Unveiling Model Superiority: A Comprehensive Analysis of Deep Learning Architectures for Robust Breast Cancer Prediction and Generalization
Research Paper | Journal Paper
Vol.13 , Issue.4 , pp.1-14, Apr-2025
CrossRef-DOI: https://doi.org/10.26438/ijcse/v13i4.114
Abstract
Breast cancer remains a leading global health challenge, demanding early, accurate, and interpretable diagnostic tools. This study presents a comprehensive evaluation of five pretrained convolutional neural networks—DenseNet121, InceptionV3, VGG19, EfficientNetB4, and MobileNetV3—for classifying breast ultrasound images from the BUSI dataset into Normal, Benign, and Malignant categories. The proposed framework integrates transfer learning, advanced preprocessing techniques, and class-weighted optimization to enhance model generalization and address data imbalance. Unlike prior studies, this work introduces a multi-model statistical comparison using Paired T-test, Wilcoxon Signed-Rank, and Cohen’s d, along with real-time inference benchmarking and a deployment-ready performance dashboard. Among the evaluated models, DenseNet121 demonstrated superior performance with an accuracy of 89.92% and an AUC-ROC of 0.95, outperforming existing state-of-the-art methods on the BUSI dataset. InceptionV3 also achieved strong results with 87.84% accuracy and notable inference speed. The findings confirm the clinical viability of integrating statistical rigor, inference-time awareness, and visual interpretability into deep learning pipelines for breast cancer detection. This framework lays the groundwork for scalable, explainable, and deployment-focused diagnostic AI systems in medical imaging.
Key-Words / Index Term
Breast Cancer, Deep Learning, Ultrasound Imaging, Transfer Learning, DenseNet121, InceptionV3.
References
[1] E. Du-Crow, "Computer-aided detection in mammography," M.Sc. thesis, Univ. of Manchester, 2022.
[2] A. Evans et al., "Breast ultrasound: Recommendations for information to women and referring physicians by the European Society of Breast Imaging," Insights Imaging, Vol.9, No.4, pp.449–461, 2018, doi: 10.1007/s13244-018-0637-8.
[3] G. Schueller, C. Schueller-Weidekamm, and T. H. Helbich, "Accuracy of ultrasound-guided, large-core needle breast biopsy," Eur. Radiol., Vol.18, No.8, pp.1761–1773, 2008. doi: 10.1007/s00330-008-0913-8.
[4] X. Shi, C. Liang, and H. Wang, "Multiview robust graph-based clustering for cancer subtype identification," IEEE/ACM Trans. Comput. Biol. Bioinf., Vol.20, No.2, pp.544–556, 2022, doi: 10.1109/TCBB.2022.3140846.
[5] H. Wang, G. Jiang, J. Peng, R. Deng, and X. Fu, "Towards adaptive consensus graph: Multi-view clustering via graph collaboration," IEEE Trans. Multimedia, Vol.24, pp.1–13, 2022, doi: 10.1109/TMM.2022.3142749.
[6] J. Bai, R. Posner, T. Wang, C. Yang, and S. Nabavi, "Applying deep learning in digital breast tomosynthesis for automatic breast cancer detection: A review," Med. Image Anal., vol. 71, p. 102049, 2021, doi: 10.1016/j.media.2021.102049.
[7] Z. Li, F. Liu, W. Yang, S. Peng, and J. Zhou, "A survey of convolutional neural networks: Analysis, applications, and prospects," IEEE Trans. Neural Netw. Learn. Syst., Vol.33, No.12, pp.6999–7019, 2022. doi: 10.1109/TNNLS.2022.3156148.
[8] J. Zuluaga-Gomez, Z. Al Masry, K. Benaggoune, S. Meraghni, and N. Zerhouni, "A CNN-based methodology for breast cancer diagnosis using thermal images," Comput. Methods Biomech. Biomed. Eng. Imag. Vis., Vol.9, No.2, pp.131–145, 2021, doi: 10.1080/21681163.2020.1796879.
[9] A. Krizhevsky, I. Sutskever, and G. E. Hinton, "ImageNet classification with deep convolutional neural networks," Commun. ACM, Vol.60, No.6, pp.84–90, 2017, doi: 10.1145/3065386.
[10] K. He, X. Zhang, S. Ren, and J. Sun, "Deep residual learning for image recognition," in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Las Vegas, NV, USA, pp.770–778, 2016. doi: 10.1109/CVPR.2016.90.
[11]B. Kaur and R. Popli, "A comprehensive review and analysis of advancements in breast cancer detection and classification," in Proc. 2024 3rd Edition of IEEE Delhi Section Flagship Conf. (DELCON), 2024, doi: 10.1109/DELCON64804.2024.10866898.
[12] A. M. Sharafaddini, K. K. Esfahani, and N. Mansouri, "Deep learning approaches to detect breast cancer: A comprehensive review," Multimedia Tools and Applications, Aug. 2024. https://doi.org/10.1007/s11042-024-XXXXX
[13] M. Mahalakshmi, G. R. Charan, and G. Sharma, "Integrative breast cancer detection: A deep learning approach with multi-modal data fusion of mammograms, prescription and blood reports," in Proc. 2024 Int. Conf. on Communication, Computing and Internet of Things (IC3IoT), 2024, doi: 10.1109/IC3IoT60841.2024.10550391.
[14] A. Alloqmani, Y. B. Abushark, and A. I. Khan, "Anomaly detection of breast cancer using deep learning," Arabian Journal for Science and Engineering, Vol.48, pp.10977–11002, 2023. doi: 10.1007/s13369-023-07914-2.
[15] S. S. Pandi, S. Anandhi, T. Kumaragurubaran, and B. Priyan, "Automatic breast cancer disease detection and diagnosis using learning algorithm," in Proc. 2024 2nd Int. Conf. on Advances in Information Technology (ICAIT), 2024. doi: 10.1109/ICAIT61638.2024.10690336.
[16] S. Garg, K. Kaur, N. Kumar, and J. J. P. C. Rodrigues, "Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: A social multimedia perspective," IEEE Trans. Multimedia, Vol.21, No.3, pp.566–578, 2019. doi: 10.1109/TMM.2019.2893549.
[17] O. Russakovsky et al., "ImageNet large scale visual recognition challenge," Int. J. Comput. Vis., Vol.115, No.3, pp.211–252, 2015. doi: 10.1007/s11263-015-0816-y.
[18] A. Krizhevsky, I. Sutskever, and G. E. Hinton, "ImageNet classification with deep convolutional neural networks," in Proc. 26th Conf. Neural Information Processing Systems (NIPS’12), Lake Tahoe, NV, USA, Dec., pp.1097–1105, 2012. doi: 10.1145/3065386.
[19] J. Arevalo, F. A. González, R. Ramos-Pollán, J. L. Oliveira, and M. A. G. Lopez, "Representation learning for mammography mass lesion classification with convolutional neural networks," Comput. Methods Programs Biomed., Vol.127, pp.248–257, 2016. doi: 10.1016/j.cmpb.2015.12.014.
[20] B. Q. Huynh, H. Li, and M. L. Giger, "Digital mammographic tumor classification using transfer learning from deep convolutional neural networks," J. Med. Imaging, Vol.3, No.3, pp.034501, 2016. doi: 10.1117/1.JMI.3.3.034501.
[21] J. Ferlay et al., "Cancer statistics for the year 2020: An overview," Int. J. Cancer, Vol.149, No.4, pp.778–789, 2021. doi: 10.1002/ijc.33588.
[22] S. Lei et al., "Global patterns of breast cancer incidence and mortality: A population-based cancer registry data analysis from 2000 to 2020," Cancer Commun., Vol.41, No.12, pp.1183–1194, 2021. doi: 10.1002/cac2.12197.
[23] J. S. Marks et al., "Implementing recommendations for the early detection of breast and cervical cancer among low-income women," MMWR Recomm. Rep., Vol.49, pp.35–55, 2000.
Citation
Ahmed Wagdy, "Unveiling Model Superiority: A Comprehensive Analysis of Deep Learning Architectures for Robust Breast Cancer Prediction and Generalization," International Journal of Computer Sciences and Engineering, Vol.13, Issue.4, pp.1-14, 2025.
Comparative Analysis of Deep Learning Techniques for Soil Image Classification
Research Paper | Journal Paper
Vol.13 , Issue.4 , pp.15-22, Apr-2025
CrossRef-DOI: https://doi.org/10.26438/ijcse/v13i4.1522
Abstract
Soil classification is a crucial step in agricultural and environmental planning. Current innovations in computer vision and deep learning have enabled automatic soil classification using image-based approaches. This paper, explore comparative analysis of two popular convolutional neural network architectures, VGG16 and VGG19, for soil image classification. A use of soil image dataset containing various soil types used to evaluate the performance of both models. These models fine-tuned using transfer learning, and performance determined using metrics such as accuracy, precision, recall, F1-score, and training time. The result shows that both VGG16 and VGG19 achieve high classification accuracy, with VGG19 slightly outperforming than VGG16 in terms of accuracy but requiring more computational resources and time. This paper demonstrates the effectiveness of deep learning models in soil image classification and provides understandings into their comparative performance.
Key-Words / Index Term
Agriculture, Soil, Image Classification, VGG16, VGG19
References
[1] S. A. Khan, et al., “A review of soil classification using machine learning,” Geoderma, Art. no. 114984, Vol.389, 2021.
[2] R. McBratney, D. J. Field, and A. B. McBratney, “Future directions of soil science,” Geoderma Regional, Vol.4, pp.1–5, 2015.
[3] M. A. Shepherd and M. G. Shepherd, “Modern soil testing and classification,” Soil Use and Management, Vol.29, No.4, pp.515–525, 2013.
[4] R. Goswami, A. Saha, and P. Saha, “Soil classification using Convolutional Neural Networks,” Computers and Electronics in Agriculture, Vol.172, 2020.
[5] D. Yadav, R. K. Sharma, and N. Kumari, “Deep learning models for soil type classification using image and spectral data,” Environmental Modelling & Software, Vol.148, 2022.
[6] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet classification with deep convolutional neural networks,” in Proc. NIPS, pp. 1097–1105, 2012.
[7] K. Simonyan and A. Zisserman, “Very Deep Convolutional Networks for Large-Scale Image Recognition,” arXiv:1409.1556, 2014.
[8] Srivastava P., Shukla A., & Bansal A., A comprehensive review on soil classification using deep learning and computer vision techniques. Multimedia Tools and Applications, Vol.80, Issue.3, pp.4667-4694, 2021.
[9] Deng, Z., Liu, M., & Wang, Y., Hyperspectral image classification using convolutional neural networks and 3D-CNNs. Journal of Applied Remote Sensing, Vol.14, Issue.1, pp.014520, 2020.
[10] Ramesh P., & Suruliandi A., Soil classification using deep convolutional neural networks for Indian soil datasets. International Journal of Computer Applications, Vol.178, Issue.21, pp.27-34, 2019.
[11] Zhang, Y., Li, J., & Chen, Y., Using attention mechanisms for soil classification based on CNNs: A case study in agriculture. Agricultural Systems, 190, pp.103092, 2021.
[12] Hossain, M. S., Rahman, M. M., & Goh, A. T. C., Explainable AI for soil classification: Using Grad-CAM to visualize CNN decisions. Expert Systems with Applications, 189, pp.116030, 2022.
[13] Nguyen, D. D., Tran, T. P., & Pham, H. D., Federated learning for privacy-preserving soil image classification. International Journal of Agricultural Science and Technology, Vol.13, Issue.1, pp.32-43, 2023.
[14] Alam, M. A., Islam, M. R., & Shikder, M. I., Enhancing soil image classification performance with data augmentation and image enhancement techniques. Computers and Electronics in Agriculture, 194, 106754, 2022.
[15] P. Goswami, P. P. Roy, and S. Bandyopadhyay, “Soil classification using convolutional neural networks,” J. Soil Sci. Environ. Manage., Vol.11, No.4, pp.55-63, 2020.
[16] S. A. Khan, M. Usman, and A. R. Shah, “A review of soil classification using machine learning,” Geoderma, Vol.389, pp. 114984, 2021.
[17] R. Yadav, D. Gupta, and R. Bhattacharyya, “Hybrid deep learning models for soil fertility classification using image and spectral data,” Environ. Sci. Pollut. Res., Vol.29, No.5, pp.6592-6606, 2022.
[18] S. Nandhini and V. Kavitha, “Soil texture classification using deep convolutional neural networks on satellite images,” Remote Sensing Lett., Vol.11, No.3, pp.299-308, 2020.
[19] R. Patil, M. K. Choudhury, and H. Joshi, “Real-time soil type prediction using deep learning with a mobile application,” Sensors, Vol.21, No.9, pp.2995, 2021.
[20] F. Zhao, X. Li, and Y. Zhang, “A comparative study of CNN architectures for soil profile classification using RGB images,” Agric. Informatics, Vol.3, No.2, pp.113-124, 2022.
[21] Zhang X, Youman NH, King RL. Soil texture classification using wavelet transform and maximum likelihood approach. 7929-7931
[22] Ok S, Hyun K, Youl K (2012) Texture Classification Algorithm Using RGB Characteristics of Soil Images 57, pp.393–397, 2003.
[23] Shenbagavalli R, Ramar K., Classification of soil textures based on Laws features extracted from preprocessing images on sequential and random windows. Bonfring Int J Adv Image Process 1: pp.15–18, 2011.
[24] Sofou A, Evangelopoulos G, Maragos P., Soil image segmentation and texture analysis: a computer vision approach. Geoscience and Remote Sensing Letters Vol.2, Issue.4, pp.394–398, 2005.
[25] Breul P, Gourves R., In field soil characterization: approach based on texture image analysis. Journal of Geotechnical and Geoenvironmental Engineering Vol.132, Issue.1, pp.102–107, 2006.
[26] Shenbagavalli R, Ramar K., Feature extraction of soil images for retrieval based on statistics. Int J Comput Appl 88: pp.8–12, 2014.
[27] Honawad PSK, Chinchali PSS, Pawar PK, Deshpande PP., Soil Classification and Suitable Crop Prediction. pp.25–29, 2017.
[28] Murti GSRK, Satyanarayana KVS. Influence of chemical characteristics in the development of soil colour. Geoderma 5: pp.243–248, 1971.
[29] Chung SO, Cho KH, Cho JW, Jung KY, Yamakawa T. Soil texture classification algorithm using RGB characteristics of soil images. J Fac Agric Kyushu Univ 57: pp.393–397, 2012.
[30] de O. Morais PA, Souza DM, de M. Carvalho MT, Madari BE, de Oliveira AE, Predicting soil texture using image analysis. Microchem. J. 146: pp.455–463, 2019.
Citation
Girish D. Chate, S.S. Bhamare, "Comparative Analysis of Deep Learning Techniques for Soil Image Classification," International Journal of Computer Sciences and Engineering, Vol.13, Issue.4, pp.15-22, 2025.
Central Bank Digital Currencies vs. Bitcoin: Competing or Complementary Digital Currencies?
Research Paper | Journal Paper
Vol.13 , Issue.4 , pp.23-33, Apr-2025
CrossRef-DOI: https://doi.org/10.26438/ijcse/v13i4.2333
Abstract
With the rapid digitization of finance, Central Bank Digital Currencies (CBDCs) and Bitcoin represent two distinct approaches to digital money. CBDCs are state-backed and regulated, whereas Bitcoin is decentralized and independent of government control. Understanding their interaction is crucial for policymakers, economists, and investors. This paper conducts a comprehensive SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis of both CBDCs and Bitcoin to evaluate their impact on the global financial landscape. The study explores the fundamental differences between these digital currencies, covering aspects such as monetary control, technological frameworks, regulatory challenges, and economic implications. The paper begins with an overview of related work, detailing various forms of money and existing comparative studies between CBDCs and Bitcoin. It then examines the structure, benefits, risks, and development of CBDCs, followed by an in-depth discussion on Bitcoin, including blockchain architecture, cryptographic protocols, and consensus mechanisms. Through a systematic SWOT analysis, the strengths of CBDCs—such as financial inclusion and transaction efficiency—are contrasted with their weaknesses, including privacy concerns and implementation costs. Similarly, Bitcoin’s decentralized nature and transparency are weighed against its volatility and regulatory uncertainty. Findings from this study highlight the need for balanced regulatory frameworks and technological innovations to maximize the benefits of both CBDCs and Bitcoin while mitigating associated risks. These insights contribute to ongoing discussions on the role of digital currencies in shaping the future of finance. The paper concludes with future research directions, emphasizing the importance of interoperability, scalability, and evolving security measures in the digital currency ecosystem. This research article will contribute to the ongoing debate on digital currencies, providing a balanced perspective on whether CBDCs and Bitcoin are rivals or complementary elements in the evolving financial landscape.
Key-Words / Index Term
Bitcoin, Blockchain, Central Bank Digital Currency, Cryptocurrency, Decentralized Finance, Digital Currencies, Fiat-backed Digital Currency, Financial Inclusion
References
[1] M. Laboure, M. H.-P. Müller, G. Heinz, S. Singh and S. Köhling, “Cryptocurrencies and CBDC: The Route Ahead,” Global Policy, Vol.12, pp.663-676, 2021.
[2] S. Bernhart, “Applications of CBDCs and private stablecoins: Comparative analysis,” Northwestern Switzerland, 2020.
[3] Š. Jozipovi?, M. Perkuši? and N. Mladini?, “A Comparative Review of the Legal Status of National Cryptocurrencies and CBDCs: A Legal Tender or Just Another Means of Payment,” Pravni vjesnik: ?asopis za pravne i društvene znanosti Pravnog fakulteta Sveu?ilišta JJ Strossmayera u Osijeku, Vol.40, No.1, pp.77-96, 2024.
[4] F. Katherine, S. Blakstad, S. Gazi and M. Bos, “Digital Currencies and CBDC Impacts on Least Developed Countries (LDCs),” United Nations Development Programme and United Nations Capital Development Fund, 2021.
[5] P. Hamm, F. Tronnier and D. Harborth, “Can the Digital Euro Succeed where Bitcoin Failed? A Multigroup Comparison of Adoption Intention in Digital Currencies in Germany,” Pacific Asia Journal of the Association for Information Systems, Vol.17, No.1, pp.82-109, 2025.
[6] S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 2008.
[7] S. Z. Ali, D. Sahu and J. Sahu, “Bitcoin in Blockchain: A Survey,” International Journal of Computer Sciences and Engineering, Vol.7, No.6, pp.708-712, 2019.
[8] D. W. Walumbe and J. G. Ndia, “A Systematic Literature Review of Proof of Work and Proof of Activity: Privacy and Performance,” International Journal of Computer Sciences and Engineering, Vol.11, No.10, pp.37-44, 2023.
[9] J. Campbell and V. Puri, “State of Bitcoin: 2024,” 17 December 2024.
Citation
Brahmaleen K. Sidhu, "Central Bank Digital Currencies vs. Bitcoin: Competing or Complementary Digital Currencies?," International Journal of Computer Sciences and Engineering, Vol.13, Issue.4, pp.23-33, 2025.
AI Diffusion: An Android Application for Text-to-Image Generation Using Generative AI Models
Research Paper | Journal Paper
Vol.13 , Issue.4 , pp.34-40, Apr-2025
CrossRef-DOI: https://doi.org/10.26438/ijcse/v13i4.3440
Abstract
AI Diffusion is an Android-supported text-to-image synthesis application fusing cutting-edge generative artificial intelligence and the pervasiveness of Android platforms. The vision is to provide users with a simple yet incredibly powerful tool with which they can produce realistic and imaginative images from text-based descriptions. Application architecture features an Android frontend developed with Kotlin and Python-based backend authored in FastAPI. Upon entering a prompt by a user, the backend interacts with a pre-trained generative AI model hosted via API to create an associated image, which is then rendered inside the app. The system is optimized to be lean and responsive to support real-time interaction even on resource-constrained devices. Comprehensive testing shows that the app works seamlessly with minimal latency and creates contextually accurate images for all types of prompts. The project bridged the distance between powerful AI functionality and genuine mobile usability, bringing more individuals access to creative tools and enabling them to access them with more ease. The project also enables future upgrade prospects, such as customization options and offline model suitability, to add more feasibility to mobile AI solutions.
Key-Words / Index Term
Text-to-Image Generation, Generative AI, Android Application, FastAPI, Latent Diffusion Models, Mobile AI, AI-Powered Creativity, Prompt-Based Generation
References
[1] P. Rombach, A. Blattmann, D. Lorenz, P. Esser, and B. Ommer, “High-Resolution Image Synthesis with Latent Diffusion Models,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.45, No.7, pp.7985-7999, 2022. https://doi.org/10.1109/TPAMI.2022.3202325
[2] A. Radford, J. W. Kim, C. Hallacy, A. Ramesh, G. Goh, S. Agarwal, and I. Sutskever, “Learning Transferable Visual Models from Natural Language Supervision,” International Journal of Computer Vision, Vol.130, No.5, pp.1102–1120, 2022. https://doi.org/10.1007/s11263-021-01477-2
[3] A. Ramesh, M. Pavlov, G. Goh, S. Gray, C. Voss, A. Radford, M. Chen, and I. Sutskever, “Zero-Shot Text-to-Image Generation,” In Proceedings of the 38th International Conference on Machine Learning (ICML), PMLR, Vol.139, pp.8821–8831, 2021.
[4] S. L. Mewada, “A Proposed New Approach for Cloud Environment using Cryptic Techniques,” In the Proceedings of the 2022 International Conference on Physical Sciences, ISROSET, India, pp.542–545, 2022.
[5] A. Dadhich, H. Khandelwal, H. Jhalani, and A. Mangal, “Virtual Gesture Fusion (VGF): A Comprehensive Review of Human–Computer Interaction through Voice Assistants and Gesture Recognition,” International Journal of Novel Research and Development (IJNRD), Vol.9, No.4, pp.123–129, 2024.
[6] K. Reddy, S. Janjirala, and K. B. Prakash, “Gesture Controlled Virtual Mouse with the Support of Voice Assistant,” International Journal for Research in Applied Science and Engineering Technology (IJRASET), Vol.10, No.6, pp.2314–2320, 2022.
[7] L. S. Sowndarya, K. Swethamalya, A. Raghuwanshi, R. Feruza, and G. Sathish Kumar, “Hand Gesture and Voice Assistants,” E3S Web of Conferences, Vol.399, pp.04050, 2023. https://doi.org/10.1051/e3sconf/202339904050
[8] Y. Zhang and Y. Li, “Machine Learning in Gesture Recognition: A Comprehensive Survey,” ACM Computing Surveys, Vol.54, No.5, pp.1–37, 2021. https://doi.org/10.1145/3446370
[9] C. Chen and C. Wang, “Gesture Recognition in Human-Computer Interaction,” Journal of Ambient Intelligence and Humanized Computing, Vol.11, No.3, pp.1013–1026, 2020. https://doi.org/10.1007/s12652-019-01382-3
[10] E. O`Neill and A. O`Brien, “Voice Devices and User Experience: Understanding Design Trade-offs,” International Journal of Human-Computer Studies, Vol.127, pp.1–12, 2019. https://doi.org/10.1016/j.ijhcs.2018.12.001
Citation
Anant Agrawal, Vedant Vardhan Rathour, Babeetha S., "AI Diffusion: An Android Application for Text-to-Image Generation Using Generative AI Models," International Journal of Computer Sciences and Engineering, Vol.13, Issue.4, pp.34-40, 2025.
Bell Buddy: A Dual-Mode IoT-Based Smart Doorbell with Real-Time Facial Recognition and Intruder Alert System
Research Paper | Journal Paper
Vol.13 , Issue.4 , pp.41-46, Apr-2025
CrossRef-DOI: https://doi.org/10.26438/ijcse/v13i4.4146
Abstract
In the evolving landscape of home automation, security remains a top priority. This paper presents "Bell Buddy," a dual-mode smart doorbell system designed to enhance residential safety through real-time image processing and IoT integration. The system operates in two distinct modes: Doorbell Mode and Intruder Detection Mode. In Doorbell Mode, when the bell is pressed, a notification is instantly sent to the user`s mobile device, along with a captured image of the visitor for manual verification and remote access control. In Intruder Detection Mode, the system actively monitors for motion near the entrance and uses facial recognition algorithms to determine whether the detected individual is authorized or not. If an unknown face is identified, alerts are dispatched to both the user and predefined emergency contacts, while an audible alarm is triggered. The proposed system combines ESP32, Raspberry Pi, and cloud-based services for seamless real-time communication. The user interface is developed using React Native, while machine learning models trained using TensorFlow ensure accurate intruder detection. With end-to-end encryption and database integration, Bell Buddy offers an intelligent, efficient, and scalable solution for modern home security. The system has been evaluated on parameters such as recognition accuracy, notification speed, and reliability under varying environmental conditions.
Key-Words / Index Term
Smart Doorbell, IoT Security, Intruder Detection, Facial Recognition, Mobile Notification, ESP32, Raspberry Pi, Real-Time Image Processing, Home Automation, Deep Learning
References
[1] S. K. Sharma, L. Gupta, “A Novel Approach for Cloud Computing Environment,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.1-5, 2014.
[2] M. Khan, H. Anum, S. Batool, B. Bashir, “Smart Home with Wireless Smart Doorbell with Smart Response,” 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Turkey, pp.120–124, 2021.
[3] S. Pawar, V. Kithani, S. Ahuja, S. Sahu, “Smart Home Security using IoT and Face Recognition,” 2018 International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India, pp.1–5, 2018.
[4] V. Bhanse, M. D. Jaybhaye, “Face Detection and Tracking using Image Processing on Raspberry Pi,” 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), India, pp.542–545, 2018.
[5] D. R. Shenvi, K. Shet, “CNN Based Face Recognition for Home Security,” International Conference on AI and Smart Systems (ICAIS), India, pp.873–878, 2021.
[6] R. V. S. Lalitha, K. Kavitha, N. V. Krishna Rao, “Smart Surveillance with Smart Doorbell,” IEEE Access, Vol.8, pp.118309–118321, 2020.
[7] A. Mardin, T. Anwar, B. Anwer, “Image Compression using Discrete Transformation and Matrix Reduction,” International Journal of Scientific Research in Biological Sciences, Vol.5, No.1, pp.1–6, 2017.
[8] H. R. Singh, “Randomly Generated Algorithms and Dynamic Connections,” International Journal of Scientific Research in Biological Sciences, Vol.2, Issue.1, pp.231–238, 2014.
[9] C. Todeka, “Principle of Data Securing,” IJCSE Publication, India, pp.03–05, 2022.
[10] S. T. Tanwar, “Dive in Market of Crypto Currencies,” Journal of Computer Science and Engineering, Vol.13, Issue.1, pp.12–20, 2024.
Citation
Sivakami T.S., Jasmin Maria Binoy, Alphia Jose, Hredya Vijay, "Bell Buddy: A Dual-Mode IoT-Based Smart Doorbell with Real-Time Facial Recognition and Intruder Alert System," International Journal of Computer Sciences and Engineering, Vol.13, Issue.4, pp.41-46, 2025.
Quantum Safe Cryptography using Modern Hybrid Cryptography Techniques to Secure Data
Research Paper | Journal Paper
Vol.13 , Issue.4 , pp.47-58, Apr-2025
CrossRef-DOI: https://doi.org/10.26438/ijcse/v13i4.4758
Abstract
Cryptography, the practice of concealing messages for private exchange, has evolved significantly to address the challenges posed by new communication methods. In today`s digital world, cryptography has become the cornerstone of cybersecurity, using advanced mathematics like number theory and computational complexity to protect digital information through algorithms. The upcoming arrival of quantum computers poses a serious threat to traditional cryptographic methods, especially those based on asymmetric key cryptography. Quantum Safe Cryptography (QSC) represents the next step in information security, designed to develop cryptographic systems that can withstand attacks from both quantum and classical computers. As quantum computing moves from theory to reality, it`s becoming clear that current cryptographic methods based on integer factorization and discrete logarithm problems are vulnerable to quantum algorithms like Shor`s algorithm. This study highlights the security risks that quantum computing poses to existing encryption methods and proposes a comprehensive approach to quantum-safe cryptography. The transition to quantum-resistant algorithms involves replacing vulnerable cryptographic systems with alternatives that can resist quantum computational attacks. Current analysis shows that while asymmetric key cryptography faces immediate vulnerability, symmetric key algorithms and hash functions remain relatively secure in the near term with appropriate adjustments. Quantum cryptography, which directly uses quantum mechanical principles, offers highly secure encryption mechanisms, notably Quantum Key Distribution (QKD). This research aims to enhance the security of digital infrastructure against quantum threats by evaluating hybrid cryptographic implementations that combine classical and quantum-resistant approaches for optimal security.
Key-Words / Index Term
Hybrid Cryptosystems, Advanced Encryption Standard, Symmetric Key Encryption, Asymmetric Key Encryption, Quantum Safe Cryptography, Quantum Key Distribution, Post-Quantum Cryptography, Lattice-Based Cryptography
References
[1] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 20th Anniversary Edition. Wiley, 2015.
[2] S. Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor Books, 2011.
[3] NIST, "Communications Security," NIST Computer Security Resource Center, Feb. 2024.
[4] J. Watrous, "Practical introduction to quantum-safe cryptography," IBM Quantum Learning, 2023.
[5] D. Clemon and V. Velasquez, "Quantum Computing: Definition, How It`s Used, and Example," Investopedia, Feb. 2024.
[6] L. Chen et al., "Report on Post-Quantum Cryptography," NIST Internal Report 8105, Apr. 2021.
[7] M. Ajtai and C. Dwork, "A public-key cryptosystem with worst-case/average-case equivalence," in Proceedings of the 29th Annual ACM Symposium on Theory of Computing, pp.284-293, 1997.
[8] P. W. Shor, "Algorithms for quantum computation: Discrete logarithms and factoring," in Proceedings of the 35th Annual Symposium on Foundations of Computer Science, pp.124-134, 1994.
[9] D. J. Bernstein and T. Lange, "Post-quantum cryptography," Nature, Vol.549, No.7671, pp.188-194, 2017.
[10] M. Khalid Yousif, Z. E. D. S. W. K., "Information security for big data using the NTRUEncrypt method," Measurement: Sensors, pp.1-5, 2023.
[11] G. S. Bhathal and A. Singh, "Big data computing with distributed computing frameworks," in Innovations in Electronics and Communication Engineering: Proceedings of the 7th ICIECE 2018, 2018.
[12] J. Singh and G. S. Bhathal, "A Review on Storage Security Challenges in Cloud Computing," International Journal of Advanced Research in Computer Science and Software Engineering, pp.225-228, 2015.
[13] W. Stallings, Cryptography and Network Security: Principles and Practice, 8th Edition. Pearson, 2023.
[14] G. K. Sandhu and G. S. Bhathal, "To Enhance the OTP Generation Process for Cloud Data Security using Diffie-Hellman and HMAC," Global Journal of Computer Science and Technology, 2016.
[15] D. Boneh and V. Shoup, A Graduate Course in Applied Cryptography, Version 0.6, 2023.
[16] A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. CRC Press, 2018.
[17] M. Campagna et al., "Quantum Safe Cryptography and Security," European Telecommunications Standards Institute, France, 2015.
[18] L. K. Grover, "A fast quantum mechanical algorithm for database search," in Proceedings of the 28th Annual ACM Symposium on Theory of Computing, pp.212-219, 1996.
[19] D. J. Bernstein, J. Buchmann, and E. Dahmen, Post-Quantum Cryptography. Springer, 2009.
[20] R. Agrawal, M. Singh, and D. Agrawal, "Quantum resistant security solutions for blockchain technology," Journal of Physics: Conference Series, Vol.1831, No.1, 2021.
[21] E. Barker, "Recommendation for Key Management: Part 1 – General," NIST Special Publication 800-57 Part 1 Revision 5, May 2020.
[22] NIST, "Post-Quantum Cryptography Standardization," 2024.
[23] Y. Zhao, R. Steinfeld, and A. Sakzad, "FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers," IEEE Transactions on Computers, Vol.69, No.1, pp.126-137, 2020.
[24] N. P. Smart, "Post-quantum secure cryptographic infrastructures," National Cyber Security Centre, UK, Technical Report, Jan. 2024.
[25] H. Nejatollahi, N. Dutt, S. Ray, F. Regazzoni, I. Banerjee, and R. Cammarota, "Post-Quantum Lattice-Based Cryptography Implementations: A Survey," ACM Computing Surveys, Vol.51, No.6, pp.129:1-129:41, 2024.
[26] M. Braithwaite, "Experimenting with Post-Quantum Cryptography," Google Security Blog, Jul. 2021.
[27] D. Moody et al., "Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process," NIST Interagency Report 8413, Jul. 2022.
[28] T. Lange and C. van Vredendaal, "Practical Post-Quantum Cryptography," IEEE Security & Privacy, Vol.21, No.1, pp.30-38, 2023.
[29] European Union Agency for Cybersecurity (ENISA), "Post-Quantum Cryptography: Current State and Quantum Mitigation," Report, Jan. 2024.
[30] National Security Agency, "Commercial National Security Algorithm Suite 2.0," Jan. 2024.
[31] N. Sendrier, "Code-based cryptography: State of the art and perspectives," IEEE Security & Privacy, Vol.19, No.1, pp.32-39, 2024.
[32] V. Mavroeidis, K. Vishi, M. D. Zych, and A. Jøsang, "The Impact of Quantum Computing on Present Cryptography," International Journal of Advanced Computer Science and Applications, Vol.9, No.3, 2018.
[33] L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, and D. Stehlé, "CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme," IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.2018, No.1, pp.238-268, 2018.
[34] O. Regev, "On lattices, learning with errors, random linear codes, and cryptography," Journal of the ACM, Vol.56, No.6, pp.1-40, 2009.
[35] J. Hoffstein, J. Pipher, and J. H. Silverman, "NTRU: A ring-based public key cryptosystem," in Algorithmic Number Theory, Springer, pp. 267-288, 1998.
[36] C. Gentry, C. Peikert, and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions," in Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pp. 197-206, 2008.
[37] X. Lu, Y. Liu, D. Jia, H. Xue, J. He, Z. Zhang, Z. Liu, H. Yang, B. Li, and K. Wang, "LAC: Lattice-based Cryptosystems," 2018.
[38] P. Wallden and E. Kashefi, "Cyber security in the quantum era," Communications of the ACM, Vol.62, No.4, pp.120-129, 2019.
[39] J. Daemen and V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, 2020.
[40] J. Proos and C. Zalka, "Shor`s discrete logarithm quantum algorithm for elliptic curves," Quantum Information & Computation, Vol.3, No.4, pp.317-344, 2003.
[41] ETSI, "Quantum-Safe Hybrid Key Exchange," ETSI Technical Specification 103 744 V1.1.1, Jan. 2024.
[42] D. Micciancio and O. Regev, "Lattice-based cryptography," in Post-Quantum Cryptography, Springer, pp.147-191, 2009.
[43] A. Hülsing, D. J. Bernstein, C. Dobraunig, M. Eichlseder, S. Fluhrer, S.-L. Gazdag, P. Kampanakis, S. Kölbl, T. Lange, M. M. Lauridsen, F. Mendel, R. Niederhagen, C. Rechberger, J. Rijneveld, and P. Schwabe, "SPHINCS+: Submission to the NIST post-quantum project," 2019.
[44] NIST, "Guidelines for Transitioning to Post-Quantum Cryptography," NIST Special Publication 800-215, Jan. 2024.
[45] M. Mosca, "Cybersecurity in an era with quantum computers: Will we be ready?," IEEE Security & Privacy, Vol.16, No.5, pp.38-41, 2018.
[46] J. H. Cheon, D. Kim, J. Lee, and Y. Song, "Lizard: Cut off the tail! A practical post-quantum public-key encryption from LWE and LWR," in Security and Cryptography for Networks, Springer, pp.160-177, 2018.
[47] T. Prest, P.-A. Fouque, J. Hoffstein, P. Kirchner, V. Lyubashevsky, T. Pornin, T. Ricosset, G. Seiler, W. Whyte, and Z. Zhang, "FALCON: Fast-Fourier Lattice-based Compact Signatures over NTRU," Submission to the NIST Post-Quantum Cryptography Standardization Process, 2019.
[48] A. K. Ekert, "Quantum cryptography based on Bell`s theorem," Physical Review Letters, Vol.67, No.6, pp.661-663, 1991.
[49] C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Vol.175, pp.8-12, 1984.
[50] V. Lyubashevsky, L. Ducas, E. Kiltz, T. Lepoint, P. Schwabe, G. Seiler, and D. Stehlé, "CRYSTALS-Kyber: Algorithm Specifications and Supporting Documentation," NIST PQC Round 3 Submission, 2021.
[51] D. J. Bernstein, "Comparing proofs of security for lattice-based encryption," in Selected Areas in Cryptography – SAC 2019, Springer, pp.1-27, 2020.
[52] M. Alagic et al., "Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process," NIST Interagency Report 8309, Jul. 2020.
[53] IEEE, "Quantum Computing Security and Cryptography Standards," IEEE Standard 2041.1-2024, Jan. 2024.
[54] D. Jao and L. De Feo, "Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies," in Post-Quantum Cryptography, Springer, pp.19-34, 2011.
[55] Cloud Security Alliance, "Practical Implementation of Post-Quantum Cryptography," CSA Research Report, Mar. 2024.
[56] Internet Engineering Task Force (IETF), "Hybrid Post-Quantum Key Encapsulation Methods (PQ KEM) for Transport Layer Security 1.3 (TLS)," Internet-Draft, Jan. 2024.
[57] J. W. Bos, C. Costello, M. Naehrig, and D. Stebila, "Post-quantum key exchange for the TLS protocol from the ring learning with errors problem," in IEEE Symposium on Security and Privacy, pp.553-570, 2015.
[58] R. Steinfeld, "Incremental Transitioning to Post-Quantum Cryptography Through Hybrid Schemes," ACM Transactions on Privacy and Security, Vol.28, No.1, pp.1-42, 2024.
[59] N. Bindel, J. Brendel, M. Fischlin, B. Goncalves, and D. Stebila, "Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange," in Post-Quantum Cryptography, Springer, pp.206-226, 2023.
[60] European Commission, "Quantum Communication Infrastructure: Transition to Post-Quantum Cryptography," Digital Europe Programme, Technical Report, Jan. 2024.
[61] K. E. Lauter, "The advantages of elliptic curve cryptography for wireless security," IEEE Wireless Communications, Vol.11, No.1, pp.62-67, 2004.
[62] L. Chen, S. Jordan, Y.-K. Liu, D. Moody, R. Peralta, R. Perlner, and D. Smith-Tone, "Report on post-quantum cryptography," NIST Interagency Report 8105, Apr. 2016.
[63] A. Langlois and D. Stehlé, "Worst-case to average-case reductions for module lattices," Designs, Codes and Cryptography, Vol.75, No.3, pp.565-599, 2015.
[64] National Quantum Initiative, "Post-Quantum Cryptography Implementation Guidelines for Critical Infrastructure," Technical Report, Jan. 2024.
[65] C. Peikert, "A decade of lattice cryptography," Foundations and Trends in Theoretical Computer Science, Vol.10, No.4, pp.283-424, 2016.
[66] M. O. Saarinen, "HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption," in Selected Areas in Cryptography – SAC 2017, Springer, pp.192-212, 2018.
[67] World Economic Forum, "Quantum-Safe Cryptography: Strategic Implementation for Global Business," Industry Report, Feb. 2024.
[68] D. Stebila and M. Mosca, "Post-quantum key exchange for the internet and the open quantum safe project," in Selected Areas in Cryptography – SAC 2016, Springer, pp.14-37, 2016.
[69] Google Security Team, "Transitioning to Post-Quantum Cryptography: Lessons from Large-Scale Deployments," Technical White Paper, Jan. 2024.
[70] R. Azarderakhsh, D. Fishbein, and D. Jao, "Efficient implementations of a quantum-resistant key-exchange protocol on embedded systems," Technical Report, University of Waterloo, 2023.
[71] International Telecommunication Union (ITU), "Security architecture for quantum-safe communications," ITU-T Recommendation X.1811, Feb. 2024.
[72] U.S. Department of Defense, "Quantum-Resistant Cryptography Implementation Guide for Defense Systems," Technical Directive, Jan. 2024.
[73] V. Rijmen and J. Daemen, "Advanced Encryption Standard," in Encyclopedia of Cryptography and Security, Springer, pp.31-33, 2011.
[74] Banking and Financial Services Consortium, "Case Study: Quantum-Safe Migration in Global Banking Networks," Industry Report, Jan. 2024.
[75] Healthcare Information and Management Systems Society (HIMSS), "Quantum-Safe Protection for Electronic Health Records: Implementation Case Study," Technical Report, Feb. 2024.
[76] NATO Cyber Defence Centre of Excellence, "Quantum-Resistant Cryptography for Military Applications: Case Studies and Lessons Learned," Technical Report, Jan. 2024.
[77] Global Telecommunications Security Alliance, "5G and 6G Networks: Quantum-Safe Implementation Case Study," Industry Report, Feb. 2024.
[78] Cloud Security Alliance, "Quantum-Safe Cloud Services: Implementation Case Study," Research Report, Jan. 2024.
[79] National Institute of Standards and Technology, "Transitioning to Post-Quantum Cryptography," NIST Special Publication 800-224, Feb. 2024.
[80] World Economic Forum, "Quantum Technology and Cybersecurity: Preparing for the Post-Quantum Era," Global Risk Report, Jan. 2024.
[81] Quantum Economic Development Consortium, "Economic Impact of Quantum Computing on Cybersecurity Infrastructure," Industry Analysis, Feb. 2024.
[82] International Organization for Standardization, "Information Security: Guidelines for Quantum-Safe Cryptography Implementation," ISO/IEC 24485:2024, Jan. 2024.
[83] S. Singh and G. S. Bhathal, "Improving Security and Data Protection of Serverless Computing in the Cloud Environment", International Journal of Computer Sciences and Engineering, Vol.12, Issue.5, pp.19-27, 2024.
[84] J. Singh and G. S. Bhathal, "Securing Multi-Cloud Environment: An Automated Data Deletion System with Integrated Intrusion Detection System Over Multi-Cloud Platforms", International Journal of Computer Sciences and Engineering, Vol.12, Issue.7, pp.33-40, 2024.
Citation
Gurjit Singh Bhathal, Udaibir Singh Bhathal, "Quantum Safe Cryptography using Modern Hybrid Cryptography Techniques to Secure Data," International Journal of Computer Sciences and Engineering, Vol.13, Issue.4, pp.47-58, 2025.
Enhancing Diabetic Retinopathy Detection Using Optimized Deep Learning Techniques with ResNet
Research Paper | Journal Paper
Vol.13 , Issue.4 , pp.59-67, Apr-2025
CrossRef-DOI: https://doi.org/10.26438/ijcse/v13i4.5967
Abstract
Diabetic retinopathy (DR) is an extreme complication of diabetes and a main reason of vision impairment worldwide. Early detection is essential for powerful treatment and prevention of blindness. In this paper, we gift a deep learning approach for the automatic detection of DR the use of ResNet, a convolutional neural network (CNN) architecture known for its intensity and excessive performance in photo reputation obligations. Our examine utilizes a big dataset of retinal fundus pictures, which undergo preprocessing and augmentation to beautify the version’s robustness. The ResNet model is exceptional-tuned to classify specific stages of DR with an excessive diploma of accuracy. The consequences exhibit that our version achieves a class accuracy of 94.3%, appreciably enhancing detection competencies as compared to standard techniques. This paper explores using switch getting to know and optimization techniques to cope with demanding situations along with overfitting and dataset imbalance, in the end offering a green, scalable solution for computerized diabetic retinopathy screening.
Key-Words / Index Term
Diabetic Retinopathy, Deep Learning, ResNet-50, Retinal Fundus Images, Classification, Convolutional Neural Network, Medical Imaging, Early Diagnosis, Feature Extraction, Automated Detection.
References
[1] Neha Tamboli, G.S. Malande, “Proliferative Diabetic Retinopathy Detection Using Machine Learning”, International Journal of Computer Sciences and Engineering, Vol.8, Issue.6, pp.106-111, 2020.
[2] Saurabh. S. Athalye, Gaurav Vijay, “Survey of Automatic Detection of Diabetic Retinopathy using digital image processing”, International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.352-355, 2019.
[3] K.K. Faisal , C.M. Deepa, S.M. Nisha, G. Gopi, “Study on Diabetic Retinopathy Detection Techniques”, International Journal of Computer Sciences and Engineering, Vol.4 , Issue.11, pp.137-140, 2016.
[4] Rajesh I.S., Bharathi Malakreddy A., Maithri C., Manjunath Sargur Krishnamurthy, Shashidhara M.S, “Automatic Detection of Optic Disc and Its Center in Color Retinal Images: A Review”, International Journal of Computer Sciences and Engineering, Vol.12, Issue.4, pp.81-85, 2024.
[5] Kaveri Devi, Arshdeep Kaur, “MSVM Based Technique Used To Detect Diabetic Retinopathy at Early Stage” , International Journal of Computer Sciences and Engineering, Vol.9, Issue.3, pp.34-40, 2021.
[6] Ruthran Baskar, Emmanuel Sabu, Claudia Mazo, “Deep CNNs for Diabetic Retinopathy Classification: A Transfer Learning Perspective”, 2024 IEEE International Symposium on Biomedical Imaging, 2024.
[7] Aryan Kokane,Gourhari Sharma, Akash Raina, Shubham Narole, Prof. Pramila M. Chawan. “Detection of Diabetic Retinopathy using Machine Learning”, International Research Journal of Engineering and Technology, Vol.7, Issue.11, pp.663-637, 2020.
[8] R. Gargeya and T. Leng, “Automated Identi fi cation of Diabetic Retinopathy Using Deep Learning,” Ophthalmology, pp.1–8, 2017.
[9] M. D. Abr„amoff, M. K. Garvin, and M. Sonka, “Retinal imaging and picture analysis,” IEEE Reviews in Medicine Engineering, Vol.3, pp.169–208, 2010
[10] V. Ramya, “SVM Based Detection for Diabetic Retinopathy,” Iccad, Vol.5, No.1, pp.11–13, 2018.
[11] MN. Abrmoff, M. Niemeijer, MS. Suttorp-Schulten, MA. Viergever, SR. Russell, B. Van Ginneken , “Evaluation of a system for automatic detection of diabetic retinopathy from color fundus photographs in a large population of patients with diabetes”, Diabetes Care; Vol.31, Issue.2, pp.193–205, 2008.
[12] J. Nayak, PS. Bhat, R. Acharya, CM. Lim, M. Kagathi, “Automated identification of different stages of diabetic retinopathy using digital fundus images”, J Med Syst; Vol.32, Issue.2, pp.107–115, 2008.
Citation
Tansu Gangopadhyay, Saptaparno Patra, Deepajothi S., "Enhancing Diabetic Retinopathy Detection Using Optimized Deep Learning Techniques with ResNet," International Journal of Computer Sciences and Engineering, Vol.13, Issue.4, pp.59-67, 2025.
Enhanced K-Means Clustering through Density-Based Inter-Centroid Distance Optimization
Research Paper | Journal Paper
Vol.13 , Issue.4 , pp.68-77, Apr-2025
CrossRef-DOI: https://doi.org/10.26438/ijcse/v13i4.6877
Abstract
K-Means is a popular algorithm used in unsupervised machine learning for clustering tasks, especially when working with data that lacks predefined labels. It is widely employed to divide such data into meaningful groups. This research presents an improved version of the traditional K-Means algorithm, adapting it for use on labeled datasets to evaluate its effectiveness in segmentation. The study compares this modified version with the standard K-Means method, focusing on aspects like accuracy, efficiency, and computational demand. A dataset containing more than 3,000 records is used for experimentation. The standard approach starts with K=2, randomly selecting initial centroids and refining them through iterations until results stabilize. This is repeated up to K=9. In the revised method, however, a top-down approach is implemented. Instead of selecting centroids randomly, the algorithm uses a density-based technique to place initial centroids in densely populated data regions. Clusters are formed based on these regions and refined iteratively. After each convergence, the process continues by further dividing the clusters, up to K=9. Results from the study reveal that the new approach improves performance by speeding up convergence—reducing iterations by over 20%—and lowering computational costs, while also boosting overall clustering accuracy and efficiency.
Key-Words / Index Term
Clustering, K-Means Algorithm, Density-Based Centroid Selection, Top-Down Approach, Segmentation Efficiency
References
[1] T. Kanungo, D. M. Mount, N. S. Netanyahu, C. D. Piatko, R. Silverman, and A. Y. Wu, “An efficient k-means clustering algorithm: analysis and implementation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.24, pp.881–892, 2002. DOI:10.1109/TPAMI.2002.1017616
[2] K. Wagstaff, C. Cardie, S. Rogers, and S. Schrödl, “Constrained k-means clustering with background knowledge,” Proceedings of the Eighteenth International Conference on Machine Learning, Williamstown, MA, USA, vol. 1, pp. 577–584, 2001. DOI:10.5555/645530.655646
[3] Z. Huang, “Extensions to the k-means algorithm for clustering large datasets with categorical values,” Data Mining and Knowledge Discovery, vol.2, no. 3, pp.283–304, 1998. DOI:10.1023/A:1009769707641
[4] P. J. Rousseeuw, “Silhouettes: a graphical aid to the interpretation and validation of cluster analysis,” Journal of Computational and Applied Mathematics, vol. 20, pp. 53–65, 1987. DOI:10.1016/0377-0427(87)90125-7
[5] S. Singh and N. S. Gill, “Analysis and study of k-means clustering algorithm,” International Journal of Engineering Research & Technology (IJERT)*, vol. 2, issue 7, pp. 2546–2551, 2013.
[6] F. Yuan, Z. H. Meng, H. X. Zhang, and C. R. Dong, “A new algorithm to get the initial centroids,” Proceedings of the 3rd International Conference on Machine Learning and Cybernetics, pp. 26–29, 2004.
[7] K. Arai and A. R. Barakbah, “Hierarchical K-means: An algorithm for centroids initialization for k-means,” International Journal of Computer Science, vol. 36, no. 1, pp. 1–6, 2007.
[8] P. Gupta and R. Sharma, “Adaptive K-means clustering for dynamic data,” Journal of Machine Learning Research, vol.18, no. 1, pp. 230–242, 2017.
[9] J. Kim, H. Park, and S. Lee, “A spatially aware K-means algorithm for image segmentation,” International Journal of Computer Vision and Image Processing, vol. 9, no. 4, pp. 145–158, 2018.
[10] A. Kumar and V. Singh, “Parallelized K-means for large-scale data clustering,” Journal of Computational Science, vol. 23, no. 2, pp.305–318, 2017.
[11] Y. Lee, S. Park, and J. Choi, “Hybrid K-means clustering with decision trees for automated cluster determination,” Pattern Recognition Letters, vol. 45, no. 6, pp. 74–86, 2019.
[12] L. Zhang, Y. Xu, and Z. Li, “A hybrid K-means algorithm based on density clustering,” Journal of Computational Mathematics, vol. 34, no. 8, pp. 1013–1025, 2016.
[13] Z. Zhao, S. Yang, and X. Liu, “Outlier-resistant K-means clustering based on data preprocessing,” Computational Statistics & Data Analysis, vol. 100, no. 3, pp. 65–80, 2016.
[14] M. H. Ali and A. Zubair, “K-means clustering for high-dimensional data: A performance evaluation,” International Journal of Computer Science and Information Security, vol. 16, no. 2, pp. 112–121, 2018.
[15] A. Banerjee and S. Ghosh, “Enhanced K-means clustering algorithm for anomaly detection in big data,” Journal of Big Data, vol. 5, no. 1, pp. 35–47, 2017.
[16] L. Yang and R. Zhang, “A comparative study of K-means clustering algorithms in data mining,” International Journal of Data Mining and Knowledge Discovery, vol. 27, no.4, pp.456–467, 2019.
[17] J. Wang and C. Li, “Improving K-means clustering through density-based initialization,” Journal of Applied Mathematical Modeling, vol. 40, no. 9, pp.5631–5638, 2016.
[18] G. Kaur and V. Kumar, “An improved K-means clustering approach for bioinformatics data analysis,” Journal of Bioinformatics and Computational Biology, vol. 15, no.1, pp.21–32, 2017.
centroid selection for large-scale datasets,” Data Science and Engineering, vol. 4, no. 3, pp.112–121, 2019.
[20] R. Smith, K. Johnson, and M. Patel, “A study on K-means clustering for high-dimensional datasets,” Journal of Data Science and Machine Learning, vol. 15, no. 3, pp. 45–60, 2018.
[21] Zhou, H., & Yang, S., Density-based k-means clustering for imbalanced datasets. International Journal of Computational Intelligence, 9(2), pp.122-130, 2017.
[22] Garcia, A., Lopez, J., & Singh, A., Hybrid approach of k-means clustering and machine learning models for improved classification accuracy. Journal of Computational Methods in Applied Sciences, 21(4), pp.275-289, 2019.
[23] Wang, Q., & Li, J., Adaptive clustering for dynamic selection of k in k-means algorithm. Journal of Computational Intelligence and Data Mining, Vol.25, Issue.6, pp.90-102, 2017.
[24] Patel, A., Kumar, V., & Singh, P., Influence of initialization methods on k-means clustering performance. International Journal of Data Analysis and Applications, Vol.14, Issue.1, pp.55-72, 2018.
[25] Tan, Y., & Zhang, Z., GA-K-means: A genetic algorithm-based optimization of k-means clustering. Journal of Evolutionary Computing and Data Science, Vol.11, Issue.3, pp.129-145, 2019.
[26] D. Saidulu, V. Devasekhar, and V. Swathi, "Secured MapReduce Based K-Means Clustering in Big Data Framework," International Journal of Computer Sciences and Engineering, Vol.7, No.5, pp.1427–1430, 2019.
[27] K. Gandhimathi and N. Umadevi, "Prediction of Type 2 Diabetics Based on Clustering Algorithm," International Journal of Computer Sciences and Engineering, Vol.8, No.11, pp.72–78, 2020.
[28] K. Sarkar and R. K. Mudi, "Fuzzy Clustering Exploiting Neighbourhood Information for Non-image Data," International Journal of Computer Sciences and Engineering, vol.12, No.2, pp.1–8, 2024.
[29] M. Kasthuri, S. Kanchana, and R. Hemalatha, "Comparative Study on Various Clustering Techniques in Data Mining," International Journal of Computer Sciences and Engineering, Vol.6, No.11, pp.1–8, 2018.
[30] B. Bhawna and A. Asha, "Study of Clustering Algorithm for Student Analysis," International Journal of Computer Sciences and Engineering, Vol.7, No.6, pp.937–940, 2019.
[31] A. Jawale and G. Magar, "Survey of Clustering Methods for Large Scale Dataset," International Journal of Computer Sciences and Engineering, Vol.7, No.5, pp.1338–1344, 2019.
[32] B. Janghel and A. Ambhaikar, "Study of Clustering Algorithm for Student Analysis," International Journal of Computer Sciences and Engineering, Vol.7, No.6, pp.937–940, 2019.
[33] D. Saidulu, V. Devasekhar, and V. Swathi, "Secured MapReduce Based K-Means Clustering in Big Data Framework," International Journal of Computer Sciences and Engineering, Vol.7, No.5, pp.1427–1430, 2019.
Citation
Snehal K Joshi, "Enhanced K-Means Clustering through Density-Based Inter-Centroid Distance Optimization," International Journal of Computer Sciences and Engineering, Vol.13, Issue.4, pp.68-77, 2025.
Comprehensive Study of Various Blockchain Development Platforms
Research Paper | Journal Paper
Vol.13 , Issue.4 , pp.78-83, Apr-2025
CrossRef-DOI: https://doi.org/10.26438/ijcse/v13i4.7883
Abstract
This research paper examines the technical architecture, performance characteristics, and development ecosystems of leading blockchain platforms. The research elaborates the different aspects of blockchain technology through comparative analysis of Ethereum, Hyperledger Fabric, Solana, Polkadot, Cosmos, and Corda and hence, we evaluate their distinct approaches to consensus, scalability, security, and programmability. The study reveals significant trade-offs between decentralization, performance, and developer accessibility across platforms. The smart contract development paradigm is described in the study. We identify emerging trends including modular blockchain architectures, application-specific chains, and cross-chain interoperability solutions. The performance of developer ecosystems and tooling security models is illustrated. The study also reveals real world applications and its use case alignment. The different emerging trends in blockchain technology development in the use of real world technology is discussed in the study. This comprehensive assessment provides guidance for organizations selecting blockchain platforms based on specific use case requirements, technical constraints, and strategic objectives.
Key-Words / Index Term
Block Chain, Bitcoin, Ethereum, Hyperledger Fabric, Solana, Polkadot, Cosmos, Corda
References
[1] G. Wood, “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum Project Yellow Paper, Vol.151, pp.1-32, 2014.
[2] E. Androulaki et al., “Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains,” In Proceedings of the Thirteenth EuroSys Conference (EuroSys `18), New York, USA, 30, pp.1-15, 2018.
[3] A. Yakovenko, “Solana: A new architecture for a high performance blockchain v0. 8.13,” 2018.
[4] G. Wood, “Polkadot: Vision for a heterogeneous multi-chain framework,” 2016.
[5] J. Kwon, E. Buchman, “Cosmos: A Network of Distributed Ledgers,” 2016.
[6] R.G. Brown et al., “Corda: An Introduction,” 2016.
[7] V. Buterin, “Endgame,” Ethereum Foundation Blog, 2021.
[8] A. Zamyatin et al., “SoK: Communication Across Distributed Ledgers,” 2021.
[9] L. Gudgeon et al., “SoK: Layer-Two Blockchain Protocols,” 2020.
[10] A. Tomescu, et al., “ZK-Bridges: Trustless Cross-Chain Transfers,” 2022.
[11] V. Buterin et al., “Rollup-centric Ethereum roadmap,” 2020.
[12] J. Benet, N. Greco, “Filecoin: A Decentralized Storage Network,” 2018.
[13] “The Merge,” Ethereum Foundation, 2022.
[14] “Solana Performance Report,” Solana Labs, 2022.
[15] “Tezos: Technical Overview,” Tezos Foundation, 2021.
[16] A. Kedar, K. Waje, S. Ghuge, P. Badgujar, P. Lahare, "A Review Paper on Blockchain for Supply Chain Anti-Counterfeiting," International Journal of Computer Sciences and Engineering, Vol.2, Issue.0, pp.51-55, 2024.
[17] C. Pradhan, A. Trehan, "Integration of Blockchain Technology in Secure Data Engineering Workflows," International Journal of Computer Sciences and Engineering, Vol.13, Issue.1, pp.1-7, 2025.
Citation
Divyakant Meva, Anand John, "Comprehensive Study of Various Blockchain Development Platforms," International Journal of Computer Sciences and Engineering, Vol.13, Issue.4, pp.78-83, 2025.
Sensor Selection for Air Quality Monitoring: Machine Learning-Based Calibration and Performance Comparison of IoT Devices for Gaseous Pollutant Elements
Research Paper | Journal Paper
Vol.13 , Issue.4 , pp.84-91, Apr-2025
CrossRef-DOI: https://doi.org/10.26438/ijcse/v13i4.8491
Abstract
Air pollution is becoming a serious problem in cities, with direct impacts on both public health and the environment. Being able to predict the Air Quality Index (AQI) accurately and on time is important for taking steps to prevent or reduce pollution. This study explores the use of IoT-based gas sensors to help forecast AQI, focusing on four main pollutants: Carbon Monoxide (CO), Sulfur Dioxide (SO?), Nitrogen Dioxide (NO?), and Ammonia (NH?). Three different sensors were tested for each gas to see how well they performed. After calibrating the sensors, their readings were converted to parts per million (ppm), and artificial data was created to represent three months of half-hourly readings. A machine learning method, Random Forest Regressor, was used to check how accurate each sensor was, based on performance measures like MAE, RMSE, and R² Score. Sensor, referred as Sensor S1, gave the best results across all gases, showing better accuracy and reliability than the others. This research shows how important it is to choose and calibrate the right sensors for monitoring air quality and could help build better systems for predicting AQI in real time. The findings offer useful information for improving environmental monitoring with smart technology.
Key-Words / Index Term
Air Quality Index (AQI), IoT-based Gas Sensors, Machine Learning Calibration, Sensor Performance Evaluation, Random Forest Regressor
References
[1] Central Pollution Control Board, “National Air Quality Index (NAQI),” Ministry of Environment, Forest and Climate Change, Govt. of India, 2014.
[2] World Health Organization, “Air pollution,” 2023.
[3] S. Kumar, V. Singh, and A. K. Sharma, “Air quality prediction using machine learning techniques: A review,” Environmental Science and Pollution Research, Vol.29, pp.4259–4278, 2022.
[4] CPCB, “National Ambient Air Quality Standards (NAAQS),” 2009.
[5] J. Kim, S. Jang, and H. Park, “IoT-based air quality monitoring system using low-cost sensors,” in Proc. IEEE Sensors, pp.1–4, 2020.
[6] A. De Vito, E. Massera, M. Piga, L. Martinotto, and G. Di Francia, “On field calibration of an electronic nose for benzene estimation in an urban pollution monitoring scenario,” Sensors and Actuators B: Chemical, Vol.129, No.2, pp.750–757, 2008.
[7] A. Hasenfratz et al., “Deriving high-resolution urban air pollution maps using mobile sensor nodes,” Pervasive and Mobile Computing, Vol.16, pp.268–285, 2015.
[8] A. Castell et al., “Can machine learning models be used to calibrate low-cost PM sensors?” Environmental Pollution, vol. 284, p. 117471, 2021.
[9] S. J. R. Kumar and M. J. Babu, “Real-time air quality monitoring and forecasting using machine learning,” International Journal of Environmental Science and Technology, vol.19, pp.10113–10126, 2022.
[10] M. De Vito, E. Massera, L. Piga, G. Di Francia, and C. Di Natale, "Comparison of machine learning algorithms for chemical multisensor devices in environmental monitoring," Sensors and Actuators B: Chemical, vol.236, pp.862–870, 2016.
[11] L. Spinelle, M. Gerboles, G. Kok, S. Persijn, and A. Sauerwald, "Review of portable and low-cost sensors for the ambient air monitoring of benzene and other volatile organic compounds," Sensors, Vol.17, No.7, pp.1520, Jul. 2017.
[12] D. Hasenfratz, O. Saukh, S. Sturzenegger, and L. Thiele, "Participatory air pollution monitoring using smartphones," Mobile Sensing, VOL.1, No.1, pp.1–5, 2015.
[13] N. Zimmerman, E. Presto, A. Kumar, and A. Robinson, "A machine learning approach to calibrate low-cost air quality sensors for urban environments," Atmospheric Environment, Vol.193, pp.153–163, 2018.
[14] E. S. Cross, S. E. Williams, A. T. Lewis, and R. A. Hammond, "Use of electrochemical sensors for measuring ambient concentrations of CO, NO, and NO? in an urban setting," Atmospheric Measurement Techniques, vol.10, pp.357–375, 2017.
[15] M. Sadat, R. Singh, and A. Chaturvedi, "Air quality prediction using low-cost CO sensors calibrated with machine learning," Environmental Monitoring and Assessment, VOL.190, No.12, pp. 1–12, 2018.
[16] N. Masson, G. Piedrahita, and M. Hannigan, "Development of a low-cost air quality monitoring platform," Sensors, vol.15, no.11, pp.29512–29524, 2015.
[17] E. G. Snyder, T. H. Watkins, P. A. Solomon et al., "The changing paradigm of air pollution monitoring," Environmental Science & Technology, vol. 47, no. 20, pp. 11369–11377, 2013.
[18] W. Jiao, E. Hagler, R. Williams, and R. Sharpe, "Community air sensor network (CAIRSENSE) project: evaluation of low-cost sensor performance in a suburban environment," Atmospheric Measurement Techniques, Vol.9, pp.5281–5292, 2016.
[19] N. Castell, F. R. Dauge, and M. Schneider, "Can commercial low-cost sensor platforms contribute to air quality monitoring and exposure estimates?" Environment International, Vol.99, pp.293–302, 2017.
[20] S. Sousan, K. Koehler, and T. Hall, "Evaluation of the Alpha sense optical particle counter (OPC-N2) and the Grimm portable aerosol spectrometer (PAS-1.108)," Aerosol Science and Technology, vol. 50, NO.12, pp.1352–1365, 2016.
[21] R. Mukherjee and S. Maitra, "Pollution source detection using decision tree-based analysis of sensor data," Procedia Computer Science, vol. 132, pp.463–470, 2018.
[22] M. Mead, O. Popoola, G. Stewart et al., "The use of electrochemical sensors for monitoring urban air quality in low-cost sensor networks," Atmospheric Environment, vol. 70, pp.186–203, 2013.
[23] A. Rai, V. Rajeev, and S. Kumar, "Real-time ammonia detection using calibrated sensors and ML models," Ecological Informatics, vol. 39, pp.74–80, 2017.
[24] A. Rai and R. Kumar, "Cloud-based smart monitoring system for urban air pollution," Journal of Ambient Intelligence and Humanized Computing, vol.10, pp.1721–1732, 2019.
[25] S. Usha, S. V. Teja, V. S. Dilip, and R. S. Reddy, "Machine learning-driven system for real-time air quality monitoring and prediction," Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 11, no. 1, pp. 2781–2790, 2025. DOI: 10.32628/CSEIT251112283.
[26] Central Pollution Control Board, “National Ambient Air Quality Standards (NAAQS),” CPCB, India, 2009.
[27] A. Kumar, M. Bhattacharjee, and R. Jain, "Air quality monitoring and prediction using IoT and machine learning techniques: A survey," Int. J. Environ. Sci. Technol., vol.20, pp.789–804, 2023.
[28] Central Pollution Control Board, “National Ambient Air Quality Standards (NAAQS),” CPCB, India, 2009.
[29] A. Castell et al., “Can machine learning models be used to calibrate low-cost PM and gas sensors?” Environmental Pollution, vol.284, pp.117471, 2021.
Citation
Kavita K. Ahuja, "Sensor Selection for Air Quality Monitoring: Machine Learning-Based Calibration and Performance Comparison of IoT Devices for Gaseous Pollutant Elements," International Journal of Computer Sciences and Engineering, Vol.13, Issue.4, pp.84-91, 2025.