International Journal of Computers and Applications最新文献

筛选
英文 中文
Task scheduling and data replication in cloud with improved correlation strategy 通过改进的关联策略实现云中的任务调度和数据复制
International Journal of Computers and Applications Pub Date : 2023-10-13 DOI: 10.1080/1206212x.2023.2267840
D Rambabu, A Govardhan
{"title":"Task scheduling and data replication in cloud with improved correlation strategy","authors":"D Rambabu, A Govardhan","doi":"10.1080/1206212x.2023.2267840","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2267840","url":null,"abstract":"AbstractCloud providers frequently utilize two tightly coupled resource management strategies like task scheduling & data replication to boost the performance of the system generally, guaranteeing service level agreement (SLA) compliance, as well as protecting their own financial gain. An Improved Correlation strategy-based Task Scheduling and Data Replication in Cloud (ICTSDC) is what this work aims to give. The suggested system's primary phases are as follows: Management of replication and task scheduling. Initial job scheduling will be optimization-based and take into account goals such bottleneck value, migration cost, VM load, enhanced correlation, and replication, respectively. For this, a brand-new extended DMO algorithm called Self-adaptive Dwarf Mongoose Optimization (SADMO) is presented. In the replication management stage, the potential copies must first be identified based on the prior objective. The suggested SADMO model implements the optimization technique for replica placement throughout the replication management process. The outcomes of the ICTSDC technique are evaluated to other methods using a variety of metrics, like bottleneck value, migration cost, Virtual Machine (VM) load, improved correlation, as well as replication efficiency. A lower mean value of 0.324 is gained with the ICTSDC scheme for fitness.KEYWORDS: Task schedulingdata replicationcloudimproved correlationoptimization Disclosure statementNo potential conflict of interest was reported by the author(s).","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135856862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discovery of interesting frequent item sets in an uncertain database using ant colony optimization 利用蚁群优化方法在不确定数据库中发现感兴趣的频繁项集
International Journal of Computers and Applications Pub Date : 2023-10-09 DOI: 10.1080/1206212x.2023.2263689
Sridevi Malipatil, T. Hanumantha Reddy
{"title":"Discovery of interesting frequent item sets in an uncertain database using ant colony optimization","authors":"Sridevi Malipatil, T. Hanumantha Reddy","doi":"10.1080/1206212x.2023.2263689","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2263689","url":null,"abstract":"ABSTRACTApplications like business basket analysis, digital service analytics, bio-informatics, and mobile commerce have greatly benefited from the information retrieval of significant features from massive databases for improved decision-making. Item set mining is used to find intriguing patterns in databases. Discovering item sets in an uncertain database is a tedious task. Only mathematical correlations between the elements in an item set are the exclusive subject of recurring item set mining research. The finding is direct to optimal. This article introduces an ant colony that maps the viable solution space to a directed graph with quadratic space complexity. The proposed model evaluates an uncertain transaction database's item set. Compared to the current methods, the findings demonstrate the importance of the proposed model.KEYWORDS: Patternsassociation rule miningfrequent itemsdatabase Disclosure statementNo potential conflict of interest was reported by the author(s).","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135093214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal deep learning for chronic kidney disease prediction: leveraging feature selection algorithms and ensemble models 多模态深度学习用于慢性肾脏疾病预测:利用特征选择算法和集成模型
International Journal of Computers and Applications Pub Date : 2023-10-03 DOI: 10.1080/1206212x.2023.2262786
N. J. Subashini, K. Venkatesh
{"title":"Multimodal deep learning for chronic kidney disease prediction: leveraging feature selection algorithms and ensemble models","authors":"N. J. Subashini, K. Venkatesh","doi":"10.1080/1206212x.2023.2262786","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2262786","url":null,"abstract":"ABSTRACTThis research presents an advanced approach to enhance disease diagnosis using imbalanced medical datasets. Feature selection techniques, LASSO and Relief, are applied to identify relevant features from the UCI dataset and missing values are handled appropriately. To address the class imbalance, SMOTEENN is used, creating a new combined dataset with selected features. Three deep learning models, FNNs, LSTMs, and GBMs, are employed and trained on the combined dataset, achieving remarkable accuracy (1.0). Evaluating the models on LASSO and Relief datasets independently, FNN/MLP obtains perfect accuracy, GBM performs well (0.9888 on LASSO and 1.0 on Relief), and LSTM shows good results (0.9663 on LASSO and 1.0 on Relief). This study demonstrates the effectiveness of combining LASSO and Relief for feature selection and highlights the impact of SMOTEENN on model performance. The achieved accuracy with all models on the combined dataset showcases deep learning's potential for accurate disease diagnosis even with imbalanced data, offering promising insights for robust medical diagnosis systems.KEYWORDS: Chronic kidney diseaseMultimodal deep learningLASSOReliefSMOTEENN Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsN. J. SubashiniN. J. Subashini is a Research scholar in Networking and Communications department, SRM Institute of Science and Technology. Her research interests include Data Mining, Artificial Intelligence, Deep Learning and Machine Learning.K. VenkateshK. Venkatesh is Associate Professor in Networking and Communications department, SRM Institute of Science and Technology. His research interests include Networking, Cloud Computing, Data Mining, Artificial Intelligence, and Machine Learning. He is the Program Coordinator for B. Tech CSE specialization with a focus on Computer Networking. Additionally, he serves as an Alumni Coordinator in the Department of Networking and Communications. He is a Cisco certified CCNA Lead Instructor and Academy Contact for SRM Institute of Science and Technology, formerly known as SRM University, Networking Academy.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine failure prediction using joint reserve intelligence with feature selection technique 基于联合储备智能和特征选择技术的机器故障预测
International Journal of Computers and Applications Pub Date : 2023-10-03 DOI: 10.1080/1206212x.2023.2260619
Amal Shaheen, Mustafa Hammad, Wael Elmedany, Riadh Ksantini, Saeed Sharif
{"title":"Machine failure prediction using joint reserve intelligence with feature selection technique","authors":"Amal Shaheen, Mustafa Hammad, Wael Elmedany, Riadh Ksantini, Saeed Sharif","doi":"10.1080/1206212x.2023.2260619","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2260619","url":null,"abstract":"A model with high accuracy of machine failure prediction is important for any machine life cycle. In this paper, a prediction model based on machine learning methods is proposed. The used method is a combination of machine learning algorithms and techniques. The machine learning algorithm is a data mining technique that has been widely used as a prediction model for classifying problems. Five algorithms have been tested including JRIP, logistic, KStar, Bayes network and decision table machine learning. The evaluation process is done by applying the algorithms on a predictive dataset using different performance measures. In the proposed model, the feature selection and voting techniques are used and applied in the classification process for each classifier. From the comparison of the result, the feature selection shows the best performance result. Paired t-test evaluation measures were considered to confirm our conclusion. The best accuracy result among the five classifiers shows that joint reserve intelligence classifier can be used to predict the failure with an accuracy high as 0.983. Applying classifier subset evaluation using the JRIP classifier can enhance the accuracy result to be 0.985. The finding shows that the proposed model improves the results of the classifiers.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135696469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple paddy disease recognition methods based on deformable transformer attention mechanism in complex scenarios 复杂场景下基于变形变压器注意机制的多种水稻病害识别方法
International Journal of Computers and Applications Pub Date : 2023-10-03 DOI: 10.1080/1206212x.2023.2263254
Xinyu Zhang, Hang Dong, Liang Gong, Xin Cheng, Zhenghui Ge, Liangchao Guo
{"title":"Multiple paddy disease recognition methods based on deformable transformer attention mechanism in complex scenarios","authors":"Xinyu Zhang, Hang Dong, Liang Gong, Xin Cheng, Zhenghui Ge, Liangchao Guo","doi":"10.1080/1206212x.2023.2263254","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2263254","url":null,"abstract":"AbstractPaddy disease recognition presents challenges in the agricultural industry, and existing algorithms struggle to accurately identify diseases in complex scenarios. In this paper, we propose a precise object detection framework to address the challenges of severe overlap, multi-disease detection, morphological irregularities, multi-scale object classification, and complex scenarios in real-world environments in paddy disease detection. The proposed model is based on an improved version of the DEtection TRansformer (Detr) algorithm. The enhanced network architecture fuses multi-scale features by adding a feature fusion module after the backbone network, which is able to retain more original information of the images and greatly improves the detection accuracy; the use of deformable attention module greatly reduces the computational complexity of the model. To evaluate the PDN, a dedicated paddy disease detection dataset with 1200 images is created. Experimental results demonstrate that the proposed model obtained a precision value of 100%, a recall value of 89.3%, F1-score of 94.3%, and a mean average precision (mAP) value of 60.2%. The model outperforms the existing state-of-the-art detection models in detection accuracy.KEYWORDS: Paddy disease recognitionTransformermachine vision detection Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported in part by the Jiangsu Basic Science (Natural Science) Research Projects in Higher Education Institutions (No.23KJB460034), Jiangsu province Youth Fund Project (No.BK2023040059), the China Postdoctoral Science Foundation Funded Project (No. 2022M721185), Jiangsu Agriculture Science and Technology Innovation Fund (No. CX(21)3145).Notes on contributorsXinyu ZhangXinyu Zhang is currently a master's student in mechanical engineering at the School of Mechanical Engineering, Yangzhou University. His research interest is machine learning.Hang DongDr. Hang Dong is a lecturer at Yangzhou University. He received his PhD degree in Mechanical Manufacture and Automation from Dalian University of Technology (2019). His research interests include the deep learning, machine learning, and robotics. Hang Dong is the corresponding author and can be contacted at hdong@yzu.edu.cn.Liang GongLiang Gong was born in Maanshan City, Anhui Province, China on October 26, 1999. He received his bachelor's degree from Anhui Polytechnic University in 2021. He is currently a master's student in mechanical engineering at the School of Mechanical Engineering, Yangzhou University. His research interests are machine vision and machine learning.Xin ChengXin Cheng was born in Lian Yungang, China, in 2002.He is currently a student in Yangzhou University.His research interests include computer vision,natural language processing.Zhenghui GeZhenghui Ge is currently an associate professor at Yangzhou University, China. He received his PhD degree from Nanjing Unive","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135745014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective cloud load-balancing with hybrid optimization 混合优化的多目标云负载均衡
International Journal of Computers and Applications Pub Date : 2023-09-28 DOI: 10.1080/1206212x.2023.2260616
Koppula Geeta, V. Kamakshi Prasad
{"title":"Multi-objective cloud load-balancing with hybrid optimization","authors":"Koppula Geeta, V. Kamakshi Prasad","doi":"10.1080/1206212x.2023.2260616","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2260616","url":null,"abstract":"AbstractIn this study, the cloud computing platform is equipped with a hybrid multi-objective meta-heuristic optimization-based load balancing model. Physical Machine (PM) allocates a specific virtual machine (VM) depending on multiple criteria, such as the amount of memory used, migration expenses, power usage, and the load balancing settings, upon receiving a request to handle a cloud user's duties (‘Response time, Turnaround time, and Server load’). Additionally, the optimal virtual machine (VM) is chosen for efficient load balancing by utilizing the recently proposed hybrid optimization approach. The Cat and Mouse-Based Optimizer (CMBO) and Standard Dingo Optimizer (DXO) are conceptually blended together to get the proposed hybridization method known as Dingo Customized Cat mouse Optimization (DCCO). The developed method achieves the lowest server load in cloud environment 1 is 33.3%, 40%, 42.3%, 40.2%, 36.8%, 42.5%, 50%, 40.2%, 39.2% improved over MOA, ABC, CSO, SSO, SSA, ACSO, SMO, CMBO, BOA, DOX, and FF-PSO, respectively. Finally, the projected DCCO model has been evaluated in terms of makespan, memory usage, migration cost, response time, usage of power server load, turnaround time, throughput, and convergence.ABBREVIATION: CDC, cloud data center; CMODLB, Clustering-based Multiple Objective Dynamic Load Balancing As A Load Balancing; CSP, Cloud service providers; CSSA, Chaotic Squirrel Search Algorithm; DA, Dragonfly Algorithm; ED, Euclidean Distance; EDA-GA, Estimation Of Distribution Algorithm And GA; FF, FireFly algorithm; GA, Genetic Algorithm; HHO, Harris Hawk Optimization; IaaS, Infrastructure-as-a-Service; MGWO, Modified Mean Grey Wolf Optimization Algorithm; MMHHO, Mantaray modified multi-objective Harris Hawk optimization; MRFO, Manta Ray Forging Optimization; PaaS, Platform-as-a-Service; PM, Physical Machine; PSO, Particle Swarm Optimization; SaaS, Software-as-a-Service; SAW, Sample additive weighting; SLA-LB, Service Level Agreement-Based Load Balancing; TBTS, Threshold-Based Task Scheduling Algorithm; TS, Task SchedulingKEYWORDS: Cloud computingload balancingDCCOpower consumptionmemory utilizationmigration cost Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsKoppula GeetaKoppula Geeta, Currently working as Assistant Professor of Computer Science & Engineering at Rajiv Gandhi University of Knowledge Technologies Basar, She is having 18 years of teaching experience. Received her B.Tech, M.Tech from JNTUH. Currently she is pursuing PhD in JNTUH, Hyderabad. Her main research interests includes Cloud computing, Data mining.V. Kamakshi PrasadProfessor V. Kamakshi Prasad currently serving as a Senior Professor of Computer Science & Engineering at JNTUH College of Engineering Science & Technology in Hyderabad, has 31 years of teaching and research experience. He obtained his B.Tech., M.Tech., and Ph.D. degrees from KLCE, Andhra University College of Enginee","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135385411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast image encryption algorithm with random structures 随机结构快速图像加密算法
International Journal of Computers and Applications Pub Date : 2023-09-27 DOI: 10.1080/1206212x.2023.2260617
Taha Etem, Turgay Kaya
{"title":"Fast image encryption algorithm with random structures","authors":"Taha Etem, Turgay Kaya","doi":"10.1080/1206212x.2023.2260617","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2260617","url":null,"abstract":"AbstractBlock encryption algorithms are among the most preferred applications in cryptographic systems. Block ciphers should have accomplished some requirements for a secure communication system. They should be evaluated in terms of cryptanalysis methods for widespread usage. The aim of this paper is to introduce a new secure and fast block encryption algorithm for images. For this purpose, a new block cipher, which offers an innovative encryption structure for key generation systems and can use S-boxes with different methods, is proposed. A Dynamic S-Box is used in the algorithm for both substitution and key generation purposes. Linear and differential cryptanalysis methods were performed successfully. UACI and NPCR tests show that the proposed symmetric block cipher algorithm is compatible with image encryption systems. The 512-bit key length provides the highest security for block encryption. Additionally, information entropy test, correlation coefficients, mean-squared error, and peak signal-to-noise ratio analyses were concluded successfully. The novelty of the paper is building a cryptanalysis attack-resistant block cipher algorithm that presents a lightweight cryptographic solution for image encryption systems.KEYWORDS: Block ciphersymmetric encryptionS-BoxNPCR and UACIimage processing AcknowledgementsThis study has been produced from the doctoral dissertation of Taha Etem. Authors’ contributions: T.E. conceived and designed the analysis, collected the data, contributed analysis tools, and wrote the paper. T.K. edited the paper, controlled the analysis, and supervised.Disclosure statementNo potential conflict of interest was reported by the author(s).Availability of data and materialData sharing is not applicable to this article as no new data were created or analyzed in this study.Additional informationNotes on contributorsTaha EtemTaha Etem received the B.Sc. degree in Electrical-Electronics Engineering from Firat University, Elazig, Turkey, in 2013, and the M.Sc. degree in Electrical-Electronics Engineering from Inonu University, Malatya, Turkey, in 2017, and received the Ph.D. degree in Electrical-Electronics Engineering from Firat University, Elazig, Turkey, in 2022. He was with Cankiri Karatekin University, Cankiri, Turkey, as a Faculty Member. He is currently an Assistant Professor in the Computer Engineering Department. His research interests include encryption systems, random number generators and radio-frequency systems.Turgay KayaTurgay Kaya was born in Elazig, Turkey, in 1982. He received the B.Sc., M.Sc. and Ph.D. degrees in electrical-electronics engineering from the Firat University in 2003, 2006 and 2011, respectively. From 2004 to 20013, he was a Research Assistant at department of electrical-electronics engineering, Firat University, Elazig, Turkey. Since 2013, he has been an Associate Professor same department. His research interests include digital and analog filter design, biomedical signal processing, signal and image","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135539022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Background initialization in video data using singular value decomposition and robust principal component analysis 基于奇异值分解和鲁棒主成分分析的视频数据背景初始化
International Journal of Computers and Applications Pub Date : 2023-09-19 DOI: 10.1080/1206212x.2023.2258329
Vishruth B. Gowda, M. T. Gopalakrishna, J. Megha, Shilpa Mohankumar
{"title":"Background initialization in video data using singular value decomposition and robust principal component analysis","authors":"Vishruth B. Gowda, M. T. Gopalakrishna, J. Megha, Shilpa Mohankumar","doi":"10.1080/1206212x.2023.2258329","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2258329","url":null,"abstract":"AbstractBackground initialization is used in video processing applications to extract a scene without the foreground scene. In recent times, the issue of background initialization has gained researchers’ attention in different fields such as video surveillance, video segmentation, computational photography, and so on. The initialization of the background is affected due to different complex dissimilarities such as shadow, intermittent movement, illumination, camera jitter, and clutter. To overcome the aforementioned issues, this paper proposes a decomposition using the combination of the Singular Value Decomposition (SVD) and Robust Principal Component Analysis (RPCA) for Singular Spectrum Analysis (SSA) to perform an effective background initialization. The incorporation of RPCA in SVD is used to overcome the issues related to non-Gaussian noise and it also uses an effective structural knowledge of the video input i.e. sparse and low rank matrix which improves the Peak-Signal-to-Noise-Ratio (PSNR) of the background image. The SBI dataset was used to analyze the performances of SSA-SVDRPCA. The SSA-SVDRPCA is analyzed using MultiScale Structural Similarity Index (MSSSIM), Average gray-level error (AGE), Percentage of clustered error pixels (pCEPS), Percentage of error pixels (pEPs), and PSNR. The existing approaches such as Background Initialization Singular Spectrum Analysis (BISSA) and Quaternion-based Dynamic Mode Decomposition (Q-DMD) are used to compare with the SSA-SVDRPCA method. The PSNR of the SSA-SVDRPCA for Board class is 30.39 dB which is higher than the BISSA and Q-DMD.KEYWORDS: Background initializationdecompositionpeak-signal-to-noise-ratiorobust principal component analysissingular spectrum analysissingular value decomposition Disclosure statementNo potential conflict of interest was reported by the author(s).Data availability statementThe datasets generated during and/or analyzed during the current study are available in the Scene Background Initialization (SBI) dataset.SBI datasethttps://sbmi2015.na.icar.cnr.it/SBIdataset.htmlAdditional informationNotes on contributorsVishruth B. GowdaVishruth B. Gowda completed his BE in AIEMS, bangalore, karnataka and Mtech from EWIT. He currently works as an assistant professor in Department of ISE,SJB Institute of technology. He is also pursuing his research in VTU, Belagavi, Karnataka under the supervision of Dr. M T Gopalakrishna. His research area falls under the domain of comuter vision and image processing.M. T. GopalakrishnaM. T. Gopalakrishna received B. E degree (Computer Science & Engineering) from M. S Ramaiah Institute of Technology, India, M. Tech degree from Visvesvaraya Technological University, Karnataka, India and PhD from Visvesvaraya Technological University, Karnataka, India. He has more than 22 years of teaching experience. He is currently Professor & Head, Department of Artificial Intelligence and Machine Learning in SJB Institute of Technology, Bangalore, India. He has ","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135061128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spam email detection using a novel multilayer classification-based decision technique 基于多层分类决策技术的垃圾邮件检测
International Journal of Computers and Applications Pub Date : 2023-09-19 DOI: 10.1080/1206212x.2023.2258328
Subhajit Das, Sourav Mandal, Rohini Basak
{"title":"Spam email detection using a novel multilayer classification-based decision technique","authors":"Subhajit Das, Sourav Mandal, Rohini Basak","doi":"10.1080/1206212x.2023.2258328","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2258328","url":null,"abstract":"AbstractBecause of the rapid advancement of technology over the last several years, the number of internet users is growing at an exponential rate, and as a result, email communication has become popular as a means of exchanging information over the internet. Sending data and communicating with peers via email is the most cost-effective method. These email services also cause problems for users by sending electronic junk mail, often known as spam mail. Spam email is a privacy concern that is linked to a slew of commercial and dangerous websites, causing phishing, virus distribution, and a slew of other problems. This study examines several aspects that have been used for email spam classification, as well as offering an overview of a handful of classifiers or algorithms that have been successfully evaluated, as well as exploratory data analysis. The proposed email spam classifier uses three parallel layers of machine learning and deep learning techniques, followed by a decision function to determine whether or not the emails are spam. During testing, it was found that the proposed classifier beats similar systems on the standard dataset with an accuracy of 98.4%.KEYWORDS: Content-based spam classificationemail spam classificationtext classificationmachine learningdeep learning Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 https://github.com/tensorflow/estimator2 https://nlp.stanford.edu/projects/glove/3 http://nlp.cs.aueb.gr/software_and_datasets/Enron-Spam/index.html4 https://www.tensorflow.org/Additional informationNotes on contributorsSubhajit DasSubhajit Das is an Information Technology Engineer with more than 11 years of experience in software Development. He has completed Master of Engineering from Jadavpur University, Kolakta, India on Software Engineering and received a bachelor's degree in Computer Science and Engineering from West Bengal University of Technology, India. He presently holds the position of Senior Software Engineer at Cognizant Technology Solutions. He is also interested in building the architecture of contemporary systems using cloud and GenAI solutions, addressing difficult problems, migrating technologies, and optimizing algorithms.Sourav MandalSourav Mandal has been an Assistant Professor at XIM University's School of Computer Science and Engineering (SCSE), in Bhubaneswar, Odisha, India since October 2020. Prior to that, he had been employed since 2006 as an Assistant Professor in the Department of Computer Science and Engineering at the Haldia Institute of Technology in Haldia, India. Among his research interests in the natural language processing (NLP) and artificial intelligence (AI) field are natural language understanding, information extraction, text classification, text summarization, etc. with data science, machine learning, and deep learning. Sourav Mandal earned a bachelor's degree in Computer Science & Engineering from The University of Burdwan in Burdwan, India,","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135060551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberbullying in text content detection: an analytical review 文本内容检测中的网络欺凌:分析综述
International Journal of Computers and Applications Pub Date : 2023-09-14 DOI: 10.1080/1206212x.2023.2256048
Sylvia W. Azumah, Nelly Elsayed, Zag ElSayed, Murat Ozer
{"title":"Cyberbullying in text content detection: an analytical review","authors":"Sylvia W. Azumah, Nelly Elsayed, Zag ElSayed, Murat Ozer","doi":"10.1080/1206212x.2023.2256048","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2256048","url":null,"abstract":"AbstractTechnological advancements have resulted in an exponential increase in the use of online social networks (OSNs) worldwide. While online social networks provide a great communication medium, they also increase the user's exposure to life-threatening situations such as suicide, eating disorder, cybercrime, compulsive behavior, anxiety, and depression. To tackle the issue of cyberbullying, most existing literature focuses on developing approaches to identifying factors and understanding the textual factors associated with cyberbullying. While most of these approaches have brought great success in cyberbullying research, data availability needed to develop model detection remains a challenge in the research space. This paper conducts a comprehensive literature review to provide an understanding of cyberbullying detection.Keywords: Cyberbullyingcybercrimetext detectiondeep learningsocial media Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsSylvia W. AzumahSylvia W. Azumah is a Ghanaian PhD candidate in Information Technology, specializing in cybersecurity at the University of Cincinnati. She holds a master's in IT from the same university, where she was recognized as the most outstanding student and a bachelors in IT at Bluecrest University from Ghana, West Africa An avid coder, mentor to women in cybersecurity.Nelly ElsayedDr. Nelly Elsayed is an Assistant Professor at the School of Information Technology. She is the Leader and Founder of the Applied Machine Learning and Intelligence Lab. She received a BS. and MS. degree in Computer Science from Alexandria University, and she received her MS. Eng. and Ph.D. degrees from the University of Louisiana at Lafayette. She is an IEEE Computational Intelligence Society active member. She has served as a principal investigator and co-principle investigator in different federal, educational, and industrial level-funded research projects. She received the Faculty Incentive Award for Research and Scholarship from the CECH, UC, recognizing her research contributions, journal and conference peer-reviewed publications, and professional presentations in 2020-2021. She received the Love of Learning Award from the Honor Society Phi Kappa Phi in 2019, 2021 and 2023. She received the Golden Apple Award for Excellence in Teaching (Graduate Level), CECH. She received the UCAADA Sarah Grant Barber Outstanding Advising Faculty Award for the academic year 2021-2022 University of Cincinnati. She has been an Ambassador for Goodwill of Lafayette, Louisiana, since 2017.Zag ElSayedDr Zag ElSayed was born in Odessa, USSR; he is a computer engineering scientist specializing in the Brain Machine Interface, Artificial Intelligence, Cybersecurity for Cyber-Physical Systems and I2oT as well as VLSI Digital Design. He received his B.S. and M.S. with Distinction degree of Honor from Alexandria University in 2005 where he introduced the early framework","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135487152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信