Recent Advances in Computer Science and Communications - Volume 18, Issue 2, 2025
Volume 18, Issue 2, 2025
-
-
A Generic Integrated Framework of Unsupervised Learning and Natural Language Processing Techniques for Digital Healthcare: A Comprehensive Review and Future Research Directions
More LessThe increasing availability of digital healthcare data has opened up fresh prospects for improving healthcare through data analysis. Machine learning (ML) procedures exhibit great promise in analyzing large volumes of healthcare data to extract insights that could be utilized to improve patient outcomes and healthcare delivery. In this work, we suggest an integrated framework for digital healthcare data analysis by integrating unsupervised learning techniques and natural language processing (NLP) techniques into the analysis pipeline. The module on unsupervised learning will involve techniques, such as clustering and anomaly detection. By clustering similar patients together based on their medical history and other relevant factors, healthcare providers can identify subgroups of patients who may require different treatment approaches. Anomaly detection can also help to detect patients who stray from the norm, which could be indicative of underlying health issues or other issues that need additional investigation. The second module on NLP will enable healthcare providers to analyze unstructured text data such as clinical notes, patient surveys, and social media posts. NLP techniques can help to identify key themes and patterns in these datasets, requiring awareness that could not be readily apparent through other means. Overall, incorporating unsupervised learning techniques and NLP into the analysis pipeline for digital healthcare data possesses the promise to enhance patient results and lead to more personalized treatments, and represents a potential domain for upcoming research in this field. In this research, we also review the current state of research in digital healthcare information examination with ML, including applications like forecasting clinic readmissions, finding cancerous tumors, and developing personalized drug dosing recommendations. We also examine the potential benefits and challenges of utilizing ML in healthcare data analysis, including issues related to data quality, privacy, and interpretability. Lastly, we discuss the forthcoming research paths, involving the necessity for enhanced methods for incorporating information from several resources, developing more interpretable ML patterns, and addressing ethical and regulatory challenges. The usage of ML in digital healthcare data analysis promises to transform healthcare by empowering more precise diagnoses, personalized treatments, and improved health outcomes, and this work offers a complete overview of the current trends.
-
-
-
Exploring Deep Learning Approaches for Ransomware Detection: A Comprehensive Survey
Ransomware, a form of malicious software originating from cryptovirology, poses a serious threat by coercing victims to pay a ransom under the risk of exposing their data or permanently restricting access. While basic ransomware may lock a system without causing harm to files, more sophisticated variants utilize cryptoviral extortion techniques. The danger of ransomware is significant, with ongoing discoveries of new strains and families on the internet and dark web. Recovering from ransomware infections is challenging due to the complex encryption schemes employed. The exploration of machine learning and deep learning methods for ransomware detection is crucial, as these technologies can identify zero-day threats. This survey delves into research contributions on the detection of ransomware using deep learning algorithms. With deep learning gaining prominence in cybersecurity, we aimed to explore techniques for ransomware detection, assess weaknesses in existing deep learning approaches, and propose enhancements using those deep learning algorithms. Machine learning algorithms can be employed to tackle worldwide computer security challenges, encompassing the detection of malware, recognition of ransomware, detection of fraud, and identification of spoofing attempts. Machine learning algorithms play a crucial role in assessing prevalent forms of cyber security risks. They are instrumental in identifying and mitigating attacks, conducting vulnerability scans, and evaluating the risks associated with the public internet. By leveraging machine learning, computer defense mechanisms can effectively identify and respond to various cyber threats. These techniques aid in fortifying systems against potential vulnerabilities and enhance the overall security posture. Research in this field investigates the utilization of cyber training in both defensive and offensive contexts, offering insights into the intersection of cyber threats and machine learning techniques.
-
-
-
Low-complexity User Scheduling Framework for mmWave Hybrid Beam-forming OFDM System under Non-ideal CSI
More LessIntroductionUser scheduling in millimeter-wave (mmWave) multi-user hybrid beam-forming Orthogonal Frequency Division Multiplexing (OFDM) systems involves the joint optimization of resource block group (RBG) allocation, beam pairing, and user selection. However, choosing the optimal scheduled User Equipment (UE), allocated RBGs, and communicating beams in practical mmWave hybrid beam-forming systems with non-ideal Channel State Information (CSI) remains challenging.
MethodsIn this paper, we propose a low-complexity user scheduling framework. On one hand, two user classification methods are proposed under non-ideal CSI, assisted by beam search and RBG allocation respectively. On the other hand, in order to ensure both the throughput and fairness performance, a novel user selection scheme, called weighted user selection based on feedback threshold (WUSFT) scheme is proposed, and approximate closed-form expression of fairness index for both full feedback and feedback based on threshold are derived. Our proposed methods consist of three steps. First, RBGs are allocated based on the maximum received signal power (MRSP) of each user on each RBG, utilizing quasi-omnidirectional beams. In the second step, the communicating beams are further searched to achieve the MRSP with the allocated RBG.
ResultsFinally, the allocated RBG, or the determined beam information obtained through the beam search, is used to represent the correlation of user channels and classify the UEs into groups. Only UEs whose reported factor is not less than the feedback threshold will report received information. This simplifies the operation of user scheduling. Moreover, simulation results demonstrate that our proposed schemes can achieve more than 92.3% of the sum rate performance of exhaustive search methods while maintaining relatively low complexity.
ConclusionIn addition, the user feedback overhead (FO) reduces obviously, especially with large UE number.
-
-
-
A Multimodal Fusion and Ensemble Approach for Robust Fake News Detection through Deep Learning, Reinforcement Learning, and Using Blockchain to Enhance Security and Authorization
Authors: Vivek Kumar, Satveer, Waseem Ahmad and Satendra KumarBackgroundComputer science significantly influences modern culture, especially with the rapid breakthroughs and technology in social media networking. Social media platforms have become significant channels for sharing and exchanging daily news and information on many issues in the current digital environment, which is known for its massive data collection and transmission capabilities. While there are many benefits to this environment, there are also many false reports and information that deceive readers and users into believing they are receiving correct information.
ObjectiveNowadays, all users use social media to obtain news content, but sometimes some malicious users tamper with real news and then spread fake news, which may reduce the reputation of social media. Therefore, many existing models have been introduced to detect fake news, but these models are based on traditional machine learning algorithms, such as decision tree (DT), multilayer perceptron (MLP), random forest (RF), etc. These models Lack of performance, security, and authorization. Our proposed model can solve existing model problems using reinforcement learning and blockchain technology.
MethodsIn this research paper, we explain a new way to identify fake news. This new approach, combined with policy-based heuristic reinforcement learning (PHRL), where the model dynamically adjusts through iterative learning, is the key innovation and gradually improves classification accuracy. The same as our smart contract authorization method, which enhances the authenticity of content posted safely by authorized users and improves the transparency and accountability of information.
ResultsOur model was tested on real-time information collected from various sources with 70% accuracy and valid authentication.
ConclusionOur proposed model produced better results with a Mean Absolute Error (MAE) of 0.0811 and Root Mean Squared Error (RMSE) of 0.2847, both significantly lower values. Our proposed model performs better than multilayer perceptron (MLP), and random forest (RF).
-
-
-
Exploring the Reality behind Augmented Reality Applications in Retailing: The Role of Value Orientation and Use Frequency
Authors: Mais A. Al-Sharqi and Haitham S. HasanBackgroundAugmented reality (AR) technology has altered the retail business while also improving the shopping experience. Several studies have been conducted to investigate the factors that influence the relevance of perceived AR technology values, as well as how these values influence customer enjoyment and the desire to spread good word of mouth (WOM). This study explores how the perceived value of AR affects customer satisfaction, enjoyment, and recommendations.
ObjectiveThis study aimed to examine how the usage frequency moderates the associations between human value orientation and perceived AR values, as well as the correlations between valued AR and satisfaction and positive WOM intention. It studies the relationship between perceived AR values and consumer happiness, as well as the influence of human value orientation on perceived AR values (receptivity to change, preservation of resources, self-improvement, and transcendence of oneself) (playful, social, aesthetic appeal, and usability).
MethodsThis research extends the human value orientation theory by proposing a novel model for the link between AR value orientation and usage frequency. To obtain data, a survey was distributed to those who have engaged with retail AR features.
ResultsContrary to popular belief, the data demonstrate that a certain group of perceived AR values is linked to each value orientation, emphasizing the significance of a certain perceived AR value in affecting customer satisfaction and positive WOM intention. This study shows that usage frequency moderates the associations between human value orientation and perceived AR values, as well as the correlations between valued AR and satisfaction and positive WOM intention. It also shows that consumer value orientation is the most essential aspect in choosing which AR technology advantage they value most. AR technology values also affect consumer satisfaction and word-of-mouth marketing (WOM).
ConclusionThe value orientation of an individual influences the value of augmented reality technology, which may vary depending on the frequency of usage. This paper concludes with suggestions for merchants regarding augmented reality technology. Moreover, the precise number of applications that can be made available to customers and retailers is determined by this study, which benefits both retailers and researchers.
-
-
-
A Developed Model Based on Machine Learning Algorithms for Phishing Website Detection
Authors: Hussein Abdel-Jaber, Hussein Al Bazar and Muawya NaserIntroductionUsers are accessing websites for many purposes, such as obtaining information about a particular topic, buying items, accessing their accounts, etc. Cybercriminals use phishing websites to attain the sensitive information of the users, like usernames and passwords, credit card details, etc. Detecting phishing websites helps in protecting the information and the money of people. Machine learning algorithms can be applied to detect phishing websites.
MethodsIn this paper, a model based on various machine learning algorithms is developed to detect phishing websites. The machine learning algorithms used in this model are Decision Tree, Random Forest, Extra Trees, K-Nearest Neighbors, Multilayer Perceptron and Support Vector Machine. The dataset of phishing websites is taken from the Kaggle website. The algorithms mentioned above of the developed model are compared together to identify which algorithm has better classification results.
ResultsThe extra trees algorithm offers the best results for accuracy, precision, and F1-Score. This paper also compares the developed model with a previous model that uses the same dataset and relies upon decision tree, random forest, and support vector machine to determine which model has better classification report results. The developed model, depending on the Decision Tree and SVM, offers better classification results than those of the previous models. The developed model is compared with another preceding model relying upon Decision Tree and Random Forest algorithms to determine which model generates better results for accuracy, precision, recall/sensitivity, and F1-Score.
ConclusionThe developed model, depending on the Decision Tree, presents better results for accuracy, recall, and F1-Score than the results of accuracy, sensitivity, and F1-Score for the preceding model based on the Decision Tree.
-
-
-
Network Security and Cryptography: Threats, Obstacles and Solutions - A Bibliometric Analysis
Authors: Purushottam Singh, Sandip Dutta and Prashant PranavBackgroundIn the wake of escalating cyber threats and the indispensability of robust network security mechanisms, it becomes crucial to understand the evolving landscape of cryptographic research. Recognizing the significant contributions and discerning emerging trends can guide future strategies and technological advancements. Our study endeavors to shed light on this through a bibliometric analysis of publications in the realms of Network Security and Cryptography.
MethodTo chronicle and synthesize the progression of research methodologies from their inception to the present day, we undertook a comprehensive Bibliometric Analysis of Network Security and Cryptography. Our data set was culled from the Clarivate Analytics Web of Science Database, encompassing 3,897 papers, 603 sources, and 7,886 authors from across the globe.
ResultsOur analysis revealed a marked upsurge in cryptographic research since 1992, with China standing out as a dominant contributor in terms of publications. Notably, while 'security' and 'cryptography' emerged as recurrent research themes, there's an observable downtrend in international collaborations. Our study also highlights pivotal topics shaping the network security domain, offering insights into the trajectories of research source growth, structural variabilities in research relevance, and prospective intellectual and collaborative avenues as guided by authorship patterns.
ConclusionCryptographic research is on an upward trajectory, both in volume and significance. However, the tapering of international collaborations and an evident need to concentrate on emergent challenges, such as data privacy and innovative network attacks, emerge as notable insights. This bibliometric review serves as a compass, directing researchers and academicians towards areas warranting heightened attention, thereby informing the roadmap for future investigative pursuits.
-
Most Read This Month
