• WACPN: A Neural Network for Pneumonia Diagnosis
  • Abstract Community-acquired pneumonia (CAP) is considered a sort of pneumonia developed outside hospitals and clinics. To diagnose community-acquired pneumonia (CAP) more efficiently, we proposed a novel neural network model. We introduce the 2-dimensional wavelet entropy (2d-WE) layer and an adaptive chaotic particle swarm optimization (ACP) algorithm to train the feed-forward neural network. The ACP uses adaptive inertia weight factor (AIWF) and Rossler attractor (RA) to improve the performance of standard particle swarm optimization. The final combined model is named WE-layer ACP-based network (WACPN), which attains a sensitivity of 91.87 ± 1.37%, a specificity of 90.70 ± 1.19%, a precision of 91.01 ± 1.12%, an accuracy of 91.29 ± 1.09%,… More
  •   Views:47       Downloads:28        Download PDF
  • A Cloud Based Sentiment Analysis through Logistic Regression in AWS Platform
  • Abstract The use of Amazon Web Services is growing rapidly as more users are adopting the technology. It has various functionalities that can be used by large corporates and individuals as well. Sentiment analysis is used to build an intelligent system that can study the opinions of the people and help to classify those related emotions. In this research work, sentiment analysis is performed on the AWS Elastic Compute Cloud (EC2) through Twitter data. The data is managed to the EC2 by using elastic load balancing. The collected data is subjected to preprocessing approaches to clean the data, and then machine… More
  •   Views:24       Downloads:22        Download PDF
  • New Spam Filtering Method with Hadoop Tuning-Based MapReduce Naïve Bayes
  • Abstract As the importance of email increases, the amount of malicious email is also increasing, so the need for malicious email filtering is growing. Since it is more economical to combine commodity hardware consisting of a medium server or PC with a virtual environment to use as a single server resource and filter malicious email using machine learning techniques, we used a Hadoop MapReduce framework and Naïve Bayes among machine learning methods for malicious email filtering. Naïve Bayes was selected because it is one of the top machine learning methods(Support Vector Machine (SVM), Naïve Bayes, K-Nearest Neighbor(KNN), and Decision Tree) in… More
  •   Views:29       Downloads:23        Download PDF
  • Multi-Agent Dynamic Area Coverage Based on Reinforcement Learning with Connected Agents
  • Abstract Dynamic area coverage with small unmanned aerial vehicle (UAV) systems is one of the major research topics due to limited payloads and the difficulty of decentralized decision-making process. Collaborative behavior of a group of UAVs in an unknown environment is another hard problem to be solved. In this paper, we propose a method for decentralized execution of multi-UAVs for dynamic area coverage problems. The proposed decentralized decision-making dynamic area coverage (DDMDAC) method utilizes reinforcement learning (RL) where each UAV is represented by an intelligent agent that learns policies to create collaborative behaviors in partially observable environment. Intelligent agents increase their… More
  •   Views:33       Downloads:26        Download PDF
  • Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation
  • Abstract Progress in cloud computing makes group data sharing in outsourced storage a reality. People join in group and share data with each other, making team work more convenient. This new application scenario also faces data security threats, even more complex. When a user quit its group, remaining data block signatures must be re-signed to ensure security. Some researchers noticed this problem and proposed a few works to relieve computing overhead on user side. However, considering the privacy and security need of group auditing, there still lacks a comprehensive solution to implement secure group user revocation, supporting identity privacy preserving and… More
  •   Views:23       Downloads:22        Download PDF
  • Fine Grained Feature Extraction Model of Riot-related Images Based on YOLOv5
  • Abstract With the rapid development of Internet technology, the type of information in the Internet is extremely complex, and a large number of riot contents containing bloody, violent and riotous components have appeared. These contents pose a great threat to the network ecology and national security. As a result, the importance of monitoring riotous Internet activity cannot be overstated. Convolutional Neural Network (CNN-based) target detection algorithm has great potential in identifying rioters, so this paper focused on the use of improved backbone and optimization function of You Only Look Once v5 (YOLOv5), and further optimization of hyperparameters using genetic algorithm to… More
  •   Views:27       Downloads:27        Download PDF