. Int. J. Adv. Sci. Technol. 29(5), 5077–5094 (2020)
58. Dai, C.P., Ke, F.: Educational applications of artificial intelligence in simulation-based
learning: a systematic mapping review. Comput. Educ.: Artif. Intell. 3, 100087 (2022)
59. Yang, S.J., Ogata, H., Matsui, T., Chen, N.S.: Human-centered artificial intelligence in edu-
cation: seeing the invisible through the visible. Comput. Educ.: Artif. Intell. 2, 100008
(2021)
60. Alam, A.: Investigating sustainable education and positive psychology interventions in
schools towards achievement of sustainable happiness and wellbeing for 21st century
pedagogy and curriculum. ECS Trans. 107(1), 19481 (2022)
61. Channa, F.R., Sarhandi, P.S.A., Bugti, F., Pathan, H.: Harnessing artificial intelligence in
education for preparing learners for the 21st century. Elementary Educ. Online 20(5), 3186
(2021)
62. Xu, W., Ouyang, F.: The application of AI technologies in STEM education: a systematic
review from 2011 to 2021. Int. J. STEM Educ. 9(1), 1–20 (2022)
63. Alam, A.: Pedagogy of calculus in India: an empirical investigation. Periódico Tchê Química
17(34), 164–180 (2020)
64. Chaudhry, M.A., Kazim, E.: Artificial intelligence in education (AIEd): a high-level academic
and industry note 2021. AI and Ethics 2(1), 157–165 (2022)
AI Enabled Internet of Medical Things
Framework for Smart Healthcare
Abstract. Internet of Medical Things (IoMT) is basically the use of the Internet
of Things (IoT) in Smart Healthcare where automation in health monitoring is
provided using Artificial Intelligence (AI) so that without visiting the hospital for
every small problem an individual can get consultancy from doctors remotely. As
per the pandemic situation visiting the hospital an individual can result in con-
tact with harmful viruses, so using this Smart HealthCare System (SHS) without
visiting the hospital an individual can monitor their day-to-day health record and
can take preliminary precautions accordingly. Three major health domains are
defined in this work where AI-based SHS can help the individual depending on
the patient’s health situation they can belong to one of these domains. Now, SHS
deals with highly sensitive patient health data so few parameters must be satis-
fied by this system i.e., data security, data accuracy, system efficiency, Quality of
Service (QoS), System Reliability, etc. In this work, we will elaborate discussion
about these parameters and provide a comparison table to analyze the work done
by different researchers in this era to improve the performance of an Artificial
Intelligence (AI) based SHS using the IoMT framework.
1 Introduction
The demand for advanced medical treatment is increasing everyday to ensure better
health and protectiveness from both tangible and non-tangible viruses thereby accelerat-
ing the need for automation in Healthcare System. On top of the new healthcare era, the
AI-based Internet of Medical Things (IoMT) framework is developing with various new
creative and smart solutions to various real-world problems [1]. Various organizations
and researchers are showing their interest in the Internet of Things (IoT) to enhance their
scope of work and throughput. IoT seems to be the new generation technology with a
universal applicability in almost every market field with increasing integration degree of
end products, systems, and services. IoT is basically a collection of nodes (computers,
laptops, Smartphones, or other smart devices) having their unique IDs connected via
wired or wireless medium and able to communicate without any human intervention.
IoT can be used in various fields for providing automation in the implementation of smart
techniques for the betterment of society [2]. Figure 1 shows the use of IoT in different
eras including agriculture services [3], healthcare services [1], educational institutes [4],
traffic management [5], etc.
Artificial Intelligence gives the automation for providing essential features in IoMT
framework-based Smart Healthcare systems, System Security where AI can be used to
identify the intrusion within the system [6], detect immediate security attacks [7], Web-
based security assessment [8], etc. AI can also be used to provide an automatic alert to
all the respective medical staff for immediate actions in emergencies [9]. Along with the
patients, this technique will be beneficial for the doctors also as using AI doctors will
be able to easily maintain and monitor patient’s health records and can provide remote
medical advice.
Therefore, considering the susceptibility of patients’ health data we are motivated to
provide this comparative analysis of AI-based SHS using IoMT architecture using the
following parameters: data security, data accuracy, system efficiency, Quality of Service
(QoS), and System Reliability. The major contributions of the work are as follows.
• To discover the role of AI in different health domains of the IoMT framework along
with their application in SHS.
• To examine different IoMT architectures of AI-based SHS.
• To present a comparative analysis of various accurate data collection techniques
thereby creating a reliable AI-based SHS.
• To scrutinize different Data Security techniques to ensure protectiveness in AI-based
SHS.
32 J. Srivastava and S. Routray
This work consists of total 5 sections where Sect. 2 represents different AI-based
health domains with their application in SHS, Sect. 3 elaborates on different AI-enabled
IoMT architectures proposed by different authors for SHS, Sect. 4 gives an extensive
examination of different research challenges of AI-enabled SHS and the last section i.e.,
Sect. 5 is the concluding remarks for this work.
All three domains use different types of sensors or collections of different sensors
to fetch accurate medical data about the individual. For example, LM35 senses body
temperature usually used in self-care systems, DHT11 is also a humidity and temperature
AI Enabled Internet of Medical Things 33
Sun et al. [1] introduces a security protocol using AI where a three-tier architecture
is used namely the Sensor level, and Personal server level, Medical Server level where
medical server layer consists of various core algorithms and programs, and the sensor
level deals with sensors and medical devices and personal server level is a collection
of few personal servers for internal process and data storage [33]. Kumar et al. [12]
proposed a three-layered end-to-end architecture for connecting IoT sensors to smart
healthcare i.e., the Data storage layer, Data collection layer, and Data processing Layer.
The data collection layer consists of IoT devices for sensing medical data, then the data
storage layer is used to store this record on a wider range, and the last one i.e., the data
processing layer does an analysis of received data [34]. Sun et al. [13] proposed an AI-
based IoMT architecture mainly consisting of three layers namely, the Network Layer,
Perceptual Layer, and the Application Layer. The perceptual layer collects medical data
from the on-body sensors and transforms it into important information. The next layer
i.e., the network layer is responsible for platform and interface-related services required
for implementing particular data transmission techniques. The topmost layer i.e., the
application layer deals with different healthcare equipment and utilizes all collected
medical information for managing patient healthcare data remotely.
needs to tackle various research challenges. There can be various research challenges that
are to be monitored during the development of AI-enabled SHS like amount of energy
consumed, packet delivery ratio, battery lifetime, quality of service, body movements,
temperature change, range of transmission, heterogeneous environment, power drain,
network throughput, delay, transmission rate, etc. In this research paper, we are focusing
on a few of these challenges and the rest can be explored in future work. The challenges
that occurred during IoMT system development differ from the wireless network as it
deals with very sensitive real-time medical data of the patients and a small delay, data
loss, or inconsistency in this healthcare system can result in severe health issues and can
be very risky for someone’s health. All these challenges need to be handled with care
during the development of AI-enabled SHS using the IoMT framework for a better user
experience. This system works upon very sensitive medical data of various patients using
small and ultra-low power wearable/implanted smart IoMT devices therefore most of the
real-time development challenges are handled in network and protocol designing tech-
niques considering effective topology, energy consumption, and effective channel. So,
this section provides a scrutinized analysis of different research challenges that occurred
during the development of the AI-based SHS system using the IoMT framework.
An AI-enabled SHS works with highly sensitive medical records and the AI algorithm
will predict efficient results only when it gets accurate medical data. If there is any
inconsistency in fetching the medical record from the patient’s body it can result in
severe physical and financial loss and can thereby end up with total system failure.
Hence in this section, we are elaborating Data accuracy parameter of an SHS. The data
accuracy comparison has been illustrated in Fig. 4. Table 1 shows a comparative analysis
of various work done regarding data accuracy in AI-enabled Smart Healthcare systems.
Tekieh MH et al. [14], 2015 proposed an electronic health record approach for the
collection of data using various techniques based on system requirements to accomplish
the accuracy of collected data. Shahin A et al. [15], 2014 also use an electronic health
record approach for data collection considering two parameters error rate and accuracy
of the collected data. Yang L et al. [16], 2016 use a Rule-Based approach to improve data
gathering speed maintaining the accuracy of collected data. Mdaghri Z A., et al. [17],
2016 proposed a support system for clinical decisions improving accuracy within the
collected data. Roy S et al. [18], 2016 proposed a new technique i.e., correlation-based
ratio analysis gathers medical information using parameters correlation and accuracy.
Rao AR et. al. [19], 2016 use an open dataset for prediction and accuracy having better
visualization because of GUI.
AI Enabled Internet of Medical Things 35
AI-based SHS mostly uses the cloud for storage of data so that we can get fast access
to medical data whenever required but it can lead to security threats of highly sensitive
medical data. Any security breach within an SHS can result in the tempering of sensitive
patient’s medical data and thereby causing treatment failure as well as users’ faith in
using smart IoMT devices. Table 2 shows a scrutinized analysis of different work done
regarding security in AI-enabled Smart Healthcare systems. Moosavi, S. R., et al. [20],
2015 proposed techniques to Encrypt system information and used biometric identifi-
cation and two-factor authentication for system security against unauthorized access.
Sun, Y., et al. [1], 2019 implement secure routing algorithms to avoid routing attacks
where the Attacker modifies the route of traffic to a new destination. This paper also
uses encryption and an intrusion detection system, builds redundancy in infrastructure,
and uses region mapping, authentication, and egress filtering to avoid Denial of Service
(DoS) attacks where the attacker generates so much network traffic that the SHS halts;
generally caused by a compromised node. Verma, G., et al. [21], 2021 uses advanced
techniques to Encrypt links and the network layer preventing message disclosure where
attacker targets sensitive information disclosure to access a patient’s log file. This paper
also uses hashing and digital signatures to avoid message modification by unautho-
rized users where an attacker can modify messages between a patient and a healthcare
provider. Also, the author discusses encryption, segmentation, and implementation of
network access control (NAC) techniques to avoid eavesdropping, and reply attacks
where the attacker listens to information through an open SHS communication channel
and can forward modified information. Verma, G., et al. [21], 2021 also uses symmet-
ric key security algorithms for compromised node attack where the attacker hacks into
openly deployed sensor nodes and injects false information into them. Sun, Y., et. al.
[1], 2019 use multi-path, multi-base data forwarding, identity verification protocols, and
cryptography to avoid Hello Flooding where the attacker uses a compromised node with
high transmission power to compromise all of its neighbors.
AI Enabled Internet of Medical Things 37
Table 2. (continued)
to modify the routing table. It also Raises awareness of security concerns through train-
ing, auditing, and adequate security policies for social engineering where the attacker
influences users to reveal information or perform an action that benefits the attacker.
Table 3. (continued)
SEF-IoMT
% of Improvement in
NEWOF
Energy Consumpon
energy-efficient…
0 10 20 30 40
AI enables SHS applications that deal with highly sensitive real-time medical data like
ECG which is susceptible to execution timing and data loss. To fulfill such real-time
medical demand Quality of service (QoS) requirements must be justified in an AI-
enabled IoMT framework for SHS. To maintain system usability the sensing devices of
SHS have fixed memory and computational capabilities, so the QoS measures must be
adapted by the routing protocols. Table 4 shows a comparative analysis of various work
done regarding QoS in AI-enabled Smart Healthcare systems. Kumar, A., et al. [27], 2022
proposed a case study of various algorithms to improve the QoS of the IoMT framework.
Patan, R., et al. [28], 2020 proposed an AI-driven IoMT eHealth architecture implying
a grey filter Bayesian convolution neural network that will improve accuracy during
medical data analysis. Agnihotri, S., et al. [29], 2019 proposed the CARA-IoT algorithm
using ACO (AntColony Optimization) approach to choose the best consistent and smart
routing path depending firstly on the channel noise and secondly on communicating
content. Singh, P. D. et al. [30], 2021 proposed an ensemble-based classifier algorithm
that combines AI with Fog computing for smart health of early covid-19 detection
and also takes shared storage peer-to-peer, time stamping advantages of blockchain.
Khodkari, H., et al. [31] use multi-attribute decision-making techniques specifically the
simple weighting technique for better QoS, and due to the integration of cloud and IoT,
this SHS system gains the support of the new developers in this era. Sodhro, A. H., et.
al. [32]. 2021 proposed a new adaptive QoS computation algorithm (AQCA) to monitor
the performance indicators fairly and efficiently.
42 J. Srivastava and S. Routray
Table 4. (continued)
5 Conclusion
Artificial Intelligence (AI) gives automation to the system to increase ease and simplicity
within a system. Al can be used in the Internet of Medical Things (IoMT) framework to
incorporate automation in the healthcare sector which is also known as Smart Healthcare.
As per the current scenario, every day new harmful viruses are coming leading to severe
health degradation. A person visiting hospitals or other healthcare for every small health
problem may get infected by these harmful viruses and therefore Smart Healthcare
System (SHS) is introduced. In SHS without visiting the hospital a person can measure his
regular health records using wearable/implanted smart devices and can take preliminary
precautions on their own. A doctor can also monitor his patient’s health from remote
areas using SHS applications. Based on the patient’s health scenario SHS can be divided
into three domains as discussed in this work. AI-based SHS using the IoMT framework
usually have three layers in their architecture namely the bottommost sensor level for
collection of medical data by means of wearable/ implanted smart devices, the middle
layer used for processing of these data with a set of algorithms, and the topmost layer used
for the end-user interface. This work gives an explanative analysis of different AI-based
SHS architectures proposed by various authors based on their system requirements.
SHS deals with highly sensitive medical records of various patients and also requires
quick responses from the system therefore few research challenges need to be defined
and tackled effectively. A comparative analysis of these research challenges namely
44 J. Srivastava and S. Routray
Data security, Data accuracy, System efficiency, Quality of Service (QoS), and System
reliability has been discussed in this paper.
References
1. Sun, Y., Lo, F.P.W., Lo, B.: Security and privacy for the internet of medical things enabled
healthcare systems: a survey. IEEE Access 7, 183339–183355 (2019)
2. Chen, S., Xu, H., Liu, D., Hu, B., Wang, H.: A vision of IoT: applications, challenges, and
opportunities with china perspective. IEEE Internet Things J. 1(4), 349–359 (2014)
3. Sinha, B.B., Dhanalakshmi, R.: Recent advancements and challenges of Internet of Things
in smart agriculture: a survey. Future Gener. Comput. Syst. 126, 169–184 (2022)
4. Al-Emran, M., Malik, S.I., Al-Kabi, M.N.: A survey of Internet of Things (IoT) in education:
opportunities and challenges. In: Hassanien, A.E., Bhatnagar, R., Nour Eldeen, M., Khal-
ifa, M.H., Taha, N. (eds.) Toward Social Internet of Things (SIoT): Enabling Technologies,
Architectures and Applications. SCI, vol. 846, pp. 197–209. Springer, Cham (2020). https://
doi.org/10.1007/978-3-030-24513-9_12
5. Elkin, D., Vyatkin, V.: IoT in traffic management: review of existing methods of road traffic
regulation. In: Silhavy, R. (ed.) Applied Informatics and Cybernetics in Intelligent Systems:
Proceedings of the 9th Computer Science On-line Conference 2020, vol. 3, pp. 536–551.
Springer International Publishing, Cham (2020). https://doi.org/10.1007/978-3-030-51974-
2_50
6. Routray, S., Mao, Q.: A context aware-based deep neural network approach for simultaneous
speech denoising and dereverberation. Neural Comput. Appl. 34(12), 9831–9845 (2022)
7. Mohamed Shakeel, P., Baskar, S., Sarma Dhulipala, V.R., Mishra, S., Jaber, M.M.: Maintain-
ing security and privacy in health care system using learning based deep-Q-networks. J. Med.
Syst. 42(10), 1–10 (2018)
8. Alsubaei, F., Abuhussein, A., Shandilya, V., Shiva, S.: IoMT-SAF: internet of medical things
security assessment framework. Internet of Things 8, 100123 (2019)
9. Routray, S., Mao, Q.: Phase sensitive masking-based single channel speech enhancement
using conditional generative adversarial network. Comput. Speech Lang. 71, 101270 (2022)
10. Algarni, A.: A survey and classification of security and privacy research in smart healthcare
systems. IEEE Access 7, 101879–101894 (2019)
11. Padhy, S., Dash, S., Routray, S., Ahmad, S., Nazeer, J., Alam, A.: IoT-based hybrid ensemble
machine learning model for efficient diabetes mellitus prediction. Compu. Intell. Neurosci.
2022, 1–11 (2022). https://doi.org/10.1155/2022/2389636
12. Kumar, N.: IoT architecture and system design for healthcare systems. In: 2017 International
Conference on Smart Technologies for Smart Nation (SmartTechCon), pp. 1118–1123. IEEE
(2017)
13. Sun, L., Jiang, X., Ren, H., Guo, Y.: Edge-cloud computing and artificial intelligence in
internet of medical things: architecture, technology and application. IEEE Access 8, 101079–
101092 (2020)
14. Tekieh, M.H., Rashemi, B.: Importance of data mining in healthcare. In: Proceedings of
2015 IEEE/ACM international conference advances in social networks analysis and mining
2015—ASONAM’15, pp 1057–1062 (2015)
15. Shahin, A., Moudani, W., Chakik, F., Khalil, M.: Data mining in healthcare informa-
tion systems case studies in Northern Lebanon. In: 2014 Third International Conference
e-Technologies Networks Devices, pp 151–155 (2014)
16. Yang, L., Li, Z., Luo, G.: MH-Arm: a multimode and high-value association rule mining
technique for healthcare data analysis. In: 2016 International Conference on Computational
Science and Computational Intelligence, no. 71432002, pp. 122–127 (2016)
AI Enabled Internet of Medical Things 45
17. Mdaghri, Z.A., El Yadari, M., Benyoussef, A., El Kenz, A.: Study and analysis of data mining
for healthcare. In: 2016 4th IEEE International Colloquium on Information Science and
Technology (CiSt), pp. 77–82 (2016)
18. Roy, S., Mondal, S., Ekbal, A., Desarkar, M.S.: CRDT: correlation ratio based decision
tree model for healthcare data mining. In: 2016 IEEE 16th International Conference on
Bioinformatics, Bioengineering, pp. 36–43 (2016)
19. Rao, A.R., Clarke, D.: A fully Integrated open-source toolkit for mining healthcare bigdata:
architecture and applications. In: Proceedings on 2016 IEEE international conference on
healthcare informatics, ICHI 2016, pp. 255–261 (2016)
20. Moosavi, S.R., et al.: SEA: A secure and efficient authentication and authorization architecture
for IoT-based healthcare using smart gateways. Procedia Comput. Sci. 52(1), 452–459 (2015)
21. Verma, G., Prakash, S.: Internet of Things for healthcare: research challenges and future
prospects. In: Hura, G.S., Singh, A.K., Hoe, L.S. (eds.) Advances in Communication and
Computational Technology. LNEE, vol. 668, pp. 1055–1067. Springer, Singapore (2021).
https://doi.org/10.1007/978-981-15-5341-7_80
22. Rehman, A., Saba, T., Haseeb, K., Larabi Marie-Sainte, S., Lloret, J.: Energy-efficient IoT e-
health using artificial intelligence model with homomorphic secret sharing. Energies 14(19),
6414 (2021)
23. Sodhro, A.H., et al.: Decentralized energy efficient model for data transmission in IoT-based
healthcare system. In: 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring),
pp. 1–5. IEEE (2021)
24. Lazarevska, M., Farahbakhsh, R., Shakya, N.M., Crespi, N.: Mobility supported energy effi-
cient routing protocol for IoT based healthcare applications. In: 2018 IEEE Conference on
Standards for Communications and Networking (CSCN), pp. 1–5. IEEE (2018)
25. Saba, T., Haseeb, K., Ahmed, I., Rehman, A.: Secure and energy-efficient framework using
Internet of Medical Things for e-healthcare. J. Infect. Public Health 13(10), 1567–1575 (2020)
26. AbdulmohsinHammood, D., Rahim, H.A., Alkhayyat, A., Ahmad, R.B.: Body-to-body coop-
eration in internet of medical things: toward energy efficiency improvement. Future Internet
11(11), 239 (2019)
27. Kumar, A., Joshi, S.: Applications of AI in healthcare sector for enhancement of medical
decision making and quality of service. In: 2022 International Conference on Decision Aid
Sciences and Applications (DASA), pp. 37–41. IEEE (2022)
28. Patan, R., Ghantasala, G.P., Sekaran, R., Gupta, D., Ramachandran, M.: Smart healthcare and
quality of service in IoT using grey filter convolutional based cyber physical system. Sustain.
Cities Soc. 59, 102141 (2020)
29. Agnihotri, S., Ramkumar, K.R.: Content based routing algorithm to improve QoS in IoMT
networks. In: Saha, A., Kar, N., Deb, S. (eds.) Advances in Computational Intelligence,
Security and Internet of Things: Second International Conference, ICCISIoT 2019, Agartala,
India, December 13–14, 2019, Proceedings, pp. 195–206. Springer Singapore, Singapore
(2020). https://doi.org/10.1007/978-981-15-3666-3_17
30. Singh, P.D., Kaur, R., Dhiman, G., Bojja, G.R.: BOSS: A new QoS aware blockchain assisted
framework for secure and smart healthcare as a service. Expert Syst. e12838 (2021)
31. Khodkari, H., Maghrebi, S.G., Asosheh, A., Hosseinzadeh, M.: Smart healthcare and quality
of service challenges. In: 2018 9th International Symposium on Telecommunications (IST),
pp. 253–257. IEEE (2018)
32. Sodhro, A.H., Malokani, A.S., Sodhro, G.H., Muzammal, M., Zongwei, L.: An adaptive
QoS computation for medical data processing in intelligent healthcare applications. Neural
Comput. Appl. 32(3), 723–734 (2019). https://doi.org/10.1007/s00521-018-3931-1
46 J. Srivastava and S. Routray
33. Srivastava, J., Routray, S., Ahmad, S., Waris, M.M.: Internet of Medical Things (IoMT)-based
smart healthcare system: Trends and progress. Comput. Intell. Neurosci. 2022, 1–17 (2022).
https://doi.org/10.1155/2022/7218113
34. Malla, P.P., Sahu, S., Routray, S.: Investigation of breast tumor detection using microwave
imaging technique. In 2020 International Conference on Computer Communication and
Informatics (ICCCI), pp. 1–4. IEEE (2020)
Metaverse and Posthuman Animated Avatars
for Teaching-Learning Process: Interperception
in Virtual Universe for Educational
Transformation
Rekhi Centre of Excellence for the Science of Happiness, Indian Institute of Technology
Kharagpur, Kharagpur, West Bengal, India
[email protected]
Abstract. It has been quite some time that the attention of teachers has been
focused on the incorporation of Metaverse in education. Since Facebook’s
announcement that it will be rebranding and promoting itself as Meta, there has
been much interest in this subject. To the best of our knowledge, no research
as of date has systematically synthesised the results associated with the imple-
mentation of Metaverse in education, even though several studies have conducted
literature reviews on Metaverse in general. This research does a detailed litera-
ture assessment on how the Metaverse might be used in the classroom in order
to fill this knowledge gap. Research trends, focal points, and limitations of this
‘study subject’ are revealed using both bibliometric analysis and text analysis.
It is evident from the collected data that lifelogging for educational metaverse
merits additional research. The results indicate that research into mobile-, hybrid-
, and micro-learning environments are still in its infancy. There is no study on
the effectiveness of utilising metaverse to educate children with special needs.
In order to widen the attraction of metaverse to educators throughout the globe
and to improve their capacity to assist successful learning and teaching in the vir-
tual environment, more in-depth research shall be carried out along the proposed
roadmap as suggested by the results of the current investigation.
1 Introduction
The inkling of Metaverse is not very new; it has been explored in works of science fiction
such as Snow Crash and has recently received increased attention with the release of
the film which is an adaptation of the book, Ready Player One [1, 31]. Second Life and
World of Warcraft were already out there as well-known and well-liked examples [2, 7].
Mark Zuckerberg’s public unveiling of Metaverse in October 2021, however, sparked a
surge in the platform’s popularity [3, 46]. Many instructors and researchers have begun
outlining potential future agendas and implementation scenarios in their teaching and
research methods [4, 19]. The virtual environment, which depicts people as realistically
as possible, may enhance the interpersonal aspects of education, contributing to the
rising popularity of online courses [5]. Since ‘Metaverse’ is still a relatively new term,
the current investigation addresses the need to evaluate the current state of research on
the topic [6].
Avatars, which are digital representations of real-world humans, administer the econ-
omy and conduct daily activities in the 3D virtual environment known as the Metaverse
[7]. Instead of being a platform built by a single corporation, which would inevitably
lead to monopolisation, the word ‘Metaverse’ describes a whole ecosystem. It denotes
a whole new dimension of life that is not just beyond the purview of any nation’s or
company’s governing bodies, but of all governments altogether [8]. Metaverse offers
opportunities for immersion, collaboration, and involvement, all of which contribute to
the expansion of social experiences and the birth of ‘parallel worlds’ [9]. The growth of
the metaverse requires the following three stages: (1) digital twins, which permit simu-
lating and modelling the physical environment digitally [10]. Numerous academics and
thinkers have already explored the educational potential of the Metaverse [11]. The inte-
gration of Metaverse with Second Life as a learning management system was previously
explored in the context of enhancing educational outcomes [12]. The Metaverse, which
emphasises the virtuality component, might be the next place where people congregate
and form social connections; as such, institutions of higher learning should take the
initiative to use it for educational purposes [13].
Mirror worlds, lifelogging, AR, and virtual worlds are the four branches of the
metaverse technology tree [14]. Through the use of digital data superimposed on top
of the user’s perception of the actual world, augmentation technology enhances the
environment with a new visual element [15]. In contrast, simulation technology creates
and alters models of the actual world in order to give virtual interactions and experiences
[16]. The other group focuses on the interplay between the internal and exterior spheres
[17]. Information regarding the user’s external environment and methods for influencing
it are presented to emphasise the importance of this aspect of the technology [18]. When
these two dimensions are combined, four distinct variations of the Metaverse emerge
[19]. Thanks to the technologies present in the Augmented Reality Metaverse, we now
design smart environments dependent on location networks, like Pokémon Go [20].
Lifelogging Metaverse collects daily details about people and things using augmented
reality applications like Facebook and Instagram [21]. The technique generates virtual
maps and models in the Metaverse of Mirror Worlds using GPS data from programmes
like Google Earth and Google Maps [22]. Digitally interactive avatars representing a
wide variety of identities form the basis of the technology powering the Metaverse of
Virtual Worlds [23].
González Crespo and colleagues utilised OpenSim to research the potential of virtual
worlds as a platform for knowledge exchange and education [4, 9, 13, 24]. After seeing
the potential of augmented reality and mobile education for the classroom, Reyes and
colleagues developed the Metaverse for the purpose of teaching mathematics [24]. The
findings suggested that incorporating Metaverse into mathematics education has the
potential to boost students’ achievement [25]. Park and Kim also categorised the many
Metaverse and Posthuman Animated Avatars for Teaching-Learning Process 49
sorts of instructional Metaverse worlds with different genres such as survival, labyrinth,
multi-choice, racing/jump, and escape room [8, 12, 17, 22].
in English, (2) deal with Metaverse in general, and (3) be available online. Consequently,
21 articles were in the Scopus database, and 36 publications were located in the WOS
database.
The research used both bibliometric analysis and content analysis. The evaluation
and interpretation of the data employed data triangulation techniques to provide a more
holistic perspective and strengthen the reliability of the study’s findings. The VOSviewer
software was used to do the bibliometric analysis and synthesis by categorising and
mapping the phrases taken from the keywords, titles, and abstracts into a similarity
matrix based on their level of relatedness.
Metaverse is the practise of using social media for learning purposes in order to record,
collate, and analyse one’s day-to-day activities, thoughts, and relationships with others
[35]. Lifelogging metaverse research is a kind of study that combines augmented reality
with personal communication via voice interaction and recognition [36]. Because of its
potential instructional value in enhancing one’s ability to represent and use knowledge
appropriately in response to criticism from other users in the network, this fits the criteria
for a Lifelogging Metaverse [37]. Lifelogging students can use their critical thinking and
creative imagination to explore the site’s diverse data and reconstruct knowledge through
the power of the group [36].
The final type of Metaverse is called Mirror Worlds (MW), and it is used to over-
come geographical and physical barriers to education by extending real-world settings
through networking technologies and GPS [38]. Only one study was classified as a MW
Metaverse, and that was because it used a game-based approach to immersive learning
by gathering students in a traditional classroom and mirroring the physical space onto
an online platform [39]. The research did not make full use of the MW Metaverse, while
reflecting what Kye termed as ‘efficient expansion’ approach for modelling the physical
world [3, 7, 16, 21]. For example, MW users may work together on significant projects
and even play games with others who are thousands of miles away from them [40].
The bulk of studies in the field of education have focused on Virtual Worlds Meta-
verse, while just a small number have made use of Augmented Reality Metaverse, and
an even smaller number have made use of Lifelogging and Mirror Worlds Metaverses
[41]. The outcomes are discussed in this article [42]. Nonetheless, 3D technologies were
employed in the papers to either use or explain virtual worlds [43]. However, as the
Metaverse road map indicates, the technology was not completely used or explained
in the reviewed publications [44]. Lifelogging may give novel forms of data that may
be analysed to probe hitherto unexplored areas of blending psychology and educational
technology [45]. Those who have developed advanced digital skills may also benefit
from using MW technology, making them worthy of special attention to the ways in
which they learn in the MW Metaverse [46].
Fifty-three percent of Metaverse researches were in the fields of natural science, math-
ematics, and engineering, while fifteen percent were in the realms of general education
and eleven percent were in the arts and humanities [47]. The Metaverse may provide
technical assistance to the STEM disciplines by way of 3D modelling software for use
in the classroom, by helping students draw parallels between real-world experiments
and virtual things, and by offering data-mining-driven, autonomous tutoring systems
[48]. For these and other reasons, several disciplines might benefit from integrating
Metaverse into their work [49]. For this reason, the arts and humanities have made sub-
stantial use of Metaverse for language learning, since it may allow users to communicate
with speakers of various languages [17]. Metaverse has the potential to merge the virtual
world with traditional classrooms, therefore fostering novel avenues for interdisciplinary
and problem-based learning [23]. Only 6% of social scientists use Metaverse, which is
notable [29]. In reality, the Metaverse may also be quite useful in these areas [36]. For
Metaverse and Posthuman Animated Avatars for Teaching-Learning Process 53
instance, students may form virtual networks in the subject of archaeology via the use
of the Metaverse, which can be accessed during online e-learning sessions [38].
It was found that 62.9% of Metaverse research was conducted involving students
who were at the university level [41]. The findings prove that Metaverse can be used
in higher education to give students and faculty access to interactive and immersive
experiences that open the door to exploring novel pedagogical practises, ICTs, and
emerging technologies [46]. From this vantage point, it appears that the Metaverse may
help alleviate the limitations and inefficiencies of traditional 2D online education [49].
However, there has only been a modest amount of research into the Metaverse in primary,
secondary, and tertiary institutions [7]. No studies were found that specifically addressed
disabled students, so more studies are needed to determine how to create inclusive
and accessible Metaverse in educational environments [12]. The emergence of virtual
freedom in space and time may allow students with impairments and special needs to
engage more fully [18].
Metaverse provides several opportunities for the development of educational situa-
tions [25]. The findings showcase nine different pedagogical settings where the Meta-
verse is used for learning [28]. Online education received the most study (31.3%), fol-
lowed by problem-based education, gaming-based education, collaborative education,
and project-based learning (PBL) [31]. Metaverse provide pupils with a more engaging
and interactive setting, as well as the opportunity for more collaborative study [35]. By
analysing the Metaverse’s applications in a variety of contexts, it may help both edu-
cators and students improve their use of the platform for instruction [38]. This means
that proposals for innovative methods of instruction and evaluation will be made, and
that plans for their use in virtual reality settings will be explored [41]. How can inno-
vative tools like eye-tracking and voice-recognition software be incorporated into the
instructional design process?
When it comes to online education, the Metaverse is where it is at. This is largely due
to the fact that students can engage with various digital resources through virtual worlds,
made possible by the Metaverse and high-performance servers [45]. Meanwhile, collab-
orative learning is frequently combined with virtual learning scenarios [48]. Through the
Metaverse’s built-in social networks, students can communicate with one another and
exchange course-related knowledge to promote cooperative learning [3]. Metaverse’s
simulated environment is ubiquitous in modern blended-learning setups [7]. The results
demonstrate the usefulness of integrating real-world experiments involving the Meta-
verse and virtual systems with online lectures and tutorials [8]. According to Kanematsu’s
study, using Metaverse (Second Life) for virtual course lectures is a viable option for
students enrolled in science, technology, engineering, and mathematics (STEM) pro-
grammes [5, 7, 11, 19]. In this way, the teacher can guide the students through the
STEM curriculum experiment in the physical classroom while also providing them with
support in the Metaverse [13].
Using the same principles as game-based education, the Metaverse offers a virtual,
engaging environment for learning [11]. Getchell and colleagues showed how Metaverse
pioneers new-fangled possibilities for game-based teaching-learning by letting teachers
develop flexible game-based learning environments and providing students more control
over their education at a cheaper price [2, 6, 18, 25]. Estudante and Dietrich, in their study,
54 A. Alam and A. Mohanty
propose utilising the free software Metaverse to create a VR game for mobile devices
[3, 8, 15, 19]. The students are taught to think like physicists while solving issues [19].
This game may help students get a deeper understanding of chemistry concepts like the
periodic table, chemical equilibrium, and molar mass while having fun at the same time
[22]. As a result, the Metaverse’s platform might be utilised to improve students’ drive
to study and their capacity for collaboration via the use of game-based instruction [28].
Students are given brief lectures and faced with topics connected to nuclear power,
and they actively engage in problem-solving via Metaverse chat sessions led by their
lecturers [33]. According to the findings, including Metaverse in PBL courses has the
potential to raise interest, stimulate debate, and improve students’ level of understanding
[36]. As a matter of fact, by using the Metaverse, these learning scenarios may pique
the interest of both students and instructors while providing the optimal environment
for their teaching and learning activities [41]. The Metaverse’s built virtual world is
able to change the static conventional teaching paradigm into a dynamic one in these
different learning settings since it provides learning materials and timely evaluations
[46]. Collaboration among students is made possible by this [49].
The Metaverse provides a wealth of pedagogical and technical resources for educa-
tors, allowing students to participate in immersive learning that has been shown to boost
engagement and motivation [11]. The seven types of technological resources are as
follows: wearable, immersive, educational, modelling and simulation, gaming applica-
tions, artificial intelligence, mobiles, and sensors [15]. The Metaverse is used to provide
students with hands-on experience, which not only encourages collaboration and skill
development but also keeps them interested and involved in what they are learning [12].
Virtual reality, augmented reality, mixed reality, and other similar virtual technologies
must be combined to provide a truly immersive experience [27]. The benefit of multi-
modal immersion is further shown by the emergence of technologies that open portals to
and transport us inside Metaverse realms [36]. The aforementioned four technologies are
the most widely used immersive interfaces in the Metaverse, and they have the potential
to enhance classroom instruction by immersing pupils psychologically and so promoting
transferable skills [46]. In their study, Siyaev and Jo discuss how MR may be used in the
Metaverse to enhance learning via the use of deep learning voice interaction modules,
bringing together the real and virtual worlds [5, 9, 11, 18]. To help students form more
meaningful relationships with the digital world, MR may focus largely on the voice
interaction that happens during the learning process [11]. To further facilitate students’
access to immersive learning, VR allows for the administration of virtual worlds and the
development of shareable avatars [21]. Students in the Metaverse may control their own
avatars in line with the shown environment, make social connections with other students,
and create custom avatars utilising virtual reality to provide an immersive experience
[34].
Games are another popular kind of application utilised in the Metaverse to pro-
vide meaningful learning opportunities [38]. In terms of gaming apps, Pokémon Go has
been the most popular recently [27]. As a result of advancements in real-time virtual
reality and augmented reality, fictitious interactive 3D avatars can now be created and
used to lure Pokémon inside games [19]. When the Metaverse is employed in the class-
room, the immersive surroundings may play a crucial role in teaching various subjects
and make it easier to draw connections between different areas of knowledge [24]. If
blended with learning management systems [30]. Rapanotti and Hall have integrated
the Metaverse with the Second Life platform to provide a more immersive virtual world
platform for higher education [2, 9, 17, 24]. Using the resources supplied by Second
Life, students may construct a 3D virtual avatar, resulting in an immersive learning
experience [41]. Students fashion their own digital avatars in Second Life and engage in
virtual interactions with other students and can spend virtual cash to buy or manufacture
the resources [44]. Together, the institution’s LMS, HotPotatoes, Massive Open Online
Course (MOOC), Moodle, Teleduc, Eduquito, and Sloodle form a hybrid learning plat-
form in the Metaverse for teaching and learning [48]. The Metaverse and MOOCs have
made it possible for numerous students to have free and simultaneous access to a wealth
of topical material to expand their understanding [43]. The use of virtual labs is common
in the teaching of natural sciences, mathematics, and engineering [4]. By providing a
dynamic, collaborative, and interactive learning environment, VLL increases students’
56 A. Alam and A. Mohanty
motivation to learn and value their education [8]. Moodle, a modern learning manage-
ment system, may improve upon traditional methods of distributing course materials
and encourage student interaction [45].
Estudante and Dietrich developed software for Apple and Google smartphones that
may be used to construct an augmented reality version of the Metaverse [21]. The
OpenSim platform may be used with geographic mobility to provide content tailored to
each organization’s needs and methods of operation [24]. Connectivity to the internet
and data sharing in public virtual worlds are also made feasible by geospatial mobility
[5]. Metaverse on mobile devices might help students study if they use their avatars [47].
Another popular resource in the Metaverse is the Blinking system, which keeps track of
students’ blink rates using specialised software [13]. When a student’s emotions are up
in the air, the blinking mechanism causes them to blink more often, which helps teachers
decipher their responses [19].
AI provides a foundation for the Metaverse’s central concept—the analysis of its
complex data for interpretation, supervision, control, and planning [13]. Neuro-symbolic
AI might fill the role of subject-matter experts in aviation maintenance courses, provid-
ing guidance on technical matters and providing access to all the materials needed for
effective training and teaching [19]. To improve learning efficiency, convolutional neural
networks are increasingly being used to process not just visual and textual data, but also
audio data, such as commands and language recognition [31]. To help users navigate
virtual spaces, Web 3.0 often uses a combination of machine learning and semantic
database modelling [41]. The AI possibilities of the Metaverse allow for the creation of
new roles for intelligent NPCs to play as mentors, peers, and mentees [37].
Many different types of technology have been used in the creation of a thriving
ecosystem in Metaverse, as has previously been mentioned [11]. There are, however,
a number of state-of-the-art technologies that are not being used [13]. As one possible
solution to the problems of cheating and insecure user data, a blockchain-based educa-
tional system is being created [25]. It is also feasible to wonder whether the ICT-based
competencies mentioned in the literature are sufficient to prepare students and teachers
for this new educational environment (‘Metaverse in Education’), or if additional abilities
are necessary for enhanced teaching and learning [42]. Along with the new learning pos-
sibilities presented by technological advancements, users may be vulnerable to threats
[10]. Privacy may be compromised by sensors designed to read pupils’ emotions and
activities [26]. The potential for privacy breaches also increases in a digital classroom
where physical items may be used to track user activity [34]. These risks should be taken
into account by educators and researchers when they design Metaverse applications for
use in the classroom [39].
they are eager to use smart gadgets for scientific practise [23]. Teaching in a metaverse
environment, such as Second Life, is also effective [37]. It has the potential to enhance
student learning by encouraging cross-lingual interaction and discussion [28].
The Metaverse is helpful for students in a wide variety of disciplines. The stud-
ies show that the Metaverse may help students connect, become more motivated and
engaged, and broaden the possibilities of learning [14]. When combined, these features
expand the educational potential of the Metaverse considerably [8]. Students majoring
in aviation maintenance now have an affordable online alternative to flying, thanks to
metaverse, which not only allows them to engage with one another but also to undertake
fake aircraft repair [3]. The translation system will also allow for more direct interactions
between students, adding to the advantages of the metaverse for language instruction,
and the language grid system can be integrated with Second Life [15]. Finally, students
in a Metaverse-powered classroom may have trouble distinguishing fiction from fact
[13]. Therefore, it is reasonable to assume that the students in the class will form a new
set of social networks for learning, resulting in novel scholastic opportunities [29].
Various pedagogical, technological, and other types of challenges have been associ-
ated with using the Metaverse in the classroom [22]. Technically speaking, the biggest
factor was network congestion (21.1%), followed by smartphone interface design prob-
lems (8.2%) and blink capture problems (5.9%). Getchell emphasised the significance
of punctuality in network communications and the increased demands they place on the
host server and the overall network infrastructure [8, 11, 17, 26]. Because of the current
state of the network connection size, the results of student evaluations may be skewed.
There is further evidence from studies conducted on smartphones that the Metaverse has
an interface problem that is independent of the Metaverse app [5, 9, 16, 23]. It has been
suggested that if too few children use smartphones at once, this might have a negative
impact on their ability to work together and communicate [32]. This is due to the small
size of smartphone screens [40].
Dáz argues that the structure of the Metaverse could give students access to interesting
digital resources, encourage them to interact with educational material, and inspire them
to invent exciting new activities [1, 7, 19, 25]. Educators are responsible for developing,
refining, and supplying the Metaverse server administrators with digital resources for
students to utilise [33]. It is worth noting that both students’ time management and
the Metaverse’s implementation in the classroom present challenges [38]. Students have
trouble accessing the Metaverse due to the increased difficulty in managing their time and
the many technical barriers that exist [4]. Students often lack the technical proficiency and
expertise necessary to effectively apply what they have learned [27]. Finally, the amount
of work, planning, and experimentation necessitated to successfully deploy Metaverse
in the classroom are limitations on its growth [38].
This study demonstrates the fundamental limitations of the Metaverse, despite the solid
groundwork it provides for its implementation in the classroom. For instance, this system-
atic review has certain restrictions due to the databases and keywords used. Non-English
studies on the use of the Metaverse in education were excluded from this analysis. In
58 A. Alam and A. Mohanty
addition, there were not many publications covering this issue in the leading journals for
educational technology, which may be an indication of how new this field is. Because
of this, the current study contributes to the body of knowledge among academics and
practitioners on potential avenues for future research on this topic, specifically the use
of the Metaverse in teaching and learning.
This study provides an in-depth analysis of how the Metaverse may be used in the
classroom. The findings suggest that the Metaverse might be used to solve real-world
problems in a virtual setting, opening up new educational opportunities that were pre-
viously unattainable due to constraints of time, place, and resources. Furthermore, they
reveal the gap in knowledge about the use of lifelogging in metaverse education. More
research is needed to determine how using Metaverse affects students with disabilities. It
must be delineated that providing teachers with technical support, encouraging teacher
training in both asynchronous and synchronous ways, and providing pupils with a col-
laborative, engrossing, and dynamic computer-simulated platform is extremely essential
for the successful integration of Metaverse in education.
However, although Metaverse technology is not new, it has evolved considerably
during the last two decades. With the advancement of technology comes the return of
both its advantages and its drawbacks. Many of the papers we looked at, for example,
focused more on the benefits of the Metaverse than the threats it brought. With the backing
of large technology companies, it is becoming more popular, but caution is warranted
since it poses potential threats to schools. In spite of its short existence, this technology
is extremely vulnerable due to its developmental stage. For instance, how can we ensure
the safety and privacy of our users? How does one make money in a virtual setting that
generates copious amounts of data? In a world dominated by algorithms and AI, how
do we define right and wrong? What kind of social and physiological implications may
we foresee from the Metaverse, a realm where physical and digital realities merge? We
need to scientifically explore the benefits of the Moreover, the analysed research makes
it clear that Metaverse in education is based on cutting-edge technology, which may be a
gift for schools or universities with cutting-edge infrastructure but a curse for people who
are affected by it, especially in poor nations. Metaverse may be made more accessible
and inclusive for every learner in order to contribute to the Sustainable Development
Goals (SDGs), especially SDG-4 addressing quality education.
These findings underscore the fact that application of Metaverse in classroom teach-
ing is still in its early stages, with all the associated benefits and drawbacks that it entails.
Further, vital concerns remain unanswered. For instance, in light of the impact of EdTech
firms, how will we ensure that students are given the tools they need to succeed? How do
we ensure their safety in a world where computers make all the important decisions? Is
this a brave new world where everything goes, or are we all bound by digital restraints?
Before we rush into the Metaverse, perhaps we should take a moment to reflect on the
costs we have already incurred. Is Metaverse a user that mines and profits from user-
produced data, or we, as its products, are the users? Will there be a swarm of metabots
out to fool people, or will only humans have access? When we are cut off from the real
world like this, do we have the resources to deal with cyber pathologies in these games?
If we wish to use the artificial Metaverse for educational reasons, do we have a plan to
humanise these processes? Although the novelty of the Metaverse may tempt us to go in
Metaverse and Posthuman Animated Avatars for Teaching-Learning Process 59
headfirst, there are still many serious issues to think about before making a permanent
transition there.
References
1. Alam, A.: Challenges and possibilities in teaching and learning of calculus: A case study of
India. Journal for the Education of Gifted Young Scientists 8(1), 407–433 (2020)
2. Mughal, M.Y., Andleeb, N., Khurram, A.F.A., Ali, M.Y., Aslam, M.S., Saleem, M.N.: Per-
ceptions of teaching-learning force about metaverse for education: a qualitative study. Journal
of Positive School Psychology 6(9), 1738–1745 (2022)
3. Mystakidis, S.: Metaverse. Encyclopedia 2(1), 486–497 (2022)
4. Mustafa, B.: Analyzing education based on metaverse technology. Technium Social Sciences
Journal 32, 278–295 (2022)
5. Alam, A.: Pedagogy of Calculus in India: An Empirical Investigation. Periódico Tchê Química
17(34), 164–180 (2020)
6. Zhong, J., Zheng, Y.: Empowering future education: learning in the Edu-METAVERSE. In:
2022 International Symposium on Educational Technology (ISET), pp. 292–295. IEEE (2022
July)
7. Fitria, T.N., Simbolon, N.E.: Possibility of metaverse in education: opportunity and threat.
SOSMANIORA: Jurnal Ilmu Sosial dan Humaniora 1(3), 366–376 (2022)
8. Barráez-Herrera, D.P.: Metaverse in the context of virtual education. Metaverse 3(1), 9 (2022)
9. Alam, A.: Possibilities and challenges of compounding artificial intelligence in India’s
educational landscape. Int. J. Adv. Sci. Technol. 29(5), 5077–5094 (2020)
10. Wang, H., Chen, D., Deng, Q.: The formation, development and research prospect of
educational metaverse. Educ. J. 11(5), 260–266 (2022)
11. Phakamach, P., Senarith, P., Wachirawongpaisarn, S.: The metaverse in education: the future
of immersive teaching & learning. RICE J. Creative Entrepreneu. Manage. 3(2), 75–88 (2022)
12. Yu, J.E.: Exploration of educational possibilities by four metaverse types in physical
education. Technologies 10(5), 104 (2022)
13. Alam, A.: Test of knowledge of elementary vectors concepts (TKEVC) among first-semester
bachelor of engineering and technology students. Periódico Tchê Química 17(35), 477–494
(2020)
14. Lee, H., Hwang, Y.: Technology-enhanced education through VR-making and metaverse-
linking to foster teacher readiness and sustainable learning. Sustainability 14(8), 4786 (2022)
15. Areepong, T., Nilsook, P., Wannapiroon, P.: A study of a metaverse interdisciplinary learning
community. In: 2022 Research, Invention, and Innovation Congress: Innovative Electricals
and Electronics (RI2C), pp. 290–296. IEEE (2022 August)
16. Alam, A.: Designing XR into Higher Education using Immersive Learning Environments
(ILEs) and Hybrid Education for Innovation in HEIs to attract UN’s Education for Sustainable
Development (ESD) Initiative. In: 2021 International Conference on Advances in Computing,
Communication, and Control (ICAC3), pp. 1–9. IEEE (2021)
17. Zhai, X., Chu, X., Wang, M.: Education metaverse: innovations and challenges of the new
generation of internet education formats. Metaverse 3(1), 13 (2022)
18. Singh, J., Malhotra, M., Sharma, N.: Metaverse in Education: An Overview. Applying
Metalytics to Measure Customer Experience in the Metaverse, 135–142 (2022)
19. Alam, A.: Possibilities and Apprehensions in the Landscape of Artificial Intelligence in Edu-
cation. In: 2021 International Conference on Computational Intelligence and Computing
Applications (ICCICA), pp. 1–8. IEEE (2021)
60 A. Alam and A. Mohanty
20. Burnett, G.E., Harvey, C., Kay, R.: Bringing the Metaverse to Higher Education: Engaging
University Students in Virtual Worlds. In: Methodologies and Use Cases on Extended Reality
for Training and Education, pp. 48–72. IGI Global (2022)
21. Fernandes, F.I.L.I.P.E., Werner, C.L.Á.U.D.I.A.: A Systematic Literature Review of the Meta-
verse for Software Engineering Education: Overview, Challenges and Opportunities. Preprint,
Sep. (2022)
22. Alam, A.: Should Robots Replace Teachers? Mobilisation of AI and Learning Analytics in
Education. In: 2021 International Conference on Advances in Computing, Communication,
and Control (ICAC3), pp. 1–12. IEEE (2021)
23. Contreras, G.S., González, A.H., Fernández, M.I.S., Martínez, C.B.: The importance of the
application of the metaverse in education. Mod. Appl. Sci. 16(3), 1–34 (2022)
24. Rospigliosi, P.A.: Metaverse or simulacra? roblox, minecraft, meta and the turn to virtual
reality for education, socialisation and work. Interact. Learn. Environ. 30(1), 1–3 (2022)
25. Alam, A.: A digital game based learning approach for effective curriculum transaction for
teaching-learning of artificial intelligence and machine learning. In: 2022 International Con-
ference on Sustainable Computing and Data Communication Systems (ICSCDS), pp. 69–74.
IEEE (2022)
26. Mistretta, S.: The Metaverse—An Alternative Education Space. AI, Computer Science and
(2022)
27. Dahan, N.A., Al-Razgan, M., Al-Laith, A., Alsoufi, M.A., Al-Asaly, M.S., Alfakih, T.: Meta-
verse framework: a case study on E-learning environment (ELEM). Electronics 11(10), 1616
(2022)
28. Alam, A.: Educational robotics and computer programming in early childhood education:
a conceptual framework for assessing elementary school students’ computational thinking
for designing powerful educational scenarios. In: 2022 International Conference on Smart
Technologies and Systems for Next Generation Computing (ICSTSN), pp. 1–7. IEEE (2022)
29. Wang, M., Yu, H., Bell, Z., Chu, X.: Constructing an Edu-metaverse ecosystem: a new and
innovative framework. IEEE Transactions on Learning Technologies (2022)
30. Batnasan, G., Gochoo, M., Otgonbold, M.E., Alnajjar, F., Shih, T.K.: ArSL21L: arabic sign
language letter dataset benchmarking and an educational avatar for metaverse applications.
In: 2022 IEEE Global Engineering Education Conference (EDUCON), pp. 1814–1821. IEEE
(2022 March)
31. Alam, A.: Employing adaptive learning and intelligent tutoring robots for virtual classrooms
and smart campuses: reforming education in the age of artificial intelligence. In: Shaw, R.N.,
Das, S., Piuri, V., Bianchini, M. (eds) Advanced Computing and Intelligent Technologies.
Lecture Notes in Electrical Engineering, vol 914. Springer, Singapore (2022)
32. Jovanović, A., Milosavljević, A.: VoRtex metaverse platform for gamified collaborative
learning. Electronics 11(3), 317 (2022)
33. Hwang, G.J., Chien, S.Y.: Definition, roles, and potential research issues of the metaverse
in education: An artificial intelligence perspective. Computers and Education: Artificial
Intelligence, 100082 (2022)
34. Alam, A.: Investigating Sustainable Education and Positive Psychology Interventions in
Schools Towards Achievement of Sustainable Happiness and Wellbeing for 21st Century
Pedagogy and Curriculum. ECS Trans. 107(1), 19481 (2022)
35. Arpaci, I., Karatas, K., Kusci, I., Al-Emran, M.: Understanding the social sustainability of
the Metaverse by integrating UTAUT2 and big five personality traits: A hybrid SEM-ANN
approach. Technology in Society, 102120 (2022)
36. Lee, H., Woo, D., Yu, S.: Virtual reality metaverse system supplementing remote education
methods: based on aircraft maintenance simulation. Appl. Sci. 12(5), 2667 (2022)
Metaverse and Posthuman Animated Avatars for Teaching-Learning Process 61
37. Alam, A.: Mapping a sustainable future through conceptualization of transformative learning
framework, education for sustainable development, critical reflection, and responsible citi-
zenship: an exploration of pedagogies for twenty-first century learning. ECS Trans. 107(1),
9827 (2022)
38. Wang, Y., Lee, L.H., Braud, T., Hui, P.: Re-shaping Post-COVID-19 Teaching and Learning:
A Blueprint of Virtual-Physical Blended Classrooms in the Metaverse Era. arXiv preprint
arXiv:2203.09228 (2022)
39. Alam, A.: Positive Psychology Goes to School: Conceptualizing Students’ Happiness in 21st
Century Schools While ‘Minding the Mind!’Are We There Yet? Evidence-Backed. School-
Based Positive Psychology Interventions. ECS Transactions 107(1), 11199 (2022)
40. Yang, J., Zhou, Y., Huang, H., Zou, H., Xie, L.: Metafi: device-free pose estimation via
commodity wifi for metaverse avatar simulation. arXiv preprint arXiv:2208.10414 (2022)
41. Sutopo, A.H.: Developing Teaching Materials Based on Metaverse. Topazart (2022)
42. Alam, A.: Social robots in education for long-term human-robot interaction: socially sup-
portive behaviour of robotic tutor for creating robo-tangible learning environment in a guided
discovery learning interaction. ECS Trans. 107(1), 12389 (2022)
43. Teng, Z., Cai, Y., Gao, Y., Zhang, X., Li, X.: Factors Affecting Learners’ Adoption of an
Educational Metaverse Platform: An Empirical Study Based on an Extended UTAUT Model.
Mobile Information Systems (2022)
44. Gupta, Y.P., Chawla, A., Pal, T., Reddy, M.P., Yadav, D.S.: 3D networking and collaborative
environment for online education. In: 2022 10th International Conference on Emerging Trends
in Engineering and Technology-Signal and Information Processing (ICETET-SIP-22), pp. 1–
5. IEEE (2022 April)
45. Alam, A.: Cloud-Based E-learning: Scaffolding the Environment for Adaptive E-learning
Ecosystem Based on Cloud Computing Infrastructure. In: Satapathy, S.C., Lin, J.CW., Wee,
L.K., Bhateja, V., Rajesh, T.M. (eds) Computer Communication, Networking and IoT. Lecture
Notes in Networks and Systems, vol 459. Springer, Singapore (2023). https://doi.org/10.1007/
978-981-19-1976-3_1
46. Kim, K., Jeong, Y., Ryu, J.: Does the real face provision improve the attention and social
presence in metaverse as learning environments?. In: Society for Information Technol-
ogy & Teacher Education International Conference, pp. 1760–1765. Association for the
Advancement of Computing in Education (AACE) (2022 April)
47. Lim, S., Byun, H.: Development of Learning Analysis Framework on Metaverse
48. Hines, P., Netland, T.H.: Teaching a Lean masterclass in the metaverse. International Journal
of Lean Six Sigma, (ahead-of-print) (2022)
49. Jagatheesaperumal, S.K., Ahmad, K., Al-Fuqaha, A., Qadir, J.: Advancing Education Through
Extended Reality and Internet of Everything Enabled Metaverses: Applications, Challenges,
and Open Issues. arXiv preprint arXiv:2207.01512 (2022)
Tuning Functional Link Artificial Neural
Network for Software Development Effort
Estimation
1 Introduction
The use of modern software procedures has helped software development companies
provide high-quality software on time and minimize cost. Therefore, precise cost/effort
estimation is crucial in the early stage of the software development life cycle. Accurate
effort estimation influences several fundamental project management tasks, including
budgeting, personnel, and resource allocation. Various cost estimation methods have
been proposed. Conventionally, these methods are separated into algorithmic and non-
algorithmic software cost estimation methodologies. SLIM [9] and COCOMO are two
well-known algorithmic approaches [8, 10]. The most prevalent nonalgorithmic strate-
gies include expert judgment, estimation by analogy [5, 11, 12], and machine learn-
ing techniques [13–15]. Machine-learning-based techniques, such as artificial neural
networks, analogy-based estimates, support vector regression, and classification and
regression trees have been used as an alternative to software effort prediction models.
Artificial neural networks (ANNs) are used to solve complex, mathematically ill-
defined problems. The higher-order neural network (HON) is a unique neural network
that has attracted considerable research attention because it helps overcome the limita-
tions of many non-HONs. The functional link neural networks (FLANN) is an extension
of the HON. Therefore, examining HON characteristics is critical, even though this study
focuses mainly on the CFLANN. A feed-forward neural network is inadequate for use in
several applications. Therefore, a two-layer neural network with threshold activation is
used. Minsky and Papert [16] revealed that the network always converges to linearly sep-
arable functions such as AND, OR, and NOT but cannot represent or learn XOR. Thus,
feed-forward neural networks exhibit limited expressiveness. A hidden layer with an
arbitrary activation function was introduced to address this bottleneck. This architecture
was characterized by a feed-forward neural network with many layers. Multilayer per-
ceptron with BP learning is the most widely used method. Under finite norms, the error
in approximating any bounded continuous function can be arbitrarily small if sufficient
hidden units are accessible in an MLP [17, 18]. MLP can express numerous nonlinear
functions, and except for gradient descent, it does have any other limitations. When
calculating partial derivatives, the function is assumed to be continuous in BP learning.
Consequently, the approach is seldom helpful. Second, BP learning increases the
computation cost of MLP, which slows convergence. Several local minimums exist
along the cost-function surface in the weight space for complex computer workloads.
According to a mathematical study, the gradient descent technique of BP converges to
a local minimum [19–22]. Lyapunov’s stability theory states that the output tracking
error cannot converge to zero [23]. The determination of many design factors of neural
network architecture, such as the number of hidden units and neurons in a hidden unit,
is challenging. Designing the architecture of a neural network is complex [24].
Numerous alternative neural network topologies have been proposed for nonlinear
systems based on the Lyapunov stability theory to solve the aforementioned instability
and convergence problems [25]. The explicit, hidden layer of the normal feed-forward
neural network is eliminated, and an implicitly hidden layer is established by equipping
the input layer with higher-order units known as functional expansions [26, 27]. Thus,
an entirely novel neural network paradigm known as HONs, which includes FLANNs
[28–31] and ridge polynomial neural networks (RPNNs) [32], has been proposed.
We investigated software development effort estimation (SDEE) methods based on
ANNs with functional links. FLANN’s learning algorithms incorporate genetic algo-
rithm (GA), particle swarm optimization (PSO), adaptive PSO (APSO), and improved
PSO (ISO), in addition to BP, to reduce computation load and speed convergence rate
relative to MLP. The orthogonal basis function is the polynomial functional expansion of
the Chebyshev polynomial. The FLANN is a neural network with a single layer and no
hidden layers. Chebyshev’s polynomial orthogonal basis function (functional link unit)
introduces nonlinearity and increases the dimension of the input vector. Therefore, the
FLANN requires lower processing power compared with MLP. A set of linearly inde-
pendent functional expansion units (nonlinear units) are used to generate hyperplanes
to improve discrimination in the input pattern space. A notable aspect of the FLANN
architecture for predicting software development effort is the generation of the output
(effort) by expanding the inputs (cost drivers) using orthogonal basis functions. Based
64 T. R. Benala and S. Dehuri
on the information in the network, the FLANN hidden layer can be used to predict the
effort required to construct software.
The rest of the paper is organized as follows: Sect. 2 covers the FLANN. Section 3
presents swarm-intelligence-based learning algorithms for the FLANN. Section 4 con-
tains the performance metrics that were used to evaluate SDEE accuracy. Section 5
details the COCOMO’81 test suite from the promise repository. The results of the pro-
posed SDEE models performance studies using the COCOMO’81 test suite are discussed
in Sect. 6. Finally, Sect. 7 presents the conclusion of the study.
The FLANN is a HON introduced by Klassen and Pao in 1988 [33]. It is a single-layer
feed-forward neural network for creating arbitrary complex decision regions with an
input layer and an output layer. By analyzing the final output layer to forecast output
and increasing the input vector (cost drivers), the FLANN model incorporates non-
linear input–output interactions (effort in Person-Months). Furthermore, an implicitly
concealed unit is produced after the input vector (cost driver) has been expanded using
the Chebyshev polynomial. Therefore, the weighted summation closely represents the
software development effort. Swarm-intelligence-based learning techniques train the
network and improve the output.
The block diagram of an n-dimensional input FLANN architecture is displayed in
Fig. 1. A nonlinear network with only one visible layer is used. In this method, the input
space is expanded into a high-dimensional feature space using a functional expansion
block or functional link (Chebyshev orthogonal polynomial). To evaluate the input pat-
tern, as opposed to the linear weighting of the linear links in an MLP, the functional links
produce a set of linearly independent orthogonal basis functions (nonlinear functions). To
accommodate the nonlinear characteristics of the problem, this phenomenon increases
the dimension of the input pattern. Therefore, prediction accuracy may increase in the
expanded feature space [24, 34]. FLANN learning can be considered an approximation
function that is approximating or interpolating a continuous, multivariate function. The
FLANN is a collection of orthogonal basis functions with a fixed number of weight
parameters. The functional expansion unit improves the discrimination capability of
the FLANN by increasing the dimension of an n-dimensional input pattern in the m-
dimensional feature space. The problem is obtaining the weight parameters that extend
the best possible approximation of the set of input–output examples after completing the
measure design issue of selecting the basis function [35]. Using the Stone–Weierstrass
theorem, Chen et al. [1] in 2008 revealed that the FLANN could be used as a universal
approximator.
Let k be the number of input–output pattern pairs that the FLANN should learn. The
input–output relationship of the FLANN can be described as follows. Let us consider a set
of basic functions Υ = {Φ(A)}i∈N , N = {1, 2, . . . } be the set of basis functions, where
A is a subset of n-dimensional Euclidean space Rn , „ with the following properties:
j
(1) φ1 = 1 and the subset Υj = {φi ∈ Υ }i=1 is a linearly independent set, that is, if
N 1/2
j
i=1 (θi φi ) = 0, then θi = 0 for all i = 1, 2, . . . , j, and supj φ < ∞.
2
i=1 i A
Tuning Functional Link Artificial Neural Network for SDEE 65
Thus, the FLANN consists of N basis functions {φ1 , φ2 , . . . .., φN } ∈ ΥN , with the
following input–output relationship for the jth output:
y j = ρ sj ; (1)
N
where sj = i=1 (θji φi (I )), I ∈ AR , i.e., I = [i1 , i2 , . . . .., in ] is the input
n T
T
pattern vector, y ∈ Rm , that is, y = y1 , y2 , . . . .., yn is the output vector, and
θj = [θj1, θj2, . . . . . . θjN ] is the weight vector associated with the jth output of the
FLANN. Here, ρ(.) = tanh(.) is a nonlinear function (.).
Consider the m-dimensional output vector (1), which can be expressed as
O = θ Φ, (2)
Assume the input pattern vector I k be of dimension n and the output ok be a scalar.
The training patterns are denoted by (Ik , ok ) and the network weight is θ (k), where k
is the iteration number. According to (4), the jth output of the FLANN at iteration k is
expressed as follows:
N
yj (k) = ρ θji (k)φi (Xk ) = ρ θj (k)φ T (Xk ) , (4)
i=1
For all I ∈ A and j = 1, 2, . . . ., m, where φ(Xk ) = [φ1 (Xk ), φ2 (Xk ), . . . .., φN (Xk )].
Theorem. Assume a feed-forward MLP neural network with only one hidden layer and
a linear activation function for the output layer. If all activation functions of the hidden
layer satisfy the Riemann integrable condition, the feed-forward neural network can be
represented as a Chebyshev neural network. Lee et al. (1998) provided a detailed proof
of the theorem.
−
→
xk (t + 1) = −
→
xk (t) + −
→
vk (t + 1), (7)
Based on classical PSO, an ISO improves search efficiency and increases the likelihood
of obtaining the global optimum without considerably reducing the speed of convergence
or the simplicity of the PSO structure. The mathematical model of ISO is as follows:
−
→ →
vk (t + 1) = λ ⊗ −
→ c1 ⊗ −
vk (t) + −
→ →
r1 (t) ⊗ −pk (t) − −
→
xk (t)
→
+−→
c ⊗−
2
→
r (t) ⊗ −
2 p (t) − −
g
→x (t) ,
k (12)
−
→
xk (t + 1) = −
→
xk (t) + −
→
vk (t + 1), (13)
where λ is the newly defined adaptive inertia weight whose value decreases with each
iteration. The inertia weight decreases linearly until Gen1 and nonlinearly from Gen1 +
1 to Gen2, as presented in eqns. (14) and (15). The inertia weight adaptation mechanism
Tuning Functional Link Artificial Neural Network for SDEE 69
enables the IPSO algorithm to achieve the best results by balancing the trade-off between
exploration and exploitation [24].
λ1
λ1 = λ0 − ×i ∀i = 1..Gen1, (14)
Gen1
(Gen1 + 1) − i
λ1 = (λ0 − λ1 ) × exp ∀i = Gen1 + 1..Gen2, (15)
i
where λ0 represents the initial weight, λ1 represents the end point of linear selection,
Gen1 represents the number of generations during which inertia weight is decreased
linearly, and Gen2 represents the maximum generation. The values of λ0 and λ1 are
based on empirical observations.
The more the particle improves, the smaller the area it should explore. The exploration
capability of PSOs is greater than the exploitation capability. Therefore, the model out-
performs local search in terms of global search. With a high probability, the self-adaptive
evolutionary strategy generates small Gaussian and Cauchy perturbations suitable for
local search optimization. The model improves the particle by calibrating PSO solutions.
APSO is an advancement over PSO that improves search efficiency and increases the
likelihood of reaching the global optimum by dynamically varying the inertia weight
based on population fitness variance. The inertia weight determines how the previous
velocity of the particle influences its velocity at the current time step [39, 40]. The inertia
weight wi is updated by calculating the population fitness variance as follows:
M fi − favg 2
τ= , (22)
i=1 f
where favg = average fitness of the population, fi = fitness of the ith particle in the
population, and M = total number of particles.
f = −max fi − favg i = 1, 2, . . . ., M , if max fi − favg > 1 (23)
= −1 if max fi − favg < 1 (24)
3.4 GA
Inspired by biological evolution, Holland created the GA in 1975 [2]. The GA is a prob-
abilistic search algorithm based on Darwin’s principle of biological evolution through
reproduction and “survival of the fittest” [3]. The algorithm begins with a randomly
generated population of individuals (chromosomes). The search for a global optimum is
managed by shifting from an initial population of individuals to a new population using
genetics-like operators such as selection, crossover, and mutation. The explanation of
the proposed genetic-CFLANN algorithm pseudo-code is as follows:
Tuning Functional Link Artificial Neural Network for SDEE 73
3.5 BP
BP is a fundamental neural network platform that was first used in the 1960s and pop-
ularized in 1989 by Rumelhart, Hinton, and Williams. BP is used to train feed-forward
neural networks and is applicable to other ANNs and functions. When fitting a neural
network, BP is used to efficiently compute the gradient of the loss function for the net-
work weights for a single input–output sample. To train multilayer networks, gradient
methods can be used to update weights to minimize loss. Gradient descent and stochas-
tic gradient descent are popular methods. In BP, the chain rule is used to calculate the
74 T. R. Benala and S. Dehuri
gradient of the loss function for each weight one layer at a time, iterating backward from
the last layer to avoid unnecessary calculations of intermediate terms [41]. The proposed
BP-CFLANN algorithm pseudo-code is as follows:
MRE i = , (30)
yi
Therefore, MMRE = ni=1 MRE i /n
MdMRE, a global error measure, is defined as the median of all MREs and is less
sensitive to outliers.
MdMRE = median(BRE i ), (31)
PRED(x) is described as the percentage of predictions falling within the actual known
value x, specified as follows:
100 N
PRED(x) = × Di , (32)
N i=1
Tuning Functional Link Artificial Neural Network for SDEE 75
1 if MBRE < 100
x
Di = , (33)
0 otherwise
(34)
N
i=1 AE i
MAE = , (35)
N
MAE
SA = 1 − , (36)
MAE P0
MAE − MAEP0
= , (37)
s P0
• Actual and projected project efforts are yi and yi . The mean absolute error of the pre-
diction model is MAE. MAE P0 is the mean of many random guesses. a yi for the target
case t is predicted by random sampling (with equal probability) over all the remaining
n − 1 case and considering yt = yr , where r is taken from 1, . . . . . . ., n r = t.
15 effort multipliers are used to modify the software development effort based on its
qualities. The cost drivers are the multiplying factor, that is, very low, low, nominal,
high, very high, and extra high. Based on the factor’s effect on productivity, an actual
number (effort multiplier) is assigned to each rating.
We tested four CFLANN models. First, PSO-CFLANN trains CFLANN with PSO. Sec-
ond, ISO-CFLANN tweaks CFLANN’s weights using ISO. Third, the APSO-CFLANN
model fine-tunes weights. Fourth, genetic-CFLANN optimizes CFLANN weights using
a GA. The proposed techniques are compared with well-known techniques such as func-
tional link artificial neural networks with BP learning and ANNs with back-propagation
learning. Method validity depends on selecting and creating experimental circumstances.
This section describes the circumstances of the experiment. The proposed solutions are
implemented on a PC with an Intel Core i5- 2410M, 2.30 GHz CPU, 4 MB RAM, and
MATLAB 8.3 programming environment. Using min-max normalization in the interval
[0, 1] eliminates the unequal feature effect [45]. The dataset is randomly partitioned
into training and testing subsets. Leave-one-out cross-validation is used to assess model
accuracy. The algorithm is trained on N−1 random occurrences and validated on one.
Cross-validation is repeated N times [46]. The training set constructs the model, the
validation set tweaks to control parameters, and the test set predicts model performance.
The outcomes of the strategies outlined in Sect. 3 are reported. The outcomes of
simulations using the COCOMO dataset for PSO-CFLANN, APSO-CFLANN, ISO-
CFLANN, Genetic-CFLANN, BP-CFLANN, and BP-ANN are presented in Tables 2 and
3. According to Table 2, the MMRE and MdMRE results revealed that PSO-CFLANN
is superior to all other approaches, with values of 0.000259 and 8.49E−05, respectively.
PRED (0.25) delivers identical results across all approaches. Because the research on
SDEE indicates that MMRE and PRED are biased performance indicators, SA and
DELTA are used to determine the optimal technique, and results are depicted in Table 3.
At PSO-CFLANN, the SA and DELTA values are greater, with SA = 99.94 (in percent-
age) and DELTA = 3.4895, thereby confirming the superiority of the PSO-CFLANN to
other approaches.
The comparison of the prediction models used for the COCOMO’81 Dataset is
displayed in Figs. 2, 3, and 4. The efficacy of each model is determined using three
distinct types of graphs. The first graph is a 2Dplot of MAE values for a line graph,
whereas the second is a histogram. On the x-axis of each MAE graph, the number
of COCOMO dataset simulation projects is indicated. The MAE graphs reveal that for
PSO-CFLANN and ISO-CFLANN, the generalization error assessed over the validation
examples increases until project number 20, and subsequently steadily decreases as the
number of projects increases, overcoming the overfitting issue (low training error and
high testing error). By contrast, numerous strategies exhibit overfitting concerns (low
training error and high testing error). The MAE graphs reveals that as the number of
training examples increases, PSO-CFLANN and ISO-CFLANN become better suited to
handle overfitting concerns. Figure 4 depicts the boxplot of all approaches, indicating
that ISO, GA, and BP CFLANNs have more error dispersion than other approaches.
Tuning Functional Link Artificial Neural Network for SDEE 77
SA DELTA
Training Validation Testing Training Validation Testing
PSO-CFLANN 0.99986 0.99928 0.99947 0 2.7627 3.4895
APSO-CFLANN 0.99986 0.99982 0.9999 0 3.4424 2.7082
ISO-CFLANN 0.99981 0.99997 0.99985 0 0.933 1.0638
Genetic-CFLANN 0.99962 0.99959 0.99988 0 0.26906 0.5378
BP-CFLANN 0.99982 0.99982 0.99982 0 0.17986 0.202
BP-ANN 0.99965 0.99985 0.99964 0 0.59613 0.1208
Fig. 2. MAE outcomes and comparison to all techniques on the COCOMO dataset
78 T. R. Benala and S. Dehuri
Fig. 3. MAE outcomes and comparison to all techniques on the COCOMO dataset
We detailed the approach for using swarm intelligence techniques, such as PSO, APSO,
ISO, and GA, to optimize the weight parameters of the CFLANN. The approaches antic-
ipate the software development effort by using the optimum weight value acquired by
swarm intelligence techniques and the set of Chebyshev polynomials orthogonal basis
functions selected for the functional expansion of feature vectors. The results of the
Tuning Functional Link Artificial Neural Network for SDEE 79
empirical study revealed that the strategies of swarm intelligence enhance the perfor-
mance of CFLANN. In most instances, the PSO-CFLANN model provided outcomes
that were comparable or superior to the best results obtained by the APSO-CFLANN,
ISO-CFLANN, genetic-CFLANN, BP-CFLANN, and BP-ANN. The PSO-CFLANN
model’s architectural complexity is considerably less than that of MLP and is the same
as or less than that of the CFLANN with BP. This feature of PSO-CFLANN may encour-
age SDEE researchers to perform additional studies in this domain. Future studies should
concentrate on the symbiotic interaction between swarm intelligence and other soft com-
puting techniques, as well as the concurrent growth of architecture and weights with a
Pareto set of solutions for the next generation of SDEE. Calibration of input patterns
from low to high dimension utilizing clones of HONs such as ridge polynomial neural
networks and pi-sigma neural networks is another research direction.
References
1. Chen, C.H., Lin, C.J., Lin, C.T.: A functional-link-based neurofuzzy network for nonlinear
system control. Fuzzy Systems, IEEE Transactions on 16(5), 1362–1378 (2008)
2. Holland, J.H.: Adaption in Natural and Artificial Systems. The University of Michigan Press,
Ann Arbor (1975)
3. Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs. Springer,
Heidelberg (2013). https://doi.org/10.1007/978-3-662-03315-9
4. Chiu, N.H., Huang, S.J.: The adjusted analogy-based software effort estimation based on
similarity distances. J. Syst. Softw. 80(4), 628–640 (2007)
5. Huang, S.J., Chiu, N.H.: Optimization of analogy weights by genetic algorithm for software
effort estimation. Inf. Softw. Technol. 48(11), 1034–1045 (2006)
6. Lee, T.T., Jeng, J.T.: The Chebyshev-polynomials-based unified model neural networks for
function approximation. IEEE Trans. Syst. Man Cybern. Part B Cybern. 28(6), 925–935
(1998)
7. Pao, Y.H., Takefuji, Y.: Functional link net computing: theory, system, architecture and
functionalities. IEEE Comput. 76–79 (1992)
8. Boehm, B.W.: Software Engineering Economics, vol. 197. Prentice-Hall, Englewood Cliffs
(1981)
9. Putnam, L.H., Myers, W.: Measures for Excellence: Reliable Software on Time, Within
Budget. Prentice Hall Professional Technical Reference (1991)
10. Huang, X., Ho, D., Ren, J., Capretz, L.F.: Improving the COCOMO model using a neuro-fuzzy
approach. Appl. Soft Comput. 7(1), 29–40 (2007)
11. Shepperd, M., Schofield, C.: Estimating software project effort using analogies. IEEE Trans.
Softw. Eng. 23(11), 736–743 (1997)
12. Auer, M., Trendowicz, A., Graser, B., Haunschmid, E., Biffl, S.: Optimal project feature
weights in analogy-based cost estimation: improvement and limitations. IEEE Trans. Softw.
Eng. 32(2), 83–92 (2006)
13. Heiat, A.: Comparison of artificial neural network and regression models for estimating
software development effort. Inf. Softw. Technol. 44(15), 911–922 (2002)
80 T. R. Benala and S. Dehuri
14. Shin, M., Goel, A.L.: Empirical data modeling in software engineering using radial basis
functions. IEEE Trans. Softw. Eng. 26(6), 567–576 (2000)
15. Oliveira, A.L.: Estimation of software project effort with support vector regression. Neuro-
computing 69(13), 1749–1753 (2006)
16. Minsky, M., Papert, S.: Perceptrons. MIT Press, Cambridge (1969)
17. Hornik, K., Stinchcombe, M., White, H.: Multilayer feed-forward networks are universal
approximators. Neural Netw. 2(5), 359–366 (1989)
18. Cybenko, G.: Approximations by superpositions of a sigmoid function. Math. Controls Sig.
Syst. 2, 303–314 (1989)
19. Guillermo, V.: A distributed approach to neural network simulation program. Master thesis,
The University of Texas at E1 Paso, TX (1998)
20. Zurada, J.M.: Introduction to Artificial Neural System. West Publishing Company, St. Paul
(1992)
21. Beale, R., Jackson, T.: Neural Computing: An Introduction. Hilger, Philadelphia (1991)
22. AlBataineh, A., Kaur, D., Jalali, S.M.J.: Multi-layer perceptron training optimization using
nature inspired computing. IEEE Access 10, 36963–36977 (2022)
23. Man, Z., Wu, H.R., Liu, S., Yu, X.: A new adaptive back-propagation algorithm based on
Lyapunov stability theory for neural networks. IEEE Trans. Neural Netw. 17(6), 1580–1591
(2006)
24. Dehuri, S., Cho, S.B.: A comprehensive survey on functional link neural networks and an
adaptive PSO–BP learning for CFLNN. Neural Comput. Appl. 19(2), 187–205 (2010)
25. Kosmatopoulos, E.B., Polycarpou, M.M., Christodoulou, M., Ioannou, P.: High-order neural
network structures for identification of dynamical systems. IEEE Trans. Neural Netw. 6(2),
422–431 (1995)
26. Giles, C.L., Maxwell, T.: Learning, invariance and generalization in higher-order neural
networks. Appl. Opt. 26(23), 4972–4978 (1987)
27. Pao, Y.H.: Adaptive Pattern Recognition and Neural Network. Addison-Wesley, Reading
(1989)
28. Dehuri, S., Roy, R., Cho, S.B., Ghosh, A.: An improved swarm optimized functional link
artificial neural network (ISO-FLANN) for classification. J. Syst. Softw. 85(6), 1333–1345
(2012)
29. Mirea, L., Marcu, T.: System identification using functional link neural networks with dynamic
structure. In: 15th Triennial World Congress, Barcelona, Spain (2002)
30. Cass, R., Radl, B.: Adaptive process optimization using functional link networks and
evolutionary algorithms. Control EngPract. 4(11), 1579–1584 (1996)
31. Pao, Y.-H., Philips, S.M.: The functional link net learning optimal control. Neurocomputing
9, 149–164 (1995)
32. Shin, Y., Ghosh, J.: Ridge polynomial networks. IEEE Trans. Neural Netw. 6(2), 610–622
(1995)
33. Klasser, M.S., Pao, Y.H.: Characteristics of the functional linknet: a higher order delta rule
net. In: IEEE proceedings of 2nd Annual International Conference on Neural Networks, San
Diago, CA (1988)
34. Elyounsi, A., Tlijani, H., Bouhlel, M.S.: ISAR-image recognition using optimized HONN
by a Metaheuristic algorithm. In: 2022 IEEE 9th International Conference on Sciences of
Electronics, Technologies of Information and Telecommunications (SETIT), pp. 97–103.
IEEE, May 2022
35. Patra, J.C., Van den Bos, A.: Modeling of an intelligent pressure sensor using functional link
artificial neural networks. ISA Trans. 39(1), 15–27 (2000)
36. Qi, Y., Pan, L., Liu, S.: A Lyapunov optimization-based online scheduling algorithm for
service provisioning in cloud computing. Futur. Gener. Comput. Syst. 134, 40–52 (2022)
Tuning Functional Link Artificial Neural Network for SDEE 81
37. Vilsen, S.B., Stroe, D.I.: Transfer learning for adapting battery state-of-health estimation from
laboratory to field operation. IEEE Access 10, 26514–26528 (2022)
38. Barrera, J., Coello, C.A.C.: A review of particle swarm optimization methods used for mul-
timodal optimization. In: Lim, C.P., Jain, L.C., Dehuri, S. (eds.) Innovations in Swarm Intel-
ligence, vol. 248, pp. 9–37. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-
04225-6_2
39. Gad, A.G.: Particle swarm optimization algorithm and its applications: a systematic review.
Arch. Comput. Methods Eng. 1–31 (2022)
40. Nickabadi, A., Ebadzadeh, M.M., Safabakhsh, R.: A novel particle swarm optimization
algorithm with adaptive inertia weight. Appl. Soft Comput. 11(4), 3658–3670 (2011)
41. Backpropagation – Wikipedia, 1 August 2022. https://en.wikipedia.org/wiki/Backpropa
gation
42. Cohen, J.: A power primer. Psychol. Bull. 112, 155–159 (1992)
43. Shepperd, M., MacDonell, S.: Evaluating prediction systems in software project estimation.
Inf. Softw. Technol. 54(8), 820–827 (2012)
44. Mall, R.: Fundamentals of Software Engineering. PHI Learning Pvt. Ltd., New Delhi (2018)
45. Kocaguneli, E., Menzies, T.: Software effort models should be assessed via leave-one-out
validation. J. Syst. Softw. 86(7), 1879–1890 (2013)
46. Kohavi, R., John, G.H.: Wrappers for feature subset selection. Artif. Intell. 97(1–2), 273–324
(1997)
47. Kennedy, J., Eberhart, R.C.: Particle swarm optimization. In: Proceedings of the IEEE
International Conference on Neural Networks, Perth, Australia, pp. 1942–1948 (1995)
METBAG – A Web Based Business Application
Abstract. Digitization has made the online business in the domain of core sector
of metals, minerals and ores more competitive. A lot of web and mobile appli-
cations are available to make the process smooth. However, a user has to follow
the price trend and analyse it in order to make the right choice. This and possible
repetition of the process leads to its slowing down. Also, from the company per-
spective the operations and transactions involved makes the process complex. So,
automation in generating the Irrevocable cooperate purchase order (ICPO) and
Sales and Purchase Agreement (SPA), invoices and Non Circumvention and Non-
Disclosure Agreement (NCNDA) forms is highly recommended. For increment in
business accurate data analytics plays an important role. It is our aim in this paper
to focus on developing an automated web application to frame a transaction inte-
grated with all necessary features which is user-friendly from the letter of intent
till the generation of invoice for the user and an auto generated dashboard for the
company. The process includes the price prediction for the products and also takes
care of the security of user credentials in view using hashing and multi-lingual
jumbled salting.
1 Introduction
The competition in the online business in the domain of core sector of metals, minerals
and ores has increased extensively due to the businesses moving digital [1]. Many indus-
trial companies do not have e-commerce websites, they have struggled to fully embrace
this strategy because of the complexities involved, particularly those related to distribu-
tor management, and thus they remain stuck at the pilot stage. Direct e-commerce sales
can help industrial companies, as it gives them more of a connection to end customers
and their needs. The analysis framework has proved to be useful for assessing the power
of every considered methodology to affect the planning of business processes in web
applications. Requirements for methodology to design business processes are represent-
ing component activities, describing possible workflows, defining and managing state
of web transaction, specifying which activities can be suspended or resumed, describe
how two or more users are related in a transaction, specify how content navigation and
operation affect each other, which contents will be provided to user to support execution
of an activity, defining which information objects are affected by executing the activity
and describing how the activity will be customized. Three dimensions of analysis frame-
work are the business requirements, user requirements and system requirements. The
user requirements include a simple user interface, all necessary features and tools for
completing the transaction, security of credentials, etc. Business requirements mainly
include the track of user activity on the platform, business performance using numbers
and statistics and reduced work load for repetitive work. But the web applications in
this sector lack a lot of user requirements like lack of proper UI, integrated analytics
system [9] for the admin because of which they go to third-party tools, credential secu-
rity and other user utilities. For the security of the credentials, SHA-512 hash algorithm
has become popular because of complex hash generated by it [10]. But hashes can be
cracked using guess and check technique [7]. Therefore, salting along with it is used
to enhance security. Also, the price prediction systems are of great use for the business
transactions and can be largely seen in a number of applications. But for this accurate
price based on recent market dynamics are needed to be predicted. Also, there are num-
ber of other utilities which are to be included in order to provide a good experience to
the user [2]. Also, providing a data analytical system [6] and dashboard to the business
admin helps in taking data-driven decisions and prevents them from going to third-party
for the services. So, this application focuses on an automated web application to frame
a transaction integrated with all necessary features which is user-friendly from the letter
of intent till the generation of invoice for the user and an auto generated integrated dash-
board for the company [8]. The process includes the price prediction for the products
based on recent market dynamics and also takes care of the security of user credentials
in view using hashing and multi-lingual jumbled salting.
2 Literature Review
Many industrial companies do not have an e-commerce web application, they find it
difficult to fully implement this strategy due to the complexity involved, particularly
related to the management of distributors, and are therefore stuck in the pilot phase.
Many of them do not meet all user requirements, such as getting real-time prices of
products, user-friendly interface, lack of complete information, ease of activities to be
performed like submission of LOI & ICPO, reordering etc. Often these things become the
reason for loss of business. Direct selling by e-commerce can help industrial companies
because it allows them to be closer to the end customer and his needs.
So, this system takes care of the above-mentioned gaps and develops a system with
the objective of:
• Develop metal price prediction model using the market price values to get relevant
predicted price values.
• Using techniques like SHA-512 hashing [3] and multi-lingual jumbled salting for
security of the user credentials [4]
• Use of technologies like bootstrap, chart.js, HTML, CSS and jQuery for designing
and developing a good user interface.
• Applying the SQL techniques and plotting techniques to extract the valuable infor-
mation from the collected user data and putting it in the form of dashboards and
tables.
Description of Modules
• About: This module describes about the company, their operations and about the CEO
of the company.
METBAG – A Web Based Business Application 85
• Pricing: This module displays the price trends. The module also gives the option of
price conversions to desired currencies along with the option of price prediction of
the product chosen by the user and the price prediction using the different domains
of provided based on the user input. The domains are the different products and each
domain has a separate data of prices which is a time-series data, which would be the
input for the model after processing.
• Metals: This module displays all the products with the analysis of each product and
the query tab.
• Query: This module is for the user to clear his queries regarding a particular product
that he wishes to know about.
• Registration: This module is for the user signup. The entered password is hashed and
also a random multi-lingual salt generated is also hashed and then both the hashes
are concatenated in alternative jumbled manner to generate a 256 characters long
password string. Other details like the username and email are also collected.
• Login: The username and password are required for authentication. Password entered
is hashed and then the password stored in database is extracted and sliced to match
with the entered password hash.
• LOI: After selecting product the user fills the LOI form with the LOI PDF. After
submitting, the user will receive Sales and Purchase Agreement and the ICPO and
Sales and purchase Agreement link after reviewing LOI.
• ICPO: This module is for the order submission. The user enters all the details of the
order and submits the order. After placing the Order, the user will receive NCNDA
form and the invoice.
• Reorder: The user can click on the reorder tab against each order displayed in the user
login. After clicking, the user gets the auto filled ICPO form and the user can place
the order.
86 N. Akshaj and B. K. Tripathy
The admin side system architecture is provided in Fig. 2 The below figure explains the
flow user follows in order to complete a transaction. This also dives the flow of data in
and out of the database. Thus giving a brief about the admin side of the application.
• Registration: This module is for the admin signup. The entered password is hashed
and also a random multi-lingual salt generated is also hashed and then both the hashes
are concatenated in alternative jumbled manner to generate a 256 characters long
password string. Other details like the username and email are also collected.
• Login: The username and password are required for authentication. Password entered
is hashed and then the password stored in database is extracted and sliced to match
with the entered password hash.
• Total Business: This module shows the amount of each product sold and amount of
revenue total generated by each product
• LOI Track: This module shows the list of all the LOI pending to be converted with
the download option of each LOI file.
• Dashboard: This is the visualization module displaying the business analytical
dashboard
4 Workflow Diagrams
We provide the workflow diagrams of the system in two components in this section
(Fig. 3 and Fig. 4).
METBAG – A Web Based Business Application 87
5 Procedures
The entire procedure is divided into 3 parts; price prediction, password security and
dashboard. We provide the three procedures below.
88 N. Akshaj and B. K. Tripathy
6 Result Analysis
6.1 Price Prediction
The performance metrics used are Confusion matrix and the F1-Score. Confusion matrix
consists of:
METBAG – A Web Based Business Application 89
• True Positive: a true positive is an outcome where the model correctly predicts the
positive class.
• True Negative: a true negative is an outcome where the model correctly predicts the
negative class.
• False Positive: A false positive is an outcome where the model incorrectly predicts
the positive class.
• False Negative: False Negatives (FN) are negative outcomes that the model predicted
incorrectly.
The Technique used was regression, but for testing on the basis of the confusion
matrix, the output has to be of the classification type. So, to convert the output and
original array of prices to binary form, the elements of the arrays were normalized. Then
the normalized values were rounded to the nearest integers, therefore all the values were
either 0 or 1 using the formula
Element of the Prediction Price Array - min(Prediction Price Array)
round (1)
max(Prediction Price Array) - min(Prediction Price Array)
The F-score, also called the F1-score, may be a measure of a model’s accuracy on
a dataset. It is used to evaluate binary classification systems, which classify examples
into ‘positive’ or ‘negative’.
TP
F1 − score = (2)
TP + 2 (FP
1
+ FN )
Value of the F1-Score is between 0 and 1. Higher the value better is the model.
We use python language for the implementation of the system [5]. The dataset used is
presented in Fig. 5.
Fig. 5. Dataset
The resultant password after salting and hashing is 256 characters long and padded with
the noisy salt characters. Although Hash is irreversible, the attackers try “guess and
Check” method to crack the password. They hash a random generated string and match
with the hashed password. So as this password will now have the noisy characters, this
will become more difficult to guess the password string.
The user registration is shown in Fig. 10, The password generated salt and password
using hashing is shown in Fig. 11. A resultant password is shown in Fig. 12.
92 N. Akshaj and B. K. Tripathy
We developed a system for a complete business transaction with all the necessary mod-
ules available to the user at a single place. It reduces the tedious task for the user to go for
different websites in search of market price research and analysis, which many a times
leads to losing the client. Also, using regression model and LSTM, which is the best when
it comes to dealing time series data, the prices prediction of the metals helps the user to
get the insight of the next price, whether it would increase or decrease. It is seen that
the model performance evaluated using F1-score is coming to be 0.963855421686747
for iron ore, 0.997289972899729 for COMEX gold, 0.9642857142857143 for plat-
inum, 0.90032153408306 for palladium and 0.9939393939393939 for Silver 5000oz.
The security of the credentials is also a major concern. providing security using SHA-
512 hashing which itself is a highly preferred security practice and in addition to that
METBAG – A Web Based Business Application 93
References
1. Distante, D., Rossi, G., Canfora, G.: Modelling business processes in web applications: an
analysis framework. In: Proceedings of the 2007 ACM symposium on applied computing,
pp. 1677–1682 (2007)
2. Verma, J., Shahrukh, M., Krishna, M., Goel, R.: A critical review on cryptography and hashing
algorithm SHA-512. Int. Res. J. Modernization Eng. Technol. Sci. 03(12), 1760–1764 (2021)
3. Sumagita, M., Riadi, I., Sh, J.P.D.S., Warungboto, U.: Analysis of secure hash algorithm
(SHA) 512 for encryption process on web-based application. Int. J. Cyber-Security and Digital
Forensics (IJCSDF) 7(4), 373–381 (2018)
4. Kharod, S., Sharma, N., Sharma, A.: An improved hashing-based password security scheme
using salting and differential masking. In: 2015 4th International Conference on Reliability,
Infocom Technologies and Optimization (ICRITO), (Trends and Future Directions), pp. 1–5.
IEEE (2015)
5. Nagpal, A., Gabrani, G.: Python for data analytics, scientific and technical applications. In:
2019 Amity international conference on artificial intelligence (AICAI), pp. 140–145. IEEE
(2019)
6. Thomas, D.M., Mathur, S.: Data analysis by web scraping using python. In: 2019 3rd Inter-
national conference on Electronics, Communication and Aerospace Technology (ICECA),
pp. 450–454. IEEE (2019)
7. De Guzman, F.E., Gerardo, B.D., Medina, R.P.: Implementation of enhanced secure hash
algorithm towards a secured web portal. In: 2019 IEEE 4th International Conference on
Computer and Communication Systems (ICCCS), pp. 189–192. IEEE (2019)
8. Manjushree, B.S., Sharvani, G.S.: Survey on Web scraping technology. Wutan Huatan Jisuan
Jishu 16(6), 1–8 (2020)
9. Appelbaum, D., Kogan, A., Vasarhelyi, M., Yan, Z.: Impact of business analytics and
enterprise systems on managerial accounting. Int. J. Account. Inf. Syst. 25, 29–44 (2017)
10. Gupta, P., Kumar, S.: A comparative analysis of SHA and MD5 algorithm. Int. J. Comp. Sci.
Info. Technol. 5(3), 4492–4495 (2014)
11. Liu, S., Liao, G., Ding, Y.: Stock transaction prediction modelling and analysis based on
LSTM. In: 2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA),
pp. 2787–2790. IEEE (2018)
12. Bhattacharyya, S., Snasel, V., Hassanian, A.E., Saha, S., Tripathy, B.K.: Deep learning
research with engineering applications. De Gruyter Publications (2020). https://doi.org/10.
1515/9783110670905
13. Maheswari, K., Shaha, A., Arya, D., Tripathy, B.K., Rajkumar, R.: Convolutional neural
networks: a bottom-up approach. In: Bhattacharyya, S., Hassanian, A.E., Saha, S., Tripathy,
B.K. (eds.) Deep Learning: Research and Applications, pp. 21–50. De Gruyter Publications
(2020). https://doi.org/10.1515/9783110670905-002
94 N. Akshaj and B. K. Tripathy
14. Bose, A., Tripathy, B.K.: Deep learning for audio signal classification. In: Bhattacharyya, S.,
Hassanian, A. E., Saha, S., Tripathy, B. K. (eds.) Deep Learning: Research and Applications,
pp. 105–136. De Gruyter Publications (2020). https://doi.org/10.1515/9783110670905-00660
15. Adate, A., Tripathy, B.K.: A Survey on Deep Learning Methodologies of Recent Applications.
In: Acharjya, D.P., Mitra, A., Zaman, N. (eds.) Deep Learning in Data Analytics. SBD, vol.
91, pp. 145–170. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-75855-4_9
16. Kaul, D., Raju, H., Tripathy, B.K.: Deep Learning in Healthcare. In: Acharjya, D.P., Mitra,
A., Zaman, N. (eds.) Deep Learning in Data Analytics. SBD, vol. 91, pp. 97–115. Springer,
Cham (2022). https://doi.org/10.1007/978-3-030-75855-4_6
17. Tripathy, B.K., Parikh, S., Ajay, P., Magapu, C.: Brain MRI segmentation techniques based
on CNN and its variants. In: Chaki, J. (ed.) Brain Tumor MRI Image Segmentation Using
Deep Learning Techniques, Chapter-10, pp. 161–182. Elsevier publications (2022). https://
doi.org/10.1016/B978-0-323-91171-9.00001-6
18. Bhardwaj, P., Guhan, T., Tripathy, B.K.: Computational biology in the lens of CNN, studies
in big data. In: Roy, S.S., Taguchi, Y.-H. (eds.) Handbook of Machine Learning Applications
for Genomics, (Chapter 5), vol. 103 (2021). ISBN: 978-981-16-9157-7 496166_1_En
19. Prabhavathy, P., Tripathy, B.K., Venkatesan, M.: Analysis of diabetic retinopathy detection
techniques using CNN models. In: Mishra, S., Tripathy, H.K., Mallick, P., Shaalan, K. (eds.)
Augmented Intelligence in Healthcare: A Pragmatic and Integrated Analysis. Studies in Com-
putational Intelligence, vol. 1024, pp. 87–102. Springer, Singapore (2022). https://doi.org/10.
1007/978-981-19-1076-0_6
20. Sandhu, S.S., Tripathy, B.K., Jagga, S.: KMST+: A K-Means++-Based Minimum Spanning
Tree Algorithm. In: Panigrahi, B.K., Trivedi, M.C., Mishra, K.K., Tiwari, S., Singh, P.K.
(eds.) Smart Innovations in Communication and Computational Sciences. AISC, vol. 669,
pp. 113–127. Springer, Singapore (2019). https://doi.org/10.1007/978-981-10-8968-8_10
21. Adate, A., Tripathy, B.K.: S-LSTM-GAN: Shared Recurrent Neural Networks with Adver-
sarial Training. In: Kulkarni, A.J., Satapathy, S.C., Kang, T., Kashan, A.H. (eds.) Proceedings
of the 2nd International Conference on Data Engineering and Communication Technology.
AISC, vol. 828, pp. 107–115. Springer, Singapore (2019). https://doi.org/10.1007/978-981-
13-1610-4_11
Designing Smart Voice Command Interface
for Geographic Information System
Keywords: Virtual assistant · VOS viewer · ASR · Computer science · IOT · GIS
1 Introduction
The voice-based command is integrated in most of the IOT based device these days for
the ease of the user. The purpose to work in design and implementation of such a device
for defence is because the normal graphic user interface (GUI) and mouse that is used,
usually needs the attention of the user. There are many times when the user might be
stuck in a situation where the user may not be capable enough to focus on all the tasks
at the same. Some of the scenarios to name are: - while navigating and driving, while
handling different kind of machineries at the same time. In this moment it’ll be better if
the user can get the assistance side by side so that the cognitive abilities of user can be
divided fairly towards the more important things that needs to be focused upon at that
moment of emergency.
Some of the key applications of voice assistant are as follows: -
Unmanned aerial vehicle operations: - The voice command can play a very effec-
tive role in Unmanned aerial vehicle operations by simply making the Unmanned aerial
vehicle operate several functions just by uttering the respective query attached to that
function instead of manually maneuvering over the physical console.
Pilot Communication & autopilot with the voice-enabled console: - There are
times when the Pilot might be switching to autopilot mode and would require accessing
some emergency buttons even in the autopilot mode. So, in such a tough situation, the
voice command interface can come handy so that the pilot need not have to think much
on dealing with the physical panel rather he would just utter the command to initiate the
whole process smoothly.
Specially abled person: - This voice command interface can work as a boon for
almost every specially abled individual so that they can make use of the system to
perform several functions where in no physical assistance would be required from the
user’s end.
Health check-in and communication: - This voice command interface can also
be integrated with a health-based application which can easily maneuver the cardinal
state of a person in a situation where they might be collapsing or on the verge of getting
collapsed more over the interface can detect and directly communicate the same with
their emergency contact.
The voice assistant comes with the ability to render through the queries of user within
seconds even when there is a lot of disturbance and noise. The organization for which
even one second can cost a life and pride of the country, this becomes a crucial role to
leave the minor tasks in an automated mode and focus on the tasks that really needs a
cognitive attention to work with. The assistant can really work it out at times when the
human needs to open a particular application say “maps” or needs to see how much time
it will take to hop on from not 1 but 5 different locations at the same time by rendering
over the maps and providing the user an output that is backed by facts. There is no limit
to what a voice assistant can be capable of doing for the user.
• Network Visualization
• Overlay Visualization
• Density Visualization
The 3 visualizations that was created by using CSV file of related topic of the research
will be shown and then a theoretical inference would be generated out of it.
In Fig. 1, it is shown that out of all the keywords present in form of text in our
publications, only these are the relevant keywords that have occurred more than ten times
in every paper. The relevance score has been generated with the help of a machine learning
algorithm that is working in the backend of the model [1]. The Network map diagram of
the review literature on voice command interface gives the collaborative picture of area
Designing Smart Voice Command Interface for Geographic 97
After describing the architecture, the model’s implementation will be thoroughly dis-
cussed under this heading, along with the scenarios that have been created to check the
efficiency of the same.
The dataset for the voice-based command model NAKSHA includes every query-based
command utilized by the model. The model has been evaluated to see how it performs
using examples of instructions that relate to real-world situations and can be used to
generate real-world scenarios.
Following are the commands for the smart voice-based system:
• Wake-up command will help the system and will listen and greet with a given set of
commands, in this case, which is “Hello Naksha”.
• For online search for a particular website the query named “Website” is used wherein
the user can speak “open the website” along with the respective website that user wants
the assistant to open. e.g., “Naksha Open Website Facebook” as a result assistant will
open.
98 S. Pant and N. Panigrahi
• Similarly, there’s an “Open maps” query which once spoken will redirect the user
to the map location of the Centre for Artificial Intelligence and Robotics, DRDO,
Bangalore that is where this model was developed.
Designing Smart Voice Command Interface for Geographic 99
• If the user wants to shut down the system, then the user can simply speak “Bye” and
the voice assistant will greet the user goodbye and the system will stop.
• For additional activities a query named “music” is also included, wherein a user can
request to play a track of their choice and the assistant will play the track for the user
which for now is targeted in a location inside a directory of the local machine.
• There’s another feature where if a user is interested in closing or opening a new tab
while the user is working online, can do so by just speaking “open new tab” and “close
this tab”.
• “Introduction” is another query wherein the assistant will brief the user about its origin
and the purpose for which it is built (Xie et al., 2019) [5].
This was the brief theoretical knowledge about the dataset i.e., the query-based voice
commands that is being used in this proposed model.
Designing a voice-based command interface for a system has many dependencies
and factor. The prime factor being: -
(a) Response time: - The response time is an efficient parameter in the designing of the
voice command interface, which decides that how quick the interface is responding
to the given query. The Naksha AI has a response time of 5 s in which it listens to
the query and responds with an answer within 5 s time.
(b) Error rate: - The error rate is simply defined as the number of errors divided by the
total number of words. This parameter defines the efficiency of the voice assistant.
Lower the word error rate more structured would be the input, hence, the output of
100 S. Pant and N. Panigrahi
the voice assistant would be more reliable. The Naksha AI has a word error rate of
16.5% respectively.
Below is provided the Table 2 which comprises of the dataset for smart voice-based
command interface for a menu-driven system describing all the functions in brief for the
given query-based common system pointwise.
S No Query Function
1 Hello Wake word & Assistant will greet
2 Introduce The Assistant will tell the user about it’s origin & purpose
3 Bye The assistant will shutdown the process
4 Open Maps Assistant will open the base map location for CAIR, DRDO
5 Youtube Search The assistant will directly youtube search the given phase
6 Open New Tab Assistant will open a new tab in google.com
7 Close this tab Assistant will close the existing tab on google.com
8 The time The assistant will tell us the time according to IST
9 Website The assistant will open a website
10 Music The assistant will play the music from a local directory inside the
system
11 Google Search It will google search the phrase that user said
Datetime Module
• In python programming language the python datetime module can be used to provide
a specific date and time in the python code.
• The classes that are supplied by the datetime module provide functions that are used
to deal with dates and times.
• The Date Time module is an inbuilt module of python.
• With the help of this module we can easily open and close a particular application
through open() and close() function.
Pyttsx3 Module
• It is a python-based module.
• It is used to convert text into speech.
• Pyttsx3 works offline unlike other libraries which require intern connectivity.
• This module is compatible with both versions, python2 and python3.
• This particular module is supported by two voices i.e., male and female for windows.
2.3 Methodology
The explanation of the proposed voice command-based model for a menu driven system
that has been constructed end to end on visual studio code has been explained through
a flow chart.
refer the Subsect. 3.3. Therefore, from comprehending the issue statement to creating a
dataset, to implementing and coding the model to improve an existing automatic speech
recognition system [6].
The above methods will now be illustrated step by step, along with snippets from
the programs.
2.4 Implementation
Step 1: First, understand the problem statement, which was to create a voice-based
command system that could function without the need to define each command line by
line accurately, instead providing a query for a function to be executed.
Step 2: Flowchart of the proposed model has been created to better understand the logic
behind creating it and the complexities that needs to get resolved with it.
Step 3: Installed the respective libraries on Visual Studio Code where the model has
been coded (Fig. 4).
Step 4: After importing the libraries, now the voice module for the assistant is imported
with which it will respond to the user, there are several voice-based application pro-
gramming interface that can be used for the voice command-based model. Some of the
most popular models that are used are sapi5, kaladi, deep speech and Alexa skills.
In Fig. 5, the voice architecture of the server application programming interface has
been displayed for the better understanding of the working of it inside the voice-based
command system. Here the managed app and native app both are interacting with the
application programming interface and system.speech* which further interacts with a
speech engine that recognizes and synthesizes the voice signal programming interface
and system.speech which further interacts with a speech engine which recognizes and
synthesize the voice signal (Fig. 6).
Step 5: The function has been defined which will help the assistant understand how to
speak after understanding the voice command it can speak and execute the task according
to the given rules.
Designing Smart Voice Command Interface for Geographic 103
Step 6: Wishme() function has been created to greet the user on the basis of IST i.e.
Indian standard time.
Wherein time-wise greeting is assigned to the user:
• If the time is greater than 0:00 h and less than 12:00 then greet with “Good Morning”.
• If the time is greater than or equal to 12:00 h and less than 18:00 then greet with
“Good Afternoon”.
• Else greet with “Good Evening”
These are the following program that has been coded inside the wish me function.
Therefore, whenever the code will run this would be the initial voice commands that
the assistant will use to greet the user after which it’ll take the further queries of the user
and execute them. This is one of the essential functions that need to get included inside
104 S. Pant and N. Panigrahi
the assistant for a better human interaction as the first thing all humans do is greet each
other. In order to give it a touch this function has been created.
Step 7: In this step, the execution of the given tasks will take place as shown in Fig. 7.
With the help of the task execution function. This function will let the assistant know
which task needs to get executed when the user calls up that query. Inside this function
user can add a different kind of task according to the required use case and then can
provide the respective commands that need to be programmed for the task to get executed.
As soon as the task gets executed the assistant awaits another task again.
Step 9: In this step we will simply define different kind of smart voice-based
command/query- based command that we will be using as an input to train and test
the model. The model will be provided with several queries and will be tested in a noisy
environment to check how quick it understands and interprets the voice signal to generate
the given query in the output.
Some of the given voice-based command on this model are (Fig. 9):
The Fig. 8 demonstrates the takecommand() function, different kind of queries are
taken for the assistant and then respective responses for every query is given so that the
assistant respond when that particular query is called upon by the user at the time of
testing the model. Figure 10 gives a demonstration of all the chrome automation query
that has been coded in the model so that whenever the user is working with the chrome
engine then the user can use this command.
As a result, this is the entire scenario, starting with how the problem statement was
understood and how the dataset for the problem statement was selected to build the
functions that allow the assistant to speak and understand any command the user gives.
106 S. Pant and N. Panigrahi
The query here is the voice-based commands which get executed when the user says
them in the system.
Therefore, this paper gives an overview of the design and implementation that took
place in this voice-based command interface for a menu-driven system.
The term “voice recognition devices” is not new; in fact, these devices have been around
since the late 1980s (Terzopoulos et al.,2020) [7]. The training that has been done on
the model with increasingly modern datasets at each and every iteration has been what
has ultimately contributed to it achieving better results over time. While the model is
being trained on a substantial amount of data, it is able to comprehend the distinctions
that exist between each and every phrase, word, and phenome.
In order to check the reliability, and responsiveness of the model and if it is feasible to
get deployed for the use in defense sector, we create a warzone like environment to test
out model.
Inside a room an environment has been created which is somewhat similar to a war
zone where there is a lot of disturbance.
• An audio27 is adapted from YouTube28 of a war sound which is played in full volume
on the mobile phone that is, iPhone 13, which generates 104.7dBA ~ 105dBA when
it is at it’s full volume.
• The audio was played for approximately five minutes.
• Meanwhile, two commands were given to the assistant first “Open Maps” and other
“Open new tab”
• The model was able to interpret both the commands in that scenario and was able to
execute the tasks.
• The snippet of the same is shown below in Fig. 8 where the model successfully opened
the base location in the map along with the other 2 new tabs.
Therefore, we have achieved the end result, by testing our model in this environment.
Designing Smart Voice Command Interface for Geographic 107
This measure has been evaluated and visualized to understand the audio quality
and the audibility of the assistant’s speech. The frequency on the y axis of the Fig. 14
108 S. Pant and N. Panigrahi
describes the frequency rate for the voice signal that is being generated when the assistant
responds to the user on a google website query. The Fig. 13 shows the voice signal when
the google website query response is being uttered by the assistant. The Fig. 14 simply
defines when and with how much pressure the voice is being generated from the assistant.
This will help to gather the information about the quality of audio that is coming out of
the assistant so that when it will work in a real-time scenario it works correctly.
Designing Smart Voice Command Interface for Geographic 109
Figure 15 shows that the word error rate of the kaladi based automatic speech recog-
nition model when trained and tested on the dataset is getting a word error rate of 25
percentage and the same when did with the Naksha- smart voice-based assistant for the
110 S. Pant and N. Panigrahi
menu driven system, the word error rate is being reduced by a significant value of 8.49
percentage, dropping down to 16.51 percentage. The smart voice-based assistant has
also been tested on difficult scenarios where the voice-based model has performed well
and provided effective results in the given dataset. Hence it can be seen that the current
model fulfils the respective use cases for which it was meant to be built.
Fig. 16. Line chart displaying the difference in word error rate
From these charts in Fig. 15 and Fig. 16 it can easily be inferred that the kaladi
based automatic speech recognition system which was used till now had a word error
rate of 25%, with which the assistant was facing a lot of issue in comprehending the
voice command in noisy environment.
On contrary, with the development of Naksha - voice assistant this parameter has
been reduced to 8.49% which is a significant change and upliftment in the features
of the already built automatic speech recognition model (ASR) earlier. The purpose
of building an advanced version of this kaladi based system was to achieve a system
which could understand the query-based command in the scenarios where there is a
lot of disturbance and ambient noise and can provide the better results to the user. The
spectrogram in Figs. 11 and 13 proved that the voice quality of the assistant is up to the
mark as the voice sample is under the frequency range of 20–20000 Hz of voice band
(Bentley et al.,2018) [8]. The contours formation in the voice sample of Fig. 11 and
Fig. 13 proves that as and when the sample is being executed every single detail of the
voice is clearly visible which tends towards the conclusion that user can comprehend
the voice of the assistant clearly.
Designing Smart Voice Command Interface for Geographic 111
4 Conclusion
The main goal of this research was to build a model that can easily work on a machine
that is safe and secure and for working in geographic information system data. This
voice-based model has many pros if compared with the already existing model in the
organization. The speech model when tested in different scenarios could easily compre-
hend what the user said and was able to execute the respective command given by the
user. The word error rate of the proposed model was approximately 8% less than the pre-
vious model which made it easier to interpret the words quickly (Belanche et al.,2019)
[9].
The best part of this model is that many of the things that the user was not able to
change earlier now have full ability to change according to user’s will. The model can
be re-created according to the given use case.
The automatic speech recognition30 model is not a new concept rather it has been
in existence since the 1950s but as and when the time passed now every industry or
organization simply uses it according to their problem statement and needs. Similarly,
this research has been created to fill the void of having a smart voice-based assistant that
could fulfil the needs of defence organizations (Yan et al.,2022) [10].
Further on I’d like to start by quoting one of the famous quotes said by famous
scientist Albert Szent-Györgyi “Research is to see what everybody else has seen, and
to think what nobody else has thought”. Moving on the same line it can be figured that
some of the work that could be done to improve the voice assistant is by integrating
a layer of authenticity so that nobody instead the authoritative user can only have the
access to whole system just by the tone of voice which will be a far more advanced step
in this field where passcode, fingerprint or retina-based authentication are in use that can
easily be breached or manipulated by allies for an illegal purpose (Hansen et al.,2015)
[3]. With the help of a powerful voice-based authentication system soon one can not
only automate and multitask but can also safely work even in the tough environment
where there’s a risk of leaking of the data (Kepuska et al.,2018) [4].
Acknowledgement. Authors are thankful to Director, CAIR-DRDO for his support to carry out
this research. This research did not receive any specific grant from funding agencies in the public,
commercial, or not-for-profit sectors.
References
1. Panigrahi, N., Mohanty, S.P.: Brain Computer Interface. CRC Press (2022)
2. App.dimensions.ai (n.d.)
3. Hansen, J.H.L., Hasan, T.: IEEE Signal Process. Mag. 32, 74 (2015)
4. Kepuska, V., Bohouta, G.: 2018 IEEE 8th Annual Computing and Communication Workshop
and Conference (CCWC) (2018). https://doi.org/10.1109/ccwc.2018.8301638
5. Xie, B., Charness, N., Fingerman, K., Kaye, J., Kim, M.T., Khurshid, A.: J. Aging Soc. Policy
32, 460 (2020)
6. Amershi, S., et al., Proceedings of the 2019 CHI Conference on Human Factors in Computing
Systems - CHI ’19 (2019). https://doi.org/10.1145/3290605.3300233
112 S. Pant and N. Panigrahi
1 Introduction
(CNN), a widely used image classifier, is based on biological neural networks ([17, 18]),
which include many layers with neurons connected directly to neurons in the next layer
[26]. The use of CNN has the advantage of being independent of prior knowledge and
requiring less work in extracting features and design ([19, 22]). In image detection and
classification, the CNN has been a significant success ([23, 24]). A pre-trained model is
used as the basis for a new model in the machine learning technique known as transfer
learning [3]. A CNN named EfficientNet-B0 was trained by using more than a million
images from the ImageNet database. The network can categorize images into a thousand
different object categories. Hence, using this in our model as a base layer would lead
to faster optimization and hence better results. No human workforce is required in the
adopted and implemented methodology. Trash items can be directly thrown into the
main container, which acts as a common space for attached separate dustbins and where
segregation takes place ([4, 5]).
2 Literature Review
In the paper by Lam, K.N. et al. [9], by using SSD-MobileNetv2, the server can identify
and classify 3 types of garbage: bottles, nylon, and scrap paper. The SSD architecture is a
single convolution network that learns to anticipate and classify bounding box locations
in a single run. As a result, SSD can be trained from beginning to end. All garbage has
been labeled and the position is returned to the Four Degrees Of Freedom (4 DoF). 4 DoF
can pick up and return the garbage to the correct trash bin. With SSD-MobileNetv2, the
recognition and classification of garbage have achieved an elevated level of accuracy. A
system has been developed that effectively visually classifies and separates several types
of waste, a task that would typically require manual labor. It does this by utilizing the
most recent innovations in computer vision, robot control, and other sectors and taking
advantage of their maturity as proposed by Salmandor et al. [2] and Adedeji et al. [10]. A
system that can analyze pictures from a camera and command a robot arm and conveyer
belt to automatically classify several types of waste has been developed using current
technology according to A. P. Puspaningrum et al. [1] and White et al. [14]. To detect and
classify domestic garbage, a novel deep CNN based on the multimodal cascading method
was developed in the papers by Simonyan et al. [7], Meng et al. [12] and Thanawala
et al. [13]. They created a smart trash bin system as the platform’s front-end carrier of
household garbage disposal, communicating directly with residents and providing data
support. They also gathered 30 000 rubbish pictures from homeowners as a dataset for
model training and identified 52 distinct types of waste. A multi-target detection model
for garbage pictures was also established at the same time to improve detection precision.
The trials revealed that the suggested method can improve detection precision by more
than 10% on average, and it also performs well in terms of model size and detection
time. In the paper by Kang et al. [15], ResNet-34 was found to perform the best and was
tweaked to perfection. Resnet34 is a 34-layer convolutional neural network that can be
used to create a cutting-edge image classification model. This model has been pre-trained
on the ImageNet dataset, which contains 100,000+ images from 200 different classes.
However, it differs from traditional neural networks in that it uses residuals from each
layer in the subsequent connected layers. Three modifications were made to the ResNet-
34 model, including multi-feature fusion, residual unit feature reuse, and optimization
Smart Garbage Classification 115
of the activation function, to address the problem of trash classification. The changes
are put to the test on a trash dataset containing 14 different sorts of garbage items. The
original model has a precision of 0.9859. ResNet34-A’s accuracy has been improved
to 0.9941 using multi-feature fusion. ResNet-34-B’s residual unit accuracy has been
enhanced to 0.9995. With the changed activation function, the accuracy of ResNet-34-
C has increased to 0.9928. The highest accuracy is 0.9996 for ResNet-34-ALL, which
integrates all three modifications. The automatic trash classification system is completed
with the suggested algorithm and associated hardware. This system’s average cycle time
for classifying is 0.95 s, and its accuracy for classifying is 0.9996.
In [9], the performance of the model can be improved by the following methods: A. The
performance of classification can be improved by training more models. B. The labeling
of images should be done carefully. C. This model can recognize only 3 types of garbage,
which is not enough according to the real-world scenario. So, more types should be
added to compare and evaluate the training model. In the paper by Li et al. 2022 [6], the
accuracy of the model can be further improved. Waste detection and automatic sorting
need more attention. The method proposed by Kang et al. [15] has several limitations: The
classification in the case of small targets has a scope for improvement. The classification
criteria can further be extended, including more categories such as kitchen waste, etc.
Overall, a general gap that is observed is the lack of classification categories, lower
accuracy scores, and complex structures. These are some points researchers are aiming
to improve upon. We have tried to provide solutions to some of the limitations in our
work.
3 System Details
The overall architecture of the system is shown through a prototype and can be described
in the following steps. The name of the prototype which we have made is ‘smart dustbin’.
The waste is scanned by using a web camera as in Fig. 1. When a person puts a waste in
the bin, the camera is ready to scan the waste so that it can be classified by the dustbin.
We have also provided a light source, so that there is no problem in scanning even when
it is dark.
The waste is segregated from the image produced in Fig. 1. This is shown in (Fig. 2).
Here, after scanning, the waste is classified as one of the items, and then the respective
lid to that compartment opens.
116 A. Jain et al.
3.3 Moving of Hands and Trash Being Put into Respective Compartment
Once the lid is opened, two hands move in both the direction to push the waste down
the opened compartment. This is shown in Fig. 3.
The workflow of the system is depicted in Fig. 4.
As stated in the diagrams, and the workflow, when a garbage is thrown, there is a
camera present to capture an image of the garbage. The image is then processed to the
CNN model. After the image is identified, it is classified into one of the categories. After
Smart Garbage Classification 117
this, the lid of the appropriate dustbin opens and the arms move to push the garbage into
the opened compartment.
waste into its respective container upon successful classification. Firstly, the arm moves
from left to right, sweeping the product to the extreme right, allowing it to fall into its
respective container, and then it moves from right to left for a similar sweep. Eventually,
the item will reach its respective container after both arm movements are completed.
The second main module is the software component, that is, the model that is being used
to classify the waste item. A deep neural network is used for this purpose, and the best
fitting model is saved as a “.h5” file. Now, this file is loaded into the Raspberry Pi module,
which is the third module connecting hardware and software components by providing
a control structure for the process of classification. It runs the machine learning models
for the classification process [11]. According to the classification results, the respective
lid opens, and hand movements begin.
5 Algorithmic Steps
The dataset used was publicly available on Kaggle and is made from web scraping
the images. This dataset has 15,150 images from 12 different classes of household
garbage: paper, cardboard, biological, metal, plastic, green-glass, brown-glass, white-
glass, clothes, shoes, batteries, and trash. ([8, 26]) Some sample images in the dataset
are shown in Fig 5.
The algorithm used for image classification is straightforward. The process starts
with the creation of a dataset and preprocessing. The dataset was found to be highly
imbalanced and hence the distribution was improved by re-sampling the dataset [16].
The images are captured inside the main container in an isolated environment, so
there is no need for segmentation (to separate the object from the background). Image
augmentation is a method of altering original images by applying various transformations
to them, resulting in many altered copies of the same image. These picture augmenta-
tion approaches not only increase the amount of the dataset but also add variance to it,
allowing the model to generalize better on unknown data. The images are preprocessed
using ImageDataGenerator. It offers a variety of augmentation options, including stan-
dardization, rotation, shifts, flips, brightness changes, and more. It is designed to provide
real-time enhancement of the data. In other words, it generates augmented images while
the model is still learning. The ImageDataGenerator class ensures that the model gets
fresh iterations of the images at every epoch [25]. The input image must be resized in
accordance with the classifier input layer before being fed to the classifier.
After preprocessing is done, the image is passed to the network and hence the model
is trained. The concept of transfer learning is used here. Basically, as an optimization,
a model trained on one job is reconfigured on a second, similar job, allowing for rapid
progress while creating a model for the second job. The pre-trained model used here
is EfficientNet-B0, which is relevant to our system as it has learned rich feature rep-
resentations for a wide range of images. A flatten layer and a dense layer are further
added to the network and the model is compiled using the Adam optimizer. Optimizers
are modules that adjust model attributes like weights and learning rates to minimize
losses. Optimizers are generally preferred during training as they aid in obtaining faster
outcomes.
During the training of the model, the concept of early stopping is used, where vali-
dation loss is monitored with a patience of 10. Basically, it stops the model fitting before
the total number of epochs if the model isn’t improving. The best trained model is saved
to a “.h5” file and is used to perform classification in real time.
The table in Fig. 6 provides the classification of trash into different classes in the first
12 rows. While the columns under precision, recall and F1-measure are as explained in
the formulae provided, the last three are on the whole data set of 999 elements. The last
column provides the distribution of 999 elements into different classes (mentioned in
the first column) in the 12 rows.
The simulated working of the model is depicted in Fig. 7 and Fig. 8. We can see that
in this case, the model correctly classified the items as ‘plastic’ and ‘clothes’.
So, as we can see, the camera detection analysis helps us recognize the type of waste
successfully. This shows that the model was trained effectively and, hence, the object
identification and detection were made possible in a matter of seconds. The accuracy
Smart Garbage Classification 121
in some of the classes is better than in others. This smart, quick, and efficient method
of classification makes segregation a lot easier and faster. We are the future generation,
and it is our responsibility to look after the plant and dump waste in the allotted bins
122 A. Jain et al.
(biodegradable or non-biodegradable). Only if we take care of the planet will our future
generations be able to thrive in a stable way.
As the outcomes of this study show, the problem of trash picture categorization may
be solved with high accuracy using deep learning algorithms. The achieved accuracy was
93% on the testing dataset. The use of EfficientNet-B0 and the Adam optimizer helped
to attain this accuracy score. This accuracy can be improved by further preprocessing
the dataset.
7 Conclusions
This paper focuses highly on how we can segregate waste and differentiate it into partic-
ular kinds so that each kind can be identified and recycled. Every kind is re-used in some
way or other and we save our planet. The proposed model is much simpler than the other
proposals and the number of categories is increased to 12, which allows a more realistic
real-world implementation. The twelve categories include: battery, biological, brown-
glass, cardboard, clothes, green-glass, metal, paper, plastic, shoes, trash and white-glass.
Currently, the size of the dataset is relatively small and there are 12 categories, with each
category having only a few samples. Merging a few categories and scraping the internet
for more data can result in better accuracy. Even though the neural network is complex,
the process of real-time classification is amazingly fast, which increases the efficiency
of the proposed system.
References
1. Puspaningrum, A.P., et al.: Waste classification using support vector machine with SIFT-PCA
feature extraction. In: 2020 4th International Conference on Informatics and Computational
Sciences (ICICoS), pp. 1–6 (2020). https://doi.org/10.1109/ICICoS51170.2020.9298982
2. Salmador, A., Pérez Cid, J., Rodríguez Novelle, I.: Intelligent garbage classifier. Intelligent
Garbage Classifier. Int. J. Interact. Multimedia and Artificial Intelligence 1(1), 31–36 (2008)
3. Gao, M., Qi, D., Mu, H., Chen, J.A.: Transfer residual neural network based on resnet-34 for
detection of wood knot defects. Forests 12, 212 (2021)
4. Gondal, A.U., et al.: Real time multipurpose smartwaste classification model for efficient recy-
cling in smart cities using multilayer convolutional neural network and perceptron. Sensors
21, 4916 (2021). https://doi.org/10.3390/s21144916
5. Wang, H.: Garbage recognition and classification system based on convolutional neural net-
work vgg16garbage recognition and classification system based on convolutional neural net-
work VGG16. In: 2020 3rd International Conference on Advanced Electronic Materials,
Computers and Software Engineering (AEMCSE), pp. 252–255 (2020). https://doi.org/10.
1109/AEMCSE50948.2020.00061
6. Li, J., et al.: Automatic detection and classification system of domestic waste via multimodel
cascaded convolutional neural network. IEEE Trans. Industr. Inf. 18(1), 163–173 (2021)
7. Simonyan, K., Zisserman, A.: Very Deep Convolutional Networks for Large-Scale Image
Recognition, in arXiv:1409.1556 [cs], San Diego, CA, USA, pp. 1–14 (2015)
8. Mostafa, M.: Garbage Classification (12 classes). Dataset on Kaggle (2020). https://www.kag
gle.com/mostafaabla/garbage-classification
Smart Garbage Classification 123
9. Lam, K.N., et al.: Using artificial intelligence and IoT for constructing a smart trash bin.
In: Dang, T.K., Küng, J., Chung, T.M., Takizawa, M. (eds.) FDSE 2021. CCIS, vol. 1500,
pp. 427–435. Springer, Singapore (2021). https://doi.org/10.1007/978-981-16-8062-5_29
10. Adedeji, O., Wang, Z.: Intelligent waste classification system using deep learning convo-
lutional neural network. Procedia Manuf. 35, 607–612 (2019). https://doi.org/10.1016/j.pro
mfg.2019.05.086
11. Khan, R., et al.: Machine learning and IoT-based waste management model. Comput. Intell.
Neurosci. 2021, 1–11 (2021)
12. Meng, S., Chu, W.T.: A study of garbage classification with convolutional neural networks.
In: 2020 Indo–Taiwan 2nd International Conference on Computing, Analytics and Networks
(Indo-Taiwan ICAN), pp. 152–157. IEEE (2020)
13. Thanawala, D., Sarin, A., Verma, P.: An approach to waste segregation and management
using convolutional neural networks. In: Singh, M., Gupta, P.K., Tyagi, V., Flusser, J., Ören,
T., Valentino, G. (eds.) ICACDS 2020. CCIS, vol. 1244, pp. 139–150. Springer, Singapore
(2020). https://doi.org/10.1007/978-981-15-6634-9_14
14. White, G., Cabrera, C., Palade, A., Li, F., Clarke, S.: WasteNet: Waste classification at the
edge for smart bins. arXiv preprint arXiv:2006.05873 (2020)
15. Kang, Z., Yang, J., Li, G., Zhang, Z.: An automatic garbage classification system based
on deep learning. IEEE Access 8, 140019–140029 (2020). https://doi.org/10.1109/ACCESS.
2020.3010496
16. Ziouzios, D., Tsiktsiris, D., Baras, N., Dasygenis, M.: A distributed architecture for smart
recycling using machine learning. Future Internet 12(9), 141 (2020)
17. Bhattacharyya, S., Snasel, V., Hassanian, A.E., Saha, S., Tripathy, B.K.: Deep Learning
Research with Engineering Applications. De Gruyter Publications (2020). https://doi.org/
10.1515/9783110670905
18. Maheshwari, K., Shaha, A., Arya, D., Rajasekaran, R., Tripathy, B.K.: 2 Convolutional neural
networks: a bottom-up approach. In: Bhattacharyya, S., Snasel, V., Hassanien, A.E., Saha,
S., Tripathy, B.K. (eds.) Deep Learning: Research and Applications, pp. 21–50. De Gruyter
(2020). https://doi.org/10.1515/9783110670905-002
19. Bose, A., Tripathy, B.K.: Deep learning for audio signal classification. In: Bhattacharyya, S.,
Hassanian, A.E., Saha, S., Tripathy, B.K. (eds.) Deep Learning Research and Applications,
pp. 105–136. De Gruyter Publications (2020). https://doi.org/10.1515/9783110670905-00660
20. Adate, A., Tripathy, B.K.: A survey on deep learning methodologies of recent applications.
In: Acharjya, D.P., Mitra, A., Zaman, N. (eds.) Deep Learning in Data Analytics. SBD, vol.
91, pp. 145–170. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-75855-4_9
21. Kaul, D., Raju, H., Tripathy, B.K.: Deep learning in healthcare. In: Acharjya, D.P., Mitra,
A., Zaman, N. (eds.) Deep Learning in Data Analytics. SBD, vol. 91, pp. 97–115. Springer,
Cham (2022). https://doi.org/10.1007/978-3-030-75855-4_6
22. Tripathy, B.K., Parikh, S., Ajay, P., Magapu, C.: Brain MRI segmentation techniques based
on CNN and its variants. In: Brain Tumor MRI Image Segmentation Using Deep Learning
Techniques, pp. 161–183. Elsevier (2022). https://doi.org/10.1016/B978-0-323-91171-9.000
01-6
23. Prabhavathy, P., Tripathy, B.K., Venkatesan, M.: Analysis of diabetic retinopathy detection
techniques using CNN models. In: Mishra, S., Tripathy, H.K., Mallick, P., Shaalan, K. (eds.)
Augmented Intelligence in Healthcare: A Pragmatic and Integrated Analysis, pp. 87–102.
Springer Nature Singapore, Singapore (2022). https://doi.org/10.1007/978-981-19-1076-0_6
24. Adate, A., Tripathy, B.K.: S-LSTM-GAN: shared recurrent neural networks with adversarial
training. In: Kulkarni, A.J., Satapathy, S.C., Kang, T., Kashan, A.H. (eds.) Proceedings of the
2nd International Conference on Data Engineering and Communication Technology. AISC,
vol. 828, pp. 107–115. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-1610-
4_11
124 A. Jain et al.
25. Subramanian, M., Narasimha Prasad, L.V., Sathishkumar, V.E.: Hyperparameter optimiza-
tion for transfer learning of VGG16 for disease identification in corn leaves using bayesian
optimization. Big Data 10(3), 215–229 (2021)
26. Lu, W., Chen, J.: Computer vision for solid waste sorting: a critical review of academic
research. Waste Manage. 142, 29–43 (2022)
Optical Sensor Based on MicroSphere
Coated with Agarose for Heavy Metal Ion
Detection
1 Introduction
A decent crop in plants can be ensured by the soil’s optimal zinc concentration.
All living things require zinc, a micronutrient important for growth, develop-
ment, and defence. According to Indira Sarangthem et al. (2018), the critical
limits in soil nutrients, such as Zn2+ characteristics, to distinguish between
adequacy and deficiency are 0.69mgKg −1 . Rastegarzadeh and Rezaei (2008)
designed an optical sensor to detect Zn2+ ion by spectrophotometry. He used
Zincon as a sensing agent. The procedure metnoined requires laboratory set up
and the method has a limit of detection of 0.16M . Aksuner et al. (2011) devel-
oped a sensor membrane, in laboratory, that is capable of determining Zn2+ ions
with a LOD of 1.6μgL−1 . Hassana et al. (2021) used cystalline optical fibers as
a sensor for the Zn2+ ion concentration using the image processing method.
c The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Panda et al. (Eds.): ICIICC 2022, CCIS 1737, pp. 125–136, 2022.
https://doi.org/10.1007/978-3-031-23233-6_9
126 A. K. Tripathy and S. K. Tripathy
The sensor showed a sensitivity of about 73.47%. Gupta et al. (2016) synthe-
sized 2-((5-methylpyridin-2-ylimino)methyl)phenol (L1) chemosensor, in labora-
tory, for detection of Zn2+ ions with a LOD of 1.13 × 10−7 M . Abbasitabar et
al. (2011) showed how to determine Zn2+ using a very accurate and reversible
optical chemical sensor that uses dithizone as the chromoionophore immobilised
within a plasticized carboxylated PVC sheet.
The development of optical sensors has received significant analytical atten-
tion due to its advantages in terms of size, cost, ease of sample preparation, speed
of measurement, and lack of dependence on a reference solution as mentioned
by Fen et al. (2013). Ramdzan et al. (2020) mentions that future development
of innovative sensing composites with outstanding sensitivity and selectivity for
heavy metal ion detection and other practical sensing applications may greatly
benefit from the development of biopolymers and conducting polymers with SPR
sensors. Lim and Yoon (2015) emphasized on vigorous pursuance of research into
the creation of a water-quality measurement device that will allow us to deter-
mine the potability of water swiftly and precisely at a reasonable cost for the
general population. An experimentally proven fiber-optic interferometric sensor
for N i2+ detection was proposed by Raghunandhan et al. (2016). The lower
detection limit was found to be 0.1671M , while the detection sensitivity was
found to be 0.05537nm/M . In the concentration range up to 500M , the sug-
gested sensor displays a linear response. Heavy metal ion detection using an
optrode, an optic-chemical sensor, has been developed by Czolk et al. (1992). Ions
like Cd(II), Pb(II), or Hg(II) can be complexed to produce distinct absorbance
spectra, which alters the sensor’s reflection behaviour. In the instance of Cd,
the impact of immobilisation on the dye’s complexation properties has been
investigated (H). For Cd, the sensor’s detection limit is 3 × 10−6 mol/l, and
it is reversible (U). Zhang et al. (2020) summarized progress of optical fiber
heavy metal ion sensors through various measurement methods based on optical
absorbance, fiber grating, modal interference, plasmonic and fluorescence. The
sensing characteristics of fiber-optic heavy metal ion sensor were also analyzed.
With the sensor reported by Klimant and Otto (1992) , heavy metal ions in
the concentration range of 3 × 10−6 to 3 × 10−5 M can be determined quickly
and simply. To be fully reversible, the sensor must be regenerated using diluted
HN O3 . The sensor may be used for the online measurement of the total concen-
tration of heavy metal ions in industrial waste water. In their investigation of
heavy metal pollution in various Indian soils, Kumar et al. (2019) revised prior
knowledge on both the average heavy metal contamination in soil. The review
by Lu et al. (2018) provides an overview of current developments in the use of
electrodes modified with inorganic materials for the electrochemical detection
of heavy metal ions (HMIs) in contaminated soils and other mediums. In this
study, Jeong and Kim (2015) investigated whether aminosilane (APTES) might
be used as a colorimetric detecting agent for heavy metal ions in the aqueous
phase. The amine group in APTES has a strong affinity for bivalent metal ions
and is easily synthesised into the metal-amine complex, which might be trans-
formed into metal nanoparticles, through self-seed generation with silanization
of APTES.
Optical Sensor Based on MicroSphere Coated with Agarose 127
The discussion shows that there is a need for highly accurate, reasonably
priced, and user-friendly HM ion concentration sensors. The organisation of this
document is as follows. The Sect. 2 describes the intended device’s sensing idea.
Section 3 discusses the device design process. The results are examined and our
proposed sensor is compared with other sensors that are already being used in
the literature in the Sect. 4. Section 5 concludes the discussion.
2 Sensing Principle
The FDTD approach, which is based on the Yee (1966) algorithm, is used to
investigate electromagnetic wave propagation since it reduces the amount of
compute and memory needed, according to Qiu and He (2000) and Qiu and He
(2001). An area of space is selected for field sampling in both space and time. At
t = 0, all fields in the sample region are zero. Examining mode radiation makes
use of the central difference approximation. The following update equations from
Sundaray et al. (2018) are used in our simulation.
n+1 n−1 n
2 2 Δt n
D̃ = D̃ + √ Hy − Hy
i,j i,j Δy. μ0 ω0 i+1 i−1
2 ,j 2 ,j
(1)
Δt n
n
− √ Hx + Hx
Δx. μ0 ω0 i, j+1 i, j−1
2 2
(n+1) n−1
Hx = Hx
i, j+1
2 i, j+1
2
n+1 n+1 (2)
Δt 2 2
− √ Ez + Ez
Δz. μ0 ω0 i,(j+1) i,j
(n+1) (n−1)
Hx = Hx
i+1 i+1
2 ,j 2 ,j
n+1 n+1 (3)
Δt 2 2
− √ Ez + Ez
Δz. μ0 ω0 (i+1),j i,j
The x and y coordinate axes of the lattice space increments are referred to as Δx
and Δy. The coordinates of the sample sites are represented by the numbers i and
j, which stand for x and y, respectively. The time increment is represented by Δt
and coupled to the number n to localise a predetermined observation interval.
A perfectly matched layer (PML) was employed to ensure the uniqueness and
validity of the numerical solution of Maxwell’s equations inside the computation
domain. In this study, the spatial step (Δx, Δy) is 40 λ
and the temporal step
−12
(Δt) is 2 × 10 s. λ is the signal wavelength. Additionally, stability is attained
when the following conditions are met:
− 12
1 1 1
Δt < + (4)
c Δx2 Δy 2
128 A. K. Tripathy and S. K. Tripathy
where c is the speed of light. Here, the loss in the proposed sensor caused
by transmission-related absorption or scattering is not taken into account. A
correction factor is included in the simulation to account for these losses.
According to Baaske and Vollmer (2012) optical microcavities have devel-
oped into one of the most sensitive micro/nanosystems biodetection technology.
Light enters our proposed structure through the glass rod and the microsphere.
According to Tripathy et al. (2022), light is trapped inside the micro-sphere and
circulates for many tens of thousands of times because of the material’s pre-
dominate absorption loss. If scattering losses at the microsphere’s boundary are
controlled and light absorption in the transparent material is kept to a mini-
mum, photons can go around their orbit thousands of times before exiting the
microsphere via the loss mechanism. According to Soria et al. (2011), the long
duration of imprisoned light is correlated with a long optical path length due
to the resonant character of the event. Additionally, a whispering gallery mode
(WGM) often has many more total internal reflections per orbit than is shown
in the Fig. 1 , making the polygonal optical route more similar to a circular opti-
cal path that circles the microsphere’s surface. This straightforward illustration
guides us to the general WGM resonance condition:
λr
N× = 2πR (5)
n
It asserts that a circular optical route with a length 2πR, a microsphere radius R,
and a microsphere refractive index n must fit an integer N number of wavelengths
λr. The WGM’s resonant frequency is then determined as follows:
c cN
ω = 2πf = 2π = (6)
λr nR
Even while all solutions have the same concentration, they all have differ-
ent refractive indices. As stated in Sun et al. (2019), carrier absorption is
the likely cause. The small optical resonator is utilised to detect changes in
the WGM resonance frequency that occur when Zn2+ ions attach to the
Dithizone(C13 H12 N4 S) coating. Figure 2 demonstrates how a Zn2+ ion’s bind-
ing slightly affects the resonance frequency. The shift takes place as a result
of the connected Zn2+ ion “pulling” a piece of the optical field outside of the
microsphere, lengthening the route by 2πΔl. According to:
Δω 2πΔl Δl
=− =− (7)
ω 2πR R
this increase in path length results in a shift in the resonance frequency Δω.
Amplitude
Resonance Ferquency
Fig. 2. The WGM path length is lengthened when a Zn2+ ion binds to the Dithizone
coating on the surface of the microsphere, and this is seen as a Δω resonance frequency
shift.
3 Sensor Design
Figure 3 depicts the proposed sensor’s configuration. By first coating the sphere
with agarose gel and subsequently with Zinc ion binding Dithizone, a novel opti-
cal microscopic sphere sensor that can detect the concentration of Zinc ions indi-
rectly was proposed. We investigated micro-sphere sensing with various sphere
and cylinder radii as well as its various lengths in order to determine the best
sensor parameters; the spectra are given in Figs. 4, 5, and 6.
According to Fig. 4, the sphere’s radius is 0.65mum and the wavelength with
the least reflected intensity is 640nm. Therefore, the speher’s diameter is kept
at 130μm. As stated in Han et al. (2019) , the microsphere is coupled with a
solid cylinder made of silicon dioxide (SiO2 ). The cylindrical glass rod’s radius
and length were adjusted, and it was found from Figs. 5 and 6 that a radius of
30μm and a length of 150μm, respectively, at 565nm and 640nm, offered the
least amount of reflection. The diameter and length of the cylindrical rod were
calculated to be 60μm and 150μm, respectively. It is first coated with precast
Agarose gel with RI 1.3661 and then with Zinc ion binding Dithizone with RI
1.684.
130 A. K. Tripathy and S. K. Tripathy
Dithizone
Agarose
10
μm
130 μm
150 μm
60 μm
The cylinder allows a plane wave with a wavelength between 400nm and
700nm to pass through. The microsphere absorbs some of the light at resonance,
reflecting back some of the remaining light. The modification of Zn2+ ions in
soil can alter the resonance environment, which moves the reflection spectrum’s
fringe. As a result, by keeping an eye on the reflection spectrum of the suggested
structure at the cylinder’s end, the Zn2+ ion concentration can be demodulated.
132 A. K. Tripathy and S. K. Tripathy
The Fig. 8 shows that the reflection spectra shift monotonically as the Zn2+
ion concentration increases. As stated in Han et al. (2019), the sensitivity for
the Zn2+ ion concentration measurement using spectral shift may be described
as the ratio of the variation in reflection wavelength to the variation in Zn2+ ion
concentration, i.e. S = dZn2+ Concentration
dλres
. According to calculations, the sensor’s
sensitivity is 3.1021au/ppm, and its Limit of Detection (LOD) is 0.01924ppm.
Table 2 demonstrates that our suggested sensor is the most sensitive to the con-
centration of the Zn2+ ion. As a result, it may be used to find the soil’s critical
limit of the Zn2+ ion. Because the Zn2+ ion will only stick to the Dithizone,
the coating ensures the sensor’s specificity. The Zn2+ ions are the only ones
that change the Refractive Index (RI), as other metal ions do not bind to the
Dithizone coating.
134 A. K. Tripathy and S. K. Tripathy
Fig. 8. When the plot in Fig. 7 is magnified for the tip at wavelength 565 nm, the shift
is clearly visible.
Fig. 9. Linear fitting of the Reflection and Zinc ions concentration of the sensor
5 Conclusion
References
Abbasitabar, F., Zare-Shahabadi, V., Shamsipur, M., Akhond, M.: Development of an
optical sensor for determination of zinc by application of PC-ANN. Sens. Actuators,
B Chem. 156(1), 181–186 (2011). https://doi.org/10.1016/j.snb.2011.04.011
Aksuner, N., Henden, E., Yenigul, B., Yilmaz, I., Cukurovali, A.: Highly sensitive
sensing of zinc (II) by development and characterization of a PVC-based fluorescent
chemical sensor. Spectrochim. Acta Part A Mol. Biomol. Spectrosc. 78(3), 1133–1138
(2011). https://doi.org/10.1016/j.saa.2010.12.065
Baaske, M., Vollmer, F.: Optical resonator biosensors: molecular diagnostic and
nanoparticle detection on an integrated platform. ChemPhysChem 13(2), 427–436
(2012). https://doi.org/10.1002/cphc.201100757
Czolk, R., Reichert, J., Ache, H.: An optical sensor for the detection of heavy metal
ions. Sens. Actuators B Chem. 7(1–3), 540–543 (1992). https://doi.org/10.1016/
0925-4005(92)80360-A
Fen, Y.W., Yunus, W.M.M., et al.: Characterization of the optical properties of heavy
metal ions using surface plasmon resonance technique. Opt. Photonics J. 1(03), 116–
123 (2011). https://doi.org/10.4236/opj.2011.13020
Fen, Y.W., Yunus, W.M.M., Talib, Z.A., Yusof, N.A.: Fabrication and evaluation of
surface plasmon resonance optical sensor for heavy metal ions detection. In: 2013
IEEE 4th International Conference on Photonics (ICP), pp. 114–116 IEEE (2013).
https://doi.org/10.1109/ICP.2013.6687085
Gupta, V.K., Singh, A.K., Kumawat, L.K., Mergu, N.: An easily accessible switch-on
optical chemosensor for the detection of noxious metal ions Ni (II), Zn (II), Fe (III)
and UO2 (II). Sens. Actuators, B Chem. 222, 468–482 (2016). https://doi.org/10.
1016/j.snb.2015.08.063
Han, C., Ding, H., Zhao, C., Chen, C.: Ultrafast miniature humidity sensor based on
single-sided microsphere resonator. J. Lightwave Technol. 37(21), 5493–5499 (2019).
https://doi.org/10.1364/JLT.37.005493
Hassana, O.S., Al-azawi, R.J., Mahdi, B.R.: Image processing technique for zinc ion
sensing using a crystalline fiber sensor. Eng. Technol. J. 39(10), 1539–1543 (2021).
https://doi.org/10.30684/etj.v39i10.2136
Indira Sarangthem, L., Sharma, D., Oinam, N., Punilkumar, L.: Evaluation of critical
limit of zinc in soil and plant. Int. J. Curr. Res. Life Sci. 7(08), 2584–2586 (2018)
Jeong, U., Kim, Y.: Colorimetric detection of heavy metal ions using aminosilane. J.
Ind. Eng. Chem. 31, 393–396 (2015). https://doi.org/10.1016/j.jiec.2015.07.014
Klimant, I., Otto, M.: A fiber optical sensor for heavy metal ions based on immo-
bilized xylenol orange. Microchim. Acta 108(1), 11–17 (1992). https://doi.org/10.
1007/BF01240367
Kumar, V., et al.: Pollution assessment of heavy metals in soils of india and ecological
risk assessment: a state-of-the-art. Chemosphere 216, 449–462 (2019). https://doi.
org/10.1016/j.chemosphere.2018.10.066
Lim, S.-H., Yoon, S.: Sensors and devices for heavy metal ion detection. In: Kyung, C.-
M. (ed.) Smart Sensors for Health and Environment Monitoring. KRS, pp. 213–232.
Springer, Dordrecht (2015). https://doi.org/10.1007/978-94-017-9981-2 9
Lu, Y., Liang, X., Niyungeko, C., Zhou, J., Xu, J., Tian, G.: A review of the identifica-
tion and detection of heavy metal ions in the environment by voltammetry. Talanta
178, 324–338 (2018). https://doi.org/10.1016/j.talanta.2017.08.033
Qiu, M., He, S.: Numerical method for computing defect modes in two-dimensional
photonic crystals with dielectric or metallic inclusions. Phys. Rev. B 61(19), 12871
(2000). https://doi.org/10.1103/PhysRevB.61.12871
136 A. K. Tripathy and S. K. Tripathy
Qiu, M., He, S.: FDTD algorithm for computing the off-plane band structure in a
two-dimensional photonic crystal with dielectric or metallic inclusions. Phys. Lett.
A 278(6), 348–354 (2001). https://doi.org/10.1016/S0375-9601(00)00795-7
Raghunandhan, R., et al.: Chitosan/PAA based fiber-optic interferometric sensor for
heavy metal ions detection. Sens. Actuators, B Chem. 233, 31–38 (2016). https://
doi.org/10.1016/j.snb.2016.04.020
Ramdzan, N.S.M., Fen, Y.W., Anas, N.A.A., Omar, N.A.S., Saleviter, S.: Devel-
opment of biopolymer and conducting polymer-based optical sensors for heavy
metal ion detection. Molecules 25(11), 2548 (2020). https://doi.org/10.3390/
molecules25112548
Rastegarzadeh, S., Rezaei, V.: An optical sensor for zinc determination based on zincon
as sensing reagent. Sens. Actuators, B Chem. 129(1), 327–331 (2008). https://doi.
org/10.1016/j.snb.2007.08.016
Soria, S., et al.: Optical microspherical resonators for biomedical sensing. Sensors 11(1),
785–805 (2011). https://doi.org/10.3390/s110100785
Sun, P., Chen, Y., Gao, C., Liu, X., Yang, X., Xu, M.: Heavy metal ion detection
on a surface plasmatic resonance based on the change of refractive index. In: 9th
International Symposium on Advanced Optical Manufacturing and Testing Tech-
nologies: Optoelectronic Materials and Devices for Sensing and Imaging, vol. 10843,
pp. 365–373 SPIE (2019). https://doi.org/10.1117/12.2506976
Sundaray, M., Tripathy, S., Das, C.: FDTD analysis of diffraction efficiency in a holo-
gram for application in optical fiber communication. Optik 154, 325–330 (2018).
https://doi.org/10.1016/j.ijleo.2017.10.003
Tan, C.-Y., Huang, Y.-X.: Dependence of refractive index on concentration and tem-
perature in electrolyte solution, polar solution, nonpolar solution, and protein solu-
tion. J. Chem. Eng. Data 60(10), 2827–2833 (2015). https://doi.org/10.1021/acs.
jced.5b00018
Tripathy, A.K., Tripathy, S.K., Sundaray, M.: An ultra-sensitive optical sensor based
on agarose coated microscopic sphere to detect cu2+ ion in soil. Comput. Electron.
Agric. 202, 107424 (2022). https://doi.org/10.1016/j.compag.2022.107424
Yee, K.: Numerical solution of initial boundary value problems involving Maxwell’s
equations in isotropic media. IEEE Trans. Antennas Propag. 14(3), 302–307 (1966).
https://doi.org/10.1109/TAP.1966.1138693
Zhang, Y.-N., Sun, Y., Cai, L., Gao, Y., Cai, Y.: Optical fiber sensors for measure-
ment of heavy metal ion concentration: a review. Measurement 158, 107742 (2020).
https://doi.org/10.1016/j.measurement.2020.107742
Influential Factor Finding for Engineering
Student Motivation
Abstract. The case study encompasses the evaluation of the motivational factors
of a student to pursue and complete his/her engineering degree program. In order
to analyze the factors, a large amount of data have been collected from the students
of various engineering institutes. Two categories of factors have been found and
the most influential attribute has also been realized by a statistical analysis of the
data set. The two categorized factors are: Intrinsic and Extrinsic. And, either of
them has been seen to influence the motivation of the students. The study shows
that students are mostly bothered by the anxiety of being outperformed by their
fellow classmates.
1 Introduction
Motivation is a word, that is derived from the word ‘motive’, which means the need of a
person. It also means the desire, wants, or drive of a human being [1]. It is the process of
motivating people to achieve their personal or collective goals [2]. This study has tried
to find the most influential factor in the motivation of engineering students [3].
The engineering degree program is a robust, rigorous process that runs for four years
in India. The motivation level of a student can’t be the same for the whole four years.
Sometimes students are highly motivated, sometimes they are not. Different levels of
motivation have been observed during various phases of the course. This motivation
level [4] does fluctuate because of some external reasons or attributes. In this study, we
have analyzed those attributes and categorized them into factors and in the end, will
find the most influential factor in engineering students’ motivation. In order to do this
analysis,
ii. After that, the data were analyzed with a statistical tool [5]. From the analysis, the
data were categorized into two major factors.
iii. Then, the study tried to find out the most influential attribute that impacts engineering
student motivation the most.
While browsing through hitherto relevant studies on the means and the strategies
[6] to motivate students, it has found a lack of analysis regarding the assessment of the
influential factors in student motivation and the assessing the dominating attribute.
Here, the related studies are reported in section II, followed by the experiment in
section III. Sections IV and V are the discussion and conclusion respectively.
2 Related Studies
Adam N. Kirn a Ph.D. scholar at Clemson University has disserted a study on the moti-
vation of students in his work [7]. His work tells, about a sequential explanatory study
of various methods that can motivate engineering students. How the current behavior
of engineering students is influenced by long-term motivation. The most common indi-
cator of students’ performance is academic performance and it does not consider the
needed fundamental motivation. Students can use their logical resources efficiently as
it is somewhat triggered by academic performance. The relevant features (e.g. Expec-
tations, values, future scopes) of student motivation in relation to students’ long-term
goals and short-term work assignments were examined in the first stage of the study. In
the second stage, three more factors of student motivation, are expectations of success
in engineering courses, current recognition as a student of an engineering program, and
ideas about their future as an engineer come under the study. Along with these their
problem-solving ability also comes under the scrutiny of this study. The third stage of
the study inspects the motivational profiles of senior engineering students in important
and key subjects.
In order to do the study, a specific group was formed. The first phase result showed
that the expectation of students and their insights about the future differentiate students
with different long-term goals. In the second stage, it was seen that students’ technical
problem-solving ability correlates with the recognition of students’ future. The senior
engineering students were divided into groups according to their expectations, problem-
solving ability, and their future perceptions. Long-term goals and measures of students
were asked in the fourth stage of the study. This phase is a continuation study on previous
works by inspiring the engineering student experience with their Future Temporal Out-
look (FTP). The result of the fourth stage showed that some of the students had a clear
perception on the FTP and some others didn’t have a specific goal beyond completion
of the course program.
Development of plans beyond just completing the course with a large variety is also
seen in the study. Also, a well-defined future for students creates greater aspects of their
current works and tasks. It helps them to improve their own performance.
Understanding the relationship between student motivation and current behavior
helps engineering educators raise their interest in engineering and prepare students to
become effective engineers. In the final phase of this work, they explore how students
Influential Factor Finding for Engineering Student Motivation 139
looked upon a technical problem to solve the problem efficiently. The result shows that
motivation across the different time scales actually determines the students’ perception
of problem-solving. In addition, assessment by the students of engineering issues may
be based on the student’s integrated cultural observation of engineering issues.
In her research on student motivation [8], Linda S. Lumsden of ERIC Clearinghouse
on Educational Management, Eugene, and Oreg have summarized regaining student
motivation. She has some offer-specific strategies that can be used in the classroom, etc.
Address issues outside the classroom and admit this throughout the school Policies and
practices can also stimulate or satisfy a student’s hunger for learning. James P. Rafini
[9] encourages educators to investigate the idea of “win or lose” in many schools. He
makes a suggestion for structural changes and classroom strategies aimed at empowering
students’ motivation. Recalling that “classrooms are not islands,” Martin L.[10] Mar and
Carol Migily have school-wide policies, practices, and procedures that affect student
motivation. They suggest the process by which the principal can start moving the school
Apart from emphasizing relative abilities “Learning, Achievement, Effort.“ How does
Carol A. Ames focus? Motivational concepts and processes are suitable for everyday
use Teacher issues and decisions. Jere Brophy shows this example Four categories of
motivational strategies available to teachers stimulate your interest in learning. (1) Taking
care of students’ Expectations for success; (2) Provide external motivation. (3) Take
advantage of existing essential motivations. (4) Stimulate Student motivation to learn.
Hermione H. Marshall [11] clearly different motivational directions for the three-fifth
graders’ teachers.
After going through several previous pieces of research on this very ground, it was
found that all of them comprise the ways to motivate students and the relevant strategies as
well [12]. No hitherto study has been found that analyzes what are the influential factors
that impact the students’ motivation and which attribute is predominant. Therefore, we
made our research in this very arena to assess the aforementioned.
3 Experiment
In order to do this analysis, some questions were set that can extract the students’ per-
spectives [13] on their program. The questions were set in such a way, that students will
answer the questions without knowing the purpose. Keeping this in mind, with the help
of consultation of psychiatrists and educators, a questionary was set, in which there were
some demographical questions and some of them were motivation-oriented. Amongst the
twenty-two questions, eighteen questions were taken for the analysis (Table 1).
Table 1. (continued)
The other four questions were kind of demographical, from where students’
demographical presence can be looked upon. Those questions were (Table 2):
1 Year First/second/third/fourth
2 Gender Male/Female
3 Last semester marks
4 I study to Learn/Stay Away from social humiliation/Peer or family
pressure/Earn or rewarded
Influential Factor Finding for Engineering Student Motivation 141
From the above-mentioned questions, a google form was created and distributed
amongst the students of different engineering institutes to collect data. The window was
kept open for around 15 days so that the responses from the students could be received
and registered. Students’ response was collected on a Likert scale of 5 scales, where 1
denotes very low, 2 stands for low, 3 is moderate, 4 implies high and 5 means very high.
In this period, 638 student responses were collected and put in Raosoft to check
the data sufficiency. The recommended sample size is directly proportionate with the
sample size, remarks Raosoft. It suggests that at least a sample size of 377 is necessary
to carry out a study on a large amount of population. A larger sample size ensures a
lower margin regarding the error and a higher confidence level as well. From now on,
the questions will be called attributes, that influence a student’s motivation. In the first
phase of analysis, a reliability test was run on the data set to check the reliability. During
the reliability tests, Chronbach’s Alpha value of 0.9 was maintained which indicates the
data’s reliability (Table 3).
item-total correlation was found amongst the attributes. V7 attribute once again showed
cross-loading. Therefore, it had to be removed as well. After removing the V7 and V13,
the factor analysis was run for the third time, and no attributes with low commonality,
cross-loading, and low item-total correlation were found. Thus, after the third rotation,
the attributes can be clearly categorized into two broad categories (Table 5).
Factor 1 Factor 2
I am enjoying learning engineering It has always bothered me that, other students
outperform me in the evolution process
My personal goals and objectives are linked to It makes me concerned about how I will fare
my learning on the engineering exam
I am very interested in my study and put a lot I try to figure out why I’m having trouble
of effort to learn it learning engineering subjects
I use a variety of approaches to ensure that I I’ll be nervous when it’s time to take the
fully understand the course test(s)
The subject I am learning can help me find a It worries me to think about poor performance
great job in the exam(s)
I expect to outperform other students in a I despise even thinking about the evolution
technical subject(s)
It is important to me how I will apply the
engineering that I study in my daily life and in
the future
All my technical knowledge is related to or
relevant to my existence
I am confident in my course abilities and
competencies
I am satisfied with my progress in
understanding the subjects
After analyzing the two factors, it can be seen that the attributes under Factor 1 are
occurring from a student’s own self, which we named Intrinsic and the attributes under
Factor 2 are caused due to external effects like family or peer pressure. Those are named
Influential Factor Finding for Engineering Student Motivation 143
extrinsic. The scree plot also graphically acknowledges the two-factor theory. The scree
plot graphs the eigenvalue against the factor number. From the third factor on, it can be
seen that the line is almost flat, meaning each successive factor is accounting for smaller
and smaller amounts of the total variance (Fig. 1):
At this stage, the method proposed two clear factors that are influencing engineering
student motivation: 1. Intrinsic Factors. 2. Extrinsic factors.
Now in the next phase, the most influential attribute of all is to be found. To find
this the linear regression [16] method was applied in SPSS. From the output of linear
regression, the standard error values of the attributes were compared.
In statistics, the method used for modeling a relationship between a scalar response and
one or more dependent or independent variables (also known as explanatory variables),
is known as linear regression. In linear regression, when there is one explanatory variable
present, the model is known as simple linear regression; on the other hand, if there are
more than one explanatory variable present, it is called multiple linear regression [17].
The first regression analysis method that undergoes in-depth research and sees a lot
of use in actual application is linear regression [18]. This is because models with linear
dependency on their unknown parameters are simpler to fit than models with non-linear
dependency on their parameters and because it is simpler to determine the statistical
characteristics of the resulting estimators.
144 S. Ghosh et al.
V3 0.24
V10 0.33
V16 0.38
V2 0.33
V14 0.27
V7 0.26
V12 0.26
V5 0.26
V8 0.36
V18 0.37
V15 0.36
V11 0.33
Linear regression is one of the most vital algorithms in supervised machine learning
[19]. It is applied in model predicting, forecasting, etc [20].
By applying the linear regression algorithm in the dataset, a list of standard errors of
each of the attributes was made. Table 6 depicts that the standard error value of the V3
attribute is the least. This indicates that V3 is the nearest attribute to the predicted model
or regression line. That means this is the very attribute that influenced engineering student
motivation the most. This is empirical by the study as it can be noted that the present-day
rat race, the cut-throat competition in every sector, the fear of being undervalued or being
left out during the process of achieving career goals in the future, or even securing a
job as per his capability and crave-all of these and more serve to be the reason behind
the fluctuating and sometimes, depleting motivation levels during different phases of
engineering students’ career.
The V3 attribute falls under the Extrinsic Factor category.
4 Discussion
The focus of our study was to find the most influential factor in engineering students’
motivation, i.e., the attribute which drives the engineering students’ motivation [19–
24] the most in their four-year marathon course. From the analysis, we have found the
Influential Factor Finding for Engineering Student Motivation 145
attributes fall under two categories of Factors: 1. Intrinsic and 2. Extrinsic and the most
influential attribute (V3) that motivates the students, the most is also determined.
From the received answers the attributes were analyzed for factor analysis and factor
finding. Since the questionary was distributed amongst very few localized institutes, the
results received may contain location bias. To get even more precise results the study
may be carried out on a broader scale all over the state or the country.
The collected data used in the study comprises every stream of engineering course,
therefore, there was no scope for specification in the analysis. But there is an aspect to
doing this analysis on every particular stream of engineering or any general course. From
the received dataset we can categorize the data into two genders: Male and Female. A
huge difference was found between male and female students’ input. This implies that
engineering is still a male-dominated sector of education at least in our locality. If this
study can be done over a larger number of students, over a broader region like a state or
a country, the numbers can differ and upon that analysis can be done [4, 22, 25–29].
Therefore, there is still a lot of scope for research in the future on this topic. Our data
can be very much gender-biased or region biased. We can further do trade-based analysis,
gender-based analysis, or region-based analysis on the same topic. In that case, the dataset
can be used to assess the reason for the engineering trade being male-dominated. That
can give far more precise results regarding our research topic.
5 Conclusion
While analyzing the database, only two attributes were eliminated through factor anal-
ysis. After factor analysis was done, the attributes were classified into two following
categories, the first one being the intrinsic factor and the other one being extrinsic factor.
After analyzing the standard error of each attribute, to find out which one influenced a
student to keep motivated toward the course program, the attribute with the least standard
error should have the highest impact on the students. The study found that the V3 attribute
“It has always bothered me that, other students outperform me in the evaluation process”
is the most impactful on students’ motivation. Now, from the previous factor analysis,
the V3 attribute can be classified under the extrinsic factor.
References
1. Atkinson, J.W.: An introduction to motivation. Van Nostrand, Princeton, N.J. (1964)
2. Geen, R.G.: Social motivation. In: Colman, A.M. (ed.) Companion Encyclopedia of
Psychology, pp. 522–541. Routledge (2019). https://doi.org/10.4324/9781315002897-30
3. Savage, N., Birch, R., Noussi, E.: Motivation of engineering students in higher education.
Eng. Educ. 6(2), 39–46 (2011)
4. Mubeen, S., Norman, R.E.İD.: The measurement of motivation with science student. Eur. J.
Educ. Res. 3(3), 129–144 (2014)
5. Pivk, M., Le Diberder, F.R.: Plots: a statistical tool to unfold data distributions. Nucl. Instrum.
Methods Phys. Res., Sect. A 555(1–2), 356–369 (2005)
6. Yusuf, M.: The impact of self-efficacy, achievement motivation, and self-regulated learn-
ing strategies on students’ academic achievement. Procedia Soc. Behav. Sci. 15, 2623–2626
(2011)
146 S. Ghosh et al.
7. Kirn, A.N.: The influences of engineering student motivation on short-term tasks and long-
term goals. Doctoral dissertation, Clemson University (2014)
8. Lumsden, L.S.: Student Motivation. Research Roundup, vol. 10, issue (3), n3 (1994)
9. Raffini, J.P.: Winners Without Losers: Structures and Strategies for Increasing Student
Motivation to Learn. Allyn & Bacon, 160 Gould Street, Needham Heights, MA 02194 (1993)
10. Maehr, M.L., Midgley, C.: Enhancing student motivation: a schoolwide approach. Educ.
Psychol. 26(3–4), 399–427 (1991)
11. Marshall, H.H.: Motivational strategies of three fifth-grade teachers. Elem. Sch. J. 88(2),
135–150 (1987)
12. Cho, M.H., Heron, M.L.: Self-regulated learning: the role of motivation, emotion, and use
of learning strategies in students’ learning experiences in a self-paced online mathematics
course. Distance Educ. 36(1), 80–99 (2015)
13. Babo, R., Dey, N., Ashour, A.S. (eds.): Workgroups eAssessment: Planning, Implementing
and Analysing Frameworks. Springer (2021)
14. Bala, J.: Contribution of SPSS in social sciences research. Int. J. Adv. Res. Comput. Sci. 7(6),
250–254 (2016)
15. Acharjya, D., Anitha, A.: A comparative study of statistical and rough computing models in
predictive data analysis. Int. J. Ambient Comput. Intel. 8(2), 32–51 (2017)
16. Dey, N., Wagh, S., Mahalle, P.N., Pathan, M.S. (eds.): Applied Machine Learning for Smart
Data Analysis. CRC Press (2019)
17. Freedman, D.A.: Statistical Models: Theory and Practice. Cambridge University Press,
Cambridge (2009). https://doi.org/10.1017/CBO9780511815867
18. Krupinski, E.A.: Medical imaging. In: Chen, J., Cranton, W., Fihn, M. (eds.) Handbook of
Visual Display Technology, pp. 545–558. Springer, Cham (2016). https://doi.org/10.1007/
978-3-319-14346-0_186
19. Bindu, K.H., Raghava, M., Dey, N., Rao, C.R.: Coefficient of Variation and Machine Learning
Applications. CRC Press (2019)
20. Das, S.K., Das, S.P., Dey, N., Hassanien, A.E. (eds.): Machine Learning Algorithms for
Industrial Applications. Springer, Cham (2021)
21. Labib, W., Abdelsattar, A., Ibrahim, Y., Abdelhadi, A.: What motivates students to study
engineering? a comparative study between males and females in Saudi Arabia. Educ. Sci.
11(4), 147 (2021)
22. Saadon, N.F.S.M., Ahmad, I., Pee, A.N.C., Hanapi, C.: The implementation of augmented
reality in increasing student motivation: a systematic literature review. In: IOP Conference
Series: Materials Science and Engineering, vol. 854, no. 1, p. 012043. IOP Publishing (2020)
23. Benson, L., Morkos, B.: Student motivation and learning in engineering. In ASEE 120th
Annual Conference, p. 13 (2011)
24. Brown, P.R., Matusovich, H.M.: Unlocking student motivation: development of an engi-
neering motivation survey. In: 2013 ASEE Annual Conference & Exposition, pp. 23–1284
(2013)
25. Ng, B.L., Liu, W.C., Wang, J.C.: Student motivation and learning in mathematics and science:
a cluster analysis. Int. J. Sci. Math. Educ. 14(7), 1359–1376 (2016)
26. Rahman, A., Muktadir, M.G.: SPSS: an imperative quantitative data analysis tool for social
science research. Int. J. Res. Innov. Soc. Sci. V, 300–302 (2021)
27. Sweet, S.A., Grace-Martin, K.: Data Analysis with SPSS, vol. 1. Allyn & Bacon, Boston,
MA, USA (1999)
28. Basto, M., Pereira, J.M.: An SPSS R-menu for ordinal factor analysis. J. Stat. Softw. 46, 1–29
(2012)
29. Liu, R.X., Kuang, J., Gong, Q., Hou, X.L.: Principal component regression analysis with
SPSS. Comput. Methods Programs Biomed. 71(2), 141–147 (2003)
Influential Factor Finding for Engineering Student Motivation 147
30. Bennett, C., Ha, M.R., Bennett, J., Czekanski, A.: Awareness of self and the engineering
field: student motivation, assessment of ‘fit’and preparedness for engineering education. In:
Proceedings of the Canadian Engineering Education Association (CEEA) (2016)
31. Panisoara, G., Duta, N., Panisoara, I.O.: The influence of reasons approving on student
motivation for learning. Procedia Soc. Behav. Sci. 197, 1215–1222 (2015)
32. Yacob, A., Saman, M.Y.M.: Assessing the level of motivation in learning programming among
engineering students. In: The International Conference on Informatics and Applications
(ICIA2012), pp. 425–432. Malaysia:[sn] (2012)
Prediction of Software Reliability Using Particle
Swarm Optimization
1 Introduction
2 Related Work
Reliability of software has regularly been among the major issues to the scholars for elon-
gated a period of time. Fenton discusses about the software measurement and metrics
150 G. M. Habtemariam et al.
[7]. Reliability has been eminently determining humankind ever meanwhile we adapted
to form groups or communities among ourselves. Communitie sreveal the interrelation-
ship; as well reliability is at the centre of interrelationship. Nowadays, software has tend
to the indispensable parts of our lives. Evaluating or estimating reliability has ever been
an intuitive operation. In the event of software, investigates have been perform to create
this operation more scientific instead of intuitive. The current paper enhances a bit in
this series of investigates [10].
Software reliability is an optimization problem which is no single model can answer
the problem of software reliability which mean one model fit for one problem it may
not be fit for another problem. Therefore, following optimization techniques for solving
such type problem is crucial. Optimization approaches motivated by Swarm intelligence
have tend to more common during the previous decade. Swarm intelligence perhaps
used to various aspects of software engineering [10].
Developmental intelligence-based approaches, for instance Genetic Algorithm and
Particle Swarm Optimization perhaps an answer to such type issues. PSO is a search
space method utilized in computing discipline and in engineering field to obtain the
appropriate answers to optimization the problems and that was innovative through the
community characteristics of bird swarming and fish schooling. PSO has its origins
in imitation of life and community way of thinking, as well in engineering field and
computing technology.It exploits a community of individual that glide over the problem
hyperspace within given paces [8].
In current assessments, Particle Swarm Optimization (PSO) is another search
method, and regularly outshined from Genetic Algorithm as when used to several prob-
lems. This takes up the request of how PSO challenges with Genetic Algorithms in the
context of developmental structural testing [9].
PSO plan of action is exploited to pay attention of software establishment undeviating
quality development exhibiting issues to a great degree applied as a part of the docu-
menting in the Logarithmic, Exponential, Power, S-Formed and Converse polynomial
model [2].
Particle swarm enhancement, as a novel global optimization technique, has been
used in parameters estimation and quadratic programming. So, it is available for Particle
swarm enhancement to optimize different type software reliability models parameters
[11].
The above PSO algorithmstops when there is no update in the gBest value. The initial
value are the software error of individual projects.The fitness function is the normalised
mean squre error(NRMSE).
n −y 2 y
NRMSE = i=1 iy i 2 (1)
i=1 yi
The software error data is a pair having time and cumulative software failure infor-
mation is present. In Eq. 1, n is represent the number of failure data of a software, and
yi represent is the actual error data of particle I where as yi is the predicted error.
Figure 1 shows the lines of code, number of module size and defect module which is
important for our research in order to exhibit the efficiency of detecting of error capacity
by different software reliability methods.
152 G. M. Habtemariam et al.
Based on the above dataset we were chosen seven classic Software Reliability pre-
diction technique to calculate detection of error accuracy. The testing results we obtained
on each data extracted from its formulas and algorithms which is the maximum capacity
of detecting software error.
From Table 2, we use ten-fold cross-validation technique and average the results
over the folds. We made a comparison to our algorithm with seven different machine
learning techniques such as Neural Networks (NN), Support Vector Machine (SVM),
Logistic Regression, K-Nearest Neighbour (KNN), Random Forest, Genetic Algorithm
(GA) and Particles Swarm Optimization (PSO). The outcome indicates that Particles
Swarm Optimization achieve the maximum result. As we know software reliability
is an optimization problem and results shows that PSO outshines in each project we
examined Thus, PSO have shown their ability to provide an adequate and best error
detecting capacity for predicting reliability of a software (Fig. 2).
Table 3 displays the Statistical Summary of mean, standard deviation, minimum and
maximum result of the experiment which shows Particles Swarm Optimization achieve
the maximum result (Fig. 3).
Prediction of Software Reliability 153
It is regularly noble for us to assess the relationships of the attributes in our dataset
using Particle Swarm Optimization into machine learning project as some machine learn-
ing techniques like linear regression and logistic regression will perform inadequately
if we have hugely associated with attributes. Figure 4 shows the relationships between
each machine learning techniques (Table 4).
0
NN svs log.r KNN rad.f GA PSO
-1
-2
5 Conclusions
Because of the increasing desire of software with highly reliable and safety software,
therefore, software reliability prediction emerges as more and more important. Software
reliability is a vital component of software quality. Here we design a novel concept
of particle swarm optimization (PSO) algorithm which is used for software reliability
prediction. The proposed model is tested with 11 number of dataset taken from NASA
Promise Software Engineering Repository. The prediction given by PSO is compara-
tively more accurate as compared to other techniques. The error-detecting capability is
varying from 89.56% to 94.01%. Whereas in other models it is much comparatively less.
References
1. Malhotra, R., Negi, A.: Reliability modeling using particle swarm optimization. Int. J. Syst.
Assur. Eng. Manage. 4(3), 275–283 (2013)
2. Shin, S.M., Uroosa, S.: Predicting software reliability using particle SWARM optimization
technique. Asia-Pac. J. Convergent Res. Interchange 1(3), 17–30 (2015)
3. de Almeida, B.S.G., Leite, V.C.: Particle swarm optimization: a powerful technique for solving
engineering problems. In: Ser, J.D., Villar, E., Osaba, E. (eds.) Swarm Intelligence – Recent
Advances, New Perspectives and Applications. IntechOpen (2019)
4. Sheta, A.: Reliability growth modeling for software fault detection using particle swarm opti-
mization. In: 2006 IEEE International Conference on Evolutionary Computation, pp. 3071–
3078. IEEE (2006)
5. Eberhart, R., Kennedy, J.: A new optimizer using particle swarm theory. In: MHS’95. Proceed-
ings of the Sixth International Symposium on Micro Machine and Human Science, pp. 39–43.
IEEE (1995)
6. Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of ICNN’95-
international conference on neural networks, vol. 4, pp. 1942–1948. IEEE (1995)
7. Fenton, N.: Software measurement: a necessary scientific basis. IEEE Trans. Software Eng.
20(3), 199–206 (1994)
156 G. M. Habtemariam et al.
8. Del Valle, Y., Venayagamoorthy, G.K., Mohagheghi, S., Hernandez, J.C., Harley, R.G.: Par-
ticle swarm optimization: basic concepts, variants and applications in power systems. IEEE
Trans. Evol. Comput. 12(2), 171–195 (2008)
9. Windisch, A., Wappler, S., Wegener, J.: Applying particle swarm optimization to software test-
ing. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation,
pp. 1121–1128 (2007)
10. Ahuja, N.G.T.: A review on particle swarm optimization for software reliability. Environment
3(3), 213–214 (2014)
11. Can, H., Jianchun, X., Ruide, Z., Juelong, L., Qiliang, Y., Liqiang, X.. A new model for
software defect prediction using particle swarm optimization and support vector machine. In:
2013 25th Chinese Control and Decision Conference (CCDC), pp. 4106–4110. IEEE (2013)
12. Banga, M., Bansal, A., Singh, A.: Proposed hybrid approach to predict software fault detection.
Int. J. Performability Eng. 15(8), 2049 (2019)
An Effective Optimization of EMG Based
Artificial Prosthetic Limbs
Abstract. Humans value with their physical parts are the greatest of all the pos-
sessions. The human hand is capable of a broad range of dexterous maneuvers that
allow us to interact with our surroundings and communicate with one another. In
this paper our main aim is to attempt for restoration of amputated limbs with artifi-
cial limbs for millennia. The difficulty of replacing a lost human limb, particularly
a hand, lets one properly understand the complexities in a human. In this paper,
early designs are drawn in order to finalize the model for 3d modelling. 3d mod-
els are then designed using CATIA v5 modelling software. The size of modelled
limbs are same as that of a human being. Using a 3d printer, each component of
the limb is printed. 3d printed components are cured with light in order to remove
moisture from it. Actuators are then set up with the limbs. The controller is then
programmed with the EMG sensors. The analog signals from the EMG sensors
are amplified resulting in motion of the limbs. The angular rotation angles are then
recorded by keeping different subjects on it. Grasping capacity is calculated and
compared with that of human limbs. The optimized result is recorded.
1 Introduction
A number of ancient prosthetic devices from many cultures throughout the world have
been found, illustrating the development of prosthetic technology. The development of
prosthetic limb design has been somewhat gradual up until recently. Simple prosthetic
devices can be looked of as early breakthroughs like the wooden leg. History demon-
strates that prostheses have traditionally been passive tools that provide nothing in the
way of control or movement. Modern prosthetic hands have been created to closely
resemble natural limbs in terms of both shape and function. Although the bionic hand
has lately been lauded as a victory of engineering prowess, it still falls short of the gen-
uine thing and as a result, there are a number of obstacles preventing the upper limb
amputee community from adopting it. The prosthetic hand is unable to achieve the com-
plete acceptance of its users, which is the ultimate objective of any prosthesis. The topic
of myoelectric prosthetic arms will be covered in this thesis. The goal is to create a
machine that performs human arm functions.
A large amount of prosthesis are present in current world. Some of them are as
follows:
1. Passive Prostheses
Simple, immobile limbs known as passive prostheses are designed to help
amputees regain their fundamental functioning and aesthetic appeal. A straight-
forward passive prosthesis is an item like a wooden “pirate” peg leg.
2. Mechanical Control Prostheses
Control of mechanical powered prosthesis is accomplished through a harness
fastened to the user. They typically consist of a straight forward tool like a hook
that is connected to shoulder and elbow. Although these gadgets are very straight
forward, they continue to be the most common kind of prosthesis in use today.
3. Myo-signal Controlled Prostheses
Myo-signal controlled prostheses track the electromyography signals that are
produced when muscles contract. Through electrodes attached to the muscle, these
impulses are monitored.
These signals are then modulated and sent to the controller. These signals are
then amplified and processed by micro-controllers for proper control of the limbs.
4. Brain Interface
The best type of control is through brain signals. Generally, EEG sensors are
used to fetch the neural signals. These are signals are then amplified and passed
through certain instructions so as to work ideally.
2 Literature Review
Kato et al. [1] proposed a model of communication between brain and prosthetic limbs
using myo-sensors. The signals were then modulated and amplified using a controller
board. The relation between muscle readings and movement of the limbs were then
established. Hussein et al. [2] introduced manufacturing of tiny parts related to prosthesis
using 3d printer. In North America small manufacturers constructed mechanical limbs
using 3d printed parts. Moreno et al. [3] implemented cheap and affordable mechanism
of prosthesis. He also introduced leg prosthesis. They proposed a IOT embedded real
time operating system for the prosthesis. The paper throws more light on circuits to
process and achieve ideal prosthesis. Melchiorri et al. [4] focuses on development of
prosthetic hands. The paper is well suited to a single domain. The use of these type
of hand can also be implemented in humanoid robots. Full replication of human hand
is targeted to achieve through this publication.Clement et al. [5] emphasizes on design
of light weight prosthetic hands and weight distribution of the prosthetic limbs. The
control of lateral balancing while movement of hand is Kaplanoglu et al. [6] The shape
memory alloy (SMA) wires that make up the finger tendon act as muscle pairs to flex and
extend the finger joints as needed. Three finger’s four degrees of freedom are actively
used. Abhishek et al. [7] introduced introduced the use of mathematical-algorithms to
recognize human gestures. They how gestures of hand can turn pages, scroll up and
down, etc. Atique et al. [8] introduces a cost effective prosthetic hand using myoelectric
signals. Analog signals are simulated and result is improvised using x and y coordinates.
The motions of limbs are processed accordingly.
An Effective Optimization of EMG 159
Catia is the application software used in modelling of prosthetic limbs (Figs. 3, 4, and
5).
The below-displayed closed loop is made by the tendons wrapping around specially
made, 3D-printed servo horn. The tendon is pulled while the servo motor turns in one
direction, closing the finger (Table 1). The motor is turned counterclockwise to release
the finger (Figs. 6 and 7).
Parameter Dimensions
Length of profile 370 mm
Thumb (height) 40 mm
Thumb (width) 18.5 mm
Index-finger (length) 75 mm
Index-finger (width) 24 mm
Middle-finger (length) 78 mm
Middle-finger (width) 27 mm
Ring-finger (length) 73 mm
Ring-finger (width) 24 mm
Pinkie-finger (length) 64 mm
Pinkie-finger (width) 20 mm
Forearm (height) 163 mm
Forearm (width) 60 mm
Wrist size 42 mm
Palm (height) 58 mm
Palm (width) 53 mm
All components have been printed using Flashforge Creator pro 2. This type of 3-D
printer produces small parts with high precisions. The printer automatically prints an
outer cover for each part as a layer of protection. Each of the screws used within the
model like finger joints, are 3mm in diameter. Polypropylene is used for 3-D printing.
An Effective Optimization of EMG 163
Pin-holes were done using a drill after printing. The printer is perfect for printing of tiny
subjects. It gives very high precision while printing (Figs. 8, 9 and 10).
These motors can movie around 360° in clockwise and anticlockwise direction. The
angular accuracy of each servo motor influences how each finger moves when the limbs
move to open and close finger. Relatively cheap servos are used to decrease production
cost. Using higher quality servos would increase strength of limbs and accuracy.
The Arduino Uno is used initially for as micro-controller. The EMG sensors are
connected with the controller. The controller receives analog signals in real time which
after processing results in rotation of servos, ultimately resulting in movement of limbs.
Initially this micro-controller is used in order to make the mib cost-effective.
Electromyogram device board is used for detecting and monitoring live activity of the
muscle. Three electrodes and a tiny PCB are included. Three electrodes are used as: two
electrodes help in monitoring voltage potential, while the third one is used as ground
point. As a user flexes, the interior systems converts electrical signals into a correspond-
ing ironed signal, then used as input to a microcontroller’s analogue to digital convertor
(Fig. 11).
An Effective Optimization of EMG 165
When a user flexes, it creates an analog signal that is amplified by the EMG sensor.
The Arduino board uses this analog signal to create a movement. This moves servos by
whose tension, the limbs cause the limbs to move (Fig. 12).
The following code says that the signal pin is connected to pin 10 (pwm) in aurduino
will turn a servo motor from 0° to 360, wait for 15ms delay, then turn it back from 360
to 0° back.
166 D. N. Choudhury and N. Nayak
5 Artificial Intelligence
5.1 Gesture Recognition
Gesture focus is the method used to apprehend and analyze human physique behavior.
The in-flip helps in making a channel between the computing device and the consumer.
Gesture cognizance is helpful in processing the records that can’t be conveyed through
verbal or written content.
Procedure:- small objects which are really essential for an amputee or prosthetic
limb user were taken into account such as glass of water, pen, pendrive, wallet, etc.
An Effective Optimization of EMG 167
These objects were taken for the experiment and then their circumference were noted
down by the traditional thread and ruler method and noted down. Then for each object
it was marked upto what circumference our hand can grasp objects. After all readings
were taken a graph was plotted to compare it with the functionality of the human hand
(Fig. 13) (Table 2).
Analysis of EMG signals that are detected from the user muscles have been analyzed
by taking the EMG signals of 10 different persons (Subject) to check the rotation of
servomotor, as the EMG signals vary from person to person.
As physiological, anatomical and biochemical characteristics of persons are different
from each other, so that the range of EMG signals changes from person to person. Some
factors like height, weight of a person, strength of muscles, placement of electrodes also
influence the values of EMG signals. So, to analyses the changing value the readings of
EMG signals for 15 s of different 10 persons have been taken and presented in graph
(Tables 3, 4 and 5).
Table 3. (continued)
Table 4. EMG Signals of different subjects in each second and rotation angle (a)
Time (s) Subject-1 Subject-2 Subject-3 Subject-4 Subject-5 Servo rotation angle (°)
1 408 405 276 234 208 170
2 377 370 279 210 201 170
3 380 382 284 199 202 170
4 395 392 290 208 195 170
5 380 325 286 244 199 170
6 343 340 290 239 207 170
7 331 328 297 236 212 170
8 342 340 283 222 224 170
9 311 250 292 238 242 170
10 309 108 279 241 225 170
11 309 208 273 232 229 170
12 322 120 285 241 235 170
13 320 150 298 238 237 170
14 323 310 283 245 228 170
15 319 122 274 241 231 170
From the above characteristics, it is observed that the servo mechanism performs
almost the same for all subjects (i.e., subject-1, subject-2, subject-3, subject-4, subject-
5, subject-6, subject-7, subject-8, subject-9, sub-10) irrespective of their body weight,
height and arm length. Though the servo mechanism holds good for all different subjects,
it gives a good response for the operation. So, it can be concluded that this setup can
easily be used for any amputees (Fig. 14).
An Effective Optimization of EMG 169
Table 5. Signals of different subjects in each second and rotation angle of servo motor (b)
Time (s) Subject-6 Subject-7 Subject-8 Subject-9 Subject-10 Servo rotation angle (°)
1 158 250 208 246 209 170
2 178 256 216 236 211 170
3 159 236 213 235 225 170
4 15 260 212 224 229 170
5 154 265 200 258 227 170
6 152 261 194 256 210 170
7 181 287 184 254 237 170
8 161 290 188 243 239 170
9 160 268 189 256 222 170
10 131 261 193 258 235 170
11 153 252 195 256 248 170
12 135 250 200 242 244 170
13 131 244 252 242 234 170
14 144 246 255 242 235 170
15 146 246 253 230 236 170
6 Conclusion
This project aims in design of the ideal prosthetic limbs controlled by EMG signal. Each
of the finger has three axis of rotation. Each finger is powered by using servo motors
controlled by micro-controller. The prosthetic limb is processed by the EMG signals.
The described EMG setup can operate only one finger so if we want to operate all five
fingers of the designed prototype then we need 5 EMG sensors as well as 15 electrodes.
This implies that a total of 11 electrodes are required while complete functioning of the
limbs.
When EMG signals of 10 different persons were taken it is observed that the servo
mechanism performs almost the same for all persons irrespective of their body weight,
height and arm length. The servo motor is rotating about 170° which helps to move the
finger of the prosthetic hand.
Though the servo mechanism holds good for all different subjects, it gives a good
response for the operation. So, it can be concluded that this setup can easily be used for
any amputees without any maloperation.
170 D. N. Choudhury and N. Nayak
References
1. Kato, R., Yokoi, H., Arai, T.: Real-time learning method for adaptable motion-discrimination
using surface EMG signal. In: 2006 IEEE International Workshop on Intelligent Robots and
Systems (IROS), pp. 2127–2132 (2006)
2. Ahmed, S.F., Kamran Joyo, M., Mahdi, H.F., Kiwarkis, I.J.: Muscle fatigue detection and
analysis using EMG sensor. In: 2020 IEEE 7th International Conference on Engineering
Technologies and Applied Sciences (ICETAS), pp.1–4 (2020)
3. Cifuentes, C.A., Braidot, A., Frisoli, M., Santiago, A., Frizera, A., Moreno, J.: Evaluation of
IMU ZigBee sensors for upper limb rehabilitation. In: Converging Clinical and Engineering
Research on Neurorehabilitation, pp. 461–465 (2013)
4. Palli, G., Scarcia, U., Melchiorri, C., Vassura, G.: Development of robotic hands: the UB
hand evolution. In: 2012 IEEE/RSJ international conference on intelligent robots and systems,
pp. 5456–5457
5. Clement, R.G.E., Bugler, K.E., Oliver, C.W.: Bionic prosthetic hands: a review of present
technology and future aspirations. Surgeon 336–340 (2011)
An Effective Optimization of EMG 171
6. Akgun, G., Cetin, A.E., Kaplanoglu, E.: Exoskeleton design and adaptive compliance control
for hand rehabilitation. In: Transactions of the Institute of Measurement and Control, pp. 493–
502 (2020)
7. Rai, V., Sharma, A., Rombokas, E.: Mode-free control of prosthetic lower limbs. In:2019
International Symposium on Medical Robotics (ISMR), pp. 1–7 (2019)
8. Atique, M.D., Moin, M.S., Siddique, R.: A cost-effective myoelectric prosthetic hand, journal
of prosthetics and orthotics, pp. 231–235 (2018)
Communications
Performance Analysis of Fading Channels
in a Wireless Communication
1 Introduction
for channel equalization, evolutionary algorithms were used extensively [6–11]. The
node location algorithm adopts distance measurement as a TDOA technique and the
static sensor node can localize when it comes into the reception range of the channel
[12].
Using a vehicular environment, this paper develops Rayleigh, Rician, and Nakagami-
m fading algorithms. Frequency selective fading is categorized under multipath time
delay spread in addition to flat fading. Fast fading is observed on the channel when
its coherence time is small compared to its delay constraint. In the Nakagami fad-
ing model, multipath scattering with large delays is considered, with multiple reflected
waves clustered together. Each reflected wave within a cluster has a random phase, but
all waves have approximately equal delay times. Hence, each cumulated cluster signal
has a rayleigh envelope. Multipath reception is considered the cause of Rayleigh fading.
Using a Rayleigh distribution, the Rayleigh fading model predicts that a signal’s magni-
tude will vary randomly through the transmission medium. A Rayleigh fading effect is
most commonly observed when line-of-sight propagation is not dominant between trans-
mitters and receivers. As a result of the Rician model, the dominant wave is composed
of several dominant signals, for instance, the line of sight and the ground reflection. A
deterministic process is then used to treat the combined signal, with shadow attenuation
also applying to the dominant wave.
The rest of this work is structured as follows:
The technique for Signal propagation is affected by fading channels described in
Sect. 2. In Sect. 3, the study’s findings are given and thoroughly discussed. Section 4
marks the conclusion of the research work.
2 Fading Channels
Signal propagation is affected by fading channels due to elements including shadowing,
multipath propagation, and geographic conditions. Rayleigh, Rician, and Nakagami,
channels [13] are some of the fading channels that are commonly used.
The following expressions can be used to determine the capacity of the Rayleigh,
Rician, and Nakagami fading channels:
1 bits
C = log2 det In + 2 HRx H (1)
σ Hz
Here, C refers capacity of the channel, mutual information denoted as In whereas the
channel matrix identified as H and the signal envelope mentioned as Rx .
The transmission and reception of wireless signals are subject to LOS conditions. How-
ever, in specific towns LOS conditions are difficult to achieve; consequently, the receiver
detects multipath signals. The amplitudes and phases of these multipath signals are dis-
tributed. In the absence of LOS, these signals are subject to Rayleigh fading at the
Performance Analysis of Fading Channels in a Wireless Communication 177
receiver side [14] Summation of two Gaussian noise signals in quadrature is governed
by Rayleigh distributions [15–17]:
h − h2
fh (h) = p(h) = e 2σ 2 h≥0 (2)
σ2
Ithis case, σ is the root mean square of the voltage signal received before envelope
detection. In-phase and quadrature components of the received signal are demodulated.
Using the following formula, we can calculate the envelope of a received signal:
x(t) = P 2 (t) + Q2 (t) (3)
Here, P(t) and Q(t). Ardefined as the in-phase and quadrature Signal. Based on the
central limit theorem, signals can be entirely described by their means and autocorrelation
functions,
An envelope distribution that exhibits fading at small scales is rician when the majority
of the signal component is stationary (non-fading), such as a line-of-sight transmission
channel. In this case, a dominating signal that is steady has random multipath components
that are coming at various angles superimposed on it. This has the result of increasing the
random multipath’s dc component at the output of an envelope detector. Several weaker
multipath signals interact to produce the Rician distribution. An enveloped Rayleigh sig-
nal is formed when the dominant signal becomes weaker. Rician distributions degenerate
into Rayleigh distributions when the dominant component disappears. The transmitted
signal can be written as the following equation when such a path exists.
N −1
c(t) = lj cos(wc t + wsj t + ϕj ) + ks cos(wc t + ws t) (4)
j=1
Here, ks is denoted as the strength of the direct component,ws represents the Doppler
shift along the LOS path [18, 19].
The pdf’s derivation in this situation is comparable to that in the Rayleigh scenario.
It is possible to identify the mean and autocorrelation function of Q(t) and P(t) if N
is large enough. They are independent Gaussian processes. The presence of the direct
component in the Rician situation prevents the mean values of P(t) and Q(t) from being
zero. By demodulating the signal s(t), the envelope r(t) of P(t) and Q(t) is derived [2].
In this instance, the Rician density function of the envelope is given by:
2
h h + ks2 hks
fh (h) = p(h) = 2 exp − I 0 h≥0 (5)
σ 2σ 2 σ2
178 P. K. Mohapatra et al.
Since the same signal is created for both this fading and the preceding Rayleigh example,
the components, envelope, and RF signal values will all be the same. For the Rician
distribution, the probability density function plot will resemble that in Fig. 3.
Fig. 3. Comparison of fading envelope of Rician and Rayleigh distribution for different value K
interference, fading, scattering, etc. Knowing CSI improves the reliability of the signal
transmitted compared to not knowing CSI. As a result, it plays a significant role in
defining the communication relationship. From transmitter to receiver and from receiver
to transmitter, the CSI varies. A comparison graph between the Nakagami and AWGN
channel with CSI of both transmitter and receiver is also shown in Fig. 6.
Performance Analysis of Fading Channels in a Wireless Communication 181
4 Conclusion
Using Rayleigh, Rician, and Nakagami-m Distributions of probability density functions
for respective fading channel models, this paper compares the respective probability den-
sity functions against channel capacity. According to the simulation results, increasing
vehicle speed leads to increased fading in the signal envelope. Consequently, the amount
of fading increases as the signal sinks below the threshold at higher speeds. However,
some fading models perform better than others even after Doppler Effect degrades the
channel capacity. Using better distribution in these models, the channel’s capacity can
be further enhanced. Compared to Rayleigh and Ricchian fading channels, the probabil-
ity density function of the Nakagami-m fading channel grows. In Nakagami-m fading
channel, signal amplitudes of multiple independently dispersed Rayleigh-fading signals
with identical distributions are added together.
References
1. Kumar, S., Gupta, P.K., Singh, G., Chauhan, D.S.: Performance analysis of rayleigh and rician
fading channel models using matlab simulation. Int. J. Intelli. Sys. Appl. 5(9), 94 (2013)
2. Prabhu, G.S., Shankar, P.M.: Simulation of flat fading using MATLAB for classroom
instruction. IEEE Trans. Educ. 45(1), 19–25 (2002)
3. Khan, M. J., Singh, I., Tayal, S.: BER Performance using BPSK modulation over rayleigh
and rician fading channel. In: 2022 IEEE 11th International Conference on Communication
Systems and Network Technologies (CSNT), pp. 434–437. IEEE (April 2022)
4. Bellorado, J., Ghassemzadeh, S., Kavcic, A.: Approaching the capacity of the MIMO Rayleigh
flat-fading channel with QAM constellations, independent across antennas and dimensions.
IEEE Trans. Wireless Commun. 5(6), 1322–1332 (2006)
Performance Analysis of Fading Channels in a Wireless Communication 183
5. Mohapatra, P.K., Jena, P.K., Bisoi, S.K., Rout, S.K., Panigrahi, S.P.: Channel equaliza-
tion as an optimization problem. In: 2016 International Conference on Signal Processing,
Communication, Power and Embedded System (SCOPES), pp. 1158–1163. IEEE (October
2016)
6. Mohapatra, P.K., Rout, S.K., Bisoy, S.K., Sain, M.: Training Strategy of Fuzzy-Firefly based
ANN in Non-linear Channel Equalization. IEEE Access (2022)
7. Panda, S., Mohapatra, P.K., Panigrahi, S.P.: A new training scheme for neural networks and
application in non-linear channel equalization. Appl. Soft Comput. 27, 47–52 (2015). https://
doi.org/10.1016/j.asoc.2014.10.040
8. Mohapatra, P., Samantara, T., Panigrahi, S.P., Nayak, S.K.: Equalization of Communication
Channels Using GA-Trained RBF Networks. In: Saeed, K., Chaki, N., Pati, B., Bakshi, S.,
Mohapatra, D.P. (eds.) Progress in Advanced Computing and Intelligent Engineering. AISC,
vol. 564, pp. 491–499. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-6875-
1_48
9. Mohapatra, P., Sunita, P., Panigrahi, S.P.: Equalizer Modeling Using FFA Trained Neural
Networks. In: Soft Computing: Theories and Applications, pp. 569-577. Springer, Singapore
(2018)
10. Pradyumna, M., et al.: Shuffled Frog-Leaping Algorithm trained RBFNN Equalizer. Int. J.
Comp. Info. Sys. Indu. Manage. Appl. 9, pp. 249–256 (2017)
11. Kumar Mohapatra, P., et al.: Application of Bat Algorithm and Its Modified Form Trained
with ANN in Channel Equalization. Symmetry 14(10), 2078 (2022)
12. Rout, S.K., Rath, A.K., Bhagabati, C.: Energy efficient dynamic node localization technique
in wireless sensor networks. Indian J. Sci. Technol. 10(15), 1–8 (2017)
13. Panchal, A., Dutta, A.K.: Performance analysis and design of MIMO power NOMA with
estimated parameters error statistics along with SIC and hardware imperfections. IEEE Trans.
Veh. Technol. 70(2), 1488–1500 (2021)
14. Narayana, M., Bhavana, G.: Performance analysis of MIMO system under Fading Channels
(Rayleigh and Rician) Using SVD PCA and FSVD. journal of engineering technology 5(2),
116–126 (2016)
15. Zhang, D., Zhou, P., Jiang, C., Yang, M., Han, X., Li, Q.: A stochastic process discretization
method combing active learning Kriging model for efficient time-variant reliability analysis.
Comput. Methods Appl. Mech. Eng. 384, 113990 (2021)
16. Tang, L., Hongbo, Z.: Analysis and simulation of Nakagami fading channel with MAT-
LAB. In: Asia-Pacific Conference on Environmental Electromagnetics, 2003. CEEM 2003.
Proceedings, pp. 490–494. IEEE (November 2003)
17. Gvozdarev, A.S.: The novel approach to the closed-form average bit error rate calculation for
the Nakagami-m fading channel. Digital Signal Processing 127, 103563 (2022)
18. Sijbers, J., den Dekker, A. J., Scheunders, P., Van Dyck, D.: Maximum-likelihood estimation
of Rician distribution parameters (2004)
19. Mounika, I.S.D., Sharma, D., Sharma, P.K.: Analysis of different detection techniques of
MIMO in future generation of wireless communication. In: international journal of pure and
applied mathematics 114(12), 419–426 (2017)
Power Conscious Clustering Algorithm Using
Fuzzy Logic in Wireless Sensor Networks
1 Introduction
Many new applications, such as armed surveillance, environmental supervising, & intel-
lectual shipping system, have been made possible as a result of recent advancements in
low-WSN, which are becoming increasingly common. As a typical WSN application,
event detection has received a great deal of attention in the past few years. Diverse wire-
less sensor networks (DWSN) are systems that are made up of different types of sensors
that differ in terms of energy consumption, computing power, and storage space, among
other characteristics. Cluster leader is dominant than cluster associate in terms of all
assets, including control, storage, communiqué, & data dispensation; this reduces the
transparency of cluster associate by allowing cluster heads to perform all of the expensive
computations, thereby reducing the overhead of cluster members. In particular, when
using a Hierarchical Wireless Sensor Networks(HWSN), for example a cluster depen-
dent system, cluster leader [1] is more influential than cluster component in terms of
every source, including control, storage, communiqué, & information processing. Thus,
load-balancing capability and network lifetime can both be significantly enhanced as
a result. It is widely used in a variety of fields, including sensor network, robotics,
video & image processing [2], and it is particularly effective in combining information
from multiple sources into a single unified picture. Data fusion has several advantages at
WSN because it is an efficient way to collaborate between several sensors. As a physical
data fusion design, clustering has become increasingly popular, as it set sensors into
numerous groups so as to accomplish the system scalability goal [3]. Clustering is a fre-
quently used physical architecture of data fusion. Each group has a cluster head (CH),
which performs and acts as a relay for data fusion. The cluster head therefore use more
power than the usual sensors; a stronger sensor is therefore more possible to chosen as
the cluster head. With the introduction of the membership concept [4], it is possible to
handle faulty data in a proper manner. Data fusion theoretical thinking framework that
adds a new notion of membership and allows for the right handling of flawed data is
known as fuzzy reasoning. Because the sensing information from a solitary sensor is
frequently indistinct & incomplete, it is complicated to derive the last fusion result from
these imperfect data by performing an exact quantitative calculation on the imperfect
data, as is the case with many other types of sensing data in general. To produce fuzzy
output, fuzzy logic makes use of the membership degree to fuzzily transform partial
data. This data is then combined with fuzzy system to create even more fuzzy produc-
tion. Using it is a simple and effective method of dealing with data that contains some
degree of uncertainty. It establish the novel concept of association degree, that allows
for the appropriate handling of imperfect data.[5] fuzzy reasoning is a supposed analysis
system for information integration that set up the narrative concept of association quan-
tity, which allows for the appropriate handling of imperfect data. Because the sensing
information from a particular antenna is frequently indistinct & incomplete, it is hard to
derive the last fusion result from these imperfect data by performing an exact quantitative
calculation on the imperfect data. To produce fuzzy output, fuzzy logic makes use of the
membership degree to fuzzily transform partial data. This data is then combined with
fluffy system to create even more fuzzy production. Using it is a simple and effective
method of dealing with data that contains some degree of uncertainty.
186 S. K. Sarangi et al.
The organized papers are as follows: Sect. 2. Related Works, Sect. 3. Proposed
Model, Sect. 4. Simulation Setup and evaluation, Sect. 5. Conclusions.
2 Related Works
Low-energy adaptive clustering hierarchy (LEACH) [6, 7] is a steering practice that uses
a grouping system wherein cluster arrangement is random, adaptive, & self configuring
in the field of routing protocols. Application-specific data transmission is controlled at
the local level. All of the sensor nodes in LEACH are grouped into clusters, with a cluster
head at the centre of each cluster (CH). The CH transfers collected information to the base
station (BS) using code division multiple access (CDMA), wherever the data is desirable,
using TDMA (time division multiple access) scheduling. When the access point is by far
the clusters and the amount of data would be sent is big, it suffers from a disadvantage. in
this case, the data transmission process consumes a lot of energy. Another disadvantage
is that, due to the adaptive nature of the clusters, the initialization stage for group a
specified round will have little impact on LEACH’s overall performance.
Centralized LEACH (LEACH-C) [8] is a centralized approach that provides an
improved cluster by using a consistent grouping stage of the CH collection. It have
stable stage, just like LEACH. For larger networks, however, they lack scalability and
robustness. Using Multi Criteria Decision-production, a strategy called Reliability based
Enhance Techniques for Ordering Preference by Ideal Similarity Solutions (RE-TOPSIS)
[9] in blend with Fuzzy supports viable and dependable CH choice (MCDM). It like-
wise utilizes the notable LEACH convention to take into consideration one time CH
choice or planning dependent on RE-TOPSIS rank file esteem in each group. During
each round of the LEACH arrangement state period, this methodology dispenses with
the requirement for CH choice. The Gupta convention [10], which depends on 3 param-
eters: centrality, focus, and energy for concentrated bunch head political race, has been
proposed to conquer LEACH’s limits. As indicated by reenactment results, the organi-
zation lifetime was altogether expanded, beating LEACH. It proposes a fluffy rationale
based bunch head political decision system (CHEF). Neighborhood distance and energy
levels were utilized by CHEF. As indicated by reenactment results, bunch heads are
appropriated more equally than LEACH. Subsequently, the organization’s future has
been broadened. The fundamental disadvantage of CHEF is that it can’t be utilized to
assemble multi-jump courses in CHs.[11] suggested a power, regression routing algo-
rithm to enhance lifetime of the network, assuming the cluster members has no resource
constraints and more power than some other sensors. It proposes a technique for model-
ing the multiple step information broadcast problem in WSNs, which is caused by more
data failure & low power competence, with the goal of providing reliable end-to-end
information broadcast at a lower price. The authors proposed a Distributed Learning
Automaton (DLA) based algorithm to conserve the difficulty as best route trouble with
numerous limitations. DLA’s ability to find the smallest number of nodes while main-
taining the required QoS specifications is exploited in the proposed solution [12] to find
the smallest number of nodes while still maintaining the required QoS specifications.
Develop and demonstrate a data gathering scheme for wireless sensor networks (WSNs)
that ensures service quality while also optimizing system concert metrics such as power
Power Conscious Clustering Algorithm Using Fuzzy Logic 187
expenditure, operation competence, and overall reliability. EPDC adjusts the prospect
of group head appointment & evenly allocate the cluster leader diagonally the system
in order to provide connectivity between cluster members, but it is not practical for
practical WSNs due to its computational complexity. When using the Energy competent
group arrangement procedure (ECGA), cluster leader was chosen based on the amount
of data transmitted among every node and neighboring elements. [13] Has proposed an
algorithm for forming energy-efficient clusters of atoms and molecules. The projected
technique necessitates compound matrix procedures, which was never capable of being
performed by sensor nodes. When using the FLGAP procedure, the stable condition
stage is the similar as when using the LEACH. The lone time there is a conflict is during
the early stages of cluster organization. With the FLGAP (Fuzzy Logic group arrange-
ment procedure), a cluster head (CH) was selected for non-CH members using Fuzzy
Logic. The CH chance value was calculated using three parameters in order to select a
cluster head (CH). A solution to the problem of sensors with uniform distinctiveness,
which is inconvenient for a wide range of applications, has been proposed in [14]. It
is necessary for both regions to gather responsive &non-responsive data in a manner
that is separate from one another. Suitable for sensible purposes such as sensors with
mixed characteristics (i.e., where each sensor node has a different characteristic from
the others). The authors [15] have anticipated two methods, one is based on the central
(Fuzzy–C) approach which was central grouping algorithm dividing the entire network
into a predetermined quantity of spectral partitioning strategy clusters. The sink node
is supposed to have total information regarding system arrangement. The descend node
is divided the sensors into k-numbers groups and connects to all the CHs. The others
use a disseminated grouping method by using the neighboring information of a node.
A central algorithm is used as benchmarks for the evaluation of the performance of
the distributed algorithm. The centralized algorithm can improve performance with full
knowledge of network topology. A Fuzzy Logic (MCFL) [16] Multi-clustering Strategy
was developed to reduce energy dissipation and boost network life. The MCFL approach
combines sensor nodes with multiple clustering algorithms at different times, reducing
the number of messages that are sent from each node and base station to other nodes
and maintaining network energy. The authors [17] used fuzzy approach with the input
to the fuzzy system are angle, distance and energy and output is the chance of Cluster
head selection. After the cluster head selection, IDA* search algorithm is used to find
the shortest path to send the data packets from source node to sink node via cluster head
node. In [18] the authors used mamdani fuzzy inference method to select the cluster
head (CH) node. Once after the cluster head is selected, the Best first search algorithm
is used to find the shortest route path to send data to reach at the sink node.
3 Proposed Model
A. Preliminaries
The derived system model is implicated for the proposed sensor network.
1. The sensors don’t have GPS projections; therefore they were not aware of their
location (node localization algorithm used to find location of node).
188 S. K. Sarangi et al.
3 Proposed Model
Residual Energy
(Mamdani)
Fuzzy Rules CH Selecon
FIS
Data transmission
Sink Node
2. The nodes have the ability to adjust the broadcast control based on the expanse.
3. Radio relations are symmetric, which means that in any situation, two sensors X &
Y will converse by means of the equivalent broadcast authority.
4. The strength of the wireless radio signal can be used to calculate distance.
5. The most common cause of node failure is power exhaustion (Fig. 1).
where,
E re : Residual Energy
E in : Initial Energy of a node
E co : Consumed Energy of a node
Node Centrality
Node centrality is calculated as the sum of distance of the shortest paths between the
node and all other neighboring nodes in the networks shown in Eq. 2.
1
Nc (x) = (2)
z d(z, x)
where, d(z, x) is the distance between the node and neighboring node.
The Mamdani FIS has the following steps:
Power Conscious Clustering Algorithm Using Fuzzy Logic 189
1. Fuzzification:
This is the first step of Mamdani FIS. In this step convert the crisp inputs residual
energy, node centrality and output fuzzy cost into fuzzy membership grade using
triangular and trapezoidal fuzification method (Table 1) and (Fig. 2).
Fig. 2. Fuzzy Membership: (a) Node centrality (b) Residual energy (c) Fuzzy cost
The fuzzy if…then rules are evaluated using the Eqs. (3) and (4).
µXUY (z) = Max µX (z) , µY (z) (3)
µX ∩Y (z) = Min µX (z) , µY (z) (4)
3. Defuzzification
This is the final stage of FIS. The evaluated fuzzy rules are changes to crisps value.
The output of the defuzzification is the node cost. The centroid method is used for
defuzzification.The defuzzified value Z* using COA is shown in Eq. 5.
∗ µA (x).x.dx
Z = (5)
µA (x).dx
The output of defuzzification value is less than or equal to the pre-assigned threshold,
then the node is selected as cluster head.
1. Start
2. BS choose CHs arbitrarily & transmit the CH_Msg
3. Cluster arrangement & information transmission will be done in this step
4. Every sensor calculate the remaining power & node centrality and propel this
information to BS from CH
5. End
1. Start
2. fuzzy cost ← measured by BS by means of sensor centrality & residual power
Power Conscious Clustering Algorithm Using Fuzzy Logic 191
3. BS select CHs depending on the cost of fuzzy & transmit the message
4. Cluster arrangement & information transmission will be done in this step
5. Every sensor calculate the remaining power & node centrality and propel this
information to BS from CH
6. End
Figure 3 shows that, when compared to LEACH, this Fuzzy Power Conscious Clus-
tering Algorithm (FPCCA) can process about 26.8% more data if FND (First Node
Dies) is taken into account, although the BS receives roughly 15.3% and 17.9% more
data through Half of Nodes Alive (HNA) and Last Node Dies (LND).
8
Data Received
6
4 LEACH
2 FPCCA
0
FND HNA LND
Fig. 3. Data received through Base Station (BS) during FND, HNA and LND
Figure 4 shows energy consumption of nodes. It is clear from the below figure, the
energy consumption of FPCCA is less as compared to LEACH as the node increases.
192 S. K. Sarangi et al.
Consumpon(J)
Energy
1
LEACH
0 FPCCA
0 100 200 300 400
Number of Nodes
5 Conclusions
WSNs routing has gotten a lot of attention recently, and it presents a distinct prob-
lem when evaluated to typical information routing in wired networks. We significantly
analyzed research findings on grouping in WSN using fuzzy logic. We discussed an
energy-efficient dynamic clustering methodology in this research. The softness of the
fuzzy approach allows it to be easily modified for various network and node conditions
by simply shaping the fuzzy sets. Sensor nodes are grouped together in a cluster-based
routing system to ensure that sensed data is efficiently sent to the sink. The selection of
cluster heads is centralized here, although data collecting is spread. When compared to
LEACH, our method will extend the sensor system’s lifetime while also ensuring the
optimal quantity of groups in each round. This algorithm is straightforward and requires
little computing power. As a result, this technique can be employed effectively in larger
WSNs. More research will be done to extend this method to suit the QoS (Quality of
Service) requirements for WSNs.
References
1. Abbasi, Younis, M.: A survey on clustering algorithms for wireless sensor networks. Comput.
Commun. 30(14–15), 2826–2841 (2017)
2. Zadeh, A.: Fuzzy sets. Inf. Control 8(3), 338–353 (1965)
3. Manjunatha, P, Verma, A.K., Srividya, A.: Multi-sensor data fusion in cluster based wireless
sensor networks using fuzzy logic method. In: Proceedings of the IEEE Region 10 and the
3rd International Conference on Industrial and Information Systems (ICIIS 2008), pp. 1–6.
IEEE, Kharagpur, December (2018)
4. Zhang, Y., Wang, J., Han, D.: Wu Hand Zhou R: Fuzzy-logic based distributed energy-efficient
clustering algorithm for wireless sensor networks. Sensors 17(7), 1554 (2017)
5. Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H : An application-specific protocol
architecture for wireless microsensor networks. IEEE Trans. Wireless Commun. 1(4), 660–
670 (2012)
6. Wang, Q., Guo, S., Hu, J., Yang, Y.: Spectral partitioning and fuzzy C- means based clustering
algorithm for big data wireless sensor networks, EURASIP J. Wireless Commun. Netw. 1,
54 (2018)
Power Conscious Clustering Algorithm Using Fuzzy Logic 193
1 Introduction
objectives are also not met. Moreover, in each time of tag access, all records
kept in the database needs to be computed and verified one by one to pinpoint
the matching record which overloads the database and pulls down the overall
performance. Then, Yeh et al. [11] proposed a securing RFID systems conform-
ing to EPC Class 1 Generation 2 standard. Unfortunately, In 2011, Habbi et
al. [12] proved that Yeh et al. [11] proposed scheme is vulnerable to tracing
attacks, obtains the most important secret value, does not provide backward
untraceability and untraceability of a tag. Further, Habbi et al. [12] proposed an
improvement on Yeh et al. [11] proposed scheme. Later, Alavi et al. [13] found
that some vulnerabilities still there in Yeh et al. [11] proposed scheme, such
as traceability and forward traceability attacks. In 2013, Khedr’s [14] proposed
SRFID: A hash-based security scheme for low cost RFID systems. Dehkordi et
al. [15] proposed an improved version of Cho et al.’s protocol [16] that eliminates
weaknesses of Cho et al.’s [16]. Later, Alavi et al. [13] showed that the protocols
proposed in [14–16] are still has some privacy concerns and are not resistance
against backward traceability and forward traceability attacks. Hoque et al. [17]
proposed enhancing privacy and security of RFID system with serverless authen-
tication and search protocols in pervasive environments. However, Deng et al.
[18] pointed out that protocol cannot offer any protection against data desyn-
chronization attack. Chen et al.’s [19] proposed a novel mutual authentication
scheme based on quadratic residues for RFID systems. However, Doss et al.
[20] showed that Chen et al.’s [19] proposed protocol is insecure against the tag
impersonation attacks, replay attacks and location privacy compromise.
In 2015, Srivastava et al. [21] proposed a hash-based RFID mutual authen-
tication protocol for TMIS, and claimed that the protocol is effective against
a various active and passive attacks such as forged attacks, replay attacks, and
so on. However, Li et al. [22] pointed out the weaknesses of Srivastava et a.l
[21] RFID tag authentication protocol such as reader stolen/lost attacks, lack
of mutual authentication between reader and server, low efficiency. Later, Zhou
et al. [23] and Benssalah et al. [24] analyzed the security flaws of Li et al. [22]
that it fails to protect against tag and reader anonymity, strong forward trace-
ability attack, replay attack, de-synchronization attack, data integrity vulner-
ability and impersonation attack. Next, Zhou et al. [23] proposed a quadratic
residue-based RFID authentication protocol with enhanced security for TMIS.
Benssalah et al. [24] proposed an enhanced authentication protocol. In 2018,
Zheng et al. [25] proposed a new mutual authentication protocol in mobile RFID
for smart campus and claimed that their protocol will provide forward security,
anti-counterfeit, anti-replay, anti-tracking, anti-eavesdropping, anti-man-in-the-
middle attack, de-synchronize, anti-DoS. But, in 2019, Safkhani et al. [26] proved
that Zheng et al. [25] protocol is vulnerable to impersonation attack, replay
attack, traceability attack, anonymity and the attacks that the adversary can
control the time.
In 2019, Safkhani et al. [26] proposed a new secure authentication protocol
for TIMS and smart campus. They claimed that their protocol is secured against
various known attacks and provides distinguished properties. But, in 2020, Feng
An Improved RFID-based Authentication Protocol for Rail Transit 197
[27] and Zhu et al. [28] analyzed the security flaws of Safkhani et al.’s protocol
[26] and showed that it fails to provide forward secrecy. Next, Feng [27] proposed
a new authentication protocol based on quadratic residues for RFID systems.
Recently, Zhu et al. [29] proposed an improved RFID-based authentication pro-
tocol in order to withstand these security issues, and claimed that their scheme
is secure against all possible known attacks.
2 Preliminary
2.1 Secure Requirements
To secure a RFID system, the applied authentication protocol should meet the
following security demands.
1. Untraceability: A tag should not be traced, e.g., by correlating the tag’s
messages in two different sessions.
2. Resistance to replay attacks:An adversary cannot get any benefits by
replaying old messages.
3. Forward secrecy: Even if the secrets of a tag is exposed to an adversary,
the adversary can hardly identify the previous messages of the tag.
4. Mutual authentication:The protocol parties should authenticate with each
other so as to prevent any impersonation attack.
5. Synchronization:If a protocol relies on shared values for authentication, an
adversary may cause desynchronization problems. For example, if the server
updates the shared values but the tag does not, the server may not be able
to authenticate the tag in future. Such desynchronization attacks should be
resisted.
6. Scalability: If a protocol requires the server to use exhaustive search for
authentication, the protocol is of low efficiency. Worse than that, an adversary
can launch a time measurement attack [30], e.g., tracing a tag based on its
authentication time.
198 S. Devanapalli and K. Phaneendra
This article considers the widely accepted Dolev-Yao threat model [31] in which
an adversary has control over the communication channels between the protocol
parties, i.e., the tag-to-reader channel and the reader-to-server channel, and can
eavesdrop, modify, delete or add messages in between the communication.
Symbols Description
IDk , : the identity of kth tag
RIDk , : the identity of kth Reader
T : a time stamp
ΔT : the time delay
EskS (.) : encryption function with private key skS
DpkS (.) : decryption function with public key pkS
Rx : the random number generated by x
G : a cyclic group
g : a generator of G
H(.) : a secure one-way collision avoiding hash function
⊕ : the bitwise XOR operation
: a concatenation
In this section, we briefly review Zhu et al.’s scheme [29]. Their scheme has
the following phases:set up phase, authentication phase. The symbols used in
Shuming et al’s. scheme are listed in Table 1.
The server chooses the cyclic group G with a generator g, and publishes them.
In this phase, we briefly review the authentication and key agreement of Zhu et
al. protocol. The summary of the authentication phase is shown in Fig. 1.
Step1: As the start, the tag generates a fresh random number Rt and computes
g Rt , then the tag sends the query and g Rt to the reader.
An Improved RFID-based Authentication Protocol for Rail Transit 199
Step2: When the reader receives the message from the tag, the reader stores
g Rt for later use. Then the reader generates a random number Rr , computes
g Rr and sends it with g Rt to the server.
Step3: Upon receiving g Rr and g Rt , the server generates a random number Rs
and computes g Rs . The server signs {g Rt , g Rs , g Rr } with its private key skS
and send the signed message M S to the reader.
Step4: With public key pkS, the reader can decrypt the message M S and check
whether the message is legal. If so, the reader transfers the message M S to
the tag.
Step5: When receiving the message M S from the reader, the tag check whether
the message is legal.If so, the tag computes N1 = H(IDk g Rt Rs g Rt ) and
sends it to the reader.
200 S. Devanapalli and K. Phaneendra
5 Conclusion
In this paper, we have first reviewed the recently proposed Zhu et al. protocol
and then shown that their protocol fails to prevent known session temporary
information attack. Also, we have demonstrated that their protocol lack of scal-
ability. In the future, we aim to design a novel and more secure RFID-based
authentication protocol using Elliptic curve cryptography for Telecare Medicine
Information System to withstand the security flaws found in Zhu et al. Scheme.
References
1. Rhee, K., Kwak, J., Kim, S., Won, D.: Challenge-response based RFID authenti-
cation protocol for distributed database environment. In: Hutter, D., Ullmann, M.
(eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005). https://
doi.org/10.1007/978-3-540-32004-3 9
2. Lee, S.M., Hwang, Y.J., Lee, D.H., Lim, J.I.: Efficient authentication for low-cost
RFID systems. In: Gervasi, O., et al. (eds.) ICCSA 2005. LNCS, vol. 3480, pp.
619–627. Springer, Heidelberg (2005). https://doi.org/10.1007/11424758 65
3. Lim, J., Oh, H., Kim, S.: A new hash-based RFID mutual authentication protocol
providing enhanced user privacy protection. In: Chen, L., Mu, Y., Susilo, W. (eds.)
ISPEC 2008. LNCS, vol. 4991, pp. 278–289. Springer, Heidelberg (2008). https://
doi.org/10.1007/978-3-540-79104-1 20
4. Dimitriou, T.: A lightweight RFID protocol to protect against traceability and
cloning attacks. In: First International Conference on Security and Privacy for
Emerging Areas in Communications Networks (SECURECOMM2005), pp. 59–66.
IEEE (2005)
5. Henrici, D., Muller, P.: Hash-based enhancement of location privacy for radio-
frequency identification devices using varying identifiers. In: IEEE Annual Confer-
ence on Pervasive Computing and Communications Workshops, 2004. Proceedings
of the Second, pp. 149–153. IEEE (2004)
6. Yang, J., et al.: Mutual authentication protocol for low-cost RFID. In: Workshop
on RFID and Lightweight Crypto, pp. 17–24. WRLC (2005)
7. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of
low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan,
W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp.
201–212. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-39881-
3 18
8. Cho, J.S., Yeo, S.S., Kim, S.K.: Securing against brute-force attack: a hash-based
RFID mutual authentication protocol using a secret value. Comput. Commun.
34(3), 391–397 (2011)
9. Tsudik, G.: Ya-trap: yet another trivial RFID authentication protocol. In: Fourth
Annual IEEE International Conference on Pervasive Computing and Communica-
tions Workshops (PERCOMW2006), p. 4. IEEE (2006)
202 S. Devanapalli and K. Phaneendra
10. Chien, H.-Y., Chen, C.-H.: Mutual authentication protocol for RFID conforming
to EPC class 1 generation 2 standards. Comput. Stand. Interfaces 29(2), 254–259
(2007)
11. Yeh, T.-C., Wang, Y.-J., Kuo, T.-C., Wang, S.-S.: Securing RFID systems conform-
ing to EPC class 1 generation 2 standard. Expert Syst. Appl. 37(12), 7678–7683
(2010)
12. Habibi M.H., Gardeshi, M.: Cryptanalysis and improvement on a new RFID mutual
authentication protocol compatible with EPC standard. In: 2011 8th International
ISC Conference on Information Security and Cryptology, pp. 49–54. IEEE (2011)
13. Alavi, S.M., Baghery, K., Abdolmaleki, B., Aref, M.R.: Traceability analysis of
recent RFID authentication protocols. Wireless Pers. Commun. 83(3), 1663–1682
(2015)
14. Khedr, W.I.: SRFID: a hash-based security scheme for low cost RFID systems.
Egyptian Inf. J. 14(1), 89–98 (2013)
15. Masoud Hadian Dehkordi and Yousof Farzaneh: Improvement of the hash-based
RFID mutual authentication protocol. Wireless Pers. Commun. 75(1), 219–232
(2014)
16. Cho, J.-S., Jeong, Y.-S., Park, S.O.: Consideration on the brute-force attack cost
and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual
authentication protocol. Comput. Math. Appl. 69(1), 58–65 (2015)
17. Hoque, M.E., Rahman, F., Ahamed, S.I., Park, J.H.: Enhancing privacy and secu-
rity of RFID system with serverless authentication and search protocols in perva-
sive environments. Wireless Pers. Commun. 55(1), 65–79 (2010)
18. Deng, M., Yang, W., Zhu, W.: Weakness in a serverless authentication protocol
for radio frequency identification. In: Wang, W. (ed.) Mechatronics and Automatic
Control Systems. LNEE, vol. 237, pp. 1055–1061. Springer, Cham (2014). https://
doi.org/10.1007/978-3-319-01273-5 119
19. Chen, Y., Chou, J.-S., Sun, H.-M.: A novel mutual authentication scheme based
on quadratic residues for RFID systems. Comput. Netw. 52(12), 2373–2380 (2008)
20. Doss, R., Sundaresan, S., Zhou, W.: A practical quadratic residues based scheme
for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11(1),
383–396 (2013)
21. Srivastava, K., Awasthi, A.K., Kaul, S.D., Mittal, R.C.: A hash based mutual RFID
tag authentication protocol in telecare medicine information system. J. Med. Syst.
39(1), 153 (2015)
22. Li, C.-T., Weng, C.-Y., Lee, C.-C.: A secure RFID tag authentication protocol with
privacy preserving in telecare medicine information system. J. Med. Syst. 39(8),
77 (2015)
23. Zhou, Z., Wang, P., Li, Z.: A quadratic residue-based RFID authentication protocol
with enhanced security for TMIS. J. Ambient. Intell. Humaniz. Comput. 10(9),
3603–3615 (2019)
24. Benssalah, M., Djeddou, M., Drouiche, K.: Security analysis and enhancement of
the most recent RFID authentication protocol for telecare medicine information
system. Wireless Pers. Commun. 96(4), 6221–6238 (2017)
25. Zheng, L., et al.: A new mutual authentication protocol in mobile RFID for smart
campus. IEEE Access 6, 60996–61005 (2018)
26. Safkhani, M., Vasilakos, A.: A new secure authentication protocol for telecare
medicine information system and smart campus. IEEE Access 7, 23514–23526
(2019)
27. Zhu, F.: SecMAP: a secure RFID mutual authentication protocol for healthcare
systems. IEEE Access 8, 192192–192205 (2020)
An Improved RFID-based Authentication Protocol for Rail Transit 203
28. Zhu, F., Li, P., He, X., Wang, R.: A novel lightweight authentication scheme for
RFID-based healthcare systems. Sensors 20(17), 4846 (2020)
29. Zhu, R., He, X., Xie, J., Zhang, Z., Wang, P.: An improved RFID-based authen-
tication protocol for rail transit. In: 2020 IEEE 14th International Conference on
Big Data Science and Engineering (BigDataSE), pp. 65–72. IEEE (2020)
30. Avoine, G., Coisel, I., Martin, T.: Time measurement threatens privacy-friendly
RFID authentication protocols. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS,
vol. 6370, pp. 138–157. Springer, Heidelberg (2010). https://doi.org/10.1007/978-
3-642-16822-2 13
31. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory
29(2), 198–208 (1983)
32. SK Hafizul Islam: Design and analysis of an improved smartcard-based remote user
password authentication scheme. Int. J. Commun Syst 29(11), 1708–1719 (2016)
33. He, D., Kumar, N., Khan, M.K., Lee, J.-H.: Anonymous two-factor authentication
for consumer roaming service in global mobility networks. IEEE Trans. Consum.
Electron. 59(4), 811–817 (2013)
34. Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for
building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.
2045, pp. 453–474. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-
44987-6 28
35. Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On the indistinguishability-based
security model of key agreement protocols-simple cases. Cryptology ePrint Arch.
2005, 129 (2005)
36. Mishra, D., Das, A.K., Mukhopadhyay, S.: A secure user anonymity-preserving
biometric-based multi-server authenticated key agreement scheme using smart
cards. Expert Syst. Appl. 41(18), 8129–8143 (2014)
A Novel Approach to Detect Rank Attack in IoT
Ecosystem
1 Introduction
Kevin Ashton, a British technological innovator, is credited with inventing the Internet
of Things (IoT). The IoT is a huge network of machines/objects that are all connected
to each other. The connected machine/objects may be low-resource devices that share
and communicate to one another via wired or wireless connections [1]. A different study
says that IoT ecosystem evolution market share and prospects have grown by 31% since
2016 and that 8.4 billion IoT-enabled objects will be in use in 2017 [2, 3]. According
to the information gathered from the resources, the ecosystem of the Internet of Things
will expand by the year 2020, when there will be 30 billion gadgets. This demonstrates
both how quickly we are integrating them into our daily lives and why it is so important
to treat their security seriously.
The vast majority of Internet of Things ecosystem components and applications are
dependent on Internet Protocol version 6, which was released to support these technolo-
gies (IPv6). Because the sensor nodes have limited resources, the routing protocol that
is employed must be as efficient as possible in terms of both the amount of energy it
consumes and the amount of computational power it can muster. The routing protocol for
the IoT ecosystem is also known as Low-power and Lossy Networks (RPL) [4]. It was
developed to address routing issues in the IoT ecosystem. RPL has been designated by
the Internet Engineering Task Force (IETF) as the preferred routing protocol for the IoT
ecosystem [5]. Thus, RPL is widely employed in several IoT applications. This protocol
was designed from the ground up to work well over slow and error-prone connections,
and it succeeds admirably. Among RPL’s multiple impressive characteristics are its
adaptability to different routing metrics and goal functions; its ability to handle compli-
cated interconnections and multi-topology routing operations; and the adaptability of its
trickling method and control message style and frequency.
RPL contains a number of configurable security measures to safeguard its control
messages. These approaches ensure authenticity, integrity, and confidentiality. Assailants
are nevertheless able to get control of the genuine nodes despite the fact that they are not
immune to being tampered with and are not physically protected [6]. Threats that lower
the quality of IoT applications service can be launched using these compromised nodes.
RPL is utilized in numerous IoT applications and can be attacked in different ways
[7, 8]. Cyber-attacks like Rank, black-hole, Sybil, and Sinkhole attacks are able to target
the RPL mostly because of design defects in the topology generation of the RPL [9–12]
All of the above assaults are the most significant obstacles to the actual use of RPL in
the IoT ecosystem. Despite the protection provided by the MAC layer, RPL continues to
struggle significantly with the issue of internal assaults. Destructive attacks like the rank
attack occur when an attacker node successfully creates a fake topology and coerces its
neighbors into rerouting traffic to itself. Despite the fact that the rank attack has been the
subject of a noteworthy amount of analysis in the routing path, no study has investigated
the consequences of assaults of this kind on the different topologies of the IoT network.
Additionally, no study covers how this assault on the RPL networks is made viable. This
gave us the motivation to carry out this study and close the noted research gap. The
highlights and new contributions of our study are outlined here.
We examine both the non-attack and the attack scenario in relation to rank estima-
tion using the objective functions (OFs) and the DODAG Information Object (DIO)
communication methods.
We analyze rank attack change with threshold modifications introduced by the Rank
change scenario with minimum computational and communication overhead.
The suggested method offers novel lightweight security solutions to improve Rank
attack detection in IoT ecosystems. It gives High True Negative Rate (TNR) and True
Positive Rate (TPR) with minimum energy consumption.
The suggested solution is implemented on both small- and large-scale IoT networks
to examine the effectiveness and efficiency of the desired solution.
206 A. Das et al.
The comprehensive analysis of the suggested security solution that was carried out
using the Contiki cooja simulation.
The remainder of the paper is structured as follows. Section 2 introduces the generic
IoT network architecture, RPL as IoT routing protocol, Rank attack in IoT ecosystem, and
Intrusion Detection System (IDS) for IoT ecosystem. The relevant research is presented
and discussed in Sect. 3. In Sect. 4, an explicit overview of the proposed security model
is presented. The experiments and results are described in Sect. 5. The research paper is
finally ended in Sect. 6, which also discusses conceivable future directions.
2 Background
In this section, we offer a concise introduction to the architecture of the IoT net- work,
RPL as routing protocol, rank attack, and IDS for the IoT ecosystem.
There are five parts to the IoT network architecture: Business, Application, Process-
ing, IoT-Internet Connection, IoT Access Network, and Perception. The network stack
remains the same, as illustrated in Fig. 1, with the exception of the upsurge of the adap-
tion layer, modification of the routing strategy at the IoT access network layer, use of
IEEE 802.15.4 as the MAC layer, and other similar changes.
The layers and functions associated with each layer are depicted in Fig. 1. With
the exception of the extra adaption layer, the IoT access network layer is functionally
equivalent to the network layer in conventional networks. The Application layer of
the Internet of Things commonly implements a protocol known as CoAP (Confined
Application Protocol). This protocol was designed particularly for limited devices such
as LLN devices and is used by the majority of IoT applications. In the part on the RPL
algorithm that came before this one, [13, 14] you may find a description of the routing
protocol that is used.
IoT ecosystems that are built on Low Power and Lossy Networks (LLN) will use this
routing protocol. As a practical protocol, RPL supports a variety of communication
modes, including [15]. Reactive and proactive RPL are the two classes of RPL that
could be found in the IoT ecosystem. RPL provides path as needed. The disadvantage is
that the time needed to find a path to an IoT node increases as more and more connections
are made. The routes are provided by proactive RPL before another IoT node needs them.
In addition to this, it engages in the trading of various control messages in order to get
access to local knowledge about the area and find new routes [16]. RPL procedure as
displayed in Fig. 2.
A Novel Approach to Detect Rank Attack in IoT Ecosystem 207
It consists of cooperating elements that detect attacks and harmful behavior in the IoT
ecosystem. IDSs are as follows:
Internet
Downward Direction Rank Direction
3 3 3
3 3
3 3 3
4
4 4
RPL Attack
Fig. 3. Various types of attacks in RPL routing protocol in the IoT ecosystem
– Signature-based IDS (SIDS): This type of IDS uses a database of intrusion detection
signatures that have already been seen. Every intrusion leaves a trail, such as the files
and folders that were accessed, the type of data packets that were sent, and failed
logins, etc. This IDS compares the behavior of known attack imprints in the IoT
ecosystem. If attack imprints or signature match is found, a notification is given so
that the right steps can be taken.
– Network-based IDS (NIDS): Analyses network traffic and monitors many hosts to
identify malicious activities.
A Novel Approach to Detect Rank Attack in IoT Ecosystem 209
3 Related Work
Kamble et al. [17] enclose recently provided a survey on various protection methods
against vulnerabilities and safe routing algorithms in RPL-based Internet of Things
technology. They divided the attacks into two basic categories (i.e., direct and indirect
assault). In the case of an explicit invasion, the assailants are actively involved in the
attack. Examples of direct assaults in the IoT Ecosystem include routing table overflow
assaults and flooding attacks. When an invasion occurs, it is not the intruder who is
attacking directly. Therefore, the malicious node relies on other nodes to overwhelm
IoT networks with assaults such as increasing rank attacks, version number attacks, and
inconsistency in DAG formation attacks.
Raoof et al. [16] include different forms of routing-related attacks in the IoT ecosys-
tem: Sybil attacks, Selective forward attacks, Black-hole attacks, etc. It is important
to note that several metrics are used for evaluating various assaults (e.g., data packet
delivery rate, data packet delay, power consumption, etc.). This research study lessens
the severity of the effects of a routing assault without adding any additional defence
measures to the routing protocol. But the low TPR and TNR are a weakness of this
paper.
Le et al. [18] recognized attacks including rank, sinkhole, DIS and local repair using
IDS. The Extended Finite State Machine (EFSM) in this IDS was produced using a
semi-automatic characterization approach. The DIO suppression attack, a brand-new
method of attacking the RPL protocol, was first described by Perazzo et al. [19]. This
attack targets the ability of IoT nodes to send and receive updated DIO control messages,
which are necessary for the discovery of optimal routing pathways and the elimination
of inefficient or erroneous paths.
Wallgren et al. [20] utilized the Cooja simulation in order to carry out a variety
of attacks on RPL. These attacks included a selective forwarding attack as well as a
sinkhole attack. They have also exhibited many capabilities of the IPv6 protocol and its
application in the IoT enable IDS. This method’s primary drawback is that it consumes
more power than local processing.
Glissa et al. [21] presented SRPL, a safe routing mechanism utilized by RPL rout-
ing protocol. This approach prevents deviant nodes from generating a false topology by
altering node rankings. They have implemented a rank threshold and hash chain authen-
tication approach to thwart internal attacks likes selective forwarding attacks, blackhole
attacks, and sinkhole attacks. This research paper concludes that internal attacks depend-
ing on malicious RPL metrics must be avoided. The SRPL strategy, meanwhile, has
several shortcomings. First and foremost, regulated messages produced by SRPL incur
more overhead in contrast to RPL. Additionally, it requires greater processing power
and storage space.
Osman et el. [22], an ML-based model was introduced that uses the Light Gradient
Boosting Machine (LGBM) to find VN attacks. Methodology components focused on
210 A. Das et al.
creating a dataset of VN attacks, extracting features from that dataset, using a logistic
regression-based classification technique, and optimizing the algorithm’s specifications
were presented. The suggested model performed well but required at least 347,530
bytes of memory, which is beyond the capability of most IoT devices. This suggests that
in order to execute the model in a centralized fashion, this system requires additional
devices with significant memory resource capacities.
In order to protect the RPL routing mechanism against rank and VN at- tacks, the
authors of [23] developed a blockchain-based structure. ML A-based detection systems
modules in RPL network are connected securely through the blockchain network. To
identify potential rank and VN attacks, it deploys an XGBoost classifier on a private
blockchain network. After that, smart contracts are utilized to evaluate these efforts and
provide real-time warnings to harmful nodes in the IoT networks. The outcomes of
the performance tests demonstrated that the blockchain-based solution that was offered
boosted the accuracy reached by the ML algorithms when it came to forecasting the
assault.
Loo et al. [24] demonstrated a new type of routing attack known as a Topology
Attack, which alters node operation by separating the optimum topology of the nodes.
Local Repair Attack and Rank Attack are two subtypes of Rank at- tack. They have
furthermore implemented an IDS architecture that makes use of RPL finite state machines
in order to keep an eye on the nodes. Nevertheless, this strategy has the drawback of
using more memory and consuming more power than necessary. IoT network and RPL
attacks have been studied by et al. [25]. They have demonstrated that several assaults are
practicable on low-resource devices due to the simplicity and small size of IoT protocols.
In [26], the authors provide a lightweight solution which they call INTI (Intrusion
detection of SiNkhole attacks on 6LoWPAN for Internet of Things). This strategy, which
combines trust, reputation, and sinkhole attack detection using Rooming IDS in the
IoT ecosystem with a watchdog, is a sandwich of many approaches. When developing
the solution for the Internet of Things, they took the nodes’ ability to move around
in the network into account. FNR, FPR, and resource utilisation are all regarded as
performance criteria by the INTI. The biggest drawback of this technique is that it
requires more resources and computational power. As a result, this method shortens the
IoT ecosystem’s lifespan.
In [27] describes how the researchers developed four assault models and evaluated
how they affected important network metrics relating to the attacker’s topological loca-
tion. However, this study solely addressed static networks and did not offer any feasible
defenses against the rank assault. The effects of a ranked assault utilizing a fictitious IP
address were examined by the authors of [28]. However, the specific consequences of
the rank attack on the RPL procedure are not specifically examined in this study. The
enhanced rank assault was initially presented by Shukla et al. [29], who also proposed
an ego-based mitigation strategy. However, this study focuses on a topology with just
12 nodes rather than taking into account a realistic topology. Additionally, mobile nodes
were not included in this study.
A Novel Approach to Detect Rank Attack in IoT Ecosystem 211
– In the IoT ecosystem, every single device is different in terms of its resource limitations
(i.e. communication capacity, computation, memory, and battery power).
– Despite this, it is possible that billions or even trillions of IoT devices are connected
to the IoT ecosystem via wireless network. Nevertheless, we will provide our strategy
for a IoT ecosystem that is capable of holding a fixed quantity of the IoT devices like
8 to 128 IoT devices.
Fig. 4. IoT experiment setup and rank attack detection IDS module architecture
and sky mote which is CC2420 IEEE 802.15.4-compatible radio chips [31]. 6BR device
features an additional piece of hardware and increased processing power. To support the
intended solution to identifying Rank attacks. The IoT network is depicted in Fig. 4.
We conduct three different types of experiments in the experiment section. A thorough
justification of each experiment is provided below. Table 1 lists the simulation settings
with values for Contiki cooja.
collect view methods are used to gather and analyse IoT traffic in real time. We noticed
a significant decrease in throughput together with an increase in the typical amount of
power consumed by each node of 41–54%. Specifically, as seen in Fig. 10 and Fig. 11,
respectively. Figure 12 emphasizes a 37.8% increase in energy use for the whole network.
– Average energy usage: All IoT enabling device in the IoT ecosystem are battery-
powered device. As a result, there is a finite amount of energy. Here we compute
power depletion at node-level as well as system-level. For this purpose, we employ
powertrace on sky motes to estimate the power depletion. The powertrace output
shows system execution time with respective total time.
Fig. 6. Topology, DODAG, and power profiling are utilized to study non-rank assaults.
– TNR and TPR: The True Negative Rate (TNR) and True Positive Rate (TPR) are
estimated utilising sensitivity and specificity correspondingly. Sensitivity predicts
the number of legitimate nodes (LN) that are quickly and precisely recognised,
whereas specificity counts the quantity of rank attack generated nodes like (CN) that
are consistently discovered. Both sensitivity and specificity fit within the following
216 A. Das et al.
Fig. 7. Average throughput different IoT node with different run time
descriptions:
m
Senstivity = (1)
m+n
and
x
Specificity = (1)
x+y
where m = CN correctly recognise, n = Falsely labelled as authentic by CN, x = LN
correctly recognise. y = LN labelled wrongly as malicious.
A Novel Approach to Detect Rank Attack in IoT Ecosystem 217
Fig. 10. Avg. Throughput different IoT node with different run time in rank attack
In this section, a comparison is made based on memory usage, TNR, TPR, Avg. power
usage, and IoT traffic. As depicted in Table 2, the comparative analysis of the suggested
technique and the most recent current solutions. The suggested technique uses additional
ROM and RAM for the memory utilization analysis. Every configuration has a different
baseline since it is based on a different Contiki system component. A 6BR router, for
instance, requires more memory usage than other IoT nodes. Nevertheless, 1760 and
365 bytes of total ROM and RAM are anticipated to be used to implement the suggested
218 A. Das et al.
Fig. 12. Energy usage for the entire network in rank attack
strategy on IoT nodes. In experiment 3, 64 IoT nodes were run for 60 min while 9834
and 54256 bytes of RAM/ROM consumption were observed, respectively.
The avg TNR and TPR attained using the proposed approach are 94.12% and 95.34%
correspondingly. Most comparable solutions demonstrated in the literature have lower
detection rates than the rank attack detection rate [23, 28, 29]. However, when the IoT
network grows (in terms of size and device count), the TPR declines as a result of the
massive network topologies. Additionally, it takes some time for the network to stabilize
and grow enough to get a more increased TNR and TPR. In experimentation work, the
rank attack case, it takes 128 nodes 60 min to obtain the same TPR and TNR as 64 nodes
do in 30 min.
A Novel Approach to Detect Rank Attack in IoT Ecosystem 219
The average energy consumption of the whole IoT ecosystem for 60 min, during
which our experiment was conducted with a certain number of devices with limited
resources. Energy usage increases as the number of IoT nodes in- creases from 8 to 128
nodes. Our proposed approach reduces energy consumption by up to 70000 mJ.
6 Conclusion
The goal of the research is to provide rank change threshold-based security solutions
that monitor IoT network traffic and offer security against rank attacks. The execution of
the suggested security solution is assessed in contiki cooja with three types of network
scenarios, like non-rank attack, rank attack, and security solution with rank attacks. We
also included a comparison with recently developed solutions and closely related work.
Results from experiments demonstrate that the suggested system is capable of detecting
rank attacks. As a result, rank attacks are depreciated since the proposed security solution
uses the rank change threshold-based security solution to identify the rank attack. The
performance of accuracy and reaction time was superior to other security solutions. In
comparison to the closely linked work, the findings reveal that the average energy usage,
memory usage (RAM/ROM), TPR, and TNR are comparable 47540 mJ, 9834/54256 in
Byte, 95.34% and 94.12% respectively. In the future, the effort will incorporate the IoT
network’s lightweight security solution and evaluate the enhanced defence mechanism
by fending off multiple mixed attacks.
Acknowledgments. The network security and systems lab, IIT Guwahati, India; Utkal University,
Bhubaneswar, India; and BPUT, Bhubaneswar, India have all been the sites of the study activity.
IIT Guwahati, Utkal University, Bhubaneswar, and BPUT, Bhubaneswar are all thanked by the
authors for their assistance.
220 A. Das et al.
References
1. Ashton, K., et al.: That ‘internet of things’ thing. RFID J. 22(7), 97–114 (2009)
2. Sharma, N., Shamkuwar, M., Singh, I.: The history, present and future with IoT. In: Balas,
V.E., Solanki, V.K., Kumar, R., Khari, M. (eds.) Internet of Things and Big Data Analytics
for Smart Generation. ISRL, vol. 154, pp. 27–51. Springer, Cham (2019). https://doi.org/10.
1007/978-3-030-04203-5_3
3. Bhale, P., Dey, S., Biswas, S., Nandi, S.: Energy efficient approach to detect sinkhole attack
using roving ids in 6lowpan network. In: Rautaray, S.S., Eichler, G., Erfurth, C., Fahrnberger,
G. (eds.) I4CS 2020. CCIS, vol. 1139, pp. 187–207. Springer, Cham (2020). https://doi.org/
10.1007/978-3-030-37484-6_11
4. Kharrufa, H., AlKashoash, H.A., Kemp, A.H.: RPL-based routing protocols in IoT applica-
tions: a review. IEEE Sens. J. 19(15), 5952–5967 (2019)
5. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A.V., McCann, J.A., Leung, K.K.: A survey on the
IETF protocol suite for the internet of things: standards, challenges, and opportunities. IEEE
Wirel. Commun. 20(6), 91–98 (2013)
6. Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., Shieh, S.: IoT security:
ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference
on Service-Oriented Computing and Applications, pp. 230–234. IEEE (2014)
7. Bhale, P., Biswas, S., Nandi, S.: Liene: lifetime enhancement for 6lowpan network using
clustering approach use case: smart agriculture. In: Krieger, U.R., Eichler, G., Erfurth, C.,
Fahrnberger, G. (eds.) I4CS 2021. CCIS, vol. 1404, pp. 59–75. Springer, Cham (2021). https://
doi.org/10.1007/978-3-030-75004-6_5
8. Kuna, B., Fu, A., Susilo, W., Yu, S., Gao, Y.: A survey of remote attestation in internet of
things: attacks, countermeasures, and prospects. Comput. Secur. 112, 102498 (2022)
9. Bang, A.O., Rao, U.P., Kaliyar, P., Conti, M.: Assessment of routing attacks and mitigation
techniques with RPL control messages: A survey. ACM Comput. Surv. (CSUR) 55(2), 1–36
(2022)
10. Alsukayti, I.S., Singh, A.: A lightweight scheme for mitigating RPL version number attacks
in IoT networks. IEEE Access (2022)
11. Ray, D., Bhale, P., Biswas, S., Nandi, S., Mitra, P.: DAISS: design of an attacker identifica-
tion scheme in COAP request/response spoofing. In: TENCON 2021–2021 IEEE Region 10
Conference (TENCON), pp. 941–946. IEEE (2021)
12. Goyal, M., Dutta, M.: Intrusion detection of wormhole attack in IoT: a review. In: 2018 Inter-
national Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET),
pp. 1–5. IEEE (2018)
13. Krčo, S., Pokrić, B., Carrez, F.: Designing IoT architecture (s): a European perspective. In:
2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 79–84. IEEE (2014)
14. Radanliev, P., De Roure, D., Nicolescu, R., Huth, M.: A reference architecture for integrating
the Industrial Internet of Things in the Industry 4.0. arXiv preprint arXiv:1903.04369 (2019)
15. Nandhini, P., Kuppuswami, S., Malliga, S.: Energy efficient thwarting rank attack from RPL
based IoT networks: a review. Materials Today: Proceedings (2021)
16. Raoof, A., Matrawy, A., Lung, C.H.: Routing attacks and mitigation methods for RPL-based
internet of things. IEEE Commun. Surv. Tutor. 21(2), 1582–1606 (2018)
17. Kamble, A., Malemath, V.S., Patil, D.: Security attacks and secure routing protocols in RPL-
based Internet of Things: survey. In: 2017 International Conference on Emerging Trends and
Innovation in ICT (ICEI), pp. 33–39. IEEE (2017)
18. Le, A., Loo, J., Chai, K.K., Aiash, M.: A specification-based IDS for detecting attacks on
RPL-based network topology. Information 7(2), 25 (2016)
A Novel Approach to Detect Rank Attack in IoT Ecosystem 221
19. Perazzo, P., Vallati, C., Anastasi, G., Dini, G.: DIO suppression attack against routing in the
internet of things. IEEE Commun. Lett. 21(11), 2524–2527 (2017)
20. Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL- based
internet of things. Int. J. Distrib. Sens. Netw. 9(8), 794326 (2013)
21. Glissa, G., Rachedi, A., Meddeb, A.: A secure routing protocol based on RPL for Internet of
Things. In: 2016 IEEE Global Communications Conference (GLOBE-COM), pp. 1–7. IEEE
(2016)
22. Osman, M., He, J., Mokbal, F.M.M., Zhu, N., Qureshi, S.: Ml-LGBM: a machine learning
model based on light gradient boosting machine for the detection of version number attacks
in RPL-based networks. IEEE Access 9, 83654–83665 (2021)
23. Sahay, R., Geethakumari, G., Mitra, B.: A novel block chain based framework to secure
IoT-LLNS against routing attacks. Computing 102(11), 2445–2470 (2020)
24. Le, A., Loo, J., Luo, Y., Lasebae, A.: Specification-based IDS for securing RPL from topology
attacks. In: 2011 IFIP Wireless Days (WD), pp. 1–3. IEEE (2011)
25. Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International
Conference on Pervasive Computing (ICPC), pp. 1–6. IEEE (2015)
26. Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for sup-
porting secure routing on 6lowpan for internet of things. In: 2015 IFIP/IEEE International
Symposium on Integrated Network Management (IM), pp. 606–611. IEEE (2015)
27. Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., Chai, M.: The impact of rank attack on
network topology of routing protocol for low-power and lossy networks. IEEE Sens. J. 13(10),
3685–3692 (2013)
28. Rai, K.K., Asawa, K.: Impact analysis of rank attack with spoofed IP on routing in 6lowpan
network. In: 2017 Tenth International Conference on Contemporary Computing (IC3), pp. 1–
5. IEEE (2017)
29. Shukla, S., Singh, S., Kumar, A., Matam, R.: Defending against increased rank attack on
RPL in low-power wireless networks. In: 2018 Fifth International Conference on Parallel,
Distributed and Grid Computing (PDGC), pp. 246–251. IEEE (2018)
30. IoT-Simulator: Cooja. https://anrg.usc.edu/contiki/index.php/Cooja~Simulator. Accessed 29
July 2019
31. Bhale, P., Biswas, S., Nandi, S.: Ml for IEEE 802.15. 4e/TSCH: Energy efficient approach to
detect DDoS attack using machine learning. In: 2021 International Wireless Communications
and Mobile Computing (IWCMC), pp. 1477–1482. IEEE (2021)
Energy Efficient Adaptive Mobile Wireless
Sensor Network in Smart Monitoring
Applications
Abstract. The Mobile Wireless Sensor Networks (MWSNs) owe its name due to
mobile sinks or mobile sensor nodes as one category of heterogeneous networks
with induced mobility of nodes making it autonomous and more suitable for smart
monitoring applications. The possible application in their implementation context
in home and disaster management involves the integration of mobile WSN in
ubiquitous computing. With the enormous growth of smart devices, the data shar-
ing among entities lead to hotspot problem nearby sink, that requires a powerful
computing, communicating and storage capable mobile devices, can benefit net-
work in terms of scalability, efficiency and data delivery speed. In this paper, we
proposed an adaptive heterogeneous multi-tiered architecture based mobile sen-
sor network and analyzed its performance and routing efficiency with respect to
the static wireless sensor network. The performance metrics used help in vali-
dating our proposed method suitable for smart data collecting and dissemination
for monitoring applications. Again, the low power wireless personal area network
(6LoWPAN) plays a vital role in interconnecting these IoT devices and imple-
menting mobility of nodes with appropriate data rate for robust communication
and achieving desired Quality of Service.
1 Introduction
Smart Monitoring Applications is a great revolutionary aspect of the decade, made
more accountable and intelligent by embedding sensors and providing communication
among the network. The integration of IoT(Internet of Things) with wireless sensor
networks gives a vast range of application perspectives for monitoring like smart home,
field or environment monitoring, smart disaster management, or industrial automation.
Moreover, various companies have also supported the integration of IoT with wireless
sensor network. The crucial element of the Internet of Things is wireless communication
across different platforms and devices without human-to-human or human-to-device
interaction. It is important to think of a quick and flexible way to experiment with the
The major challenges in integrating the MWSN to IoT is the data collection and data
sharing with energy management. Hence, various topology control and routing schemes
based on clustering has been incorporated. The issue we deal with here begins with a
coverage area’s random distribution of heterogeneous nodes. The first step is to organize
the networked in different cluster groups depending on energy distribution among nodes.
Assuming the nodes in a group contain at least one cluster head or routing node and
other sensing nodes, the network gets connected as a whole including the sink node.
However, some routing nodes undergoes controlled mobility pattern depending on the
data dissemination to the sink node, that aims to integrate the Internet of Things with
the Mobile Wireless Sensor Network.
The main contribution to our paper is to exploit the IoT based applications on MWSN
(mobile wireless sensor network) context which can be possible with the node hetero-
geneity in mobile sensors. The main objective of our paper proposals are summarized
as follows.
• A system model for level based heterogeneous mobile network is proposed that
signifies a better QoS.
• To initiate the criteria of energy and mobility model on heterogeneous network on the
basis of threshold parameter and received signal strength indicator.
• The performance parameters for energy utilization and lifetime maximization in het-
erogeneous network of different variants suitable for basic IoT applications with static
and mobile sensors are analyzed.
• Other routing protocols of tier based heterogeneous networks under stationary and
mobile condition of routing nodes with respect to multihop network are compared.
The rest of the paper is organised as follows. The background information and
related activities needed to construct the architecture of MWSN is provided in Sect. 2.
In Sect. 3, the proposed system model and algorithm are discussed. Section 4 then sets
up the simulation and analyses the results. The paper was concluded in Sect. 5.
2 Related Works
One of the promising areas in the field of IoT is monitoring applications in different real
time fields like home, agriculture, industry or forest [4]. A set of technologies and devices
has been surveyed and exposed to develop system model integrated for monitoring and
architectural applications [5]. Various papers have been surveyed to classify the types of
wireless sensor networks based on sensor type, deployment strategy, mobility pattern,
architectural design, sensing technique, coverage and connectivity pattern [6]. In our
paper, we have considered sensor network variant like static and mobile, clustered het-
erogeneous hierarchical architecture with different mobility, coverage and connectivity
pattern.
In [7], the authors have discussed on the requirements and features to offer diverse
and heterogeneous tools and services on testbeds. But there existed some gaps and
difficulties to choose a static or mobile sensor network depending on needs. However,
the authors from [8] focused on the deployment and working of static wireless sensor in
homogeneous and heterogeneous scenario.
Energy Efficient Adaptive Mobile Wireless Sensor Network 225
The coverage and connectivity among the nodes are important perspective of sensor
networking and has been addressed by several authors in different methods adapted. In
[9], authors developed a decentralized solution for adjustment and improving the cover-
age and connectivity for prolonging the lifetime in sensor network. Snagwan et. al [10]
addresses the problem of supervision of at least one node at targeted region. The sensing
ability and energy consumption features are described to define the network lifetime.
However, based on the category of sensor network the mobility based on placement of
nodes in robots and its coverage pattern is observed in [11]. The author Tirandazi et.
al [12] created a dynamic network by robot path planning algorithm where the nodes
are placed on mobile robots in two steps. With local phase and global phases analysis
reveals the combined connected coverage performance that effect the overall network
operation.
The spatially distributed set of autonomous connected sensor nodes create hotspot
problems near the sink node. So, the dynamic heterogeneous network issues some rout-
ing strategy to mitigate this problem and enhance the energy efficiency and network
longevity. The authors Khalaf et. al in [13] explained the dynamic and unequal cluster-
ing technique by providing solution to hotspot problem from various parameters like
cluster head selection, number of clusters, zone formation and different routing param-
eters. Hence, clustering methods become an important and reliable method in static and
mobile wireless sensor network which various authors have focused with different rout-
ing strategies. The Cluster Head selection methods are addressed by many researchers
based on different criterion over LEACH (Low-energy adaptive clustering hierarchy).
The distance-based approach [14] optimizes energy, in Cluster Head (CH) Selection, by
equal distribution of network load. The residual energy distribution for CH selection is
another important criterion explained by Behera et.al in [15]. Similarly, the statistical
methods have also significantly improved the network lifetime and energy efficiency as
discussed in the paper Mohapatra et al. [16].
The major contributions of this paper are as follows.
• The network development is initiated with a random deployment of nodes which may
not be connected. Thus, the first objective is to ensure the full connectivity among the
nodes within appropriate coverage level.
• Based on communication range cluster groups are formed with selection of Cluster
Head based on statistical based residual energy of nodes.
• The data collected from remote node are disseminated at the sink node via Cluster
head. However, if the communication distance between CH and Sink node is large,
then in accordance to greedy algorithm, some group of nodes or the Cluster Head node
provide adaptive logic in greedy direction towards Sink Node for further processing.
The performance evaluation of our proposed method then evaluated with two basic
scenarios, with respect to static and mobile wireless sensor network with or without
clustering.
226 S. Mohapatra and P. K. Behera
3 Proposed Method
The design of low power and low delay mobile wireless sensor network is a challenging
task, as in such network’s topology is moderately dynamics and the mobile sensor nodes
are equipped with poor sensing and processing capabilities. So, it is required to develop a
hierarchical or tiered based heterogeneous model with controlled mobility to achieve the
requirement of energy consumption and data delay. In the paper, we proposed a mobile
wireless sensor network model with three tier architecture in which some sensor nodes
are mobile by adaptive method as discussed below. For this work we have considered
following assumptions.
• After the random deployment of nodes, the node positions are determined on initial-
ization. The heterogeneity is maintained based on non-uniform energy distribution.
• Nodes with higher energy levels are preferred for cluster head formation. However, it
is assumed that the distribution of nodes is such that in each group at least one CH is
possible. Also, these nodes are GPS enabled to track the location.
• Based on the distance of nodes to higher energy node Cluster Head or Sink Node the
node gets mobility associated with greedy algorithm to destination.
• The sink node is allocated at the center of the network and is considered as the base
station.
The mobile sensor node architecture is almost identical to that of a regular sensor
node, with the inclusion of a few extra elements like locators, power sources, and mobi-
lizers. The sensing unit uses one or more sensors to provide basic sensing. Similar to
this, the processing unit contains memory and motes processors to execute signal pro-
cessing on digitized data with considering data aggregation into account. Once more, the
communication unit identifies the routing path and chooses the appropriate radio range.
Energy Efficient Adaptive Mobile Wireless Sensor Network 227
To identify the position, generate more electricity for nodes like solar cells, and control
the mobility of sensor nodes, additional units are however employed. The architecture
of Mobile sensor node is shown in Fig. 2. The majority of MWSN considers large-scale
applications made up of numerous sensor and sink nodes, where the mobility of the
nodes depends on the application’s specific requirements. The key factor for the design
of a MWSN are scalability and topology, data routing, mobility and residual energy
utilization [17]. Our proposed model is based on three phases (a)Establishment Phase
(b)Routing and Clustering phase.
(ρS)m −ρS
P(m) = e (1)
m!
where S = π r 2 for 2-D Space. Thus, the probability that the monitored space is covered
by at least one sensor node is given by
. The sensor node computes the distance between its post deployment location and
the locations associated with the pre distributed units. The smaller distance having higher
priority over larger distance between adjacent nodes.
topology, sensor node mobility, energy consumption, network coverage, data transmis-
sion techniques, quality of service (QoS), connectivity, data aggregation, sensor node
and communication link heterogeneity, scalability, and security. As a result, it’s crucial to
select a mobile node that can prolong network lifetime and attain better energy efficiency
[20].
Consider a network with N sensor nodes which is deployed over the sensor field
with remote/sensing nodes followed by advanced excluding the Sink Node. The levelled
based heterogeneous nodes are defined as
where Nr represents normal nodes with 20% being GPS enabled and rest 80% are without
GPS and Na are the advanced node.
After deployment the nodes configure their respective locations with coordinate
value (xi ,yi ). If rc is the communication range and rs is the sensing range of node N. then
Pt− Pth
rc = 10 10η (4)
rc ≤ 2r s (5)
with Pt being transmitter power and Pth being minimum threshold received power
required by nodes and η is the path loss factor.
The network nodes begin monitoring events that take place within sensing range
and report to CH using single-hop and multi-hop methods. However, nodes may cluster
in some areas and may generate coverage holes where nodes are not available when
sensors are randomly distributed in hostile target fields, resulting in network partitioning.
Therefore, it is necessary to find and fix the network’s gaps. In order to locate the holes, it
is reported to the base station or sink. In order to obtain a complete connectivity network,
the nodes are re-localized by introducing mobility into advanced nodes or sink nodes.
Either the sink node instructs the CH to travel a specific distance till the entire network
is joined to solve this issue.
When remote nodes and reference nodes are deployed at random, the nodes are
localized by calculating their distance from reference nodes using the total of their
shortest-path communication ranges. And utilizing the Angle of Arrival approach to
assess the sites. Nodes also identify coverage gaps and unconnected networks by exam-
ining the distribution of nearby neighbor nodes. To achieve the desired coverage, node
density should be properly considered as in Eq. (6).
N Nr + Na
ρ= = (6)
A π r0 2
rs
where r0 = 1.066 =Minimal sensing Radius of heterogeneous nodes.
Every initial GPS enabled node broadcasts location information (x,y) and rci to
neighbour nodes. The neighbour nodes store this information and add its own rcj . If
rci + rcj ≤ rcth , then nodes disseminate them together with reference node positions. By
attempting to segregate only the nearest reference nodes, the rcth minimizes the impact of
Energy Efficient Adaptive Mobile Wireless Sensor Network 229
asymmetric bent routes on distance estimations. Following the submission of this data,
neighbour nodes check to see if the reference node information has already been saved
in their neighbor data. The received reference node location and Critical Range sum are
updated in the neighbor information if it corresponds to a new node. The received sum
of rc is compared to the stored value if the obtained node information has already been
saved, and the lowest of these two rc values is saved along with the location data. Each
node will have the locations of the reference nodes and the associated minimum value
of the sum of the rc from the reference node to itself at the completion of this stage [21].
The simulation work is carried out in MATLAB2020b with Intel core i5 processor,
64-bit operating system with 1.8 GHz frequency [22]. After the random deployment of
nodes, the three-tiered heterogeneous network is represented as in Fig. 3 and the required
simulation parameters is cited in Table 1.
in large coverage area like smart farm monitoring applications. Thus, the performance
metrics [23] considered for these scenarios are the network lifetime with network con-
vergence factor, speed of coverage, end-to-end delay, energy efficiency. The analysis of
the mobility is based on above mentioned criteria with 500 m2 and 5000 m2 coverage
area with network size variations between 50 to 800 nodes.
interference levels. It also ensures that to implement an IoT in coverage area of 100 sqm.
we need to choose a proper scalable network suitable for smart applications.
Fig. 5. Analysis of residual energy distribution for 100 nodes in the entire network with 100 m2
Fig. 6. Analysis of packets sent to sink node from CH with coverage area 100 m2
The network latency analysis directs the way in which robust data packets reach the
server as fast as possible. This factor signifies under the above-mentioned criteria, the
Energy Efficient Adaptive Mobile Wireless Sensor Network 233
basic monitoring applications must utilize the method where data gathering and delivery
to sink node should be very fast with minimal loss [23]. In the paper, we compared
our proposed model with the its static and mobile sensor network Fig. 6 indicates the
packets sent to the sink node for the entire simulation duration. It is observed the adaptive
movement of sensor nodes in our proposed method gives the maximum data to the
sink node for any coverage area. Thus, it becomes suitable for monitoring based IoT
applications in different scenarios. Similarly, the time elapsed for network indicates the
computational complexity as shown in Fig. 7.
Fig. 7. Analysis of time elapsed for data delivery of network with coverage area 100 m2
5 Conclusion
With the advent of new technologies in the last few years, the integration of IoT and
Mobile Wireless Sensor Network has envisaged the ability of entities and environment
to recognize, communicate and share the data. The heterogeneity of nodes in an adaptive
mobile platform can be controlled via remote access. In this paper, we have proposed a
new adaptive method to develop mobile wireless senor network, specifically designed
for monitoring based IoT applications. The architectural implementation of layered
based clustered heterogeneous network with adaptive mobility of sensor node, followed
by analysis of performance related issues on the aspect of mobility is discussed. It is
observed that, our proposed hierarchical clustered mobile wireless sensor network is
more efficient than its static and mobile sensor network and it is also scalable to a
variety of network size. It reveals the fact that our proposed model is more useful in
different IoT based monitoring applications, from smart home to smart farm monitoring
scenario. Again, the energy efficiency and data dissemination over the network properly
address the effective data flow throughout the network to achieve the desired quality of
service (QoS).
234 S. Mohapatra and P. K. Behera
References
1. Reddy, V., Gayathri, P.: Integration of internet of things with wireless sensor network. Int. J.
Elec. Comput. Eng. (IJECE), 9, 439 (2019)
2. Tonneau, A.-S., Mitton, N., Vandaele, J.: How to choose an experimentation platform for wire-
less sensor networks? a survey on static and mobile wireless sensor network experimentation
facilities
3. Mhatre, V., Rosenberg, C.: Homogeneous vs heterogeneous clustered sensor networks: a
comparative study. In: 2004 IEEE International Conference on Communications (IEEE Cat.
No.04CH37577), vol. 6, pp. 3646–3651 (2004)
4. Etancelin, J.-M., Fabbri, A., Guinand, F., Rosalie, M.: DACYCLEM: A decentralized algo-
rithm for maximizing coverage and lifetime in a mobile wireless sensor network. Ad Hoc-
Networks, vol. 87, pp. 174–187 (2019). https://www.sciencedirect.com/science/article/pii/
S1570870518309430
5. Chen, X., Yu, P.: Research on hierarchical mobile wireless sensor network architecture with
mobile sensor nodes. In: 2010 3rd International Conference on Biomedical Engineering and
Informatics, vol. 7, pp. 2863–2867 (2010)
6. Hermanu, C., Maghfiroh, H., Santoso, H.P., Arifin, Z., Harsito, C.: Dual mode system of smart
home based on internet of things. J. Robot. Control (JRC) 3(1), 26–31 (2022)
7. Mohamed, S.M., Hamza, H.S., Saroit, I.A.: Coverage in mobile wireless sensor networks
(M-WSN): a survey. Comput. Commun. 110, 133–150 (2017)
8. Mohapatra, S., Mohapatra, R.K.: Comparative analysis of energy efficient mac protocol in
heterogeneous sensor network under dynamic scenario. In; 2017 2nd International Conference
on Man and Machine Interfacing (MAMI), pp. 1–5 (2017)
9. Liu, D., Ning, P.: Improving key predistribution with deployment knowledge in static sensor
networks. ACM Trans. Sen. Netw. 1(2), 204–239 (2005). https://doi.org/10.1145/1105688.
1105691
10. Huang, C.-F., Tseng, Y.-C., Wu, H.-L.: Distributed protocols for ensuring both coverage and
connectivity of a wireless sensor network. ACM Trans. Sen. Netw.3(1), p. 5–es (2007). https://
doi.org/10.1145/1210669.1210674
11. Sangwan, A., Singh, R.P.: Survey on coverage problems in wireless sensor networks. Wireless
Pers. Commun. 80(4), 1475–1500 (2015)
12. Tirandazi, P., Rahiminasab, A., Ebadi, M.: An efficient coverage and connectivity algorithm
based on mobile robots for wireless sensor networks. J. Ambient Intell. Humanized Comput.,
1–23 (2022)
13. Khalaf, O.I., Romero, C.A.T., Hassan, S., Iqbal, M.T.: Mitigating hotspot issues in heteroge-
neous wireless sensor networks. J. Sens. (2022)
14. Rajput, M., Sharma, S.K., Khatri, P.: Energy-Efficient multihop cluster routing protocol for
WSN. In: Poonia, R.C., Singh, V., Singh Jat, D., Diván, M.J., Khan, M.S. (eds.) Proceedings of
Third International Conference on Sustainable Computing. Advances in Intelligent Systems
and Computing, vol 1404, pp. 77–84. Springer, Singapore (2022). https://doi.org/10.1007/
978-981-16-4538-9_8
15. Behera, T.M., Mohapatra, S.K., Samal, U.C., Khan, M.S., Daneshmand, M., Gandomi, A.H.:
Residual energy-based cluster-head selection in WSNs for IoT application. IEEE Int. Things
J. 6(3), 5132–5139 (2019)
16. Mohapatra, S., Behera, P.K.: Statistical approach based cluster head selection in heterogeneous
networks for IoT applications. In: Behera, P.K., Sethi, P.C. (eds.) Digital Democracy – IT
for Change. CSI 2020. Communications in Computer and Information Science, vol 1372,
pp. 77–84. Springer, Singapore (2021). https://doi.org/10.1007/978-981-16-2723-1_4
Energy Efficient Adaptive Mobile Wireless Sensor Network 235
17. Atay, N., Bayazit, B.: Mobile wireless sensor network connectivity repair with K-Redundancy.
In: Chirikjian, G.S., Choset, H., Morales, M., Murphey, T. (eds.) Algorithmic Foundation of
Robotics VIII. Springer Tracts in Advanced Robotics, vol 57, pp. 35–49. Springer, Heidelberg
(2009). https://doi.org/10.1007/978-3-642-00312-7_3
18. Sahoo, P.K., Hwang, I.-S.: Collaborative localization algorithms for wireless sensor networks
with reduced localization error. Sensors 11(10), 9989–10009 (2011). https://www.mdpi.com/
1424-8220/11/10/9989
19. Buehrer, R.M., Wymeersch, H., Vaghefi, R.M.: Collaborative sensor network localization:
algorithms and practical issues. Proc. IEEE 106(6), 1089–1114 (2018)
20. Sara, G.S., Sridharan, D.: Routing in mobile wireless sensor network: a survey. Telecommun.
Syst. 57(1), 51–79 (2014)
21. Tolba, F.D., Ajib, W., Obaid, A.: Distributed clustering algorithm for mobile wireless sensors
networks. SENSORS. IEEE 2013, 1–4 (2013)
22. Amine, D., Nassreddine, B., Bouabdellah, K.: Energy efficient and safe weighted clus-
tering algorithm for mobile wireless sensor networks. Proc. Comput. Sci. 34, 63–70
(2014). The 9th International Conference on Future Networks and Communications (FNC
2014)/The 11th International Conference on Mobile Systems and Pervasive Computing
(MobiSPC 2014)/Affiliated Workshops. https://www.sciencedirect.com/science/article/pii/
S1877050914008953
23. Mohapatra, S., Kanungo, P.: Performance analysis of AODV, DSR, OLSR and DSDV routing
protocols using NS2 simulator. In: Procedia Engineering, vol. 30, pp. 69–76 (2012). Interna-
tional Conference on Communication Technology and System Design (2011). https://www.
sciencedirect.com/science/article/pii/S1877705812008454
Orthogonal Chirp Division Multiplexing:
An Emerging Multi Carrier Modulation Scheme
1 Introduction
Chirp, a kind of signal whose phase changes with time, being of spread spectrum
nature guarantees secure and robust communication. X. Ouyang et al. [1] introduced an
Multi Carrier Modulation (MCM) technique for high-speed communication and named
it Orthogonal Chirp Division Multiplexing (OCDM). In OCDM, N orthogonal chirps
of same bandwidth are multiplexed. Fresnel transform is the fundamental mechanism
behind OCDM. Implementation of OCDM system in digital domain is obtained by Dis-
crete Fresnel Transform (DFnT). At the transmitter side, OCDM signal is generated
using Inverse Discrete Fresnel Transform (IDFnT) while at the receive side, OCDM sig-
nal is recovered using DFnT. Similar to Orthogonal Frequency Division Multiplexing
(OFDM) [2], OCDM system sends the modulated signals block-wise. Between two con-
secutive blocks, Guard Interval (GI) is inserted to avoid Inter Symbol Interference (ISI).
To fill the GI, Zero Padding (ZP) and Cyclic Prefix (CP) both can be used. For modula-
tion, amplitude and/or phase of each chirp are modulated therefore QAM and PSK can
be used as modulation scheme in OCDM system. Being a MCM scheme, OCDM system
also suffers from high Peak-to-Average Power Ratio (PAPR). Various PAPR reduction,
equalization and channel estimation schemes presented in the literature for OFDM sys-
tem are applicable for OCDM system also [1] and various precoding matrices can be
used to implement precoded OCDM [3].
Partial Transmit Sequences (PTS) [4] is an attractive distortion less PAPR reduction
technique because there is no limitation on number of subcarriers but the transmitter
is required to send the optimum phase rotation factors, which is used to provide the
minimum PAPR, to the receiver. These phase factors are known as Side Information (SI).
Sending SI to receiver reduces the spectrum efficiency and it is very difficult to receive the
correct SI in multipath environment. Different PTS based schemes have been proposed to
eliminate the requirement of transmitting SI to the receiver. Multipoint square mapping
(MSM) combined with PTS (M-PTS) [5] and Concentric Circle Mapping-based PTS
(CCM-PTS) [6] are two of them.
In this paper, authors have presented the overview of OCDM along with its appli-
cations in various communication system. The main contribution of this paper is to
analyze the performance of OCDM system using PTS based PAPR reduction schemes
like M-PTS and CCM-PTS. Computational complexity of these PTS based systems are
also analyzed and their PAPR reduction capabilities along with their SER performance
over AWGN and Rayleigh fading channels are also given. OFDM is also simulated for
comparison. PAPR performance of OCDM and OFDM is same without any PAPR reduc-
tion scheme. PTS, M-PTS and CCM-PTS provide almost same reduction in PAPR for
OCDM and OFDM both. SER performance of OCDM with PTS, M-PTS and CCM-PTS
is identical to the performance of OFDM with PTS, M-PTS and CCM-PTS respectively
over AWGN channel. Over multipath Rayleigh fading channel, performance of OCDM
slightly degraded in the low SNR region whereas OCDM shows much better performance
compared to OFDM in high SNR region.
Rest of the paper is arranged as follows: Sect. 2 explains the compatibility of OCDM
with OFDM. Section 3 explains the computational complexity of OCDM. Section 4 pro-
vides various applications of OCDM. Section 5 provides results of computer simulation
and finally conclusion is drawn in Sect. 6.
x = φH s (1)
T
Here s = s0 , s1 , s2 . . . . . . ., sN −1 is information carrying symbol vector, x =
T
x0 , x1 , x2 . . . .., xN −1 is OCDM symbol vector and φ is DFnT matrix. The (n, k)th
entry of N ×N DFnT matrix φ is given by
⎧
j π (n−k)2
1 −j π ⎨ e N for even N
2
φ(n, k) = √ e 4 X π (2)
N ⎩e Nj n−k+ 1
2
for odd N
y = WN−nk s (3)
238 M. K. Singh and A. Goel
T
Here y = y0 , y1 , y2 . . . .., yN −1 is OFDM symbol vector and WNnk is DFT matrix. The
(n, k)th entry of N ×N DFT matrix WNnk is given by
1 2π
WNnk = √ e−j N nk (4)
N
Inspecting Eq. (2) and (4), we can say that DFnT in Eq. (2) consists of DFT of Eq. (4)
with additional quadratic phases given by.
π 2
π ej N n even N
1 (n) = e−j 4 X π π 2 (5)
e ej N n +n odd N
j 4N
and
π 2
ej N k even N
2 (k) = π 2 (6)
ej N (k −k) odd N
So, one can find the DFnT using DFT in three steps:
Step 1: Multiple with quadratic phase 1 .
Step 2: Perform DFT by FFT algorithm.
Step 3: Multiple with 2nd quadratic phase 2 .
Here 1 and 2 are the diagonal matrices having mth diagonal entries 1 (m) and
2 (m) respectively.
Using above three steps, one can integrate OCDM into the widespread OFDM system
with minor modifications (colored boxes) as shown in Fig. 1. [1].
(i). Transmitter
(ii). Receiver
3 Computational Complexity
Transmitter and receiver both are considered to compute the computational complex-
ity of OCDM and OFDM with PTS, M-PTS and CCM-PTS schemes. Computational
complexity is calculated by counting the total number of complex multiplications and
additions.
In OCDM, with N chirps and L oversampling factor, one LN point IDFnT is calcu-
lated for each sub-block at transmitter which require 2LN + 21 LN log2 (LN ) complex
multiplications and LN log2 (LN ) complex additions [1]. Therefore, for M sub-blocks,
2MLN + 21 MLN log2 (LN ) complex multiplications and MLN log2 (LN ) complex addi-
tions are required. With K phase factors, K M −1 searches are performed to find the OCDM
signal with minimum possible PAPR and (M − 1)LN complex additions are required to
combine M sub-blocks per search [7]. Therefore, K M −1 (M − 1)LN complex additions
are required to combine the sub-blocks in K M −1 searches. At the receiver, one LN point
DFnT is calculated for OCDM symbol detection which requires 2LN + 21 LN log2 (LN )
complex multiplications and LN log2 (LN ) complex additions and for demapping of infor-
mation carrying symbols, DN complex multiplications and 2DN complex additions per
OCDM symbol are also required [7]. Here D is the total number of decision regions.
Therefore, total number of complex multiplications and additions required in OCDM
with PTS, M-PTS and CCM-PTS schemes are as follows:
Total complex multiplications: 2MLN + 21 MLN log2 (LN ) + 2LN + 21 LN log2 (LN ) +
DN .
Total complex additions: MLN log2 (LN ) + K M −1 (M − 1)LN + LN log2 (LN ) +
2DN .
In OFDM, with N subcarriers and L oversampling factor, one LN point IDFT is calculated
for each sub-block at transmitter which require 21 LN log2 (LN ) complex multiplications
and LN log2 (LN ) complex additions [1]. Therefore, for M sub-blocks, 21 MLN log2 (LN )
complex multiplications and MLN log2 (LN ) complex additions are required. With K
phase factors, K M −1 searches are performed to find the OFDM signal with minimum
possible PAPR and (M −1)LN complex additions are required to combine M sub-blocks
per search [7]. Therefore, K M −1 (M − 1)LN complex additions are required to combine
the sub-blocks in K M −1 searches. At the receiver, one LN point DFT is calculated for
OFDM symbol detection which requires 21 LN log2 (LN ) complex multiplications and
LN log2 (LN ) complex additions and for demapping of information carrying symbols,
DN complex multiplications and 2DN complex additions per OFDM symbol are also
required [7].
Therefore, total number of complex multiplications and additions required in OFDM
with PTS, M-PTS and CCM-PTS schemes are as follows:
Total complex multiplications: 21 MLN log2 (LN ) + 21 LN log2 (LN ) + DN .
240 M. K. Singh and A. Goel
Total complex additions: MLN log2 (LN )+K M −1 (M − 1)LN +LN log2 (LN )+2DN .
Table 1 summarize the computational complexity of OCDM and OFDM with PTS,
M-PTS and CCM-PTS.
Table 1. Computational Complexity of OCDM and OFDM with PTS, M-PTS and CCM-PTS
4 Applications of OCDM
This section presents the various applications of OCDM proposed in literature.
In [8, 9], DSB modulated OCDM is introduced for intensity modulation and direct
detection (IM/DD) based short reach systems. IM/DD system has one dimension only
for modulation therefor the OCDM signal of complex values is not feasible for it. Pass-
band signal is obtained from complex baseband signals using Digital up conversion
(DUC) technique. Real part of passband signal which is equivalent to DSB modulated
OCDM signal is reserved for IM and imaginary part is rejected. At receiving end, dig-
ital down conversion (DDC) converts back the passband signal to baseband signal for
demodulation. Due to presence of DUC and DDC techniques, complexity of IM/DD
OCDM system is increased.
In [8, 9], open loop IM/DD OCDM and in [9] closed-loop IM/DD OCDM are sim-
ulated for BER performance with different data rates at different transmission distance.
DMT-OFDM is also considered for performance comparison. For open loop system, the
IM/DD OCDM system consistently perform better than the DMT OFDM system in all
instances. For high modulation levels and at long transmission distances, the IM/DD-
OCDM signal has a clear benefit. Because subcarriers of high frequencies are more
sensitive to fading induced by chromatic dispersion, the SNR performance of OFDM
subcarriers of high frequencies begins to drop with the increase in transmission dis-
tance. In contrast, OCDM chirps are unaffected by these defects, with flat SNRs and
relatively slight deterioration. As a result, IM/DD OCDM system performance is supe-
rior to DMT OFDM. If channel state information (CSI) is available at the transmitter,
most of the imperfections may be addressed therefore the IM/DD OCDM system shows
only a slight improvement over DMT OFDM in closed loop scenario. In comparison
to open loop system, the closed loop system shows a significant improvement for both
systems.
carrier frequency offset (CFO) only which is caused by increased inter carrier spacing.
By exploiting the multipaths diversity of the channel, underloaded OCDM provides good
robustness than OFDM but at the cost of reduced data rate.
Orthogonality of the subcarriers is destroyed by the Doppler effect therefore OCDM
reacts to Doppler spread and ICI. Hence, Doppler compensation algorithm is required.
In [12], Data Pick Rake OCDM, or DP-Rake OCDM, is proposed to remove ICI at short
GI and increase the data rate. The basic purpose of rake receiver is to determine the ideal
rake finger which minimize the ICI. The computational complexity of the receiver can
be considerably increased by using number of rake fingers. In [12], DP-Rake OCDM is
simulated over static and dynamic UWA channels. Static UWA channel is based on the
measured data of Xiamen Port Shallow Water and dynamic UWA channel is based on
the Water Mark Time-varying (WMT) channel. For comparison, SC-FDE, OFDM and
OCDM are also considered.
As FEC coding, Doppler estimation, and phase correction techniques remove the
Doppler shift introduced by channel variations, the BER performance of OFDM and
SC-FDE with these techniques is same over WMT channel. OCDM outperform OFDM
over WMT channel because it provides diversity and spreading gain both through its
chirp-based signal. The BER performance of DP Rake OCDM is the best, although the
performance improvement against OCDM is not considerable because WMT channel’s
delay spread is tiny in comparison to the CP, causing no severe ICI. Since the ICI caused
by delay spread has severe impact on MCM, BER performance of OCDM and OFDM
are poor over Xiamen Port SW channel, however, OCDM slightly outperforms OFDM.
With the addition of data pick-based rake receiver, which effectively eliminates ICI, BER
performance of DP Rake OFDM and DP Rake OCDM systems enhanced considerably,
however, the performance of DP Rake OFDM lies between DP Rake OCDM and OCDM.
5 Simulation Results
We have simulated OCDM and OFDM with N = 256 chirps/subcarriers, oversampling
factor L = 4 and 10,000 OCDM/OFDM symbols to investigate their PAPR performance.
QPSK modulation is used to modulate the chirps/subcarriers in original OCDM/OFDM.
PTS, M-PTS and CCM-PTS are applied for PAPR reduction. SER performance of PTS,
M-PTS and CCM-PTS over AWGN and Rayleigh fading channel is also investigated.
For PTS operation, we have taken K = 4 phase factors {1, -1, j, -j} and data symbols
are divided into M = 4 sub-blocks using adjacent partition methods. QPSK modulation
is used to modulate the chirps/subcarriers in OCDM/OFDM with PTS.
Figure 2 shows the PAPR performance of OCDM and OFDM with PTS, M-PTS and
CCM-PTS. It is clear from Fig. 2 that OCDM and OFDM have same PAPR performance.
Reduction in PAPR provided by PTS, M-PTS and CCM-PTS is almost same and is
approximately equal to 3 dB at CCDF = 10–3 .
Figure 3 shows the SER performance of OCDM and OFDM with PTS, M-PTS and
CCM-PTS over AWGN channel. In Fig. 3, analytical expression for SER of QPSK, M-
PTS [7] and CCM-PTS [7] have been used to validate the simulation results. As shown in
244 M. K. Singh and A. Goel
Fig. 3. SER Performance of OCDM and OFDM Signals over AWGN Channel
Fig. 3, SER performance of OCDM with PTS, M-PTS and CCM-PTS is same as that of
OFDM with PTS, M-PTS and CCM-PTS respectively over AWGN channel. CCM-PTS
and M-PTS require almost 3.5 dB and 4 dB more bit energy (Eb ) compared to PTS at
SER = 10–5 .
Fig. 4. SER Performance of OCDM and OFDM Signals over Rayleigh Fading Channel
Figure 4 shows the SER performance of OCDM and OFDM with PTS, M-PTS and
CCM-PTS over a 3-tap multipath Rayleigh fading channel having path delays [0 µs,
0.5 µs, 1 µs] and average path gains [0dB, -5dB, -10dB]. An OCDM/OFDM system
with N = 256 chirps/subcarriers, cyclic prefix length L CP = 4 and 10000 OCDM/OFDM
symbols are considered. FDE is used for equalization. As shown in Fig. 4, SER perfor-
mance of OCDM slightly degrades in low SNR region whereas OCDM shows much
Orthogonal Chirp Division Multiplexing 245
better performance than OFDM in high SNR region for all the three schemes. OCDM
with PTS, M-PTS and CCM-PTS outperforms for SNR > 28 dB, 32 dB and 31 dB
respectively. M-PTS and CCM-PTS require almost 4 dB and 3.5 dB more bit energy
(Eb ) compared to PTS at SER = 10–5 .
6 Conclusion
OCDM is a MCM technique in which N orthogonal chirps having same bandwidth are
multiplexed. OCDM provides maximum spectral efficiency for chirp spread spectrum
system but suffers from high PAPR. Various PAPR reduction, equalization and channel
estimation schemes presented in the literature for OFDM are applicable to the OCDM
also. With minor additional operations, OCDM system can be obtained from OFDM.
Computational complexity of OCDM is higher than the OFDM. OCDM outperforms
OFDM for wireless communication, coherent OFC, IM/DD-based short reach system,
UWA communication, baseband data communication and MIMO communication. Thus,
for high-speed communication OCDM is an attractive solution.
PAPR performance of OCDM is same as that of OFDM. Reduction in PAPR offered
by PTS, M-PTS and CCM-PTS is almost same for OCDM and OFDM both. Over AWGN
channel, SER performance of OCDM with PTS, M-PTS and CCM-PTS is identical to
the performance of OFDM with PTS, M-PTS and CCM-PTS respectively but CCM-PTS
and M-PTS require more bit energy (Eb ) compared to PTS to achieve the same SER.
Performance of OCDM slightly degrades in low SNR region over multipath Rayleigh
fading channel but it shows much better performance as compared to OFDM in high
SNR region. M-PTS and CCM-PTS discard the requirement of sending any SI to the
receiver at the cost of increased SER compared to PTS.
References
1. Ouyang, X., Zhao, J.: Orthogonal chirp division multiplexing. IEEE Trans. Commun. 64(9),
3946–3957 (2016)
2. Wu, Y., Zou, W.Y.: Orthogonal frequency division multiplexing: a multi-carrier modulation
scheme. IEEE Trans. Consum. Elec. 41(3), 392–399 (1995)
3. Ouyang, X., Zhao, J.: Orthogonal chirp division multiplexing for coherent optical fiber
communications. J. Lightwave Technol. 34(18), 4376–4386 (2016)
4. Muller, S.H., Huber, J.B.: OFDM with reduced peak-to-average power ratio by optimum
combination of partial transmit sequences. Electron. Lett. 33(5), 368–369 (1997)
5. Zhou, Y., Jiang, T.: A novel multi-point square mapping combined with PTS to reduce PAPR
of OFDM signals without side information. IEEE Trans. Broadcast. 55(4), 831–835 (2009)
6. Goel, A., Gupta, P., Agrawal, M. : Concentric circle mapping based PTS for PAPR reduction
in OFDM without side information. In: Proceedings of 2010 Sixth International Conference
on Wireless Communication and Sensor Networks, Allahabad, India, pp. 1–4, December 2010
7. Goel, A., Gupta, P., Agrawal, M.: SER analysis of PTS based techniques for PAPR reduction
in OFDM systems. Digit. Signal Proc. 23(1), 302–313, January 2013
8. Ouyang, X., Tall, G., Power, M., Townsend, P.: Experimental demonstration of 112 Gbit/s
orthogonal chirp-division multiplexing based on digital up-conversion for IM/DD sys-
tems with improved resilience to system impairments. In: Proceedings of 2018 European
Conference on Optical Communication, Rome, Italy, pp. 1–3, September 2018
246 M. K. Singh and A. Goel
9. Ouyang, X., Talli, G., Power, M., Townsend, P.: Orthogonal chirp division multiplexing for
IM/DD-based short-reach systems. Opt. Expr. 27(16), 23620–23632 (2019)
10. Bouvet, P.J., Auffret, Y., Aubry, C.: On the analysis of orthogonal chirp division multiplexing
for shallow water underwater acoustic communication. In: Proceedings of OCEANS 2017,
Aberdeen, UK, pp. 1–5, June 2017
11. Bai, Y., Bouvet, P.J.: Orthogonal chirp division multiplexing for underwater acoustic
communication. Sensors 18(11), 3815 (2018)
12. Zhu, P., Xu, X., Tu, X., Chen, Y., Tao, Y.: Anti-multipath orthogonal chirp division
multiplexing for underwater acoustic communication. IEEE Access 8, 13305–13314 (2020)
13. de M.B.A. Dib, L., Colen, G.R., de L. Filomeno, M., Ribeiro, M.V.: Orthogonal chirp division
multiplexing for baseband data communication systems. IEEE Syst. J. 14(2), 2164–2174, June
2020
14. Bomfin, R., Chafii, M., Fettweis, G.: Performance assessment of orthogonal chirp division
multiplexing in MIMO space time coding. In: Proceedings of 2019 IEEE 2nd 5G World
Forum, Dresden, Germany, pp. 220–225, October 2019
Machine Learning and Data Analytics
COVID-19 Outbreak Estimation Approach
Using Hybrid Time Series Modelling
1 Introduction
It is believed that every infectious disease shows some design or pattern which must be
identified to forecast the outbreak of such diseases. We can define a different category
for the spread of disease such as concerning time i.e., seasonal change [1]. Generally, it
is found that their forwarding from person to person can be represented with the help
of the non-linear system. We have found that in the previous studies using the data-
driven method either linear or non-linear components are captured. Since they depend
on both linear and non-linear, hence, they are not able to get hold of the situation of the
transmittance of these infective health risks completely. Here we aim to build a intelligent
statistical model that can capture both the linear and non-linear components in the trend.
Purely Statistical techniques like moving average methods primarily depend on use cases
and these techniques are tedious to forecast the actual rate of transmissions. There is a
large array of a statistical and mathematical model which have been proposed for the
broadcast of the covid-19 [2, 3]. In a general situation, the accuracy and prediction of
such a model are low because the model is unable to fit samples in an accurate manner
[4]. So, a deep learning approach is presented to address transmission in real-time,
which beats the barrier of the statistical approach [5]. Since much research has been
done on the same domain so after some intensive research using different methods like
ARIMA, SARIMAX we found that the demographic-based trend curve has some non-
linear characteristics which can’t be determined by the existing 3 models. Our research
work is based on the hypothesis that LSTM model and ARIMA can together capture the
non-linearity under the forecasting data. The main objective of the work is to build a
logical forecast for developing an intuition over the trend of coronavirus outbreaks [6].
We have also compared our algorithm with similar methods like seasonal ARIMA,
which can be claimed to learn the non-linear representation of the time-series data. But
again due to the unpredictable non-seasonality occuring in the curve it fails to represent
or learn the actual underlying distribution, rather it tries to map it to the nearest possible
seasonal cycles. Thus, we conclude to move forward with a combination of LSTM ()for
capturing non-linearity and non-seasonality) and ARIMA (for capturing the linear trend
components).
The rest of the work has arranged as follows. In Sect. 2 we have given a detailed
overview of the dataset. In Sect. 3 we have discussed the basics of time-Series Modelling.
In Sect. 4 the LSTM model for time series models their detailing, definitions, and related
terms have been discussed. In Sect. 5, the ARIMA model detailing, definitions, and
related terms have discussed. In Sect. 6 We have proposed a model for forecasting
the coronavirus trend using the LSTM model and the ARIMA model and formed a
hybrid model from both the model. In Section VII We have discussed the detailed
implementation and the results of our research work.
2 Background
• Time series data - Observation results of variables taking values at varying times [7].
• Cross-sectional data - When info of single or multiple parameters gathered at the
similar instance.
• Pooled data - A mixture of time stamped and hybrid information.
Most samples in the real world are temporary in nature. The data collected at regular
intervals are time series (TS) records where every record is evenly distributed. TS analysis
is to predict future patterns for predefined past data set with basic characteristics [8–
10]. TS samples may be cracked down to seasonal error. If it does not depend on time
components such as trend and seasonal influence, called a stationary series. If TS data
has a trend of seasonal influence and changes over time the TS data is considered non-
stationary.
COVID-19 Outbreak Estimation Approach 251
3 Proposed Model
• Time series data - Observation results of variables taking values at varying times [13].
• Cross-sectional data - When info of single or multiple parameters gathered at the
similar instance.
• Pooled data - A mixture of time.
Because of the automatically extracting significant feature nature of the Deep learn-
ing method like recurrent neural network (RNN) it is observed to be a powerful technique
for the forecast [14]. In this the previous step’s activation is taken and is given is input
to the current time step and network self-connection. To eliminate the shortcoming long
short-term memory RNN structure was designed that regulates the data pass and mem-
ory cell in the current hidden layer [15–17]. The framework of the LSTM constitutes
4 gates i.e., input gate, forget gate, control gate, and output gate. The main job of the
252 S. Chakraborty et al.
input gate is to make a decision depending on which details can be transported to the
cell. The forget gate decides which details from the input of the previous memory are to
neglected. The work of the control gate is to control the updating of the cell. The output
layer is accountable for updating the hidden layer(ht-1) and also updating the output.
The LSM model is shown in Fig. 1.
In the proposed model we consider the dataset from Kaggle which contains a list of
daily Corona affected people, the daily number of deaths, in different provinces. These
data points are considered as observational points in multidimensional vector space.
These observational points are then fed into the ARIMA model and LSTM model sepa-
rately. The ARIMA model is fitted to the data to learn the moving average and the trends
in the data. Then the multidimensional vectors are fed into the LSTM algorithm, which
generates an embedding. The ARIMA output and its corresponding residual embedding
vector are concatenated in the final stage and down-projected by passing through a linear
function to generate the next data points sequentially. The proposed model flow diagram
has been shown in the following Fig. 2.
COVID-19 Outbreak Estimation Approach 253
In this section we will give a detailed exploratory data analysis overview of the complete
dataset. A sample of the used COVID-19 dataset has given in Table 1. We have provided
3 samples from the available data sets. The methods utilized here are predicated on data-
supervised methods which vary from precedent research work [18–21]. This forecasting
model can be used to pre-assume the outbreak trend of COVID-19 outbreak which can
S no. Period Time State Confirm Confirm Cure Life lost Confirm
cases abroad cases
1 Jan 30, Evening Kerala 1 0 0 0 1
2020
2 Jan 31, Evening Kerala 1 0 0 0 1
2020
3 Fev 1st , Evening Kerala 2 0 0 0 2
2020
254 S. Chakraborty et al.
help in controlling the outbreak. In the research, it is determined that norms and rules
formed by the regime is most likely to impact present outbreak.
From the Fig. 3, age-wise distribution of the India population, we infer that out of
100% the most affected group is between the age of 20 to 29 with having approximately
25% of the total cases while the least cases have been found in the group of old people
having age above 80. The people between the ages group 30 to 39 occupy the second
position to easily get infected with 21% of the total cases. Next, comes the age group of
the 40 to 49 people having 16% of the total cases.
From the Fig. 4(a), we found that the total number of confirmed cases along with
the recovery is increasing exponentially, while the death rate is increasing slowly with
respect to time. From the graph it can be refer that the total number of cases by the end
of August has reached 3500000 which is very threatening. But one good thing can we
gather from the graph that the recovery rate is also increasing so we can hope for the
best. In Fig. 4(b). we compared the situation of few countries facing global pandemics
like China, the US, Italy, Spain, France, And India [22–24]. From the graph, we found
that the total number of cases in India and the US are increasing rapidly with time,
while countries like China, Italy and France, and Spain have somewhat controlled their
condition so the total number of cases is increasing but a bit slow.
COVID-19 Outbreak Estimation Approach 255
Fig. 4. a. Distribution of COVID patients according to age in India b. Graph for comparison with
other countries.
LSTM forms a recurrent network for storing previous outcomes into its storage units
and in training phase, it discovers to utilize its memory [25, 26]. From the Fig. 6(a) we
can observed that the proposed model performed well. It is able to accurately follow the
inclination. Also, our model predicted the upcoming next month’s trend. Hence, by the
end of September 2020, the cases in India could touch up to 5000000. Figure 5 shows
the growth rate of 15 states of India.
256 S. Chakraborty et al.
From the Fig. 6(b), it is clear that by using ARIMA model it performs well. It is
able to accurately follow the inclination. Also, our model predicted the upcoming next
month’s trend. Hence by the end of September 2020, the cases in India could touch up
to 57,00,000.
Figure 7 is the hybrid model by using ARIMA and LSTM network. By using the com-
bination of both models i.e. ARIMA and LSTM we produced a forecast of the total
cases for next 15 days. According to the model, the number of total cases will increase
exponentially, until or unless some strict step will not be taken. Of course, it is not the
exact prediction but based upon the trend.
COVID-19 Outbreak Estimation Approach 257
5 Conclusion
In this research paper we have predicted the trend of coronavirus for next 15 days by
using the LSTM model and ARIMA model and their combined model to form a hybrid
model which worked better than the two. From the result of the hybrid model, it can be
seen that by the end of the month September the number of the cases in India will cross
5000000, which is a close approximation of the original estimate value.
References
1. World Health Organization. Naming the Coronavirus Disease (COVID-19) and the Virus
that Causes it. World Health Organization (2020). https://www.who.int/emergencies/dis
eases/novelcoronavirus-2019/technical-guidance/naming-the-coronavirus-disease-(covid-
209)-and-the-virus-thatcauses-it
2. Coronaviridae Study Group: The species Severe acute respiratory syndrome-related coro-
navirus: classifying 2019-nCoV and naming it SARS-CoV-2. Nat. Microbiol. 5, 536
(2020)
3. Lu, H., Stratton, C.W., Tang, Y.W.: Outbreak of pneumonia of unknown etiology in Wuhan
China: the mystery and the miracle. J. Med Virol. 92, 401–402 (2020)
4. Klompas, M.: Coronavirus disease 2019 (COVID-19): protecting hospitals from the invisible.
Ann. Intern. Med. 172, 619–620 (2020)
5. Roser, M., Ritchie, H., Ortiz-Ospina, E.: Coronavirus Disease (COVID-9)–Statistics and
Research. Our World Data (2020)
6. Rath, M., Mishra, S.: Security approaches in machine learning for satellite communication.
In: Hassanien, A.E., Darwish, A., El-Askary, H. (eds.) Machine Learning and Data Mining in
Aerospace Technology. SCI, vol. 836, pp. 189–204. Springer, Cham (2020). https://doi.org/
10.1007/978-3-030-20212-5_10
7. Dutta, A., Misra, C., Barik, R.K., Mishra, S.: Enhancing mist assisted cloud computing toward
secure and scalable architecture for smart healthcare. In: Advances in Communication and
Computational Technology, pp. 1515–1526s. Springer, Singapore (2021)
COVID-19 Outbreak Estimation Approach 259
8. Mishra, S., Tripathy, H.K., Panda, A.R.: An improved and adaptive attribute selection
technique to optimize dengue fever prediction. Int. J. Eng. Technol. 7, 480–486 (2018)
9. Roy, S.N., Mishra, S., Yusof, S.M.: Emergence of drug discovery in machine learning.
In: Technical Advancements of Machine Learning in Healthcare, pp. 119–138). Springer,
Singapore (2021)
10. Salinas, D., Flunkert, V., Gasthaus, J., Januschowski, T.: DeepAR: Probabilistic forecasting
with autoregressive recurrent networks. Int. J. Forecast. (2019). https://doi.org/10.1016/j.ijf
orecast.2019.07.001
11. Oreshkin, B.N., Carpov, D., Chapados, N., Bengio, Y.: N-BEATS: neural basis expansion
analysis for interpretable time series forecasting. arXiv 2019, arXiv:1905.10437
12. Adhikari, R., Agrawal, R.K.: An introductory study on time series modeling and forecasting.
arXiv 2013, arXiv:1302.6613
13. Tripathy, H.K., Mishra, S., Thakkar, H.K., Rai, D.: CARE: a collision-aware mobile robot
navigation in grid environment using improved breadth first search. Comput. Electr. Eng. 94,
107327 (2021)
14. Sahoo, S., Mishra, S., Mishra, B.K.K., Mishra, M.: Analysis and implementation of artificial
bee colony optimization in constrained optimization problems. In: Handbook of Research on
Modeling, Analysis, and Application of Nature-Inspired Metaheuristic Algorithms, pp. 413–
432. IGI Global (2018)
15. Anastassopoulou, C., Russo, L., Tsakris, A., Siettos, C.: Data-based analysis, modelling and
forecasting of the COVID-19 outbreak. PLoS ONE 15, e0230405 (2020)
16. Kane, M.J., Price, N., Scotch, M., Rabinowitz, P.: Comparison of ARIMA and Random Forest
time series models for prediction of avian inflfluenza H5N1 outbreaks
17. Gelper, S., Fried, R., Croux, C.: Robust forecasting with exponential and Holt-Winters
smoothing. J. Forecast. 29, 285–300 (2010)
18. Mishra, S., Mallick, P.K., Tripathy, H.K., Jena, L., Chae, G.-S.: Stacked KNN with hard
voting predictive approach to assist hiring process in IT organizations. Int. J. Electr. Eng.
Educ., February 2021. https://doi.org/10.1177/0020720921989015
19. Harvey, A.C., Peters, S.: Estimation procedures for structural time series models. J. Forecast.
9, 89–108 (1990)
20. Mishra, S., Tadesse, Y., Dash, A., Jena, L., Ranjan, P.: Thyroid disorder analysis using random
forest classifier. In: Mishra, D., Buyya, R., Mohapatra, P., Patnaik, S. (eds.) Intelligent and
Cloud Computing. SIST, vol. 153, pp. 385–390. Springer, Singapore (2021). https://doi.org/
10.1007/978-981-15-6202-0_39
21. Chaudhury, P., Mishra, S., Tripathy, H.K., Kishore, B.: Enhancing the capabilities of stu-
dent result prediction system. In: Proceedings of the Second International Conference on
Information and Communication Technology for Competitive Strategies pp. 1–6, March 2016
22. Jena, L., Mishra, S., Nayak, S., Ranjan, P., Mishra, M.K.: Variable optimization in cervical
cancer data using particle swarm optimization. In: Mallick, P.K., Bhoi, A.K., Chae, G.-S.,
Kalita, K. (eds.) Advances in Electronics, Communication and Computing. LNEE, vol. 709,
pp. 147–153. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-8752-8_15
23. Mishra, S., Dash, A., Jena, L.: Use of deep learning for disease detection and diagnosis. In:
Bio-inspired Neurocomputing, pp. 181–201. Springer, Singapore (2021)
24. Madhu, G., et al.: Imperative dynamic routing between capsules network for malaria
classification. CMC-Comput. Mater. Continua 68(1), 903–919 (2021)
260 S. Chakraborty et al.
25. Chakraborty, S., Sahoo, K.S., Mishra, S., Islam, S.M.: AI Driven cough voice-based COVID
detection framework using spectrographic imaging: an improved technology. In: 2022 IEEE
7th International conference for Convergence in Technology (I2CT), pp. 1–7. IEEE, April
2022
26. Mishra, S., Thakkar, H.K., Singh, P., Sharma, G.: A decisive metaheuristic attribute selec-
tor enabled combined unsupervised-supervised model for chronic disease risk assessment.
Comput. Intell. Neurosci. (2022)
Analysis of Depression, Anxiety, and Stress
Chaos Among Children and Adolescents Using
Machine Learning Algorithms
Abstract. In recent times, the pandemic seems to have a serious impact on the
mental health of people around the world across all age groups. This has been man-
ifested in the form of unstable mental conditions, depression, anxiety, stress, and
many other similar mental illnesses among individuals. In this study, we explore
the use of machine learning classification algorithms to detect and classify children
and adolescents with unstable mental conditions such as depression, stress, and
anxiety through the Covid-19 period based on demographic information and char-
acteristics using the DASS-21 Scale. Using a dataset of 2050 Chinese participants,
an attempt has been made to classify their depression, stress, and anxiety behavior
into different levels (Normal, Moderate, and Severe). The classification algorithms
considered are Support Vector Machines, KNN, Naive Bayes, and Decision Trees.
It is observed that the Support Vector Machine is the most effective method for
the classification of mental depression, anxiety, and stress conditions. The goal of
the study is to build a classification model for accurate categorization of unknown
samples into appropriate psychological chaos levels.
1 Introduction
The COVID-19 pandemic and frequent lockdowns led to fear and anxiety around the
world. This phenomenon has given rise to short-term and long-term psychological and
mental health implications like depression, anxiety, and stress both in children and
adolescents. The nature and scale of impact on individuals depending on factors such as
age, educational position, pre-existing mental health conditions, etc. This necessitates a
scientific study to analyze the impact and develop a strategy to deal with the psychosocial
and intellectual health issues of susceptible children and adolescents during the pandemic
and post-pandemic period.
The COVID-19 outbreak provided a scenario to study the correlation between stress-
ful life, their resulting psychological responses, and addictive behaviors. Through our
study, we demonstrate that an increased level of depression, anxiety, and stress caused
due to COVID-19 which can be established using the Depression, Anxiety, and Stress
Scale popularly called the DASS-21 Scale.
1.1 Background
Depression (D)
Depression is a mood-based temperament illness that causes a sense of sadness and loss
of attention. In medical terms, depression can be specified as a major depressive disorder
that can affect how an individual feels, anticipates, and acts which can lead to a variety
of emotional and bodily hitches. Depression is not a common illness, and it should not
be taken casually.
Anxiety (A)
Anxiety is a feeling of strong, undue, tenacious apprehension and fear about unremark-
able situations. In a worrying situation, anxiety is usually obvious. When feelings become
extreme, all-consuming, and hinder daily living then a check on anxiety issues is a must
which indicates an underlying disease.
Stress (S)
Stress is a sensation of emotive or bodily strain. It’s a reaction of our body to a challenge or
claim. In a medical sense, post-traumatic stress chaos is a psychological health disorder
that is caused by a petrifying incident either undergoing it or perceiving it.
Depression, anxiety, and stress may require long-term treatment but most people
with these mental disorders feel better with medication, psychotherapy, or both. Early
detection is usually required for a proper diagnostic evaluation so that treatment can be
provided before severe mental distortions occur.
DASS-21 Details
DASS-21 has been an established psychometric screening tool with acceptable valid-
ity and reliability. DASS-21 is a set of three self-report scales designed to measure the
emotional states of depression, anxiety, and stress. Each of the three DASS-21 scales
contains seven items, divided into subscales with similar content. The depression scale
assesses dysphoria, hopelessness, devaluation of life, self-deprecation, lack of inter-
est/involvement, anhedonia, and inertia. The anxiety scale assesses autonomic arousal,
skeletal muscle effects, situational anxiety, and subjective experience of anxious affect.
The stress scale is sensitive to levels of chronic non-specific arousal. It assesses diffi-
culty in relaxing, nervous arousal, and being easily upset/agitated, irritable/over-reactive,
and impatient. Scores for depression, anxiety, and stress are calculated by summing the
scores for the relevant items [1].
The questions used for the DASS-21 test are described in Table 1 [1]. Table 2 presents
the cut-off scores for all three conventional severity labels as normal, moderate, and
severe which are considered to evaluate a person with these mental disorders[1].
Analysis of Depression, Anxiety, and Stress Chaos Using ML Algorithms 263
Table 1. DASS-21 questıon set with question type specification (D-Depression, A-Anxiety, and
S-Stress Chaos). [Adopted from Reference-1]
Table 2. DASS-21 cut-off scores for severıty labels [Adopted from Reference-1]
• How machine learning algorithms can be adopted for the classification of mental
chaos or illness based on psychological features?
• How DASS-21 features can be used to ensure the categorization of Chinese chil-
dren and adolescents with unstable mental conditions as per the Machine Learning
algorithm?
• Which Machine Learning algorithm can be employed that guarantees optimal
classification results?
• How to develop a classification framework for the accurate categorization of unknown
samples into appropriate psychological chaos levels?
2 Literature Review
S. Aleem, N. U. Huda, et al. discussed the idea of using machine learning methodologies
in the mental health domain to predict the probabilities of mental disorders and tried to
adopt potential treatment outcomes from the prediction. They proposed a general model
for depression detection using machine learning procedures [2].
S. A. H. M. Alim, M. G. Rabbani, et al. discussed a cross-sectional and descriptive
study to access depression, anxiety, and stress among medical students. As per their
studies, almost eighty-one percent of students either had depression, anxiety, or stress
alone or in combination. The combination of depression, anxiety, and stress was highest
among students [3].
L. Evans, K. Haeberlein, and A. Chang suggests that DASS-A and DASS-D provide
a good convergence validity and may be suitable for identifying adolescents with a
significant amount of anxiousness and depression [4].
V. Farnia, D. Afshari, et al. presented a study on the effect of substance abuse on
anxiety, depression, and stress in epileptic patients. They also showed that psychological
symptoms have an important role in the development of addiction among epileptic
patients [5].
S. H. Hamaideh, H. Al-Modallal, M.A. Tanash, and A. Hamdan Mansour prescribe
the prevalence and predictors of depression, anxiety, and stress among university students
during home quarantine due to COVID-19. They found a strong correlation between
depression, anxiety, and stress with demographic, health-related lifestyle variables [6].
E. Kakemam, E. Navvabi, and A.H. Albelbeisi proposed a study for examining the
psychometric properties of the Persian version of DASS-21 for nurses. They properly
evaluated and confirmed that DASS-21 is considered to be a valid and reliable tool for
evaluating depression, anxiety, and stress among Iranian nurses [7].
R. B. Khalil, R. Dagher, and M. Zarzour demonstrate the psychological impact of
the lockdown in Lebanon. Lockdown and other stressful life events are major factors in
developing depression, anxiety, and stress in individuals. The DASS-21 score was found
Analysis of Depression, Anxiety, and Stress Chaos Using ML Algorithms 265
to be correlated with the impact of lockdown to develop such drastic mental disorders
[8].
I. Marijanović, M. Kraljević, T. Buhovac, et al. showed that the COVID-19 pandemic
affected depression, anxiety, and stress levels in oncological staff in BiH. They monitored
and provided support to staff members for their wellbeing and retention at a time of global
crisis in the healthcare sector [9].
Oli Ahmed, Rajib Ahmed Faisal, Sheikh M. A. H. Mostafa Alim, Tanima Sharker,
and Fatema Akhter Hiramoni demonstrate their research work to access mental health
status in various situations among Bangladeshi adults. They used the Bangla version of
the DASS-21 to access psychometric properties by utilizing both classical test theory
and item response theory. Their main idea is to propose a psychometrically sound tool
to access depression, anxiety, and stress in the non-clinical sample of Bangladesh [10].
P. Sharif-Esfahani, R. Hoteit, C. El Morr, and H. Tamim, provide the relationship
between fear of COVID-19 and depression, anxiety stress, and PTSD among Syrian
refugee parents in Canada. They found severe levels of depression, anxiety, and stress
in the participants [11].
R. S. Vaughan, E. J. Edwards, and T. E. MacIntyre provide initial support for use of
the DASS-21 as an operationalization of mental health symptomology in athletes. They
examine the internal consistency, factor structure, invariance, and convergent validity of
the DASS-21 scale in two athlete samples [12].
3 Methodology
3.1 Data Set Description
A self-reported, cross-sectional survey was conducted among Chinese children and ado-
lescents aged between 6 to 18 years. Participants responded to questionnaires contain-
ing DASS-21 information and internet usage characteristics like internet use frequency
before COVID and after COVID, degree of internet usage, etc. A total of 2050 par-
ticipants participated in the survey. The demographic measures include gender, age,
DOB, frequency of internet use, depression, anxiety, stress, and many other features.
The DASS-21 was used to screen mental issues from three different mental perspectives.
Accordingly, the DASS-21 scale defines the categorization principle of categorizing per-
sons into normal, moderate, and severely affected individuals with depression, anxiety,
or stress (Figs. 1, 2, 3).
3.2 Implementation
a scale with 21 basic questions with three subgroupings. Each response is recorded on
a 0–3 point scale. According to DASS-21, participants were classified into Normal (1),
Moderate(2), and Severe (3) predictable label groups.
Fig. 4. Schematic diagram for depression, anxiety, and stress behavior classification.
Step-3: Based on the available raw data, a comprehensive analysis has been done
to evaluate each feature with its respective values and an attempt has been made to
determine parameters that are used as classification criteria. The features that appeared
prominent, promising, and selected for learning were the 21 items of the DASS-21 scale.
Based on these features, classification labels were defined to categorize individuals into
different class labels.
Step-4: After feature selection, the data set is divided into the training set and testing
set in the ratio of 70:30.
Step-5: Various machine learning classification algorithms, viz., SVM, NB, KNN,
and DT are employed for training and testing.
268 S. Swain and M. R. Patra
Step-6: The accuracy, precision, recall, and F1-score are computed as performance
measures for the chosen classification algorithms.
Step-7: A comparative study of the classifiers is done to judge their relative
performance on the dataset.
Step-8: Subsequently, the K-Fold cross-validation procedure is also employed to
assess the performance of the machine learning algorithms on the dataset with K = 10.
Step-9: The classification model is then applied to unlabelled data samples to
categorize the samples into normal, moderate, or severely affected user categories.
Further, the support factor defines the number of samples with the true responses in
each class of target values.
SVM KNN NB DT
For anxiety also, the SVM algorithm demonstrates the highest accuracy of 1.0 as com-
pared to other classification algorithms. KNN and NB yield an accuracy of 0.94 and
0.912 respectively. The lowest performance was observed in the case of DT with a min-
imal accuracy score of 0.893. The classification result for anxiety behavior is depicted
in Table 4. Figure 6 also indicates the efficacy of SVM over other classifiers with an
accuracy score of 1.0 for anxiety chaos.
0.8
0.6
0.4
0.2
0
Accuracy Precision Recall F1 Score
SVM KNN NB DT
SVM KNN NB DT
Table 6. 10-Fold cross-validation results for depression, anxiety, and stress behaviour.
5 Future Work
In future, we will investigate the impact of deep learning techniques like CNN and
RNN on depression, anxiety, and stress issues which are expected to provide better
classification results and for DASS-21 scaled features. Also, suitable ensemble models
will be looked at, to build effective and robust classification models.
6 Conclusions
The COVID-19 epidemic situation had a visible impact on the behavior of children and
adolescents because of the digital shift from offline to online modes of working. Our study
investigated Chinese children and adolescents for depression, anxiety, and stress issues
during the lockdown period. We have classified the individuals into normal, moderate,
and severely affected categories based on the DASS-21 scale which comprises of 21
questions related to the behavioral aspects of children and adolescents. The classification
272 S. Swain and M. R. Patra
algorithms considered were SVM, KNN, NB, and DT which provide interesting results
with classification accuracies of 0.997, 1.0, and 0.997 in the case of SVM for depression,
anxiety, and stress chaos respectively. Thus, one can use these classification models to
classify new behavioral data samples accurately for predicting depression, anxiety, or
stress disorders.
References
1. Lovibond, S.H., Lovibond, P.F.: Manual for the Depression Anxiety & Stress Scales. (2nd
Ed.) Psychology Foundation, Sydney (1995)
2. Aleem, S., Huda, N.U., Amin, R., Khalid, S., Alshamrani, S.S., Alshehri, A.: Machine learning
algorithms for depression: diagnosis, ınsights, and research directions. Electronics 11(7), 1111
(2022). https://doi.org/10.3390/electronics11071111
3. Alim, S.A.H.M., et al.: Assessment of depression, anxiety, and stress among first-year MBBS
students of a public medical college, Bangladesh. Bangladesh J. Psychiatry 29(1), 23–29
(2017). https://doi.org/10.3329/bjpsy.v29i1.32748
4. Evans, L., Haeberlein, K., Chang, A., Handal, P.: Convergent validity and preliminary cut-off
scores for the anxiety and depression subscales of the DASS-21 in US adolescents. Child
Psychiatry Hum. Dev. 52(4), 579–585 (2020). https://doi.org/10.1007/s10578-020-01050-0
5. Farnia, V., et al.: The effect of substance abuse on depression, anxiety, and stress (DASS-21)
in epileptic patients. Clinical Epidemiology and Global Health 9, 128–131 (2021)
6. Hamaideh, S.H., Al-Modallal, H., Tanash, M. A., Hamdan-Mansour, A.: Depression, anxiety,
and stress among undergraduate students during COVID-19 outbreak and “home quarantine”.
Nursing Open 9(2), 1423-1431 (2022)
7. Kakemam, E., Navvabi, E., Albelbeisi, A.H.: Psychometric properties of the persian version
of depression anxiety stress scale-21 Items (DASS-21) in a sample of health professionals: a
cross-sectional study. BMC Health Serv Res 22, 111 (2022). https://doi.org/10.1186/s12913-
022-07514-4
8. Khalil, R.B., et al.: The impact of lockdown and other stressors during the COVID-19 pan-
demic on depression and anxiety in a Lebanese opportunistic sample: an online cross-sectional
survey. Current Psychology, 1-11 (2022)
9. Marijanović, I., et al.: Use of the depression, anxiety, and stress scale (DASS-21) questionnaire
to assess levels of depression, anxiety, and stress in healthcare and administrative staff in
5 oncology institutions in Bosnia and Herzegovina during the 2020 COVID-19 pandemic.
Medical Science Monitor: Int. Medical J. Experimental Clinical Res. 27, e930812–e930821
(2021)
10. Ahmed, O., Faisal, R.A., Alim, S.M.A.H.M., Sharker, T., Hiramoni, F.A.: The psychome-
tric properties of the depression anxiety stress scale-21 (DASS-21) Bangla version. Acta
Psychologica 223, 103509 (2022). ISSN 0001-6918, https://doi.org/10.1016/j.actpsy.2022.
103509
11. Sharif-Esfahani, P., Hoteit, R., El Morr, C., & Tamim, H. (2022). Fear of COVID-19 and
Depression, Anxiety, Stress, and PTSD among Syrian Refugee Parents in Canada. Journal of
Migration and Health, 100081
12. Vaughan, R.S., Edwards, E.J., MacIntyre, T.E.: Mental health measurement in a post Covid-19
World: psychometric properties and invariance of the DASS-21 in athletes and non-athletes.
Front. Psychol. 11, 590559 (2020). https://doi.org/10.3389/fpsyg.2020.590559
Sentiment Analysis from Student Feedbacks
Using Supervised Machine Learning Approaches
Abstract. Human life experiences a radical change due to the availability of all
kinds of information on the World Wide Web. This phenomenon makes the life
of each individual easier and better than before. This flooding of information also
contains huge amount of people’s opinions about their used products or services.
The massive flow of information in terms of opinions and views need to be analyzed
to know the efficacy of the products and/or services. The subjective expressions,
which are known as opinions describes the peoples’ feelings or sentiments towards
the service or product. The opinion can be either positive or negative, depending
on the evocation that the product or service has created. Similarly, in the realms
of education, initiatives are being taken by Govt. Organizations as well as private
organizations to know the effectiveness of the contemporary teaching-learning
process. The present undertaking of the investigation is to evaluate the academic
transaction by eliciting the students’ subjective expressions and analyzing the same
as their feedback. The scope of this paper is to analyze the student’s feedback,
which covers the teaching quality, style of delivery by the faculty, the compo-
nents of the course, and the overall ambiance in which the academic activities are
conducted. The present study investigates the applicability of different supervised
machine learning approaches for sentiment analysis from students’ subjective
feedback. The chosen supervised machine learning approaches are Naive Bayes
(NB), N-gram, Support Vector Machine (SVM), and Maximum Entropy (ME).
These four approaches are applied only for binary sentiment classifications and
to obtain a comparative analysis that would help to build a superior teaching and
learning process.
1 Introduction
The sharing of textual information on the Internet has ushered in substantial changes
in human life [1]. The change is so pervasive that it is doubtful if any aspect of life is
untouched by the web. The paradigm shift in Information and Communication Technol-
ogy (ICT) has become a regular phenomenon nowadays [5, 7]. The World Wide Web is
flooded with opinions or reviews shared in many forms. The huge collections of reviews
or opinions in textual and other forms make person’s life simple in many ways. One
of the fundamental benefit is to know about the quality of a product or service, which
is already being used by others. The opinion of other users play an important role for
drawing any conclusion about the quality of the product. Opinions about a product or
service is the subjective expression which describes the person’s sentiment towards that
product or service. The subjective expression can be positive or negative, that depends
on the quality of the product or service [17].
In most of the research on natural language processing aim at processing of textual
information, that is retrieval or mining of information [2–4]. Incidentally, the quantum
of research has overlooked the emotional response towards a product or service, which
is more spontaneous than rational thinking. Consequently, scant attention and research
have been directed towards sentiment analysis to improve the teaching-learning process.
Now the need is being felt that ICT recognizes the usefulness of the sentiment analysis,
also known as opinion mining, to make decisions based on the opinions of others [8].
The World Wide Web evolved the way people share their opinions or views. Now, a
person can post his perspective on web sites and express anything in the Internet forums,
groups, and blogs. These opinions or user-generated content can be used in many practi-
cal applications. If a person wants to buy a product, he is going to ask his friends to know
about the product, but due to the user- generated content on the web, he can get access to
those opinions for buying the products. This is quite helpful not only for the individuals
but also for the organizations. To obtain opinions about a product, organizations besides
relying on the surveys, they are extracting the feedbacks from the opinion polls and use
those feedbacks to improve the quality of the product or service [6].
The monitoring of opinions about a product or service on the web is a challenging
task as large amount of textual information available on the web and that are from diverse
sources. It is not effortless for a person to collect the opinions from all the sources and
extract the relevant opinions, summarize them and organize them into usable forms [9].
So there is a need for automated opinion discovery and summarization system [10],
which will help the user to make decisions faster [11]. This would immensely benefit
the user and the organizations from the inevitable chaos of information overload.
Sentiments can be described as opinions, judgments, emotions, or ideas prompted
[13]. The word sentiment and opinion are used interchangeably in technical writings.
But in the context of this paper, sentiments refer to the complexities of very subtle
and refined human feelings like tenderness, admiration and subdued resentment, etc.
Such subjective conditions of fellow beings hold immense value in the academic arena.
The trainer and the trainees, the teacher and the students form a sustained face-to-face
relationship and interaction between them based on the course held in a controlled
environment. Receiving only opinions from the students may not do optimal justice to
the feedback system. That is why the history of feedback is growing by the day and yet
remains chequered.
The unitary body of research on opinion mining or sentiment analysis is to extract
opinions (positive/negative) from the text documents. Against this backdrop, there is
little research on scattered sentiments of students in the teaching- learning process.
Possibly this could be due to the variations in the perceptive- cognitive levels of the
Sentiment Analysis from Student Feedbacks 275
students in a class. The trainer or the instructor faces this problem of addressing the
collective student group with a standardized content delivery without any discrimination.
Today’s education system is a choice-based credit system that hardly leaves any room for
negotiation in the academic calendar. The present study has future promises of benefiting
the educational system in India. At this juncture, it is not elementary to ignore the element
of student’s subjective feedback as the students and teachers are groomed in a varied
cultural and linguistic matrix.
In general, an opinion is a message expressing a belief or skepticism or cynicism
or bias or exaltation about a wide range of products and services- from a sports car to
an android OS. This subjectivity, often deeply rooted and held with confidence but may
not be validated or substantiated by knowledge or proof [11]. In many cases, opinions
are shrouded in emotional articulations and embedded in long forum posts and blogs.
Obviously, it is not very easy for a human reader to retrieve relevant sources, extract the
desired information from the voluminous opinions. Consequently, it becomes a tiring
and hesitant struggle to process them and bring them in to usable form. Thus it is imper-
ative today that automated opinion discovery and summarization systems are urgently
developed [15], which would address the sentiment analysis of students hailing from
diverse cultural complexes and varied native languages in a country like India [12, 14].
The rest of the paper organized as follows. Section 2 discusses basic back- ground
and related works in this area of research. Section 3 discusses four machine learning
approaches used for sentiment analysis. The experimentation and results are discussed
in Sect. 4. Finally, Sect. 5 discusses about the conclusion and future direction of this
research.
2 Background
In the past few years, extensive studies were being carried out about sentiment analysis.
The reported studies classified the approaches in three categories like (a) lexicon-based
approach, (b) machine learning approach, and (c) hybrid approach.
The lexicon-based approach uses lexicon containing sentiment polarity of the words
to determine the sentiment of a given textual document. The sentiment lexicon can be
constructed either automatically or manually with list words and their associated senti-
ment polarity. In this context Hu and Liu [18] utilized WordNet to predict the semantic
orientation of a word. There is several domain-specific and general-purpose lexicons
(MPQA subjectivity lexicon, Word Counts database, Linguistic Inquiry, Harvard Gen-
eral Inquirer, etc.) have been constructed for the extraction of the semantic orientation
of words. However, this type of lexicon misses the domain-specific and contextual ori-
entation of a word. Rajput and Haider [19] used a lexicon-based approach to determine
the semantic polarity of the student’s feedback. They have used an academic domain-
specific lexicon for this purpose and also suggested that the domain-specific lexicon
gives the better result as compared to the general-purpose lexicon. Fernández et al. [21]
used the dependency parsing technique for reporting the semantic orientation of the
unstructured text. The proposed method used sentiment lexicon, which was constructed
using a semi-automatic polarity expansion algorithm.
Sentiment analysis using machine learning approaches relies on building the model
using training data set and evaluation of those models using test data set. The machine
276 P. Routray et al.
vocabulary set V consists of all the words present in the documents under study, i. e. V =
w1 , W 2 ,…., wk . Given with the model parameter P (wk cj ) and class prior probabilities
P (cj ) with the assumption that the words are independent, the most likely class of the
document d i is computed as
|V |
c∗ (di ) = argmax P(cj )P(d |cj ) = argmax P(cj ) P(wk |cj )n(wk ,di ) (1)
j j k=1
where n(wk , d i ) represents the frequency of the word wk in document d i . The terms P
(wk cj ) and P (cj ) are estimated from the documents used in training, whose class labels
are known apriori. The terms are estimated as follows:
1 + di ∈cj n(wk , di )
P(wk |cj ) = |V |
|V | + k=1 di ∈cj n(wk , di )
|cj |
P(cj ) = |C|
l=1 |cl |
n
−
→
−
→
υ = λ∗i xi d i (2)
i=1
where λi ≥ 0 and the values of λ∗i can be obtained by solving a dual optimization problem.
The weight vector of the hyperplane can be constructed with a linear combination of di
using Eq. 2. The document vectors whose corresponding λi ≥ 0 are call support vectors
as those document vectors contribute to the calculation of υ . The performance of the
SVM mostly affected by the kernel it uses. The well-known kernel methods used in
SVM are linear, polynomial, and radial basis functions. In our experimentation, we used
a radial basis kernel (SVM RB) as it is mostly used and flexible also [36].
alphabets Σ can be presented as P (s). The chain rule of the N-gram character language
model can be defined as P(sc) = P(s).P(c|s) for a character c and string s. Based on
N-gram Markovian assumption that considers previous n − 1 characters, the chain rule
can be modified as
Thus the maximum likelihood estimator for N-gram can be defined as,
C(sc)
PML (c|s) = (3)
c C(sc)
where C(sc) represents the frequency of the sequence sc observed in the training data
and c C(sc) represents the number of single character extension of sc. In this work, the
used N-gram character language model is a generalized form of Witten-Bell smoothing
[30]. For the experiment purpose the default value of N = 8 is being used.
where Z(d) is a normalization function. The binary function F i,c is a feature/class func-
tion for the feature f i and class c. The term λi,c represents the feature-weight parameter
for the feature f i and class c. Based on the expected values of the feature/class func-
tions, the parameters are set to maximize the entropy. Due to the missing relationships
between features, ME model performs better for the case where conditional independent
assumptions are not met.
Sentiment Analysis from Student Feedbacks 279
4.2 Preprocessing
As the students’ feedbacks contain unstructured text, so to extract the meaningful infor-
mation from those texts need preprocessing of the data set. The well-known preprocess-
ing steps which are applied to clean the data set may be the removal of spelling errors,
stop word removal, removal of punctuations, etc. In this work, we used the following
preprocessing steps to remove the noise from the data set.
Table 1. (continued)
After preprocessing of the dataset, features are extracted for the analysis of the sen-
timents. During this phase, the preprocessed text of the training and testing dataset is
converted into numerical feature vectors which are used in different machine learning
models. For the N-gram model, the sequence of letters, syllables, or words is extracted
for the experimentation.
Sentiment Analysis from Student Feedbacks 281
Predicted Class
Positive Class Negative Class
Actual Class Positive Class True Positive (TP) False Negative (FN)
Negative Class False Positive (FP) True Negative (TN)
Evaluation metrics
TP+TN
Accuracy = TP+FP+TN TP
+FN Precision = TP+FP
TP F − measure = 2 ∗ Precision∗Recall
Recall = TP+FN Precision+Recall
1. Support Vector Machine with radial basis kernel performed well in terms of accuracy,
precision, and recall.
2. The values of precision and recall are high in SVM RB as compared to the other
three models (Naive Bayes, Maximum Entropy, and N-gram).
3. Consideration of neutral classes for model building decreases the performance of
the classifiers.
4. In terms of accuracy Naive Bayes model performed worst among all the four models
under discussion.
282 P. Routray et al.
1.2
NB N-gram
ME SVM RB
1
Accuracy
0.8
0.6
0.4
0.2
0 100 200 300 400 500 600 700 800 900
Number of training data
Fig. 3. Accuracy of four machine learning models
four approaches. The difference between accuracy among the four approaches was very
significant (p < 0.01) when the number of training instances was less than equal to 100.
We found from the experiment that the increased size of the training data set improved
the accuracy of all the models. The accuracy of all the models reaches more than 80%
when the number of training data set contains more than 700 reviews. The precision of
all the models is presented in Table 9, and Fig. 4. Table 10 and Fig. 5 reports the recall
of all the four models.
284 P. Routray et al.
1.2
NB N-gram
ME SVM RB
1
Precision
0.8
0.6
0.4
0.2
0 100 200 300 400 500 600 700 800 900
Number of training data
Fig. 4. Precision of four machine learning models
Sentiment Analysis from Student Feedbacks 285
Round of exper- iments Training data set size Recall of the models
Naive ME N-gram SVM p-value
Bayes RB
1 50 0.49 0.52 0.64 0.72 0.0000
2 100 0.52 0.55 0.67 0.76 0.0030
3 150 0.53 0.60 0.70 0.79 0.2577
4 200 0.65 0.61 0.73 0.80 0.1582
5 300 0.69 0.66 0.77 0.82 0.3271
6 400 0.72 0.70 0.79 0.86 0.4242
7 500 0.75 0.73 0.81 0.87 0.2371
8 600 0.77 0.77 0.82 0.88 0.3253
9 700 0.80 0.79 0.83 0.91 0.2361
10 808 0.82 0.82 0.83 0.92 0.1307
1.2
NB N-gram
ME SVM RB
1
0.8
Recall
0.6
0.4
0.2
0 100 200 300 400 500 600 700 800 900
Number of training data
Fig. 5. Recall of four machine learning models
entities of the training set progressively increases, the accuracy also increases. For the
fewer entities of the training dataset (50 or 100), the accuracy of the four algorithms is
significant, whereas, for many entities, there is no significant change in the accuracy.
Pre-processing of the data is indispensable for the optimization of results. Such
pre-processing would include named entity recognition, better tokenization, and pars-
ing. Named entity recognition would remove the possibility of names (Alex, Bob etc.)
and place names such as Delhi and Mumbai occurring in the output lexicon, which
would certainly not bear any sentiment. Tokenizing could be improved to remove noisy
expressions, such as numbers, dates, and words with unreadable/special characters and
symbols.
In this work, there is a need to add more data in the corpus of subjective feedback
from the students. The more the training data set, the more accurate is the result, which
improves the performance of the model. It is noteworthy to mention that the sentiment
analysis could also be done by implementing other machine learning algorithms like
Decision Tree, Artificial Neural Network, etc. There may be some more extensions
of this work, like combining the machine learning approach with a dictionary-based
approach. With growing computer literacy and connectivity, the present investigation
would gain momentum in the future.
References
1. Appel, G., Grewal, L., Hadi, R., Stephen, A.T.: The future of social media in marketing. J.
Acad. Mark. Sci. 48(1), 79–95 (2019). https://doi.org/10.1007/s11747-019-00695-1
2. Brody, S., Elhadad, N.: An unsupervised aspect-sentiment model for online reviews. In:
Human Language Technologies: The 2010 Annual Conference of the North American Chapter
of the Association for Computational Linguistics (HLT 2010). Association for Computational
Linguistics, Stroudsburg, PA, USA (2010)
3. Das, S.R., Chen, M.Y.: Yahoo! For Amazon: sentiment extraction from small talk on the web.
Manage. Sci. 53(9), 1375–1388 (2007)
4. Routray, P., Swain, C.K., Mishra, S.P.: A survey on sentiment analysis. Int. J. Comput. Appl.
76(10), 1–8 (2013)
5. Chinmaya Kumar Swain and Deepak B. Phatak “Evaluation model for the teacher’s training
program under National mission on education through ICT ”, International Conference on
e-Education, e-Business, e-Management and E-Learning, 7–9th Jan. 2011,
6. Drus, Z., Khalid, H.: Sentiment analysis in social media and its application: systematic
literature review. Procedia Comput. Sci. 161, 707–714 (2019)
7. Swain, C.K., Patel, A., Routray, P.: Model to evaluate the teaching enhancement of teacher’s
under the effect of teacher’s training program through ICT. In: International Conference on
e-Education, e-Business, e-Management and E- Learning, 7–9th January 2011
8. Boiy, E., Hens, P., Deschacht, K., Moens, M.-F.: Automatic sentiment analysis of on-line text.
In: Proceedings of the 11th International Conference on Electronic Publishing, pp. 349–360,
Vienna (2007)
9. Pang, B., Lee, L.: Opinion mining and sentiment analysis. Found. Trends Inf. Retr. 2(1–2),
1–135 (2008)
10. Pang, B., Lee, L.: A sentimental education: sentiment analysis using subjectivity summariza-
tion based on minimum cuts. In: Proceeding of ACL 2004, pp. 271–278 (2004)
Sentiment Analysis from Student Feedbacks 287
11. Jurafsky, D., Martin, J.H.: Speech and Language Processing: An Introduction to Natural Lan-
guage Processing, Computational Linguistics, and Speech Recognition. Pearson Education
Inc, New Jersey (2009)
12. Santi, P.K., Mohanty, S., DasAdhikary, K.P., Swain, K.C.: Design and implementation of
nouns in OriNet: based on the semantic word concept. Arch. Control Sci. 15(3), 429–436
(2005)
13. Liu, B.: Sentiment Analysis and Opinion Mining, Morgan & Claypool Publishers, May 2012
14. Swain, K.C., Santi, P.K., Mohanty, S.: Morphological analyser based on finite state transducer:
a case study for Oriya language. Archives Control Sci. 15(3), 451–460 (2005)
15. Prabowo, R., Thelwall, M.: Sentiment analysis: a combined ap- proach. J. Informet. 3(2),
143–157 (2009)
16. Liu, B.: Sentiment Analysis: A Multi-Faceted Problem. IEEE Intell. Syst. 34(4) (2010)
17. Panigrahi, C.R., Panda, B., Pati, B.: Exploratory data analysis and sentiment analysis of drug
reviews. Computación y Sistemas, 26(3) (2022)
18. Hu, M., Liu, B.: Mining and summarizing customer reviews. In: Proceedings of the Tenth
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 168–
177. ACM (2004)
19. Rajput, Q., Haider, S., Ghani, S.: Lexicon-based sentiment analysis of teachers evaluation.
Appl. Comput. Intell. Soft Comput. 2016, 1 (2016)
20. Turney, P.D.: Thumbs up or thumbs down?: semantic orientation applied to unsupervised
classification of reviews. In: Proceedings of the 40th Annual Meeting on Association for
Computational Linguistics. Association for Computational Linguistics, pp. 417–424 (2002)
21. Fernández-Gavilanes, M., Álvarez-López, T., Juncal-Martınez, J., Costa- Montenegro, E.,
González-Castaño, F.J.: Unsupervised method for sentiment analysis in online texts. Expert
Syst. Appl. 58, 57–75 (2016)
22. Altrabsheh, N., Cocea, M., Fallahkhair, S.: Learning sentiment from students feedback for
real-time interventions in classrooms. In: Bouchachia, A. (ed.) Adaptive and Intelligent Sys-
tems, vol. 8779, pp. 40–49. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-112
98-5_5
23. Zhang, L., Ghosh, R., Dekhil, M., Hsu, M., Liu, B.: Combining lexicon-based and learning-
based methods for twitter sentiment analysis. Technical Report (2011)
24. Appel, O., Chiclana, F., Carter, J., Fujita, H.: A hybrid approach to the sentiment analysis
problem at the sentence level. Knowl.-Based Syst. 108, 110–124 (2016)
25. Domingos, P., Pazzani, M.J.: On the optimality of the simple bayesian classifier under zero-one
loss. Mach. Learn. 29(2–3), 103–130 (1997)
26. McCallum, A., and Nigam, K.: A comparison of event models for Naive Bayes text classifi-
cation. In: AAAI-98 Workshop on Learning for Text Categorization, pp. 41–48. AAAI Press
(1998)
27. Joachims, T.: Text categorization with Support Vector Machines: learning with many relevant
features. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398, pp. 137–142.
Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0026683
28. RushdiSaleh, M., MartnValdivia, M.T., MontejoRez, A., UreaLpez, L.A.: Experiments with
SVM to classify opinions in different domains. Expert Syst. Appl. 38, 14799–14804 (2011)
29. Ye, Q., Zhang, Z., Law, R.: Sentiment classification of online reviews to travel destinations
by supervised machine learning approaches. Expert Syst. Appl. 36, 6527–6535 (2009)
30. Carpenter, B.: Scaling high-order character language models to gigabytes. In: Proceedings of
the Workshop on Software (Software 2005), Stroudsburg, PA, USA, 86–99. Association for
Computational Linguistics
31. Berger, A.L., Della Pietra, S.A., Della Pietra, V.J.: A maximum entropy approach to natural
language processing. Comput. Linguist. 22(1), 39–71 (1996)
288 P. Routray et al.
32. Nigam, K., Lafferty, J., McCallum, A.: Using maximum entropy for text classification. In:
Proceedings of the IJCAI 1999, pp. 61–67 (1999)
33. Fleiss, J.L.: Measuring nominal scale agreement among many raters. Psychol. Bull. 76(5),
378 (1971)
34. Hayes, A.F., Krippendorff, K.: Answering the call for a standard reliability measure for coding
data. Commun. Methods Meas. 1(1), 77–89 (2007)
35. Lombard, M., Snyder-Duch, J., Bracken, C.C.: Practical resources for assessing and reporting
intercoder reliability in content analysis research projects (2004). http://astro.temple.edu/lom
bard/reliability/
36. Chang, Y.W., Hsieh, C.J., Chang, K.W., Ringgaard, M., Lin, C.J.: Training and testing low-
degree polynomial data mappings via linear svm. J. Mach. Learn. Res. 11, 1471–1490 (2010)
37. Nasim, Z., Rajput, Q., Haider, S.: Sentiment analysis of student feedback using machine
learning and lexicon based approaches. In: 2017 International Conference on Research and
Innovation in Information Systems (ICRIIS), Langkawi, pp. 1–6 (2017)
38. Bouchachia, A. (ed.): ICAIS 2014. LNCS (LNAI), vol. 8779. Springer, Cham (2014). https://
doi.org/10.1007/978-3-319-11298-5
39. Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model
selection. In: Proceedings of the 14th International Joint Conference on Artificial Intelligence
- Volume 2 (IJCAI 1995), vol. 2, pp. 1137–1143. Morgan Kaufmann Publishers Inc., San
Francisco (1995)
Machine Learning Algorithms for Diabetes
Prediction
Abstract. Diabetes has emerged as one of the most deadly and prevalent illnesses
in the modern society, not just in India but also everywhere else. Diabetes now
impacts individuals of every age and is associated with lifestyle, genetics, stress,
and ageing. Different types of machine learning approaches are now applied to
forecast diabetes and also the disorders brought on by this disease. In this study
we have used five machine learning classifiers such that Extra Tree (ET),Decision
Tree (DT),Random Forest (RF), K-Nearest Neighbour (KNN) and Passive Aggres-
sive Classifier (PAC) for diabetes mellitus prediction. The experimental findings
demonstrate that Random Forest and Extra Tree have the lowest error rates with
the highest accuracy (81.16%).
1 Introduction
A subfield of Artificial Intelligence (AI) known as Machine Learning (ML)enables
programmes to forecast outcomes more accurately even when they weren’t explicitly
intended to do so. In order to forecast future output values, algorithms of machine learn-
ing utilize the past data as its input. These algorithms employ mathematical approaches
that are highly helpful in assessing a lot of data and making recommendations for actions
based on these data. Machine learning is now being utilized in many facets of medical
health. Numerous researchers [1, 2] are now using algorithms of ML to predict and
manage a variety of diseases. In order to take the required steps to prevent diabetes,
machine learning algorithms are being applied to investigate their potential for diabetes
prediction. These algorithms may be grouped basically into 3 types: Supervised, Unsu-
pervised and Reinforcement learning [3].Commonly referred to as Diabetes Mellitus
(DM) by medical experts, diabetes disease is a collection of metabolic illnesses where
an individual has excessive blood sugar due to insufficient insulin secretion, improper
insulin cell response, or a combination of both. [4]. Diabetes illness is separated into 2
groups namely type l and type 2. The main distinction between these two is that person
with type 1 diabetes can not make insulin while those with type 2 diabetes produce a
small amount of insulin that is not effective enough. Urinating frequently, experienc-
ing frequent hunger and thirst, feeling exhausted, and having impaired vision are the
main symptoms of people with type 1 or type 2 diabetes [5]. The early this disease is
detected, better chances are there to cure the patient. As forecast by International Dia-
betes Federation in 2017 [6] that there have been 425 million diabetics worldwide, and
that population will rise to 625 million by 2045 [7].
There are three more distinct parts to this work, and they are as follows: Sect. 2 of this
paper, outlines the research and studies that back up the findings on diabetes. Section 3,
outlines the suggested framework and the several different machine learning classifiers
utilized in the forecast of diabetes. The outcomes of the experiments are displayed in
Sect. 4, while a summary and analysis of experiments are presented in Sect. 5.
2 Related Works
This section presents the many methods that has been used to foretell diabetes issues.
In this study [8], a Decision Support System that employed the Decision Stump
base classifier and the Ada Boost algorithm for classification has been proposed. As
foundation classifiers for the SVM, Naive Bayes,Ada Boost and Decision Tree were also
used to verify accuracy. The experimental results showed that when using a Decision
Stump as the base classifier, Ada Boost algorithm achieved an accuracy of 80.72%.
The following work [9] was to build a system which can more precisely judge a
condition of diabetic patient. Naive Bayes, Decision Tree, ANN, and SVM methods
were employed as the foundation for categorization approaches in model construction.
ANN, Decision Tree, Naive Bayes, and SVM approaches offered precisions of 70%,
85%, 77%, and 77.3% respectively.
For the 2-way categorization of diabetes, the authors [10] utilized Convolutional
Neural Network (CNN). With a 75/25 training/testing configuration and normalisation
set at 550 for input data, the authors achieved an accuracy of 77.98% and obtained a
kappa coefficient of 0.549.
Random Forest, Nave Bayes and J48 decision tree were the three ML models that
were used in this study [11]. The experimental findings concluded that Nave Bayes
surpassed both the J48 decision tree and random forest for accuracy in the 3-factor
and 5-factor feature-selected data subsets. With an accuracy of 79.13% compared to
79.57%, the Naive Bayes on the 3-factor data subset outperformed the Random Forest
on the entire dataset.
In order to identify diabetes in its early stages, the author of this study [12] utilized
three algorithms of machine learning:SVM, Decision Tree, and Naive Bayes. Observed
outcomes indicated that Naive Bayes provided the best results with the maximum
accuracy (76.30%).
The authors [13] have used six well-known algorithms of machine learning such
that SVM, KNN, LR, DT, RF, and NB for predicting diabetes disease. According to the
experimental findings, SVM and KNN provided the greatest accuracy of 77%.
3 Proposed Methodology
The proposed framework is shown in Fig. 1.In our proposed methodology, data are
first pre-processed for missing values, then after that the standard scalar method is used
to standardize them. For prediction of diabetes illness, we have used five classification
Machine Learning Algorithms for Diabetes Prediction 291
Start
Prepossessing Data
Stop
approaches like Extra Tree, Random Forest, Decision Tree, KNN and Passive Aggressive
Classifier.For this study, 20% of the data are utilised for testing, while 80% of the data
are used for training. After applying machine learning algorithms on the dataset, the
accuracy rate was computed. The main objective was to find an algorithm that could
classify the given dataset most accurately.
The Kaggle [14] diabetes dataset has been utilized for the experiment. This dataset
consists of 768 records, with 500 negative classes referring to non-diabetes and 268
positive classes referring to diabetes patients, making up 34.9% and 65.1%, respectively,
of the total dataset. It has one result class and eight vital characteristics, which are shown
in the Table 1 and also graphically represented in Fig. 2.
Sr No Attributes Description
1 Pregnancies Count of pregnancies
2 Glucose 2 h plasma glucose concentration in an oral glucose
tolerance test
3 Blood Pressure Diastolic blood pressure (mm Hg)
4 Skin Thickness Thickness of the triceps skin fold (mm)
5 Insulin 2-h serum insulin (mu U/ml)
6 BMI Body mass index (weight in kg/(height in m)^2)
7 Diabetes Pedigree Function Diabetes pedigree function
8 Age Age (years)
9 Outcome category variable (1 or 0)
C. Decision Tree
It works well for both regression and classification. It functions as a classifier
with a framework of tree structure having internal nodes signifying elements of
dataset, branches signifying classification rules, and every leaf node signifying the
classification outcomes. Two nodes,the Decision Node which are used to create
decision and the Leaf Node which are the results of the decision make up a decision
tree.[17] (Fig. 5).
294 S. Priyadarshinee and M. Panda
D. Passive-Aggressive Classifier
Large-scale learning usually uses passive-aggressive algorithms. As opposed to
batch learning, when the entire training dataset is applied at once, online machine
learning techniques employ sequential input data and update the model of machine
learning one step at a time. When there is a huge amount of data available, this is
really helpful [18].
E. K-Nearest Neighbors (KNN)
A supervised machine approach called K-nearest neighbours is used to cat-
egorise label datasets. This algorithm finds neighbours for a specific data point.
Additionally, predictions for the labels of unknown data points can be generated
using information from these neighbours [19] (Fig. 6).
Machine Learning Algorithms for Diabetes Prediction 295
precision ∗ recall
F1 − Score = 2 ∗
precision + recall
As seen from Table 3, Random Forest is giving the highest accuracy of 81.16%,
precision of 75%, recall of 57%, f1-score of 65% and Extra Tree is also giving the highest
accuracy of 81.16%, precision of 80%, recall of 51%, f1-score of 62% for prediction
in diabetes among all classifiers. The accuracies obtained from the analysis is shown
graphically for better understanding in Fig. 7.
81.16 81.16
78.57
70.77
69.48
RF DT ET KNN PAC
Series1
From the above Table 3 and Fig. 7, the Random Forest and Extra Tree clearly demon-
strate that they have performed the best, with an accuracy of 81.16 percent and KNN is
giving the second highest accuracy of 78.57%.
5 Conclusion
One of the deadliest illnesses in the real world is diabetes mellitus, and it might be
difficult to diagnose this illness in its early stages. In this study, five different machine
learning algorithms were used to develop a model that successfully addresses all issues
and aids in the early detection of diabetes disease. After comparing these algorithms, it
was experimentally seen that Random Forest and Extra Tree have the lowest error rates
and have the highest accuracy (81.16%).
References
1. Vats, V., et al.: A comparative analysis of unsupervised machine techniques for liver disease
prediction. In: 2018 IEEE International Symposium on Signal Processing and Information
Technology (ISSPIT), Louisville, KY, USA, 486-489 (2018)
2. Gavhane, A., Kokkula, G., Pandya, I., Devadkar, K.: Prediction of heart disease using machine
learning. In: 2018 Second International Conference on Electronics, Communication and
Aerospace Technology (ICECA), Coimbatore, pp. 1275–1278 (2018)
3. https://www.javatpoint.com/types-of-machine-learning
4. Joshi, R., Alehegn, M.: Analysis and prediction of diabetes diseases using machine learning
algorithm: ensemble approach. Int. Res. J. Eng. Technol. 4(10), 426–435 (2017)
5. Sivaranjani, S., et al.: Diabetes prediction using machine learning algorithms with feature
selection and dimensionality reduction. In: 2021 7th International Conference on Advanced
Computing and Communication Systems (ICACCS). Vol. 1. IEEE (2021)
6. International Diabetes Federation, IDF Diabetes Atlas, 8th edn. (2017)
7. Li, G., Peng, S., Wang, C., Niu, J., Yuan, Y.: An energy-efficient data collection scheme using
denoising autoencoder in wireless sensor networks. Tsinghua Sci. Technol. 24(1), 86–96
(2019)
8. Vijayan, V.V., Anjali, C.: Prediction and diagnosis of diabetes mellitus—a machine learning
approach. In: 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS).
IEEE (2015)
9. Sonar, P., JayaMalini, K.. Diabetes prediction using different machine learning approaches.
In: 2019 3rd International Conference on Computing Methodologies and Communication
(ICCMC). IEEE (2019)
10. Nagabushanam, P., et al.: CNN architecture for diabetes classification. In: 2021 3rd
International Conference on Signal Processing and Communication (ICPSC). IEEE (2021)
11. Chang, V., et al.: Pima Indians diabetes mellitus classification based on machine learning
(ML) algorithms. Neural Computing and Applications, pp. 1-17 (2022)
12. Sisodia, D., Sisodia, D.S.: Prediction of diabetes using classification algorithms. Procedia
Computer Science 132, 1578–1585 (2018)
13. Sarwar, M.A., et al.: Prediction of diabetes using machine learning algorithms in healthcare.
In: 2018 24th international conference on automation and computing (ICAC), pp. 16. IEEE
(2018)
14. https://www.kaggle.com/datasets/kandij/diabetes-dataset
298 S. Priyadarshinee and M. Panda
15. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)
16. Sharaff, A., Gupta, H.: Extra-tree classifier with metaheuristics approach for email classifica-
tion. In: Proceedings Advances Computer Communication Computational Science. Springer,
Singapore, pp. 189197 (2019). https://doi.org/10.1007/978-981-13-6861-5_17
17. https://towardsdatascience.com/decision-trees-in-machine-learning-641b9c4e8052
18. https://thecleverprogrammer.com/2021/02/10/passive-aggressive-classifier-in-machine-lea
rning/
19. https://www.javatpoint.com/k-nearest-neighbor-algorithm-for-machine-learning
CRODNM: Chemical Reaction Optimization
of Dendritic Neuron Models for Forecasting Net
Asset Values of Mutual Funds
Abstract. Learning algorithm and aggregation function used in the neurons have
imperative influence on the approximation of an artificial neural network. Den-
dritic neuron model (DNM) using additive and multiplicative-based aggregation
functions has been emerging as a machine learning approach and found successful
in many engineering applications. This study attempts to advance the predictive
accuracy of DNM through maintaining a decent steadiness between exploration
and exploitation of its search space with chemical reaction optimization (CRO)
algorithm, termed as CRODNM. The CRO, being a parameter free and powerful
global search optimization method synergies with better approximation capability
of DNM thus, able to overcome the limitations of conventional back propagation
learning based DNM. In addition to this, to start the search operation with a better-
quality initial population, we propose a new initial population generation method
for CRODNM by incorporating several methods. The proposed CRODNM is eval-
uated on forecasting net asset values of four mutual funds in terms of convergence
and prediction accuracy. The learning paradigm formed due to reasonable com-
bination of CRO and DNM (i.e., CRODNM) found competitive and outperforms
over DNM, multilayer perceptron (MLP), and genetic algorithm trained DNM
prediction models.
1 Introduction
Please Financial market data such as stock closing prices, commodity prices, energy
prices, currency exchange rates, and net asset value of mutual fund companies, etc.
exhibit high dynamism, chaotic in nature, following irregular movements, thus it is hard
to predict their future values [1]. The inherent uncertainties and associated volatilities
make the financial market data analysis a complex task [2]. Further, financial market is
used Taguchi method to find the suitable user-defined parameters. The method found
better to compared methods and able to reduce the redundant synapses and dendritic
layers. In a short period of time, few evolutionary algorithms for DNM parameter tuning
are found in the literature such as GA [18], biogeography-based optimization [19], social
learning particle swarm optimization [20], differential evolution [21, 22], cuckoo search
[23], near population size reduction [24], whale optimization [25], and particle swarm
optimization [26, 27], etc. These hybrid DNMs are used for classification and forecasting
problems.
In the above cited works, evolutionary algorithms are used to decide the suitable
weights and thresholds of the DNM whereas, the other DNM controlling parameters
such as k, k soma and θsoma are decided experimentally. Though such procedures have
been combined with DNM and used for cracking several complex problems, their effi-
ciency is determined by well adjustable learning parameters. In the quest of searching
global optima, selection of such parameters makes the use of these technique problem-
atic. Selection of such control parameters while solving a particular problem necessi-
tates numbers of trial-and-error methods. Improper selection of such algorithm-specific
parameters may land the search operation at local optima or erroneous solution(s). Also,
these methods start their search process from a random initial population that may
affect the quality of final solution. Hence, for better accuracy, techniques with higher
approximation capability and fewer control parameters will be of interest. CRO is an
evolutionary optimization method inspired by the process of natural chemical reactions
[28, 29]. It has no algorithmic control parameter. Only the population size needs to be
declared. Hence, it is easy to implement without human interventions. ANN with CRO
methods is found successful applications in financial forecasting [5–7, 30].
This study is an attempt to enhance the predictability of DNM through searching its
weights, thresholds and three user-defined parameters by CRO. The optimal CRODNM
is obtained on fly during the evolution process rather fixing its structure at the beginning.
Therefore, a self-adjustable CRODNM is formed in an automatic fashion. The CRO is
parameter-free and does not necessitate any algorithmic control parameter. In addition
to this, to start the search operation with a better-quality initial population, we propose a
new initial population generation method for CRODNM incorporating several methods.
Finally, the proposed CRODNM is evaluated on predicting NAV of four mutual funds.
The methodologies used in this study are explained by Sect. 2. Outcomes from
simulation studies, comparative analysis are done in Sect. 3. Concluding remarks are
mentioned in Sect. 4 followed by a list of references.
2 Methodologies
The computations of basic DNM and the mechanism of the proposed CRODNM are
discussed in this section. The readers are suggested to refer the base articles as suggested
in Sect. 1 for DNM.
2.1 DNM
The computations in DNM are carried out through four layers such as synaptic layer, den-
dritic layer, membrane layer and soma layer. For an input vector X = {x1 , x2 , · · · , xn },
302 S. C. Nayak et al.
where xi is in [0, 1], weight wij , and threshold θij of DNM, the output Yij corresponds to
ith synaptic input in j th synaptic layer is computed as:
Here, k is a positive user-defined constant. Based on values of wij , and θij , six different
situations are arising as follows. If 0 < θij < wij , then Yij is proportional to xi and it
is called excitatory state. If wij < θij < 0, then Yij is inversely proportional to xi and it
is called inhibitory state. If 0 < wij < θij or wij < 0 < θij , then Yij value is always 0
and it is called constant-0 state. Finally, for conditions θij < wij < 0 or θij < 0 < wij , the
output Yij is always tends to 1, called as constant-1 state.
The nonlinear interaction of dendritic layer is computed by a multiplication unit.
The output of dendritic layer is given as:
n
Zj = Yij (2)
i=1
Outputs from m numbers of dendritic layers are linearly summed in the membrane
layer and the result is shown in Eq. 3.
m
V = Zj (3)
j=1
The final DNM output is computed at the soma layer using a positive constant ksoma
and self-defined parameter θsoma as in Eq. 4.
1
O= (4)
1 + e−ksoma (V −θsoma )
The total error signal E from N training samples at the output neuron is measured
as the deviation of from target values is computed as in Eq. 5.
1
N
E= target i − Oi (5)
N
i=1
During the training process, the learning algorithm continuously adjust the DNM
parameters, i.e., threshold θij and weight wij values in each synapse to optimize the DNM
performance.
The goodness of initial population directly impacts the convergence rate and quality of
final solution of an evolutionary algorithm. Random initialization method is the mostly
used process which may not guarantee the quality of initial population. Therefore, we
propose a new initial population generation method for CRODNM by fusing random
initialization, opposition, quasi-opposition and generalized opposition learning based
methods to avoid its premature convergence and performance enhancement. The method
is described by Algorithm 1.
CRODNM: Chemical Reaction Optimization of Dendritic Neuron 303
end for
6. end for
7. Set counter
8. for do
for do
end for
9. end for
10. Set counter
11. for do
for do
end for
12. end for
The CRODNM starts with the initial population as formed by Algorithm 1 and
different chemical reactions are applied as search operator to explore the search space
as presented in Algorithm 2. Here, the possible set of DNM parameters are considered
as the search space for CRO. An individual of CRODNM in t th iteration that represents
a potential parameter set of DNM is depicted in Fig. 3. There are 2NM + 3 parametersin
total need to be adjusted. Prospective readers are suggested to refer literature [5–7] for
detail implementation of different chemical reactions.
304 S. C. Nayak et al.
end While
return the best molecule
Inputs are sequentially fed to DNM along with the molecules of the population.
The model computes an output as in Eq. 4. This output is compared with the target to
obtain an error value. The error signal so generated is considered as the fitness of the
corresponding molecule. Chemical reaction operators are applied to explore the search
space. Based on the fitness values, selection process is carried out and population is
updated in successive iterations. The process stops at the maximum iteration (similar to
equilibrium condition in chemical reaction). The best-fit molecule is chosen from the
converged population and supplied to the DNM along with the test data. The error values
calculated from the test data are considered as the CRODNM prediction performance
and preserved for comparative studies. Lower the error value, better is the predictability
of the model. The CRODNM process is shown in Fig. 1.
CRODNM: Chemical Reaction Optimization of Dendritic Neuron 305
Collection of experimental data, input preparation for model and normalization, and
analysis of experimental outcomes are discussed in this section.
The experimental data comprising stock prices of four emerging companies such as
Apple Inc., Cisco Systems, Microsoft, and Starbucks Inc. Listed in NASDAQ are down-
loaded from the Website: https://www.amfiindia.com/net-asset-value/nav-history.The
duration of data collection is 8th September 2021 to 7th September 2022. Statistics
from the datasets are summarized in Table 1. All the series showing stable and smaller
kurtosis value that indicates investment opportunity. All the datasets are platykurtic. The
Birla Sunlife and SBI data are deviating highly while ICICI and IDBI are stable.
306 S. C. Nayak et al.
The model inputs are and normalized using sigmoid method as in (6) and finally after
prediction process, a de-normalization method is carried out to get the real-time data. In
(6), xnorm is the normalized value of xi , xmin and xmax are the minimum and maximum
data value of a pattern generated by sliding window respectively.
1
xnorm =
xi −xmin
(6)
− xmax
1+e −xmin
was set to 50. The convergence criterion was set to 100 maximum number of iterations.
The DNM parameters such as weight wij , threshold θij , k, k soma and θsoma are decided
by CRO in an evolutionary manner. Figure 3 depicts an individual representation for
CRODNM. The population size, cross-over and mutation probability of GA was chosen
as 80, 0.6 and 0.003 respectively. The MLP used has one hidden layer and the learning
rate and momentum factor was set to 0.002 and 0.01 respectively. For a fair comparison,
the same input pattern is fed to all predictors and all methods iterated for 100 times. In
order to compensate the stochastic nature of predictors, for each input pattern a model
was executed 30 times and average prediction errors from 30 runs are considered as
the performance of a model. Only one neuron is at output layer because there is only
one target variable in each input pattern to be predicted. The mean absolute percentage
of error (MAPE) as in (7) is chosen as the model performance measure. For the sake
of space, the error convergence graph for ICICI prudential series only presented as in
Fig. 4. It can be seen that the CRODNM converged faster than others.
1 No.ofpattern Target i − Predicted i
MAPE = ∗ 100% (7)
No.ofpattern i=1 Target i
The MAPE statistics from four datasets using four predictors are recorded and listed
in Table 2. The average MAPEs generated by CRODNM are 0.012816, 0.015368,
0.018815, and 0.021825 for ICICI prudential, Birla Sunlife mutual fund, SBI large
and midcap, and IDBI mutual fund respectively which are lowest when compared with
that from others. The GADNM model is the second good model. Both CRODNM and
GADNM found efficient compared to conventional DNM. It seems that, they easily fine-
tuned the DNM parameters, converged faster and thus, capable to escape the local optima.
The MLP predictions are found inferior. Further, the box-whisker plots of MAPEs from
ICICI dataset are depicted in Fig. 5 established the better performance of CRODNM. The
predicted NAVs for ICICI data series by four predictors are plotted in Fig. 6. It shows
that CRODNM predictions are much closer to actual NAVs compared to others. The
error histogram in Fig. 7 shows that for most of the input patterns of ICICI, the proposed
CRODNM produced error values closer to zero. These evidences from experimental
work highly suggested the goodness of CRODNM predictions over others.
308 S. C. Nayak et al.
Table 2. (continued)
Fig. 5. Box plots of MAPEs generated by four predictors from ICICI data series
310 S. C. Nayak et al.
Fig. 6. Model predictions against actual NAV values from ICICI data series
applied to predict the NAVs of four real-world mutual funds exploring one-year his-
torical data. It observed that CRODNM is quite able to model NAV historical data
and capture the underlaying dynamism coupled with such data efficiently. The pre-
dictability of CRODNM is compared with three others similarly developed forecasts
such as GADNM, DNM, and MLP and found superior. Experimental studies suggest
that CRODNM clearly improves the NAV prediction accuracy with good convergence
speed and effectively reaching the global optima. The study can be extended further
by incorporating advance learning mechanisms and application to other financial time
series as well.
Acknowledgement. Dr. Sarat Chandra Nayak was supported by BK21 grant funded by Korean
government at Yonsei University. Dr. Satchidananda Dehuri would like to thank SERB, Govt. of
India for financial support under Teachers’ Associateship for Research Excellence (TARE) fel-
lowship vide File No. TAR/2021/000065 for the period 2021–2024. Dr. Sung-Bae Cho was sup-
ported by an IITP grant funded by the Korean government (MSIT) (No. 2020-0-01361, Artificial
Intelligence Graduate School Program, Yonsei University.
References
1. Fama, E.: Efficient Capital Markets: A Review of Theory and Empirical Work. R. Lowbridge
(Module Leader), New York (1970)
2. Kara, Y., Boyacioglu, M.A., Baykan, O.K.: Predicting direction of stock price index movement
using artificial neural networks and support vector machines: the sample of the Istanbul stock
exchange. Expert Syst. Appl. 38(5), 5311–5319 (2011)
3. Hafezi, R., Shahrabi, J., Hadavandi, E.: A bat-neural network multi-agent system (bnnmas)
for stock price prediction: case study of dax stock price. Appl. Soft Comput. 29, 196–210
(2015)
4. Wang, J., Wang, J.: forecasting stock market indexes using principal component analysis and
stochastic time effective neural networks. Neurocomputing 156, 68–78 (2015)
5. Araujo, R., Oliveira, A., Meira, S.: A hybrid model for high-frequency stock market
forecasting. Expert Syst. Appl. 42(8), 4081–4096 (2015)
6. Nayak, S.C., Misra, B.B., Behera, H.S.: ACFLN: artificial chemical functional link network
for prediction of stock market index. Evol. Syst. 10(4), 567–592 (2018)
7. Nayak, S.C., Misra, B.B., Behera, H.S.: Artificial chemical reaction optimization of neural
networks for efficient prediction of stock market indices. Ain Shams Eng. J. 8(3), 371–390
(2017)
8. Yang, Y.J., Chen, B., Zhang, L.L.: Asset price prediction via machine-learning method: a
review. In: 2021 17th International Conference on Computational Intelligence and Security
(CIS), pp. 168–172. IEEE (2021)
9. Bianchi, D., Büchner, M., Tamoni, A.: Bond risk premiums with machine learning. Rev.
Financial Studies 34(2), 1046–1089 (2021)
10. Fama, E.F., French, K.R.: A five-factor asset pricing model. J. Financ. Econ. 116(1), 1–22
(2015)
11. Gu, S., Kelly, B., Xiu, D.: Empirical asset pricing via machine learning. Rev. Financial Studies
33(5), 2223–2273 (2020)
12. Tang, Z., Tamura, H., Ishizuka, O., Tanno, K.: A neuron model with interaction among
synapses, IEEJ Trans. Electron., Inform. Syst. 120(7), 1012–1019 (2000)
312 S. C. Nayak et al.
13. Tang, Z., Kuratu, M., Tamura, H., Ishizuka, O., Tanno, K.: A neuron model based on dendritic
mechanism. IEICE 83, 486–498 (2000)
14. Todo, Y., Tamura, H., Yamashita, K., Tang, Z.: Unsupervised learnable neuron model with
nonlinear interaction on dendrites. Neural Netw. 60, 96–103 (2014)
15. Ji, J., Tang, C., Zhao, J., Tang, Z., Todo, Y.:. A survey on dendritic neuron model: mechanisms,
algorithms and practical applications. Neurocomputing (2022)
16. Gao, S., Zhou, M., Wang, Y., Cheng, J., Yachi, H., Wang, J.: Dendritic neuron model with
effective learning algorithms for classification, approximation, and prediction. IEEE Trans.
Neural Networks Learning Syst. 30(2), 601–614 (2018)
17. Tang, C., Todo, Y., Ji, J., Lin, Q., Tang, Z.: Artificial immune system training algorithm for
a dendritic neuron model. Knowl.-Based Syst. 233, 107509 (2021)
18. Ji, J., Song, Z., Tang, Y., Jiang, T., Gao, S.: Training a dendritic neural model with genetic algo-
rithm for classification problems. In: 2016 International Conference on Progress in Informatics
and Computing (PIC), pp. 47–50. IEEE (2016)
19. Wang, S., Sugiyama, D., Sun, J., Yang, L., Gao, S.: Dendritic neuron model trained by
biogeography-based optimization for crude oil price forecasting. In: 2018 10th Interna-
tional Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), Vol.
1, pp. 36–40. IEEE (2018)
20. Song, S., Chen, X., Tang, C., Song, S., Tang, Z., Todo, Y.: Training an approximate logic
dendritic neuron model using social learning particle swarm optimization algorithm. IEEE
Access 7, 141947–141959 (2019)
21. Wang, S., et al.: A novel median dendritic neuron model for prediction. IEEE Access 8,
192339–192351 (2020)
22. Xu, Z., Wang, Z., Li, J., Jin, T., Meng, X., Gao, S.: Dendritic neuron model trained by
information feedback-enhanced differential evolution algorithm for classification. Knowl.-
Based Syst. 233, 107536 (2021)
23. Qian, X., Tang, C., Todo, Y., Lin, Q., Ji, J.:. Evolutionary dendritic neural model for
classification problems. Complexity (2020)
24. Song, Z., Tang, Y., Ji, J., Todo, Y.: Evaluating a dendritic neuron model for wind speed
forecasting. Knowl.-Based Syst. 201, 106052 (2020)
25. Han, Z., Shi, J., Todo, Y., Gao, S.: Training dendritic neuron model with whale optimiza-
tion algorithm for classification. In: 2020 IEEE International Conference on Progress in
Informatics and Computing (PIC), pp. 11–15. IEEE (2020)
26. Yilmaz, A., Yolcu, U.: Dendritic neuron model neural network trained by modified particle
swarm optimization for time-series forecasting. J. Forecast. 41(4), 793–809 (2022)
27. Egrioglu, E., Bas, E., Karahasan, O.: Winsorized dendritic neuron model artificial neural
network and a robust training algorithm with Tukey’s biweight loss function based on particle
swarm optimization. Granular Computing, 1–11 (2022)
28. Lam, A.Y., Li, V.O.: Chemical-reaction-inspired metaheuristic for optimization. IEEE Trans.
Evol. Comput. 14(3), 381–399 (2009)
29. Alatas, B.: A novel chemistry-based metaheuristic optimization method for mining of
classification rules. Expert Syst. Appl. 39(12), 11080–11088 (2012)
30. Nayak, S.C., Misra, B.B.: Extreme learning with chemical reaction optimization for stock
volatility prediction. Financial Innovation 6(1), 1–23 (2020)
Machine Learning Approaches and Particle
Swarm Optimization Based Clustering
for the Human Monkeypox Viruses: A Study
Abstract. The world is currently battling with epidemic fear because of the preva-
lence of monkeypox cases in various corners of the globe, even as the threat of
the COVID-19 pandemic declines. The majority of the 2022 outbreak’s cases of
monkeypox virus are found in Africa now found in nations throughout Europe and
the Western Hemisphere. With ten instances of the monkeypox virus recorded in
August 2022 in India, along with one fatality, this endemic has now spread to more
than 90 nations globally. The ‘Orthopoxvirus genus of the Poxviridae family’ con-
tains a large number of zoonotic viruses, including the monkeypox virus. The term
“monkeypox” describes the disease because the first viral infection detected by
this virus was in macaque monkeys. This article presents a summary of the most
current, cutting-edge applications of “Machine Learning (ML) and Particle Swarm
Optimization (PSO)” clustering to the Monkeypox instances. The literature has
highlighted many large data elements where ML has promised to play a significant
role. Advanced analytical techniques have proved useful in forecasting the onset
of the disease as well as recognizing its symptoms and signs. Furthermore, ML-
based bio-inspired big data analytics has greatly aided contact tracing, molecular
analysis, and drug development. Even though it is exceedingly rare, it spreads
when direct contact with the “mucocutaneous lesions” of an infected patient or
respiratory droplets has been associated with the spread of the monkeypox virus.
1 Introduction
A viral illness known as monkeypox can affect both humans and other animals [4].
‘Fever, enlarged lymph nodes, and a blistering and crusting rash’ are all symptoms of
monkeypox virus [11]. Between 5–21 days may pass between exposure and the develop-
ment of symptoms [7, 55]. ‘Symptoms of the monkeypox virus generally last between
2 to 4 weeks [7]. It can happen without any symptoms as well as with minor signs
[54]. There has not been any evidence that the distinctive appearance of swelling of the
glands and lesions, because of fever and muscle ache are common throughout differ-
ent outbreaks [11, 54]. As shown in Table 1, Particularly in young infants, expecting
women, and individuals who have weak immune systems, cases can become severe [6,
56]. The ‘zoonotic virus’ belonging to the ‘Orthodox virus’ genus is responsible for
the illness. This genus includes the smallpox-causing variola virus [14, 35]. Compared
to the ‘Central African’ (Congo Basin) strain, the ‘West African’ strain infects people
less severely [19, 30]. Body fluids, contaminated products, handling of dumpsters, and
other close contacts with an infected person are ways to spread the virus [55]. Spread-
ing can be aided by tiny droplets and, presumably, airborne routes [53, 54]. When the
same symptoms last longer than a week, people are still contagious from the moment
the symptoms appear until all lesions have crusted over and fallen off [55]. The virus
reportedly originated in Africa among certain rodents [30] in the first instance. A lesion
of viral DNA can have retrieved to confirm the diagnosis [42].
The Democratic Republic of the Congo (DRC) (Zaire), in the city of ‘Basankusu of
Equateur Province’, was where the first case of human monkeypox identified in 1970
[19]. Confirmed cases in total, 338 and 33 deaths (9.8% CFR) has found between 1981
and 1986 in the ‘DRC/Zaire’ under WHO surveillance. From 1996–1997, the ‘DRC and
Zaire saw the second wave of human sickness. Between 1991 and 1999, 511 occurrences
in total are founds in the ‘DRC/Zaire’ [19, 30]. In the DRC, the Congo Basin Clade of
illness is still present and has a high CFR (case fatality rate) [19]. It was once restricted
to tropical jungle regions. The pattern was interrupted in 2005 when 49 instances were
‘reported in Sudan’ (regions that are now known as South Sudan), but there were no
deaths [19]. The genomic study indicates that the virus ware imported, most likely from
the DRC [30] (Fig. 1).
Fig. 1. Monkeypox lesion on human body and DNA of Monkeypox Virus [58]
Following that, many additional cases of monkeypox are founds in ‘Central and West
Africa’, mostly in the DRC: 2000 cases each year between 2011 and 2014. Due to the
current data’s frequent fragmentation and lack of support, it is difficult to make accurate
estimates of the number of cases of monkeypox over time. However, historical data
showing both the quantity and geographic distribution of cases recorded in 2018 had
increased [11]. By January 1, 2022, reports of monkeypox cases had come in from 42
member states across five distinct WHO regions. Table 2 displays the number of mon-
keypox cases and fatalities globally from January to August 2022. The geographical
regions of the ‘Americas are composed of Africa, Europe, the Eastern Mediterranean,
and the Western Pacific. Guys who have had intercourse with other males and who
have admitted to having sex lately with several or new partners are more susceptible
to contracting the monkeypox outbreak. The majority of current epidemic cases were
reported through “sexual health” or other health services at primary or secondary health
care institutions, with a history of travel to “Europe, North America, or other countries”
rather than previously unknown regions, and increasingly with recent local travel or no
travel at all. Epidemiological investigations are conducted if a single case of this virus
is detected then the outbreak of monkeypox in that nation is considering an epidemic.
The rapid development of monkeypox in many areas raises the potential that transmis-
sion has been going on for some time without being observe given the initial absence
of epidemiological linkages to previously reported monkeypox locations. This article
presents a summary of the monkeypox virus based on ‘machine learning and particle
swarm optimization clustering’. The use of bio-inspired approaches such as machine
learning may speed up diagnosis on a far wider scale than physical testing by improving
screening and using the massive volumes of data generated by numerous ‘laboratory
tests, clinical symptoms, and radiological imaging [27]. Using current quantitative and
qualitative data, machine-learning approaches can predict ‘infected patients’ [9, 25]. The
general characteristics of monkeypox occurrences are illustrate in Fig. 2, which provides
a mechanism for medical practitioners to make judgments during treatment and diag-
nosis. There is currently no feasible treatment available for those who have infected.
In severe situations, supportive treatments such as ‘tecovirimat’ may be used. Because
there are no clear guidelines for symptom relief as these treatments are random.
316 A. K. Mandal et al.
recent research has shown that using ML with bio-inspired methodologies can mod-
ernize the health industry [12, 25]. Figure 4 illustrates a variety of machine learning
applications for the monkeypox virus (Fig. 3).
Table 2. The global monkeypox virus cases with death cases between January to august 2022
[57].
Fig. 3. The global monkeypox virus cases with death between Januarys to august 2022
To prevent the disease from spreading, it is critical to identify the person’s contacts
after infected with the monkeypox virus. Contact tracing is the procedure of finding
and tracing people, who have recently met a monkeypox virus patient. The approach
is often uses to identify the affected person for a follow-up 5 to 21 days following
exposure [7, 55]. If correctly implemented, this technique has the potential to disrupt
the new Monkey Pox Virus transmission cycle and lessen the epidemic by boosting
the possibility of appropriate control. Several affected countries have developed various
digital contact tracing methods that make use of mobile apps that use techniques such as
“Bluetooth, GPS,” “system physical address,” and others [5]. A digital contact tracing
system may operate significantly quicker than a non-digital system and is very similar
to real-time. The majority of these digital tools are designs to acquire user information
through machine learning algorithms evaluate to identify who is most infects with a
particular virus based on recent contact chains [55]. Petersen et al. [36] meticulously
prepared a list of ML-based contact tracing and diagnosis applications. The first viremia
that occurs from this virus’s intracellular replication spreads to neighboring lymph nodes.
Infection with monkeypox can result in ‘bronchopneumonia, dehydration, respiratory
distress, encephalitis’, and other consequences. There is no treatment for monkeypox,
as cases are still report across the world. Supportive therapy, such as ‘Tecovirimat’,
can used to treat illness. Because there are no accepted recommendations for symptom
reduction, as all treatments are entirely individual.
The government, public health institutions, and policymakers will be able to deal with
the endemic lot more effectively if the monkeypox virus epidemic is predict and forecast.
Susceptible infected and removed (SIR), “susceptible exposed infected and recovered”
(SEIR), susceptible infected recovered and dead (SIRD), infected, infected, and dead
(IID), infected, infected are the following terms used for prediction and forecasting the
virus [25]. Several ML-based prediction models for the monkeypox virus are depicts
as shown in Fig. 4. The performance of these models has to anticipate and improve, as
more data is available.
Machine Learning Approaches and Particle Swarm Optimization 319
one viral DNA group, such as smallpox, are also use to treat another. The use of ML for
molecular analysis and vaccine development is discussed in Sect. 3.2.7 and Table.3.
As a result of growing biological data volume, rapid data volume expansion, and tech-
nological innovation, bioinformatics originated [50]. Big data analytics were required
in the monkeypox virus case because there was a significant amount of patient data,
including medical records, X-rays, images of monkeypox virus patients, lists of doctors
and nurses, and their travel histories. As the number of people affected by the monkey-
pox virus grows, bio-inspired computing can be useful in investigating these data sets
and identifying trends. Bunge et al. [6] investigated open-data tools for tracking, simu-
lation, as well as the shifting epidemiology of human monkeypox as a potential issue.
Accessible organizations, open-source communities, and geographic data resources for
monkeypox viruses are represent in Tables 1, 2, 4.
For continuous and discrete optimization, PSO [17] is employed with the ‘dimension D
of the search space’ is the same for all particles, and each particle “1 ≤ i ≤ Nd ” has a
position“Pi ,d ” and a velocity “Vi„d ”. Before they may move about in the search space, all
particles must be assigned random starting places and velocities. Each iteration results in
the identification of the personal optimal solution “Pbest ” with the overall optimal solution
Machine Learning Approaches and Particle Swarm Optimization 321
“Gbest ” for each particle. According to the following equations [17], the particle’s new
position and velocity are:
Updated velocity: vi t+1 = w. vi t + c1 r1 (pt best - pi t ) + c2 r2 (Gt best - pi t ).
‘w’ is the inertia weight in the above equation, while ‘c1 ’ and ‘c2 ’ are the global
constants.
Updated position: pi t+1 = pi t + vi t+1 .
The particle updates both ‘Pbest ’and ‘Gbest ’ in the following way:
Particle swarm optimization algorithm [17]:
Fig. 7. PSO clustering for monkeypox virus using an image [58] of the infected patients
Clustering is a technique that combines “similar data points” from a given data set into
a single group [2]. Few application of clustering algorithms includes ‘image compres-
sion [20], pattern analysis [22], and picture segmentation [43]’. For clustering analysis,
‘particle swarm optimization, or ‘clustering based on swarm intelligence, may be used
[43]. Data points have treated as particles in ‘particle swarm optimization approaches.
Different clustering methods are use to collect the first groups of particles, until the
cluster center, converges. The particle cluster is an update based on the cluster center,
velocity, and position. (Represent in Fig. 6 and 7).
Using clustering method based on particle swarm optimization [43].
• Determine each particle’s degree of fitness inside a cluster. ∀xi cj (cj is a ‘cluster’ j).
• Determine the most recent positions and ‘velocities of each particle’ within ‘cluster’
cj .
322 A. K. Mandal et al.
• Replace ‘Pbest ’ with the ith cluster center & ‘Gbest ’ with the neighboring cluster
centers.
Particle swarm optimization clustering iterates until it reaches the maximum number
of iterations or converges. Previous sections described PSO clustering with the equations
for velocity and position updates using “Pbest ” and “Gbest " fitness matrices. The cluster
centers for the PSO approach to image clustering are as follows:
Table 3. (continued)
the virus from infecting other fomites. Vaccination against the vaccinia virus protects
nonhuman primates (smallpox vaccine). This immunization, according to the study, may
also benefit other species such as prairie dogs. If you have had monkeypox, you should
avoid rats and other nonhuman primates, as well as any other animals that might be a
source of infection. The design of such a robust early warning system is made possible
by the combination of “Particle Swarm Optimization Clustering and ML” into a single
framework. In some countries, the surveillance of infectious populations is accelerating
with the use of big data analytics. For example, various governments have used Particle
Swarm Optimization Clustering and ML by employing the use of numerous surveillance
cameras, drones, and face recognition devices to monitor their citizens’ movements and
determine whether they are properly following isolation rules [17, 25]. A quick response
to the spread of monkeypox viruses by Taiwan’s healthcare system, which has already
tested for coronavirus forecasting and prediction, was crucial in reducing the infection
incidence. By carrying out an action plan for employing big data, Taiwan has led the
way in the field of human healthcare [3].
of monkeypox reported in several countries that do not often experience the disease,
including ‘India, the United States, the United Kingdom, Spain, Portugal, and Canada’.
Patients with monkeypox-related rash illnesses should investigate regardless of ‘gender
identity, natal sex, sex of sex partner, travel, or other special risk factors. Clinicians
should strictly adhere to infection control procedures and immediately notify their local
health department. This article summarizes an automated estimate of the monkeypox
virus that was identifying using ‘machine learning and the PSO clustering approach.
Machine learning techniques, which may employ the vast quantity of data provided by
various laboratory tests, clinical symptoms, and radiological scans to enhance diagnosis,
will be particularly valuable in this respect for improving screening and increasing
rapid diagnosis on a broad scale [55]. Machine learning techniques can predict ‘infected
patients’ using current quantitative and qualitative data [14, 25]. The results of this
strategy can help medical professionals make decisions during treatment and diagnosis,
which will help battle the endemic that represents in Fig. 2, 4, and 6. Presently no
effective treatments for people who are infect by this deadly virus. However, in extreme
cases, supportive treatments such as tecovirimat may employ.
The following are only a few of the health recommendations for the monkeypox
virus:
• Under certain temperature and light conditions, the monkeypox virus can survive
longer without a host [19]
• Deforestation and flooding may result in more habitats for species that carry the
monkeypox virus, increasing the likelihood that those species will come into contact
more frequently and pose a greater risk of transmission.
• The monkeypox virus and its reservoirs may be able to increase their geographic range
because of the rainforest’s expansion brought on by warmer and more humid weather,
thereby hastening the spread of the virus [29].
If the monkeypox virus spreads outside of ‘Africa,’ the global public health impacts
will be disastrous. As a result, there would be no way to stop the virus while its geographic
spread is still limited [19]. Due to inadequate resources and infrastructure, insufficient
‘diagnostic resources, systemic barriers in war conditions’ [19, 54], and a lack of clinical
328 A. K. Mandal et al.
6 Conclusion
As illustrated in Table 2, the monkeypox virus had affected around 90 countries world-
wide as of August 2022, with ten cases and one fatality in India. People’s social and
economic security has suffered substantially because of this horrible illness. To tackle the
monkeypox virus challenge, this article discusses the most recent cutting-edge applica-
tions of ‘machine learning and particle swarm optimization cluster. Various researches
involving big data have suggested that machine learning (ML) plays a crucial role.
Advanced analytical techniques have been successful in both predicting the disease’s
emergence and identifying its symptoms and indications. Furthermore, the application of
Table 5. (continued)
‘machine learning-based big data analytics inspired by biological systems’ has consid-
erably improved ‘contact tracing, molecular analysis, and drug development. However,
the lack of standard data sets and privacy issues restrict the efficiency of ML and Particle
Swarm Optimization Clustering in this scenario. A single library of all the data related
to the monkeypox virus is required to determine the efficacy of ML-based bio-inspired
approaches in eliminating the endemic.
References
1. “About Monkeypox | Monkeypox | Poxvirus | CDC”. 2021–11–22. Archived from the original
on 2022–05–10, 2022–04–27
2. Anderberg, M.R.: The broad view of cluster analysis. Cluster Analysis for Appl. 1(1), 1–9
(1973)
3. Bauch, C.T., Lloyd-Smith, J.O., Coffee, M.P., Galvani, A.P.: Dynamically modeling SARS
and other newly emerging respiratory illnesses: past, present, and future. Epidemiology 791–
801 (2005)
4. Breman, J.G.: Monkeypox: an emerging infection for humans? Emerging infections 4, 45–67
(2000)
330 A. K. Mandal et al.
5. Bui, D.T., Bui, Q.T., Nguyen, Q.P., Pradhan, B., Nampak, H., Trinh, P.T.: A hybrid artificial
intelligence approach using GIS-based neural-fuzzy inference system and particle swarm
optimization for forest fire susceptibility modeling at a tropical area. Agric. For. Meteorol.
233, 32–44 (2017)
6. Bunge, E.M., et al.: The changing epidemiology of human monkeypox—a potential threat?
a systematic review. PLoS Negl. Trop. Dis. 16(2), e0010141 (2022)
7. Centers for Disease Control and Prevention. Interim clinical guidance for the treatment of
monkeypox (2022)
8. Centers for Disease Control and Prevention.. Monkeypox and smallpox vaccine guid-
ance. Ultimo aggiornamento 2 (2022)
9. Davenport, T., Kalakota, R.: The potential for artificial intelligence in healthcare. Future
Healthcare J. 6(2), 94 (2019)
10. Ennab, F., Nawaz, F.A., Narain, K., Nchasi, G., Essar, M.Y.: Rise of monkeypox: Lessons
from COVID-19 pandemic to mitigate global health crises. Annals of Medicine Surgery 79,
104049 (2022)
11. https://en.wikipedia.org/wiki/Monkeypox
12. Huggett, J.F., French, D., O’Sullivan, D.M., Moran-Gilad, J., Zumla, A.: Monkeypox: another
test for PCR. Eurosurveillance 27(32), 2200497 (2022)
13. Jabeen, C., Umbreen, G.: Monkeypox transmission, need and treatment of humans with an
antiviral drug. Int. J. Social Sciences Manage. 4(2), 77–79 (2017)
14. Jain, N., Lansiaux, E., Simanis, R.: The new face of monkeypox virus: an emerging global
emergency. New Microbes and New Infections (2022)
15. Jordan, R., et al.: Single-dose safety and pharmacokinetics of ST-246, a novel orthopoxvirus
egress inhibitor. Antimicrob. Agents Chemother. 52(5), 1721–1727 (2008)
16. Keasey, S., et al.: Proteomic basis of the antibody response to monkeypox virus infection
examined in cynomolgus macaques and a comparison to human smallpox vaccination. PLoS
ONE 5(12), e15547 (2010)
17. Kennedy, J.: Stereotyping: Improving particle swarm performance with cluster analysis. In:
Proceedings of the 2000 congress on evolutionary computation. CEC00 (Cat. No. 00TH8512),
Vol. 2, pp. 1507–1512. IEEE (2000)
18. Ko, Y., Mendoza, R., Mendoza, V.M., Seo, Y.B., Lee, J., Jung, E.: Estimation of monkeypox
spread in a non-endemic country considering contact tracing and self-reporting: a stochastic
modeling study. medRxiv (2022)
19. Kugelman, J.R., et al.: Genomic variability of monkeypox virus among humans, democratic
republic of the congo. Emerg. Infect. Dis. 20(2), 232 (2014)
20. Kumari, R., Gupta, N., Kumar, N.: Cumulative histogram based dynamic particle swarm
optimization algorithm for image segmentation. Indian J. Computer Science Eng. 11(5),
557–567 (2020)
21. Lam, H.Y.I., Guan, J.S., Mu, Y.: In silico repurposed drugs against monkeypox virus. bioRxiv
(2022)
22. Lee, R.C.: Clustering analysis and its applications. In: Advances in information systems
science, pp. 169–292. Springer, Boston, MA (1981). https://doi.org/10.1007/978-1-4613-988
3-7_4
23. Li, X., Fang, Z.: Parallel clustering algorithms. Parallel Comput. 11(3), 275–290 (1989)
24. Likos, A.M., et al.: A tale of two clades: monkeypox viruses. J. Gen. Virol. 86(10), 2661–2672
(2005)
25. Luo, Y., Szolovits, P., Dighe, A.S., Baron, J.M.: Using machine learning to predict laboratory
test results. Am. J. Clin. Pathol. 145(6), 778–788 (2016)
26. MacNeil, A., et al.: Transmission of atypical varicella-zoster virus infections involving palm
and sole manifestations in an area with monkeypox endemicity. Clin. Infect. Dis. 48(1), e6–e8
(2009)
Machine Learning Approaches and Particle Swarm Optimization 331
27. Maksyutov, R.A., Gavrilova, E.V., Shchelkunov, S.N.: Species-specific differentiation of var-
iola, monkeypox, and varicella-zoster viruses by multiplex real-time PCR assay. J. Virol.
Methods 236, 215–220 (2016)
28. McCollum, A.M., Damon, I.K.:. Human monkeypox. Clinical Infectious Diseases 58(2),
260–267 (2014)
29. Nakazawa, Y., et al.: A phylogeographic investigation of African monkeypox. Viruses, 7(4),
2168-2184 (2015)
30. Nolen, L.D., et al.: Extended human-to-human transmission during a monkeypox outbreak
in the Democratic Republic of the Congo. Emerg. Infect. Dis. 22(6), 1014 (2016)
31. O’Shea, J.: Interim guidance for prevention and treatment of monkeypox in persons with HIV
infection—United States, August 2022. MMWR. Morbidity and Mortality Weekly Report 71
(2022)
32. Osorio, J.E., Yuill, T.M.:. Zoonoses. Encyclopedia of Virology 485 (2008)
33. Parker, S., Handley, L., Buller, R M.: Therapeutic and prophylactic drugs to treat orthopoxvirus
infections (2008)
34. Parker, S., Nuara, A., Buller, R.M.L., Schultz, D.A.: Human monkeypox: an emerging
zoonotic disease (2007)
35. Petersen, B.W., Damon, I.K.: Smallpox, Monkeypox, and Other Poxvirus Infec-
tions. Goldman-Cecil Medicine. 26th ed. Elsevier, Philadelphia, PA (2020)
36. Petersen, E., et al.: Human monkeypox: epidemiologic and clinical characteristics, diagnosis,
and prevention. Infect. Dis. Clin. 33(4), 1027–1043 (2019)
37. Quenelle, D.C., et al.: Efficacy of delayed treatment with ST-246 given orally against systemic
orthopoxvirus infections in mice. Antimicrob. Agents Chemother. 51(2), 689–695 (2007)
38. Ray, S., Turi, R.H.: Determination of number of clusters in k-means clustering and applica-
tion in colour image segmentation. In: Proceedings of the 4th International Conference on
Advances in Pattern Recognition and Digital Techniques, Vol. 137, p. 143 (1999)
39. Reed, K.D., et al.: The detection of monkeypox in humans in the Western Hemisphere. New
England Journal of Medicine 350(4), 342-350 (2004)
40. Reynolds, M.G., Damon, I.K.: Outbreaks of human monkeypox after cessation of smallpox
vaccination. Trends Microbiol. 20(2), 80–87 (2012)
41. Sale, T.A., Melski, J.W., Stratman, E.J.: Monkeypox: an epidemiologic and clinical compar-
ison of African and US disease. J. Am. Acad. Dermatol. 55(3), 478–481 (2006)
42. Shchelkunov, S.N., et al.: Analysis of the monkeypox virus genome. Virology 297(2), 172–194
(2002)
43. Shi, Y., Eberhart, R.: A modified particle swarm optimizer. In: 1998 IEEE International Con-
ference on Evolutionary Computation Proceedings. IEEE World Congress on Computational
Intelligence (Cat. No. 98TH8360), pp. 69–73. IEEE (1998)
44. Sklenovska, N., Van Ranst, M.: Emergence of monkeypox as the most important orthopoxvirus
infection in humans. Front. Public Health 6, 241 (2018)
45. Smee, D.F., Sidwell, R.W., Kefauver, D., Bray, M., Huggins, J.W.: Characterization of wild-
type and cidofovir-resistant strains of camelpox, cowpox, monkeypox, and vaccinia viruses.
Antimicrob. Agents Chemother. 46(5), 1329–1335 (2002)
46. Sreenivas, S.: Monkeypox: What to Know. webmd.com. WebMD (2022)
47. Stittelaar, K.J., et al.: Antiviral treatment is more effective than smallpox vaccination upon
lethal monkeypox virus infection. Nature 439(7077), 745–748 (2006)
48. Torcate, A.S., Barbosa, J.C.F., de Oliveira Rodrigues, C.M.: Utilizando o learning analytics
com o k-means para análise de dificuldades de aprendizagem na educação básica. In: Anais
do XXVI Workshop de Informática na Escola, pp. 31–40. SBC (2020)
49. UK, G. Research and analysis Qualitative assessment of the risk to the UK human population
of monkeypox infection in a canine, feline, mustelid, lagomorph or rodent UK pet
332 A. K. Mandal et al.
50. Watkins, X., Garcia, L.J., Pundir, S., Martin, M.J., UniProt Consortium: ProtVista: visualiza-
tion of protein sequence annotations. Bioinformatics 33(13), 2040-2041 (2017)
51. Wawina-Bokalanga, T., et al.: An accurate and rapid Real-time PCR approach for human
Monkeypox virus diagnosis. medRxiv (2022)
52. Weinstein, R.A., Nalca, A., Rimoin, A.W., Bavari, S., Whitehouse, C.A.: Reemergence of
monkeypox: prevalence, diagnostics, and countermeasures. Clin. Infect. Dis. 41(12), 1765–
1771 (2005)
53. World Health Organization. Multi-country monkeypox outbreak: situation update. 2022–06–
04)[2022–06–07] (2022). https://www.who.int/emergencies/disease-outbreak-news/item/
2022-DON390
54. World Health Organization. Clinical management and infection prevention and
control for monkeypox: interim rapid response guidance, 10 June 2022 (No.
WHO/MPX/Clinical_and_IPC/2022.1). World Health Organization (2022)
55. World Health Organization. Surveillance, case investigation and contact tracing for monkey-
pox: interim guidance, 22 May 2022 (No. WHO/MPX/Surveillance/2022.1). World Health
Organization (2022)
56. Yuen, C.Y., Dodgson, J.E., Tarrant, M.: Perceptions of Hong Kong Chinese women toward
influenza vaccination during pregnancy. Vaccine 34(1), 33–40 (2016)
57. https://worldhealthorg.shinyapps.io/mpx_global/
58. https://www.istockphoto.com/photos/monkeypox
59. Abdelhamid, A.A., et al.: Classification of monkeypox images based on transfer learning and
the Al-Biruni Earth radius optimization algorithm. Mathematics 10(19), 3614 (2022)
60. Patel, M., Surti, M., Adnan, M.: Artificial intelligence (AI) in Monkeypox infection
prevention. Journal of Biomolecular Structure and Dynamics, 1–5 (2022)
Machine Learning-Based Hybrid Feature
Selection for Improvised Network Intrusion
Detection
1 Introduction
Due to the internet’s growing popularity and extensive use, security is becoming increas-
ingly important to maintain a stable and secure network, free from unauthorized activity.
The term “intrusion” refers to any malicious attempt to breach the security of a network
by compromising its secrecy, integrity, or accessibility. A variety of approaches, meth-
ods, and algorithms have been developed to capture and spot the network intruder. An
example of such a mechanism is the IDS, which keeps tabs on and assesses all the
activities happening on a network in real time. Thus, IDS is a crucial tool that monitors
networks and alerts the network administrator to any suspicious or anomalous activity,
protecting the network from both existing and emerging threats that put its resources at
risk [1].
IDSs are further categorized into three types based on the nature of the attacks:
signature-based, anomaly-based, and hybrid. Signature- or misuse-based IDSs look for
patterns in network traffic, such as byte sequences, that are used by known threats.
Consequently, it cannot identify zero-day threats. IDSs that are based on anomalies
are deployed to identify attacks that were previously unidentified by generating models
based on the system’s behaviour. The primary challenge with anomaly-based IDS is
the rise of false alarm rates. The hybrid IDS combines signature and anomaly-based
IDS [2]. Typically, IDS employs machine learning (ML) methods to process enormous
volumes of high-dimensional data to identify intruders, develop a trustworthy model of
activity, and evaluate new behaviours in the model. Even though there are a number of
IDS that employ machine learning, additional research is required to improve accuracy
and reduce false positive rates [3].
The pre-processing stage is accelerated and detection accuracy is increased through
feature selection, a crucial component of an ML-based solution. Because the IoT ecosys-
tem is always changing, the detection precision of anomaly-based IDSs is regarded as
the biggest issue. The goal of this study is to acquire resilient performance for ML-based
IDS in the varied IoT ecosystem [4] by proposing a novel feature selection approach.
The studies presented in Table 1 were limited to one or a combination of two feature
selection methods. Moreover, statistical model efficiency, such as AIC comparison, was
not done in any of these studies. Since an optimized method for selecting features is a
key part of machine learning, more research is needed to find the best ML classifier with
a high rate of correct detection and a low rate of false positives. Based on this literature
review, we propose a more shrewd IDS framework that eliminates redundant features
from the dataset in the pre-processing stage. Our research focuses on the application of
3 well-known individual feature reduction methods, namely information gain (IG), gain
ratio (GR), and chi-square (CS) methods to get the optimal feature set. Using the concept
of mathematical set theory intersection, a unique hybrid feature selection approach is
proposed which will rank the best minimum relevant features. The proposed IDS will
be a combination of 3 feature selection modules viz. IG, GR, and CS have been used for
dimension reduction which may help the classifier to improve efficiency over alternative
methods.
Data security and privacy are key concerns, and IDSs serves as the first line of protection.
Intelligent IDS are built using a variety of rule-based methods or ML frameworks. The
flow diagram describing the methods followed in our proposed work is depicted in
336 P. Satapathy and P. K. Behera
Fig. 1. In this section, we have described and explained the dataset, ML classifiers,
feature selection and reduction approaches, performance metrics, and model evaluation
methods used in our research.
Analysts have compiled several network traffic datasets to make it simpler to test dif-
ferent algorithms for discovering intrusions, allowing for a more thorough comparison
of available intrusion detection approaches. These datasets may be accessible either
publicly or privately or through the use of network simulation, which may be used to
monitor a variety of traffic events and monitor them. The vast majority of these datasets
were assembled with the assistance of a variety of tools that assisted in capturing traffic
and keeping track of various traffic incidents. In our research, we have used the Network
Security Laboratory Knowledge Discovery and Data (NSL-KDD) dataset, the well-
known dataset for benchmarking IDSs. The well-known KDDcup99 dataset, which is
exploited extensively in the field of IDS development, served as the basis for the creation
of the NSL-KDD dataset, which is an upgraded version of the original. Each record in
Machine Learning-Based Hybrid Feature Selection 337
this dataset is either considered a normal operation or an attack based on the presence or
absence of 41 attributes and a single class attribute [8]. The NSL-KDD datasets used for
training and testing include 21 and 37 types of threats, respectively. Denial-of-service
(DoS), user-to-root (U2R), root-to-local (R2L), and probe attacks are the four main types
of network intrusions. Train and test data for the NSL-KDD dataset [9] are subdivided
by attack type as shown in Table 2. Table 3 lists the subcategories of the four major
attack types in both the training and testing datasets.
matrix. In our research, we implemented IG, GR, and CS attribute evaluation with the
help of the ranker method to rank the one-hot encoded attributes of the NSL-KDD data
set. The lowest 10, 20, 30, 40, 50, 60, 70, and 80 ranked attributes were sequentially
filtered from each attribute-ranked dataset, resulting in the construction of 8 datasets for
each of the three attribute evaluation methods containing 111, 101, 91, 81, 71, 61, 51,
and 41 features, respectively, ultimately having a total of 8 X 3 = 24 datasets. The hybrid
feature selection approach used by us utilizes three filter-based approaches. To design
the hybrid feature selection approach, we used mathematical set theory to consider the
attributes that are common (intersection) between the individual sequentially filtered
datasets of the three attribute evaluation methods, resulting in a total of eight datasets.
Thus, a total of 32 datasets (24 + 8) were generated.
Gain Ratio Feature Selection: The gain ratio can be considered of as an extension of
the information gain that was addressed earlier. It emphasizes selecting characteristics
that have a high number of values in an effort to minimize the Information Gain that
occurs as a result of its use. Therefore, we are able to say that the Gain Ratio feature
evaluation is more accurate in certain conditions, specifically those in which the data are
well-ordered and there is no redundancy [14].
Chi-Square Feature Selection: The chi-squared test is a numerical test that measures
the variation from the distribution that would be predicted if the feature event were
independent of the class value [18].
BayesNet: It is a frequently used technique that bases its operation on the fundamen-
tal Bayes theorem and builds a Bayesian network after determining the conditional
probability for each node [10].
J48: The C4.5 algorithm is used to create a decision tree (DT), which is a part of
supervised learning methodology and is referred to as J48 in the Weka tool [4].
NB: The Bayes Theorem serves as the foundation for the Naive Bayes (NB) classifier,
one of the most traditional methods for solving classification issues. NB does not discard
the features’ weak predictors, in contrast to other machine learning algorithms. Each
feature’s information is considered, and a probabilistic model is constructed [7].
To assess how well the suggested IDS performs, we employed the evaluation matrices
below:
Confusion Matrix: A confusion matrix is a visual aid that serves as the foundation for
computing all other evaluation criteria. It has the following four values: false negative
(FN), true negative (TN), false positive (FP) and true positive (TP) [3].
TP: When the IDS classifies an instance as an attack and the instance is in fact an
attack, this is considered a true positive result.
FP:When the IDS classifies an instance as an attack whereas the instance is actually
found to be normal, this is considered a false positive result. It is often referred to
as the false alarm rate
TN: When the IDS classifies an instance as normal and the instance is actually
found to be normal.
FN: Instances that should be considered attack but are misclassified as normal
Sensitivity: The percentage of true positives that are accurately determined is evaluated
by sensitivity.
Sensitivity = (TP) / (TP + FN) [6].
Accuracy: The result is accurate when the total amount of objects is divided by the
fraction of correctly detected components, which may include either true positives or
true negatives.
Accuracy = (TP + TN)/(TP + TN + FP + FN) [3]
340 P. Satapathy and P. K. Behera
Matthew’s Correlation Coefficient (MCC): The MCC is an useful statistic for eval-
uating the efficiency of binary classification models developed from unbalanced data. It
accepts a number between 1 and + 1, where + 1 stands for a perfect prediction, 0 for
an average random prediction, and √ -1 for an inverse prediction.
MCC = (TP × TN-FP × FN)/ ((TP + FN) (TP + FP) (TN + FP) (TN + FN))
[11]
Root Means Squared Error (RMSE): The percentage is determined by dividing the
difference between the predicted and real values by the total number of predictions.
This indicates that the RMSE is most useful when dealing with significant mistakes, the
majority of which
√ are unfavourable [12].
RMSE = ((p1- a1 )2 +…… + (pn − an )2 ))/n)
where a1, a2, and an are the real values and p1, p2, and pn are the predicted values
for test instances.
Kappa Statistic: The agreement between expected values and values that could be
expected by chance is measured using the kappa statistic. When there is no agreement
beyond chance, its values tend to be zero, and it approaches 1.0 when there is a very
high statistical association between the projected and actual category labels. High kappa
statistics and AUC values, as well as a low RMSE value, are characteristics of a successful
generalizable prediction model [11].
Akaike’s Information Criterion (AIC): AIC is used to choose the best models.
AIC = n log (∂ˆ 2 ) + 2(m + 1)
The model that achieves the lowest AIC is the best option, where n is the quantity of
training data, ∂ˆ2 = ∂ 2 /n is a mean squared error (MSE) between what was intended
to be achieved and what was actually achieved, and X = m + 1 is the number of total
parameters [13].
Here, we present our experimental results utilising several methodologies for machine
learning models and feature selection strategies that, in terms of accuracy with a minimal
amount of features, are most suited for the IoT environment. The goal of this experiment
is to see how well five classifiers (REPTree, LogitBoost, BayesNet, NB, and J48) can
find intrusions with high accuracy while only using a few features. For this, we’ve
Machine Learning-Based Hybrid Feature Selection 341
used the NSL-KDD [8] training and test dataset together with the Weka ML software
[5]. The examination was carried out on a computer running Microsoft Windows 11
and equipped with an AMD Ryzen 7 3700U processor, a Radeon Vega Mobile Gfx
graphics card clocked at 2.30 GHz, and 8 GB of RAM. Using the Weka tool’s 10-fold
cross-validation, we compared three different feature reduction strategies on the entire
NSL-KDD dataset for training purposes that was created following the pre-processing
stage (described in Sect. 2.2) and scored each feature. This phase’s goal is to not only
identify many useful qualities but also to eliminate the unimportant ones. In the second
step, we used 10-fold cross-validation to assess each classifier’s performance on 32
datasets that are subsets of the NSL-KDD dataset and were created using various feature
selection methods.
The results of the five classifiers using 10-fold cross-validation on the NSL-KDD dataset
are shown in Table 4 without the use of any feature reduction techniques. The research
reveals that REPTree had a detection accuracy of 99.78% and that the J48 classifier had
the highest rate of successful detection of 99.84%. Even though no feature reduction
strategies were employed, the results of the investigation make it abundantly evident that
the REPTree and J48 classifiers achieved the highest levels of accuracy when compared
to those of the BayesNet, NB, and LogitBoost classifiers.
Table 4. Evaluation of the five different classifiers with a 10-fold cross-validation procedure
Classifier Train Set Test Set TPR* FPR* Precision Recall F-Measure MCC
Accuracy Accuracy
BayesNet 96.59% 74.78% 0.966 0.038 0.967 0.966 0.966 0.933
J48 99.84% 81.60% 0.998 0.002 0.998 0.998 0.998 0.997
LogitBoost 97.10% 74.72% 0.971 0.030 0.971 0.971 0.971 0.942
REPTree 99.78% 78.72% 0.998 0.002 0.998 0.998 0.998 0.996
NB 90.09% 76.19% 0.901 0.103 0.902 0.901 0.901 0.801
TPR: True Positive Rate
FPR: False Positive Rate
Our method was compared to four other published methods that also employed the NSL-
KDD dataset with binary classification. The goal of this comparison was to validate the
efficacy of the strategy that we have suggested. Analysis revealed that the models gen-
erated through our approach are: (i) based on the dataset with 41 features ranked by
the ChiSquaredAttributeEval method with J48 classifier, shown to have better accuracy
342 P. Satapathy and P. K. Behera
(99.85%) than the model generated by Albulayhi et. al. (99.70%) [4]. (ii) dataset with
41 features ranked by InfoGainAttributeEval method with BayesNet classifier, shown to
have better accuracy (96.82%) than the model generated by Alabdulwahab et.al (94.89%)
[3]. (iii) dataset with 41 features ranked by ChiSquaredAttributeEval method with Log-
itBoost classifier, shown to have better accuracy (97.12%) than the model generated by
Alabdulwahab et.al (96.66%) [3]. (iv) dataset with 41 features ranked by ChiSquaredAt-
tributeEval method with REPTree classifier, shown to have better accuracy (99.77%) than
the model generated by Kumar et.al (97.02%) [14]. (v) dataset with 56 features ranked
by hybrid feature selection approach with NB classifier, shown to have better accuracy
(91.30%) than the model generated by Mahfouz et.al (90.41%) [6]. In order to provide
evidence for our assertion, we have included this comparison analysis of the NSL-KDD
dataset in Table 5.
Following the discussion in Sect. 3.3, we partitioned the NSL-KDD dataset into a
total of 32 different datasets using the ranking of feature reduction. During the first stage,
we used the ranker approach using IG, CS, and GR to determine the order in which the
features should be presented. Then, from the datasets that we had gotten after one hot
encoding, we eliminated the ten features with the lowest importance, and this procedure
is repeated until the lowest 80 attributes have been eliminated. As a consequence of this,
we now have 8 datasets, each of which has 41, 51, 61, 71, 81, 91, 101, 111 features from
one of three categories—namely, IG, CS, or GR—and one from our own hybrid method.
After that, each of the 32 datasets is put through training with five different classifiers,
resulting in a total of 160 different models. In a similar manner, we also prepare the test
datasets to contain the exact same number of characteristics as are found in the training
datasets. The next thing that we did was look at the true positive (TP), false negative
(FN), false positive (FP), and true negative (TN) values of 160 different models. We
calculate their sensitivity, specificity, precision, recall, f-measure, accuracy, Matthew’s
correlation coefficient, kappa statistic, root means squared error, mean squared error,
and Akaike Information Criterion based on the values of TP, FN, FP, and TN. The lower
the value of the AIC, the more accurate the model will be, which will help reduce the
complexity of the models, which will be very helpful for the IoT system.
Out of 160 models, the best model generated for each classifier (n = 5) chosen on
the basis of AIC [13] is depicted in Table 6. It is found that J48 performed well with an
accuracy of 99.855% having a model building time of 44.54 s using only 41 attributes
out of 121 attributes and using chi-squared feature reduction. REPTree achieved an
accuracy of 99.7746% having a model building time of 7.39 s with only 41 attributes out
of 121 attributes using chi-squared feature reduction. In spite of J48’s strong performance
in terms of detection accuracy, the amount of time required to construct its models is
significantly longer than that required by REPTree. REPTree performed well in terms of
specificity %, sensitivity %, and mean squared error as shown in Table 6. Among all, J48
performed well using only 41 features with chi-squared feature reduction. Our hybrid
approach which is the intersection of three feature reduction methods (IG, CS, and GR)
also performed well in BayesNet and REPTree classifiers. The J48 classifier significantly
performed well in terms of specificity %, sensitivity %, precision, recall, accuracy, mean
square error and the kappa statistic. Also, J48 outperformed by removing the lower 80
features out of 121 features using the CS attribute evaluation method. Because of this, we
strongly suggest that the J48 classifier be utilised for the purpose of intrusion detection
because it has an incredibly high levels of accuracy in detection while requiring just a
small number of features.
Figure 2 presents a comparison of the accuracy of the models we used in our analysis
when they were trained and when they were tested. This comparison reveals that both
J48 and REPTree achieved a high level of accuracy both during the training phase and
the testing phase.
344 P. Satapathy and P. K. Behera
Classifier Features FDT* Se* Sp* Precision Recall FM* AC* MCC* K* RMSE* MSE* AIC*
J48 41 CS 99.91 99.80 0.998 0.999 0.999 99.855 0.997 0.997 0.038 0.001 −825152
BayesNet 81 Our 99.40 94.39 0.953 0.994 0.973 97.066 0.942 0.941 0.162 0.026 −457952
hybrid
approach
LogitBoost 41 IG 97.86 96.25 0.967 0.979 0.973 97.107 0.942 0.942 0.149 0.022 −479911
REPTree 41 CS 99.84 99.70 0.997 0.998 0.998 99.775 0.995 0.996 0.045 0.002 −77955
NB 81 Our 94.91 86.88 0.893 0.949 0.920 91.172 0.824 0.822 0.290 0.084 −312148
hybrid
approach
FDT: Feature Reduction Techniques: Se: Sensitivity; Sp: Specificity; FM: F-measure; AC: Accu-
racy; MCC: Matthew’s correlation coefficient; K: Kappa statistic; RMSE: Root means squared
error; MSE: Mean squared error; AIC: Akaike information criterion;
Fig. 2. Train and Test accuracy of the best model among 160 models
Figure 3 displays the accuracy of each of the five classifiers after deleting the 80
attributes with the lowest rank.
Machine Learning-Based Hybrid Feature Selection 345
Figure 4 displays the accuracy of each of the five classifiers after removing the 10
attributes with the lowest rank. Thus, it is clear from our analysis that J48 and REPTRee
achieved good accuracy with only 41 attributes out of 121 attributes using the feature
reduction method. Meanwhile, REPTreee using our intersection approach of feature
reduction achieves a model building time of 7.7 s with 41 attributes and uses CS feature
reduction to achieve a model building time of 7.39 s. This research makes it very evident
that the method that we have suggested shortens the amount of time needed to develop
models while simultaneously reducing the number of attributes involved, all without
Fig. 4. Training accuracy of classifiers with 111 attributes using feature reduction
346 P. Satapathy and P. K. Behera
4 Conclusion
In this article, we describe a data analysis method for the purpose of detecting intrusions
into the Internet of Things system. The NSL-KDD training dataset was pre-processed,
then one-hot encoded, and then subsetted using three alternative feature reduction algo-
rithms. With the use of WEKA’s technologies, we were able to evaluate how well five
distinct machine learning classifiers performed on these datasets. The individually cre-
ated models were ranked based on the values of the Akaike Information Criterion (AIC),
which takes into consideration both MSE and the amount of features that were utilised to
generate the model. It was observed that the model that was created by employing 41 fea-
tures, and then ranked by CS algorithm while using J48 classifier, was the best model.
This model had the lowest AIC value of -825152, and it had an accuracy of 99.855.
We compared our findings with those of four existing approaches and discovered that
the J48 classifier performed well when compared to other classifiers while utilising the
chi-squared feature reduction method with an accuracy of 99.8555%. The J48 classifier
outperformed the challenge by achieving a detection accuracy of 99.7817% by utilising
our hybrid feature reduction with 22 attributes. As a result, the accuracy of the model has
been increased, and the rate of false positives that our proposed method generates has
also been found to be minimal. In the future, we plan to extend our ML-based framework
to numerous datasets with multiclass classification, and we also plan to create a deep
learning-based framework for intrusion detection. Both of these things will take place
in the future.
Acknowledgments. I extend my acknowledgment for the financial assistance from the UGC, New
Delhi, in the form of Junior Research Fellowship (JRF) and Department of Computer Science and
Applications, Utkal University for providing me an opportunity to pursue my PhD work.
References
1. Ahanger, A.S., Khan, S.M., Masoodi, F.: An effective intrusion detection system using super-
vised machine learning techniques. In: 2021 5th International Conference on Computing
Methodologies and Communication (ICCMC). IEEE (2021)
2. Bandyopadhyay, S., et al.: A Decision Tree Based Intrusion Detection System for Identifica-
tion of Malicious Web Attacks (2020)
3. Alabdulwahab, S., Moon, B.: Feature selection methods simultaneously improve the detection
accuracy and model building time of machine learning classifiers. Symmetry 12(9), 1424
(2020)
4. Albulayhi, K., et al.: IoT intrusion detection using machine learning with a novel high
performing feature selection method. Appl. Sci. 12(10), 5015 (2022)
5. Frank, E., et al.: Weka-a machine learning workbench for data mining. In: Data Mining and
Knowledge Discovery Handbook, pp. 1269–1277. Springer (2009). https://doi.org/10.1007/
978-0-387-09823-4_66
Machine Learning-Based Hybrid Feature Selection 347
6. Mahfouz, A.M., Venugopal, D., Shiva, S.G.: Comparative analysis of ML classifiers for net-
work intrusion detection. In: Yang, X.-S., Sherratt, S., Dey, N., Joshi, A. (eds.) Fourth interna-
tional congress on information and communication technology. AISC, vol. 1027, pp. 193–207.
Springer, Singapore (2020). https://doi.org/10.1007/978-981-32-9343-4_16
7. Shaukat, S., et al.: Intrusion detection and attack classification leveraging machine learning
technique. In: 2020 14th International Conference on Innovations in Information Technology
(IIT). IEEE (2020)
8. Tavallaee, M., et al. A detailed analysis of the KDD CUP 99 data set. in 2009 IEEE symposium
on computational intelligence for security and defense applications. 2009. Ieee
9. Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine
learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (IJERT) 2(12), 1848–
1853 (2013)
10. Choudhury, S., Bhowal, A.: Comparative analysis of machine learning algorithms along with
classifiers for network intrusion detection. In: 2015 International Conference on Smart Tech-
nologies and Management for Computing, Communication, Controls, Energy and Materials
(ICSTM). IEEE (2015)
11. Sarangi, A.N., Lohani, M., Aggarwal, R.: Prediction of essential proteins in prokaryotes
by incorporating various physico-chemical features into the general form of Chou’s pseudo
amino acid composition. Protein Pept. Lett. 20(7), 781–795 (2013)
12. Joshi, M., Hadi, T.H.: A review of network traffic analysis and prediction techniques. arXiv
preprint arXiv:1507.05722 (2015)
13. Karegowda, A.G., Jayaram, M., Manjunath, A.: Combining Akaike’s information criterion
(AIC) and the golden-section search technique to find optimal numbers of k-nearest neighbors.
Int. J. Comput. Appl. 2(1), 80–87 (2010)
14. Kumar, K., Batth, J.S.: Network intrusion detection with feature selection techniques using
machine-learning algorithms. Int. J. Comput. Appl. 150(12) (2016)
15. Kumar, G., Thakur, K., Ayyagari, M.R.: MLEsIDSs: machine learning-based ensembles for
intrusion detection systems—a review. J. Supercomput. 76(11), 8938–8971 (2020). https://
doi.org/10.1007/s11227-020-03196-z
16. Gudla, S.P., Bhoi, S.K., Nayak, S.R., Verma, A.: DI-ADS: a deep intelligent distributed denial
of service attack detection scheme for fog-based IoT applications. Math. Probl. Eng. 8, 2022
(2022)
17. Gudla, S.P.K., Bhoi, S.K.: MLP deep learning-based DDoS attack detection framework for
fog computing. In: Rout, R.R., Ghosh, S.K., Jana, P.K., Tripathy, A.K., Sahoo, J.P., Li, K.-C.
(eds.) Advances in Distributed Computing and Machine Learning: Proceedings of ICADCML
2022, pp. 25–34. Springer Nature Singapore, Singapore (2022). https://doi.org/10.1007/978-
981-19-1018-0_3
18. Thaseen, I.S., Kumar, C.A.: Intrusion detection model using fusion of chi-square feature
selection and multi class SVM. J. King Saud Univ. Comput. Inf. Sci. 29(4), 462–472 (2017)
Application of Efficient Feature Selection
and Machine Learning Algorithms in Mental
Health Disorder Identification
1 Introduction
More than half of the population in different technical companies are likely suffering
from mental disorder at least once during their lifetime. Depression which affects 350
million people globally suggested by World Heath Organization (WHO) (Breiman1984).
Majority of people required treatment for depression may not be provided as per the
report of WHO. In the United States, one of the most common mental health condition
(Cuellar et al. 2005) is major depressive disorder (MDD). MDD, also referred to as
clinical depression, is a significant medical condition that can affect many areas of your
life. More than 264 people of all age globally suffering from MDD according to world
health organization (WHO Mental-disorders 2019). The combination of genetic and non-
genetic characteristics in AD is the diversity of MDD. A recent study which combines
clinical predictors and gene study variants like rs6313 of 5-hydroxytryptamine (sero-
tonin) receptor 2A (HTR2A), rs7430 of protein phosphatase 3 catalytic subunit gamma
isozyme (PPP3CC), and rs6265 of brain-derived neurotrophic factor (BDNF) from the
European Group for the Study of Resistant Depression (GSRD). A Random forest model
reaching accuracy of above 79% (Kautzky et al. 2015) and in other investigation where
a series of linear and logistic elastic net regularized regression (ENRR) models is used
for training to achieve accuracy of 25% (Aitchison et al., 2005). The different protein
level platelet has been shown among different MDD patients (Huang et al., 2014). The
peripheral marker genes are considered for alzheimer’s disease whereas Visinin-like
1 (VSNL1) has found co-expression with calcium for AD and long term depression
(Patel et al. 2015) have worked to separate the late-life depression (LLD) patients from
the normal patients for which a decision tree derived from structural imaging, age and
mini-mental status examination scores and achieve an accuracy of 89%.
In feature selection process, the subset of features is selected from the larger dataset
of original features. The feature selection steps include data quality, less computational
time for prediction of model, predictive performance improvement and efficiency in data
collection process. (Muhammad Salman et al. 2022) used filter-based feature selection
technique named as ANOVA-f (Analysis of Variance test) to determine the most impor-
tant features. In multi linear regression analysis, depression risk is set as target variable
and for predicting the depression the context variables are set as independent variables
(Zhang 2006). The two-class problem which was proposed to solve the SVM-RFE for
analysis of multi class problems (Mundra et al. 2010, Xiaohui Lin et al. 2017). This multi
class problem for feature selection increase the robustness of SVM-RFE, by removing
the number of features with the lowest weights. Rather than removing the features one
by one which is time consuming, the author has (X.G. Zhan, X.H. Lin 2015) proposed
R-SVM & F-SVM to remove the noise in the data. They have followed a method AV-MI,
perform to remove the noisy variable, and achieve high specificity and sensitivity. Fea-
ture selection process used in this paper (John scott 2018) are 10-fold cross validation
which is used to run 10 times for validation. There are 100 features subsets that computed
from the research and the feature are ranked according to their descending order. The
top ranked feature is the most necessary one selected by using PCA plotted graph on the
liver disease data set and selected 34 ion features.
In few cases, few samples of three liver disease are mixed due to noise and non-
informative variable where MI-SVM-RFE is very constructive for obtaining the selective
features. It is showing three different liver disease are clearly separated by using two
intercept method- R2 intercept and Q2 intercept (Xiaohui Lina 2012). In the process of
selecting the feature to remove the noise method used is MI-SVM-RFE, which is most
popular method to select the significant features and to validate the proposed model. SVM
and CRT model developed to predict the response and remission to duloxetine utilizing
genome-wide genetic dataset but for selecting the features, the LASSO regression was
used. LASSO model is used to predict the response or remission with the accuracy.
350 S. Mallick and M. Panda
Finally, an optimal model was evaluated on the test subset of data with the nested cross-
validation (Patel et al. 2015). The growing body of literature which addresses the role
of social networks such as breakup relationship, mental illness (‘depression’, ‘anxiety’,
‘bipolar’ etc.) (Azorin 2013, Almeida 2010).
The paper is further organized as follows: Sect. 2 elaborates the background works
given by the authors related to mental health illness, Sect. 3 generate a heat map of the
dataset considered for the research, Sect. 4 proposes the mathematical modeling of the
feature selection techniques, Sect. 5 discusses the experimental setup and implementa-
tion, Sect. 6 shows the results and discussions, and Sect. 7 deals with the conclusion for
better analysis and classification with future models.
2 Background
the diagnosis and prevention of disease. This study was also carried out in the area
of toxicology and pharmacology, crop breeding plant biotechnology and drug research
(Aitchison 2005). The emerging field of metabolomics can improve and explore the
mechanism of cancer.
Data was collected from patients who are suffering from chronic hepatitis B (CHB),
cirrhosis (CIR), and hepatocellular carcinoma (HCC) of Sixth People’s Hospital (Aitchi-
son 2005). Each patient data was collected from MRI scan, ultrasonography, CT scan and
tumor markers test and the classification accuracy rate is computed firstly by comparing
SVM-RFE-OA with SVM-RFE. To determine the performance of the SVM-RFE-OA,
it shows that it performs outstanding for all the eight biological datasets (Xiaohui Lin
2017). The performance of the M-SVM-RFE-OA compared with SVM-RFE-OA was
computed by performing the classification and determining the high-value features.
Ultimately, it is observed that the M-SVM-RFE-OA performs better (John Scott).
3 Data Exploration
Data exploration is the study and correlation of huge amount of data in an easiest way for
visualization. Understanding the structure and exploring data to identify how features are
distributed and whether there is a link within the dataset. In the below Fig. 1, correlation
within the variable is observed between the dependent variable and independent variable
are depicted in this graph. it is also explained the columns in the dataset are correlated
and linked between the columns of the dataset.
Fig. 1. The correlation values for employee in Tech survey features datasets.
F1 = {f48, f29, f46, f21, f47, f18, f17, f9, f4, f8, f22, f36, f8, f34, f39, f37, f42, f49, f43, f31}
F2 = {f43, f2, f46, f39, f37, f41, f9, f42, f34, f40, f29, f31, f49, f48}
Each feature f ∈ F2 ⊆ N refer to a single feature, where {f43: “age”, f2: “comp_no_
empl”, f46: “live_us_teritory”, f39:” ‘mh_diagnos_proffesional’,f37:” ‘mh_disorder_
past’,f41:” ‘mh_eff_treat_impact_on_work’,f9:” ‘ ‘mh_medical_leave’,f42:” ‘mh_not_
eff_treat_impact_on_work’,f34:” ‘mh_sharing_friends/fam_flag’,f40: ‘mh_sought_
proffes_treatm’,f29: ‘why/why_not’,f31: ‘why/why_not2’,f49: ‘work_position’, f48:
“work_us_teritory”}.
F3 = {f43, f39, f37, f41, f42, f34, f29, f31, f49, f46}
Application of Efficient Feature Selection and Machine Learning Algorithms 355
F4 = {f9, f43, f22, f21, f17, f41, f39, f36, f2, f49, f31, f42, f8, f38, f4, f18, f46, f47, f48, f40, f29, f34}
F1 ∩ F2 ∩ F3 = {f ∈ N | f ∈ F1 , f ∈ F2 and f ∈ F3 }
F6 = {f49, f48, f43, f37, f29, f31, f42, f34, f41, f39}
We have implemented with 10 best features of RFE and 10 classification algorithms such
as Naive Bayes, Stochastic Gradient Descent, KNN, Decision trees, Random Forest,
Support Vector Machine, Logistic Regression, Neural Nets, Cross Gradient Booster and
Cross Gradient Booster (Random Forest) to find the accuracy, recall and precision. The
accuracy of Random Forest and Cross Gradient Booster (Random Forest) is more than
78%, the recall of Naive Bayes and Random Forest is more than 74% and the precision
of Random Forest and Cross Gradient Booster (Random Forest) is more than 77%.
Considering best 10 features of tech survey dataset, the accuracy, recall and precision
of Random Forest and Cross Gradient Booster (Random Forest) is better than all other
machine learning algorithms shown in Table 1.
358 S. Mallick and M. Panda
The best subset of features are selected and the unimportant features are eliminated that
are not contributing to the accuracy of the model from the dataset. We have implemented
three algorithms for feature selection i.e. RFE, RFECV and LASSO to calculate the
feature score with respect to targeted variable. The target class feature for this research is
mh_disorder_current which leads to find the percentage of technical people gets mental
illness compared to non technical people in the tech survey dataset. By using RFE,
Application of Efficient Feature Selection and Machine Learning Algorithms 359
RFECV and LASSO algorithms, the best features are extracted and shown in the Table 1
given above. The results are computed from the best features of RFE, RFECV and
LASSO algorithms by using ten machine learning algorithms called as Naive Bayes,
Stochastic Gradient Descent, KNN, Decision trees, Random Forest, Support Vector
Machine, Logistic Regression, Neural Nets, Cross Gradient Booster and Cross Gradient
Booster (Random Forest) to find the accuracy, recall and precision. The Table 2 is
prepared as an aggregated accuracy, recall and precision to visualize the importance of
the classification algorithms with respect to the feature selection methods.
Table 2. Aggregated Accuracy, Recall and Precision considering the best features
Table 2. (continued)
Table 2. (continued)
The accuracy of LASSO feature selection with Cross Gradient Booster (Random
Forest) is around 79% which is best among all other classification algorithms but Naive
Bayes and Random Forest also performs well in this scenario. The accuracy of RFE
feature selection with Cross Gradient Booster (Random Forest) is around 79% which is
best among all other classification algorithms but Naive Bayes and Random Forest also
performs well in this scenario. The accuracy of RFECV feature selection with Random
362 S. Mallick and M. Panda
Forest is around 79% which is best among all other classification algorithms but Naive
Bayes and Cross Gradient Booster (Random Forest) also performs well in this scenario.
The classification accuracy of Cross Gradient Booster (Random Forest) is more than 78%
with feature selection using associative property of union, The classification accuracy of
Cross Gradient Booster (Random Forest) is 79% with feature selection using associative
property of intersection, and the classification accuracy of Random Forest is 79% with
feature selection using distributive property. We have concluded that Cross Gradient
Booster (Random Forest) performs very well among all the classification algorithms
among all the feature selection algorithms. The prediction for the mental health illness
in tech survey dataset for technical people compared to non technical people is 79%.
The recall of LASSO feature selection with is around 74% which is best among all
other classification algorithms but Naive Bayes and Cross Gradient Booster (Random
Forest) also performs well with nearer value. Similarly the recall of RFE feature selection
with Random Forest is around 74% which is best among all other classification algo-
rithms but Naive Bayes and Cross Gradient Booster (Random Forest) also performs well
with nearer value. The recall of RFECV feature selection with Cross Gradient Booster
(Random Forest) is around 77% which is best among all other classification algorithms,
but Random Forest also performs well. The recall of Cross Gradient Booster (Random
Forest) is more than 73% with feature selection using associative property of union,
the recall of Cross Gradient Booster (Random Forest) is 74% with feature selection
using associative property of intersection, and the recall of Naïve Bayes is 74% with
feature selection using distributive property. We have concluded that Cross Gradient
Booster (Random Forest) performs very well among all the classification algorithms
with RFECV feature selection algorithm is 77%. The recall for the mental health illness
in tech survey dataset for technical people compared to non technical people is 77%. It
means, the model correctly identifies 77% technical people have mental illness disease
in the organization.
The precision of LASSO feature selection with Cross Gradient Booster (Random
Forest) is around 77% which is best among all other classification algorithms but Naive
Bayes also performs well with nearer value. Similarly the precision of RFE feature selec-
tion with Cross Gradient Booster (Random Forest) is around 77% which is best among
all other classification algorithms but Random Forest also performs well. The precision
of RFECV feature selection with Random Forest is around 77% which is best among
all other classification algorithms but Cross Gradient Booster (Random Forest) also per-
forms well in this scenario. The precision of Cross Gradient Booster (Random Forest)
is 77% with feature selection using associative property of union, the precision of Cross
Gradient Booster (Random Forest) is 78% with feature selection using associative prop-
erty of intersection, and the precision of Cross Gradient Booster (Random Forest) is 77%
with feature selection using distributive property. We have concluded that Cross Gradi-
ent Booster (Random Forest) performs very well among all the classification algorithms
with feature selection using associative property of intersection is 78% but RFECV with
Random Forest, Cross Gradient Booster (Random Forest) with feature selection using
associative property of union and Cross Gradient Booster (Random Forest) with feature
selection using distributive property also performed well with nearer value. The preci-
sion for the mental health illness in tech survey dataset for technical people compared
Application of Efficient Feature Selection and Machine Learning Algorithms 363
to non technical people is 78%. It means, the classification model predicts the technical
people have mental illness disease is correct 78% of the time.
7 Conclusion
We proposed a healthcare system for mental health disorders that can perform better with
better feature selection algorithms. Though mental illness is a chronic illness, the results
are compared by implementing various machine learning algorithms with respective
feature selection algorithms for accurate predictions and justifying the suitability of the
algorithms. The research was carried out with 61 features, 3 feature selection algorithms,
and by implementing 10 classification algorithms. The accuracy of the classification
algorithms is evaluated and the better accuracy with Cross Gradient Booster (Random
Forest) with all feature selection algorithm is found to be 79%. Therefore, considering
a workplace, the inference drawn is 79% of technical people are predicted that they
suffer from mental health illness disease according to the tech survey dataset. We have
calculated the recall with all ten classification algorithms with the best features using
feature selection algorithms and the model correctly identifies 77% of technical people
who have mental illness disease in the organization. We have calculated the precision with
all ten classification algorithms with the best features using feature selection algorithms
and the model predicts that the technical people who have mental illness disease is
identified as correct 77% of the time. In the future, we will implement a model that
considers various operations on feature selection algorithms by classifying the mental
health disease prediction.
References
Skaik, R., Inkpen, D.: Using social media for mental health surveillance: a review Canada. ACM
Comput. Surv. 53(6), 1–31 (2021). https://doi.org/10.1145/3422824. University of Ottawa
(2020)
Cuellar, A.K., Johnson, S.L., Winters, R.: Distinctions between bipolar and unipolar depression.
Clinical Psychol. Rev. 25(3), 307–339 (2005)
Kautzky, A., et al.: The combined effect of genetic polymorphisms and clinical parameters on
treatment outcome in treatment-resistant depression. Eur. Neuropsychopharmacol. 25(4), 441–
453 (2015)
Aitchison, K.J., Basu, A., McGuffin, P., Craig, I.: Psychiatry and the ‘new genetics’: hunting for
genes for behaviour and drug response. Br. J. Psychiatr. 186, 91–92 (2005)
Huang, T.L., Sung, M.L., Chen, T.Y.: 2D-DIGE proteome analysis on the platelet proteins of
patients with major depression. Proteome Sci. 12(1), 1 (2014)
Patel, M.J., Andreescu, C., Price, J.C., Edelman, K.L., Reynolds, C.F., Aizenstein, H.J.: Machine
learning approaches for integrating clinical and imaging features in late-life depression
classification and response prediction. Int. J. Geriatr. Psychiatr. 30(10), 1056–1067 (2015)
Pathan, M.S., Nag, A., Pathan, M.M., Deva, S.: Analyzing the impact of feature selection on the
accuracy of heart disease prediction (2022). arXiv:2206.03239v1
Sachan, S., Almaghrabi, F., Yang, J.-B., Xu, D.-L.: Evidential reasoning for preprocessing uncer-
tain categorical data for trustworthy decisions: an application on healthcare and finance. Expert
Syst. Appl. 185(2021), 115597 (2021)
364 S. Mallick and M. Panda
Guyon, I., Weston, J., Barnhill, S., et al.: Gene selection for cancer classification using support
vector machines. Mach. Learn. 46(1–3), 389–422 (2022)
Almeida, J.R., Versace, A., Hassel, S., et al.: Elevated amygdala activity to sad facial expressions:
a state marker of bipolar but not unipolar depression. Biol. Psychiatr. 67(5), 414–421 (2010)
Mundra, P.A., Rajapakse, J.C.: SVM-RFE with MRMR filter for gene selection. IEEE Trans.
Nanobiosci. 9, 31–37 (2010). CrossRef PubMed
Lin, X., Li, C., Zhang, Y., Su, B., Fan, M., Wei, H.: School of Computer Science and Technology,
Dalian University of Technology, Dalian. Selecting Feature Subsets Based on SVM-RFE and
the Overlapping Ratio with Applications in Bioinformatics (2017). https://doi.org/10.3390/mol
ecules23010052
https://methods.sagepub.com/book/social-network-analysis-4e/i829.xml
Polat, Ö.: A robust regression based classifier with determination of optimal feature set. J. Appl.
Res. Technol. 13(4), 443–446 (2015)
Scott, J.: https://methods.sagepub.com/book/social-network-analysis-4e/i829.xml. https://doi.
org/10.4135/9781529716597.n9
Islam, M.R., Kabir, M.A., Ahmed, A., Kamal, A.R.M., Wang, H., Ulhaq, A.: Depression detection
from social network data using machine learning techniques. Health Inf. Sci. Syst. 6(1), 1–12
(2018). https://doi.org/10.1007/s13755-018-0046-0
Azorin, J.M., et al.: Characteristics and profiles of bipolar I patients according to age-at-onset:
findings from an admixture analysis. J. Affect. Disord. 150, 993–1000 (2013)
Yu, Y., et al.: How to conduct dose-response meta-analysis by using linear relation and piecewise
linear regression model. J. Evid. Based Med. 16(1), 111–114 (2016)
Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning: Data Mining,
Inference, and Prediction. SpringerVerlag, New York (2001)
Okser, S., Pahikkala, T., Airola, A., Salakoski, T., Ripatti, S., Aittokallio, T.: Regularized machine
learning in the genetic prediction of complex traits. PLoS Genet. 10(11), e1004754 (2014)
Breiman, L., Friedman, J.H., Olshen, A., Stone, C.J.: Classification and Regression Trees.
Wadsworth Publishing Company, Belmont, California, USA (1984)
Lin, X., et al.: A support vector machine-recursive feature elimination feature selection method
based on artificial contrast variables and mutual information. J. Chromatography B 910, 149–
155 (2012). https://doi.org/10.1016/j.jchromb.2012.05.020
Dudek, D., Siwek, M., Zielinska, D., et al.: Diagnostic conversions from major depressive disorder
into bipolar disorder in an outpatient setting: results of a retrospective chart review. J. Affective
Disorders 144(1–2), 112–115 (2013)
World Health Organization (WHO). Mental Disorders (2019). WHO. https://www.who.int/news-
room/fact-sheets/detail/mental-disorders
Pathan, M.S., Nag, A., Pathan, M.M., Deva, S.: Analyzing the impact of feature selection on the
accuracy of heart disease prediction (2022). arXiv:2206.03239v1
Zhang, X.G., et al.: Recursive SVM feature selection and sample classification for mass-
spectrometry and microarray data. BMC Bioinformatics 7, 197 (2006). https://doi.org/10.1186/
1471-2105-7-197
Zhang, Y., Zhou, Y., Zhang, D., Song, W.: A stroke risk detection: improving hybrid feature
selection method. J. Med. Internet Res. 21(4), e12437 (2019). https://doi.org/10.2196/12437
A Survey on Sentimental Analysis of Student
Reviews Using Natural Language Processing
(NLP) and Text Mining
1 Introduction
The current educational system offers a large E-Learning platform that enables students
to learn new information and abilities. It also offers a means of enhancing the teaching
and learning process through the analysis of feedback or Comments in order to take
better decisions. Sentiment analysis has been widely used for a variety of objectives in
numerous application fields. When taking into account customer ratings, social media
monitoring, and other factors, the education sector should be given priority. It is very
important to make a proper analysis of textual data as the data collected is unstructured.
Sentimental Analysis is used for analyzing the positive, negative and neutral sentiments
of user’s opinion. This uses the concept of Natural Language Processing and text analysis
to analyze user’s sentiment using tweets, comments, reviews posted. By analyzing the
context it identifies the sentiment of users and it helps them to makes some changes for
better approach and make users to meet their needs. Sentiment analysis can be carried
out at the word, sentence, or document level. Because handling these reviews manually
is difficult due to the large amount of data, automatic processing is required.
The popularity and importance of students feedback have also increased recently
especially during COVID-19 when compared to movie reviews or tweets (Santos,
Cicero, & Gatti, 2014.), With a few notable exceptions, who examined the connection
between a ratio based on the positive and negative phrases in the postings and dropout
(Wen, 2014.). There are very few contributions in the domain of MOOCs and educa-
tion evaluations. Additionally, neither a defined strategy for handling sentiment analysis
in MOOCs nor a comparison of various methodologies exist nor role of teachers has
surprisingly shifted over the years. Teachers must now not only get familiar with new
tools, but also keep up with cutting-edge technology. The skeleton of any educational
system is its teachers. A teacher’s effectiveness is judged not just by his or her academic
qualifications, but also by skill, and commitment. Feedback at regular intervals is con-
sidered as a most effective approach for a teacher to improve teaching methodologies.
Feedback might be an open-ended or closed-ended as they are loaded with observations
and insights, open ended textual feedbacks are difficult to examine manually and draw
conclusions.More number of research are being carried out in identifying sentimental
Analysis and Opinion mining. To be specific opinion mining helps teachers to evaluate
the attitudes and behavior of students towards specific subject, platforms and teachers.
Machine Learning (Baidal, Karen, Carlota, & Vera, 2018) and Deep Learning algo-
rithms are used to identify the meaning behind the reviews and it focuses on polarity
i.e., positive, negative, or neutral. Machine Learning is classified as supervised or unsu-
pervised, whereas the Lexicon-based approach analyses and identifies the scores for the
phrases already assigned, and it is used to identify the polarity. As shown in Fig. 1. It is
divided into two approaches: dictionary-based and corpus-based, (Bhalla, 2022) which
use semantic approaches or statistical methods to identify sentiment polarity. If the
dataset is small, algorithms such as Naive Bayes, Support Vector Machines, and Ran-
dom Forest are used to find polarization. Deep Learning concepts like Convolutional
Neural Networks (CNN), Recurrent Neural Networks (RNN), and Long Short-Term
Memory Networks (LSTM) have also contributed a lot to Natural Language Processing
(NLP).
This study aims to provide a comprehensive comparison between various approaches
in ML and DL in detecting the polarity of sentiments behind students’ feedback based
on various datasets. Students’ feedback is viewed as an effective tool in this research
paper that provides valuable insights when compared to other entities such as courses,
A Survey on Sentimental Analysis of Student Reviews Using 367
Naïve Bayes
Machine learning
Deep Learning
Decision Tree
Convolutional
Neural Network
K-Nearest
Neighborhood Dictionary
Approach
Lexicon-based
Recurrent Neural Based
Network Approach
Random Forest
Deep belief Corpus
Logistic Network
Based
Regression Approach
Feed Forward
Support Vector Neural etwork
Machines
institutions, and so on. The analysis here is based on students’ perspectives, taking into
account all aspects of teaching and learning, including the course, teaching methodology,
course structure, assessment, teachers’ knowledge, behavior, and presentation, among
others. During the last five years, the majority of articles published focused on gathering
opinions and attitudes toward teachers, with only a few papers focusing on institution-
related questions and some on general feedback. According to the literature review,
a greater number of papers focus on gathering opinions and thoughts about student
attitudes toward teachers.
(Kandhro, 2019) that divides the results of predictions into True Positive (TP), True
Negative (TN), False Positive (FP) and False Negative (FN).
Sentimental Analysis is used to measure, analyze, report, and predict data about
learners to optimize teaching and learning. Here, a method is developed to determine
whether the learner is satisfied with the learning experience. Initially, data is collected
from Amazon, Yelp, and IMDB to find similar characteristics in data. (Omar, 2020) In the
second phase, data transformation takes place. Preprocessing includes tokenization, case
conversion, normalization, stemming, transliteration, and removal of irrelevant content.
During the third phase, data is processed using lexicon and ML classifiers such as Naive
Bayes, Decision Trees. After evaluation, the best approach is selected to know the actual
feedback collected towards the E-Learning environment. Finally, VADER yields the best
results when compared to other approaches, and it is applied in an e-learning environment
to get the best results.
A comparative analysis was carried out with 140 responses collected through Google
forms (Fahmi, 2020). For the best results, Multinomial Nave Bayes, Support Vector
Machine, and Random Forest with unigram and bi-gram were compared. In both cases,
the Multinomial Naïve Bayes classifier produced the best results of 80% when compared
with the Support Vector Machine and Random Forest. A hybrid architecture, combination
of keyword-based components and learning system components, is used to detect hidden
phrase patterns, used to identify syntactic and semantic details, and emotion prediction
is identified based on the knowledge-rich linguistic resources and trained classifiers.
Initially, text is tokenized and split into sentences.
(Dsouza, 2019) POS Tagger is used to annotate information by identifying verbs
and nouns. This content is provided as input for Emotion Intelligence PR, followed by
Machine Learning PR. Finally, it predicts the emotions by building a training model and
applying it. So the output obtained from the keyword-based component acts as an input
for the learning-based component. Here, a hybrid-based architecture is used to detect
emotion that has been validated with experimental results.
An international questionnaire Turkish Tale dataset (Binali, 2010) is used to identify
the sentiments where the data in tales were split into paragraphs and sentences, and
typo errors were also corrected using the Zemberek Library. In supervised machine
learning approaches, multinomial, logistic regression, and Gaussian NB were used. Due
to insufficient data, results were not accurate, and the dataset was improved with more
data to get better accuracy. A final result with 75% accuracy was also obtained using the
Logistic Regression algorithm.
Students’ feedback from Vietnam universities was collected through surveys and
collected feedback was classified into sentiment-based tasks and topic-based tasks, and
labelling was done (Osmanoğlu, 2020). The vntokenizer tool is used for tokenization,
and Maximum Entropy and Naïve Bayes algorithms are compared here. Finally, MaxEnt
performs well when compared to Naïve Bayes with both tasks in corpus.
The research work (Almalki, 2022) used a twitter dataset in the distance learning
domain for identifying sentiments. Using the Twitter API or third-party libraries, data
scraping is done. The API extracted nearly 14,000 tweets and preprocessing is done.
Apache Spark is used for parallel computing, and the Flask API is used for identifying
the sentiments behind Arabic tweets. Finally, Logistic Regression produced an accuracy
A Survey on Sentimental Analysis of Student Reviews Using 369
of 91%. An approach (Nimala, 2021) collected feedback from around 4895 students and
compared it with four different models like STM,ETM, SWAT, and ET were constructed,
and STM has an accuracy of 86.5 and produced better results compared to other models.
Another model uses the Movie Review dataset to build a model that analyses sen-
timents.The initial model was trained with a 50% manually annotated dataset in the
Hindi language (Rani, 2019) and the experimental results are compared with other ML
approaches, but the proposed CNN model overcomes the performance of other models
and achieves 95% accuracy. The next model uses Deep Learning NN and Applied CNN
on the Lithuanian Internet Comment dataset (Kapočiūtė-Dzikienė, 2019) to analyse the
emotions behind the dataset. It is built on Word2Vec and FastText word embedding. So
the best results were reported with 70.6% accuracy using CNN. So it works better and
produces good results if the dataset is very small.
It was suggested to use an attention-based LSTM model that includes aspect infor-
mation. A novel model was developed to predict the sentiment score of financial opinion
mining and categorise it into a particular pre-defined class. The LSTM layers maintain
the intermediate output to link it to the final distribution representation and take the word
embedding as input. (Shijia, 2018) Additionally, 504 news headlines and 675 microblog
messages are included in the dataset utilised for the experiment. In addition, there were
27 classification labels and an emotion score scale from -1 to 1. The neural network
used the word2vec model as an input for word embedding. A number of deep learning
models were compared, and the results showed that ALA performed the best.
To present a sentiment lexicon (Chen, 2020) established a sentiment analysis frame-
work based on a deep neural LSTM network. The information was created using the
Military Life PTT board from Taiwan’s largest internet forum. The testing findings
demonstrated that the suggested framework’s accuracy and F1-measure were higher
than the results obtained by employing solely existing sentiment dictionaries. LSTM is
used to create a sentiment analysis model for the Roman Urdu language (Ghulam, 2019),
When compared to other machine learning algorithms, the testing findings demonstrated
significant accuracy.
A work that compared five Machine Learning techniques (Altrabsheh, 2014) using
Naïve Bayes, Complement Naïve Bayes, Maximum Entropy, and Support Vector
Machines that automatically analyse the student’s feedback in real-time with a mini-
mum time. Preprocessing is done to remove stop words, punctuation, and numbers, case
conversions and spell checking have been done for a collected 1036 instances. Here,
data is collected in two different ways: real-time collection of feedback in lectures and
end-of-unit feedback. Naive Bayes will not work with uneven datasets and Complement
NB addressed this problem and produced better results where the Naive Bayes algorithm
was implemented in R and CNB was implemented in Weka. Maximum Entropy finds
the weights of features that maximise the likelihood using search-based optimization.
Its performance is very poor when dealing with real-time problems. Support Vector
Machines is effective in text categorization and SVM Radial Basis Kernel works well
with Natural Language Processing (NLP) and it is flexible to use in experiments, SVM
performed better compared to NB. Maximum Entropy performed better for neutral class
results without change in F1-Score, precision, and recall and also prevents over fitting.
370 J. Jayasudha and M. Thilagu
1036 responses were collected, and 641 cases were positive and 292 cases were con-
sidered negative. (Ullah, 2016) After several preprocessing steps, Maximum Entropy
and Support Vector Machines perform well, and the possibility of including more
preprocessing will result in a better outcome.
A model is built with different layers that use the data collected from students of
Vietnam University (Sangeetha, 2021). The inputs are trained using embedding models
such as Glove and Cove, and the output features are fed into the encoding layer. Next,
the output of the encoding layer is fed into a dropout layer that prevents over fitting. The
results of these dropout layers are combined using LSTM, which produces only minimum
features. Finally, everything will be fed into the dense layer for producing output. This
new architecture is less error-prone when compared to the other three models: LSTM
with 86%, LSTM with Attention with 87%, Multi-head LSTM with Attention with 90%,
and the proposed model with 94% accuracy.
MOOC reviews have been collected from Coursera and a framework has been pro-
posed for aspect-based sentimental analysis.This model identified the critical factors that
determine the effectiveness of online courses and also the attitude of students. With key-
words and manually annotated reviews, the proposed framework (Kastrati Z. I., 2020)
is being tested and validated against datasets using LSTM and CNN. LSTM with glove
performed well, with an F1-Score of 86.13%.
Two algorithms have been compared to analyse the Twitter data based on hashtag
keywords and compared the performance with Recurrent Neural Network and Support
Vector Machine through R-Tool. SVM and RNN have been carried out with a sample
of 20, 50, and 600 tweets, Recurrent Neural Network produced better results compared
to Support Vector Machine (Kaur, 2021). Even though Machine Learning and lexicon-
based approaches are used in feedback analysis, Deep Learning methods propose a
better and more efficient system that uses Word2Vec for text processing, CNN (Asmita
S, Anuja T, & Ash, 2019) for automatic feature extraction, and final classification is done
using Support Vector Machine. So, Deep Learning can be used in the education domain
to classify the strengths, weaknesses, and suggestions for a trainer. Various datasets
from Twitter sentiment, the sentiment Tree bank, and online movie reviews (Rojas-
Barahona, 2016) were considered and applied to various Deep Learning architectures
such as convolutional, recurrent, and combined methods. Both fine-grained and binary
classification have been carried out, and comparatively, CNN performs well in polarity
detection compared to supervised models.
3 Methodology
3.1 Datasets
Most of the related research findings identified a few important aspects regarding the
teaching-learning process, including students’ opinions about teaching, institutions, and
courses. So a study was carried out nearly using more than 25 papers based on educational
feedback reviews from students. Mostly, for this kind of analysis, open datasets are lim-
ited and are not available with the required attributes that suit our needs. The data used in
the research papers was taken from various sources like real-time feedback collected from
students of various universities through Google forms, Survey/Questionnaire, social
372 J. Jayasudha and M. Thilagu
media, blogs or forums, MOOC educational platforms (Course era and EdX), online
reviews, and some used blended datasets which may be manually annotated to obtain
the result. Duplicate records should be removed after data collection and, in many cases,
data collected from online forums is unstructured and should be labelled manually and
trained to be used with supervised Machine Learning approaches.
3.2 Approach
The most crucial phase of every machine learning model is data preprocessing (Gottipati,
2018). The performance of the model is significantly influenced by how effectively the
raw data is cleaned and preprocessed. Text preprocessing aims to clean up the data so that
it can be processed in the next step. Text preprocessing makes the input documents more
consistent to facilitate text representation, which is necessary for most text analytics
tasks. Tokenization breaks the sentences into words, stemming obtains the root words
from tokens; and lemmatization creates a single base word for various inflected forms,
Part of Speech is used for identifying parts of speech in tokens, Named Entity Recognition
(NER) classifies the text into various categories.
Figure 2 shows preprocessing techniques in NLP like tokenization, lemmatization,
parsing, and bag of words that help us analyse the sentiments in text. Initially, after
getting feedback, input is split into sentences or words, and, using tokenization, POS
tagging, and lemmatization, it converts sentences into words. Then a sentiment score is
calculated from these tokenized words and, based on the score, the sentiment is cate-
gorized. Sentiment can be classified using either Machine Learning or Deep Learning
Models, so appropriate models should be selected to get the relevant output.
algorithms are mostly used to identify the sentiment of any review or sentence. Natural
language processing, text analysis, computational linguistics, and other approaches are
used to identify and quantify the sentiment of text in sentiment analysis. For better results,
these algorithms require labelled data as a dataset and can be combined with lexicon
approaches (dictionary-based or corpus-based) and classifiers such as Ada boost, N-
Model, Bagging, and Random Space and Aspect based classification methods (Toçoğlu,
2020) are also used with TF-IDF statistical method (Kastrati Z. A., 2020), activation
functions like Tanh, sigmoid, and ReLu (Chen, 2020) are combined with ML algorithms
like SVM, Multinomial NB, and Logistic regression for better accuracy. Table 1 demon-
strates various methods used in literature works, datasets used, algorithms compared,
new models developed, and results.
Deep learning has emerged as a powerful machine learning technique that learns
multiple layers of representations or features of the data and produces results (Zhang,
2018). Along with the success of deep learning in many other application domains, it
has also been popularly used in sentiment analysis in recent years. Due to their high
performance (Yadav, 2020) Deep Learning algorithms like Convolutional Neural Net-
work (CNN), Recurrent Neural Network (RNN), and Deep Belief Networks (DBN) are
the most frequently used algorithms for Sentimental Analysis. Ensemble methods and
architectures can also be used to identify the polarity of words that learn features through
layers that are fed directly into another layer as input (Ghorbani, 2020).
Lexicon approaches like corpus-based and dictionary-based approaches can perform
sentiment analysis without training, and it needs explicit vocabulary for separate lan-
guage as it is unsupervised. The tokenization process separates each word in a review or
post and, based on the emotion found, it is assigned as positive, negative, or neutral flags
based on words already available in the lexicon. Some tools like VADER (Kastrati Z. D.,
2021; Dsouza, 2019) & (Kastrati Z. D., 2021),SentiWordNet, WordNet and SentiBank
are publicly available to analyse the sentiment behind the words.
Table 1. Literature review- machine learning, lexicon based and deep learning methods for
sentimental analysis
Table 1. (continued)
Table 1. (continued)
to concrete people or abstract notions, is one of the fundamental difficulties with natural
texts. Expand the most sophisticated model to include sentiment analysis across several
languages. Consequently, a multi-language processing paradigm must be put in place.
There are over 80 dictionaries available for other languages. Very little research is done
in code-mix languages, and the majority of work is done in English. So this case needs to
be considered in future work. Many studies simply translate all comments into English
using machine translation, although this may cause emotions to be lost in the translation.
Finding irony in Natural Language Processing (NLP), especially in sentiment anal-
ysis, is a difficult issue. Satirical statements may lead to inaccurate categorization in the
findings of sentiment analysis and data mining. Huge datasets are typically needed for
deep learning techniques, but real-world datasets are frequently unbalanced.
5 Conclusions
The educational sector is undergoing a tremendous transformation because of online
education. Massive amounts of structured and unstructured data are collected through
online platforms, which include MOOCs, EdX, Coursera, etc. Students’ feelings can be
gauged through posted feedback, forums, and reviews. This helps the teachers to identify
the students’ attitudes, feelings, and behavior to make necessary improvements in teach-
ing methodology to maintain the students’ retention rate. Sentimental Analysis research
has increased in recent years, and while initially only Machine Learning algorithms
were considered, Deep Learning algorithms are now being used to identify the polarity.
Examining the Literature for Support Vector Machines and Naive Bayes are most fre-
quently used in Machine Learning models, while Convolutional Neural Networks and
Recurrent Neural Networks (RNN) are used in Deep Learning models (CNN). Research
is required, taking into account the difficulties in analysing feedback and determining
the best model in Machine Learning or Deep Learning that results in high accuracy. As
a result, Sentimental Analysis based recommendation systems analyse comments and
extract precise information about students’ expectations, teaching methodology, their
interests, and expected curriculum updates to be embedded in the education sector to
vastly improve every aspect of education.
References
Almalki, J.C.: A machine learning-based approach for sentiment analysis on distance learning
from Arabic Tweets (2022)
Altrabsheh, N., Cocea, M., Fallahkhair, S.: Learning sentiment from students’ feedback for real-
time interventions in classrooms. In: Bouchachia, A. (ed.) ICAIS 2014. LNCS (LNAI), vol.
8779, pp. 40–49. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11298-5_5
Asmita, S.S., Anuja, T.D., Ash, D.: Analysis of student feedback using deep learning. Int. J.
Comput. Appl. Technol. Res. 8, 161–164 (2019)
Mite-Baidal, K., Delgado-Vera, C., Solís-Avilés, E., Espinoza, A.H., Ortiz-Zambrano, J., Varela-
Tapia, E.: Sentiment analysis in education domain: a systematic literature review. In: Valencia-
García, R., Alcaraz-Mármol, G., Del Cioppo-Morstadt, J., Vera-Lucio, N., Bucaram-Leverone,
M. (eds.) CITI 2018. CCIS, vol. 883, pp. 285–297. Springer, Cham (2018). https://doi.org/10.
1007/978-3-030-00940-3_21
A Survey on Sentimental Analysis of Student Reviews Using 377
Bhalla, R.: A review paper on the role of sentiment analysis in quality education. SN Comput.
Sci. 3(6), 1–9 (2022)
Binali, H.W.: Computational approaches for emotion detection in text. In: 4th IEEE International
Conference on Digital Ecosystems and Technologies, pp. 172–177. IEEE (2010)
Cambria, E., Schuller, B., Liu, B., Wang, H., Havasi, C.: Guest Editorial Special Issue on Concept-
Level Opinion and Sentiment Analysis. IEEE, (IF:2.570, 5-year IF:2.632(2010)), pp. 15-21
(2012)
Chen, L.C.: Exploration of social media for sentiment analysis using deep learning. Soft. Comput.
24(11), 8187–8197 (2020)
Dsouza, D.D.: Sentimental analysis of student feedback using machine learning techniques. Int.
J. Recent Technol. Eng. 8(14), 986–991 (2019)
Fahmi, S.P.: Sentiment analysis of student review in learning management system based on sastrawi
stemmer and SVM-PSO. In: 2020 International Seminar on Application for Technology of
Information and Communication (iSemantic), pp. 643–648 (2020)
Ghorbani, M., Bahaghighat, M., Xin, Q., Özen, F.: ConvLSTMConv network: a deep learning
approach for sentiment analysis in cloud computing. J. Cloud Comput. 9(1), 1–12 (2020).
https://doi.org/10.1186/s13677-020-00162-1
Ghulam, H.Z.: Deep learning-based sentiment analysis for roman urdu text. Procedia Comput.
Sci. 147, 131–135 (2019)
Gottipati, S., Shankararaman, V., Lin, J.R.: Text analytics approach to extract course improvement
suggestions from students’ feedback. Res. Pract. Technol. Enhanc. Learn. 13(1), 1–19 (2018).
https://doi.org/10.1186/s41039-018-0073-0
Kandhro, I.A., et al.: Student feedback sentiment analysis model using various machine learning
schemes: a review. Indian J. Sci. Technol. 12(14), 1–9 (2019)
Kapočiūtė-Dzikienė, J.D.: Sentiment analysis of lithuanian texts using traditional and deep
learning approaches. Computers 8(1), 4 (2019)
Kastrati, Z.A.: Aspect-based opinion mining of students’ reviews on online courses. In: Pro-
ceedings of the 2020 6th International Conference on Computing and Artificial Intelligence,
pp. 510–514 (2020)
Kastrati, Z.D.: Sentiment analysis of students’ feedback with NLP and deep learning: a systematic
mapping study. Appl. Sci. 11(9), 3986 (2021)
Kastrati, Z.I.: Weakly supervised framework for aspect-based sentiment analysis on students’
reviews of MOOC. IEEE Access 8, 106799–106810 (2020)
Katragadda, S.R.: Performance analysis on student feedback using machine learning algorithms.
In: 2020 6th International Conference on Advanced Computing and Communication Systems
(ICACCS), pp. 1161–1163. IEEE (2020)
Kaur, H.A.: A proposed sentiment analysis deep learning algorithm for analyzing COVID-19
tweets. Inf. Syst. Front. 23(6), 1417–1429 (2021)
Lundqvist, K.L.: Evaluation of student feedback within a MOOC using sentiment analysis and
target groups. Int. Rev. Res. Open Distrib. Lear. 21(3), 140–156 (2020)
Lwin, H.H.: Feedback analysis in outcome base education using machine learning. In: 17th Inter-
national Conference on Electrical Engineering/Electronics, Computer, Telecommunications
and Information Technology (ECTI-CON), pp. 767–770. IEEE (2020)
Moreno-Marcos, P.M., Alario-Hoyos, C., Muñoz-Merino, P.J., Estévez-Ayres, I., Kloos, C.D.:
Sentiment analysis in MOOCs: a case study. In: 2018 IEEE Global Engineering Education
Conference (EDUCON), pp. 1489–1496. IEEE (2018)
Nimala, K.: Sentiment topic emotion model on students feedback for educational benefits and
practices. Behav. Inf. Technol. 40(3), 311–319 (2021)
Omar, M.A.: Sentiment analysis of user feedback in e-learning environment. Int. J. Eng. Trends
Technol. (IJETT), 153–157 (2020)
378 J. Jayasudha and M. Thilagu
Osmanoğlu, U.Ö.: Sentiment analysis for distance education course materials: a machine learning
approach. J. Educ. Technol. Online Learn. 3(1), 31–48 (2020)
Pacol, C.A.: Enhancing sentiment analysis of textual feed-back in the student-faculty evaluation
using machine learning techniques. Eur. J. Eng. Sci. Technol. 4(1), 27–34 (2021). https://doi.
org/10.33422/ejest.v4i
Rani, S.: Deep learning based sentiment analysis using convolution neural network. Arab. J. Sci.
Eng. 44(4), 3305–3314 (2019)
Rojas-Barahona, L.M.: Deep learning for sentiment analysis. Lang. Linguist. Compass 10(12),
701–719 (2016)
Sangeetha, K., Prabha, D.: Sentiment analysis of student feedback using multi-head attention
fusion model of word and context embedding for LSTM. J. Ambient Intell. Humanized Comput.
12(3), 4117–4126 (2020). https://doi.org/10.1007/s12652-020-01791-9
Dos Santos, C., Gatti, M.: Deep convolutional neural networks for sentiment analysis of short
texts. In: Proceedings of COLING 2014, The 25th International Conference on Computational
Linguistics: Technical Papers, pp. 69–78 (2014)
Shijia, E.Y.: Aspect-based financial sentiment analysis with deep neural networks. In: WWW
(Companion Volume) (2018)
Singh, J., Singh, G., Singh, R.: Optimization of sentiment analysis using machine learning
classifiers. HCIS 7(1), 1–12 (2017). https://doi.org/10.1186/s13673-017-0116-3
Situmorang, B.H., Chairunnas, A., Bon, A.T.: Sentiment analysis of user preferences on learning
management system (Lms) platform data. In: 2nd African International Conference on Industrial
Engineering and Operations Management, IEOM 2020, pp. 1784–1789 (2020)
Toçoğlu, M.A., Onan, A.: Sentiment analysis on students’ evaluation of higher educational insti-
tutions. In: Kahraman, C., Cevik Onar, S., Oztaysi, B., Sari, I.U., Cebi, S., Tolga, A.C. (eds.)
INFUS 2020. AISC, vol. 1197, pp. 1693–1700. Springer, Cham (2021). https://doi.org/10.1007/
978-3-030-51156-2_197
Ullah, M.A.: Sentiment analysis of students feedback: a study towards optimal tools. In: 2016
International Workshop on Computational Intelligence (IWCI), pp. 175–180. IEEE (2016)
Van Nguyen, K.N.: UIT-VSFC: vietnamese students’ feedback corpus for sentiment analysis. In:
2018 10th International Conference on Knowledge and Systems Engineering (KSE), pp. 19–24
(2018)
Wen, M.Y.: Sentiment analysis in MOOC discussion forums: what does it tell us? In: Proceedings
of the 7th International Conference on Educational Data Mining (EDM 2014), pp. 130–137
(2014)
Yadav, A.: Sentiment analysis using deep learning architectures: a review. Artif. Intell. Rev. 53(6),
4335–4385 (2020)
Zhang, L.W.: Deep learning for sentiment analysis: a survey. Wiley Interdisc. Rev. Data Min.
Knowl. Disc. 8(4), e1253 (2018)
Rice Yield Estimation Using Deep Learning
Abstract. Global and regional food security heavily relies on effective yield esti-
mation results. Thus precise and on-time rice yield estimate or prediction is a
pivotal factor not only to ensure food security but also for sustainable develop-
ment of agricultural resources. Machine learning and deep learning are proving to
be exemplary support tools for decision making for rice yield estimation or predic-
tion, such as selection of the rice varieties that need to be grown and also decisions
involving the management of crops during growing season. Several researchers
have put forth a variety of deep learning as well as machine learning algorithms
that have helped estimate rice yield time and again. This paper proposes a LSTM
based model to predict the Rice yield of the data collected for all 314 blocks of
Odisha by ICAR - National Rice Research Institute (NRRI), Odisha. In this study,
we get 0.07 RMSE score for training data and 0.21 RMSE score for test data. The
model is also evaluated based on the various performance metrics for three rice
datasets. The overall performance for the rice datasets is evaluated to be 0.989
recall, 0.979 precision, 0.989 accuracy and 0.984 F1 score.
1 Introduction
The proper and effective estimates of rice yield helps strengthen national food security
by ensuring timely export and import decisions, thereby helping the management make
proper and informed decisions [1]. For instance, in order to breed superior varieties of
crops, seed companies need a prediction of the relative performance measures of the
newly developed hybrids in diverse environments and yield prediction would also help
farmers or cultivators to make informed financial and management related decisions.
Yet, estimation of rice yield is one of the most challenging field out there due to various
complicated factors associated with it. One such factor being genotype data which com-
prises of high-dimensional marker data which in turn contains thousands to millions of
markers for every individual plant which is an arduous task as there needs to an accurate
estimation of the effects of these genetic markers which under control of a diversity of
field management practices or environmental conditions.
Estimation of rice yield is recently heavily focused on the use of various deep learning
techniques, for instance deep neural networks. Deep neural networks (DNN) are a type of
• Aim is to address technical reliability issues associated with the rice crop yield
prediction domain.
• Develop a novel hybrid LSTM model for predicting rice yield in farming zones with
better performance.
• The proposed model is validated against performance metrics and the outcome noted
were promising.
The paper is segregated into various sections which are briefly described here. In
Sect. 1, a brief introduction of the previous research papers is discussed. Section 3 talks
about the problem generally faced in yield prediction. Section 4 discusses the proposed
model. In Sect. 5, we discuss about the result and the overall capabilities of the proposed
model, and lastly, we summarize the various observations formed with the help of this
model under conclusion and future scope title in Sect. 6.
2 Literature Review
In this section, we have listed quite a number of reputed works that have been done
in the domain of Estimation of yield of various crops with the aid of various Machine
Learning and Deep Learning algorithms. Tian et al. have proposed a model that incorpo-
rates deep learning based methods for the estimation of yield of winter wheat. The said
model uses meteorological data and two remotely sensed indices [4]. The said incor-
porates Long Short-Term Memory (LSTM) neural network with an attention feature
(ALSTM) attached to the model, where the pivotal idea is to focus the attention to the
quintessential parts of the sequence of the input which has maximum impact on the target
vectors, thereby ensuring the accurate extraction of the specific features or attributes.
Sonal Agarwal and Sandhya Tarar have proposed a model which is enhanced by the
incorporation of deep learning methodologies that not only provide accurate yield esti-
mates but also precise information in regard to the quantities of soil ingredients needed
Rice Yield Estimation Using Deep Learning 381
and also the necessary monetary expenses that come with it [5]. The said model incor-
porates a dynamic combination of RNN, LSTM and SVM algorithms. Wang et al. have
devised a model that helps estimate the yield of winter wheat in the primary harvesting
areas in China with the use of various deep learning methodologies [6]. E. Banu and
Dr. A. Geetha incorporated both DNN and random forest in their research work for rice
yield estimation [7]. Sun et al. have proposed a model that incorporates both LSTM and
CNN algorithms for the estimation of yield of soybean [8]. This paper was trained with
the help of both environment parameters and crop growth parameters such as weather
data, Surface Reflectance data as well as the Land Surface Temperature data. Nevavuori
et al. have incorporated CNN based framework in their study that uses RGB data along
with a particular index data that are collected by UAVs [9]. Chen et al. proposed a model
that incorporates R-CNN (region-based convolutional neural network) for detecting the
quantity of flowers, unripe strawberries, and ripe strawberries with regard to the estima-
tion of strawberry yield [10]. A 3-dimensional CNN based framework was incorporated
into the model devised by Russello for estimation of crop yield purpose which showed
quite fascinating results in comparison to various dynamic machine learning method-
ologies [11]. Jiang et al. devised a model incorporating LSTM framework for estimating
yield of corn crops by primarily focusing on soil and meteorological data which paved
way to quite a good performance score [12]. Kulkarni et al. devised a model incorpo-
rating RNN framework that made use of soil data along with various rainfall sequences
in a particular designated region for enhancement of yield estimates of the crops [13].
You et al. proposed a model that introduced a component involving Gaussian process
into a LSTM or CNN framework into his model and this said model outperformed prim-
itive various remote sensing methodologies by 30% with regard percentage error [14].
Alhnaity et al. incorporated LSTM framework into his model for predicting both plant
growth variation and crop yield for two different layouts, i.e., Ficus benjamina stem
growth and tomato yield prediction, in supervised greenhouse environments [15]. Some
studies have shown that while CNN has the ability to explore more number of spatial
features, LSTM can help divulge phenological characteristics [16]. Khaki et al. proposed
a model that incorporates YieldNet which is one of the latest deep learning technique
that makes use of a novel deep neural network (DNN) framework [17].
3 Problem Statement
Precise and timely prediction of crop yield information is crucial for making accurate
agricultural resolutions and non-expendable decisions which has a direct impact on a
country’s economy [18]. Deep learning has emerged as a front runner among the vari-
ous promising technologies in this regard. However, we can see that there are multiple
challenges associated with using deep learning. These include integrating various inter-
dependent factors into the model for better results, incorporating prior knowledge with
existent and current data, increasing the accuracy and thus credibility of the model etc.
So, in this paper we have tried to tackle some existing issues by proposing a deep learn-
ing based model which uses LSTM as the primary deep learning algorithm to provide
more accurate and faster crop estimation results. We intend to explore further into the
issues involved with the aforementioned domain of crop yield estimation so that we can
build a robust deep learning model.
382 N. Mishra et al.
4 Proposed Model
In this study, we are proposing a LSTM (Long Short-Term Memory) network based
model as can be seen in Fig. 1. LSTM is a better improved version of RNN that helps
overcome the vanishing gradient problem [19]. LSTM has the capability of processing
complete data sequences such as videos for example and not just singe data points like
images. An LSTM unit normally comprises of a cell, forget gate, output gate and input
gate. A cell is responsible for keeping track of values over random time periods, while
the three aforementioned gates helps modulate the flow of data into and out of the cell.
Let’s have a detailed explanation on how a LSTM network works. These are the
steps normally followed by a LSTM network:
Step – 1: Initially we start with forget gate. Here we can make a decision as to which bits
of the cell state can prove to be of use with the help of the new input data and previous
hidden state. So, basically the forget gate is responsible for making a decision regarding
which fragments of the long term memory can be forgotten based on the given new input
data and the previous hidden state.
Step – 2: The following step includes the input gate along with the new memory network.
The objective here is to decide what latest information is to be added to the network’s
long term memory (or) the state of the cell, with the help of the new input data and
previous hidden state.
Step – 3: Once we have made changes to the long term memory of the network, we can
then jump to the final step that focuses on determining the new hidden state by making
use of the output gate. The output gate will make use of these three things, i.e., the new
input data, the newly updated cell state and the prior hidden state.
In this study, we make use of a data set comprising of the various soil parameters
such as soil pH, bulk density, soil organic carbon, clay fraction, soil nutrients (nitrogen,
phosphorus and potassium), farm yard manure and rice yield of all 314 blocks of state
Odisha collected by ICAR - National. Rice Research Institute (NRRI), Odisha. Once the
Rice Yield Estimation Using Deep Learning 383
data is fed to the model, it is then used to predict the yield. 70% of the data is taken as the
training data while the remaining 30% is taken up as the testing data. Once the estimation
of the rice yield is obtained, RMSE score is computed for both the aforementioned sets of
data to give an estimate of the capabilities of the proposed model [20–22]. The overview
of the proposed framework is highlighted in Fig. 2.
Step 1: Input considered as the present value, past state and the past internal cell
state
Step 2: Set values for forget gate, input gate, input modulation gate and output gate.
Step 3: Updated values for different gates computed as:
Step 3.1: Find parameterized values of the present input and past state for
each gate.
Step 3.2: Activation function applied to each gate on parameterized vectors.
Step 4: Present internal state calculated and then find the addition of two vectors.
Step 5: Compute present hidden state and perform multiplication with output state.
384 N. Mishra et al.
Performance metrics Rice Yield dataset by Rice: All-India Area, Rice: State wise Yield
ICAR [Dataset – 1] production and Yield (Source: Directorate of
along with coverage Economics &
under Irrigation Statistics, DAC&FW)
[Dataset – 2] [Dataset – 3]
recall 0.989 0.977 0.982
precision 0.979 0.970 0.969
accuracy 0.989 0.969 0.977
F1 score 0.984 0.971 0.965
Table 1 is the overview of the different performance metrics like recall, precision, F1
score and accuracy of the proposed LSTM model for different rice datasets. Precision can
be measured as the ratio of number of accurately classified Positive samples to the total
number of positively classified samples, thus precision indicates the reliability of the
model in the classification of the Positive samples. Higher value of precision indicates
that the model is capable of making more accurate Positive classifications while making
fewer wrong Positive classifications. Recall can be measured as the ratio of number of
accurately classified Positive samples to the total number of Positive samples, thus recall
indicates the capability of the model to discover Positive samples. Higher value of recall
indicates more number of positive samples identified [21]. Accuracy helps determine
the overall performance of the model. It is the ratio of number of the accurately made
predictions to the total number of predictions. F1 score is measured as the mean of recall
and precision, so higher F1 score is achieved only when precision and recall are on the
higher side. Our study shows significantly higher values and thus better performance
with regard all the aforementioned datasets, for all the three different datasets that are
used in this study.
The data set is fed into a LSTM network with input shape of dimension (1, 12) and
run for 100 epochs. Batch size is chosen to be 10. RMSE (Root Mean Square Error) is the
Rice Yield Estimation Using Deep Learning 385
loss function that has been applied on the said model. The graph for the loss function is
depicted in Fig. 3. This graph is based on dataset – 1. The activation function is Rectified
Linear Unit (ReLU).
Fig. 3. A graphical depiction of the loss function, i.e., mean squared error
We also perform validation of the proposed model. Initially we split the whole dataset
into a 70% training and 30% testing dataset. Further, we take 20% of the training data
as the validation dataset. So, we have 30% testing data, 56% training data and 14%
validation data. Then we plot a training loss versus validation loss plot to get an estimate
about the performance of the model as can be seen in Fig. 4. The green curve in the plot
represents the training curve which gives us an estimation of how well the model can
learn based on the training dataset while, the blue curve, i.e., the validation curve gives
us an estimate of how well the model is generalizing based on the validation dataset.
As we can see from the plot, our model is facing some overfitting issues as the training
loss happens to keep decreasing with further learning while the validation loss starts
increasing again with further learning after decreasing to a certain point (Fig. 5).
Figure 4 depicts the analysis of the proposed LSTM model with other classification
models in context to accuracy rate. It is observed that LSTM model generates an optimum
accuracy of 0.989 as compared to other models. SVM records the least accuracy value.
386 N. Mishra et al.
0.989
1
0.945
0.95 0.934
0.92 0.915
0.9 0.876
0.85
0.8
LSTM KNN RNN MLP SVM CNN
Accuracy rate
6 Conclusion
Estimation of rice yield plays a pivotal role in global food production. In order to
strengthen national food security by ensuring timely export and import decisions, the
management folks as well as farmers heavily rely on accuracy of yield predictions [23–
25]. Estimation of rice yield is one of the most challenging field out there due to various
complicated factors associated with. This paper focuses on integrating one of the most
sought-after deep learning algorithms with the aim of estimating the yield of rice. It
proposes a LSTM network based model with the intention of estimating the rice yield
which makes use of a data set comprising for various soil parameters for rice research
provided by ICAR - National Rice Research Institute (NRRI), Odisha. The said model
still has issues like overfitting, etc. that needs to be addressed in the future works so that
we can expand the research further in this domain. Another important future scope would
be to avail datasets of different varieties of crops other than rice and also to integrate
more features besides soil parameters that also affect crop yield.
Rice Yield Estimation Using Deep Learning 387
References:
1. Chaudhury, P., Mishra, S., Tripathy, H.K., Kishore, B.: Enhancing the capabilities of stu-
dent result prediction system. In: Proceedings of the Second International Conference on
Information and Communication Technology for Competitive Strategies, pp. 1–6 (2016)
2. Shi, X., Chen, Z., Wang, H., Yeung, D.Y., Wong, W.K., Woo, W.C.: Convolutional LSTM
network: a machine learning approach for precipitation nowcasting. arXiv 2015 arXiv:1506.
04214 (2015)
3. Tripathy, H.K., Mishra, S., Thakkar, H.K., Rai, D.: CARE: a collision-aware mobile robot
navigation in grid environment using improved breadth first search. Comput. Electr. Eng. 94,
107327 (2021)
4. Tian, H., et al.: A deep learning framework under attention mechanism for wheat yield esti-
mation using remotely sensed indices in the Guanzhong Plain, PR China (2021). https://doi.
org/10.1016/j.jag.2021.102375
5. Agarwal, S., Tarar, S.: A hybrid approach for estimation of rice yield using machine learning
and deep learning algorithms. J. Phys.: Conf. Ser. 1714, 012012 (2021)
6. Wang, X., Huang, J., Feng, Q., Yin, D.: Winter Wheat yield prediction at county level and
uncertainty analysis in main wheat-producing regions of china with deep learning approaches
(2020). https://doi.org/10.3390/rs12111744
7. Mishra, S., Tripathy, H.K., Acharya, B.: A precise analysis of deep learning for medical image
processing. In: Bhoi, A., Mallick, P., Liu, C.M., Balas, V. (eds.) Bio-inspired Neurocomput-
ing. Studies in Computational Intelligence, vol. 903, pp. 25–41. Springer, Singapore (2021).
https://doi.org/10.1007/978-981-15-5495-7_2
8. Sun, J., Di, L., Sun, Z., Shen, Y., Lai, Z.: County-level soybean yield prediction using deep
CNN-LSTM model. Sensors 19, 4363 (2019). https://doi.org/10.3390/s19204363
9. Nevavuori, P., Narra, N., Lipping, T.: Estimation of rice yield with deep convolutional neural
networks. Comput. Electron. Agric. 163 (2019)
10. Chen, Y., et al.: Strawberry yield prediction based on a deep neural network using high-
resolution aerial orthoimages. Remote Sens. 11, 1584 (2019)
11. Russello, H.: Convolutional neural networks for estimation of rice yield using satellite images.
Master’s thesis, University of Amsterdam, Amsterdam, The Netherlands (2018)
12. Jiang, Z., Liu, C., Hendricks, N.P., Ganapathysubramanian, B., Hayes, D.J., Sarkar, S.: Pre-
dicting county level corn yields using deep long short term memory models. arXiv 2018,
arXiv:1805.12044 (2018)
13. Kulkarni, S., Mandal, S.N., Sharma, G.S., Mundada, M.R., Meeradevi: Predictive analysis
to improve crop yield using a neural network model. In: Proceedings of the 2018 Interna-
tional Conference on Advances in Computing, Communications and Informatics (ICACCI),
Bangalore, India, 19–22 September 2018, pp. 74–79 (2018)
14. You, J., Li, X., Low, M., Lobell, D., Ermon, S.: Deep Gaussian process for estimation of rice
yield based on remote sensing data. In: Proceedings of the thirty-First AAAI Conference on
Artificial Intelligence, San Francisco, CA, USA, 4–9 February 2017, pp. 4559–4566 (2017)
15. Alhnaity, B., Pearson, S., Leontidis, G., Kollias, S.: Using deep learning to predict plant
growth and yield in greenhouse environments. arXiv 2019 arXiv:1907.00624 (2019)
16. Sahoo, S., Das, M., Mishra, S., Suman, S.: A hybrid DTNB model for heart disorders pre-
diction. In: Mallick, P.K., Bhoi, A.K., Chae, G.S., Kalita, K. (eds.) Advances in Electronics,
Communication and Computing. ETAEERE 2020. Lecture Notes in Electrical Engineering,
vol. 709, pp. 155–163. Springer, Singapore (2021). https://doi.org/10.1007/978-981-15-8752-
8_16
17. Khaki, S., Pham, H., Wang, L.: YieldNet: a convolutional neural network for simultaneous
corn and soybean yield prediction based on remote sensing data. https://doi.org/10.1101/
2020.12.05.413203
388 N. Mishra et al.
18. Jeong, S., Ko, J., Yeom, J.-M.: Predicting rice yield at pixel scale through synthetic use of crop
and deep learning models with satellite data in South and North Korea, Science of The Total
Environment, vol. 802, pp. 149726 (2022). https://doi.org/10.1016/j.scitotenv.2021.149726,
ISSN 0048-9697
19. Jena, L., Kamila, N.K., Mishra, S.: Privacy preserving distributed data mining with evolution-
ary computing. In: Satapathy, S., Udgata, S., Biswal, B. (eds.) Proceedings of the International
Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013.
Advances in Intelligent Systems and Computing, vol. 247, pp. 259–267. Springer, Cham
(2013). https://doi.org/10.1007/978-3-319-02931-3_29
20. Mishra, S., Mallick, P.K., Tripathy, H.K., Jena, L., Chae, G.S.: Stacked KNN with hard
voting predictive approach to assist hiring process in IT organizations. Int. J. Electr. Eng.
Educ. 0020720921989015 (2021)
21. Dutta, A., Misra, C., Barik, R.K., Mishra, S.: Enhancing mist assisted cloud computing toward
secure and scalable architecture for smart healthcare. In: Hura, G., Singh, A., Siong Hoe,
L. (eds.) Advances in Communication and Computational Technology. Lecture Notes in
Electrical Engineering, vol. 668, pp. 1515–1526. Springer, Singapore (2021). https://doi.org/
10.1007/978-981-15-5341-7_116
22. Rath, M., Mishra, S.: Security approaches in machine learning for satellite communication.
In: Hassanien, A., Darwish, A., El-Askary, H. (eds.) Machine Learning and Data Mining
in Aerospace Technology. Studies in Computational Intelligence, vol. 836, pp. 189–204.
Springer, Cham (2020). https://doi.org/10.1007/978-3-030-20212-5_10
23. Chakraborty, S., Sahoo, K.S., Mishra, S., Islam, S.M.: AI driven cough voice-based COVID
detection framework using spectrographic imaging: an improved technology. In: 2022 IEEE
7th International conference for Convergence in Technology (I2CT), pp. 1–7. IEEE (2022)
24. Mishra, S., Thakkar, H.K., Singh, P., Sharma, G.:. A decisive metaheuristic attribute selec-
tor enabled combined unsupervised-supervised model for chronic disease risk assessment.
Comput. Intell. Neurosci. 2022, 1–17(2022)
25. Mohanty, A., Mishra, S.: A comprehensive study of explainable artificial intelligence in health-
care. In: Mishra, S., Tripathy, H.K., Mallick, P., Shaalan, K. (eds.) Augmented Intelligence in
Healthcare: A Pragmatic and Integrated Analysis. Studies in Computational Intelligence, vol.
1024, pp. 475–502. Springer, Singapore (2022). https://doi.org/10.1007/978-981-19-1076-
0_25
Sentiment Analysis on Movie Review Data Using
Ensemble Machine Learning Approaches
Abstract. Today’s machine learning application has a huge impact on the current
scenario that is big changes is afoot in the marketing world and shifts are largely
down to the power of machine learning. It is about finding pieces of predictive
knowledge, it has capable in the field of NLP to understand, analyze, manip-
ulate and potentially generate human language, Truly listening to a customer’s
voice requires deep understanding of what they have expressed in natural lan-
guage. NLP is the best way to understand this and uncover the sentiment behind
it. Here we have proposed a sentiment analysis for movie review, from the movie
review dataset. We have implemented the data set by using of Naive Bayes, Logis-
tic Regression, Random Forest algorithm, Support Vector Machine, Multinomial
Naïve Bayes, Stochastic Gradient descent classifier along with combining all those
as an ensemble with voting majority techniques with features parameters such as
positive, negative, neutral, partially positive, partially negative. We get the result
of the proposed ensemble technique is better than individual algorithms with 94%
of accuracy.
NLP increase computational power to achieve accurate results in different area i.e. health-
care, media, finance and human. To understanding human language, speech or text for a
machine is a great challenge because machine can understand any things through binary
representation, the human generated data are large volume, this generated data may
contain unstructured format and the difficulties is the machine could generate accurate
feedback to considering the human generated data, so NLP can build a bridge in between
the human and computer and solve this problem. NLP used some technique i.e. syntactic
analysis and semantic analysis. Syntactic analysis refers to the arrangement of word in a
sentence that make grammatical sense. It used for, how the natural language deals with
the grammatical value. There are some syntax techniques are used such that lemmatiza-
tion, word segmentation, Part-of-speech tagging, parsing, sentence breaking, stemming.
But semantic analysis used to know the meaning and interpretation of word and how
sentence are structured. There are also some technique i.e. Named entity recognition
(NER), word sense disambiguation, natural language generation.
Sentiment Analysis is also termed as emotion AI or pulling of opinion. Basically
it focuses on identify subjective information. It checks the polarity of text i.e. positive
or negative. By the help of these polarities, change the concept, improve productivity
and advertising so it helps reduce some negativity. Sentimental analysis is also referred
as opinion mining. It is component part of NLP (natural language process), that helps
to distinguish and pull opinions within a given block of speech/text. Basically the aim
of sentiment analysis is to determine the frame of mind, sentiments and response of
writer based on the topic. Sentimental analysis have so many advantage in various field
like business related area, researchers etc. It is also use for monitoring i.e. in a social
media; there are huge amount of data in form of short-message, memes and emoticons.
These are some challenges for the micro-blogging content that is coming from Twitter
and Facebook, it is because of the kind of language used for convey the sentiments i.e.
short forms, memes and emoticons. Sentimental analysis is helpful for the researchers
especially in the fields like Sociology, marketing, advertising, economics and political
science. Sentimental analysis is also used in companies. Companies have customer
feedback, so those companies manipulate his plans/structure according to the feedback
system, but it is still impossible to analyze it manually.
There are various steps to analyze sentiment data. Here we have performed sev-
eral phases as data Collection, Text Preparation, Sentiment Detection, and Sentiment
Classification.
The entire work is organized as follow: Sect. 1 describe the basic introduction to
sentiment analysis, Sect. 2 describe the related work, Sect. 3 describe the proposed
methodology with different ML methods along with ensemble method, Sect. 4 describe
performance measurement for the proposed models, Sect. 5 elaborate the result analysis
and Sect. 6 describe the conclusion and future work.
2 Recent Work
The author taking social media sentiment analysis using SVM and NB algorithms and
using Ant Colony and particle Swarm optimization method getting 73.62%, 77.30%
accuracy for NB and 76.71%, 80.54% for SVM respectively [1]. Considering the social
network Uri attack tweets the author use two methods i.e. sentiment score and polarity
count getting 94.3% accuracy of negative and 5.7% of positive result [2]. Taking Viet-
namese student feedback corpus with LSTM using support vector machine algorithm,
the author achieved the F1-score of 90.2% accuracy [3]. Using different machine learn-
ing algorithm such as NB, SVM, DT, RNN, taking movie reviews the author learn how
to face ML problem and how to do data analysis to make the work easier. He noticed
that applying transformation on the data can improve the performance of classification
method and he found the RNN gives the better result [4]. With the help of the Urdu
Sentiment Analysis on Movie Review Data 391
sentiment corpus, taking Urdu tweets to analysis and polarity detection, the dataset
comprising over 17,185 token with obtain 52% of positive and 48% of as negative [5].
The author considered Particle Swarm optimization (POS) and Ant Colony optimiza-
tion (ACO) with SVM and NB classifier getting 86.29% of accuracy than the SVM-PSO
[6]. Taking Deep learning neural network (DNN) for customer sentimental analysis and
review classification achieving high level accuracy is 0.9248% with average F1-score of
0.925% [7].
The author proposed sentimental analysis for hotel rating using NB algorithm using
60% training data and 40% of testing data and getting 45 key values for positive and
45 key for negative. He noticed that for scaling the dataset Naïve Bayes is good and
implementing the linear equation on features and predicators [8]. Taking sentiment
analysis using SVM with Osgood values and Turnery values obtaining accuracy 68.3%
in Osgood but Turnery gives 65.8% of accuracy. But the hybrid SVM (Turnery and
Lemma) gives accuracy 86.0% and hybrid SVM (Osgood and Lemmas) gives accuracy
84.6% and 86.0% with 3-fold and 10-fold experiment [9]. Taking Amazon and IMDB
movie review, the author considering Naïve Bayes, J48, BF Tree and oneR classifier but
Naïve Bayes is quite faster in learning whereas oneR more promising, it gives 91.3% of
accuracy, 97% in F-measure [10]. The author considered 2 dataset HI-EN and BE-EN
and using SVM and voting classifier with neural network obtaining 0.569% f-score of
HI-EN and 0.526% F-score BN-EN [11]. The author tried to exceed domain-transfer
problem with some effective measure feature, using Adapted Naïve Bayes, taking 3
Chinese domain-specific dataset and use Chinese text POS tool ICTCLAS and getting
average of 600 word in education review, 460 terms in stock review and 120 word in
computer review [12]. Taking movie and product reviews dataset of sentiment analysis
in Turkish and English language using SVM classifier obtain 91.33% accuracy [13].
In this paper, the author takes car reviews as dataset contain pre-labeled sentence of
10,000, positive and negative of 5000, overly the author going through sentence level
analysis so employing conjunct analysis with sentence level it gives better accuracy. He
found that ML algorithm cannot be efficiently so using WordNet substantially enhance
the accuracy is about 80% [14]. Taking dataset as movie and product reviews hat are in
English and Turkish language using SVM algorithm and considering some parameter i.e.
kernel type, weighting schemes (i.e. TF-IDF, tokenization,feature selection), the author
getting accuracy is about 91.33% [15]. Processing micro blogs, it is very challenging
task, it have noise. In this paper the author taking method as combining social and topic
context to analyze micro blog sentiment. To analyze this, using Laplacian matrix of the
graph model [16]. A noble approach has been discussed to improve sentiment analysis
with patterns lexicons and negations with hybrid and Sentic net4 with a commendable
accuracy 86.32% [17].
3 Proposed Methodology
Here we consider a dataset as IMDB movie dataset and applied different machine learn-
ing classifier as Naïve Bayes, Random Forest, Logistic Regression and applying some
pre-processing steps as shown in Fig. 1.
392 O. P. Jena et al.
by applying conditional probability. Apply Naïve Bayes classifier with testing data and
best word to obtain matrix.
Steps of the Algorithm
P(G|S) = P(S1 |G) ∗ P(S2 |G) ∗ P(S3 |G) . . . . . . · · · ∗ P(SN |G) ∗ P(G) (3)
P (G|S)-- > posterior probability of class (d, target) given predictor(y, attribute).
P(G) -- > class of prior probability.
P(S|G) -- > likelihood.
P(S) -- > predictor as prior probability.
P(S|G) ∗ P(G)
P(G|S) = (4)
P(S)
where S is feature and G is sentiment value.
P(S1 , S2 , S3 ) ∗ P(G)
P(G|S1 , S2 , S3 ) = , S1 , S2 , S3 are feature (5)
P(S1, S2, S3)
P(S1 |G) ∗ P(S2 |G) ∗ p(S3 |G) ∗ P(G)
P(d|S1 , S2 , S3 ) = (6)
P(S1 ) ∗ P(S2 ) ∗ P(S3 )
n P(S1 |G)
P(G|S) =
i=0 P(S)
1 n
P(Gk |S1 , . . . . . . Sn ) = P(Gk ) P(Si |Gk ) (7)
Z i=1
394 O. P. Jena et al.
P(S|G) ∗ P(G)
P(G|S) = (9)
P(S)
P(S|G)∗P(G)
Ŵ = argmaxdD P(G|S) = argmaxdD (10)
P(S)
Ŵ = argmaxdD P(S|G)∗P(G)
To avoid underflow,
ŵ = argmax(ln P(Gk ) + n
i=1 ln P(Si |Gk )) (12)
It is based upon ensemble tree based learning algorithm. It decides the final class of the
test object, considering the vote from different decision tree. Here in this classifier we
have adopts boats tarp bagging aggregation.
Training set W = w1 , w2 , . . . . . . .., wn .
With responses S = s1 , s2 , . . . . . . . . . , sn .
For e = 1, 2, . . . . . . .E.
Prediction for unseen samples y’, by averaging the prediction from all individual
regression tree on y’:
1 E
f̂ = fe (y ) (15)
E e=1
It is mostly used for discrete counts. Here we have taken the feature vectors
(g1 , g2 , ..., gk ) to solve the problem of text classification task with the integer value
of word frequency by using TF-IDF method.
The conditional probability distribution Pr ob(doc/classm ) can be given by
After applying the Bayes rule we have reduced the equation to.
CMAP = arg max Pr ob(cm ) Pr ob(gn /classm ) (18)
cm ∈C 1≤n≤k
396 O. P. Jena et al.
With the feature available in the documents bag of word, we have calculated
Pr ob(gn /classm ). The probability of wn in classm is calculated in training dataset as
It’s a supervised machine learning algorithm that aims to locate a hyperplane in a multi-
dimensional space. The SVM’s goal is to find the best hyperplane so that the two groups
can be segregated. This ideal hyperplane divides the two groups while also increasing
the margin between them. The distance between the hyperplane and the SVs is known as
the margin. It is widely used because of its primary benefit, which is that it can be very
efficient even in high-dimensional spaces. However, the key flaw in this method is that
it does not have probabilistic estimations. High precision can be achieved by fine-tuning
hyper parameters such as gamma, coat, and kernel level, but in practice, defining the
exact hyper parameters can be difficult which directly enhances the computational cost
and overhead.
The hyperplane optimization can be obtained by Equation.
Minimize 21 w(v) 2 , where w(v) 2 = w(v) T x
1 −yj (w(v)
T x + b) ≤ 0 where j = 1,2, …
j
The Lagrangian optimization problem is defined in Equation.
1 2
n
τ= w(v) + αj (1 − yj (w(v)
T
xj + b)) (20)
2
j=1
The first derivative of the above equation is taken with respect to w(v) and b, then we
have the following Equation.
w(v) + nj=1 α j ( − yj) xj = 0.
w(v) = nj=1 α j yj xj.
n
j=1 α j yj = 0 where α j ≥ 0.
For the non-linearly classification problem, we introduce another dimension to cre-
ate a bigger dimensional space. Here ξj is introduced to represent the approximated
misclassified data samples. So, the classification model is represented as in Equation
1 T n
f (x) = w(v) w(v) + c ξj (21)
2 j=1
subjecttoyj (w(v)
T x + b) ≥ 1 Where j = 1,2,… And ξ ≥ 1
j j
Where c represents the trade-off between the margin and training error and c is a
constant. We have to minimize the f (x) for a better-optimized hyperplane.
Sentiment Analysis on Movie Review Data 397
Here we have used both Adam and RMSProp optimizer for our simulation based on
Batch stochastic gradient descent classifier.
Correctpredictionsnumber
Accuracy =
Totalnumberofprediction
T (+ve) + T (−ve)
Accuracy =
T(+ve) + T(−ve) + F(+ve) + F(−ve)
T (+ve)
Precision =
T(+ve) + F(−ve)
(β2 + 1)RT
Fβ = (RandTareprecisionandrecall)
β2 R + T
where β > 1, then it is favorable for recall.
β < 1, then it is for precisions.
β = 1, here presicion and recall are equal.
When Fβ=1 orF 1 F1 = R+T 2RT
.
5 Result Analysis
Considering on a movie review dataset we have taken 151871 amount of data out of
which we segregate 101870 amount of training and 50001 amount of testing data. Sim-
ulating on python with Intel®Core™ i5-5005u cpu @ 2.00 GHz,64-bit, 8 GB RAM and
we taking performance measurement parameter(precision, recall, accuracy) and imple-
menting three classifier(such as: Naïve Bayes, Logistic Regression, Random Forest)
and getting the following table with individual accuracy 84% of Naïve Bayes, 86% of
Logistic Regression, 88% of Random Forest, 85%.of Multinomial Naïve Bayes, 90%
of Support Vector Machine, 0.91 of Stochastic Gradient Classifier and 0.94 with our
proposed ensemble technique. The output of some sample positive review words and
negative review words are given in Figs. 2 and 3 respectively (Table 1).
398 O. P. Jena et al.
References
1. Badr, E.-S., Salam, A., Mustafa & Ali, Mahmoud & Ahmed, Hagar.: Social media sentiment
analysis using machine learning and optimization techniques. Int. J. Comput. Appl. 178,
975–8887 (2019). https://doi.org/10.5120/ijca2019919306
2. Kawade, D.: Sentiment analysis: machine learning approach. Int. J. Eng. Technol. 09, 2183–
2186 (2017). https://doi.org/10.21817/ijet/2017/v9i3/170903151
3. Vu, N., Kiet, N., Ngan, N.: Variants of long short-term memory for sentiment analysis on
Vietnamese students’ feedback corpus, pp. 306–311 (2018). https://doi.org/10.1109/KSE.
2018.8573351
4. Liombart, O.R.: Using machine learning techniques for sentiment analysis. University
Autonoma De Barcelona (UAB) (2017)
5. Khan, M.Y., Nizami, M.S.: Urdu Sentiment Corpus (v1.0): Linguistic Exploration and Visu-
alization of Labeled Dataset for Urdu Sentiment Analysis (2020). https://doi.org/10.1109/ICI
SCT49550.2020.9080043
6. Bansal, P., Kaur, R.: Twitter sentiment analysis using machine learning and optimization
techniques. Int. J. Comput. Appl. 179(19), 5–8 (2018). https://doi.org/10.5120/ijca20189
16321
7. Shreyas, R.L.: Sentiment analysis of customer satisfaction using Deep learning. IRJCS 6(12)
(2019). https://doi.org/10.26562/IRJCS.2019.DCCS10083
400 O. P. Jena et al.
8. Bhargav, P.S., Reddy, G.N., Chand, R.R., Pujitha, K., Mathur, A.: Sentiment analysis for hotel
rating using machine learning algorithm. IJITEE 8(6) (2019)
9. Mullen, T., Collier, N.: Sentiment analysis using support vector machines with diverse infor-
mation sources. In: 2004 Conference on Empirical Methods in Natural Language Processing
, EMNLP (2004)
10. Singh, J., Singh, G., Singh, R.: Optimization of sentiment analysis using machine learning
classifiers. HCIS 7(1), 1–12 (2017). https://doi.org/10.1186/s13673-017-0116-3
11. Mishra, P., et al.: Code-mixed sentiment analysis using machine learning and neural network
approaches. arXiv abs/1808.03299 (2018)
12. Tan, S., Cheng, X., Wang, Y., Xu, H.: Adapting Naive Bayes to domain adaptation for senti-
ment analysis. In: Boughanem, M., Berrut, C., Mothe, J., Soule-Dupuy, C. (eds.) ECIR 2009.
LNCS, vol. 5478, pp. 337–349. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-
642-00958-7_31
13. Gözükara, F., Özel, S.: An experimental investigation of document vector computation meth-
ods for sentiment analysis of Turkish and English reviews 31, 467–481 (2016). https://doi.
org/10.21605/cukurovaummfd.310341
14. Meena, A., Prabhakar, T.V.: Sentence level sentiment analysis in the presence of conjuncts
using linguistic analysis. In: Amati, G., Carpineto, C., Romano, G. (eds.) ECIR 2007. LNCS,
vol. 4425, pp. 573–580. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-
71496-5_53
15. Zou, X., Yang, J., Zhang, J.: Microblog sentiment analysis using social and topic context.
PLoS ONE 13(2), e0191163 (2018). https://doi.org/10.1371/journal.pone.0191163
16. El Alaoui, I., Gahi, Y., Messoussi, R., Chaabi, Y., Todoskoff, A., Kobi, A.: A novel adaptable
approach for sentiment analysis on big social data. J. Big Data 5(1), 1–18 (2018). https://doi.
org/10.1186/s40537-018-0120-0
17. Pradhan, A., Senapati, M.R., Sahu, P.K.: Improving sentiment analysis with learning concepts
from concept, patterns lexicons and negations. Ain Shams Eng. J. 13(2) (2022). https://doi.
org/10.1016/j.asej.2021.08.004, ISSN 2090–4479
Comparative Analysis of COVID 19 Detection
from Cough Speech Using Machine Learning
Classifiers
Abstract. Corona Virus Disease-2019, or COVID-19, has been on the rise since
its emergence, so its early detection is necessary to stop it from spreading rapidly.
Speech detection is one of the best ways to detect it at an early stage as it exhibits
variations in the nasopharyngeal cavity and can be performed ubiquitously. In
this research, three standard databases are used for detection of COVID-19 from
speech signal. The feature set includes the baseline perceptual features such as
spectral centroid, spectral crest, spectral decrease, spectral entropy, spectral flat-
ness, spectral flux, spectral kurtosis, spectral roll off point, spectral skewness,
spectral slope, spectral spread, harmonic to noise ratio, and pitch. 05 ML based
classification techniques have been employed using these features. It has been
observed that Generalized Additive Model (GAM) classifier offers an average of
95% and a maximum of 97.55% accuracy for COVID-19 detection from cough
signals.
1 Introduction
According to the statistics given by the World Health Organization (WHO) on October
14th , 2022, there have been a total of 620,301,709 confirmed COVID-19 cases [1].
COVID-19 symptoms include body discomfort, high body temperature, strong coughing,
and significant breathing difficulties [3]. The ludicrous and rising spread of the COVID-
19 virus has resulted in unprecedented coordination among several fields in order to
limit the infection’s spread and prevent collateral damage on a regular basis [4]. Here
in this work, COVID-19 has been attempted to be diagnosed using human cough by
adopting datasets from multiple databases of healthy and positive individuals. Moreover,
an advanced and combative way to early speech detection is by implementing machine
learning classifiers to classify COVID-19 [2, 5]. K-Nearest Neighbour (KNN) is a proven
classifier [4] to detect COVID-19 because of its excellent efficiency and capacity [5] to
address a variety of challenging pattern categorization tasks. Moreover, Decision Tree
[6, 7], Naïve Bayes [8] and Support Vector Machine (SVM) [9] have previously shown
[13] showcases exploiting temporal and spectral features with a VGGNet classifier,
delivering 0.82 AUC for Cough based COVID-19 classification. A highest accuracy of
89.79% using Random Forest (RF) ML-classifier based on spectral features is delivered
in [30]. [11] portrays exploiting Cepstral and spectral features through an RF Classifier,
delivering 69% test data classification accuracy. Pahar.et.al. [31] have in detail experi-
mented the cough detection using deep learning structures and achieved a maximum of
95% using ResNet50 architecture.
2 Methodology
Speech segments were obtained for baseline feature extraction, using a 25-millisecond
window length [10] post normalizing the signal amplitudes as a part of pre-processing
technique. Here, the audio files of the standard databases are subjected to perceptual audio
feature extraction consisting of 13 feature vectors. GAM, KNN, SVM, Binary Tree and
Naïve Bayes are the potential classifiers used to classify the positive and healthy cough
sounds based on the extracted features in this work. The classifier hyperparameters are
tuned using Bayesian Optimizer Fig. 1.
COVID-19
Speech Positive
input Classification
Pre-processing Speech Feature
Extraction using ML
Classifiers
Healthy
2.1 Databases
Three standard available labelled corpuses were adopted in the work for conducting the
experiment. The databases are as follows:
Comparative Analysis of COVID 19 Detection 403
a. Spectral Centroid: The spectral centroid represents the centre of the spectral power
distribution of a signal and also highlights the intensity of an audio signal [14].
b. Spectral Crest: This feature denotes the maximum power spectrum of a sound signal.
Spectral crest offers easy differentiation of harmonics from noise-like sounds [15].
c. Spectral Entropy: Signal information and spectral distribution spikiness are mea-
sured by spectral entropy [16].
d. Spectral Roll-off: Speech transmissions often have less energy at high frequencies.
This characteristic can be seen in spectral roll-off, which characterises an energy
and frequency connection. Previous research has focused on the spectral roll-off that
contains the majority of the energy or on a narrow range of spectral roll-off values
[14].
e. Spectral Kurtosis: Spectral kurtosis highlights the transients with their indices in
frequency domain. It is a statistical instrument that may detect the presence of a
series of transients and their positions in the frequency domain [18].
404 S. Mishra et al.
All simulations were performed on MATLAB 2021a software, with Windows 10 operat-
ing system, 8 GB RAM. GAM, SVM, KNN, Binary tree and Naïve Bayes were utilised
as potential classifiers to detect COVID-19 infection. Cross validation was performed
using a k-fold with k = 10 [20]. For performance evaluation of the classifier, factors
such as recall, sensitivity, F-score, precision, and accuracy were evaluated. The audio
was digitised and pre-processed using suitable functions, following which the speech
baseline features were extracted and reposited in MS Excel sheets. The classifiers were
then applied to these extracted feature vectors to obtain the necessary outcome of the
detection. The classification accuracy is evaluated as follows: [2]. The hyperparameters
of all the classifiers are selected using Bayesian Optimization technique [28].
From the above outcomes, it is observed that GAM classifier, delivers best results
i.e. 97.55% classification accuracy, 96.77% precision, 97.51% specificity, 97%AUC, and
97.54% F-Score for DB-1; 97.22% accuracy, 97.14% precision, 98.33% specificity, 96%
AUC, and 96.45% F-Score for DB-2; and 90.35% accuracy, 78.9% precision, 80.55%
specificity, 89% AUC, and 74.7% F-Score for DB-3.
4 Conclusion
COVID-19 detection from speech signals can be a valuable and cost-effective method
because it does not require any complex medical invasive tests or exposure to clinics. This
work highlights a ubiquitous non-invasive detection strategy which can quickly diagnose
a suspected patient’s preliminary state of being COVID-19 positive or healthy without
the need to visit a hospital or seek medical assistance. In this paper, simple baseline
perceptual audio features have been used for detection of COVID-19 cough using 03
databases and 05 Machine learning classifiers. GAM outperformed the rest in obtaining
best results from all the databases followed by Binary Tree based classifier delivering the
second best detection performance in the first database. However, this disease detection
approach is yet to be validated by hospitals and physicians. In future, attempt can be
made to develop a similar ML classifier model based on perceptual baseline features for
real time detection of speech related diseases such as Parkinson’s disease, Alzheimer’s
disease, Dysarthria, dementia, oral cancer etc.
Comparative Analysis of COVID 19 Detection 407
References
1. https://covid19.who.int/
2. Shaban, W.M., Rabie, A.H, Saleh, A.I., Abo-Elsoud, M.A.: A new COVID-19 patients detec-
tion strategy (CPDS) based on hybrid feature selection and enhanced KNN classifier. Knowl.
Based Syst. 205, 106270 (2020)
3. Chowdhury, M.E., et al.: QUCoughScope: an artificially intelligent mobile application to
detect asymptomatic COVID-19 patients using cough and breathing sounds. arXiv preprint
arXiv:2103.12063. (2021)
4. Rasjid, Z.E., Setiawan, R.: Performance comparison and optimization of text document clas-
sification using k-NN and naïve bayes classification techniques. Procedia Comp. Sci. 1(116),
107–112 (2017)
5. Hassan, A., Shahin, I., Alsabek, M.B.: Covid-19 detection system using recurrent neural
networks. In: 2020 International Conference on Communications, Computing, Cybersecurity,
and Informatics (CCCI), pp. 1–5. IEEE (2020)
6. Aich, S., Younga, K., Hui, K.L., Al-Absi, A.A., Sain, M.: A nonlinear decision tree-based clas-
sification approach to predict the Parkinson’s disease using different feature sets of voice data.
In: 2018 20th International Conference on Advanced Communication Technology (ICACT),
pp. 638–642. IEEE (2018)
7. Petti, U., Baker, S., Korhonen, A.: A systematic literature review of automatic Alzheimer’s
disease detection from speech and language. J. Am. Med. Inform. Assoc. 27(11), 1784–1797
(2020)
8. Meghraoui, D., Boudraa, B., Merazi-Meksen, T., Boudraa, M.: Parkinson’s disease recogni-
tion by speech acoustic parameters classification. In: Chikhi, S., Amine, A., Chaoui, A., Khol-
ladi, M.K., Saidouni, D.E. (eds.) Modelling and Implementation of Complex Systems. LNNS,
vol. 1, pp. 165–173. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33410-3_12
9. Jain, M., Narayan, S., Balaji, P., Bhowmick, A., Muthu, R.K.: Speech emotion recognition
using support vector machine. arXiv preprint arXiv:2002.07590. (2020)
10. Asgari, M., Shafran, I.: Predicting severity of Parkinson’s disease from speech. In: 2010
Annual International Conference of the IEEE Engineering in Medicine and Biology, pp. 5201–
5204. IEEE (2010)
11. Sharma, N., Krishnan, P., Kumar, R., Ramoji, S., Chetupalli, S.R., Ghosh, P.K., Ganapathy, S.:
Coswara--a database of breathing, cough, and voice sounds for COVID-19 diagnosis. arXiv
preprint arXiv:2005.10548. (2020)
12. Orlandic, L., Teijeiro, T., Atienza, D.: The COUGHVID crowdsourcing dataset, a corpus for
the study of large-scale cough analysis algorithms. Scientific Data. 8(1), 1 (2021)
13. Brown, C., et al.: Exploring automatic diagnosis of COVID-19 from crowdsourced respiratory
sound data. arXiv preprint arXiv:2006.05919. (2020)
14. Stolar, M.N., Lech, M., Stolar, S.J., Allen, N.B.: Detection of adolescent depression from
speech using optimised spectral roll-off parameters. Biomed. J. 2, 10 (2018)
15. Sharma, G., Umapathy, K., Krishnan, S.: Trends in audio signal feature extraction methods.
Appl. Acoust. 15(158), 107020 (2020)
16. Toh, A.M., Togneri, R., Nordholm, S.: Spectral entropy as speech features for speech
recognition. Proc. PEECS. 1, 92 (2005)
17. Madhu, N.: Note on measures for spectral flatness. Electron. Lett. 45(23), 1195–1196 (2009)
18. Antoni, J.: The spectral kurtosis: a useful tool for characterising non-stationary signals. Mech.
Syst. Signal Process. 20(2), 282–307 (2006)
19. Hossain, E., Hossain, M.F., Rahaman, M.A.: A color and texture-based approach for the
detection and classification of plant leaf disease using KNN classifier. In: 2019 International
Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 1–6. IEEE
(2019)
408 S. Mishra et al.
20. Fushiki, T.: Estimation of prediction error by using K-fold cross-validation. Stat. Comput.
21(2), 137–146 (2011)
21. Ismael, A.M., Şengür, A.: Deep learning approaches for COVID-19 detection based on chest
X-ray images. Expert Syst. Appl. 1(164), 114054 (2021)
22. Krom, G.D.: A cepstrum-based technique for determining a harmonics-to-noise ratio in speech
signals. J. Speech Lang. Hear. Res. 36(2), 254–266 (1993)
23. Medan, Y., Yair, E., Chazan, D.: Super resolution pitch determination of speech signals. IEEE
Trans. Signal Process. 39(1), 40–48 (1991)
24. Webb, G.I., Keogh, E., Miikkulainen, R.: Naïve Bayes. Encycl. Mach. Learn. 15, 713–714
(2010)
25. Jain, M., Narayan, S., Balaji, P., Bhowmick, A., Muthu, R.K.: Speech emotion recognition
using support vector 23
26. Yüncü, E., Hacihabiboglu, H., Bozsahin, C.: Automatic speech emotion recognition using
auditory models with binary decision tree and SVM. In: 2014 22nd International Conference
on Pattern Recognition, pp. 773–778. IEEE (2014)
27. Brigham, K., Kumar, B.V.: Imagined speech classification with EEG signals for silent com-
munication: a preliminary investigation into synthetic telepathy. In: 2010 4th International
Conference on Bioinformatics and Biomedical Engineering, pp. 1–4. IEEE (2010)
28. He, F., Zhou, J., Feng, Z.K., Liu, G., Yang, Y.: A hybrid short-term load forecasting model
based on variational mode decomposition and long short-term memory networks considering
relevant factors with Bayesian optimization algorithm. Appl. Energy 1(237), 103–116 (2019)
29. Leathwick, J.R., Elith, J., Hastie, T.: Comparative performance of generalized additive models
and multivariate adaptive regression splines for statistical modelling of species distributions.
Ecol. Modell. 199(2), 188–196 (2006)
30. Tena, A., Clarià, F., Solsona, F.: Automated detection of COVID-19 cough. Biomed. Signal
Process. Control 1(71), 103175 (2022)
31. Pahar, M., Klopper, M., Warren, R., Niesler, T.: COVID-19 cough classification using machine
learning and global smartphone recordings. Comput. Biol. Med. 1(135), 104572 (2021)
Classification of High-Resolution Satellite Image
with Content Based Image Retrieval and Local
Binary Pattern
Rajalaxmi Padhy, Laxmipriya Samantaray, Sanjit Kumar Dash(B) , and Jibitesh Mishra
1 Introduction
Image-processing applications potentially benefit from using image retrieval techniques.
A CBIR system is based on comparing the query over full images. Color, texture, and
shape are common methods of retrieving images. These methods are used to retrieve
an image from an image dataset. The multiple image resolutions and sizes and spatial
color distribution are irrelevant to them. Therefore, none of these methods are suitable
for retrieving art images. Furthermore, shape-based retrievals are only helpful in a small
number of scenarios. With the development of imaging technology in recent years,
satellites with extremely high-resolution spatial imaging systems, such as IKONOS,
GeoEye-1, World-View-1, and Quick Bird, have been launched and are now able to
make more precise observations of the world. The issue of managing image databases
has arisen as high-resolution photos have become more widely available. A CBIR system
returns images from an image database based on a query image. Images are provided by
the content and metadata-based systems, utilizing an efficient image retrieval method.
Global features including color, shape, and texture are employed by various new picture
retrieval algorithms. However, the earlier outcomes indicate that using those global
attributes to look for related photos produces too many false positives.
difference histogram (CDH) in the HSV colour space [20]. The perceptually different
color between two adjacent pixels in terms of colors and edge orientations is included
in CDH [17–19]. Utilizing entropy and correlation criteria, efficient features are chosen
from the extracted features. Feature selection, feature extraction, and similarity mea-
surement are the three steps in this methodology. It’s also proposed in [24, 25] to use
the primitives of colored instant as the framework for a color image retrieval system. A
block-by-block division of the image comes first. All blocks’ color moments are then
extracted and grouped into several classes. An image’s primal is assumed to be the aver-
age moments of each class. There are features for every primitive. The YIQ color model
is employed in this article for images that are in color [13].
It gives details on how surfaces and objects are arranged structurally within an image.
The distribution of light intensity inside an image is characterized by its texture. A pic-
ture’s texture information is crucial for defining the image’s contents. A new technique
for content-based picture retrieval using the color difference histogram (CDH) was pro-
posed by Guang-Hai Liu et al. [14]. The distinguishing feature of CDHs is that, for
colors & edge directions in L*a*b* color space, they count the perceptually uniform
color distinction between 2 points on different backgrounds [21]. Two different kinds of
special histograms used in the proposed approach work together to calculate background
colors and orientations simultaneously. A similar perceptual color change between adja-
cent pixels’ edge orientations may be seen in the first histogram. The second histogram
displays the consistent perceived color difference between the edge orientation data and
the color indices of nearby pixels. Pictures are covered by a number of elements in an
application for image categorization and retrieval. Both spatial and wavelet-changed
input images are used to extract relevant features. The wavelet transformation separates
smooth and sharp information into separate channels, degrading images into various
resolutions.to provide further context for the image.
Figure 1 shows the framework of the system model for image retrieval. Here we are
using several samples from the database of high-resolution satellite images. Firstly, we
load the satellite picture databases in the MATLAB workspace. Resize the picture and
convert it from RGB to grayscale. Then perform pre-processing exercises and register
the local vector design with a reason for each pixel. Following that, extract the LBP
features and retrieve the image with the help of CBIR.
412 R. Padhy et al.
where gp is the value of the neighbouring pixel, gc is the grey value of the central pixel,
P is the number of neighbours, and R is the neighbourhood’s radius.
The LBP operator has the problem of modifying the output if the image size changes
even slightly. For complex photos, LBP might not perform as expected. The operator’s
thresholding strategy is too responsible for this. We suggest reducing the image’s colour
depth in order to increase the LBP’s resistance to these small variations in pixel values.
Various quantification levels were used in a set of experiments (q = 16, q = 32, q = 64,
q = 128), and the quantization also applied to both the image database as well as the
test image.
Classification of High-Resolution Satellite Image 413
B
D1,2 = (H1 (b) − H2 (b))2 /H1 (b) − H2 (b) (3)
b=1
B is the total of histogram bins, which is determined by the parameters P & R that
were utilised. By computing the Chi-square distances between both ith the query as well
as the jth database blocks histogram, the query and dataset images can be contrasted.
The total of the lowest distances shown by (4) is the final picture similarity distance D
for retrieval:
16
D= minj Di,j j = 1, 2 . . . 16 (4)
i=1
Re = N/Mt (5)
Here N represents the no. of relevant objects, & Mt is the overall number of relevant
objects that were retrieved.
We calculated the LBPP,R riu2 in the investigations using (P, R) parameters of (8,
1), (16, 2), and (24, 3), accordingly. The Interactive Data Language is used to create
the system for retrieving images. In this paper, we acquire a set of satellite pictures
exported from Google Earth2, which gives higher resolution satellite pictures up to
0.5 m to evaluate the current approach for indexing satellite pictures. In Fig. 2, some
samples from the database are shown (https://captain-whu.github.io/BED4RS/). There
are 50 samples of 12 types of relevant scenes, which include (a) airport, (b) forest, and
(c) parking, in high-resolution satellite images. It’s important to note that image samples
from the same class may have different scales, directions, and illuminations because
they are gathered from various regions in satellite picture resolutions.
All 600 pictures inside the database are deployed as query images to plot the recall
curves. The number of retrieved pictures was then multiplied by the standard recall.
The curves in Fig. 3 show that even more over 71% of the pictures are successfully
retrieved for the first 180 comparisons. Additionally, the difficulty of the LBP algorithm
for extracting features is substantially lower than that of the Gabor technique.
Classification of High-Resolution Satellite Image 415
5 Conclusion
In this paper, we discuss a content-based image retrieval system based on Local Binary
Pattern as well as a block division technique to categories high-resolution satellite pic-
tures. It means there are so many complicated images in satellite images that this is the
medium to give clarity to the messy picture. so that we can identify the whole region
using this method. The experiments demonstrate that with High Resolution Satellite
Images being compressed, Local Binary Pattern texture features can still deliver effec-
tive picture retrieval. Future research and the fact that High Resolution Satellite Image
has both frameworks and texturing imply that the addition of some structural features
would most likely result in improved results.
References
1. Maheswary, P., Srivastava, N.: Retrieval of remote sensing images using colour and texture
attribute. arXiv preprint arXiv:0908.4074 (2009)
2. Tebourbi, R., Belhadj, Z.: A texture based multispectral images indexing. In: 2005 12th IEEE
International Conference on Electronics, Circuits and Systems, pp. 1–4. IEEE (2005)
3. Ma, A.L.: Indexing and retrieval of satellite images. Doctoral dissertation, Oakland University
(2005)
4. Upreti, D., Saran, D.S., Hamm, D.N.:. Content-based satellite cloud image retrieval.
University of Twente Faculty of Geo-Information and Earth Observation (ITC) (2011)
5. Bouteldja, S., Kourgli, A.: Retrieval of high-resolution satellite images using texture features.
J. Electron. Sci. Tech 12(2), 211–215 (2014)
6. Maître, H.: Indexing and retrieval in large satellite image databases. In: MIPPR 2007: Remote
Sensing and GIS Data Processing and Applications; and Innovative Multispectral Technology
and Applications, vol. 6790, pp. 24–38). SPIE (2007)
7. Bhattacharya, A., Roux, M., Maitre, H., Jermyn, I.H., Descombes, X., Zerubia, J.: Index-
ing of mid-resolution satellite images with structural attributes. International Society for
Photogrammetry and Remote Sensing (2008)
8. Wang, S., Wang, A.: Segmentation of high-resolution satellite imagery based on feature
combination. Int. Arch. Photogramm. Remote. Sens. Spat. Inf. Sci. 37, 1223–1227 (2008)
416 R. Padhy et al.
9. Wan, Q. M., Wang, M., Zhang, X. Y., & Zhang, D. Q. (2009, October). Two-stage high
resolution remote sensing image retrieval combining semantic and visual features. In MIPPR
2009: Automatic Target Recognition and Image Analysis (Vol. 7495, pp. 1291–1301). SPIE
10. Nisia, T.G., Rajesh, S.: Classification of high-resolution Images with local binary pattern and
convolutional neural network: an advanced study. New Appr. Eng. Res. 3, 1–6 (2021)
11. Kavitha, P.K., Saraswathi, P.V.: Machine learning paradigm towards content-based image
retrieval on high-resolution satellite images. Int. J. Innov. Technol. Explor. Eng. 9, 2278–3075
(2019)
12. Liu, G.H., Yang, J.Y.: Content-based image retrieval using color difference histogram. Pattern
Recogn. 46(1), 188–198 (2013)
13. Singh, H., Kumar, A., Balyan, L.K., Singh, G.K.: A novel optimally weighted framework
of piecewise gamma corrected fractional order masking for satellite image enhancement.
Comput. Electr. Eng. 75, 245–261 (2019)
14. Asokan, A., Anitha, J.: Change detection techniques for remote sensing applications: a survey.
Earth Sci. Inf. 12(2), 143–160 (2019). https://doi.org/10.1007/s12145-019-00380-5
15. Afifi, A.J., Ashour, W.M.: Image retrieval based on content using color feature. International
Scholarly Research Notices (2012)
16. An, J., Lee, S.H., Cho, N.I.: Content-based image retrieval using color features of salient
regions. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 3042–3046.
IEEE (2014)
17. Degerickx, J., Roberts, D.A., Somers, B.: Enhancing the performance of Multiple Endmember
Spectral Mixture Analysis (MESMA) for urban land cover mapping using airborne Lidar data
and band selection. Remote Sens. Environ. 221, 260–273 (2019)
18. Dhivya, R., Prakash, R.: Edge detection of satellite image using fuzzy logic. Clust. Comput.
22(5), 11891–11898 (2017). https://doi.org/10.1007/s10586-017-1508-x
19. Qazanfari, H., Hassanpour, H., Qazanfari, K.: Content-based image retrieval using HSV color
space features. Int. J. Comput. Inf. Eng. 13(10), 533–541 (2019)
20. Bu, X., Wu, Y., Gao, Z., Jia, Y.: Deep convolutional network with locality and sparsity
constraints for texture classification. Pattern Recogn. 91, 34–46 (2019)
21. Wang, Q., Wan, J., Li, X.: Robust hierarchical deep learning for vehicular management. IEEE
Trans. Veh. Technol. 68(5), 4148–4156 (2018)
22. Li, X., Yuan, Z., Wang, Q.: Unsupervised deep noise modeling for hyperspectral image change
detection. Remote Sens. 11(3), 258 (2019)
23. Pavithra, L.K., Sree Sharmila, T., Subbulakshmi, P.: Texture image classification and retrieval
using multi-resolution radial gradient binary pattern. Appl. Artif. Intell. 35(15), 2298–2326
(2021)
24. Shih, J.L., Chen, L.H.: Colour image retrieval based on primitives of colour moments. IEE
Proc.-Vis. Image Sig. Process. 149(6), 370–376 (2002)
25. Ruichek, Y.: Attractive-and-repulsive center-symmetric local binary patterns for texture
classification. Eng. Appl. Artif. Intell. 78, 158–172 (2019)
Author Index