19 research outputs found

    Fusing Text and Image for Event Detection in Twitter

    Full text link
    In this contribution, we develop an accurate and effective event detection method to detect events from a Twitter stream, which uses visual and textual information to improve the performance of the mining process. The method monitors a Twitter stream to pick up tweets having texts and images and stores them into a database. This is followed by applying a mining algorithm to detect an event. The procedure starts with detecting events based on text only by using the feature of the bag-of-words which is calculated using the term frequency-inverse document frequency (TF-IDF) method. Then it detects the event based on image only by using visual features including histogram of oriented gradients (HOG) descriptors, grey-level cooccurrence matrix (GLCM), and color histogram. K nearest neighbours (Knn) classification is used in the detection. The final decision of the event detection is made based on the reliabilities of text only detection and image only detection. The experiment result showed that the proposed method achieved high accuracy of 0.94, comparing with 0.89 with texts only, and 0.86 with images only.Comment: 9 Pages, 4 figuer

    Multiple Kernel-Based Multimedia Fusion for Automated Event Detection from Tweets

    Get PDF
    A method for detecting hot events such as wildfires is proposed. It uses visual and textual information to improve detection. Starting with picking up tweets having texts and images, it preprocesses the data to eliminate unwanted data, transforms unstructured data into structured data, then extracts features. Text features include term frequency-inverse document frequency. Image features include histogram of oriented gradients, gray-level co-occurrence matrix, color histogram, and scale-invariant feature transform. Next, it inputs the features to the multiple kernel learning (MKL) for fusion to automatically combine both feature types to achieve the best performance. Finally, it does event detection. The method was tested on Brisbane hailstorm 2014 and California wildfires 2017. It was compared with methods that used text only or images only. With the Brisbane hailstorm data, the proposed method achieved the best performance, with a fusion accuracy of 0.93, comparing to 0.89 with text only, and 0.85 with images only. With the California wildfires data, a similar performance was recorded. It has demonstrated that event detection in Twitter is enhanced and improved by combination of multiple features. It has delivered an accurate and effective event detection method for spreading awareness and organizing responses, leading to better disaster management

    BreastCNN: A Novel Layer-based Convolutional Neural Network for Breast Cancer Diagnosis in DMR-Thermogram Images

    No full text
    Breast cancer is one of the most prominent sources of death in females. Every year many women suffer breast cancer, and, in the end, death occurs. The early detection of breast cancer may cause to reduce the death rate and save women鈥檚 lives. The medical care and cost of prevention of women鈥檚 breast cancer are costly and become a priority to diagnose breast cancer at its early stages. Initially, the mammography technique was the leading technique to detect the early stage of breast cancer. However, it cannot deal with a tumor size of less than 2 mm. To overcome this challenge, by considering the DMR-thermogram images, a novel layer-based Convolutional Neural Network (BreastCNN) for breast cancer detection and classification was proposed. BreastCNN method works in five different layers and uses different types of filters. The learning rate and structures of layers change after every convolution layer. The proposed technique is tested on the Database for Mastology Research (DMR) having 745 healthy and 261 sick images. The performance is calculated as the statistical values known as sensitivity, specificity, precision, accuracy, and F1-score. The proposed technique shows better accuracy of 99.7% as related to the already presented methods

    FUSING TEXT AND IMAGE FOR EVENT DETECTION IN TWITTER

    No full text
    ABSTRACT In this contribution, we develop an accurate and effective event detection method to detect events from a Twitter stream, which uses visual and textual information to improve the performance of the mining process. The method monitors a Twitter stream to pick up tweets having texts and images and stores them into a database. This is followed by applying a mining algorithm to detect an event. The procedure starts with detecting events based on text only by using the feature of the bag-of-words which is calculated using the term frequency-inverse document frequency (TF-IDF) method. Then it detects the event based on image only by using visual features including histogram of oriented gradients (HOG) descriptors, grey-level cooccurrence matrix (GLCM), and color histogram. K nearest neighbours (Knn) classification is used in the detection. The final decision of the event detection is made based on the reliabilities of text only detectio

    An Improved Mayfly Method to Solve Distributed Flexible Job Shop Scheduling Problem under Dual Resource Constraints

    No full text
    Aiming at the distributed flexible job shop scheduling problem under dual resource constraints considering the influence of workpiece transportation time between factories and machines, a distributed flexible job shop scheduling problem (DFJSP) model with the optimization goal of minimizing completion time is established, and an improved mayfly algorithm (IMA) is proposed to solve it. Firstly, the mayfly position vector is discrete mapped to make it applicable to the scheduling problem. Secondly, three-layer coding rules of process, worker, and machine is adopted, in which the factory selection is reflected by machine number according to the characteristics of the model, and a hybrid initialization strategy is designed to improve the population quality and diversity. Thirdly, an active time window decoding strategy considering transportation time is designed for the worker鈥搈achine idle time window to improve the local optimization performance of the algorithm. In addition, the improved crossover and mutation operators is designed to expand the global search range of the algorithm. Finally, through simulation experiments, the results of various algorithms are compared to verify the effectiveness of the proposed algorithm for isomorphism and isomerism factories instances

    Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms

    No full text
    Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning

    An Improved Mayfly Method to Solve Distributed Flexible Job Shop Scheduling Problem under Dual Resource Constraints

    No full text
    Aiming at the distributed flexible job shop scheduling problem under dual resource constraints considering the influence of workpiece transportation time between factories and machines, a distributed flexible job shop scheduling problem (DFJSP) model with the optimization goal of minimizing completion time is established, and an improved mayfly algorithm (IMA) is proposed to solve it. Firstly, the mayfly position vector is discrete mapped to make it applicable to the scheduling problem. Secondly, three-layer coding rules of process, worker, and machine is adopted, in which the factory selection is reflected by machine number according to the characteristics of the model, and a hybrid initialization strategy is designed to improve the population quality and diversity. Thirdly, an active time window decoding strategy considering transportation time is designed for the worker–machine idle time window to improve the local optimization performance of the algorithm. In addition, the improved crossover and mutation operators is designed to expand the global search range of the algorithm. Finally, through simulation experiments, the results of various algorithms are compared to verify the effectiveness of the proposed algorithm for isomorphism and isomerism factories instances

    Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms

    No full text
    Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without first applying the decryption process. Homomorphic encryption algorithms provide innovative solutions to support computations on encrypted data while preserving the content of private information. However, these algorithms have some limitations, such as computational cost as well as the need for modifications for each case study. In this paper, we present a comprehensive overview of various homomorphic encryption tools for Big Data analysis and their applications. We also discuss a security framework for Big Data analysis while preserving privacy using homomorphic encryption algorithms. We highlight the fundamental features and tradeoffs that should be considered when choosing the right approach for Big Data applications in practice. We then present a comparison of popular current homomorphic encryption tools with respect to these identified characteristics. We examine the implementation results of various homomorphic encryption toolkits and compare their performances. Finally, we highlight some important issues and research opportunities. We aim to anticipate how homomorphic encryption technology will be useful for secure Big Data processing, especially to improve the utility and performance of privacy-preserving machine learning

    A Novel Routing Protocol Based on Elliptical Shaped Movement of Autonomous Underwater Vehicles in Data Gathering Process for Underwater Wireless Sensor Network

    No full text
    High end-to-end delay is a significant challenge in the data collection process in the underwater environment. Autonomous Underwater Vehicles (AUVs) are a considerably reliable source of data collection if they have significant trajectory movement. Therefore, in this paper, a new routing algorithm known as Elliptical Shaped Efficient Data Gathering (ESEDG) is introduced for the AUV movement. ESEDG is divided into two phases: first, an elliptical trajectory has been designed for the horizontal movement of the AUV. In the second phase, the AUV gathers data from Gateway Nodes (GNs) which are associated with Member Nodes (MNs). For their association, an end-to-end delay model is also presented in ESEDG. The hierarchy of data collection is as follows: MNs send data to GNs, the AUV receives data from GNs, and forwards it to the sink node. Furthermore, the ESEDG was evaluated on the network simulator NS-3 version 3.35, and the results were compared to existing data collection routing protocols DSG–DGA, AEEDCO, AEEDCO-A, ALP, SEDG, and AEDG. In terms of network throughput, end-to-end delay, lifetime, path loss, and energy consumption, the results showed that ESEDG outperformed the baseline routing protocols
    corecore