A graph invariant is a number that can be easily and uniquely calculated through a graph.Recently,part of mathematical graph invariants has been portrayed and utilized for relationship examination.Nevertheless,no reli...A graph invariant is a number that can be easily and uniquely calculated through a graph.Recently,part of mathematical graph invariants has been portrayed and utilized for relationship examination.Nevertheless,no reliable appraisal has been embraced to pick,how much these invariants are associated with a network graph in interconnection networks of various fields of computer science,physics,and chemistry.In this paper,the study talks about sudoku networks will be networks of fractal nature having some applications in computer science like sudoku puzzle game,intelligent systems,Local area network(LAN)development and parallel processors interconnections,music composition creation,physics like power generation interconnections,Photovoltaic(PV)cells and chemistry,synthesis of chemical compounds.These networks are generally utilized in disorder,fractals,recursive groupings,and complex frameworks.Our outcomes are the normal speculations of currently accessible outcomes for specific classes of such kinds of networks of two unmistakable sorts with two invariants K-banhatti sombor(KBSO)invariants,Irregularity sombor(ISO)index,Contraharmonic-quadratic invariants(CQIs)and dharwad invariants with their reduced forms.The study solved the Sudoku network used in mentioned systems to improve the performance and find irregularities present in them.The calculated outcomes can be utilized for the modeling,scalability,introduction of new architectures of sudoku puzzle games,intelligent systems,PV cells,interconnection networks,chemical compounds,and extremely huge scope in very large-scale integrated circuits(VLSI)of processors.展开更多
The current study proposes a novel technique for feature selection by inculcating robustness in the conventional Signal to noise Ratio(SNR).The proposed method utilizes the robust measures of location i.e.,the“Median...The current study proposes a novel technique for feature selection by inculcating robustness in the conventional Signal to noise Ratio(SNR).The proposed method utilizes the robust measures of location i.e.,the“Median”as well as the measures of variation i.e.,“Median absolute deviation(MAD)and Interquartile range(IQR)”in the SNR.By this way,two independent robust signal-to-noise ratios have been proposed.The proposed method selects the most informative genes/features by combining the minimum subset of genes or features obtained via the greedy search approach with top-ranked genes selected through the robust signal-to-noise ratio(RSNR).The results obtained via the proposed method are compared with wellknown gene/feature selection methods on the basis of performance metric i.e.,classification error rate.A total of 5 gene expression datasets have been used in this study.Different subsets of informative genes are selected by the proposed and all the other methods included in the study,and their efficacy in terms of classification is investigated by using the classifier models such as support vector machine(SVM),Random forest(RF)and k-nearest neighbors(k-NN).The results of the analysis reveal that the proposed method(RSNR)produces minimum error rates than all the other competing feature selection methods in majority of the cases.For further assessment of the method,a detailed simulation study is also conducted.展开更多
In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates ...In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates distortions(which lead to an increase in the detection probability).In this article,we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security.The proposed method selects two adjacent gray pixels whose least significant bit(LSB)is different from the relevant message bit and then calculates the distortion degree.We use the LSB pairing method to embed the secret matrix of patient record into the cover image and exchange pixel values.Experimental results show that the designed method is robust to different attacks and has a high PSNR(peak signal-to-noise ratio)value.The MRI image quality and imperceptibility are verified by embedding a secret matrix of up to 262,688 bits to achieve an average PSNR of 51.657 dB.In addition,the proposed algorithm is tested against the latest technology on standard images,and it is found that the average PSNR of our proposed reversible watermarking technology is higher(i.e.,51.71 dB).Numerical results show that the algorithm can be extended to normal images and medical images.展开更多
The effectiveness of the Business Intelligence(BI)system mainly depends on the quality of knowledge it produces.The decision-making process is hindered,and the user’s trust is lost,if the knowledge offered is undesir...The effectiveness of the Business Intelligence(BI)system mainly depends on the quality of knowledge it produces.The decision-making process is hindered,and the user’s trust is lost,if the knowledge offered is undesired or of poor quality.A Data Warehouse(DW)is a huge collection of data gathered from many sources and an important part of any BI solution to assist management in making better decisions.The Extract,Transform,and Load(ETL)process is the backbone of a DW system,and it is responsible for moving data from source systems into the DW system.The more mature the ETL process the more reliable the DW system.In this paper,we propose the ETL Maturity Model(EMM)that assists organizations in achieving a high-quality ETL system and thereby enhancing the quality of knowledge produced.The EMM is made up of five levels of maturity i.e.,Chaotic,Acceptable,Stable,Efficient and Reliable.Each level of maturity contains Key Process Areas(KPAs)that have been endorsed by industry experts and include all critical features of a good ETL system.Quality Objectives(QOs)are defined procedures that,when implemented,resulted in a high-quality ETL process.Each KPA has its own set of QOs,the execution of which meets the requirements of that KPA.Multiple brainstorming sessions with relevant industry experts helped to enhance the model.EMMwas deployed in two key projects utilizing multiple case studies to supplement the validation process and support our claim.This model can assist organizations in improving their current ETL process and transforming it into a more mature ETL system.This model can also provide high-quality information to assist users inmaking better decisions and gaining their trust.展开更多
Today,road safety remains a serious concern for governments around the world.In fact,approximately 1.35 million people die and 2–50 million are injured on public roads worldwide each year.Straight bends in road traff...Today,road safety remains a serious concern for governments around the world.In fact,approximately 1.35 million people die and 2–50 million are injured on public roads worldwide each year.Straight bends in road traffic are the main cause of many road accidents,and excessive and inappropriate speed in this very critical area can cause drivers to lose their vehicle stability.For these reasons,new solutions must be considered to stop this disaster and save lives.Therefore,it is necessary to study this topic very carefully and use new technologies such as Vehicle Ad Hoc Networks(VANET),Internet of Things(IoT),Multi-Agent Systems(MAS)and Embedded Systems to create a new system to serve the purpose.Therefore,the efficient and intelligent operation of the VANET network can avoid such problems as it provides drivers with the necessary real-time traffic data.Thus,drivers are able to drive their vehicles under correct and realistic conditions.In this document,we propose a speed adaptation scheme for winding road situations.Our proposed scheme is based on MAS technology,the main goal of which is to provide drivers with the information they need to calculate the speed limit they must not exceed in order to maintain balance in dangerous areas,especially in curves.The proposed scheme provides flexibility,adaptability,and maintainability for traffic information,taking into account the state of infrastructure and metering conditions of the road,as well as the characteristics and behavior of vehicles.展开更多
The exponential growth in the development of smartphones and handheld devices is permeated due to everyday activities i.e.,games applications,entertainment,online banking,social network sites,etc.,and also allow the e...The exponential growth in the development of smartphones and handheld devices is permeated due to everyday activities i.e.,games applications,entertainment,online banking,social network sites,etc.,and also allow the end users to perform a variety of activities.Because of activities,mobile devices attract cybercriminals to initiate an attack over a diverse range of malicious activities such as theft of unauthorized information,phishing,spamming,Distributed Denial of Services(DDoS),and malware dissemination.Botnet applications are a type of harmful attack that can be used to launch malicious activities and has become a significant threat in the research area.A botnet is a collection of infected devices that are managed by a botmaster and communicate with each other via a command server in order to carry out malicious attacks.With the rise in malicious attacks,detecting botnet applications has become more challenging.Therefore,it is essential to investigate mobile botnet attacks to uncover the security issues in severe financial and ethical damages caused by a massive coordinated command server.Current state of the art,various solutions were provided for the detection of botnet applications,but in general,the researchers suffer various techniques of machine learning-based methods with static features which are usually ineffective when obfuscation techniques are used for the detection of botnet applications.In this paper,we propose an approach by exploring the concept of a deep learning-based method and present a well-defined Convolutional Neural Network(CNN)model.Using the visualization approach,we obtain the colored images through byte code files of applications and perform an experiment.For analysis of the results of an experiment,we differentiate the performance of the model from other existing research studies.Furthermore,our method outperforms with 94.34%accuracy,92.9%of precision,and 92%of recall.展开更多
Daily newspapers publish a tremendous amount of information disseminated through the Internet.Freely available and easily accessible large online repositories are not indexed and are in an un-processable format.The ma...Daily newspapers publish a tremendous amount of information disseminated through the Internet.Freely available and easily accessible large online repositories are not indexed and are in an un-processable format.The major hindrance in developing and evaluating existing/new monolingual text in an image is that it is not linked and indexed.There is no method to reuse the online news images because of the unavailability of standardized benchmark corpora,especially for South Asian languages.The corpus is a vital resource for developing and evaluating text in an image to reuse local news systems in general and specifically for the Urdu language.Lack of indexing,primarily semantic indexing of the daily news items,makes news items impracticable for any querying.Moreover,the most straightforward search facility does not support these unindexed news resources.Our study addresses this gap by associating and marking the newspaper images with one of the widely spoken but under-resourced languages,i.e.,Urdu.The present work proposed a method to build a benchmark corpus of news in image form by introducing a web crawler.The corpus is then semantically linked and annotated with daily news items.Two techniques are proposed for image annotation,free annotation and fixed cross examination annotation.The second technique got higher accuracy.Build news ontology in protégéusing OntologyWeb Language(OWL)language and indexed the annotations under it.The application is also built and linked with protégéso that the readers and journalists have an interface to query the news items directly.Similarly,news items linked together will provide complete coverage and bring together different opinions at a single location for readers to do the analysis themselves.展开更多
In this era of electronic health,healthcare data is very important because it contains information about human survival.In addition,the Internet of Things(IoT)revolution has redefined modern healthcare systems and man...In this era of electronic health,healthcare data is very important because it contains information about human survival.In addition,the Internet of Things(IoT)revolution has redefined modern healthcare systems and management by providing continuous monitoring.In this case,the data related to the heart is more important and requires proper analysis.For the analysis of heart data,Electrocardiogram(ECG)is used.In this work,machine learning techniques,such as adaptive boosting(AdaBoost)is used for detecting normal sinus rhythm,atrial fibrillation(AF),and noise in ECG signals to improve the classification accuracy.The proposed model uses ECG signals as input and provides results in the form of the presence or absence of disease AF,and classifies other signals as normal,other,or noise.This article derives different features from the signal using Maximal Information Coefficient(MIC)and minimum Redundancy Maximum Relevance(mRMR)technique,and then classifies them based on their attributes.Since the ECG contains some kind of noise and irregular data streams so the purpose of this study is to remove artifacts from the ECG signal by deploying the method of Second-Order-Section(SOS)(filter)and correctly classify them.Several features were extracted to improve the detection of ECG data.Compared with existing methods,this work gives promising results and can help improve the classification accuracy of the ECG signals.展开更多
The device-to-device(D2D)technology performs explicit communication between the terminal and the base station(BS)terminal,so there is no need to transmit data through the BS system.The establishment of a short-distanc...The device-to-device(D2D)technology performs explicit communication between the terminal and the base station(BS)terminal,so there is no need to transmit data through the BS system.The establishment of a short-distance D2D communication link can greatly reduce the burden on the BS server.At present,D2D is one of the key technologies in 5G technology and has been studied in depth.D2D communication reuses the resources of cellular users to improve system key parameters like utilization and throughput.However,repeated use of the spectrum and coexistence of cellular users can cause co-channel interference.Aiming at the interference problem under the constraint of fair resource allocation and improving the system throughput,this paper proposes an effective resource optimization scheme based on the firework method.The main idea is to expand the weighted sum rate and convert the allocated resource expression into fireworks to determine the correlation matrix.The simulation results show that,compared with the existing scheme,this scheme improves system performance by reducing interference.展开更多
The research volume increases at the study rate,causing massive text corpora.Due to these enormous text corpora,we are drowning in data and starving for information.Therefore,recent research employed different text mi...The research volume increases at the study rate,causing massive text corpora.Due to these enormous text corpora,we are drowning in data and starving for information.Therefore,recent research employed different text mining approaches to extract information from this text corpus.These proposed approaches extract meaningful and precise phrases that effectively describe the text’s information.These extracted phrases are commonly termed keyphrases.Further,these key phrases are employed to determine the different fields of study trends.Moreover,these key phrases can also be used to determine the spatiotemporal trends in the various research fields.In this research,the progress of a research field can be better revealed through spatiotemporal bibliographic trend analysis.Therefore,an effective spatiotemporal trend extraction mechanism is required to disclose textile research trends of particular regions during a specific period.This study collected a diversified dataset of textile research from 2011–2019 and different countries to determine the research trend.This data was collected from various open access journals.Further,this research determined the spatiotemporal trends using quality phrasemining.This research also focused on finding the research collaboration of different countries in a particular research subject.The research collaborations of other countries’researchers show the impact on import and export of those countries.The visualization approach is also incorporated to understand the results better.展开更多
Wind energy is featured by instability due to a number of factors,such as weather,season,time of the day,climatic area and so on.Furthermore,instability in the generation of wind energy brings new challenges to electr...Wind energy is featured by instability due to a number of factors,such as weather,season,time of the day,climatic area and so on.Furthermore,instability in the generation of wind energy brings new challenges to electric power grids,such as reliability,flexibility,and power quality.This transition requires a plethora of advanced techniques for accurate forecasting of wind energy.In this context,wind energy forecasting is closely tied to machine learning(ML)and deep learning(DL)as emerging technologies to create an intelligent energy management paradigm.This article attempts to address the short-term wind energy forecasting problem in Estonia using a historical wind energy generation data set.Moreover,we taxonomically delve into the state-of-the-art ML and DL algorithms for wind energy forecasting and implement different trending ML and DL algorithms for the day-ahead forecast.For the selection of model parameters,a detailed exploratory data analysis is conducted.All models are trained on a real-time Estonian wind energy generation dataset for the first time with a frequency of 1 h.The main objective of the study is to foster an efficient forecasting technique for Estonia.The comparative analysis of the results indicates that Support Vector Machine(SVM),Non-linear Autoregressive Neural Networks(NAR),and Recurrent Neural Network-Long-Term Short-Term Memory(RNNLSTM)are respectively 10%,25%,and 32%more efficient compared to TSO’s forecasting algorithm.Therefore,RNN-LSTM is the best-suited and computationally effective DL method for wind energy forecasting in Estonia and will serve as a futuristic solution.展开更多
Many patients have begun to use mobile applications to handle different health needs because they can better access high-speed Internet and smartphones.These devices and mobile applications are now increasingly used a...Many patients have begun to use mobile applications to handle different health needs because they can better access high-speed Internet and smartphones.These devices and mobile applications are now increasingly used and integrated through the medical Internet of Things(mIoT).mIoT is an important part of the digital transformation of healthcare,because it can introduce new business models and allow efficiency improvements,cost control and improve patient experience.In the mIoT system,when migrating from traditional medical services to electronic medical services,patient protection and privacy are the priorities of each stakeholder.Therefore,it is recommended to use different user authentication and authorization methods to improve security and privacy.In this paper,our prosed model involves a shared identity verification process with different situations in the e-health system.We aim to reduce the strict and formal specification of the joint key authentication model.We use the AVISPA tool to verify through the wellknown HLPSL specification language to develop user authentication and smart card use cases in a user-friendly environment.Our model has economic and strategic advantages for healthcare organizations and healthcare workers.The medical staff can increase their knowledge and ability to analyze medical data more easily.Our model can continuously track health indicators to automatically manage treatments and monitor health data in real time.Further,it can help customers prevent chronic diseases with the enhanced cognitive functions support.The necessity for efficient identity verification in e-health care is even more crucial for cognitive mitigation because we increasingly rely on mIoT systems.展开更多
English to Urdu machine translation is still in its beginning and lacks simple translation methods to provide motivating and adequate English to Urdu translation.In order tomake knowledge available to the masses,there...English to Urdu machine translation is still in its beginning and lacks simple translation methods to provide motivating and adequate English to Urdu translation.In order tomake knowledge available to the masses,there should be mechanisms and tools in place to make things understandable by translating from source language to target language in an automated fashion.Machine translation has achieved this goal with encouraging results.When decoding the source text into the target language,the translator checks all the characteristics of the text.To achieve machine translation,rule-based,computational,hybrid and neural machine translation approaches have been proposed to automate the work.In this research work,a neural machine translation approach is employed to translate English text into Urdu.Long Short Term Short Model(LSTM)Encoder Decoder is used to translate English to Urdu.The various steps required to perform translation tasks include preprocessing,tokenization,grammar and sentence structure analysis,word embeddings,training data preparation,encoder-decoder models,and output text generation.The results show that the model used in the research work shows better performance in translation.The results were evaluated using bilingual research metrics and showed that the test and training data yielded the highest score sequences with an effective length of ten(10).展开更多
A comprehensive understanding of human intelligence is still an ongoing process,i.e.,human and information security are not yet perfectly matched.By understanding cognitive processes,designers can design humanized cog...A comprehensive understanding of human intelligence is still an ongoing process,i.e.,human and information security are not yet perfectly matched.By understanding cognitive processes,designers can design humanized cognitive information systems(CIS).The need for this research is justified because today’s business decision makers are faced with questions they cannot answer in a given amount of time without the use of cognitive information systems.The researchers aim to better strengthen cognitive information systems with more pronounced cognitive thresholds by demonstrating the resilience of cognitive resonant frequencies to reveal possible responses to improve the efficiency of human-computer interaction(HCI).Apractice-oriented research approach included research analysis and a review of existing articles to pursue a comparative research model;thereafter,amodel development paradigm was used to observe and monitor the progression of CIS during HCI.The scope of our research provides a broader perspective on how different disciplines affect HCI and how human cognitive models can be enhanced to enrich complements.We have identified a significant gap in the current literature on mental processing resulting from a wide range of theory and practice.展开更多
Industrial automation or assembly automation is a strictly monitored environment,in which changes occur at a good speed.There are many types of entities in the focusing environment,and the data generated by these devi...Industrial automation or assembly automation is a strictly monitored environment,in which changes occur at a good speed.There are many types of entities in the focusing environment,and the data generated by these devices is huge.In addition,because the robustness is achieved by sensing redundant data,the data becomes larger.The data generating device,whether it is a sensing device or a physical device,streams the data to a higher-level deception device for calculation,so that it can be driven and configured according to the updated conditions.With the emergence of the Industry 4.0 concept that includes a variety of automation technologies,various data is generated through numerous devices.Therefore,the data generated for industrial automation requires unique Information Architecture(IA).IA should be able to satisfy hard real-time constraints to spontaneously change the environment and the instantaneous configuration of all participants.To understand its applicability,we used an example smart grid analogy.The smart grid system needs an IA to fulfill the communication requirements to report the hard real-time changes in the power immediately following the system.In addition,in a smart grid system,it needs to report changes on either side of the system,i.e.,consumers and suppliers configure and reconfigure the system according to the changes.In this article,we propose an analogy of a physical phenomenon.A point charge is used as a data generating device,the streamline of electric flux is used as a data flow,and the charge distribution on a closed surface is used as a configuration.Finally,the intensity changes are used in the physical process,e.g.,the smart grid.This analogy is explained by metaphors,and the structural mapping framework is used for its theoretical proof.The proposed analogy provides a theoretical basis for the development of such information architectures that can represent data flows,definition changes(deterministic and non-deterministic),events,and instantaneous configuration definitions of entities in the system.The proposed analogy provides a mechanism to perform calculations during communication, using a simpleconcept on the closed surface to integrate two-layer cyber-physical systems(computation, communication, and physical process). The proposed analogyis a good candidate for implementation in smart grid security.展开更多
基金King Saud University through Researchers Supporting Project number(RSP2022R426),King Saud University,Riyadh,Saudi Arabia.
文摘A graph invariant is a number that can be easily and uniquely calculated through a graph.Recently,part of mathematical graph invariants has been portrayed and utilized for relationship examination.Nevertheless,no reliable appraisal has been embraced to pick,how much these invariants are associated with a network graph in interconnection networks of various fields of computer science,physics,and chemistry.In this paper,the study talks about sudoku networks will be networks of fractal nature having some applications in computer science like sudoku puzzle game,intelligent systems,Local area network(LAN)development and parallel processors interconnections,music composition creation,physics like power generation interconnections,Photovoltaic(PV)cells and chemistry,synthesis of chemical compounds.These networks are generally utilized in disorder,fractals,recursive groupings,and complex frameworks.Our outcomes are the normal speculations of currently accessible outcomes for specific classes of such kinds of networks of two unmistakable sorts with two invariants K-banhatti sombor(KBSO)invariants,Irregularity sombor(ISO)index,Contraharmonic-quadratic invariants(CQIs)and dharwad invariants with their reduced forms.The study solved the Sudoku network used in mentioned systems to improve the performance and find irregularities present in them.The calculated outcomes can be utilized for the modeling,scalability,introduction of new architectures of sudoku puzzle games,intelligent systems,PV cells,interconnection networks,chemical compounds,and extremely huge scope in very large-scale integrated circuits(VLSI)of processors.
基金King Saud University for funding this work through Researchers Supporting Project Number(RSP2022R426),King Saud University,Riyadh,Saudi Arabia.
文摘The current study proposes a novel technique for feature selection by inculcating robustness in the conventional Signal to noise Ratio(SNR).The proposed method utilizes the robust measures of location i.e.,the“Median”as well as the measures of variation i.e.,“Median absolute deviation(MAD)and Interquartile range(IQR)”in the SNR.By this way,two independent robust signal-to-noise ratios have been proposed.The proposed method selects the most informative genes/features by combining the minimum subset of genes or features obtained via the greedy search approach with top-ranked genes selected through the robust signal-to-noise ratio(RSNR).The results obtained via the proposed method are compared with wellknown gene/feature selection methods on the basis of performance metric i.e.,classification error rate.A total of 5 gene expression datasets have been used in this study.Different subsets of informative genes are selected by the proposed and all the other methods included in the study,and their efficacy in terms of classification is investigated by using the classifier models such as support vector machine(SVM),Random forest(RF)and k-nearest neighbors(k-NN).The results of the analysis reveal that the proposed method(RSNR)produces minimum error rates than all the other competing feature selection methods in majority of the cases.For further assessment of the method,a detailed simulation study is also conducted.
基金This work is supported by the National Natural Science Foundation of China(Grant 61762060)Educational Commission of Gansu Province,China(Grant 2017C-05)Foundation for the Key Research and Development Program of Gansu Province,China(Grant 20YF3GA016).
文摘In telemedicine,the realization of reversible watermarking through information security is an emerging research field.However,adding watermarks hinders the distribution of pixels in the cover image because it creates distortions(which lead to an increase in the detection probability).In this article,we introduce a reversible watermarking method that can transmit medical images with minimal distortion and high security.The proposed method selects two adjacent gray pixels whose least significant bit(LSB)is different from the relevant message bit and then calculates the distortion degree.We use the LSB pairing method to embed the secret matrix of patient record into the cover image and exchange pixel values.Experimental results show that the designed method is robust to different attacks and has a high PSNR(peak signal-to-noise ratio)value.The MRI image quality and imperceptibility are verified by embedding a secret matrix of up to 262,688 bits to achieve an average PSNR of 51.657 dB.In addition,the proposed algorithm is tested against the latest technology on standard images,and it is found that the average PSNR of our proposed reversible watermarking technology is higher(i.e.,51.71 dB).Numerical results show that the algorithm can be extended to normal images and medical images.
基金King Saud University for funding this work through Researchers Supporting Project Number(RSP-2021/387),King Saud University,Riyadh,Saudi Arabia.
文摘The effectiveness of the Business Intelligence(BI)system mainly depends on the quality of knowledge it produces.The decision-making process is hindered,and the user’s trust is lost,if the knowledge offered is undesired or of poor quality.A Data Warehouse(DW)is a huge collection of data gathered from many sources and an important part of any BI solution to assist management in making better decisions.The Extract,Transform,and Load(ETL)process is the backbone of a DW system,and it is responsible for moving data from source systems into the DW system.The more mature the ETL process the more reliable the DW system.In this paper,we propose the ETL Maturity Model(EMM)that assists organizations in achieving a high-quality ETL system and thereby enhancing the quality of knowledge produced.The EMM is made up of five levels of maturity i.e.,Chaotic,Acceptable,Stable,Efficient and Reliable.Each level of maturity contains Key Process Areas(KPAs)that have been endorsed by industry experts and include all critical features of a good ETL system.Quality Objectives(QOs)are defined procedures that,when implemented,resulted in a high-quality ETL process.Each KPA has its own set of QOs,the execution of which meets the requirements of that KPA.Multiple brainstorming sessions with relevant industry experts helped to enhance the model.EMMwas deployed in two key projects utilizing multiple case studies to supplement the validation process and support our claim.This model can assist organizations in improving their current ETL process and transforming it into a more mature ETL system.This model can also provide high-quality information to assist users inmaking better decisions and gaining their trust.
基金King Saud University through Researchers Support-ing Project number(RSP-2021/387),King Saud University,Riyadh,Saudi Arabia。
文摘Today,road safety remains a serious concern for governments around the world.In fact,approximately 1.35 million people die and 2–50 million are injured on public roads worldwide each year.Straight bends in road traffic are the main cause of many road accidents,and excessive and inappropriate speed in this very critical area can cause drivers to lose their vehicle stability.For these reasons,new solutions must be considered to stop this disaster and save lives.Therefore,it is necessary to study this topic very carefully and use new technologies such as Vehicle Ad Hoc Networks(VANET),Internet of Things(IoT),Multi-Agent Systems(MAS)and Embedded Systems to create a new system to serve the purpose.Therefore,the efficient and intelligent operation of the VANET network can avoid such problems as it provides drivers with the necessary real-time traffic data.Thus,drivers are able to drive their vehicles under correct and realistic conditions.In this document,we propose a speed adaptation scheme for winding road situations.Our proposed scheme is based on MAS technology,the main goal of which is to provide drivers with the information they need to calculate the speed limit they must not exceed in order to maintain balance in dangerous areas,especially in curves.The proposed scheme provides flexibility,adaptability,and maintainability for traffic information,taking into account the state of infrastructure and metering conditions of the road,as well as the characteristics and behavior of vehicles.
文摘The exponential growth in the development of smartphones and handheld devices is permeated due to everyday activities i.e.,games applications,entertainment,online banking,social network sites,etc.,and also allow the end users to perform a variety of activities.Because of activities,mobile devices attract cybercriminals to initiate an attack over a diverse range of malicious activities such as theft of unauthorized information,phishing,spamming,Distributed Denial of Services(DDoS),and malware dissemination.Botnet applications are a type of harmful attack that can be used to launch malicious activities and has become a significant threat in the research area.A botnet is a collection of infected devices that are managed by a botmaster and communicate with each other via a command server in order to carry out malicious attacks.With the rise in malicious attacks,detecting botnet applications has become more challenging.Therefore,it is essential to investigate mobile botnet attacks to uncover the security issues in severe financial and ethical damages caused by a massive coordinated command server.Current state of the art,various solutions were provided for the detection of botnet applications,but in general,the researchers suffer various techniques of machine learning-based methods with static features which are usually ineffective when obfuscation techniques are used for the detection of botnet applications.In this paper,we propose an approach by exploring the concept of a deep learning-based method and present a well-defined Convolutional Neural Network(CNN)model.Using the visualization approach,we obtain the colored images through byte code files of applications and perform an experiment.For analysis of the results of an experiment,we differentiate the performance of the model from other existing research studies.Furthermore,our method outperforms with 94.34%accuracy,92.9%of precision,and 92%of recall.
基金King Saud University through Researchers Supporting Project number(RSP-2021/387),King Saud University,Riyadh,Saudi Arabia.
文摘Daily newspapers publish a tremendous amount of information disseminated through the Internet.Freely available and easily accessible large online repositories are not indexed and are in an un-processable format.The major hindrance in developing and evaluating existing/new monolingual text in an image is that it is not linked and indexed.There is no method to reuse the online news images because of the unavailability of standardized benchmark corpora,especially for South Asian languages.The corpus is a vital resource for developing and evaluating text in an image to reuse local news systems in general and specifically for the Urdu language.Lack of indexing,primarily semantic indexing of the daily news items,makes news items impracticable for any querying.Moreover,the most straightforward search facility does not support these unindexed news resources.Our study addresses this gap by associating and marking the newspaper images with one of the widely spoken but under-resourced languages,i.e.,Urdu.The present work proposed a method to build a benchmark corpus of news in image form by introducing a web crawler.The corpus is then semantically linked and annotated with daily news items.Two techniques are proposed for image annotation,free annotation and fixed cross examination annotation.The second technique got higher accuracy.Build news ontology in protégéusing OntologyWeb Language(OWL)language and indexed the annotations under it.The application is also built and linked with protégéso that the readers and journalists have an interface to query the news items directly.Similarly,news items linked together will provide complete coverage and bring together different opinions at a single location for readers to do the analysis themselves.
基金This work was supported by the Deanship of Scientific Research at King Saud University through research group No(RG-1441-425).
文摘In this era of electronic health,healthcare data is very important because it contains information about human survival.In addition,the Internet of Things(IoT)revolution has redefined modern healthcare systems and management by providing continuous monitoring.In this case,the data related to the heart is more important and requires proper analysis.For the analysis of heart data,Electrocardiogram(ECG)is used.In this work,machine learning techniques,such as adaptive boosting(AdaBoost)is used for detecting normal sinus rhythm,atrial fibrillation(AF),and noise in ECG signals to improve the classification accuracy.The proposed model uses ECG signals as input and provides results in the form of the presence or absence of disease AF,and classifies other signals as normal,other,or noise.This article derives different features from the signal using Maximal Information Coefficient(MIC)and minimum Redundancy Maximum Relevance(mRMR)technique,and then classifies them based on their attributes.Since the ECG contains some kind of noise and irregular data streams so the purpose of this study is to remove artifacts from the ECG signal by deploying the method of Second-Order-Section(SOS)(filter)and correctly classify them.Several features were extracted to improve the detection of ECG data.Compared with existing methods,this work gives promising results and can help improve the classification accuracy of the ECG signals.
基金This work was supported by the King Saud University(in Riyadh,Saudi Arabia)through the Researcher Supporting Project Number(RSP-2021/387).
文摘The device-to-device(D2D)technology performs explicit communication between the terminal and the base station(BS)terminal,so there is no need to transmit data through the BS system.The establishment of a short-distance D2D communication link can greatly reduce the burden on the BS server.At present,D2D is one of the key technologies in 5G technology and has been studied in depth.D2D communication reuses the resources of cellular users to improve system key parameters like utilization and throughput.However,repeated use of the spectrum and coexistence of cellular users can cause co-channel interference.Aiming at the interference problem under the constraint of fair resource allocation and improving the system throughput,this paper proposes an effective resource optimization scheme based on the firework method.The main idea is to expand the weighted sum rate and convert the allocated resource expression into fireworks to determine the correlation matrix.The simulation results show that,compared with the existing scheme,this scheme improves system performance by reducing interference.
文摘The research volume increases at the study rate,causing massive text corpora.Due to these enormous text corpora,we are drowning in data and starving for information.Therefore,recent research employed different text mining approaches to extract information from this text corpus.These proposed approaches extract meaningful and precise phrases that effectively describe the text’s information.These extracted phrases are commonly termed keyphrases.Further,these key phrases are employed to determine the different fields of study trends.Moreover,these key phrases can also be used to determine the spatiotemporal trends in the various research fields.In this research,the progress of a research field can be better revealed through spatiotemporal bibliographic trend analysis.Therefore,an effective spatiotemporal trend extraction mechanism is required to disclose textile research trends of particular regions during a specific period.This study collected a diversified dataset of textile research from 2011–2019 and different countries to determine the research trend.This data was collected from various open access journals.Further,this research determined the spatiotemporal trends using quality phrasemining.This research also focused on finding the research collaboration of different countries in a particular research subject.The research collaborations of other countries’researchers show the impact on import and export of those countries.The visualization approach is also incorporated to understand the results better.
基金This work was supported by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2021-2016-0-00313)supervised by the IITP(Institute for Information&Communications Technology Planning&Evaluation).
文摘Wind energy is featured by instability due to a number of factors,such as weather,season,time of the day,climatic area and so on.Furthermore,instability in the generation of wind energy brings new challenges to electric power grids,such as reliability,flexibility,and power quality.This transition requires a plethora of advanced techniques for accurate forecasting of wind energy.In this context,wind energy forecasting is closely tied to machine learning(ML)and deep learning(DL)as emerging technologies to create an intelligent energy management paradigm.This article attempts to address the short-term wind energy forecasting problem in Estonia using a historical wind energy generation data set.Moreover,we taxonomically delve into the state-of-the-art ML and DL algorithms for wind energy forecasting and implement different trending ML and DL algorithms for the day-ahead forecast.For the selection of model parameters,a detailed exploratory data analysis is conducted.All models are trained on a real-time Estonian wind energy generation dataset for the first time with a frequency of 1 h.The main objective of the study is to foster an efficient forecasting technique for Estonia.The comparative analysis of the results indicates that Support Vector Machine(SVM),Non-linear Autoregressive Neural Networks(NAR),and Recurrent Neural Network-Long-Term Short-Term Memory(RNNLSTM)are respectively 10%,25%,and 32%more efficient compared to TSO’s forecasting algorithm.Therefore,RNN-LSTM is the best-suited and computationally effective DL method for wind energy forecasting in Estonia and will serve as a futuristic solution.
基金This work was supported by Taif University(in Taif,Saudi Arabia)through the Researchers Supporting Project Number(TURSP-2020/150).
文摘Many patients have begun to use mobile applications to handle different health needs because they can better access high-speed Internet and smartphones.These devices and mobile applications are now increasingly used and integrated through the medical Internet of Things(mIoT).mIoT is an important part of the digital transformation of healthcare,because it can introduce new business models and allow efficiency improvements,cost control and improve patient experience.In the mIoT system,when migrating from traditional medical services to electronic medical services,patient protection and privacy are the priorities of each stakeholder.Therefore,it is recommended to use different user authentication and authorization methods to improve security and privacy.In this paper,our prosed model involves a shared identity verification process with different situations in the e-health system.We aim to reduce the strict and formal specification of the joint key authentication model.We use the AVISPA tool to verify through the wellknown HLPSL specification language to develop user authentication and smart card use cases in a user-friendly environment.Our model has economic and strategic advantages for healthcare organizations and healthcare workers.The medical staff can increase their knowledge and ability to analyze medical data more easily.Our model can continuously track health indicators to automatically manage treatments and monitor health data in real time.Further,it can help customers prevent chronic diseases with the enhanced cognitive functions support.The necessity for efficient identity verification in e-health care is even more crucial for cognitive mitigation because we increasingly rely on mIoT systems.
基金King Saud University through Researchers Supporting Project number(RSP-2021/387),King Saud University,Riyadh,Saudi Arabia.
文摘English to Urdu machine translation is still in its beginning and lacks simple translation methods to provide motivating and adequate English to Urdu translation.In order tomake knowledge available to the masses,there should be mechanisms and tools in place to make things understandable by translating from source language to target language in an automated fashion.Machine translation has achieved this goal with encouraging results.When decoding the source text into the target language,the translator checks all the characteristics of the text.To achieve machine translation,rule-based,computational,hybrid and neural machine translation approaches have been proposed to automate the work.In this research work,a neural machine translation approach is employed to translate English text into Urdu.Long Short Term Short Model(LSTM)Encoder Decoder is used to translate English to Urdu.The various steps required to perform translation tasks include preprocessing,tokenization,grammar and sentence structure analysis,word embeddings,training data preparation,encoder-decoder models,and output text generation.The results show that the model used in the research work shows better performance in translation.The results were evaluated using bilingual research metrics and showed that the test and training data yielded the highest score sequences with an effective length of ten(10).
基金This work was supported by King Saud University through Researchers Supporting Project Number(RSP2022R426),King Saud University,Riyadh,Saudi Arabia.
文摘A comprehensive understanding of human intelligence is still an ongoing process,i.e.,human and information security are not yet perfectly matched.By understanding cognitive processes,designers can design humanized cognitive information systems(CIS).The need for this research is justified because today’s business decision makers are faced with questions they cannot answer in a given amount of time without the use of cognitive information systems.The researchers aim to better strengthen cognitive information systems with more pronounced cognitive thresholds by demonstrating the resilience of cognitive resonant frequencies to reveal possible responses to improve the efficiency of human-computer interaction(HCI).Apractice-oriented research approach included research analysis and a review of existing articles to pursue a comparative research model;thereafter,amodel development paradigm was used to observe and monitor the progression of CIS during HCI.The scope of our research provides a broader perspective on how different disciplines affect HCI and how human cognitive models can be enhanced to enrich complements.We have identified a significant gap in the current literature on mental processing resulting from a wide range of theory and practice.
基金This work was supported by Taif University(in Taif,Saudi Arabia)through the Researchers Supporting Project Number(TURSP-2020/150).
文摘Industrial automation or assembly automation is a strictly monitored environment,in which changes occur at a good speed.There are many types of entities in the focusing environment,and the data generated by these devices is huge.In addition,because the robustness is achieved by sensing redundant data,the data becomes larger.The data generating device,whether it is a sensing device or a physical device,streams the data to a higher-level deception device for calculation,so that it can be driven and configured according to the updated conditions.With the emergence of the Industry 4.0 concept that includes a variety of automation technologies,various data is generated through numerous devices.Therefore,the data generated for industrial automation requires unique Information Architecture(IA).IA should be able to satisfy hard real-time constraints to spontaneously change the environment and the instantaneous configuration of all participants.To understand its applicability,we used an example smart grid analogy.The smart grid system needs an IA to fulfill the communication requirements to report the hard real-time changes in the power immediately following the system.In addition,in a smart grid system,it needs to report changes on either side of the system,i.e.,consumers and suppliers configure and reconfigure the system according to the changes.In this article,we propose an analogy of a physical phenomenon.A point charge is used as a data generating device,the streamline of electric flux is used as a data flow,and the charge distribution on a closed surface is used as a configuration.Finally,the intensity changes are used in the physical process,e.g.,the smart grid.This analogy is explained by metaphors,and the structural mapping framework is used for its theoretical proof.The proposed analogy provides a theoretical basis for the development of such information architectures that can represent data flows,definition changes(deterministic and non-deterministic),events,and instantaneous configuration definitions of entities in the system.The proposed analogy provides a mechanism to perform calculations during communication, using a simpleconcept on the closed surface to integrate two-layer cyber-physical systems(computation, communication, and physical process). The proposed analogyis a good candidate for implementation in smart grid security.