Claim Missing Document
Check
Articles

Found 4 Documents
Search

Breast cancer prediction using genetic algorithm and sand cat swarm optimization algorithm Sangeetha, Velu; Vaneeta, Maniyambadi; Mamatha, Arjuna; Shoba, Muniya; Ramamurthy Deepa, Sugatur; Sujatha, Velusamy; Sujatha, Shanmugam
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp849-858

Abstract

Breast cancer is the second leading type of cancer, which is mainly found in women and which increases the death rate among women. Early detection and diagnosis of breast cancer can reduce its occurrence and the death rate. Unfortunately, even if cancer treatment is initiated quickly after diagnosis, cancer may relapse because cancer cells may continue to exist in the body, which is also a major problem faced by women who fear facing the same treatment twice. So, detecting cancer at its early stage and predicting the recurrence of it is a major issue in the medical field that needs to be solved. Machine learning (ML) algorithms such as support vector machine (SVM), random forest (RF), k-nearest neighbor (KNN), and voting classifier (VC) are used for breast cancer prediction. Due to high-dimension data, the predicted results using Machine learning algorithms will increase the errors and decrease the accuracy. So, bioinspired algorithms such as the genetic algorithm (GA) and sand cat swarm optimization (SCSO) are used to reduce the data dimension. Convolutional neural network (CNN) is used for feature extraction from the image dataset. CNN algorithms are used for feature selection, which selects the important features for classification and prediction by applying 10 cross-validation methods. The proposed model using bioinspired optimization algorithms outcomes will yield high accuracy and the best solution.
Enhancing single image dehazing with self-supervised convolutional neural network and dark channel prior integration Hari, Unnikrishnan; Bajulunisha, Alla Bukshu; Pandey, Pramod; Rexi, Joseph Arul Michiline; Sujatha, Velusamy; Raj, Thankappan Saju; Velmurugan, Athiyoor Kannan
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i1.pp520-528

Abstract

The removal of noise from images holds great significance as clear and denoised images are vital for various applications. Recent research efforts have been concentrated on the dehazing of single images. While conventional methods and deep learning approaches have been employed for daytime images, learning-based techniques have shown impressive dehazing results, albeit often with increased complexity. This has led to the persistence of prior-based methods, despite their slightly lower performance. To address this issue, we propose a novel deep learning-based dehazing method utilizing a self-supervised convolutional neural network (CNN). This approach incorporates both the input hazy image and the dark channel prior. By leveraging an encoder, the combined information of the dark channel prior and haze image is encoded into a condensed latent representation. Subsequently, a decoder is employed to reconstruct the clean image using these latent features. Our experimental results demonstrate that our proposed algorithm significantly enhances image quality, as indicated by improved peak signal-to-noise ratio (PSNR) and structural similarity index (SSIM) values. We perform both quantitative and qualitative comparisons with recently published techniques, showcasing the efficacy of our approach.
Hybrid semantic model based on machine learning for sentiment classification of consumer reviews Rajidurai Parvathy, Palaniraj; Mohankumar, Nagarajan; Shobiga, Rajendran; Mitra Thakur, Gour Sundar; Bandaru, Mamatha; Sujatha, Velusamy; Sujatha, Shanmugam
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i3.pp2001-2011

Abstract

Digital information is regularly produced from a variety of sources, including social media and customer service reviews. For the purpose of increasing customer happiness, this written data must be processed to extract user comments. Consumers typically share comments and thoughts about consumable items, technological goods, and services supplied for payment in the modern period of consumerism with simple access to social networking globe. Each object has a plethora of remarks or thoughts that demand special attention due to their sentimental worth, especially in the written portions. The goal of the current project is to do sentiment prediction on the Amazon Electronics, Kindle, and Gift Card datasets. In order to predict sentiment and evaluate utilizing many executions evaluates admitting accuracy, recall, and F1-score, a hybrid soft voting ensemble method that combines lexical and ensemble methodologies is proposed in this study. In addition to calculating a subjectivity score and sentiment score, this study also suggests a non-interpretive sentiment class label that may be used to assess the sign of the evaluations applying suggested method for sentiment categorization. The effectiveness of our suggested ensemble model is examined using datasets from Amazon customer product reviews, and we found an improvement of 2-5% in accuracy compared to the current state-of-the-art ensemble method.
SVM algorithm-based anomaly detection in network logs and firewall logs Jesudasan Peter, John Benito; Rakesh, Nitin; Rekha, Puttaswamy; Sreelatha, Tammineni; Sujatha, Velusamy; Muthumarilakshmi, Surulivelu; Sujatha, Shanmugam
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp1642-1651

Abstract

The purpose of many advanced forms of cyberattack is to deceive the monitors, and as a result, these attacks often involve several kinds, levels, and stages. Existing anomaly detection systems often examine logs or traffic for indications of attacks, ignoring any additional analysis regarding attack procedures. This is done to save time. For example, traffic detection technologies can only identify the attack flows in a general sense. Still, they cannot reconstruct the attack event process or expose the present condition of the network node. In addition, the logs kept by the firewall are significant sources of evidence; nevertheless, they are still challenging to decipher. This paper introduces support vector machine algorithm-based Anomaly detection (SVMA) in network logs and firewall logs to provide robust security against cyberattacks. This mechanism consists of three modules: preprocessing, feature selection and anomaly detection. The genetic algorithm (GA) selects the better feature from the input. Finally, the support vector machine (SVM) isolates an anomaly powerfully. The investigational outcomes illustrate that the SVMA minimizes the required time to select the features and enhances the detection accuracy.