期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Insights into Manipulation: Unveiling Tampered Images Using Modified ELA, Deep Learning, and Explainable AI
1
作者 md. Mehedi Hasan md. Masud Rana abu sayed md. mostafizur rahaman 《Journal of Computer and Communications》 2024年第6期135-151,共17页
Digital image forgery (DIF) is a prevalent issue in the modern age, where malicious actors manipulate images for various purposes, including deception and misinformation. Detecting such forgeries is a critical task fo... Digital image forgery (DIF) is a prevalent issue in the modern age, where malicious actors manipulate images for various purposes, including deception and misinformation. Detecting such forgeries is a critical task for maintaining the integrity of digital content. This thesis explores the use of Modified Error Level Analysis (ELA) in combination with a Convolutional Neural Network (CNN), as well as, Feedforward Neural Network (FNN) model to detect digital image forgeries. Additionally, incorporation of Explainable Artificial Intelligence (XAI) to this research provided insights into the process of decision-making by the models. The study trains and tests the models on the CASIA2 dataset, emphasizing both authentic and forged images. The CNN model is trained and evaluated, and Explainable AI (SHapley Additive exPlanation— SHAP) is incorporated to explain the model’s predictions. Similarly, the FNN model is trained and evaluated, and XAI (SHAP) is incorporated to explain the model’s predictions. The results obtained from the analysis reveals that the proposed approach using CNN model is most effective in detecting image forgeries and provides valuable explanations for decision interpretability. 展开更多
关键词 IFD DIF ELA CNN FNN XAI SHAP CASIA2.0
下载PDF
Data Classification Using Combination of Five Machine Learning Techniques
2
作者 md. Habibur Rahman Jesmin Akhter +1 位作者 abu sayed md. mostafizur rahaman md. Imdadul Islam 《Journal of Computer and Communications》 2021年第12期48-62,共15页
Data clustering plays a vital role in object identification. In real life we mainly use the concept in biometric identification and object detection. In this paper we use Fuzzy Weighted Rules, Fuzzy Inference System (... Data clustering plays a vital role in object identification. In real life we mainly use the concept in biometric identification and object detection. In this paper we use Fuzzy Weighted Rules, Fuzzy Inference System (FIS), Fuzzy C-Mean clustering (FCM), Support Vector Machine (SVM) and Artificial Neural Network (ANN) to distinguish three types of Iris data called Iris-Setosa, Iris-Versicolor and Iris-Virginica. Each class in the data table is identified by four-dimensional vector, where vectors are used as the input variable called: Sepal Length (SL), Sepal Width (SW), Petal Length (PL) and Petal Width (PW). The combination of five machine learning methods provides above 98% accuracy of class identification. 展开更多
关键词 Co-Variance of Fuzzy Rule Objective Function Surface Plot Confusion Matrix Scatterplot and Accuracy of Detection
下载PDF
Traffic Modelling of Low Dense Femtocellular Network for Long Term Evolution
3
作者 Jesmin Akhter abu sayed md. mostafizur rahaman +1 位作者 md. Imdadul Islam M. R. Amin 《Journal of Computer and Communications》 2019年第12期88-101,共14页
One of the features of Long Term Evolution (LTE) is the deployment of femtocells as the underlain cell of a macrocell without any intervention of frequency planning to offload the traffic. In this paper we used Markov... One of the features of Long Term Evolution (LTE) is the deployment of femtocells as the underlain cell of a macrocell without any intervention of frequency planning to offload the traffic. In this paper we used Markov chain to derive the expression of blocking probability for both macro and femtocell in terms of traffic parameters of the network. We developed an analytical model to find the expression of probability of forced termination (FT) using combination of mobility model and probability tree considering low dense femtocellular network. Two different trees were designed: a newly originating call which starts its session in a femtocell and that of in a macro cell. The link parameters of small scale fading of wireless network under Multiple Input Multiple Output (MIMO) are combined with the proposed traffic model to get the probability of FT of a real-life network. A new state transition chain was also developed including its solution for LTE traffic of variable bandwidth (BW) and a comparison was made with Erlang’s traffic model. 展开更多
关键词 RAYLEIGH and Nakagami-m FADING MIMO RB FORCED Termination OUTAGE Probability
下载PDF
Determination of Array Gain of Single Hop to Achieve the Performance of a 2-Hop Wireless Link
4
作者 abu sayed md. mostafizur rahaman Jesmin Akhter +1 位作者 md. Rafsan Jani md. Imdadul Islam 《Journal of Computer and Communications》 2018年第7期84-98,共15页
In adaptive beamforming system adaptive algorithm of digital filter is applied to update the weighting vector of the antenna elements to get antenna gain along the desired direction and attenuation along the jammer. T... In adaptive beamforming system adaptive algorithm of digital filter is applied to update the weighting vector of the antenna elements to get antenna gain along the desired direction and attenuation along the jammer. The objective of the paper is to evaluate the threshold gain of the adaptive beam former along the line of sight (LOS) between the transmitter and the receiver (including jammer suppression) to make the single hop link comparable with 2-hop link. The single hop and 2-hop communication systems are compared in context of symbol error rate (SER) under fading condition theoretically and verified by simulation. Finally we evaluate the numerical value of threshold gain of adaptive beamformer of two antenna elements under Rayleigh and Nakagami-m fading conditions. 展开更多
关键词 ARRAY Antenna System BER THRESHOLD ARRAY GAIN Side LOBE Canceller Path Loss
下载PDF
Performance Evaluation of Multiple Classifiers for Predicting Fake News
5
作者 Arzina Tasnim md. Saiduzzaman +2 位作者 Mohammad Arafat Rahman Jesmin Akhter abu sayed md. mostafizur rahaman 《Journal of Computer and Communications》 2022年第9期1-21,共21页
The rise of fake news on social media has had a detrimental effect on society. Numerous performance evaluations on classifiers that can detect fake news have previously been undertaken by researchers in this area. To ... The rise of fake news on social media has had a detrimental effect on society. Numerous performance evaluations on classifiers that can detect fake news have previously been undertaken by researchers in this area. To assess their performance, we used 14 different classifiers in this study. Secondly, we looked at how soft voting and hard voting classifiers performed in a mixture of distinct individual classifiers. Finally, heuristics are used to create 9 models of stacking classifiers. The F1 score, prediction, recall, and accuracy have all been used to assess performance. Models 6 and 7 achieved the best accuracy of 96.13 while having a larger computational complexity. For benchmarking purposes, other individual classifiers are also tested. 展开更多
关键词 Fake News Machine Learning TF-IDF CLASSIFIER Estimator F1 Score RECALL Precision Voting Classifiers Stacking Classifier Soft Voting Hard Voting
下载PDF
Towards the Advancement of Cashless Transaction: A Security Analysis of Electronic Payment Systems
6
作者 Iffath Tanjim Moon Muhammad Shamsuzzaman +1 位作者 Muhammad Musfiqur Rahman Mridha abu sayed md. mostafizur rahaman 《Journal of Computer and Communications》 2022年第7期103-129,共27页
In recent decades, day-to-day lifestyle requires online payments as easy and simple solutions to several financial transactions, which makes the concept of Electronic payment Systems very popular in the growth of a ca... In recent decades, day-to-day lifestyle requires online payments as easy and simple solutions to several financial transactions, which makes the concept of Electronic payment Systems very popular in the growth of a cashless society. In fact, cashless transactions through simple mobile apps are not merely a concept anymore rather are implemented robustly and being used extensively. On the dark side, obvious financial benefits are making these apps vulnerable to being attacked, which can be successful through security breaches. These cybersecurity issues need to be traced out and resolved to make the financial transactions through an app secure and trustworthy. In this paper, several related papers are analyzed to trace out possible cybersecurity issues in the domain of Electronic Transaction System. The objective is to establish sufficient theoretical background to propose methodologies for measuring security issues and also identify the security strength of any FinTech application and provide standard security metrics. 展开更多
关键词 Fintech Apps CYBERSECURITY Cashless Transaction Mobile Banking Electronic Payment
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部