期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology 被引量:1
1
作者 Nazik Alturki Raed Alharthi +5 位作者 Muhammad Umer Oumaima Saidani Amal Alshardan Reemah M.Alhebshi Shtwai Alsubai ali kashif bashir 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3387-3415,共29页
The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the d... The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life. 展开更多
关键词 Blockchain Internet of Things(IoT) smart home automation CYBERSECURITY
下载PDF
Secure and Reliable Routing in the Internet of Vehicles Network:AODV-RL with BHA Attack Defense
2
作者 Nadeem Ahmed Khalid Mohammadani +3 位作者 ali kashif bashir Marwan Omar Angel Jones Fayaz Hassan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期633-659,共27页
Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad h... Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad hoc Networks(VANETs),a core component of IoV,face security issues,particularly the Black Hole Attack(BHA).This malicious attack disrupts the seamless flow of data and threatens the network’s overall reliability;also,BHA strategically disrupts communication pathways by dropping data packets from legitimate nodes altogether.Recognizing the importance of this challenge,we have introduced a new solution called ad hoc On-Demand Distance Vector-Reputation-based mechanism Local Outlier Factor(AODV-RL).The significance of AODVRL lies in its unique approach:it verifies and confirms the trustworthiness of network components,providing robust protection against BHA.An additional safety layer is established by implementing the Local Outlier Factor(LOF),which detects and addresses abnormal network behaviors.Rigorous testing of our solution has revealed its remarkable ability to enhance communication in VANETs.Specifically,Our experimental results achieve message delivery ratios of up to 94.25%andminimal packet loss ratios of just 0.297%.Based on our experimental results,the proposedmechanismsignificantly improves VANET communication reliability and security.These results promise a more secure and dependable future for IoV,capable of transforming transportation safety and efficiency. 展开更多
关键词 Black hole attack IoV vehicular ad hoc network AODV routing protocol
下载PDF
Fuzzy Logic-Based Health Monitoring System for COVID’19 Patients 被引量:3
3
作者 M.Jayalakshmi Lalit Garg +4 位作者 K.Maharajan K.Jayakumar Kathiravan Srinivasan ali kashif bashir K.Ramesh 《Computers, Materials & Continua》 SCIE EI 2021年第5期2431-2447,共17页
In several countries,the ageing population contour focuses on high healthcare costs and overloaded health care environments.Pervasive health care monitoring system can be a potential alternative,especially in the COVI... In several countries,the ageing population contour focuses on high healthcare costs and overloaded health care environments.Pervasive health care monitoring system can be a potential alternative,especially in the COVID-19 pandemic situation to help mitigate such problems by encouraging healthcare to transition from hospital-centred services to self-care,mobile care and home care.In this aspect,we propose a pervasive system to monitor the COVID’19 patient’s conditions within the hospital and outside by monitoring their medical and psychological situation.It facilitates better healthcare assistance,especially for COVID’19 patients and quarantined people.It identies the patient’s medical and psychological condition based on the current context and activities using a fuzzy context-aware reasoning engine based model.Fuzzy reasoning engine makes decisions using linguistic rules based on inference mechanisms that support the patient condition identication.Linguistics rules are framed based on the fuzzy set attributes belong to different context types.The fuzzy semantic rules are used to identify the relationship among the attributes,and the reasoning engine is used to ensure precise real-time context interpretation and current evaluation of the situation.Outcomes are measured using a fuzzy logic-based context reasoning system under simulation.The results indicate the usefulness of monitoring the COVID’19 patients based on the current context. 展开更多
关键词 Pervasive healthcare COVID’19 CONTEXT-AWARE fuzzy reasoning engine fuzzy logic role-based expert system
下载PDF
Medical Diagnosis Using Machine Learning:A Statistical Review 被引量:3
4
作者 Kaustubh Arun Bhavsar Jimmy Singla +3 位作者 Yasser D.Al-Otaibi Oh-Young Song Yousaf Bin Zikria ali kashif bashir 《Computers, Materials & Continua》 SCIE EI 2021年第4期107-125,共19页
Decision making in case of medical diagnosis is a complicated process.A large number of overlapping structures and cases,and distractions,tiredness,and limitations with the human visual system can lead to inappropriat... Decision making in case of medical diagnosis is a complicated process.A large number of overlapping structures and cases,and distractions,tiredness,and limitations with the human visual system can lead to inappropriate diagnosis.Machine learning(ML)methods have been employed to assist clinicians in overcoming these limitations and in making informed and correct decisions in disease diagnosis.Many academic papers involving the use of machine learning for disease diagnosis have been increasingly getting published.Hence,to determine the use of ML to improve the diagnosis in varied medical disciplines,a systematic review is conducted in this study.To carry out the review,six different databases are selected.Inclusion and exclusion criteria are employed to limit the research.Further,the eligible articles are classied depending on publication year,authors,type of articles,research objective,inputs and outputs,problem and research gaps,and ndings and results.Then the selected articles are analyzed to show the impact of ML methods in improving the disease diagnosis.The ndings of this study show the most used ML methods and the most common diseases that are focused on by researchers.It also shows the increase in use of machine learning for disease diagnosis over the years.These results will help in focusing on those areas which are neglected and also to determine various ways in which ML methods could be employed to achieve desirable results. 展开更多
关键词 Decision making disease diagnosis machine learning medical disciplines
下载PDF
A Contemporary Review on Drought Modeling Using Machine Learning Approaches 被引量:2
5
作者 Karpagam Sundararajan Lalit Garg +5 位作者 Kathiravan Srinivasan ali kashif bashir Jayakumar Kaliappan Ganapathy Pattukandan Ganapathy Senthil Kumaran Selvaraj T.Meena 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第8期447-487,共41页
Drought is the least understood natural disaster due to the complex relationship of multiple contributory factors. Itsbeginning and end are hard to gauge, and they can last for months or even for years. India has face... Drought is the least understood natural disaster due to the complex relationship of multiple contributory factors. Itsbeginning and end are hard to gauge, and they can last for months or even for years. India has faced many droughtsin the last few decades. Predicting future droughts is vital for framing drought management plans to sustainnatural resources. The data-driven modelling for forecasting the metrological time series prediction is becomingmore powerful and flexible with computational intelligence techniques. Machine learning (ML) techniques havedemonstrated success in the drought prediction process and are becoming popular to predict the weather, especiallythe minimum temperature using backpropagation algorithms. The favourite ML techniques for weather forecastinginclude support vector machines (SVM), support vector regression, random forest, decision tree, logistic regression,Naive Bayes, linear regression, gradient boosting tree, k-nearest neighbours (KNN), the adaptive neuro-fuzzyinference system, the feed-forward neural networks, Markovian chain, Bayesian network, hidden Markov models,and autoregressive moving averages, evolutionary algorithms, deep learning and many more. This paper presentsa recent review of the literature using ML in drought prediction, the drought indices, dataset, and performancemetrics. 展开更多
关键词 Drought forecasting machine learning drought indices stochastic models fuzzy logic dynamic method hybrid method
下载PDF
Multi-Modal Data Analysis Based Game Player Experience Modeling Using LSTM-DNN 被引量:1
6
作者 Sehar Shahzad Farooq Mustansar Fiaz +4 位作者 Irfan Mehmood ali kashif bashir Raheel Nawaz KyungJoong Kim Soon Ki Jung 《Computers, Materials & Continua》 SCIE EI 2021年第9期4087-4108,共22页
Game player modeling is a paradigm of computational models to exploit players’behavior and experience using game and player analytics.Player modeling refers to descriptions of players based on frameworks of data deri... Game player modeling is a paradigm of computational models to exploit players’behavior and experience using game and player analytics.Player modeling refers to descriptions of players based on frameworks of data derived from the interaction of a player’s behavior within the game as well as the player’s experience with the game.Player behavior focuses on dynamic and static information gathered at the time of gameplay.Player experience concerns the association of the human player during gameplay,which is based on cognitive and affective physiological measurements collected from sensors mounted on the player’s body or in the player’s surroundings.In this paper,player experience modeling is studied based on the board puzzle game“Candy Crush Saga”using cognitive data of players accessed by physiological and peripheral devices.Long Short-Term Memory-based Deep Neural Network(LSTM-DNN)is used to predict players’effective states in terms of valence,arousal,dominance,and liking by employing the concept of transfer learning.Transfer learning focuses on gaining knowledge while solving one problem and using the same knowledge to solve different but related problems.The homogeneous transfer learning approach has not been implemented in the game domain before,and this novel study opens a new research area for the game industry where the main challenge is predicting the significance of innovative games for entertainment and players’engagement.Relevant not only from a player’s point of view,it is also a benchmark study for game developers who have been facing problems of“cold start”for innovative games that strengthen the game industrial economy. 展开更多
关键词 Game player modeling experience modeling player analytics deep learning LSTM game play data Candy Crush Saga
下载PDF
Temporal pattern mining from user-generated content 被引量:1
7
作者 Adnan ali Jinlong Li +1 位作者 Huanhuan Chen ali kashif bashir 《Digital Communications and Networks》 SCIE CSCD 2022年第6期1027-1039,共13页
Faster internet, IoT, and social media have reformed the conventional web into a collaborative web resulting in enormous user-generated content. Several studies are focused on such content;however, they mainly focus o... Faster internet, IoT, and social media have reformed the conventional web into a collaborative web resulting in enormous user-generated content. Several studies are focused on such content;however, they mainly focus on textual data, thus undermining the importance of metadata. Considering this gap, we provide a temporal pattern mining framework to model and utilize user-generated content's metadata. First, we scrap 2.1 million tweets from Twitter between Nov-2020 to Sep-2021 about 100 hashtag keywords and present these tweets into 100 User-Tweet-Hashtag (UTH) dynamic graphs. Second, we extract and identify four time-series in three timespans (Day, Hour, and Minute) from UTH dynamic graphs. Lastly, we model these four time-series with three machine learning algorithms to mine temporal patterns with the accuracy of 95.89%, 93.17%, 90.97%, and 93.73%, respectively. We demonstrate that user-generated content's metadata contains valuable information, which helps to understand the users' collective behavior and can be beneficial for business and research. Dataset and codes are publicly available;the link is given in the dataset section. 展开更多
关键词 Social media analysis Collaborative computing Social data Twitter data Temporal patterns mining Dynamic graphs
下载PDF
A Comprehensive Review on Medical Diagnosis Using Machine Learning 被引量:1
8
作者 Kaustubh Arun Bhavsar Ahed Abugabah +3 位作者 Jimmy Singla Ahmad ali AlZubi ali kashif bashir Nikita 《Computers, Materials & Continua》 SCIE EI 2021年第5期1997-2014,共18页
The unavailability of sufficient information for proper diagnosis,incomplete or miscommunication between patient and the clinician,or among the healthcare professionals,delay or incorrect diagnosis,the fatigue of clin... The unavailability of sufficient information for proper diagnosis,incomplete or miscommunication between patient and the clinician,or among the healthcare professionals,delay or incorrect diagnosis,the fatigue of clinician,or even the high diagnostic complexity in limited time can lead to diagnostic errors.Diagnostic errors have adverse effects on the treatment of a patient.Unnecessary treatments increase the medical bills and deteriorate the health of a patient.Such diagnostic errors that harm the patient in various ways could be minimized using machine learning.Machine learning algorithms could be used to diagnose various diseases with high accuracy.The use of machine learning could assist the doctors in making decisions on time,and could also be used as a second opinion or supporting tool.This study aims to provide a comprehensive review of research articles published from the year 2015 to mid of the year 2020 that have used machine learning for diagnosis of various diseases.We present the various machine learning algorithms used over the years to diagnose various diseases.The results of this study show the distribution of machine learning methods by medical disciplines.Based on our review,we present future research directions that could be used to conduct further research. 展开更多
关键词 Diagnostic system machine learning medical diagnosis healthcare applications
下载PDF
Prediction Models for COVID-19 Integrating Age Groups, Gender, and Underlying Conditions
9
作者 Imran Ashraf Waleed SAlnumay +3 位作者 Rashid ali Soojung Hur ali kashif bashir Yousaf Bin Zikria 《Computers, Materials & Continua》 SCIE EI 2021年第6期3009-3044,共36页
The COVID-19 pandemic has caused hundreds of thousands of deaths,millions of infections worldwide,and the loss of trillions of dollars for many large economies.It poses a grave threat to the human population with an e... The COVID-19 pandemic has caused hundreds of thousands of deaths,millions of infections worldwide,and the loss of trillions of dollars for many large economies.It poses a grave threat to the human population with an excessive number of patients constituting an unprecedented challenge with which health systems have to cope.Researchers from many domains have devised diverse approaches for the timely diagnosis of COVID-19 to facilitate medical responses.In the same vein,a wide variety of research studies have investigated underlying medical conditions for indicators suggesting the severity and mortality of,and role of age groups and gender on,the probability of COVID-19 infection.This study aimed to review,analyze,and critically appraise published works that report on various factors to explain their relationship with COVID-19.Such studies span a wide range,including descriptive analyses,ratio analyses,cohort,prospective and retrospective studies.Various studies that describe indicators to determine the probability of infection among the general population,as well as the risk factors associated with severe illness and mortality,are critically analyzed and these ndings are discussed in detail.A comprehensive analysis was conducted on research studies that investigated the perceived differences in vulnerability of different age groups and genders to severe outcomes of COVID-19.Studies incorporating important demographic,health,and socioeconomic characteristics are highlighted to emphasize their importance.Predominantly,the lack of an appropriated dataset that contains demographic,personal health,and socioeconomic information implicates the efcacy and efciency of the discussed methods.Results are overstated on the part of both exclusion of quarantined and patients with mild symptoms and inclusion of the data from hospitals where the majority of the cases are potentially ill. 展开更多
关键词 COVID-19 age&gender vulnerability for COVID-19 machine learning-based prognosis COVID-19 vulnerability psychological factors prediction of COVID-19
下载PDF
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element
10
作者 Chintan Patel ali kashif bashir +1 位作者 Ahmad ali AlZubi Rutvij Jhaveri 《Digital Communications and Networks》 SCIE CSCD 2023年第2期358-366,共9页
Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product processing.IIoT suffers from various challenges,and security is one of the key challenge among those challe... Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product processing.IIoT suffers from various challenges,and security is one of the key challenge among those challenges.Authentication and access control are two notable challenges for any IIoT based industrial deployment.Any IoT based Industry 4.0 enterprise designs networks between hundreds of tiny devices such as sensors,actuators,fog devices and gateways.Thus,articulating a secure authentication protocol between sensing devices or a sensing device and user devices is an essential step in IoT security.In this paper,first,we present cryptanalysis for the certificate-based scheme proposed for a similar environment by Das et al.and prove that their scheme is vulnerable to various traditional attacks such as device anonymity,MITM,and DoS.We then put forward an interdevice authentication scheme using an ECC(Elliptic Curve Cryptography)that is highly secure and lightweight compared to other existing schemes for a similar environment.Furthermore,we set forth a formal security analysis using the random oracle-based ROR model and informal security analysis over the Doleve-Yao channel.In this paper,we present comparison of the proposed scheme with existing schemes based on communication cost,computation cost and security index to prove that the proposed EBAKE-SE is highly efficient,reliable,and trustworthy compared to other existing schemes for an inter-device authentication.At long last,we present an implementation for the proposed EBAKE-SE using MQTT protocol. 展开更多
关键词 Internet of things AUTHENTICATION Elliptic curve cryptography Secure key exchange Message Queuing telemetry transport
下载PDF
Cache in fog computing design,concepts,contributions,and security issues in machine learning prospective
11
作者 Muhammad ali Naeem Yousaf Bin Zikria +3 位作者 Rashid ali Usman Tariq Yahui Meng ali kashif bashir 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1033-1052,共20页
The massive growth of diversified smart devices and continuous data generation poses a challenge to communication architectures.To deal with this problem,communication networks consider fog computing as one of promisi... The massive growth of diversified smart devices and continuous data generation poses a challenge to communication architectures.To deal with this problem,communication networks consider fog computing as one of promising technologies that can improve overall communication performance.It brings on-demand services proximate to the end devices and delivers the requested data in a short time.Fog computing faces several issues such as latency,bandwidth,and link utilization due to limited resources and the high processing demands of end devices.To this end,fog caching plays an imperative role in addressing data dissemination issues.This study provides a comprehensive discussion of fog computing,Internet of Things(IoTs)and the critical issues related to data security and dissemination in fog computing.Moreover,we determine the fog-based caching schemes and contribute to deal with the existing issues of fog computing.Besides,this paper presents a number of caching schemes with their contributions,benefits,and challenges to overcome the problems and limitations of fog computing.We also identify machine learning-based approaches for cache security and management in fog computing,as well as several prospective future research directions in caching,fog computing,and machine learning. 展开更多
关键词 Internet of things Cloud computing Fog computing CACHING LATENCY
下载PDF
Handling Class Imbalance in Online Transaction Fraud Detection
12
作者 Kanika Jimmy Singla +3 位作者 ali kashif bashir Yunyoung Nam Najam UI Hasan Usman Tariq 《Computers, Materials & Continua》 SCIE EI 2022年第2期2861-2877,共17页
With the rise of internet facilities,a greater number of people have started doing online transactions at an exponential rate in recent years as the online transaction system has eliminated the need of going to the ba... With the rise of internet facilities,a greater number of people have started doing online transactions at an exponential rate in recent years as the online transaction system has eliminated the need of going to the bank physically for every transaction.However,the fraud cases have also increased causing the loss of money to the consumers.Hence,an effective fraud detection system is the need of the hour which can detect fraudulent transactions automatically in real-time.Generally,the genuine transactions are large in number than the fraudulent transactions which leads to the class imbalance problem.In this research work,an online transaction fraud detection system using deep learning has been proposed which can handle class imbalance problem by applying algorithm-level methods which modify the learning of the model to focus more on the minority class i.e.,fraud transactions.A novel loss function named Weighted Hard-Reduced Focal Loss(WH-RFL)has been proposed which has achieved maximum fraud detection rate i.e.,True PositiveRate(TPR)at the cost of misclassification of few genuine transactions as high TPR is preferred over a high True Negative Rate(TNR)in fraud detection system and same has been demonstrated using three publicly available imbalanced transactional datasets.Also,Thresholding has been applied to optimize the decision threshold using cross-validation to detect maximum number of frauds and it has been demonstrated by the experimental results that the selection of the right thresholding method with deep learning yields better results. 展开更多
关键词 Class imbalance deep learning fraud detection loss function THRESHOLDING
下载PDF
Allocation and Migration of Virtual Machines Using Machine Learning
13
作者 Suruchi Talwani Khaled Alhazmi +2 位作者 Jimmy Singla Hasan JAlyamani ali kashif bashir 《Computers, Materials & Continua》 SCIE EI 2022年第2期3349-3364,共16页
Cloud computing promises the advent of a new era of service boosted by means of virtualization technology.The process of virtualization means creation of virtual infrastructure,devices,servers and computing resources ... Cloud computing promises the advent of a new era of service boosted by means of virtualization technology.The process of virtualization means creation of virtual infrastructure,devices,servers and computing resources needed to deploy an application smoothly.This extensively practiced technology involves selecting an efficient Virtual Machine(VM)to complete the task by transferring applications from Physical Machines(PM)to VM or from VM to VM.The whole process is very challenging not only in terms of computation but also in terms of energy and memory.This research paper presents an energy aware VM allocation and migration approach to meet the challenges faced by the growing number of cloud data centres.Machine Learning(ML)based Artificial Bee Colony(ABC)is used to rank the VM with respect to the load while considering the energy efficiency as a crucial parameter.The most efficient virtual machines are further selected and thus depending on the dynamics of the load and energy,applications are migrated fromoneVMto another.The simulation analysis is performed inMatlab and it shows that this research work results in more reduction in energy consumption as compared to existing studies. 展开更多
关键词 Cloud computing VM allocation VM migration machine learning
下载PDF
Multi Sensor-Based Implicit User Identification
14
作者 Muhammad Ahmad Rana Aamir Raza +5 位作者 Manuel Mazzara Salvatore Distefano ali kashif bashir Adil Khan Muhammad Shahzad Sarfraz Muhammad Umar Aftab 《Computers, Materials & Continua》 SCIE EI 2021年第8期1673-1692,共20页
Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stol... Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stolen,a thief can have access to the owner’s personal information and services against the stored passwords.As a result of this potential scenario,this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors.A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features,then further optimized using a non-linear unsupervised feature selection method.The selected features create an underlying gait biometric representation able to discriminate among individuals and identify them uniquely.Different classifiers are adopted to achieve accurate legitimate user identification.Extensive experiments on a group of 16 individuals in an indoor environment show the effectiveness of the proposed solution:with 5 to 70 samples per window,KNN and bagging classifiers achieve 87–99%accuracy,82–98%for ELM,and 81–94%for SVM.The proposed pipeline achieves a 100%true positive and 0%false-negative rate for almost all classifiers. 展开更多
关键词 SENSORS SMARTPHONE legitimate user identification
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部