- Network Security and Intrusion Detection
- Anomaly Detection Techniques and Applications
- Advanced Malware Detection Techniques
- Retinal Imaging and Analysis
- Retinal Diseases and Treatments
- Stock Market Forecasting Methods
- Sentiment Analysis and Opinion Mining
- Topic Modeling
- Artificial Intelligence in Healthcare
University of the Cumberlands
2019-2023
Malicious program is commonly known as malware, which purposely designed to cause problems in networks and harm a variety of ways. Malware's primary goal disrupt normal execution or obtain unauthorized access. Malware generic term for variants malicious software such spyware, ransomware, viruses. application disguises itself like standard program. The malware developer develops different using obfuscation compression strategies. Such concealment methods make detection categorization...
Sentiment analysis using stemmed Twitter data from various languages is an emerging research topic. In this paper, we address three augmentation techniques namely Shift, Shuffle, and Hybrid to increase the size of training data; then use key types deep learning (DL) models recurrent neural network (RNN), convolution (CNN), hierarchical attention (HAN) classify Turkish for sentiment analysis. The performance these DL has been compared with existing traditional machine (TML) models. TML...
Diabetes is a disorder of the metabolism caused by high glucose levels in body. causes eye deficiency, also known as Diabetic Retinopathy (DR), which significant vision loss over time. patients’ can be saved if DR detected and diagnosed early. Microaneurysms, haemorrhages, exudates are prior signs that emerge on surface retina. Nevertheless, diagnosing challenging problem necessitates services an experienced ophthalmologist. Using automated classifier, artificial intelligence based deep...
Purpose: The primary focus of this research is to improvise the speed and memory usage Artificial Neural Networks (ANN) that are used in analyzing data anomalies Internet Things (IoT), using dimensionality reduction technique Principal Component Analysis (PCA).Problem: In paper, a study done by considering different IoT indicates cyber-attack, which further fed into such as PCA processed ANN.