12 research outputs found

    Examining Swarm Intelligence-based Feature Selection for Multi-Label Classification

    Get PDF
    Multi-label classification addresses the issues that more than one class label assigns to each instance. Many real-world multi-label classification tasks are high-dimensional due to digital technologies, leading to reduced performance of traditional multi-label classifiers. Feature selection is a common and successful approach to tackling this problem by retaining relevant features and eliminating redundant ones to reduce dimensionality. There is several feature selection that is successfully applied in multi-label learning. Most of those features are wrapper methods that employ a multi-label classifier in their processes. They run a classifier in each step, which requires a high computational cost, and thus they suffer from scalability issues. To deal with this issue, filter methods are introduced to evaluate the feature subsets using information-theoretic mechanisms instead of running classifiers. This paper aims to provide a comprehensive review of different methods of feature selection presented for the tasks of multi-label classification. To this end, in this review, we have investigated most of the well-known and state-of-the-art methods. We then provided the main characteristics of the existing multi-label feature selection techniques and compared them analytically

    An Efficient Recommendation System in E-commerce using Passer learning optimization based on Bi-LSTM

    Full text link
    Recommendation system services have become crucial for users to access personalized goods or services as the global e-commerce market expands. They can increase business sales growth and lower the cost of user information exploration. Recent years have seen a signifi-cant increase in researchers actively using user reviews to solve standard recommender system research issues. Reviews may, however, contain information that does not help consumers de-cide what to buy, such as advertising or fictitious or fake reviews. Using such reviews to offer suggestion services may reduce the effectiveness of those recommendations. In this research, the recommendation in e-commerce is developed using passer learning optimization based on Bi-LSTM to solve that issue (PL optimized Bi-LSTM). Data is first obtained from the product recommendation dataset and pre-processed to remove any values that are missing or incon-sistent. Then, feature extraction is performed using TF-IDF features and features that support graph embedding. Before submitting numerous features with the same dimensions to the Bi-LSTM classifier for analysis, they are integrated using the feature concatenation approach. The Collaborative Bi-LSTM method employs these features to determine if the model is a recommended product. The PL optimization approach, which efficiently adjusts the classifier's parameters and produces an extract output that measures the f1-score, MSE, precision, and recall, is the basis of this research's contributions. As compared to earlier methods, the pro-posed PL-optimized Bi-LSTM achieved values of 88.58%, 1.24%, 92.69%, and 92.69% for dataset 1, 88.46%, 0.48%, 92.43%, and 93.47% for dataset 2, and 92.51%, 1.58%, 91.90%, and 90.76% for dataset 3

    Rider weed deep residual network-based incremental model for text classification using multidimensional features and MapReduce

    No full text
    Increasing demands for information and the rapid growth of big data have dramatically increased the amount of textual data. In order to obtain useful text information, the classification of texts is considered an imperative task. Accordingly, this article will describe the development of a hybrid optimization algorithm for classifying text. Here, pre-processing was done using the stemming process and stop word removal. Additionally, we performed the extraction of imperative features and the selection of optimal features using the Tanimoto similarity, which estimates the similarity between features and selects the relevant features with higher feature selection accuracy. Following that, a deep residual network trained by the Adam algorithm was utilized for dynamic text classification. Dynamic learning was performed using the proposed Rider invasive weed optimization (RIWO)-based deep residual network along with fuzzy theory. The proposed RIWO algorithm combines invasive weed optimization (IWO) and the Rider optimization algorithm (ROA). These processes are carried out under the MapReduce framework. Our analysis revealed that the proposed RIWO-based deep residual network outperformed other techniques with the highest true positive rate (TPR) of 85%, true negative rate (TNR) of 94%, and accuracy of 88.7%

    Swarm Intelligence-Based Feature Selection for Multi-Label Classification: A Review

    No full text
    Multi-label classification is the process of specifying more than one class label for each instance. The high-dimensional data in various multi-label classification tasks have a direct impact on reducing the efficiency of traditional multi-label classifiers. To tackle this problem, feature selection is used as an effective approach to retain relevant features and eliminating redundant ones to reduce dimensionality. Multi-label classification has a wide range of real-world applications such as image classification, emotion analysis, text mining and bioinformatics. Moreover, in recent years researchers have focused on applying swarm intelligence methods in selecting prominent features of multi-label data. After reviewing various researches, it seems there are no researches that provide a review of swarm intelligence-based methods for multi-label feature selection. Thus, in this study, a comprehensive review of different swarm intelligence and evolutionary computing methods of feature selection presented for the tasks of multi-label classification. To this end, in this review, we have investigated most of the well-known and state-of-the-art methods and categorize them based on different perspectives. We then provided the main characteristics of the existing multi-label feature selection techniques and compared them analytically. We also introduce benchmarks, evaluation measures and standard datasets to facilitate research in this field. Moreover, we performed some experiments to compare existing works and at the end of this survey, some challenges, issues and open problems of this field are introduced to be considered by researchers in future

    SQL Injection Attacks Prevention System Technology: Review

    No full text
    The vulnerabilities in most web applications enable hackers to gain access to confidential and private information. Structured query injection poses a significant threat to web applications and is one of the most common and widely used information theft mechanisms. Where hackers benefit from errors in the design of systems or existing gaps by not filtering the user's input for some special characters and symbols contained within the structural query sentences or the quality of the information is not checked, whether it is text or numerical, which causes unpredictability of the outcome of its implementation. In this paper, we review PHP techniques and other techniques for protecting SQL from the injection, methods for detecting SQL attacks, types of SQL injection, causes of SQL injection via getting and Post, and prevention technology for SQL vulnerabilities

    A Comprehensive Study of Malware Detection in Android Operating Systems

    No full text
    Android is now the world's (or one of the world’s) most popular operating system. More and more malware assaults are taking place in Android applications. Many security detection techniques based on Android Apps are now available. The open environmental feature of the Android environment has given Android an extensive appeal in recent years. The growing number of mobile devices are incorporated in many aspects of our everyday lives. This  paper gives a detailed comparison that summarizes and analyses various detection techniques. This work examines the current status of Android malware detection methods, with an emphasis on Machine Learning-based classifiers for detecting malicious software on Android devices. Android has a huge number of apps that may be downloaded and used for free. Consequently, Android phones are more susceptible to malware. As a result, additional research has been done in order to develop effective malware detection methods. To begin, several of the currently available Android malware detection approaches are carefully examined and classified based on their detection methodologies. This study examines a wide range of machine-learning-based methods to detecting Android malware covering both types dynamic and static

    A State of Art for Survey of Combined Iris and Fingerprint Recognition Systems

    No full text
    Biometrics is developing into a technological science in this lifelong technology for the defense of identification. Biometrics is the technology to recognize individuals based on facial features, fingerprints, iris, retina, speech, handprints, etc. Biometric features are used for human recognition and identification. Much research was done in the last years on the biometric system because of a growing need for identification methods. This paper offers an overview of biometric solutions using fingerprint and iris identification, their uses, and Compare the data set, methods, Fusion Level, and the accuracy of the results

    Reliable Communications for Vehicular Networks

    No full text
    Vehicular communications, referring to information exchange among vehicles, and infrastructures. It has attracted a lot of attentions recently due to its great potential to support intelligent transportation, various safety applications, and on-road infotainment. The aim of technologies such as Vehicle-to-Vehicl (V2V) and Vehicle to-Every-thibg (V2X) Vehicle-to very-thing is to include models of connectivity that can be used in various application contexts by vehicles. However, the routing reliability of these ever-changing networks needs to be paid special attention. The link reliability is defined as the probability that a direct communication link between two vehicles will stay continuously available over a specified period. Furthermore, the link reliability value is accurately calculated using the location, direction and velocity information of vehicles along the road

    Paralinguistic Speech Processing: An Overview

    No full text
    Clients can adequately control PCs and create reports by speaking with the guide of innovation, discourse acknowledgment empowers records to be delivered all the more effectively in light of the fact that the program normally produces words as fast as they expressed, which is typically a lot faster than a human can compose. Discourse acknowledgment is an innovation that consequently finds the words and expressions that best match the contribution of human discourse. The most normal use of discourse acknowledgment is correspondence, where discourse acknowledgment can be utilized to create letters/messages and different reports. Point of discourse handling: - to comprehend discourse as a mechanism of correspondence, to reflect discourse for transmission and propagation; - to inspect discourse for robotized data discovery and extraction-to find some physiological highlights of the speaker. In discourse combination, there are two significant capacities. The first is the interpretation of voice to message. The second is for the content to be converted into human voice

    Secure Data Transfer over Internet Using Image Steganography: Review

    No full text
    Whether it's for work or personal well-being, keeping secrets or private information has become part of our everyday existence. Therefore, several researchers acquire an entire focus on secure transmitting secret information. Confidential information is collectively referred to as Steganography for inconspicuous digital media such as video, audio, and images. In disguising information, Steganography plays a significant role. Traditional Steganography faces a further concern of discovery as steganalysis develops. The safety of present steganographic technologies thus has to be improved. In this research, some of the techniques that have been used to hide information inside images have been reviewed. According to the hiding domain, these techniques can be divided into two main parts: The spatial Domain and Transform Domain. In this paper, three methods for each Domain have been chosen to be studied and evaluated. These are; Least Significant Bit (LSB), Pixel Value Difference (PVD), Exploiting Modification Direction (EMD), contourlet transform, Discrete Wavelet Transformation (DWT), and, Discrete Cosine Transformation (DCT). Finally, the best results that have been obtained in terms of higher PSNR, Capacity, and more robustness and security are discussed
    corecore