Sentiment analysis using stemmed Twitter data from various languages is an emerging research topic. In this paper, we address three data augmentation techniques namely Shift, Shuffle, and Hybrid to increase the size of the training data; and then we use three key types of deep learning (DL) models namely recurrent neural network (RNN), convolution neural network (CNN), and hierarchical attention network (HAN) to classify the stemmed Turkish Twitter data for sentiment analysis. The performance of these DL models has been compared with the existing traditional machine learning (TML) models. The performance of TML models has been affected negatively by the stemmed data, but the performance of DL models has been improved greatly with the utilization of the augmentation techniques. Based on the simulation, experimental, and statistical results analysis deeming identical datasets, it has been concluded that the TML models outperform the DL models with respect to both training-time (TTM) and runtime (RTM) complexities of the algorithms; but the DL models outperform the TML models with respect to the most important performance factors as well as the average performance rankings.
No abstract
Cybercrime directs to any criminal activity taken out utilizing computers or the internet. Attackers have chosen strategies such as social engineering, phishing, and malware as part of their cyber-attacks. A cyber-attack can lead to various effects, ranging from stealing individual data to extortion money or losing helpful information. Society and systems depend on critical infrastructures like power plants, hospitals, and financial services companies. This paper analyzes financial losses statistics for cyber security and future trends. The cost of cybercrime prevention is increasing day by day. Financial losses refer to damages to the wealth of an organization. This includes organizational losses, compensation, and legal fees. By financial loss, we mean increased costs or reduced income caused by the threat. We collect data from various datasets and information from sources. After collecting data, we analyze the data and create a different chart to identify the growth of cyber-attacks, cyber security, and cybercrime costs. We analyze global and worldwide cybercrime status. We also investigate state-wise cybercrime and the cyber security status of the United States of America. Our main objective of the analysis is to find out the financial losses and future trends of cybercrime and cyber security. From our study, we noticed that the number of cybercrimes and their management and prevention costs are rapidly increasing in the USA and worldwide.
Breast cancer is one of the most common invading cancers in women. Analyzing breast cancer is nontrivial and may lead to disagreements among experts. Although deep learning methods achieved an excellent performance in classification tasks including breast cancer histopathological images, the existing state-of-the-art methods are computationally expensive and may overfit due to extracting features from in-distribution images. In this paper, our contribution is mainly twofold. First, we perform a short survey on deep-learning-based models for classifying histopathological images to investigate the most popular and optimized training-testing ratios. Our findings reveal that the most popular training-testing ratio for histopathological image classification is 70%: 30%, whereas the best performance (e.g., accuracy) is achieved by using the training-testing ratio of 80%: 20% on an identical dataset. Second, we propose a method named DenTnet to classify breast cancer histopathological images chiefly. DenTnet utilizes the principle of transfer learning to solve the problem of extracting features from the same distribution using DenseNet as a backbone model. The proposed DenTnet method is shown to be superior in comparison to a number of leading deep learning methods in terms of detection accuracy (up to 99.28% on BreaKHis dataset deeming training-testing ratio of 80%: 20%) with good generalization ability and computational speed. The limitation of existing methods including the requirement of high computation and utilization of the same feature distribution is mitigated by dint of the DenTnet.
No abstract
Fog computing (FC) models the cloud computing paradigm expedient by bridging the breach between centralized data servers and diverse terrestrially distributed applications. It wields various wireless sensor networks (WSNs) that sprawl in the core of any IoT applications. Consequently, the operation of fog network turns on the efficiency of WSNs operation, while the all-inclusive network energy consumption depends on both FC and WSNs operation. This paper addresses how dissimilar organizations of a fog network can influence its effectiveness and energy savings. Chiefly, it appraises whether deploying multisink nodes in close enough vicinity to the fog nodes can give in energy savings and foster coherent data communication between WSNs and fog networks. To assess the multi-sink assignment problem the following four criteria are used: (i) Distance from the fog network nodes; (ii) Nodes degree; (iii) Sink nodes energy; and (iv) Sink nodes processing capabilities. This paper suggests four novel solutions to the multisink connectivity for some challenges of fog networks deeming: (i) Window Nondominant Set (WNS); (ii) Evaluation Based Approach (EBA); (iii) Harris Hawks Optimizer (HHO); and (iv) Modified HHO (MHHO). Distinct sets of experiments are conducted to check out algorithmic performance. The performance of all algorithms is measured and then compared to each other in terms of power consumption, runtime, packet loss, and localization error. One of the key supremacies of our approaches is the utilization of fog network for sensor networks data processing, principally with the large-scale networks. Yet, the communication challenges could need further study due to the limited communication range of the sensors.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.