Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Dr. Yusuf Perwej

    Dr. Yusuf Perwej

    • noneedit
    • Research Interest :- Soft Computing, Neural Networks, Fuzzy Logic, Genetic Algorithm, Pattern Recognition, Robotics,... moreedit
    In general, the characteristics of false news are difficult to distinguish from those of legitimate news. Even if it is wrong, people can make money by spreading false information. A long time ago, there were fake news stories, including... more
    In general, the characteristics of false news are difficult to distinguish from those of legitimate news. Even if it is wrong, people can make money by spreading false information. A long time ago, there were fake news stories, including the one about "Bat-men on the moon" in 1835. A mechanism for fact-checking statements must be put in place, particularly those that garner thousands of views and likes before being refuted and proven false by reputable sources. Many machine learning algorithms have been used to precisely categorize and identify fake news. In this experiment, an ML classifier was employed to distinguish between fake and real news. In this study, we present a Tropical Convolutional Neural Networks (TCNNs) model-based false news identification system. Convolutional neural networks (CNNs), Gradient Boost, long short-term memory (LSTMs), Random Forest, Decision Tree (DT), Ada Boost, and attention mechanisms are just a few of the cutting-edge techniques that are...
    The social media has significantly changed how we communicate and exchange information throughout time. Along with it comes the issue of fake news' quick spread, which may have detrimental effects on both people and society. Fake news... more
    The social media has significantly changed how we communicate and exchange information throughout time. Along with it comes the issue of fake news' quick spread, which may have detrimental effects on both people and society. Fake news has been surfacing often and in enormous quantities online for a variety of political and economic goals. To increase the appeal of their publications, fake news publishers employ a number of stylistic strategies, one of which is stirring up readers' emotions. To increase the appeal of their publications, fake news publishers employ a number of stylistic strategies, one of which is stirring up the feelings of readers. As an outcome, it is now extremely difficult to analyses bogus news so that the creators may verify it through data processing channels without misleading the public. It is necessary to implement a system for fact-checking claims, especially those that receive thousands of views and likes before being disputed and disproved by rel...
    Currently, almost everyone spends more time on online social media platforms engaging with and exchanging information with people from all over the world, from children to adults. Our lives are greatly influenced by social media sites... more
    Currently, almost everyone spends more time on online social media platforms engaging with and exchanging information with people from all over the world, from children to adults. Our lives are greatly influenced by social media sites like Twitter, Facebook, Instagram, and LinkedIn. The social network is evolving into a well-liked platform for connecting with individuals across the globe. Social media platforms exist as a result of the enormous connectivity and information sharing that the internet has made possible. Social media's rising popularity has had both beneficial and detrimental consequences on society. However, it also has to deal with the issue of bogus profiles. False profiles are often constructed by humans, bots, or cyborgs and are used for phishing, propagating rumors, data breaches, and identity theft. Thus, we are emphasizing in this post the significance of setting up a system that can identify false profiles on social media networks. To illustrate the suggest...
    Breast cancer is becoming the leading cause of mortality among women. One of the most prevalent diseases in women, breast cancer is brought on by a variety of clinical, lifestyle, social, and economic variables. Predictive approaches... more
    Breast cancer is becoming the leading cause of mortality among women. One of the most prevalent diseases in women, breast cancer is brought on by a variety of clinical, lifestyle, social, and economic variables. Predictive approaches based on machine learning offer methods for diagnosing breast cancer sooner. It may be found using a variety of analytical methods, including Breast MRI, X-ray, thermography, mammograms, ultrasound, etc. The most prevalent technique for performance evaluation uses accuracy measures, and the Convolutional Neural Network (CNN) is the most accurate and widely used model for breast cancer diagnosis. The Wisconsin Breast Cancer Datasets (WBCD) were used to evaluate the suggested method. Out of a total of 569 samples, 273 samples were chosen for this experiment as the test data, while the other samples were utilized for training and validation. The review's findings showed that the Convolutional Neural Network (CNN) is the most effective and widely used m...
    The greatest method to anticipate the future is to look at what has happened in the past. We shall present important election behavioral predictions in this paper. This study article will focus on the data offered by Present agewise... more
    The greatest method to anticipate the future is to look at what has happened in the past. We shall present important election behavioral predictions in this paper. This study article will focus on the data offered by Present agewise voting statistics, voter demographics, votes cast, and spatial correlation among surrounding states in order to validate that a place's exit poll data. The major goals of our paper are to first encourage voting among different age groups based on projected circumstances, and then to understand the influence of a state's neighbours. Conclusively studying the entire voting scenario of previous years, which will aid in the forecast of citizens' voting behavior in the approaching years, as well as recognizing the root cause of the weaker portions and improving upon the flaws for a better future. Our main goal is to use some current voting data from a region to train and determine the major voting population in the various states of the United Sta...
    It has long been difficult to create a safe electronic voting system that provides the transparency and flexibility provided by electronic systems, while maintaining the fairness and privacy of present voting methods. Voting, especially... more
    It has long been difficult to create a safe electronic voting system that provides the transparency and flexibility provided by electronic systems, while maintaining the fairness and privacy of present voting methods. Voting, especially during elections, is a technique where participants do not trust one another since the system might be attacked not just by an outsider but also by participants themselves (voters and organizers). The traditional methods of voting systems find it challenging to maintain the characteristics of an ideal voting system since there is a chance of tampering with results and disturbing the process itself. As a result, the effectiveness of the voting system is increased by translating the characteristics of an ideal voting system into digital space. It greatly lowers the expense of the elections and the work of the inspectors. In this essay, we'll use the open-source Blockchain technology to suggest a new electronic voting system's architecture. New ...
    A computer vision system's basic goal is to detect moving things. For many applications, the performance of these systems is insufficient. One of the key reasons is that dealing with numerous restrictions such as environmental... more
    A computer vision system's basic goal is to detect moving things. For many applications, the performance of these systems is insufficient. One of the key reasons is that dealing with numerous restrictions such as environmental fluctuations makes the moving object detection process harder. Motion detection is a well-known computer technology associated with computer vision and image processing that focuses on detecting objects or instances of a specific class in digital photos and videos (for example, humans, flowers, and animals). Face detection, character recognition, and vehicle calculation are just a few of the well-studied applications of object motion detection. Object detection has a wide range of applications, including retrieval and surveillance. Object counting is a step after object detection that gets more exact and robust with the help of OpenCV. For object detection and counting, OpenCV includes a number of useful techniques. Object counting has a variety of applica...
    In many places today, the world's overcrowding causes crowded conditions. Analysis of crowd activity is a developing field of study. It is common knowledge that mob activity can forecast what might happen during an event. Crowd... more
    In many places today, the world's overcrowding causes crowded conditions. Analysis of crowd activity is a developing field of study. It is common knowledge that mob activity can forecast what might happen during an event. Crowd management could be very effective if situations like riots, mass lynchings, traffic jams, accidents, stampedes, etc. could be predicted beforehand. In this paper, we propose a new multicolumn convolutional neural network (MCNN) based technique for predicting mob behavior. The features of the incoming image are first analyzed and extracted. The approximated number of the gathering is then established, and image cropping is completed. For each area of the image, low level characteristics are retrieved. The objects in the picture are then created as density images. Using our method, the gathered characteristics and their object density maps are then linearly mapped. At last, we forecast and quantify the population using the MCNN algorithm. For the ShanghaiT...
    Reinforcement learning is an area of Machine Learning. The three primary types of machine learning are supervised learning, unsupervised learning, and reinforcement learning (RL). Pre-training a model on a labeled dataset is known as... more
    Reinforcement learning is an area of Machine Learning. The three primary types of machine learning are supervised learning, unsupervised learning, and reinforcement learning (RL). Pre-training a model on a labeled dataset is known as supervised learning. The model is trained on unlabeled data in unsupervised learning, on the other hand. Instead of being driven by labels, RL is motivated by assessing feedback. By interacting with the environment and choosing the best course of action in each circumstance in order to maximize the reward, the agent learns the best way to solve sequential decision-making issues. The RL agent chooses how to carry out tasks on its own. Furthermore, since there are no training data, the agent learns by gaining experience. In order to make subsequent judgments, RL aids agents in efficiently interacting with their surroundings. In this essay, the state-of-the-art RL is thoroughly reviewed in the literature. Applications for reinforcement learning (RL) may be...
    A recognition technique is essential in practically every industry in the current digital era. It has several advantages and may be used for security, identification, and authentication. The relevance of access control systems based on... more
    A recognition technique is essential in practically every industry in the current digital era. It has several advantages and may be used for security, identification, and authentication. The relevance of access control systems based on biometrics has grown in recent years since they have the ability to address the majority of the shortcomings of existing security systems. Automated biometric systems for human identification take a measurement of the body's "signature," compare it to a database, and make an application-specific determination. These biometric methods for personal verification and identification are based on physiological or behavioral traits that are usually recognizable, despite changing over time, such as fingerprints, hand geometry, the face, voice, lip movement, gait, and iris patterns. The purpose of this study is to conduct a thorough literature review in order to pinpoint the most well-known recognition techniques, applications, and obstacles.
    One of the leading causes of mortality for women worldwide is breast cancer. The likelihood of breast cancer-related mortality can be decreased by early identification and rapid treatment. Machine learning-based predictive technologies... more
    One of the leading causes of mortality for women worldwide is breast cancer. The likelihood of breast cancer-related mortality can be decreased by early identification and rapid treatment. Machine learning-based predictive technologies provide ways to detect breast cancer earlier. Several analytical techniques, such as breast MRI, X-ray, thermography, mammography, ultrasound, etc., may be used to find it. Accuracy metrics are the most extensively used approach for performance evaluation, and the Tropical Convolutional Neural Networks (TCNNs) model for breast cancer detection is the most precise and popular model. The proposed approach was examined using the Kaggle Breast Cancer Datasets (KBCD). The data set is partitioned into training and testing. We suggest a new class of CNNs called Tropical Convolutional Neural Networks (TCNNs), which are based on tropical convolutions and replace the multiplications and additions in traditional convolutional layers with additions and min/max op...
    Road conditions with holes are a common cause of accidents in a traffic environment. For motorcycle riders, car drivers, and other vehicle drivers, this can be fatal. For driving comfort, transportation safety, and infrastructure... more
    Road conditions with holes are a common cause of accidents in a traffic environment. For motorcycle riders, car drivers, and other vehicle drivers, this can be fatal. For driving comfort, transportation safety, and infrastructure integrity, road surface monitoring and maintenance are critical. As a result, by identifying pot holes on the highway, this article seeks to develop a road contour damage information system. In this work, we suggest an Android-based application for executing data collecting points for government entities such as the NHAI and municipalities, among others. To create the app, we trained a model to recognize whether or not an image has a pothole. If a pothole is detected, the image is saved on a server, where it can subsequently be retrieved by appropriate authorities for maintenance and analysis. Instead of using the classic paper pen method, government personnel can utilise this mobile app to collect data. We plan to limit the quantity of photographs a person...
    At the beginning and end of each session, attendance is an important aspect of the daily classroom evaluation. When using traditional methods such as calling out roll calls or taking a student's signature, managing attendance can be a... more
    At the beginning and end of each session, attendance is an important aspect of the daily classroom evaluation. When using traditional methods such as calling out roll calls or taking a student's signature, managing attendance can be a time-consuming task. The teacher normally checks it, although it's possible that a teacher will miss someone or some students' answers many times. Face recognition-based attendance system is a solution to the problem of recognizing faces for the purpose of collecting attendance by utilizing face recognition technology based on high-definition monitor video and other information technology. Instead of depending on time-consuming approaches, we present a real-time Face Recognition System for tracking student attendance in class in this work. The suggested method included identifying human faces from a webcam using the Viola-Jones technique, resizing the identified face to the desired size, and then processing the resized face using a basic Lo...
    In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has... more
    In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in cyberspace. Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace.  Two decades ago, the term "cyber security" was barely recognized by the general public. Cyber security isn't just a problem that affects individuals but it also applies to an organization or a government. Everything has recently been digitized, with cybernetics employing a variety of technologies such as cloud computing, smart phones, and Internet of Things techniques, among others. Cyber-attacks are raising concerns about privacy, security, and financial compensation. Cyber security is a set of technologie...
    In the today scenario technological intelligence is a higher demand after commodity even in traffic-based systems. These intelligent systems do not only help in traffic monitoring but also in commuter safety, law enforcement and... more
    In the today scenario technological intelligence is a higher demand after commodity even in traffic-based systems. These intelligent systems do not only help in traffic monitoring but also in commuter safety, law enforcement and commercial applications. The proposed Saudi Arabia Vehicle License plate recognition system splits into three major parts, firstly extraction of a license plate region secondly segmentation of the plate characters and lastly recognition of each character. This act is quite challenging due to the multiformity of plate formats and the nonuniform outdoor illumination conditions during image collection. In this paper recognition of the license plates is achieved by the implementation of the Learning Vector Quantization artificial neural network. Their results are based upon their completeness in the Saudi Arabia Vehicle License plate character recognition and theirs have obtained encouraging results from proposed technique.
    The most necessary part of our day to day life is electricity. The primary purpose of a power supply plant is to convert mechanical energy into electrical energy in order to supply power to the electrical grid for the consumer's... more
    The most necessary part of our day to day life is electricity. The primary purpose of a power supply plant is to convert mechanical energy into electrical energy in order to supply power to the electrical grid for the consumer's needs. In this research paper deals with a power supply plant with three generators which are connected with parallel redundancy. Although, only one generator is sufficient for supplying power to the consumer's needs. The authors' of this research paper intend to evaluate and forecast the system's reliability parameters, and have shown the practical utility of the work done with numerical examples and graphical illustrations.
    Abstract–In this paper we propose feature extraction for Telugu handwritten recognition based on the candidate search and elimination technique. The initial candidates for recognition are found by applying by zoning method on input... more
    Abstract–In this paper we propose feature extraction for Telugu handwritten recognition based on the candidate search and elimination technique. The initial candidates for recognition are found by applying by zoning method on input glyphs. We propose cavities as a structural approach suited specifically for Telugu script, where cavity vectors are used to prune the candidates by zoning. It gives the 100% features and cavity features of the input dataset. Index Terms–DataSet Generation, Feature Extraction, OCR for Telugu Hand- ...
    Research Interests:
    When it comes to our everyday life, emotions have a critical role to play. It goes without saying that it is critical in the context of mobile–computer interaction. In social and mobile communication, it is vital to understand the... more
    When it comes to our everyday life, emotions have a critical role to play. It goes without saying that it is critical in the context of mobile–computer interaction. In social and mobile communication, it is vital to understand the influence of emotions on the way people interact with one another and with the material they access. This lesson tried to investigate the relationship between the expressive state of mind and the efficacy of the human–mobile interaction while accessing a variety of different sorts of material over the course of the learning. In addition, the difficulty of the feeling of many individuals is taken into account in this research. Human hardness is an important factor in determining a person's personality characteristics, and the material that they can access will alter depending on how they engage with a mobile device. It analyses the link between the human-mobile interaction and the person's mental toughness in order to provide excellent suggestion material in the appropriate manner. In this study, an explicit feedback selection method is used to gather information on the emotional state of the mind of the participants. It has also been shown that the emotional state of a person's mind influences the human-mobile connection, with persons with varying levels of hardness accessing a variety of various sorts of material. It is hoped that this research will assist content producers in identifying engaging material that will encourage mobile users to promote good content by studying their personality features.
    People used to carry their documents about on CDs only a few years ago. Many people have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity to access and edit data stored on remote servers from any... more
    People used to carry their documents about on CDs only a few years ago. Many people have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity to access and edit data stored on remote servers from any Internet-connected platform. Cloud computing is a self-service Internet infrastructure that allows people to access computing resources at any location worldwide. The world has altered as a result of cloud computing. Cloud computing can be thought of as a new computing typology that can provide on-demand services at a low cost. By increasing the capacity and flexibility of data storage and providing scalable compute and processing power that fits the dynamic data requirements, cloud computing has aided the advancement of IT to higher heights. In the field of information technology, privacy and data security have long been a serious concern. It becomes more severe in the cloud computing environment because data is stored in multiple locations, often acr...
    Since, the last three or four years, the field of "big data" has appeared as the new frontier in the wide spectrum of IT-enabled innovations and favorable time allowed by the information revolution. Today, there is a... more
    Since, the last three or four years, the field of "big data" has appeared as the new frontier in the wide spectrum of IT-enabled innovations and favorable time allowed by the information revolution. Today, there is a raise necessity to analyses very huge datasets, that have been coined big data, and in need of uniqueness storage and processing infrastructures. MapReduce is a programming model the goal of processing big data in a parallel and distributed manner. In MapReduce, the client describes a map function that processes a key/value pair to procreate a set of intermediate value pairs & key, and a reduce function that merges all intermediate values be associated with the same intermediate key. In this paper, we aimed to demonstrate a close-up view about MapReduce. The MapReduce is a famous framework for data-intensive distributed computing of batch jobs. This is oversimplify fault tolerance, many implementations of MapReduce materialize the overall output of every map and reduce task before it can be consumed. Finally, we also discuss the comparison between RDBMS and MapReduce, and famous scheduling algorithms in this field.
    Edge detection is one of the most fundamental operations in image processing and computer vision. It is defined as the process of locating the boundaries of objects or textures delineate in an image. It is because of the fact that,... more
    Edge detection is one of the most fundamental operations in image processing and computer vision. It is defined as the process of locating the boundaries of objects or textures delineate in an image. It is because of the fact that, detection of edges simplifies the analysis of images by notably reducing the amount of data to be processed by filtering undesirable information, meantime preserving the vital structural information of an image. Sobel Edge Detection is commonly used in edge detection. In the edge function, the Sobel method uses the derivative approximation to discovery edges. But when the image has lots of white Gaussian noises, it is very unintelligib le to get the peak value of the first derivative; the reason is so far as that the noise points and the useful signals mix up. The Sobel operator is simple, but its accuracy suffers in noisy conditions. This research paper endows the fuzzy filter based Sobel Edge Detection technique. This technique depends on fuzzy ru le ba...
    In today’s digital age, a sizable data handling is a foremost concern topic for researchers. The several applications like big data, data analysis, Image processing, data mining are required processing of large amount of data. The... more
    In today’s digital age, a sizable data handling is a foremost concern topic for researchers. The several applications like big data, data analysis, Image processing, data mining are required processing of large amount of data. The Blockchain is a distributed ledger technology that stores information across various systems securely to enable peer-to-peer transactions by creating a reliable source of truth dig out mediating the so-called intermediaries of trust. A Blockchain is a technology for constructing distinguished types of distributed databases composed of unswerving blocks of data, each containing a list of transactions and a peerless reference to its predecessor block. The Blockchain based applications are springing up, covering a lot of fields, including reputation system, Internet of Things (IoT,) big data, and financial services, and so on. This technique is a shared, distributed ledger that makes easier the process of recording transactions and tracking assets in a busine...
    The intention of this paper is to evoke discussion rather than to provide an experiential extensive survey of big data research. The Big data is not a single technology but an amalgamation of old and new technologies that assistance... more
    The intention of this paper is to evoke discussion rather than to provide an experiential extensive survey of big data research. The Big data is not a single technology but an amalgamation of old and new technologies that assistance companies gain actionable awareness. The big data are vital because it empowers organizations to congregate, store, manage, and manipulate countless amounts data at the pertinent speed, at the pertinent time, to gain the pertinent intuition. Eventually big data solutions and practices are typically essential when eternal data processing, analysis and storage technologies and techniques are inadequate. In particular, big data addresses detached requirements, in other words the amalgamate of multiple un-associated datasets, processing of huge amounts of amorphous data and harvesting of unseen information in a time-sensitive genre. In this paper, aimed to demonstrate a close-up view about big data, including big data concepts, security, privacy, data storag...
    The recognition of unconstrained handwriting continues to be a difficult task for computers despite active research for several decades. This is because handwritten text offers great challenges such as character and word segmentation,... more
    The recognition of unconstrained handwriting continues to be a difficult task for computers despite active research for several decades. This is because handwritten text offers great challenges such as character and word segmentation, character recognition, variation between handwriting styles, different character size and no font constraints as well as the background clarity. In this paper primarily discussed Online Handwriting Recognition methods for Arabic words which being often used among then across the Middle East and North Africa people. Because of the characteristic of the whole body of the Arabic words, namely connectivity between the characters, thereby the segmentation of An Arabic word is very difficult. We introduced a recurrent neural network to online handwriting Arabic word recognition. The key innovation is a recently produce recurrent neural networks objective function known as connectionist temporal classification. The system consists of an advanced recurrent neu...
    The Internet of Things is an intelligent network, which concatenates all things to the Internet for the purpose of interchange information and communicating via the information sensing devices in conformity with agreed protocols. We could... more
    The Internet of Things is an intelligent network, which concatenates all things to the Internet for the purpose of interchange information and communicating via the information sensing devices in conformity with agreed protocols. We could also elucidate the IoT as the next stage in the Internet as some do, whereby things and objects with sensors and actuators are concatenated to the Internet so they can accumulate, send and get data, leading to intelligent solutions and in some cases also act upon data. In this paper, we survey state-of-the-art methods, internet of things (IoT) and its enabling technology in this new emerging area. Because, in the IoT physical objects may also make conclusion about the amassed, processed, and interchange information, as well as take expeditions to control the physical objects and the environment in which they are embedded. The capacities that enable the physical objects to get involved with in the IoT are ordinarily composed of an assemblage of vari...
    Optical character recognition, usually abbreviated to OCR, is the mechanical or electronic conversion of scanned or photographed images of typewritten or printed text into machine-encoded/computer-readable text. It is widely used as a... more
    Optical character recognition, usually abbreviated to OCR, is the mechanical or electronic conversion of scanned or photographed images of typewritten or printed text into machine-encoded/computer-readable text. It is widely used as a form of data entry from some sort of original paper data source, whether passport documents, invoices, bank statement, receipts, business card, mail, or any number of printed records. It is a common method of digitizing printed texts so that they can be electronically edited, searched, stored more compactly, displayed on-line, and used in machine processes such as machine translation, text-to-speech, key data extraction and text mining. OCR is a field of research in pattern recognition, artificial intelligence and computer vision. Optical Character Recognition or OCR is the electronic translation of handwritten, typewritten or printed text into machine translated images. It is widely used to recognize and search text from electronic documents or to pub...
    Research Interests:

    And 102 more