22 research outputs found

    Fusing Text and Image for Event Detection in Twitter

    Full text link
    In this contribution, we develop an accurate and effective event detection method to detect events from a Twitter stream, which uses visual and textual information to improve the performance of the mining process. The method monitors a Twitter stream to pick up tweets having texts and images and stores them into a database. This is followed by applying a mining algorithm to detect an event. The procedure starts with detecting events based on text only by using the feature of the bag-of-words which is calculated using the term frequency-inverse document frequency (TF-IDF) method. Then it detects the event based on image only by using visual features including histogram of oriented gradients (HOG) descriptors, grey-level cooccurrence matrix (GLCM), and color histogram. K nearest neighbours (Knn) classification is used in the detection. The final decision of the event detection is made based on the reliabilities of text only detection and image only detection. The experiment result showed that the proposed method achieved high accuracy of 0.94, comparing with 0.89 with texts only, and 0.86 with images only.Comment: 9 Pages, 4 figuer

    Multiple Kernel-Based Multimedia Fusion for Automated Event Detection from Tweets

    Get PDF
    A method for detecting hot events such as wildfires is proposed. It uses visual and textual information to improve detection. Starting with picking up tweets having texts and images, it preprocesses the data to eliminate unwanted data, transforms unstructured data into structured data, then extracts features. Text features include term frequency-inverse document frequency. Image features include histogram of oriented gradients, gray-level co-occurrence matrix, color histogram, and scale-invariant feature transform. Next, it inputs the features to the multiple kernel learning (MKL) for fusion to automatically combine both feature types to achieve the best performance. Finally, it does event detection. The method was tested on Brisbane hailstorm 2014 and California wildfires 2017. It was compared with methods that used text only or images only. With the Brisbane hailstorm data, the proposed method achieved the best performance, with a fusion accuracy of 0.93, comparing to 0.89 with text only, and 0.85 with images only. With the California wildfires data, a similar performance was recorded. It has demonstrated that event detection in Twitter is enhanced and improved by combination of multiple features. It has delivered an accurate and effective event detection method for spreading awareness and organizing responses, leading to better disaster management

    Heart patient health monitoring system using invasive and non-invasive measurement

    Get PDF
    The abnormal heart conduction, known as arrhythmia, can contribute to cardiac diseases that carry the risk of fatal consequences. Healthcare professionals typically use electrocardiogram (ECG) signals and certain preliminary tests to identify abnormal patterns in a patient鈥檚 cardiac activity. To assess the overall cardiac health condition, cardiac specialists monitor these activities separately. This procedure may be arduous and time-intensive, potentially impacting the patient鈥檚 well-being. This study automates and introduces a novel solution for predicting the cardiac health conditions, specifically identifying cardiac morbidity and arrhythmia in patients by using invasive and non-invasive measurements. The experimental analyses conducted in medical studies entail extremely sensitive data and any partial or biased diagnoses in this field are deemed unacceptable. Therefore, this research aims to introduce a new concept of determining the uncertainty level of machine learning algorithms using information entropy. To assess the effectiveness of machine learning algorithms information entropy can be considered as a unique performance evaluator of the machine learning algorithm which is not selected previously any studies within the realm of bio-computational research. This experiment was conducted on arrhythmia and heart disease datasets collected from Massachusetts Institute of Technology-Berth Israel Hospital-arrhythmia (DB-1) and Cleveland Heart Disease (DB-2), respectively. Our framework consists of four significant steps: 1) Data acquisition, 2) Feature preprocessing approach, 3) Implementation of learning algorithms, and 4) Information Entropy. The results demonstrate the average performance in terms of accuracy achieved by the classification algorithms: Neural Network (NN) achieved 99.74%, K-Nearest Neighbor (KNN) 98.98%, Support Vector Machine (SVM) 99.37%, Random Forest (RF) 99.76 % and Na茂ve Bayes (NB) 98.66% respectively. We believe that this study paves the way for further research, offering a framework for identifying cardiac health conditions through machine learning techniques

    BreastCNN: A Novel Layer-based Convolutional Neural Network for Breast Cancer Diagnosis in DMR-Thermogram Images

    No full text
    Breast cancer is one of the most prominent sources of death in females. Every year many women suffer breast cancer, and, in the end, death occurs. The early detection of breast cancer may cause to reduce the death rate and save women鈥檚 lives. The medical care and cost of prevention of women鈥檚 breast cancer are costly and become a priority to diagnose breast cancer at its early stages. Initially, the mammography technique was the leading technique to detect the early stage of breast cancer. However, it cannot deal with a tumor size of less than 2 mm. To overcome this challenge, by considering the DMR-thermogram images, a novel layer-based Convolutional Neural Network (BreastCNN) for breast cancer detection and classification was proposed. BreastCNN method works in five different layers and uses different types of filters. The learning rate and structures of layers change after every convolution layer. The proposed technique is tested on the Database for Mastology Research (DMR) having 745 healthy and 261 sick images. The performance is calculated as the statistical values known as sensitivity, specificity, precision, accuracy, and F1-score. The proposed technique shows better accuracy of 99.7% as related to the already presented methods

    FUSING TEXT AND IMAGE FOR EVENT DETECTION IN TWITTER

    No full text
    ABSTRACT In this contribution, we develop an accurate and effective event detection method to detect events from a Twitter stream, which uses visual and textual information to improve the performance of the mining process. The method monitors a Twitter stream to pick up tweets having texts and images and stores them into a database. This is followed by applying a mining algorithm to detect an event. The procedure starts with detecting events based on text only by using the feature of the bag-of-words which is calculated using the term frequency-inverse document frequency (TF-IDF) method. Then it detects the event based on image only by using visual features including histogram of oriented gradients (HOG) descriptors, grey-level cooccurrence matrix (GLCM), and color histogram. K nearest neighbours (Knn) classification is used in the detection. The final decision of the event detection is made based on the reliabilities of text only detectio

    An Improved Mayfly Method to Solve Distributed Flexible Job Shop Scheduling Problem under Dual Resource Constraints

    No full text
    Aiming at the distributed flexible job shop scheduling problem under dual resource constraints considering the influence of workpiece transportation time between factories and machines, a distributed flexible job shop scheduling problem (DFJSP) model with the optimization goal of minimizing completion time is established, and an improved mayfly algorithm (IMA) is proposed to solve it. Firstly, the mayfly position vector is discrete mapped to make it applicable to the scheduling problem. Secondly, three-layer coding rules of process, worker, and machine is adopted, in which the factory selection is reflected by machine number according to the characteristics of the model, and a hybrid initialization strategy is designed to improve the population quality and diversity. Thirdly, an active time window decoding strategy considering transportation time is designed for the worker鈥搈achine idle time window to improve the local optimization performance of the algorithm. In addition, the improved crossover and mutation operators is designed to expand the global search range of the algorithm. Finally, through simulation experiments, the results of various algorithms are compared to verify the effectiveness of the proposed algorithm for isomorphism and isomerism factories instances

    Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms

    No full text
    Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning

    An Improved Mayfly Method to Solve Distributed Flexible Job Shop Scheduling Problem under Dual Resource Constraints

    No full text
    Aiming at the distributed flexible job shop scheduling problem under dual resource constraints considering the influence of workpiece transportation time between factories and machines, a distributed flexible job shop scheduling problem (DFJSP) model with the optimization goal of minimizing completion time is established, and an improved mayfly algorithm (IMA) is proposed to solve it. Firstly, the mayfly position vector is discrete mapped to make it applicable to the scheduling problem. Secondly, three-layer coding rules of process, worker, and machine is adopted, in which the factory selection is reflected by machine number according to the characteristics of the model, and a hybrid initialization strategy is designed to improve the population quality and diversity. Thirdly, an active time window decoding strategy considering transportation time is designed for the worker–machine idle time window to improve the local optimization performance of the algorithm. In addition, the improved crossover and mutation operators is designed to expand the global search range of the algorithm. Finally, through simulation experiments, the results of various algorithms are compared to verify the effectiveness of the proposed algorithm for isomorphism and isomerism factories instances

    Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms

    No full text
    Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning
    corecore