144 research outputs found

    A Robust Deep Model for Improved Categorization of Legal Documents for Predictive Analytics

    Get PDF
    Predictive legal analytics is a technology used to predict the chances of successful and unsuccessful outcomes in a particular case. Predictive legal analytics is performed through automated document classification for facilitating legal experts in their classification of court documents to retrieve and understand the details of specific legal factors from legal judgments for accurate document analysis. However, extracting these factors from legal texts document is a time-consuming process. In order to facilitate the task of classifying documents, a robust method namely Distributed Stochastic Keyword Extraction based Ensemble Theil-Sen Regressive Deep Belief Reweight Boost Classification (DSKE-TRDBRBC) is proposed. The DSKE-TRDBRBC technique consists of two major processes namely Keyword Extraction and Classification. At first, the t-distributed stochastic neighbor embedding technique is applied to DSKE-TRDBRBC for keyword extraction. This in turn minimizes the time consumption for document classification. After that, the Ensemble Theil-Sen Regressive Deep Belief Reweight Boosting technique is applied for document classification. The Ensemble boosting algorithm initially constructs’ set of Theil-Sen Regressive Deep Belief neural networks to classify the input legal documents. Then the results of the Deep Belief neural network are combined to built a strong classifier by reducing the error. This aids in improving the classification accuracy. The proposed method is experimentally evaluated with various metrics such as F-measure , recall, accuracy, precision, , and computational time. The experimental results quantitatively confirm that the proposed DSKE-TRDBRBC technique achieves better accuracy with lowest computation time as compared to the conventional approaches

    A High-Performance Reconfigurable Four Element Multiband MIMO Antenna for UWB Communications

    Get PDF
    For 5G applications, a 4-element orthogonal multi-input, multi-output antenna with an H-slot is advised. This antenna's CPW power source has four elements with better isolation. For this proposed antenna, the dimensions are reduced to , and the band obstruction with a parameter less than -10dB that is from 2.2GHz to 20GHz and it notches vary from 3.4GHz to 4.3GHz in the frequency range of 8.2GHz to 8.7GHz. In order to support WiMAX (3.3GHz–3.7GHz) and band ranges from 8.2GHz–8.7GHz in military/radar applications, notched filters will be used. The proposed antenna proved successful in achieving mutual coupling at less than -19 dB. The antenna's ECC level is 0.019 and its directivity gain is almost 10 db, making it a very good antenna. Except at the notches, the peak gain and radiation efficacy are 5.8 dB and 82%, respectively. This suggested antenna can be used for UWB applications such location monitoring, communications, military/radar applications, and biomedical systems as a prepared option or recommendation

    A COMPREHENSIVE STUDY OF CRYPTOGRAPHY AND KEY MANAGEMENT BASED SECURITY IN CLOUD COMPUTING

    Get PDF
    Cloud computing is a cost effective flexible and proven delivery platform for providing consumer IT services or business services over internet. It has an ability to provide many services over internet. It not only provides computing services but additional computing resources. To interact with various services in the cloud and to store retrieve data from cloud several security mechanism is required. Cryptography and key management mechanism are one of the import services in the cloud to secure data. In this context, this paper investigates the basic problem of cloud computing with cryptography and key management system for enabling support of interoperability between cloud cryptography client and key management services

    Cyber Security Concerns in Social Networking Service

    Get PDF
    Today’s world is unimaginable without online social networks. Nowadays, millions of people connect with their friends and families by sharing their personal information with the help of different forms of social media. Sometimes, individuals face different types of issues while maintaining the multimedia contents like, audios, videos, photos because it is difficult to maintain the security and privacy of these multimedia contents uploaded on a daily basis. In fact, sometimes personal or sensitive information could get viral if that leaks out even unintentionally. Any leaked out content can be shared and made a topic of popular talk all over the world within few seconds with the help of the social networking sites. In the setting of Internet of Things (IoT) that would connect millions of devices, such contents could be shared from anywhere anytime. Considering such a setting, in this work, we investigate the key security and privacy concerns faced by individuals who use different social networking sites differently for different reasons. We also discuss the current state-of-the-art defense mechanisms that can bring somewhat long-term solutions to tackling these threats

    A review of data analysis for early-childhood period: taxonomy, motivations, challenges, recommendation, and methodological aspects

    Get PDF
    Early childhood is a significant period when transitions take place in children. This period is a hot topic among researchers who pursue this domain across different scientific disciplines. Many studies addressed social, scientific, medical, and technical topics during early childhood. Researchers also utilized different analysis measures to conduct experiments on the different types of data related to the early childhood to produce research articles. This paper aims to review and analyze the literature related to early childhood in addition to the data analyses and the types of data used. The factors that were considered to boost the understanding of contextual aspects in the published studies related to early childhood were considered as open challenges, motivations, and recommendations of researchers who aimed to advance the study in this area of science. We systematically searched articles on topics related to early childhood, the data analysis approaches used, and the types of data applied. The search was conducted on five major databases, namely, ScienceDirect, Scopus, Web of Science, IEEE Xplore, and PubMed from 2013 to September 2017. These indices were considered sufficiently extensive and reliable to cover our field of the literature. Articles were selected on the basis of our inclusion and exclusion criteria (n = 233). The first portion of studies (n = 103/233) focused on the different aspects related to the development of children in early age. They discussed different topics, such as the body growth development of children, psychology, skills, and other related topics that overlap between two or more of the previous topics or do not fall into any of the categories but are still under development. The second portion of studies (n = 107/233) focused on different aspects associated with health in early childhood. A number of topics were discussed in this regard, such as those related to family health, medical procedures, interventions, and risk that address the health-related aspects, in addition to other related topics that overlap between two or more of the previous topics or do not fall into any of the categories but are still under health. The remaining studies (n = 23/233) were categorized to the other main category because they overlap between the previous two major categories, namely, development and health, or they do not fall into any of the previous main categories. Early childhood is a sensitive period in every child’s life. This period was studied using different means of data analysis and with the aid of different data types to produce different findings from the previous studies. Research areas on early childhood vary, but they are equally significant. This paper emphasizes the current standpoint and opportunities for research in this area and boosts additional efforts toward the understanding of this research field

    Routing Protocols for WBAN

    Get PDF
    The emergence of wireless body area network (WBAN) technology has brought hope and dawn to solve the problems of population aging, various chronic diseases, and medical facility shortage. The increasing demand for real-time applications in such networks stimulates many research activities. Our aim is to provide a tutorial to introduce WBAN routing proto-cols. We classify, and compare the advantages and disadvantages of various routing proto-cols. We also address Emergency health issues and suggest how it can be improved

    Intelligent predictor in Health care systems

    Get PDF
    transcriptome profiling. Using RNA sequence, It has become possible to arrange and quantify transcriptional outputs of single cells or hundreds of samples. These transcriptomes provide a link between cellular phenotypes and molecular underpin-nings such as mutations . In the framework of cancer, this link gives a chance to dis-member the heterogeneity and complexity of tumours. We classify, and compare the advantages and disadvantages of various routing proto-cols. We also address Emergency health issues and suggest how it can be improved

    Pipelining protocols in TCP

    Get PDF
    Transmission Control Protocol (TCP), the most popular transport layer communication protocol for the Internet.It was originally designed for wired networks, where Bit Error Rate (BER) is low and congestion is the primary cause of packet loss [1].This article analyzes handshaking issues and pipeline protocols, such as slow start, congestion control, collisions, low BER etc. Then it provides pipeline protocols to wireless network i.e., Head of Line Blocking. At the end it proposes solution for TCP enhancement specific to wireless network

    Intelligent predictor in Health care systems

    Get PDF
    transcriptome profiling. Using RNA sequence, It has become possible to arrange and quantify transcriptional outputs of single cells or hundreds of samples. These transcriptomes provide a link between cellular phenotypes and molecular underpin-nings such as mutations . In the framework of cancer, this link gives a chance to dis-member the heterogeneity and complexity of tumours. We classify, and compare the advantages and disadvantages of various routing proto-cols. We also address Emergency health issues and suggest how it can be improved
    corecore