{"title":"Vaccine sentiment analysis using BERT + NBSVM and geo-spatial approaches.","authors":"Areeba Umair, Elio Masciari, Muhammad Habib Ullah","doi":"10.1007/s11227-023-05319-8","DOIUrl":"10.1007/s11227-023-05319-8","url":null,"abstract":"<p><p>Since the spread of the coronavirus flu in 2019 (hereafter referred to as COVID-19), millions of people worldwide have been affected by the pandemic, which has significantly impacted our habits in various ways. In order to eradicate the disease, a great help came from unprecedentedly fast vaccines development along with strict preventive measures adoption like lockdown. Thus, world wide provisioning of vaccines was crucial in order to achieve the maximum immunization of population. However, the fast development of vaccines, driven by the urge of limiting the pandemic caused skeptical reactions by a vast amount of population. More specifically, the people's hesitancy in getting vaccinated was an additional obstacle in fighting COVID-19. To ameliorate this scenario, it is important to understand people's sentiments about vaccines in order to take proper actions to better inform the population. As a matter of fact, people continuously update their feelings and sentiments on social media, thus a proper analysis of those opinions is an important challenge for providing proper information to avoid misinformation. More in detail, sentiment analysis (Wankhade et al. in Artif Intell Rev 55(7):5731-5780, 2022. 10.1007/s10462-022-10144-1) is a powerful technique in natural language processing that enables the identification and classification of people feelings (mainly) in text data. It involves the use of machine learning algorithms and other computational techniques to analyze large volumes of text and determine whether they express positive, negative or neutral sentiment. Sentiment analysis is widely used in industries such as marketing, customer service, and healthcare, among others, to gain actionable insights from customer feedback, social media posts, and other forms of unstructured textual data. In this paper, Sentiment Analysis will be used to elaborate on people reaction to COVID-19 vaccines in order to provide useful insights to improve the correct understanding of their correct usage and possible advantages. In this paper, a framework that leverages artificial intelligence (AI) methods is proposed for classifying tweets based on their polarity values. We analyzed Twitter data related to COVID-19 vaccines after the most appropriate pre-processing on them. More specifically, we identified the word-cloud of negative, positive, and neutral words using an artificial intelligence tool to determine the sentiment of tweets. After this pre-processing step, we performed classification using the BERT + NBSVM model to classify people's sentiments about vaccines. The reason for choosing to combine bidirectional encoder representations from transformers (BERT) and Naive Bayes and support vector machine (NBSVM ) can be understood by considering the limitation of BERT-based approaches, which only leverage encoder layers, resulting in lower performance on short texts like the ones used in our analysis. Such a limitation can be ameliorated by using Naive Ba","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-31"},"PeriodicalIF":3.3,"publicationDate":"2023-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10164419/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network.","authors":"Rati Bhan, Rajendra Pamula, Parvez Faruki, Jyoti Gajrani","doi":"10.1007/s11227-023-05272-6","DOIUrl":"10.1007/s11227-023-05272-6","url":null,"abstract":"<p><p>The Internet of Medical Things (IoMT) is an extended genre of the Internet of Things (IoT) where the <i>Things</i> collaborate to provide remote patient health monitoring, also known as the Internet of Health (IoH). Smartphones and IoMTs are expected to maintain secure and trusted confidential patient record exchange while managing the patient remotely. Healthcare organizations deploy Healthcare Smartphone Networks (HSN) for personal patient data collection and sharing among smartphone users and IoMT nodes. However, attackers gain access to confidential patient data via infected IoMT nodes on the HSN. Additionally, attackers can compromise the entire network via malicious nodes. This article proposes a Hyperledger blockchain-based technique to identify compromised IoMT nodes and safeguard sensitive patient records. Furthermore, the paper presents a Clustered Hierarchical Trust Management System (CHTMS) to block malicious nodes. In addition, the proposal employs Elliptic Curve Cryptography (ECC) to protect sensitive health records and is resilient against Denial-Of-Service (DOS) attacks. Finally, the evaluation results show that integrating blockchains into the HSN system improved detection performance compared to the existing state of the art. Therefore, the simulation results indicate better security and reliability when compared to conventional databases.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-42"},"PeriodicalIF":3.3,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10131528/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CovSumm: an unsupervised transformer-cum-graph-based hybrid document summarization model for CORD-19.","authors":"Akanksha Karotia, Seba Susan","doi":"10.1007/s11227-023-05291-3","DOIUrl":"10.1007/s11227-023-05291-3","url":null,"abstract":"<p><p>The number of research articles published on COVID-19 has dramatically increased since the outbreak of the pandemic in November 2019. This absurd rate of productivity in research articles leads to information overload. It has increasingly become urgent for researchers and medical associations to stay up to date on the latest COVID-19 studies. To address information overload in COVID-19 scientific literature, the study presents a novel hybrid model named CovSumm, an unsupervised graph-based hybrid approach for single-document summarization, that is evaluated on the CORD-19 dataset. We have tested the proposed methodology on the scientific papers in the database dated from January 1, 2021 to December 31, 2021, consisting of 840 documents in total. The proposed text summarization is a hybrid of two distinctive extractive approaches (1) GenCompareSum (transformer-based approach) and (2) TextRank (graph-based approach). The sum of scores generated by both methods is used to rank the sentences for generating the summary. On the CORD-19, the recall-oriented understudy for gisting evaluation (ROUGE) score metric is used to compare the performance of the CovSumm model with various state-of-the-art techniques. The proposed method achieved the highest scores of ROUGE-1: 40.14%, ROUGE-2: 13.25%, and ROUGE-L: 36.32%. The proposed hybrid approach shows improved performance on the CORD-19 dataset when compared to existing unsupervised text summarization methods.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-23"},"PeriodicalIF":3.3,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10131559/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hassen Louati, Ali Louati, Slim Bechikh, Elham Kariri
{"title":"Embedding channel pruning within the CNN architecture design using a bi-level evolutionary approach.","authors":"Hassen Louati, Ali Louati, Slim Bechikh, Elham Kariri","doi":"10.1007/s11227-023-05273-5","DOIUrl":"10.1007/s11227-023-05273-5","url":null,"abstract":"<p><p>Remarkable advancements have been achieved in machine learning and computer vision through the utilization of deep neural networks. Among the most advantageous of these networks is the convolutional neural network (CNN). It has been used in pattern recognition, medical diagnosis, and signal processing, among other things. Actually, for these networks, the challenge of choosing hyperparameters is of utmost importance. The reason behind this is that as the number of layers rises, the search space grows exponentially. In addition, all known classical and evolutionary pruning algorithms require a trained or built architecture as input. During the design phase, none of them consider the process of pruning. In order to assess the effectiveness and efficiency of any architecture created, pruning of channels must be carried out before transmitting the dataset and computing classification errors. For instance, following pruning, an architecture of medium quality in terms of classification may transform into an architecture that is both highly light and accurate, and vice versa. There exist countless potential scenarios that could occur, which prompted us to develop a bi-level optimization approach for the entire process. The upper level involves generating the architecture while the lower level optimizes channel pruning. Evolutionary algorithms (EAs) have proven effective in bi-level optimization, leading us to adopt the co-evolutionary migration-based algorithm as a search engine for our bi-level architectural optimization problem in this research. Our proposed method, CNN-D-P (bi-level CNN design and pruning), was tested on the widely used image classification benchmark datasets, CIFAR-10, CIFAR-100 and ImageNet. Our suggested technique is validated by means of a set of comparison tests with regard to relevant state-of-the-art architectures.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-34"},"PeriodicalIF":3.3,"publicationDate":"2023-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10127175/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alaa Lateef Noor Al-Hajjar, Ali Kadhum M Al-Qurabat
{"title":"An overview of machine learning methods in enabling IoMT-based epileptic seizure detection.","authors":"Alaa Lateef Noor Al-Hajjar, Ali Kadhum M Al-Qurabat","doi":"10.1007/s11227-023-05299-9","DOIUrl":"10.1007/s11227-023-05299-9","url":null,"abstract":"<p><p>The healthcare industry is rapidly automating, in large part because of the Internet of Things (IoT). The sector of the IoT devoted to medical research is sometimes called the Internet of Medical Things (IoMT). Data collecting and processing are the fundamental components of all IoMT applications. Machine learning (ML) algorithms must be included into IoMT immediately due to the vast quantity of data involved in healthcare and the value that precise forecasts have. In today's world, together, IoMT, cloud services, and ML techniques have become effective tools for solving many problems in the healthcare sector, such as epileptic seizure monitoring and detection. One of the biggest hazards to people's lives is epilepsy, a lethal neurological condition that has become a global issue. To prevent the deaths of thousands of epileptic patients each year, there is a critical necessity for an effective method for detecting epileptic seizures at their earliest stage. Numerous medical procedures, including epileptic monitoring, diagnosis, and other procedures, may be carried out remotely with the use of IoMT, which will reduce healthcare expenses and improve services. This article seeks to act as both a collection and a review of the different cutting-edge ML applications for epilepsy detection that are presently being combined with IoMT.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-48"},"PeriodicalIF":3.3,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10123593/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10091323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Q-learning-based UAV-mounted base station positioning in a disaster scenario for connectivity to the users located at unknown positions.","authors":"Dilip Mandloi, Rajeev Arya","doi":"10.1007/s11227-023-05292-2","DOIUrl":"10.1007/s11227-023-05292-2","url":null,"abstract":"<p><p>Due to its flexibility, cost-effectiveness, and quick deployment abilities, unmanned aerial vehicle-mounted base station (UmBS) deployment is a promising approach for restoring wireless services in areas devastated by natural disasters such as floods, thunderstorms, and tsunami strikes. However, the biggest challenges in the deployment process of UmBS are ground user equipment's (UE's) position information, UmBS transmit power optimization, and UE-UmBS association. In this article, we propose Localization of ground UEs and their Association with the UmBS (LUAU), an approach that ensures localization of ground UEs and energy-efficient deployment of UmBSs. Unlike existing studies that proposed their work based on the known UEs positional information, we first propose a three-dimensional range-based localization approach (3D-RBL) to estimate the position information of the ground UEs. Subsequently, an optimization problem is formulated to maximize the UE's mean data rate by optimizing the UmBS transmit power and deployment locations while taking the interference from the surrounding UmBSs into consideration. To achieve the goal of the optimization problem, we utilize the exploration and exploitation abilities of the Q-learning framework. Simulation results demonstrate that the proposed approach outperforms two benchmark schemes in terms of the UE's mean data rate and outage percentage.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-32"},"PeriodicalIF":3.3,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10116485/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9686584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-enabled healthcare monitoring system for early Monkeypox detection.","authors":"Aditya Gupta, Monu Bhagat, Vibha Jain","doi":"10.1007/s11227-023-05288-y","DOIUrl":"10.1007/s11227-023-05288-y","url":null,"abstract":"<p><p>The recent emergence of monkeypox poses a life-threatening challenge to humans and has become one of the global health concerns after COVID-19. Currently, machine learning-based smart healthcare monitoring systems have demonstrated significant potential in image-based diagnosis including brain tumor identification and lung cancer diagnosis. In a similar fashion, the applications of machine learning can be utilized for the early identification of monkeypox cases. However, sharing critical health information with various actors such as patients, doctors, and other healthcare professionals in a secure manner remains a research challenge. Motivated by this fact, our paper presents a blockchain-enabled conceptual framework for the early detection and classification of monkeypox using transfer learning. The proposed framework is experimentally demonstrated in Python 3.9 using a monkeypox dataset of 1905 images obtained from the GitHub repository. To validate the effectiveness of the proposed model, various performance estimators, namely accuracy, recall, precision, and F1-score, are employed. The performance of different transfer learning models, namely Xception, VGG19, and VGG16, is compared against the presented methodology. Based on the comparison, it is evident that the proposed methodology effectively detects and classifies the monkeypox disease with a classification accuracy of 98.80%. In future, multiple skin diseases such as measles and chickenpox can be diagnosed using the proposed model on the skin lesion datasets.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-25"},"PeriodicalIF":3.3,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10118230/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pengbin Feng, Li Yang, Di Lu, Ning Xi, Jianfeng Ma
{"title":"BejaGNN: behavior-based Java malware detection via graph neural network.","authors":"Pengbin Feng, Li Yang, Di Lu, Ning Xi, Jianfeng Ma","doi":"10.1007/s11227-023-05243-x","DOIUrl":"10.1007/s11227-023-05243-x","url":null,"abstract":"<p><p>As a popular platform-independent language, Java is widely used in enterprise applications. In the past few years, language vulnerabilities exploited by Java malware have become increasingly prevalent, which cause threats for multi-platform. Security researchers continuously propose various approaches for fighting against Java malware programs. The low code path coverage and poor execution efficiency of dynamic analysis limit the large-scale application of dynamic Java malware detection methods. Therefore, researchers turn to extracting abundant static features to implement efficient malware detection. In this paper, we explore the direction of capturing malware semantic information by using graph learning algorithms and present BejaGNN (Behavior-based Java malware detection via Graph Neural Network), a novel behavior-based Java malware detection method using static analysis, word embedding technique, and graph neural network. Specifically, BejaGNN leverages static analysis techniques to extract ICFGs (Inter-procedural Control Flow Graph) from Java program files and then prunes these ICFGs to remove noisy instructions. Then, word embedding techniques are adopted to learn semantic representations for Java bytecode instructions. Finally, BejaGNN builds a graph neural network classifier to determine the maliciousness of Java programs. Experimental results on a public Java bytecode benchmark demonstrate that BejaGNN achieves high <i>F</i>1 98.8% and is superior to existing Java malware detection approaches, which verifies the promise of graph neural network in Java malware detection.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-25"},"PeriodicalIF":3.3,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10109236/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexible multi-client functional encryption for set intersection.","authors":"Mojtaba Rafiee","doi":"10.1007/s11227-023-05129-y","DOIUrl":"10.1007/s11227-023-05129-y","url":null,"abstract":"<p><p>A multi-client functional encryption (<math><mi>MCFE</mi></math>) scheme [Goldwasser-Gordon-Goyal 2014] for set intersection is a cryptographic primitive that enables an evaluator to learn the intersection from all sets of a predetermined number of clients, without need to learn the plaintext set of each individual client. Using these schemes, it is impossible to compute the set intersections from arbitrary subsets of clients, and thus, this constraint limits the range of its applications. To provide such a possibility, we redefine the syntax and security notions of <math><mi>MCFE</mi></math> schemes, and introduce flexible multi-client functional encryption (<math><mi>FMCFE</mi></math>) schemes. We extend the <math><mi>aIND</mi></math> security of <math><mi>MCFE</mi></math> schemes to <math><mi>aIND</mi></math> security of <math><mi>FMCFE</mi></math> schemes in a straightforward way. For a universal set with polynomial size in security parameter, we propose an <math><mi>FMCFE</mi></math> construction for achieving <math><mi>aIND</mi></math> security. Our construction computes set intersection for <i>n</i> clients that each holds a set with <i>m</i> elements, in time <math><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mi>m</mi><mo>)</mo></mrow></math>. We also prove the security of our construction under DDH1 that it is a variant of the symmetric external Diffie-Hellman (SXDH) assumption.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-22"},"PeriodicalIF":3.3,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10049912/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An evaluation of relational and NoSQL distributed databases on a low-power cluster.","authors":"Lucas Ferreira da Silva, João V F Lima","doi":"10.1007/s11227-023-05166-7","DOIUrl":"10.1007/s11227-023-05166-7","url":null,"abstract":"<p><p>The constant growth of social media, unconventional web technologies, mobile applications, and Internet of Things (IoT) devices create challenges for cloud data systems in order to support huge datasets and very high request rates. NoSQL databases, such as Cassandra and HBase, and relational SQL databases with replication, such as Citus/PostgreSQL, have been used to increase horizontal scalability and high availability of data store systems. In this paper, we evaluated three distributed databases on a low-power low-cost cluster of commodity Single-Board Computers (SBC): relational Citus/PostgreSQL and NoSQL databases Cassandra and HBase. The cluster has 15 Raspberry Pi 3 nodes with Docker Swarm orchestration tool for service deployment and ingress load balancing over SBCs. We believe that a low-cost SBC cluster can support cloud serving goals such as scale-out, elasticity, and high availability. Experimental results clearly demonstrated that there is a trade-off between performance and replication, which provides availability and partition tolerance. Besides, both properties are essential in the context of distributed systems with low-power boards. Cassandra attained better results with its consistency levels specified by the client. Both Citus and HBase enable consistency but it penalizes performance as the number of replicas increases.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-19"},"PeriodicalIF":3.3,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10035467/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9686585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}