21 research outputs found
IDENTIFYING INFLUENTIAL BLOGGERS ON THE WEB
Blog has take an important aspect of internet since the introduction of Web 2.0 technology because blog as been away to influence others who read the blogs. People now have interest in finding materials and friends on the internet.Many users visit blog sites to read the posts and comment on them. Most people do read blog to gather informationon things that are important before take major decision about them. Because blogger always share their experienceon a topic for others to comments and through this others share their own experience. With the impact thatinfluential blogger have in a community. The benefits of achieving competitive advantages in a blog community byidentify influential blogger have created several research gaps and the popularity of these services has make theproblem of identifying the most influential bloggers significant, since its solution can lead to major benefits for theusers of this services i.e. education, politic, participatory journalism, advertising, searching, commerce etc. Thecurrent works in this regard ignore some important aspects of the blogsphere. This paper focuses on using acrossbreed method as an improvement to the existing methodologies. With the introduction of new parametersFBCount and Mining Comments the new approach show that the score of each blog post reflect quality andgoodness of blog post. A program prototype was designed to calculate the influential bloggers. The results obtainedconfirm that current approach could significantly identify influential of bloggers on the web and the proposed modelhas better performance than other approaches. There are still a few of avenues for the future research. Future workcan include full implementation of the program prototype and try to improve on it to directly get the parameters usedfrom the blog post on the web in a blog community, more parameters like twitter shares, G+1s Pin shares etc can beincluded into the literature and check for the behavior of the influence and future research can investigate more timein deciding weight parameter that is crucial for tuning between different influential factors.Keyword: Blog, Blogger, Social networks, Blogosphere, Influential bloggers, Influential, Models
An Ensemble-Based Hotel Reviews System Using Naive Bayes Classifier
The task of classifying opinions conveyed in any form of text online is referred to as sentiment analysis. The emergence of social media usage and its spread has given room for sentiment analysis in our daily lives. Social media applications and websites have become the foremost spring of data recycled for reviews for sentimentality in various fields. Various subject matter can be encountered on social media platforms, such as movie product reviews, consumer opinions, and testimonies, among others, which can be used for sentiment analysis. The rapid uncovering of these web contents contains divergence of many benefits like profit-making, which is one of the most vital of them all. According to a recent study, 81% of consumers conduct online research prior to making a purchase. But the reviews available online are too huge and numerous for human brains to process and analyze. Hence, machine learning classifiers are one of the prominent tools used to classify sentiment in order to get valuable information for use in companies like hotels, game companies, and so on. Understanding the sentiments of people towards different commodities helps to improve the services for contextual promotions, referral systems, and market research. Therefore, this study proposes a sentiment-based framework detection to enable the rapid uncovering of opinionated contents of hotel reviews. A Naive Bayes classifier was used to process and analyze the dataset for the detection of the polarity of the words. The dataset from Datafiniti’s Business Database obtained from Kaggle was used for the experiments in this study. The performance evaluation of the model shows a test accuracy of 96.08%, an F1-score of 96.00%, a precision of 96.00%, and a recall of 96.00%. The results were compared with state-of-the-art classifiers and showed a promising performance and much better in terms of performance metrics.publishedVersio
Automated Fingerprint Biometric System for Crime Record Management
Every society has laid down rules and regulations which are to be abide to by
the citizens. Once the laws of the land are violated, then a crime is being
committed and who break that law is called a criminal. A crime is an illegal
conduct that is penalized by the government or another authority. Tracking
and managing crimes committed by an individual whose conduct is extremely
susceptible to a variety of framing situations is what crime management
entails. The crime monitoring system can assist in the storage of records
relating to criminals, cases, complaint records, and case histories, among
other things. This process is usually done manually and it attracts a lot of
issues. Low case tracking capability and a lack of searchable crime databases
are among these challenges. In addition, there are issues with paper
document management and filing, which can lead to data loss, unwanted
access, and damage. Therefore, there is need to automate the system of
crime record management. Some researchers have worked in this field but
none of them have been able to proffer adequate solution in using fingerprint
biometric system to identify criminals based on their unique identifiers. Hence,
this study aims at developing an automated fingerprint biometric system for
crime record management. The system would be developed using PHP and
MYSQL and tested on some datasets and at the end would be able to
manage crime records efficiently and effectively
Comparing the Performance of Various Supervised Machine Learning Techniques for Early Detection of Breast Cancer
Cancer is a fatal disease that is constantly changing and affects a vast
number of individuals worldwide. At the research level, much work has gone
into the creation and improvement of techniques built on data mining
approaches that allow for the early identification and prevention of breast
cancer. Because of its excellent diagnostic abilities and effective classification,
data mining technologies have a reputation in the medical profession that is
continually increasing. Data mining and machine learning approaches can aid
practitioners in conceiving and developing tools to aid in the early detection of
breast cancer. As a result, the goal of this research is to compare different
machine learning algorithms in order to determine the best way for detecting
breast cancer promptly. This study assessed the classification accuracy of
four machine learning algorithms: KNN, Decision Tree, Naive Bayes, and
SVM in order to find the best accurate supervised machine learning algorithm
that might be used to diagnose breast cancer. Naive Bayes has the maximum
accuracy for the supplied dataset, according to the prediction results. This
reveals that, when compared to KNN, SVM, and Decision Tree, Naive Bayes
can be utilized to predict breast cancer
Crypto-Stegno based model for securing medical information on IOMT platform
The integration of the Internet of Things in medical systems referred to as the Internet of Medical Things (IoMT), which supports medical events for instance real-time diagnosis,
remote monitoring of patients, real-time drug prescriptions, among others. This aids the quality of services provided by the health workers thereby improve patients’ satisfaction.
However, the integrity and confidentiality of medical information on the IoMT platform remain one of the contentions that causes problems in medical services. Another serious concern with achieving protection for medical records is information confidentiality for
patient’s records over the IoMT environment. Therefore, this paper proposed a Crypto-Stegno model to secure medical information on the IoMT environment. The paper validates the system on healthcare information datasets and revealed extraordinary results in respect to the quality of perceptibility, extreme opposition to data loss, extreme
embedding capability and security, which made the proposed system an authentic strategy for resourceful and efficient medical information on IoTM platform
Metaverse-IDS: deep learning-based intrusion detection system for Metaverse-IoT networks
Combining the metaverse and the Internet of Things (IoT) will lead to the development of diverse, virtual, and more advanced networks in the future. The integration of IoT networks with the metaverse will enable more meaningful connections between the 'real' and 'virtual' worlds, allowing for real-time data analysis, access, and processing. However, these metaverse-IoT networks will face numerous security and privacy threats. Intrusion Detection Systems (IDS) offer an effective means of early detection for such attacks. Nevertheless, the metaverse generates substantial volumes of data due to its interactive nature and the multitude of user interactions within virtual environments, posing a computational challenge for building an intrusion detection system. To address this challenge, this paper introduces an innovative intrusion detection system model based on deep learning. This model aims to detect most attacks targeting metaverse-IoT communications and combines two techniques: KPCA (Kernel Principal Component Analysis which was used for attack feature extraction and CNN (Convolutional Neural Networks for attack recognition and classification. The efficiency of this proposed IDS model is assessed using two widely recognized benchmark datasets, BoT-IoT and ToN-IoT, which contain various IoT attacks potentially targeting IoT communications. Experimental results confirmed the effectiveness of the proposed IDS model in identifying 12 classes of attacks relevant to metaverse-IoT, achieving a remarkable accuracy of 99.8% and a False Negative Rate FNR less than 0.2. Furthermore, when compared with other models in the literature, our IDS model demonstrates superior performance in attack detection accuracy
Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks
Combining the metaverse and the Internet of Things (IoT) will lead to the development of diverse, virtual, and more advanced networks in the future. The integration of IoT networks with the metaverse will enable more meaningful connections between the 'real' and 'virtual' worlds, allowing for real-time data analysis, access, and processing. However, these metaverse-IoT networks will face numerous security and privacy threats. Intrusion Detection Systems (IDS) offer an effective means of early detection for such attacks. Nevertheless, the metaverse generates substantial volumes of data due to its interactive nature and the multitude of user interactions within virtual environments, posing a computational challenge for building an intrusion detection system. To address this challenge, this paper introduces an innovative intrusion detection system model based on deep learning. This model aims to detect most attacks targeting metaverse-IoT communications and combines two techniques: KPCA (Kernel Principal Component Analysis which was used for attack feature extraction and CNN (Convolutional Neural Networks for attack recognition and classification. The efficiency of this proposed IDS model is assessed using two widely recognized benchmark datasets, BoT-IoT and ToN-IoT, which contain various IoT attacks potentially targeting IoT communications. Experimental results confirmed the effectiveness of the proposed IDS model in identifying 12 classes of attacks relevant to metaverse-IoT, achieving a remarkable accuracy of and a False Negative Rate FNR less than . Furthermore, when compared with other models in the literature, our IDS model demonstrates superior performance in attack detection accuracy
A Mobile-Based Patient Surgical Appointment System Using Fuzzy Logic
The advent of artificial intelligence in medical field is playing a significant role
in improving healthcare services. In healthcare, there is always need for an
intelligent method to schedule resources and patients in order to reduce
patient waiting time. The treatment process of patients from their arrival to the
starting time of consultation is accompanied by uncertainties. Therefore, this
study developed a fuzzy and a mobile-based solution for patient surgical
appointment system based on some relevant input variables. The proposed
system was simulated using MATLAB fuzzy inference system with a triangular
member function. The range of the fuzzy inputs was then fed into the
developed mobile-based application for an optimal patient surgical
appointment system. The evaluation findings revealed that the proposed
framework is efficient in terms of scheduling patient surgical consultations
Crude Oil Price Prediction Using Particle Swarm Optimization and Classification Algorithms
Crude oil prices are linked to significant economic activity in all nations across
the world, since changes in crude oil prices usually impact the pricing of other
commodities and services. As a result, forecasting crude oil prices has
become a primary goal for academics and scientists alike. Crude oil has been
the most important commodity in the world market and some countries like
Nigeria, has it as the main trading commodity to other countries. Crude oil
price fluctuations therefore cause problems on global economies and its
effects are far reaching leading to either positive or negative economic growth
rates. This study present an intelligent system that predicts the price of crude
oil. The method used major economic factors that determine the price per
barrel as inputs and outputs the price of crude oil. The data for usage came
from the West Texas Intermediate (WTI) dataset, which spanned 24 years,
and the experimental findings were quite hopeful, demonstrating that support
vector machines could be used to forecast crude oil prices with a reasonable
level of accuracy. Particle Swarm Optimization (PSO), Support Vector
Machine (SVM), and K-Nearest Neighbors were employed in this investigation
(KNN) for predicting Crude oil prices and the accuracy of the K-Nearest
Neighbours was found to be higher than the Support Vector Machine by 9%
A Lightweight Image Cryptosystem for Cloud-Assisted Internet of Things
Cloud computing and the increasing popularity of 5G have greatly increased the application of images on Internet of Things (IoT) devices. The storage of images on an untrusted cloud has high security and privacy risks. Several lightweight cryptosystems have been proposed in the literature as appropriate for resource-constrained IoT devices. These existing lightweight cryptosystems are, however, not only at the risk of compromising the integrity and security of the data but also, due to the use of substitution boxes (S-boxes), require more memory space for their implementation. In this paper, a secure lightweight cryptography algorithm, that eliminates the use of an S-box, has been proposed. An algorithm termed Enc, that accepts a block of size n divides the block into L n R bits of equal length and outputs the encrypted block as follows: E=L⨂R⨁R, where ⨂ and ⨁ are exclusive-or and concatenation operators, respectively, was created. A hash result, hasR=SHA256P⨁K, was obtained, where SHA256, P, and K are the Secure Hash Algorithm (SHA−256), the encryption key, and plain image, respectively. A seed, S, generated from enchash=Enchashenc,K, where hashenc is the first n bits of hasR, was used to generate a random image, Rim. An intermediate image, intimage=Rim⨂P, and cipher image, C=Encintimage,K, were obtained. The proposed scheme was evaluated for encryption quality, decryption quality, system sensitivity, and statistical analyses using various security metrics. The results of the evaluation showed that the proposed scheme has excellent encryption and decryption qualities that are very sensitive to changes in both key and plain images, and resistance to various statistical attacks alongside other security attacks. Based on the result of the security evaluation of the proposed cryptosystem termed Hash XOR Permutation (HXP), the study concluded that the security of the cryptography algorithm can still be maintained without the use of a substitution box