52 research outputs found

    Guest editorial of the special issue 'human-centric, decentralised, and hyper automated cyber-physical systems'

    Get PDF
    The emergence of affordable communication and computer technologies has brought virtual and physical space closer together in recent years. Cyber-physical systems, which are the outcome of this confluence, have changed the condition of healthcare, medicine, the environment, sustainability, transportation, and energy. Cyber-Physical Systems (CPS) are a synthesis of virtual and physical technologies

    NSL-BP: A Meta Classifier Model Based Prediction of Amazon Product Reviews

    Get PDF
    In machine learning, the product rating prediction based on the semantic analysis of the consumers' reviews is a relevant topic. Amazon is one of the most popular online retailers, with millions of customers purchasing and reviewing products. In the literature, many research projects work on the rating prediction of a given review. In this research project, we introduce a novel approach to enhance the accuracy of rating prediction by machine learning methods by processing the reviewed text. We trained our model by using many methods, so we propose a combined model to predict the ratings of products corresponding to a given review content. First, using k-means and LDA, we cluster the products and topics so that it will be easy to predict the ratings having the same kind of products and reviews together. We trained low, neutral, and high models based on clusters and topics of products. Then, by adopting a stacking ensemble model, we combine NaĂŻve Bayes, Logistic Regression, and SVM to predict the ratings. We will combine these models into a two-level stack. We called this newly introduced model, NSL model, and compared the prediction performance with other methods at state of the art

    An Enhanced Texture-Based Feature Extraction Approach for Classification of Biomedical Images of CT-Scan of Lungs

    Get PDF
    Content Based Image Retrieval (CBIR) techniques based on texture have gained a lot of popularity in recent times. In the proposed work, a feature vector is obtained by concatenation of features extracted from local mesh peak valley edge pattern (LMePVEP) technique; a dynamic threshold based local mesh ternary pattern technique and texture of the image in five different directions. The concatenated feature vector is then used to classify images of two datasets viz. Emphysema dataset and Early Lung Cancer Action Program (ELCAP) lung database. The proposed framework has improved the accuracy by 12.56%, 9.71% and 7.01% in average for data set 1 and 9.37%, 8.99% and 7.63% in average for dataset 2 over three popular algorithms used for image retrieval

    3D Face Reconstruction from Single 2D Image Using Distinctive Features

    Get PDF
    3D face reconstruction is considered to be a useful computer vision tool, though it is difficult to build. This paper proposes a 3D face reconstruction method, which is easy to implement and computationally efficient. It takes a single 2D image as input, and gives 3D reconstructed images as output. Our method primarily consists of three main steps: feature extraction, depth calculation, and creation of a 3D image from the processed image using a Basel face model (BFM). First, the features of a single 2D image are extracted using a two-step process. Before distinctive-features extraction, a face must be detected to confirm whether one is present in the input image or not. For this purpose, facial features like eyes, nose, and mouth are extracted. Then, distinctive features are mined by using scale-invariant feature transform (SIFT), which will be used for 3D face reconstruction at a later stage. Second step comprises of depth calculation, to assign the image a third dimension. Multivariate Gaussian distribution helps to find the third dimension, which is further tuned using shading cues that are obtained by the shape from shading (SFS) technique. Thirdly, the data obtained from the above two steps will be used to create a 3D image using BFM. The proposed method does not rely on multiple images, lightening the computation burden. Experiments were carried out on different 2D images to validate the proposed method and compared its performance to those of the latest approaches. Experiment results demonstrate that the proposed method is time efficient and robust in nature, and it outperformed all of the tested methods in terms of detail recovery and accuracy

    ARM-AMO: An Efficient Association Rule Mining Algorithm Based on Animal Migration Optimization

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI linkAssociation rule mining (ARM) aims to find out association rules that satisfy predefined minimum support and confidence from a given database. However, in many cases ARM generates extremely large number of association rules, which are impossible for end users to comprehend or validate, thereby limiting the usefulness of data mining results. In this paper, we propose a new mining algorithm based on Animal Migration Optimization (AMO), called ARM-AMO, to reduce the number of association rules. It is based on the idea that rules which are not of high support and unnecessary are deleted from the data. Firstly, Apriori algorithm is applied to generate frequent itemsets and association rules. Then, AMO is used to reduce the number of association rules with a new fitness function that incorporates frequent rules. It is observed from the experiments that, in comparison with the other relevant techniques, ARM-AMO greatly reduces the computational time for frequent item set generation, memory for association rule generation, and the number of rules generated

    IJIMAI Editor's Note - Vol. 5 Issue 1

    No full text
    The International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI) provides an interdisciplinary forum in which scientists and professionals share their research results and report new advances on tools that use AI with interactive multimedia techniques

    Editor’s Note

    No full text
    The International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI) provides an interdisciplinary forum in which scientists and professionals share their research results and report new advances on tools that use AI with interactive multimedia techniques

    An Algorithm to Detect Attacks in Mobile Ad Hoc Network

    Get PDF
    Each node in Mobile Ad Hoc Network (MANETs) communicates with each other for transferring the packet (or data) to destination node. Any anomalous behavior of a node can confine it from executing this operation and even can disturb the whole network process. Therefore, the need of monitoring the nodes arises to keep a check on the behavior of a node. In this paper, an algorithm is proposed to monitor the nodes & to check if a node is any under attack or not. Moreover, a second layer of security is added which is furnished by a testbed to monitor the nodes
    • …
    corecore