The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
Feature extraction is the most critical step in classification of multispectral *** classification accuracy is mainly influenced by the feature sets that are selected to classify the *** the past,handcrafted feature s...
详细信息
Feature extraction is the most critical step in classification of multispectral *** classification accuracy is mainly influenced by the feature sets that are selected to classify the *** the past,handcrafted feature sets are used which are not adaptive for different image *** overcome this,an evolu-tionary learning method is developed to automatically learn the spatial-spectral features for classification.A modified Firefly Algorithm(FA)which achieves maximum classification accuracy with reduced size of feature set is proposed to gain the interest of feature selection for this *** extracting the most effi-cient features from the data set,we have used 3-D discrete wavelet transform which decompose the multispectral image in all three *** selecting spatial and spectral features we have studied three different approaches namely overlapping window(OW-3DFS),non-overlapping window(NW-3DFS)adaptive window cube(AW-3DFS)and Pixel based *** Multiclass Support Vector Machine(MSVM)is used for classification *** con-ducted on Madurai LISS IV multispectral image exploited that the adaptive win-dow approach is used to increase the classification accuracy.
Today's networking and telecommunications industries greatly benefit from the growth of highly sturdy and energy-effective Internet of Things through communication sensors. Device efficiency may be increased while...
详细信息
Brain tumor is the most serious and deadly disease, and it is formed due to abnormal cell production. There are two different sorts of tumors including benign (non-cancerous) and malignant (cancerous), and the third l...
详细信息
Caring of newborn babies is one of major concern for the doctors and to take care of his/her life is very challenging and sometime critical. Cardiac attack is one the severe issue that require immediate medical suppor...
详细信息
作者:
Abreu, MiguelReis, Luís PauloLau, NunoLIACC/LASI/FEUP
Artificial Intelligence and Computer Science Laboratory Faculty of Engineering University of Porto Porto Portugal IEETA/LASI/DETI
Institute of Electronics and Informatics Engineering of Aveiro Department of Electronics Telecommunications and Informatics University of Aveiro Aveiro Portugal
The RoboCup 3D soccer simulation league serves as a competitive platform for showcasing innovation in autonomous humanoid robot agents through simulated soccer matches. Our team, FC Portugal, developed a new codebase ...
详细信息
As a new and potentially devastating form of cyberattack, ‘Phishing’ URLs pose a risk to users by impersonating legitimate websites in an effort to obtain sensitive information such as usernames, passwords, and fina...
详细信息
This article presents an initial solution based selective harmonic elimination (SHE) method for multilevel inverter (MLI) that aims to solve SHE problem with high accuracy while significantly reducing the number of it...
详细信息
This paper presents evaluation results of a power- efficient JPEG compression circuit utilizing approximate computing. To achieve power efficiency, we replace summations in Discrete Cosine Transform (DCT) with approxi...
详细信息
作者:
Hama, HiroyukiSato, ToshinoriFukuoka University
Graduate School of Engineering Department of Electronics Engineering and Computer Science Fukuoka Japan Fukuoka University
Faculty of Engineering Department of Electronics Engineering and Computer Science Fukuoka Japan
Edge devices used in healthcare require high energy efficiency due to battery operation and replacement challenges. Approximate computing is effective in reducing energy consumption for applications tolerant to errors...
详细信息
暂无评论