Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 10 of 16
  • Item
    Deep learning architecture for big data analytics in detecting intrusions and malicious URL
    (Institution of Engineering and Technology, 2019) Harikrishnan, N.B.; Ravi, R.; Padannayil, K.P.; Poornachandran, P.; Annappa, A.; Alazab, M.
    Security attacks are one of the major threats in today’s world. These attacks exploit the vulnerabilities in a system or online sites for financial gain. By doing so, there arises a huge loss in revenue and reputation for both government and private firms. These attacks are generally carried out through malware interception, intrusions, phishing uniform resource locator (URL). There are techniques like signature-based detection, anomaly detection, state full protocol to detect intrusions, blacklisting for detecting phishing URL. Even though these techniques claim to thwart cyberattacks, they often fail to detect new attacks or variants of existing attacks. The second reason why these techniques fail is the dynamic nature of attacks and lack of annotated data. In such a situation, we need to propose a system which can capture the changing trends of cyberattacks to some extent. For this, we used supervised and unsupervised learning techniques. The growing problem of intrusions and phishing URLs generates a need for a reliable architectural-based solution that can efficiently identify intrusions and phishing URLs. This chapter aims to provide a comprehensive survey of intrusion and phishing URL detection techniques and deep learning. It presents and evaluates a highly effective deep learning architecture to automat intrusion and phishing URL Detection. The proposed method is an artificial intelligence (AI)-based hybrid architecture for an organization which provides supervised and unsupervised-based solutions to tackle intrusions, and phishing URL detection. The prototype model uses various classical machine learning (ML) classifiers and deep learning architectures. The research specifically focuses on detecting and classifying intrusions and phishing URL detection. © The Institution of Engineering and Technology 2020.
  • Item
    Machine learning-based detection and classification of lung cancer
    (Elsevier, 2022) Dodia, S.; Annappa, A.
    Cancer is termed to be one of the life-threatening diseases in the world. Among various types of cancer, the highest mortality and morbidity rate recorded is from lung cancer. Computer-aided diagnosis (CAD) systems are used to identify lung cancer nodules. The development of reliable automated algorithms is important to provide doctors with a second opinion. A lung cancer diagnosis is performed in two steps: lung cancer nodule detection and classification. In nodule detection, from a given computed tomography (CT) scan, the nodules and nonnodules are identified. Once the nodules and nonnodules are identified, the next step is to classify the detected nodules as cancerous and noncancerous. This work explores various machine learning classifiers for lung cancer classification. A majority voting scheme is used to classify nodules. An in-depth analysis of different machine learning algorithms’ performance is presented in this work. © 2023 Elsevier Inc. All rights reserved.
  • Item
    Blockchain based Data Access Control using Smart Contracts
    (Institute of Electrical and Electronics Engineers Inc., 2019) Kiran, A.; Dharanikota, S.; Annappa, A.
    The keystone of information security has been access control. Very often, User data is misused and users are oblivious to the use of their data by unauthorized parties. Current strategies to provide storage for confidential data and subsequent authentication involve relying on a trusted third party for the same, which could be victims of Denial of Service (DoS) attacks or technical failures. This paper examines a strategy where the underlying framework for providing Access Control is the blockchain, hence decentralizing the mechanism of providing access control. Further in this paper, we demonstrate and model the User Data access on the Ethereum framework. Personal Information of the user by a website or an application is retrieved on a need-to-know basis from the off-blockchain, as determined by the user, the true owner of the data. Personal data is highly protected and the different permissions to different websites or applications are determined by the Smart Contract. © 2019 IEEE.
  • Item
    A Novel Artificial Intelligence-Based Lung Nodule Segmentation and Classification System on CT Scans
    (Springer Science and Business Media Deutschland GmbH, 2022) Dodia, S.; Annappa, A.; Mahesh, M.A.
    Major innovations in deep neural networks have helped optimize the functionality of tasks such as detection, classification, segmentation, etc., in medical imaging. Although Computer-Aided Diagnosis (CAD) systems created using classic deep architectures have significantly improved performance, the pipeline operation remains unclear. In this work, in comparison to the state-of-the-art deep learning architectures, we developed a novel pipeline for performing lung nodule detection and classification, resulting in fewer parameters, better analysis, and improved performance. Histogram equalization, an image enhancement technique, is used as an initial preprocessing step to improve the contrast of the lung CT scans. A novel Elagha initialization-based Fuzzy C-Means clustering (EFCM) is introduced in this work to perform nodule segmentation from the preprocessed CT scan. Following this, Convolutional Neural Network (CNN) is used for feature extraction to perform nodule classification instead of customary classification. Another set of features considered in this work is Bag-of-Visual-Words (BoVW). These features are encoded representations of the detected nodule images. This work also examines a blend of intermediate features extracted from CNN and BoVW characteristics, which resulted in higher performance than individual feature representation. A Support Vector Machine (SVM) is used to distinguish detected nodules into benign and malignant nodules. Achieved results clearly show improvement in the nodule detection and classification task performance compared to the state-of-the-art architectures. The model is evaluated on the popular publicly available LUNA16 dataset and verified by an expert pulmonologist. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
  • Item
    A Novel Bi-level Lung Cancer Classification System on CT Scans
    (Springer Science and Business Media Deutschland GmbH, 2022) Dodia, S.; Annappa, A.; Mahesh, M.A.
    Purpose: Lung cancer is a life-threatening disease that affects both men and women. Accurate identification of lung cancer has been a challenging task for decades. The aim of this work is to perform a bi-level classification of lung cancer nodules. In Level-1, candidates are classified into nodules and non-nodules, and in Level-2, the detected nodules are further classified into benign and malignant. Methods: A new preprocessing method, named, Boosted Bilateral Histogram Equalization (BBHE) is applied to the input scans prior to feeding the input to the neural networks. A novel Cauchy Black Widow Optimization-based Convolutional Neural Network (CBWO-CNN) is introduced for Level-1 classification. The weight updation in the CBWO-CNN is performed using Cauchy mutation, and the error rate is minimized, which in turn improved the accuracy with less computation time. A novel hybrid Convolutional Neural Network (CNN) model with shared parameters is introduced for performing Level-2 classification. The second model proposed in this work is a fusion of Squeeze-and-Excitation Network (SE-Net) and Xception, abbreviated as “SE-Xception†. The weight parameters are shared for the SE-Xception model trained from CBWO-CNN, i.e., a knowledge transfer approach is adapted. Results: The recognition accuracy obtained from CBWO-CNN for Level-1 classification is 96.37% with a reduced False Positive Rate (FPR) of 0.033. SE-Xception model achieved a sensitivity of 96.14%, an accuracy of 94.75%, and a specificity of 92.83%, respectively, for Level-2 classification. Conclusion: The proposed method’s performance is better than existing deep learning architectures and outperformed individual SE-Net and Xception with fewer parameters. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.
  • Item
    Learning Engagement Assessment in MOOC Scenario
    (Institute of Electrical and Electronics Engineers Inc., 2022) Rashmi Adyapady, R.; Annappa, A.
    Engagement recognition is essential for monitoring online learning for efficient learning outcomes. By monitoring the student's engagement, the teacher will acquire timely feedback, diminish the dropout rates, and overcome educational problems. A novel Facial Engagement Analysis-Network (FEA-Net) is proposed for learning engagement assessment in Massive Open Online Courses (MOOC) scenarios. In a MOOC setting, the combination of spatio-temporal and OpenFace features fed into FEA-Net proved effective for classifying engagement levels. The proposed FEA-Net built using Depthwise Separable Convolution layer helped improve the system's performance by reducing the model complexity. The experiment results showed an improvement of 1.01% in terms of accuracy on the Dataset for Affective States in E-learning Environments (DAiSEE) dataset. © 2022 IEEE.
  • Item
    FedPruNet: Federated Learning Using Pruning Neural Network
    (Institute of Electrical and Electronics Engineers Inc., 2022) Gowtham, L.; Annappa, A.; Sachin, D.N.
    Federated Learning (FL) is a distributed form of training the machine learning and deep learning models on the data spread over heterogeneous edge devices. The global model at the server learns by aggregating local models sent by the edge devices, maintaining data privacy, and lowering communication costs by just communicating model updates. The edge devices on which the model gets trained usually will have limitations towards power resource, storage, computations to train the model. This paper address the computation overhead issue on the edge devices by presenting a new method named FedPruNet, which trains the model in edge devices using the neural network model pruning method. The proposed method successfully reduced the computation overhead on edge devices by pruning the model. Experimental results show that for the fixed number of communication rounds, the model parameters are pruned up to 41.35% and 65% on MNIST and CIFAR-10 datasets, respectively, without compromising the accuracy compared to training FL edge devices without pruning. © 2022 IEEE.
  • Item
    Simulating Federated Transfer Learning for Lung Segmentation using Modified UNet Model
    (Elsevier B.V., 2022) Ambesange, S.; Annappa, A.; Koolagudi, S.G.
    Lung segmentation helps doctors in analyzing and diagnosing lung diseases effectively. Covid -19 pandemic highlighted the need for such artificial intelligence (AI) model to segment Lung X-ray images and diagnose patient covid conditions, in a short time, which was not possible due to huge number of patient influx at hospitals with the limited radiologist to diagnose based on test report in short time. AI models developed to assist doctors to diagnose faster, faces another challenge of data privacy. Such AI Models, for better performance, need huge data collected from multiple hospitals/diagnostic centres across the globe into single place to train the AI models. Federated Learning (FL) framework, using transfer learning approach addresses these concerns as FL framework doesn't need data to be shared to outside hospital ecosystem, as AI model get trained on local system and AI model get trained on distributed data. FL with Transfer learning doesn't need the parallel training of the model at all participants nodes like other FL. Paper simulates Federated Transfer learning for Image segmentation using transfer learning technique with few participating nodes and each nodes having different size dataset. The proposed method also leverages other healthcare data available at local system to train the proposed model to overcome lack of more data. Paper uses pre-trained weights of U-net Segmentation Model trained for MRI image segmentation to lung segmentation model. Paper demonstrates using such similar healthcare data available at local system helps improving the performance of the model. The paper uses Explainable AI approach to explain the result. Using above three techniques, Lung segmentation AI model gets near perfect segmentation accuracy. © 2023 The Authors. Published by Elsevier B.V.
  • Item
    Context Aware VM Placement Optimization Technique for Heterogeneous IaaS Cloud
    (Institute of Electrical and Electronics Engineers Inc., 2019) Kulkarni, A.K.; Annappa, A.
    Ever increasing demand for cloud adoption is prompting researchers and engineers around the world to make cloud computing more efficient and beneficial for cloud service providers and users. Cloud computing brings profits for all when the cloud infrastructure is used efficiently, and its services are made affordable to businesses of all scales. Managing cloud data center incurs a significant cost, which includes investing in IT infrastructure at the beginning and data center management costs for power, repair, space, and so on at later stages. The power costs are contributing to a significant share in overall data center management costs, and saving in power consumption can help reduce management costs for data center owners. This paper proposes an efficient context-aware adaptive heuristic-based solution for the virtual machine (VM) placement optimization in the heterogeneous cloud data centers. The proposed VM placement technique takes into the account of physical machine characteristics and load (peak and non-peak) conditions in the heterogeneous data centers to save power and also improve performance efficiency for data center owners. The experiments conducted with real cloud workloads and also synthetic workloads against a well-known adaptive heuristic-based technique indicate significant performance improvements and energy saving with our proposed solution. © 2013 IEEE.
  • Item
    Autonomic resource management framework for virtualised environments
    (Inderscience Publishers, 2019) Raghunath, B.R.; Annappa, A.
    Virtualisation enables multiples virtual machines (VMs) to co-locate on a same physical machine with total isolation. Hence using VMs to launch web services or applications is the common trend nowadays in enterprise information technology (IT). Data centre provides infrastructure to create, configure and manage VMs. It has seen as a utility that clients can pay for only as needed. The growing complexity of modern networked computer systems with virtualisation technology necessitates the needs efficient resource management. We have proposed an intelligent resource manager to control the resource allocation in Xen virtualised environment for dynamically allocating resources to individual VM. Our resource management architecture comprises of fuzzy logic based controller. Experimental results shows that with the proposed system data centre can efficiently allocate CPU resources to VMs that have been produced by customers. The scaling of CPU resources is automatically done in accordance with dynamically changing workload at a minimum granularity of 2 seconds. It improves the resource utilisation by 30% as compared to the ideal method while maintaining throughput as equivalent to the ideal workload allocation. © 2019 Inderscience Enterprises Ltd.