Text classification is known to be a supervised machinelearning technique used in one or more predefined categories to classify sentences or text archives. To be a perfect phrase to convey one's feelings or to be...
详细信息
ISBN:
(数字)9781665415767
ISBN:
(纸本)9781665415774
Text classification is known to be a supervised machinelearning technique used in one or more predefined categories to classify sentences or text archives. To be a perfect phrase to convey one's feelings or to be significant, a Bengali sentence must have three properties i.e. Compatibility, Proximity and Expectancy. In this paper, we have proposed a method that is able to detect whether a Bengali sentence has compatibility, proximity and expectancy using Long Short Term Memory network. Our model is trained with word embedding layer and LSTM layer for the detection of Compatibility of a sentence but POS tagging is included for assuring the syntactic structure in case of Proximity and Expectancy detection. The model is tested on around 75000 Bengali simple sentences. The proposed framework achieves an accuracy of 97.5 percent, 85.5 percent and 97 percent for Compatibility, Proximity and Expectancy respectively. The result analysis proves that our model gives better performance.
Having a significant number of students dropping studies at higher education limits their possibilities of having better employment opportunities. According to a UNESCO report, India is fifty years behind in achieving...
详细信息
Traditional component coding recognition adopts manual recognition or primitive machine vision technology in the electronic component testing and screening industry, which has the issues of low testing efficiency and ...
详细信息
ISBN:
(纸本)9781450360920
Traditional component coding recognition adopts manual recognition or primitive machine vision technology in the electronic component testing and screening industry, which has the issues of low testing efficiency and high recognition error rate. Therefore, we proposed a novel method of component coding recognition based on machine vision combining with deep learning. The machine vision imaging system have been developed to obtain the images of component, and the processing operators such as grayscale conversion, mean filter, slant correction and other techniques are used for preprocessing. The component coding of different types and materials were recognized by deep learning model of deep convolution neural network. Extensive experiments in the component testing center and comparisons with traditional recognition demonstrate that this method has high recognition accuracy and wide range of components recognition.
The emotion is recognized from facial expression by using static images. It is one of the categories in signalprocessing which is applied in various fields, similarly for human and computer interaction. Some sources ...
详细信息
Data mining algorithms have essential methods and rules that can contribute in detecting and preventing various types of network attacks. These methods are utilized with the intrusion detection systems that can be des...
详细信息
Data mining algorithms have essential methods and rules that can contribute in detecting and preventing various types of network attacks. These methods are utilized with the intrusion detection systems that can be designed and developed preserve the information in organizations from damage. Specifically, the data mining technique allows users to effectively distinguish between normal and malicious traffic with good accuracy. In this paper, a methodology for revealing and detecting (DDOS) network attack was suggested using DM algorithms. The utilized methodology is divided especially into four parts, each part has its own rules, as the following: First one is the pre-processing which consists of three sub-steps: (i) encoding, (ii) log2, and (iii) PCA. Encoding is used by converting the original nominal packets into numeric features. Standardization of data was performed using logarithmic algorithm. Finally the PCA technique is applied eight times for several different features to reduce the dimensions of the dataset. The second stage is an anomaly detection model, (RF) algorithm is implemented for the extraction of data patterns while classification the types of the given features in training step, (NB) algorithm was also used in classifying the data to compare the results of its classification with the results of using the classifier (RF). In the third stage, the outcomes were tested by implementing the already trained datasets. In the fourth stage, the proposed system performance evaluation metrics were collected such as the rates of accuracy, false alarm, detection, precision, and ***. MIX dataset were utilized to train and test the proposed model which resulted from merging two datasets (PORTMAP+LDAP), which are used from the CICDDOS2019 datasets, each consisting of several types of attack packets, and benign packets. Several metrics were utilized in the evaluation of the proposed system. The best outcomes were obtained for detection by using the log2 algor
Surfing internet becomes common now-a-days that gave a chance for intruders to steal information. Therefore security is very important to detect any unwanted activities by using intrusion detection system. Intrusion d...
详细信息
There are still few works on application of deep learning for Myanmar language. This paper presents an approach to use a convolutional neural network (CNN) model to classify sentence sentiment in Myanmar texts. A CNN ...
详细信息
A reliable Cyber Attack Detection Model (CADM) is a system that works as safeguard for the users of modern technological devices and assistant for the operators of networks. The research paper aims to develop a CADM f...
详细信息
ISBN:
(数字)9781665415767
ISBN:
(纸本)9781665415774
A reliable Cyber Attack Detection Model (CADM) is a system that works as safeguard for the users of modern technological devices and assistant for the operators of networks. The research paper aims to develop a CADM for analyzing the network data patterns to classify cyber-attacks. CADM finds out attack wise detection accuracy using ensemble classification method. LASSO has been used to extract important features. It can work with large datasets and it has more visualization capability. Gradient Boosting and Random Forest algorithms have been used for classification of network traffic data to build an ensemble method. Gradient Boosting algorithm trains weak learning models and select the best decision trees to deliver more improved prediction accuracy and Random Forest algorithm trains each tree in parallel manner. In this research work, five datasets such as NSL-KDD, KDD Cup 99, UNSWNB15, URL 2016 and CICIDS 2017 are also applied to check the efficiency of the proposed model.
The paper presents a modified bacterial foraging optimization (BFO) algorithm to solve non-identical parallel batch processingmachine scheduling problems with the objective of minimizing total weighted tardiness. The...
详细信息
Restricted Boltzmann machines (RBMs) is one of machinelearning's methods which within past decades, the development of RBMs has quite increase. Researches of RBMs focused on theories and applications of RBMs. The...
详细信息
ISBN:
(纸本)9781450366427
Restricted Boltzmann machines (RBMs) is one of machinelearning's methods which within past decades, the development of RBMs has quite increase. Researches of RBMs focused on theories and applications of RBMs. The application of RBMs has proofed that RBMs good at finishing many tasks, such as feature extraction method, document modeling, representation learning, classification and others. The RBMs' theories also have great movements, such as the development of the learning algorithm and inference techniques of RBMs. The key factors making the RBM success on finishing task are the learning algorithm and inference techniques. They motivated the development of inference techniques which successfully improved the deep neural network (DNN) performance. The aim of this research is reviewing the various types of RBMs as the application side, and the development of learning algorithm and inference techniques as theoretical side. Hopefully, it could motivate more development on the RBMs in order to contribute on overcoming implementation tasks especially on image processing tasks.
暂无评论