Recent Advances in Computer Science and Communications - Current Issue
Volume 18, Issue 6, 2025
- Thematic Issue: Applications of Internet of Things and Data Science Approaches for Sustainable Development
-
-
-
ROUGE-SS: A New ROUGE Variant for the Evaluation of Text Summarization
Authors: Sandeep Kumar, Arun Solanki and Noor Zaman JhanjhiBackgroundPrior research on abstractive text summarization has predominantly relied on the ROUGE evaluation metric, which, while effective, has limitations in capturing semantic meaning due to its focus on exact word or phrase matching. This deficiency is particularly pronounced in abstractive summarization approaches, where the goal is to generate novel summaries by rephrasing and paraphrasing the source text, highlighting the need for a more nuanced evaluation metric capable of capturing semantic similarity.
MethodsIn this study, the limitations of existing ROUGE metrics are addressed by proposing a novel variant called ROUGE-SS. Unlike traditional ROUGE metrics, ROUGE-SS extends beyond exact word matching to consider synonyms and semantic similarity. Leveraging resources such as the WordNet online dictionary, ROUGE-SS identifies matches between source text and summaries based on both exact word overlaps and semantic context. Experiments are conducted to evaluate the performance of ROUGE-SS compared to other ROUGE variants, particularly in assessing abstractive summarization models. The algorithm for the synonym features (ROUGE-SS) is also proposed.
ResultsThe experiments demonstrate the superior performance of ROUGE-SS in evaluating abstractive text summarization models compared to existing ROUGE variants. ROUGE-SS yields higher F1 scores and better overall performance, achieving a significant reduction in training loss and impressive accuracy. The proposed ROUGE-SS evaluation technique is evaluated in different datasets like CNN/Daily Mail, DUC-2004, Gigawords, and Inshorts News datasets. ROUGE-SS gives better results than other ROUGE variant metrics. The F1-score of the proposed ROUGE-SS metric is improved by an average of 8.8%. These findings underscore the effectiveness of ROUGE-SS in capturing semantic similarity and providing a more comprehensive evaluation metric for abstractive summarization.
ConclusionIn conclusion, the introduction of ROUGE-SS represents a significant advancement in the field of abstractive text summarization evaluation. By extending beyond exact word matching to incorporate synonyms and semantic context, ROUGE-SS offers researchers a more effective tool for assessing summarization quality. This study highlights the importance of considering semantic meaning in evaluation metrics and provides a promising direction for future research on abstractive text summarization.
-
-
-
Utilizing AspectJ for Defense against Evasive Malware Attacks in Android System
Authors: Ketaki Pattani, Sunil Gautam, Mamoon Rashid, Mohd Zuhair and Ahsan RizviIntroductionMobile devices have become an integral part of our digital lives, facilitating various tasks and storing a treasure trove of sensitive information. However, as more people utilize mobile devices, sophisticated cyber threats are emerging to elude traditional security measures.
MethodsThe use of evasion techniques by malicious actors presents a significant challenge to mobile security, necessitating creative solutions. In this work, we investigate the potential critical role that the aspect-oriented programming paradigm AspectJ can play in strengthening mobile security against evasion attempts. Evasion techniques cover a wide range of tactics, including runtime manipulation, code obfuscation, and unauthorized data access.
ResultsThese tactics usually aim to bypass detection and avoid security measures. In order to address the aforementioned issues, this paper uses AspectJ to give developers a flexible and dynamic way to add aspects to their coding structures so they can monitor, intercept, and respond to evasive actions. It illustrates how AspectJ can improve mobile security and counteract the long-lasting risks that evasion techniques present in a dynamic threat landscape.
ConclusionConsequently, this work proposes a novel defense mechanism incorporating AspectJ into a significant paradigm of security against evasion with 91.33% accuracy and demonstrates the successful detection of evasive attacks.
-
-
-
Efficacy of Keystroke Dynamics-based User Authentication in the Face of Language Complexity
Authors: Sandip Dutta, Utpal Roy and Soumen RoyIntroductionThis study investigates the impact of language complexity on Keystroke Dynamics (KD) and its implications for accurate KD-based user authentication system performance in smartphones.
MethodsThis research meticulously analyzes keystroke patterns using 160 volunteers, including both frequently typed and infrequently typed texts. Our analysis of 12 anomaly detection algorithms reveals that a simple text-based KD system consistently outperforms its complex counterpart with superior Equal Error Rates (EERs).
ResultsAs a result, the Scaled Manhattan anomaly detector achieves an EER of 2.48% for simple text and an improvement over 2.98% for complex text. The incorporation of soft biometrics further enhances algorithmic performance, emphasizing strategies to build resilience into KD-based user authentication systems.
ConclusionThroughout this study, the importance of text complexity is emphasized, and innovative pathways are introduced to strengthen KD-based user authentication paradigms.
-
-
-
Parametric Investigation of Rotary Type Magnetorheological Finishing Operation by Batch Gradient Descent Algorithm
More LessBackgroundThe consistency of the magnetorheological process insisted that the Inconel® 718 material should be furnished. This process involves every material from the categories of soft and hard materials.
AimIn this study, a cylindrical ferromagnetic work-part was finished using the magnetorheological finishing method.
ObjectiveThe strength of the magnetic flux controls the density and forces in processes that are assisted by magnetic fields. The mechanism was studied parametrically in this research work using response surface methodology.
MethodsOptimal process parameters were determined using response surface methodology to accurately execute the finishing procedure. Each parameter's percentage consumption to the process's finishing output was also estimated. The finishing of an industrial extrusion punch was carried out using the optimum parameters obtained from the parametric analysis.
ResultsThe RSM optimisation of process parameters is validated using the batch gradient descent (BGD) algorithm which is the best fit and innovation algorithm for these types of optimization solutions. The mathematical model that BGD provides confirms the RSM mathematical model.
ConclusionThe optimized parameters are useful in controlling the capability of the MR finishing process in various industrial applications.
-
-
-
Leading-edge Sentiment Analysis: A Survey of Application Context, Challenges and Advanced Techniques
Authors: Barkha Wadhvani, Jigesh Mehta, Kaushal Singh, Ankit Oza, Sandeep Kumar, Sarita Gupta and Rajeev SobtiBackgroundData is rapidly expanding in today's digital age. The reason for the expansion of data is due to social media sites. The internet produces an enormous quantity of unstructured data every second. Numerous users have many opinions and reviews to impart on everything from items and services to common pastimes. Opinions, feelings, attitudes, impressions, etc., concerning subjects, products, and services are collected and analyzed through a method called sentiment analysis. Web-based networking mediums that rely on textual communication can be overwhelming. Understanding human psychology requires the real-time processing of data using techniques like sentiment analysis.
AimsThis study provides a thorough examination of the differences between methods of sentiment analysis, as well as its obstacles and emerging trends. The paper exemplifies the analysis's practical uses, examines its challenges, and outlines common methods of conducting it.
ObjectiveThe objective of the current overview is to better understand the market, gauge public opinion, and make strategic decisions. In addition, enterprises, governments, and scholars can all benefit from conducting a sentiment analysis.
MethodsIn this study, we review and categorize the most widely applied methods of deep learning and machine learning for analyzing sentiment. From the paper, we learn that which sentiment analysis technique is the best depends on the data at hand. When confronted with large amounts of data and a lengthy procedure, traditional machine learning-based algorithms flop. The ability to train deep learning models to learn more features using larger datasets is why they currently beat machine learning methodologies. Considerations include textual and temporal context, as well as data volume.
ResultsRegardless of the fact that the English language has traditionally been the focus of research in this field, other spoken languages have recently attracted a growing amount of interest. The lack of resources for these languages continues to present numerous obstacles. Consequently, it can be an intriguing line of future effort to tackle other natural languages outside English by generating beneficial resources like building databases and addressing the problems with Natural language processing that have been stated in the context of sentiment examination.
ConclusionThe difficulties of sentiment analysis are examined as well, with the goal of illuminating potential solutions.
-
-
-
Application of Remote Sensing Image Classification Utilising Deep Learning in Technological Domains
Remote sensing technology is a powerful tool for a wide range of applications, from medical diagnoses to environmental monitoring. Quality inspection, inventory management, environmental monitoring, supply chain analysis, and predictive maintenance are just a few of the many industrial uses for remote sensing image classification using deep learning. It's a tool for lowering production costs without sacrificing quality or long-term viability. Remote sensing image classification with deep learning aids production and sustainability by offering data-driven decision-making and useful insights. In this paper, we review the application of deep learning techniques in the field of remote sensing data analysis. This paper aims to investigate several techniques for visualising model decisions and to attribute them to specific aspects within the dataset. The proposed techniques include deep convolutional neural networks (CNNs) with saliency stream and RGB stream fusion techniques. In addition, we also discuss the use of extreme learning machine (ELM) classifiers with fused features as input for results. Finally, we discuss the performance of the proposed techniques on the UC Merced Land-Use dataset, Aerial Image dataset (AID), and NWPU-RESISC45 datasets. The results of the experiments demonstrate that the proposed techniques outperform other existing techniques. Additionally, the fused features from different streams improve the performance of the model significantly. This paper focused on information on various related research works and their models, including datasets. The main purpose is to make the already existing bridge between social life and the computer system even more robust.
-
-
-
Development of Synchronization Selection Method in IoT with Secure Channel Bidirectional Communication
Authors: Rupinder Kaur, Sarpreet Singh, Jashanpreet Singh and Rahul KumarBackgroundThe rapid development of wireless communications and mobile computation has given rise to the novel Internet of Things (IoT) systems, which is causing considerable research attention and industrial development. However, the lack of synchronization between the timers of IoT devices compromises the network's security.
AimThe purpose of this patent application is to present a technique for synchronizing the timepieces of IoT gadgets and establishing a secure channel for the transmission of data from source to destination.
ObjectiveThis study proposes a Synchronization Selection Method (SSM) for IoT systems to enhance network security and reduce packet loss.
MethodsThe method utilizes time-lay synchronization and RSA algorithm-based secure channel establishment. Time lay is a technique that was developed for IoT devices to achieve efficient clock synchronization of sensor nodes. Before synchronizing the sensor nodes' timings, the cluster leaders initiate the process. Utilizing a finite number of nodes, the proposed method was executed in MATLAB.
ResultsTime-lay synchronization involves all network nodes synchronizing their clocks with a third-party clock. In the context of time-lay synchronization, the term “third-party clock” refers to a single specific point that contains the time signal that all nodes in the network use as a reference. This third-party clock is outside of the network nodes and acts as the standard for the precise and synchronized time within the network. Therefore, it can be deduced that each of the techniques possesses its advantages and disadvantages. Each of the synchronization techniques has the potential to significantly benefit the IoT by offering smart clock synchronization that is more secure. Experimental results demonstrate that the proposed method improves throughput and reduces packet loss compared to existing techniques.
ConclusionThe potential of this patent is highly significant for solving the synchronization problem of IoT devices and enhancing network security with decreased network packet loss.
OtherThe SSM would be assessed using the parameters of packet loss and throughput.
-
Most Read This Month Most Read RSS feed
