25 research outputs found

    Prediction of Alzheimer Disease using LeNet-CNN model with Optimal Adaptive Bilateral Filtering

    Get PDF
    Alzheimer's disease is a kind of degenerative dementia that causes progressively worsening memory loss and other cognitive and physical impairments over time. Mini-Mental State Examinations and other screening tools are helpful for early detection, but diagnostic MRI brain analysis is required. When Alzheimer's disease (AD) is detected in its earliest stages, patients may begin protective treatments before permanent brain damage has occurred. The characteristics of the lesion sites in AD affected role, as identified by MRI, exhibit great variety and are dispersed across the image space, as demonstrated in cross-sectional imaging investigations of the disease. Optimized Adaptive Bilateral filtering using a deep learning model was suggested as part of this study's approach toward this end. Denoising the pictures with the help of the suggested adaptive bilateral filter is the first stage (ABF). The ABF improves denoising in edge, detail, and homogenous areas separately. After then, the ABF is given a weight, and the Adaptive Equilibrium Optimizer is used to determine the best possible value for that weight (AEO). LeNet, a CNN model, is then used to complete the AD organization. The first step in using the LeNet-5 network model to identify AD is to study the model's structure and parameters. The ADNI experimental dataset was used to verify the suggested technique and compare it to other models. The experimental findings prove that the suggested method can achieve a classification accuracy of 97.43%, 98.09% specificity, 97.12% sensitivity, and 89.67% Kappa index. When compared against competing algorithms, the suggested model emerges victorious

    Essential Requirements for Data Security in the Context of Software Metrics

    Get PDF
    Abstract By first raising and then dispelling seven common rules about metrics, this paper discusses the requirements and design constraints for a practical system to measure, report and improve data security. Data security will become business-as-usual after the implementation program is completed, but the need for measurement and continuous improvement will persist indefinitely. In other words, we needed more than conventional program or project management metrics. The need for data security metrics was much more pragmatic. Furthermore, intended to embed data security deeper into the academic/corporate culture, meaning that security awareness is an important component. We propose seven rules for data security in the context of Software metrics

    Tom and Jerry Based Multipath Routing with Optimal K-medoids for choosing Best Clusterhead in MANET

    Get PDF
    Given the unpredictable nature of a MANET, routing has emerged as a major challenge in recent years. For effective routing in a MANET, it is necessary to establish both the route discovery and the best route selection from among many routes. The primary focus of this investigation is on finding the best path for data transmission in MANETs. In this research, we provide an efficient routing technique for minimising the time spent passing data between routers. Here, we employ a routing strategy based on Tom and Jerry Optimization (TJO) to find the best path via the MANET's routers, called Ad Hoc On-Demand Distance Vector (AODV). The AODV-TJO acronym stands for the suggested approach. This routing technique takes into account not just one but three goal functions: total number of hops. When a node or connection fails in a network, rerouting must be done. In order to prevent packet loss, the MANET employs this rerouting technique. Analyses of AODV-efficacy TJO's are conducted, and results are presented in terms of energy use, end-to-end latency, and bandwidth, as well as the proportion of living and dead nodes. Vortex Search Algorithm (VSO) and cuckoo search are compared to the AODV-TJO approach in terms of performance. Based on the findings, the AODV-TJO approach uses 580 J less energy than the Cuckoo search algorithm when used with 500 nodes

    Development of Deep Learning based Intelligent Approach for Credit Card Fraud Detection

    Get PDF
    Credit card fraud (CCF) has long been a major concern of institutions of financial groups and business partners, and it is also a global interest to researchers due to its growing popularity. In order to predict and detect the CCF, machine learning (ML) has proven to be one of the most promising techniques. But, class inequality is one of the main and recurring challenges when dealing with CCF tasks that hinder model performance. To overcome this challenges, a Deep Learning (DL) techniques are used by the researchers. In this research work, an efficient CCF detection (CCFD) system is developed by proposing a hybrid model called Convolutional Neural Network with Recurrent Neural Network (CNN-RNN). In this model, CNN acts as feature extraction for extracting the valuable information of CCF data and long-term dependency features are studied by RNN model. An imbalance problem is solved by Synthetic Minority Over Sampling Technique (SMOTE) technique. An experiment is conducted on European Dataset to validate the performance of CNN-RNN model with existing CNN and RNN model in terms of major parameters. The results proved that CNN-RNN model achieved 95.83% of precision, where CNN achieved 93.63% of precision and RNN achieved 88.50% of precision

    Bootstrapping for efficient handwritten digit recognition

    No full text
    In this paper we present two algorithms for selecting prototypes from the given training data set. Here, we employ the bootstrap technique to preprocess the data. We compare the proposed algorithms with the condensed nearest-neighbor algorithm which is order dependent and a genetic-algorithm-based prototype selection scheme which is order independent.Algorithms proposed in this paper are found to be better than the condensed nearest neighbor and prototype selection methods in terms of classification accuracy
    corecore