首页 > 最新文献

International Journal of Intelligent Systems and Applications in Engineering最新文献

英文 中文
Static Timing Analysis of Different SRAM Controllers 不同SRAM控制器的静态时序分析
Q3 Computer Science Pub Date : 2023-06-08 DOI: 10.5815/ijisa.2023.03.03
Jabin Sultana, S. Alam
Timing-critical path analysis is one of the most significant terms for the VLSI designer. For the formal verification of any kinds of digital chip, static timing analysis (STA) plays a vital role to check the potentiality and viability of the design procedures. This indicates the timing status between setup and holding times required with respect to the active edge of the clock. STA can also be used to identify time sensitive paths, simulate path delays, and assess Register transfer level (RTL) dependability. Four types of Static Random Access Memory (SRAM) controllers in this paper are used to handle with the complexities of digital circuit timing analysis at the logic level. Different STA parameters such as slack, clock skew, data latency, and multiple clock frequencies are investigated here in their node-to-node path analysis for diverse SRAM controllers. Using phase lock loop (ALTPLL), single clock and dual clock are used to get the response of these controllers. For four SRAM controllers, the timing analysis shows that no data violation exists for single and dual clock with 50 MHz and 100 MHz frequencies. Result also shows that the slack for 100MHz is greater than that of 50MHz. Moreover, the clock skew value in our proposed design is lower than in the other three controllers because number of paths, number of states are reduced, and the slack value is higher than in 1st and 2nd controllers. In timing path analysis, slack time determines that the design is working at the desired frequency. Although 100MHz is faster than 50MHz, our proposed SRAM controller meets the timing requirements for 100MHz including the reduction of node to node data delay. Due to this reason, the proposed controller performs well compared to others in terms slack and clock skew.
时间关键路径分析是VLSI设计人员最重要的术语之一。对于任何一种数字芯片的形式化验证,静态时序分析(STA)对于检验设计程序的潜力和可行性起着至关重要的作用。这表示相对于时钟的活动边缘所需的设置时间和保持时间之间的计时状态。STA还可用于识别时间敏感路径、模拟路径延迟和评估寄存器传输级别(RTL)的可靠性。本文采用四种静态随机存取存储器(SRAM)控制器在逻辑层面处理数字电路时序分析的复杂性。本文在不同SRAM控制器的节点到节点路径分析中研究了不同的STA参数,如松弛、时钟倾斜、数据延迟和多个时钟频率。采用锁相环(ALTPLL),采用单时钟和双时钟来获取控制器的响应。对于4个SRAM控制器,时序分析表明,在50 MHz和100 MHz频率下,单时钟和双时钟不存在数据冲突。结果还表明,100MHz时的松弛大于50MHz时的松弛。此外,由于减少了路径数量和状态数量,并且松弛值高于第一和第二控制器,因此我们提出的设计中的时钟偏差值低于其他三种控制器。在时序路径分析中,空闲时间决定了设计是否工作在期望的频率上。虽然100MHz比50MHz快,但我们提出的SRAM控制器满足100MHz的时序要求,包括减少节点到节点的数据延迟。由于这个原因,与其他控制器相比,所提出的控制器在松弛和时钟偏差方面表现良好。
{"title":"Static Timing Analysis of Different SRAM Controllers","authors":"Jabin Sultana, S. Alam","doi":"10.5815/ijisa.2023.03.03","DOIUrl":"https://doi.org/10.5815/ijisa.2023.03.03","url":null,"abstract":"Timing-critical path analysis is one of the most significant terms for the VLSI designer. For the formal verification of any kinds of digital chip, static timing analysis (STA) plays a vital role to check the potentiality and viability of the design procedures. This indicates the timing status between setup and holding times required with respect to the active edge of the clock. STA can also be used to identify time sensitive paths, simulate path delays, and assess Register transfer level (RTL) dependability. Four types of Static Random Access Memory (SRAM) controllers in this paper are used to handle with the complexities of digital circuit timing analysis at the logic level. Different STA parameters such as slack, clock skew, data latency, and multiple clock frequencies are investigated here in their node-to-node path analysis for diverse SRAM controllers. Using phase lock loop (ALTPLL), single clock and dual clock are used to get the response of these controllers. For four SRAM controllers, the timing analysis shows that no data violation exists for single and dual clock with 50 MHz and 100 MHz frequencies. Result also shows that the slack for 100MHz is greater than that of 50MHz. Moreover, the clock skew value in our proposed design is lower than in the other three controllers because number of paths, number of states are reduced, and the slack value is higher than in 1st and 2nd controllers. In timing path analysis, slack time determines that the design is working at the desired frequency. Although 100MHz is faster than 50MHz, our proposed SRAM controller meets the timing requirements for 100MHz including the reduction of node to node data delay. Due to this reason, the proposed controller performs well compared to others in terms slack and clock skew.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85004096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence Based Domotics Using Multimodal Security 基于多模式安全的人工智能Domotics
Q3 Computer Science Pub Date : 2023-06-08 DOI: 10.5815/ijisa.2023.03.04
K. M. Uddin, Naimur Rahman, M. Rahman, Samrat Kumar Dey
All electronic devices in our cutting-edge technology world must be networked together via the Internet if users want to have remote access to them. As a result, it may raise a variety of serious security issues. This study suggests a remote access home automation security system that incorporates utilizing the Internet of Things (IoT), and Artificial Intelligence (AI) for ensuring the security of the house. For a highly efficient security system, Face recognition has been used to maneuver the door access. In case of power outage or for any technical issues, an alternative security PIN has been added which is only accessible by the owner. Moreover, individuals are able to monitor and control the door access along with other attributes of the house using an application. In this work, Face detection is performed using the Haar Cascade classifier, while face recognition is performed using the Local Binary Pattern Histogram (LBPH). 95.7% accuracy in recognizing faces has been achieved after evaluating the proposed system.
如果用户想要远程访问,我们尖端科技世界的所有电子设备都必须通过互联网联网在一起。因此,它可能会引发各种严重的安全问题。该研究提出了利用物联网(IoT)和人工智能(AI)来确保家庭安全的远程访问家庭自动化安全系统。为了实现一个高效的安全系统,人脸识别已被用于控制门禁。在停电或任何技术问题的情况下,已经添加了一个替代的安全密码,只有主人可以访问。此外,个人可以使用应用程序监控和控制门禁以及房屋的其他属性。在这项工作中,使用Haar级联分类器进行人脸检测,而使用局部二值模式直方图(LBPH)进行人脸识别。经过评估,该系统的人脸识别准确率达到95.7%。
{"title":"Artificial Intelligence Based Domotics Using Multimodal Security","authors":"K. M. Uddin, Naimur Rahman, M. Rahman, Samrat Kumar Dey","doi":"10.5815/ijisa.2023.03.04","DOIUrl":"https://doi.org/10.5815/ijisa.2023.03.04","url":null,"abstract":"All electronic devices in our cutting-edge technology world must be networked together via the Internet if users want to have remote access to them. As a result, it may raise a variety of serious security issues. This study suggests a remote access home automation security system that incorporates utilizing the Internet of Things (IoT), and Artificial Intelligence (AI) for ensuring the security of the house. For a highly efficient security system, Face recognition has been used to maneuver the door access. In case of power outage or for any technical issues, an alternative security PIN has been added which is only accessible by the owner. Moreover, individuals are able to monitor and control the door access along with other attributes of the house using an application. In this work, Face detection is performed using the Haar Cascade classifier, while face recognition is performed using the Local Binary Pattern Histogram (LBPH). 95.7% accuracy in recognizing faces has been achieved after evaluating the proposed system.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90206720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph Coloring in University Timetable Scheduling 大学课程表安排中的图形着色
Q3 Computer Science Pub Date : 2023-06-08 DOI: 10.5815/ijisa.2023.03.02
Swapnil Biswas, Syed Nusrat, N. Sharmin, Mahbubur Rahman
Addressing scheduling problems with the best graph coloring algorithm has always been very challenging. However, the university timetable scheduling problem can be formulated as a graph coloring problem where courses are represented as vertices and the presence of common students or teachers of the corresponding courses can be represented as edges. After that, the problem stands to color the vertices with lowest possible colors. In order to accomplish this task, the paper presents a comparative study of the use of graph coloring in university timetable scheduling, where five graph coloring algorithms were used: First Fit, Welsh Powell, Largest Degree Ordering, Incidence Degree Ordering, and DSATUR. We have taken the Military Institute of Science and Technology, Bangladesh as a test case. The results show that the Welsh-Powell algorithm and the DSATUR algorithm are the most effective in generating optimal schedules. The study also provides insights into the limitations and advantages of using graph coloring in timetable scheduling and suggests directions for future research with the use of these algorithms.
用最佳的图着色算法解决调度问题一直是非常具有挑战性的。然而,大学时间表调度问题可以被表述为一个图着色问题,其中课程表示为顶点,相应课程的普通学生或教师的存在可以表示为边。在那之后,问题就是用尽可能低的颜色给顶点上色。为了完成这一任务,本文对图着色在大学时间表调度中的应用进行了比较研究,其中使用了五种图着色算法:First Fit、Welsh Powell、最大度排序、关联度排序和DSATUR。我们以孟加拉国的军事科学技术学院作为试验案例。结果表明,Welsh-Powell算法和DSATUR算法在生成最优调度时最有效。该研究还提供了在时间表调度中使用图形着色的局限性和优点的见解,并提出了使用这些算法的未来研究方向。
{"title":"Graph Coloring in University Timetable Scheduling","authors":"Swapnil Biswas, Syed Nusrat, N. Sharmin, Mahbubur Rahman","doi":"10.5815/ijisa.2023.03.02","DOIUrl":"https://doi.org/10.5815/ijisa.2023.03.02","url":null,"abstract":"Addressing scheduling problems with the best graph coloring algorithm has always been very challenging. However, the university timetable scheduling problem can be formulated as a graph coloring problem where courses are represented as vertices and the presence of common students or teachers of the corresponding courses can be represented as edges. After that, the problem stands to color the vertices with lowest possible colors. In order to accomplish this task, the paper presents a comparative study of the use of graph coloring in university timetable scheduling, where five graph coloring algorithms were used: First Fit, Welsh Powell, Largest Degree Ordering, Incidence Degree Ordering, and DSATUR. We have taken the Military Institute of Science and Technology, Bangladesh as a test case. The results show that the Welsh-Powell algorithm and the DSATUR algorithm are the most effective in generating optimal schedules. The study also provides insights into the limitations and advantages of using graph coloring in timetable scheduling and suggests directions for future research with the use of these algorithms.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81365291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indeterminacy Handling of Adaptive Neuro-fuzzy Inference System Using Neutrosophic Set Theory: A Case Study for the Classification of Diabetes Mellitus 基于中性粒细胞集合理论的自适应神经模糊推理系统的不确定性处理——以糖尿病分类为例
Q3 Computer Science Pub Date : 2023-06-08 DOI: 10.5815/ijisa.2023.03.01
Rajan Prasad, P. Shukla
Early diabetes diagnosis allows patients to begin treatment on time, reducing or eliminating the risk of serious consequences. In this paper, we propose the Neutrosophic-Adaptive Neuro-Fuzzy Inference System (N-ANFIS) for the classification of diabetes. It is an extension of the generic ANFIS model. Neutrosophic logic is capable of handling the uncertain and imprecise information of the traditional fuzzy set. The suggested method begins with the conversion of crisp values to neutrosophic sets using a trapezoidal and triangular neutrosophic membership function. These values are fed into an inferential system, which compares the most impacted value to a diagnosis. The result demonstrates that the suggested model has successfully dealt with vague information. For practical implementation, a single-value neutrosophic number has been used; it is a special case of the neutrosophic set. To highlight the promising potential of the suggested technique, an experimental investigation of the well-known Pima Indian diabetes dataset is presented. The results of our trials show that the proposed technique attained a high degree of accuracy and produced a generic model capable of effectively classifying previously unknown data. It can also surpass some of the most advanced classification algorithms based on machine learning and fuzzy systems.
早期糖尿病诊断使患者能够及时开始治疗,减少或消除严重后果的风险。本文提出了一种用于糖尿病分类的中性粒细胞-自适应神经模糊推理系统(N-ANFIS)。它是通用ANFIS模型的扩展。嗜中性逻辑能够处理传统模糊集的不确定性和不精确信息。建议的方法首先使用梯形和三角形嗜中性隶属函数将脆值转换为嗜中性集。这些值被输入到一个推理系统中,该系统将最受影响的值与诊断结果进行比较。结果表明,该模型能够有效地处理模糊信息。为了实际实施,已使用单值嗜中性数;它是嗜中性粒细胞群的一个特例。为了突出所建议的技术的有希望的潜力,提出了著名的皮马印度糖尿病数据集的实验调查。我们的试验结果表明,所提出的技术达到了高度的准确性,并产生了一个能够有效分类以前未知数据的通用模型。它还可以超越一些基于机器学习和模糊系统的最先进的分类算法。
{"title":"Indeterminacy Handling of Adaptive Neuro-fuzzy Inference System Using Neutrosophic Set Theory: A Case Study for the Classification of Diabetes Mellitus","authors":"Rajan Prasad, P. Shukla","doi":"10.5815/ijisa.2023.03.01","DOIUrl":"https://doi.org/10.5815/ijisa.2023.03.01","url":null,"abstract":"Early diabetes diagnosis allows patients to begin treatment on time, reducing or eliminating the risk of serious consequences. In this paper, we propose the Neutrosophic-Adaptive Neuro-Fuzzy Inference System (N-ANFIS) for the classification of diabetes. It is an extension of the generic ANFIS model. Neutrosophic logic is capable of handling the uncertain and imprecise information of the traditional fuzzy set. The suggested method begins with the conversion of crisp values to neutrosophic sets using a trapezoidal and triangular neutrosophic membership function. These values are fed into an inferential system, which compares the most impacted value to a diagnosis. The result demonstrates that the suggested model has successfully dealt with vague information. For practical implementation, a single-value neutrosophic number has been used; it is a special case of the neutrosophic set. To highlight the promising potential of the suggested technique, an experimental investigation of the well-known Pima Indian diabetes dataset is presented. The results of our trials show that the proposed technique attained a high degree of accuracy and produced a generic model capable of effectively classifying previously unknown data. It can also surpass some of the most advanced classification algorithms based on machine learning and fuzzy systems.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80278027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non-Functional Requirements Classification Using Machine Learning Algorithms 使用机器学习算法的非功能需求分类
Q3 Computer Science Pub Date : 2023-06-08 DOI: 10.5815/ijisa.2023.03.05
Abdur Rahman, A. Nayem, Saeed Siddik
Non-functional requirements define the quality attribute of a software application, which are necessary to identify in the early stage of software development life cycle. Researchers proposed automatic software Non-functional requirement classification using several Machine Learning (ML) algorithms with a combination of various vectorization techniques. However, using the best combination in Non-functional requirement classification still needs to be clarified. In this paper, we examined whether different combinations of feature extraction techniques and ML algorithms varied in the non-functional requirements classification performance. We also reported the best approach for classifying Non-functional requirements. We conducted the comparative analysis on a publicly available PROMISE_exp dataset containing labelled functional and Non-functional requirements. Initially, we normalized the textual requirements from the dataset; then extracted features through Bag of Words (BoW), Term Frequency and Inverse Document Frequency (TF-IDF), Hashing and Chi-Squared vectorization methods. Finally, we executed the 15 most popular ML algorithms to classify the requirements. The novelty of this work is the empirical analysis to find out the best combination of ML classifier with appropriate vectorization technique, which helps developers to detect Non-functional requirements early and take precise steps. We found that the linear support vector classifier and TF-IDF combination outperform any combinations with an F1-score of 81.5%.
非功能需求定义了软件应用程序的质量属性,在软件开发生命周期的早期阶段识别是非必要的。研究人员提出了一种基于机器学习算法的软件非功能需求自动分类方法。然而,在非功能需求分类中使用最佳组合仍然需要澄清。在本文中,我们研究了特征提取技术和ML算法的不同组合在非功能需求分类性能上的差异。我们还报告了对非功能需求进行分类的最佳方法。我们对一个公开可用的PROMISE_exp数据集进行了比较分析,该数据集包含标记的功能需求和非功能需求。最初,我们对数据集中的文本需求进行规范化;然后通过词袋(BoW)、词频和逆文档频率(TF-IDF)、哈希和卡方矢量化方法提取特征。最后,我们执行了15种最流行的ML算法来对需求进行分类。这项工作的新颖之处在于通过实证分析找出ML分类器与适当的矢量化技术的最佳组合,这有助于开发人员及早发现非功能需求并采取精确的步骤。我们发现线性支持向量分类器和TF-IDF组合优于任何组合,f1得分为81.5%。
{"title":"Non-Functional Requirements Classification Using Machine Learning Algorithms","authors":"Abdur Rahman, A. Nayem, Saeed Siddik","doi":"10.5815/ijisa.2023.03.05","DOIUrl":"https://doi.org/10.5815/ijisa.2023.03.05","url":null,"abstract":"Non-functional requirements define the quality attribute of a software application, which are necessary to identify in the early stage of software development life cycle. Researchers proposed automatic software Non-functional requirement classification using several Machine Learning (ML) algorithms with a combination of various vectorization techniques. However, using the best combination in Non-functional requirement classification still needs to be clarified. In this paper, we examined whether different combinations of feature extraction techniques and ML algorithms varied in the non-functional requirements classification performance. We also reported the best approach for classifying Non-functional requirements. We conducted the comparative analysis on a publicly available PROMISE_exp dataset containing labelled functional and Non-functional requirements. Initially, we normalized the textual requirements from the dataset; then extracted features through Bag of Words (BoW), Term Frequency and Inverse Document Frequency (TF-IDF), Hashing and Chi-Squared vectorization methods. Finally, we executed the 15 most popular ML algorithms to classify the requirements. The novelty of this work is the empirical analysis to find out the best combination of ML classifier with appropriate vectorization technique, which helps developers to detect Non-functional requirements early and take precise steps. We found that the linear support vector classifier and TF-IDF combination outperform any combinations with an F1-score of 81.5%.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91195288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Feature Selection Algorithms Based on Crowding Distance and Pearson Correlation Coefficient 基于拥挤距离和Pearson相关系数的特征选择新算法
Q3 Computer Science Pub Date : 2023-04-08 DOI: 10.5815/ijisa.2023.02.04
Abdesslem Layeb
Feature Selection is an important phase in classification models. Feature Selection is an effective task used to decrease the dimensionality and eliminate redundant and unrelated features. In this paper, three novel algorithms for feature selection problem are proposed. The first one is a filter method, the second one is a wrapper method, and the last one is a hybrid filter method. Both the proposed algorithms use the crowding distance used in the multiobjective optimization as a new metric to assess the importance of the features. The idea behind the use of the crowding distance is that the less crowded features have great impacts on the target attribute (class), and the crowded features have generally the same impact on the class attribute. To enhance the crowded distance, a combination with other metrics will give good results. In this work, the hybrid method combines between the crowding distance and Pearson correlation coefficient to well order the importance of features. Experiments on well-known benchmark datasets including large microarray datasets have shown the effectiveness and the robustness of the proposed algorithms.
特征选择是分类模型的一个重要阶段。特征选择是一种有效的降维、剔除冗余和不相关特征的方法。本文提出了三种新的特征选择算法。第一个是过滤器方法,第二个是包装器方法,最后一个是混合过滤器方法。这两种算法都使用多目标优化中使用的拥挤距离作为评估特征重要性的新度量。使用拥挤距离背后的思想是,较少拥挤的特征对目标属性(类)的影响很大,而拥挤的特征对类属性的影响大致相同。为了增强拥挤距离,与其他指标相结合将获得良好的效果。在本研究中,混合方法结合了拥挤距离和Pearson相关系数,很好地排序了特征的重要性。在包括大型微阵列数据集在内的知名基准数据集上的实验证明了所提算法的有效性和鲁棒性。
{"title":"Novel Feature Selection Algorithms Based on Crowding Distance and Pearson Correlation Coefficient","authors":"Abdesslem Layeb","doi":"10.5815/ijisa.2023.02.04","DOIUrl":"https://doi.org/10.5815/ijisa.2023.02.04","url":null,"abstract":"Feature Selection is an important phase in classification models. Feature Selection is an effective task used to decrease the dimensionality and eliminate redundant and unrelated features. In this paper, three novel algorithms for feature selection problem are proposed. The first one is a filter method, the second one is a wrapper method, and the last one is a hybrid filter method. Both the proposed algorithms use the crowding distance used in the multiobjective optimization as a new metric to assess the importance of the features. The idea behind the use of the crowding distance is that the less crowded features have great impacts on the target attribute (class), and the crowded features have generally the same impact on the class attribute. To enhance the crowded distance, a combination with other metrics will give good results. In this work, the hybrid method combines between the crowding distance and Pearson correlation coefficient to well order the importance of features. Experiments on well-known benchmark datasets including large microarray datasets have shown the effectiveness and the robustness of the proposed algorithms.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"112 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84212908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and Classification of Alzheimer’s Disease by Employing CNN 基于CNN的阿尔茨海默病检测与分类
Q3 Computer Science Pub Date : 2023-04-08 DOI: 10.5815/ijisa.2023.02.02
Smt. Swaroopa Shastri, Ambresh Bhadrashetty, Supriya Kulkarni
Alzheimer’s illness is an ailment of mind which results in mental confusion, forgetfulness and many other mental problems. It effects physical health of a person too. When treating a patient with Alzheimer's disease, a proper diagnosis is crucial, especially into earlier phases of condition as when patients are informed of the risk of the disease, they can take preventative steps before irreparable brain damage occurs. The majority of machine detection techniques are constrained by congenital (present at birth) data, however numerous recent studies have used computers for Alzheimer's disease diagnosis. The first stages of Alzheimer's disease can be diagnosed, but illness itself cannot be predicted since prediction is only helpful before it really manifests. Alzheimer’s has high risk symptoms that effects both physical and mental health of a patient. Risks include confusion, concentration difficulties and much more, so with such symptoms it becomes important to detect this disease at its early stages. Significance of detecting this disease is the patient gets a better chance of treatment and medication. Hence our research helps to detect the disease at its early stages. Particularly when used with brain MRI scans, deep learning has emerged as a popular tool for the early identification of AD. Here we are using a 12- layer CNN that has the layers four convolutional, two pooling, two flatten, one dense and three activation functions. As CNN is well-known for pattern detection and image processing, here, accuracy of our model is 97.80%.
阿尔茨海默病是一种精神疾病,会导致精神混乱、健忘和许多其他精神问题。它也会影响一个人的身体健康。在治疗阿尔茨海默病患者时,正确的诊断是至关重要的,特别是在病情的早期阶段,因为当患者被告知这种疾病的风险时,他们可以在不可修复的脑损伤发生之前采取预防措施。大多数机器检测技术受到先天性(出生时)数据的限制,然而最近有许多研究使用计算机诊断阿尔茨海默病。阿尔茨海默病的第一阶段是可以诊断的,但疾病本身无法预测,因为预测只有在疾病真正表现出来之前才有帮助。阿尔茨海默氏症具有影响患者身心健康的高风险症状。风险包括精神错乱、注意力不集中等等,因此有了这些症状,在早期发现这种疾病就变得很重要。发现这种疾病的意义在于患者获得更好的治疗和药物治疗机会。因此,我们的研究有助于在早期阶段发现这种疾病。特别是当与大脑MRI扫描一起使用时,深度学习已经成为早期识别AD的流行工具。这里我们使用一个12层的CNN,它有4层卷积,2层池化,2层平坦,1层密集和3层激活函数。由于CNN以模式检测和图像处理著称,在这里,我们的模型准确率为97.80%。
{"title":"Detection and Classification of Alzheimer’s Disease by Employing CNN","authors":"Smt. Swaroopa Shastri, Ambresh Bhadrashetty, Supriya Kulkarni","doi":"10.5815/ijisa.2023.02.02","DOIUrl":"https://doi.org/10.5815/ijisa.2023.02.02","url":null,"abstract":"Alzheimer’s illness is an ailment of mind which results in mental confusion, forgetfulness and many other mental problems. It effects physical health of a person too. When treating a patient with Alzheimer's disease, a proper diagnosis is crucial, especially into earlier phases of condition as when patients are informed of the risk of the disease, they can take preventative steps before irreparable brain damage occurs. The majority of machine detection techniques are constrained by congenital (present at birth) data, however numerous recent studies have used computers for Alzheimer's disease diagnosis. The first stages of Alzheimer's disease can be diagnosed, but illness itself cannot be predicted since prediction is only helpful before it really manifests. Alzheimer’s has high risk symptoms that effects both physical and mental health of a patient. Risks include confusion, concentration difficulties and much more, so with such symptoms it becomes important to detect this disease at its early stages. Significance of detecting this disease is the patient gets a better chance of treatment and medication. Hence our research helps to detect the disease at its early stages. Particularly when used with brain MRI scans, deep learning has emerged as a popular tool for the early identification of AD. Here we are using a 12- layer CNN that has the layers four convolutional, two pooling, two flatten, one dense and three activation functions. As CNN is well-known for pattern detection and image processing, here, accuracy of our model is 97.80%.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87601025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning in Cyberbullying Detection from Social-Media Image or Screenshot with Optical Character Recognition 基于光学字符识别的社交媒体图像或截图的网络欺凌检测中的机器学习
Q3 Computer Science Pub Date : 2023-04-08 DOI: 10.5815/ijisa.2023.02.01
Tofayet Sultan, Nusrat Jahan, Ritu Basak, Mohammed Shaheen Alam Jony, Rashidul Hasan Nabil
Along with the growth of the Internet, social media usage has drastically expanded. As people share their opinions and ideas more frequently on the Internet and through various social media platforms, there has been a notable rise in the number of consumer phrases that contain sentiment data. According to reports, cyberbullying frequently leads to severe emotional and physical suffering, especially in women and young children. In certain instances, it has even been reported that sufferers attempt suicide. The bully may occasionally attempt to destroy any proof they believe to be on their side. Even if the victim gets the evidence, it will still be a long time before they get justice at that point. This work used OCR, NLP, and machine learning to detect cyberbullying in photos in order to design and execute a practical method to recognize cyberbullying from images. Eight classifier techniques are used to compare the accuracy of these algorithms against the BoW Model and the TF-IDF, two key features. These classifiers are used to understand and recognize bullying behaviors. Based on testing the suggested method on the cyberbullying dataset, it was shown that linear SVC after OCR and logistic regression perform better and achieve the best accuracy of 96 percent. This study aid in providing a good outline that shapes the methods for detecting online bullying from a screenshot with design and implementation details.
随着互联网的发展,社交媒体的使用急剧扩大。随着人们在互联网和各种社交媒体平台上更频繁地分享自己的观点和想法,包含情绪数据的消费者短语的数量显著增加。据报道,网络欺凌经常导致严重的情感和身体痛苦,特别是在妇女和幼儿中。在某些情况下,甚至有报道称患者企图自杀。恶霸有时会试图摧毁任何他们认为对自己有利的证据。即使受害者得到了证据,他们也需要很长时间才能得到正义。这项工作使用OCR、NLP和机器学习来检测照片中的网络欺凌,以便设计和执行一种从图像中识别网络欺凌的实用方法。使用了八种分类器技术来比较这些算法与BoW模型和TF-IDF这两个关键特征的准确性。这些分类器被用来理解和识别欺凌行为。基于对网络欺凌数据集的测试,表明OCR和逻辑回归后的线性SVC表现更好,达到了96%的最佳准确率。本研究提供了一个良好的轮廓,塑造了从屏幕截图中检测网络欺凌的方法,并提供了设计和实现细节。
{"title":"Machine Learning in Cyberbullying Detection from Social-Media Image or Screenshot with Optical Character Recognition","authors":"Tofayet Sultan, Nusrat Jahan, Ritu Basak, Mohammed Shaheen Alam Jony, Rashidul Hasan Nabil","doi":"10.5815/ijisa.2023.02.01","DOIUrl":"https://doi.org/10.5815/ijisa.2023.02.01","url":null,"abstract":"Along with the growth of the Internet, social media usage has drastically expanded. As people share their opinions and ideas more frequently on the Internet and through various social media platforms, there has been a notable rise in the number of consumer phrases that contain sentiment data. According to reports, cyberbullying frequently leads to severe emotional and physical suffering, especially in women and young children. In certain instances, it has even been reported that sufferers attempt suicide. The bully may occasionally attempt to destroy any proof they believe to be on their side. Even if the victim gets the evidence, it will still be a long time before they get justice at that point. This work used OCR, NLP, and machine learning to detect cyberbullying in photos in order to design and execute a practical method to recognize cyberbullying from images. Eight classifier techniques are used to compare the accuracy of these algorithms against the BoW Model and the TF-IDF, two key features. These classifiers are used to understand and recognize bullying behaviors. Based on testing the suggested method on the cyberbullying dataset, it was shown that linear SVC after OCR and logistic regression perform better and achieve the best accuracy of 96 percent. This study aid in providing a good outline that shapes the methods for detecting online bullying from a screenshot with design and implementation details.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76789115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification of Images of Skin Lesion Using Deep Learning 基于深度学习的皮肤病变图像分类
Q3 Computer Science Pub Date : 2023-04-08 DOI: 10.5815/ijisa.2023.02.03
Momina Shaheen, Usman Saif, S. Awan, Faizan Ahmad, Aimen Anum
Skin cancer is among common and rapidly increasing human malignancies, which can be diagnosed visually. The diagnosis begins with preliminary medical screening and by dermoscopic examination, histopathological examination, and proceeding to the biopsy. This screening and diagnosis can be automated using machine learning tools and techniques. Artificial neural networks are helping a lot in medical diagnosis applications. In this research, skin images are classified into 7 different classes of skin cancer using deep learning methodology, then analyzed the results w.r.t to their respective precision, recall, support, and accuracy to find its practical applicability. This model is efficient in comparison to the detection of skin cancer with human eyes. Human eyes detection can be 79% accurate at most. Thus, having a scientific method of diagnosis can help the doctors and practitioners to accurately identify the cancer and its type. The model provides 80% accuracy on average for all 7 types of skin diseases, thus being more reliable than human eye examination. It will help the doctors to diagnose the skin diseases more confidently. The model has only 2 misclassified predictions for Basal cell carcinoma and Vascular lesions. However, Actinic keratosis diagnosis is most accurately predicted.
皮肤癌是一种常见且增长迅速的人类恶性肿瘤,可通过视觉诊断。诊断开始于初步的医学筛查、皮肤镜检查、组织病理学检查,并进行活检。这种筛选和诊断可以使用机器学习工具和技术实现自动化。人工神经网络在医学诊断应用中有很大的帮助。本研究采用深度学习方法将皮肤图像划分为7类不同的皮肤癌,并对结果分别进行精密度、召回率、支持度和准确率分析,以寻找其实际适用性。与人眼检测皮肤癌相比,该模型是有效的。人眼检测的准确率最高可达79%。因此,有一个科学的诊断方法,可以帮助医生和从业人员准确地识别癌症及其类型。该模型对所有7种皮肤病的平均准确率为80%,比人眼检查更可靠。这将有助于医生更自信地诊断皮肤病。该模型对基底细胞癌和血管病变的预测只有2个错误分类。然而,光化性角化病的诊断是最准确的预测。
{"title":"Classification of Images of Skin Lesion Using Deep Learning","authors":"Momina Shaheen, Usman Saif, S. Awan, Faizan Ahmad, Aimen Anum","doi":"10.5815/ijisa.2023.02.03","DOIUrl":"https://doi.org/10.5815/ijisa.2023.02.03","url":null,"abstract":"Skin cancer is among common and rapidly increasing human malignancies, which can be diagnosed visually. The diagnosis begins with preliminary medical screening and by dermoscopic examination, histopathological examination, and proceeding to the biopsy. This screening and diagnosis can be automated using machine learning tools and techniques. Artificial neural networks are helping a lot in medical diagnosis applications. In this research, skin images are classified into 7 different classes of skin cancer using deep learning methodology, then analyzed the results w.r.t to their respective precision, recall, support, and accuracy to find its practical applicability. This model is efficient in comparison to the detection of skin cancer with human eyes. Human eyes detection can be 79% accurate at most. Thus, having a scientific method of diagnosis can help the doctors and practitioners to accurately identify the cancer and its type. The model provides 80% accuracy on average for all 7 types of skin diseases, thus being more reliable than human eye examination. It will help the doctors to diagnose the skin diseases more confidently. The model has only 2 misclassified predictions for Basal cell carcinoma and Vascular lesions. However, Actinic keratosis diagnosis is most accurately predicted.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"64 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80143209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Healthcare Vulnerability Mapping Using K-means ++ Algorithm and Entropy Method: A Case Study of Ratnanagar Municipality 基于k - means++算法和熵值法的医疗保健漏洞映射——以Ratnanagar市为例
Q3 Computer Science Pub Date : 2023-04-08 DOI: 10.5815/ijisa.2023.02.05
Apurwa Singh, Roshan Koju
Healthcare is a fundamental human right. Vulnerable populations in healthcare refer to those who are at greater risk of suffering from health hazards due to various socio-economic factors, geographical barriers, and medical conditions. Mapping of this vulnerable population is a vital part of healthcare planning for any region. Very few such research regarding the distribution of healthcare service providers was carried out in the Nepali context previously. Thus, the results of vulnerability mapping can help with meaningful interventions for healthcare demands. This study focused on combining geo-analytics, unsupervised machine learning algorithms, and entropy methods for performing vulnerability mapping. K-means++ clustering algorithm was applied to household data of Ratnanagar municipality for the purpose of creating multiple clusters of households. An open-source routing machine was used to compute the distance to the nearest health service provider from each household in Ratnanagar municipality. The entropy method was used to evaluate the vulnerability measure of each cluster. Later, based on the population of different clusters in each ward and their respective vulnerability measures, each ward’s vulnerability measure was quantified. It can be observed that wards that are farther away from the east-west highway have higher vulnerability indices. This study found that machine learning algorithms can be effectively used in combination with the weighting method for vulnerability mapping. Using an unsupervised machine learning algorithm made sure that dimensions of vulnerability are visible.
医疗保健是一项基本人权。卫生保健中的弱势群体是指由于各种社会经济因素、地理障碍和医疗条件而面临更大健康危害风险的人群。绘制这一弱势群体的地图是任何地区卫生保健规划的重要组成部分。以前很少在尼泊尔进行关于保健服务提供者分布的这类研究。因此,脆弱性绘图的结果可以帮助有意义的干预保健需求。本研究的重点是结合地理分析、无监督机器学习算法和熵方法来执行漏洞映射。采用k -means++聚类算法对Ratnanagar市的住户数据进行聚类,建立多个住户聚类。使用开源路由机计算拉特纳加尔市每户家庭到最近的保健服务提供者的距离。采用熵值法对各簇的脆弱性测度进行评价。然后,根据各病区不同集群的人口以及各自的脆弱性测度,量化各病区的脆弱性测度。可以看出,离东西高速公路越远的地区,其脆弱性指数越高。本研究发现,机器学习算法与权重法相结合可以有效地用于漏洞映射。使用无监督机器学习算法确保漏洞的维度是可见的。
{"title":"Healthcare Vulnerability Mapping Using K-means ++ Algorithm and Entropy Method: A Case Study of Ratnanagar Municipality","authors":"Apurwa Singh, Roshan Koju","doi":"10.5815/ijisa.2023.02.05","DOIUrl":"https://doi.org/10.5815/ijisa.2023.02.05","url":null,"abstract":"Healthcare is a fundamental human right. Vulnerable populations in healthcare refer to those who are at greater risk of suffering from health hazards due to various socio-economic factors, geographical barriers, and medical conditions. Mapping of this vulnerable population is a vital part of healthcare planning for any region. Very few such research regarding the distribution of healthcare service providers was carried out in the Nepali context previously. Thus, the results of vulnerability mapping can help with meaningful interventions for healthcare demands. This study focused on combining geo-analytics, unsupervised machine learning algorithms, and entropy methods for performing vulnerability mapping. K-means++ clustering algorithm was applied to household data of Ratnanagar municipality for the purpose of creating multiple clusters of households. An open-source routing machine was used to compute the distance to the nearest health service provider from each household in Ratnanagar municipality. The entropy method was used to evaluate the vulnerability measure of each cluster. Later, based on the population of different clusters in each ward and their respective vulnerability measures, each ward’s vulnerability measure was quantified. It can be observed that wards that are farther away from the east-west highway have higher vulnerability indices. This study found that machine learning algorithms can be effectively used in combination with the weighting method for vulnerability mapping. Using an unsupervised machine learning algorithm made sure that dimensions of vulnerability are visible.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86854662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Intelligent Systems and Applications in Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1