The lexicon-based approach is used for sentiment analysis of Urdu. In the lexicon, apart from the traditional approach of having adjectives, nouns and negations we have also included verbs, ...intensifiers and context-dependent words. An effective Urdu sentiment analyzer is developed that applies rules and make use of this new lexicon and perform Urdu sentiment analysis by classifying sentences as positive, negative or neutral. Evaluating this Urdu sentiment analyzer, by using sentences from Urdu blogs, yields the most promising results so far in Urdu language with 89.03% accuracy with 0.86 precision, 0.90 recall and 0.88 F-measure. Results are evaluated using kappa statistics as well. The comparison with the previous work in Urdu shows that the combination of this Urdu sentiment lexicon and Urdu sentiment analyzer is much more effective than the previous such combinations. The main reason for increased efficiency is the development of wide coverage lexicon and effective handling of negations, intensifiers and context-dependent words by the Urdu sentiment analyzer.
Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and ...can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, if an intrusion or eavesdropping occurs, it will lead to a severe disfigurement of the whole communication network, and the data will be controlled by wrong malicious users. Identification of attack is a way to identify the security violations and analyze the measures in a computer network. An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. The role of information security is to design and protect the entire data of networks and maintain its confidentiality, integrity, and availability for their right users. Therefore, there is a need for end to end security management, which will ensure the security and privacy of the network and will save the data inside networks from malicious users. As the network devices are growing, so the level of threats is also increasing for these devices. The proposed research is an endeavor toward the detection of data packets attack by using the rough set theory for a secure end to end communication. The experimental work was performed by the RSES tool. The accuracy of the K-NN was 88% for the total objects of 8459. For cross validation purposes, the decision rules and decomposition tree algorithms were used. The DR algorithm showed accuracy of 59.1%, while the DT showed accuracy of 61.5%. The experimental results of the proposed study show that the research is capable of detecting data packets attack.
Internet of Things (IoT) is expanding and evolves into all aspects of the society. Research and developments in the field of IoT have shown the possibility of producing huge volume of data and ...computation among different devices of the IoT. The data collected from IoT devices are transferred to a central server which can further be retrieved and accessed by the service providers for analyzing, processing, and using. Industrial Internet of Health Things (IIoHT) is the expansion of the Internet of Health Things (IoHT) which plays an important role in observing, consulting, monitoring, and treatment process of remote exchange data processes. The linkage of computation and interoperability are supported through various intelligent sensors, controllers, and actuators. The role of parallel computing for efficient and Intelligent Industrial Internet of Health Things is obvious to analyze and process different healthcare situations. A detailed overview of this existing literature is needed through which the research community will provide new solutions for efficient healthcare with the help of IoT based on parallel computing. Therefore, the current study presents a detailed overview of the existing literature for facilitating IIoHT.
Energy infrastructure is well thought-out to be one of the complex infrastructures due to its convoluted configuration and automatic control among all of the systems. With such systems, various ...connections are made for the purpose of configurations. The energy system infrastructure aims to analytically evaluate each element of the system based on fundamental energy branches according to the customer demand. Developing a novel critical evaluation approach for complex energy infrastructure is pertinent to the evaluation of mixed energy system infrastructure. Considering the functional relationships between elements and their infrastructures, a system is needed to overcome the limitations of the current systems. By doing the efficient modeling of enhancing the performance infrastructure of critical energy infrastructure enable better quantitative evaluation of system. The purpose of the proposed study is to develop an evaluation approach for enhancing the performance of critical energy infrastructure. With the help of the proposed approach, efficient multifeature model for enhancing the performance of critical energy infrastructure was experimentally calculated. The experimental setup of the proposed study was done in the Super Decision tool for an efficient multifeature model for enhancing the performance. Results of the experiments reveal the effectiveness of the proposed research.
In the last decade, the Internet of Things (IoT) has grown to connect a large number of smart entities, devices, and components. These connected entities provide a wide range of services to improve ...the current society of end customers. The Industrial Internet of Things (IIoTs) are revolutionary systems that have linked manufacturing processes with Internet access in order to preciously increase quality of services. These systems have minimized the costs of production through collaboration with electronic objects, accumulating computing, advanced analytics, and smart perception techniques. A demanding analysis of the strengths and limitations of computational models of IIoT is an essential part of the industry and before deciding which approach to use and implement for enhancing usability. Therefore, the goal of this study is to provide feedback and information to the research community and identify patterns in recommendations for future research in the context of process, development, and monitoring of additional technologies of computational models for IIoT. This paper has presented a comprehensive summary of the existing literature on IIoT for providing details about modern industrial revolutions in the context of IIoT. Associated materials were searched and filtered for identification of relevant materials to the proposed study. These materials have been collectively studied with in-depth analysis and then summarized to condense the information of computation models for the readers as well as entrepreneurs. The study will facilitate research community and practitioners to develop novel techniques, algorithms, and tools to automate and facilitate IIoT. This will develop the field of IIoT and will enhance its usability.
Although work has been done in Urdu Sentiment Analysis by researchers but still there is a lot of room for improvement in the form of achieving higher accuracy. Therefore, in this research, the ...accuracy of Urdu Sentiment Analysis in multiple domains is enhanced by dealing negations using Lexicon-based approach, one of the broadly used approaches for performing Sentiment Analysis. Negations in Urdu Sentiment Analysis are particularly focused in this research because of their effective role in Sentiment Analysis. Both local and long distance negations are considered. For achieving this goal, a corpus with 6025 Urdu sentences, from 151 blogs that belong to 14 different genres is taken in which use of negations is carefully observed. Two major steps are taken in this regard. First, to deal with the morphological negations, this type of negations is included in the negative word file of the Urdu Sentiment Lexicon developed for performing Sentiment Analysis of Urdu blogs. Secondly, rule-based approach is used for handling the implicit and explicit negations. Rules are designed that can deal with both implicit and explicit negations effectively. Implementation of these rules increased the accuracy of Sentiment Analyzer from 73.88% to 78.32% with 0.745, 0.788 and 0.745 Precision, Recall and F-measure respectively, which is statistically significant improvement.
•Urdu Sentiment Analysis in multiple domains is performed.•Lexicon-based approach and Supervised Machine Learning approach are compared.•Lexicon-based approach achieved high Accuracy, Precision, ...Recall and F-measure.•Lexicon-based is also better in terms of economy of time and efforts used.
Web is facilitating people to express their views and opinions on different topics through reviews and blogs. Effective advantages can be reaped from these reviews and blogs by fusing the sentiment knowledge. In this research, Sentiment Analysis of Urdu blogs from multiple domains is done by using the two widely used approaches i.e. the Lexicon-based approach and the Supervised Machine Learning approach. Three well known classifiers i.e. Support Vector Machine, Decision Tree and K Nearest Neighbor are used in case of Supervised Machine Learning approach whereas a wide coverage Urdu Sentiment Lexicon and an efficient Urdu Sentiment Analyzer are used in Lexicon-based approach. In both the approaches the information are fused from two sources to successfully perform Sentiment Analysis. In case of Lexicon-based approach, the two sources are the wide coverage Urdu Sentiment Lexicon and the efficient Urdu Sentiment Analyzer. In case of Supervised Machine Learning approach, the two sources are the un-annotated data and annotated data along with important attributes. After performing Sentiment Analysis using both the approaches, the results are observed carefully and on the basis of experiments performed in this research, it is concluded that the Lexicon-based approach outperforms Supervised Machine Learning approach not only in terms of Accuracy, Precision, Recall and F-measure but also in terms of economy of time and efforts used.
Sentiment analysis (SA) can help in decision making, drawing conclusion, or recommending appropriate solution for different business, political, or other problems. At the same time reliable ways are ...also required to verify the results that are achieved after SA. In the frame of biologically inspired approaches for machine learning, getting reliable result is challenging but important. Properly verified and validated results are always appreciated and preferred by the research community. The strategy of achieving reliable result is adopted in this research by using three standard evaluation measures. First, SA of Urdu is performed. After collection and annotation of data, five classifiers, i.e., PART, Naives Bayes mutinomial Text, Lib SVM (support vector machine), decision tree (J48), and k nearest neighbor (KNN, IBK) are employed using Weka. After using 10-fold cross-validation, three top most classifiers, i.e., Lib SVM, J48, and IBK are selected on the basis of high accuracy, precision, recall, and F-measure. Further, IBK resulted as the best classifier among the three. For verification of this result, labels of the sentences (positive, negative, or neutral) are predicted by using training and test data, followed by the application of the three standard evaluation measures, i.e., McNemar’s test, kappa statistic, and root mean squared error. IBK performs much better than the other two classifiers. To make this result more reliable, a number of steps are taken including the use of three evaluation measures for getting a confirmed and validated result which is the main contribution of this research. It is concluded with confidence that IBK is the best classifier in this case.
The concept of software birthmark is developed for the detection of theft and piracy in software applications. The originality of software can be evaluated by comparing software programs on the basis ...of their birthmarks. A number of birthmark designs have been proposed which are used to specify birthmark for source code and executable code related to particular programming languages. This study presents a systematic literature review on available software birthmark designs and related techniques for comparing birthmarks in order to identify pirated software. This research is focused on identifying different applications of software birthmark, especially the estimation of software birthmark to identify the extent of piracy performed in a software. The objective is to gain insight into complex details of software birthmark by accumulating and analyzing the knowledge provided in the literature in order to facilitate further research in software birthmark and its applications. The study is conducted by following the systematic literature review protocol. The data are collected from primary studies published from 1992 to April 2018 in specified journals and conference/workshop proceedings. A total of 143 primary studies are selected, based on predefined exclusion, inclusion, and quality criteria. The research identifies 22 software birthmark techniques frequently used and discussed by researchers and industry. The study also identifies a number of important applications of software birthmarks. These applications define the use of software birthmark in software theft and plagiarism detection, intellectual software asset management, detecting binary theft, malware detection, detecting the theft of natural language, and semantics-based repackaging detection for mobile apps. The results show that despite the large-scale research and development of different birthmark techniques, there is a lack of organized knowledge which is needed to facilitate the usage of software birthmark for critical applications like clone detection and malware detection. Furthermore, it is seen that the area of software birthmark estimation is not well researched which needs to be explored further. The study recommends that the area of software birthmark needs to be explored for developing a reliable and authentic mechanism which can accurately and easily detect software theft and ultimately prevent the piracy of software.
Piracy of software is an increasing problem of modern day software industry. Piracy of software is the unlawful use of software or part of it without proper permission as described in license ...agreement. Software piracy is a serious crime but not taken seriously by most people. Preventing software piracy is very important for the growing software industry. Efforts are being made to prevent and detect software piracy. Several techniques have been developed most important of which is software birthmark. The birthmark of a software is the intrinsic properties of software. A recent research shows that a features based software birthmark can be used as a strong mechanism to detect piracy of a software and how much piracy performed has been performed on it. An objective measure is needed to overcome this problem and to compare features based birthmark of a software which efficiently and precisely detect piracy in reproduction of software. The proposed study presents Haar wavelet collocation method for software features (birthmark) to detect piracy. The proposed method gives an exclusive solution for the features based birthmark of software and is then further used for comparisons of birthmark. The results of the proposed study show the effectiveness in terms of accuracy and efficiency to compare the features based software.
•Haar wavelet collocation method for software features (birthmark) to detect piracy.•A unique solution for the features based software birthmark comparisons.•The results show that the model will be effective in terms of efficiency and accuracy for the comparison software birthmark.