Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentica...Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentication,and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors’difficulties were tampering detection,authentication,and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection(ADMDTW-TAD)via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document’s appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document,it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes,and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models.展开更多
Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital era.Malicious Uniform Resource Locators(URLs)can be embedded in email or Twitter and used...Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital era.Malicious Uniform Resource Locators(URLs)can be embedded in email or Twitter and used to lure vulnerable internet users to implement malicious data in their systems.This may result in compromised security of the systems,scams,and other such cyberattacks.These attacks hijack huge quantities of the available data,incurring heavy financial loss.At the same time,Machine Learning(ML)and Deep Learning(DL)models paved the way for designing models that can detect malicious URLs accurately and classify them.With this motivation,the current article develops an Artificial Fish Swarm Algorithm(AFSA)with Deep Learning Enabled Malicious URL Detection and Classification(AFSADL-MURLC)model.The presented AFSADL-MURLC model intends to differentiate the malicious URLs from genuine URLs.To attain this,AFSADL-MURLC model initially carries out data preprocessing and makes use of glove-based word embedding technique.In addition,the created vector model is then passed onto Gated Recurrent Unit(GRU)classification to recognize the malicious URLs.Finally,AFSA is applied to the proposed model to enhance the efficiency of GRU model.The proposed AFSADL-MURLC technique was experimentally validated using benchmark dataset sourced from Kaggle repository.The simulation results confirmed the supremacy of the proposed AFSADL-MURLC model over recent approaches under distinct measures.展开更多
Mobile communication and the Internet of Things(IoT)technologies have recently been established to collect data from human beings and the environment.The data collected can be leveraged to provide intelligent services...Mobile communication and the Internet of Things(IoT)technologies have recently been established to collect data from human beings and the environment.The data collected can be leveraged to provide intelligent services through different applications.It is an extreme challenge to monitor disabled people from remote locations.It is because day-to-day events like falls heavily result in accidents.For a person with disabilities,a fall event is an important cause of mortality and post-traumatic complications.Therefore,detecting the fall events of disabled persons in smart homes at early stages is essential to provide the necessary support and increase their survival rate.The current study introduces a Whale Optimization Algorithm Deep Transfer Learning-DrivenAutomated Fall Detection(WOADTL-AFD)technique to improve the Quality of Life for persons with disabilities.The primary aim of the presented WOADTL-AFD technique is to identify and classify the fall events to help disabled individuals.To attain this,the proposed WOADTL-AFDmodel initially uses amodified SqueezeNet feature extractor which proficiently extracts the feature vectors.In addition,the WOADTLAFD technique classifies the fall events using an extreme Gradient Boosting(XGBoost)classifier.In the presented WOADTL-AFD technique,the WOA approach is used to fine-tune the hyperparameters involved in the modified SqueezeNet model.The proposedWOADTL-AFD technique was experimentally validated using the benchmark datasets,and the results confirmed the superior performance of the proposedWOADTL-AFD method compared to other recent approaches.展开更多
Earth resource and environmental monitoring are essential areas that can be used to investigate the environmental conditions and natural resources supporting sustainable policy development,regulatory measures,and thei...Earth resource and environmental monitoring are essential areas that can be used to investigate the environmental conditions and natural resources supporting sustainable policy development,regulatory measures,and their implementation elevating the environment.Large-scale forest fire is considered a major harmful hazard that affects climate change and life over the globe.Therefore,the early identification of forest fires using automated tools is essential to avoid the spread of fire to a large extent.Therefore,this paper focuses on the design of automated forest fire detection using a fusion-based deep learning(AFFD-FDL)model for environmental monitoring.The AFFDFDL technique involves the design of an entropy-based fusion model for feature extraction.The combination of the handcrafted features using histogram of gradients(HOG)with deep features using SqueezeNet and Inception v3 models.Besides,an optimal extreme learning machine(ELM)based classifier is used to identify the existence of fire or not.In order to properly tune the parameters of the ELM model,the oppositional glowworm swarm optimization(OGSO)algorithm is employed and thereby improves the forest fire detection performance.A wide range of simulation analyses takes place on a benchmark dataset and the results are inspected under several aspects.The experimental results highlighted the betterment of the AFFD-FDL technique over the recent state of art techniques.展开更多
Melanoma remains a serious illness which is a common formof skin cancer.Since the earlier detection of melanoma reduces the mortality rate,it is essential to design reliable and automated disease diagnosis model using...Melanoma remains a serious illness which is a common formof skin cancer.Since the earlier detection of melanoma reduces the mortality rate,it is essential to design reliable and automated disease diagnosis model using dermoscopic images.The recent advances in deep learning(DL)models find useful to examine the medical image and make proper decisions.In this study,an automated deep learning based melanoma detection and classification(ADL-MDC)model is presented.The goal of the ADL-MDC technique is to examine the dermoscopic images to determine the existence of melanoma.The ADL-MDC technique performs contrast enhancement and data augmentation at the initial stage.Besides,the k-means clustering technique is applied for the image segmentation process.In addition,Adagrad optimizer based Capsule Network(CapsNet)model is derived for effective feature extraction process.Lastly,crow search optimization(CSO)algorithm with sparse autoencoder(SAE)model is utilized for the melanoma classification process.The exploitation of the Adagrad and CSO algorithm helps to properly accomplish improved performance.A wide range of simulation analyses is carried out on benchmark datasets and the results are inspected under several aspects.The simulation results reported the enhanced performance of the ADL-MDC technique over the recent approaches.展开更多
Object detection(OD)in remote sensing images(RSI)acts as a vital part in numerous civilian and military application areas,like urban planning,geographic information system(GIS),and search and rescue functions.Vehicle ...Object detection(OD)in remote sensing images(RSI)acts as a vital part in numerous civilian and military application areas,like urban planning,geographic information system(GIS),and search and rescue functions.Vehicle recognition from RSIs remained a challenging process because of the difficulty of background data and the redundancy of recognition regions.The latest advancements in deep learning(DL)approaches permit the design of effectual OD approaches.This study develops an Artificial Ecosystem Optimizer with Deep Convolutional Neural Network for Vehicle Detection(AEODCNN-VD)model on Remote Sensing Images.The proposed AEODCNN-VD model focuses on the identification of vehicles accurately and rapidly.To detect vehicles,the presented AEODCNN-VD model employs single shot detector(SSD)with Inception network as a baseline model.In addition,Multiway Feature Pyramid Network(MFPN)is used for handling objects of varying sizes in RSIs.The features from the Inception model are passed into theMFPNformultiway andmultiscale feature fusion.Finally,the fused features are passed into bounding box and class prediction networks.For enhancing the detection efficiency of the AEODCNN-VD approach,AEO based hyperparameter optimizer is used,which is stimulated by the energy transfer strategies such as production,consumption,and decomposition in an ecosystem.The performance validation of the presentedmethod on benchmark datasets showed promising performance over recent DL models.展开更多
As the Internet of Things(IoT)endures to develop,a huge count of data has been created.An IoT platform is rather sensitive to security challenges as individual data can be leaked,or sensor data could be used to cause ...As the Internet of Things(IoT)endures to develop,a huge count of data has been created.An IoT platform is rather sensitive to security challenges as individual data can be leaked,or sensor data could be used to cause accidents.As typical intrusion detection system(IDS)studies can be frequently designed for working well on databases,it can be unknown if they intend to work well in altering network environments.Machine learning(ML)techniques are depicted to have a higher capacity at assisting mitigate an attack on IoT device and another edge system with reasonable accuracy.This article introduces a new Bird Swarm Algorithm with Wavelet Neural Network for Intrusion Detection(BSAWNN-ID)in the IoT platform.The main intention of the BSAWNN-ID algorithm lies in detecting and classifying intrusions in the IoT platform.The BSAWNN-ID technique primarily designs a feature subset selection using the coyote optimization algorithm(FSS-COA)to attain this.Next,to detect intrusions,the WNN model is utilized.At last,theWNNparameters are optimally modified by the use of BSA.Awidespread experiment is performed to depict the better performance of the BSAWNNID technique.The resultant values indicated the better performance of the BSAWNN-ID technique over other models,with an accuracy of 99.64%on the UNSW-NB15 dataset.展开更多
Sleep plays a vital role in optimum working of the brain and the body.Numerous people suffer from sleep-oriented illnesses like apnea,insomnia,etc.Sleep stage classification is a primary process in the quantitative ex...Sleep plays a vital role in optimum working of the brain and the body.Numerous people suffer from sleep-oriented illnesses like apnea,insomnia,etc.Sleep stage classification is a primary process in the quantitative examination of polysomnographic recording.Sleep stage scoring is mainly based on experts’knowledge which is laborious and time consuming.Hence,it can be essential to design automated sleep stage classification model using machine learning(ML)and deep learning(DL)approaches.In this view,this study focuses on the design of Competitive Multi-verse Optimization with Deep Learning Based Sleep Stage Classification(CMVODL-SSC)model using Electroencephalogram(EEG)signals.The proposed CMVODL-SSC model intends to effectively categorize different sleep stages on EEG signals.Primarily,data pre-processing is performed to convert the actual data into useful format.Besides,a cascaded long short term memory(CLSTM)model is employed to perform classification process.At last,the CMVO algorithm is utilized for optimally tuning the hyperparameters involved in the CLSTM model.In order to report the enhancements of the CMVODL-SSC model,a wide range of simulations was carried out and the results ensured the better performance of the CMVODL-SSC model with average accuracy of 96.90%.展开更多
The problem of producing a natural language description of an image for describing the visual content has gained more attention in natural language processing(NLP)and computer vision(CV).It can be driven by applicatio...The problem of producing a natural language description of an image for describing the visual content has gained more attention in natural language processing(NLP)and computer vision(CV).It can be driven by applications like image retrieval or indexing,virtual assistants,image understanding,and support of visually impaired people(VIP).Though the VIP uses other senses,touch and hearing,for recognizing objects and events,the quality of life of those persons is lower than the standard level.Automatic Image captioning generates captions that will be read loudly to the VIP,thereby realizing matters happening around them.This article introduces a Red Deer Optimization with Artificial Intelligence Enabled Image Captioning System(RDOAI-ICS)for Visually Impaired People.The presented RDOAI-ICS technique aids in generating image captions for VIPs.The presented RDOAIICS technique utilizes a neural architectural search network(NASNet)model to produce image representations.Besides,the RDOAI-ICS technique uses the radial basis function neural network(RBFNN)method to generate a textual description.To enhance the performance of the RDOAI-ICS method,the parameter optimization process takes place using the RDO algorithm for NasNet and the butterfly optimization algorithm(BOA)for the RBFNN model,showing the novelty of the work.The experimental evaluation of the RDOAI-ICS method can be tested using a benchmark dataset.The outcomes show the enhancements of the RDOAI-ICS method over other recent Image captioning approaches.展开更多
Artificial Intelligence(AI)and Computer Vision(CV)advancements have led to many useful methodologies in recent years,particularly to help visually-challenged people.Object detection includes a variety of challenges,fo...Artificial Intelligence(AI)and Computer Vision(CV)advancements have led to many useful methodologies in recent years,particularly to help visually-challenged people.Object detection includes a variety of challenges,for example,handlingmultiple class images,images that get augmented when captured by a camera and so on.The test images include all these variants as well.These detection models alert them about their surroundings when they want to walk independently.This study compares four CNN-based pre-trainedmodels:ResidualNetwork(ResNet-50),Inception v3,DenseConvolutional Network(DenseNet-121),and SqueezeNet,predominantly used in image recognition applications.Based on the analysis performed on these test images,the study infers that Inception V3 outperformed other pre-trained models in terms of accuracy and speed.To further improve the performance of the Inception v3 model,the thermal exchange optimization(TEO)algorithm is applied to tune the hyperparameters(number of epochs,batch size,and learning rate)showing the novelty of the work.Better accuracy was achieved owing to the inclusion of an auxiliary classifier as a regularizer,hyperparameter optimizer,and factorization approach.Additionally,Inception V3 can handle images of different sizes.This makes Inception V3 the optimum model for assisting visually challenged people in real-world communication when integrated with Internet of Things(IoT)-based devices.展开更多
Visual impairment is one of the major problems among people of all age groups across the globe.Visually Impaired Persons(VIPs)require help from others to carry out their day-to-day tasks.Since they experience several ...Visual impairment is one of the major problems among people of all age groups across the globe.Visually Impaired Persons(VIPs)require help from others to carry out their day-to-day tasks.Since they experience several problems in their daily lives,technical intervention can help them resolve the challenges.In this background,an automatic object detection tool is the need of the hour to empower VIPs with safe navigation.The recent advances in the Internet of Things(IoT)and Deep Learning(DL)techniques make it possible.The current study proposes IoT-assisted Transient Search Optimization with a Lightweight RetinaNetbased object detection(TSOLWR-ODVIP)model to help VIPs.The primary aim of the presented TSOLWR-ODVIP technique is to identify different objects surrounding VIPs and to convey the information via audio message to them.For data acquisition,IoT devices are used in this study.Then,the Lightweight RetinaNet(LWR)model is applied to detect objects accurately.Next,the TSO algorithm is employed for fine-tuning the hyperparameters involved in the LWR model.Finally,the Long Short-Term Memory(LSTM)model is exploited for classifying objects.The performance of the proposed TSOLWR-ODVIP technique was evaluated using a set of objects,and the results were examined under distinct aspects.The comparison study outcomes confirmed that the TSOLWR-ODVIP model could effectually detect and classify the objects,enhancing the quality of life of VIPs.展开更多
With the advent of the Internet of Things(IoT),several devices like sensors nowadays can interact and easily share information.But the IoT model is prone to security concerns as several attackers try to hit the networ...With the advent of the Internet of Things(IoT),several devices like sensors nowadays can interact and easily share information.But the IoT model is prone to security concerns as several attackers try to hit the network and make it vulnerable.In such scenarios,security concern is the most prominent.Different models were intended to address these security problems;still,several emergent variants of botnet attacks like Bashlite,Mirai,and Persirai use security breaches.The malware classification and detection in the IoT model is still a problem,as the adversary reliably generates a new variant of IoT malware and actively searches for compromise on the victim devices.This article develops a Sine Cosine Algorithm with Deep Learning based Ransomware Detection and Classification(SCADL-RWDC)method in an IoT environment.In the presented SCADL-RWDCtechnique,the major intention exists in recognizing and classifying ransomware attacks in the IoT platform.The SCADL-RWDC technique uses the SCA feature selection(SCA-FS)model to improve the detection rate.Besides,the SCADL-RWDC technique exploits the hybrid grey wolf optimizer(HGWO)with a gated recurrent unit(GRU)model for ransomware classification.A widespread experimental analysis is performed to exhibit the enhanced ransomware detection outcomes of the SCADL-RWDC technique.The comparison study reported the enhancement of the SCADL-RWDC technique over other models.展开更多
Biomedical image processing is widely utilized for disease detection and classification of biomedical images.Tongue color image analysis is an effective and non-invasive tool for carrying out secondary detection at an...Biomedical image processing is widely utilized for disease detection and classification of biomedical images.Tongue color image analysis is an effective and non-invasive tool for carrying out secondary detection at anytime and anywhere.For removing the qualitative aspect,tongue images are quantitatively inspected,proposing a novel disease classification model in an automated way is preferable.This article introduces a novel political optimizer with deep learning enabled tongue color image analysis(PODL-TCIA)technique.The presented PODL-TCIA model purposes to detect the occurrence of the disease by examining the color of the tongue.To attain this,the PODL-TCIA model initially performs image pre-processing to enhance medical image quality.Followed by,Inception with ResNet-v2 model is employed for feature extraction.Besides,political optimizer(PO)with twin support vector machine(TSVM)model is exploited for image classification process,shows the novelty of the work.The design of PO algorithm assists in the optimal parameter selection of the TSVM model.For ensuring the enhanced outcomes of the PODL-TCIA model,a wide-ranging experimental analysis was applied and the outcomes reported the betterment of the PODL-TCIA model over the recent approaches.展开更多
The Internet of Things(IoT)has gained more popularity in research because of its large-scale challenges and implementation.But security was the main concern when witnessing the fast development in its applications and...The Internet of Things(IoT)has gained more popularity in research because of its large-scale challenges and implementation.But security was the main concern when witnessing the fast development in its applications and size.It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats.Additionally,machine learning(ML)techniques optimally use a colossal volume of data generated by IoT devices.Deep Learning(DL)related systems were modelled for attack detection in IoT.But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations.This study develops an Artificial Algae Optimization Algorithm with Optimal Deep Belief Network(AAA-ODBN)Enabled Ransomware Detection in an IoT environment.The presented AAAODBN technique mainly intends to recognize and categorize ransomware in the IoT environment.The presented AAA-ODBN technique follows a three-stage process:feature selection,classification,and parameter tuning.In the first stage,the AAA-ODBN technique uses AAA based feature selection(AAA-FS)technique to elect feature subsets.Secondly,the AAA-ODBN technique employs the DBN model for ransomware detection.At last,the dragonfly algorithm(DFA)is utilized for the hyperparameter tuning of the DBN technique.A sequence of simulations is implemented to demonstrate the improved performance of the AAA-ODBN algorithm.The experimental values indicate the significant outcome of the AAA-ODBN model over other models.展开更多
Recent developments on Internet and social networking have led to the growth of aggressive language and hate speech.Online provocation,abuses,and attacks are widely termed cyberbullying(CB).The massive quantity of use...Recent developments on Internet and social networking have led to the growth of aggressive language and hate speech.Online provocation,abuses,and attacks are widely termed cyberbullying(CB).The massive quantity of user generated content makes it difficult to recognize CB.Current advancements in machine learning(ML),deep learning(DL),and natural language processing(NLP)tools enable to detect and classify CB in social networks.In this view,this study introduces a spotted hyena optimizer with deep learning driven cybersecurity(SHODLCS)model for OSN.The presented SHODLCS model intends to accomplish cybersecurity from the identification of CB in the OSN.For achieving this,the SHODLCS model involves data pre-processing and TF-IDF based feature extraction.In addition,the cascaded recurrent neural network(CRNN)model is applied for the identification and classification of CB.Finally,the SHO algorithm is exploited to optimally tune the hyperparameters involved in the CRNN model and thereby results in enhanced classifier performance.The experimental validation of the SHODLCS model on the benchmark dataset portrayed the better outcomes of the SHODLCS model over the recent approaches.展开更多
With recent advancements in information and communication technology,a huge volume of corporate and sensitive user data was shared consistently across the network,making it vulnerable to an attack that may be brought ...With recent advancements in information and communication technology,a huge volume of corporate and sensitive user data was shared consistently across the network,making it vulnerable to an attack that may be brought some factors under risk:data availability,confidentiality,and integrity.Intrusion Detection Systems(IDS)were mostly exploited in various networks to help promptly recognize intrusions.Nowadays,blockchain(BC)technology has received much more interest as a means to share data without needing a trusted third person.Therefore,this study designs a new Blockchain Assisted Optimal Machine Learning based Cyberattack Detection and Classification(BAOML-CADC)technique.In the BAOML-CADC technique,the major focus lies in identifying cyberattacks.To do so,the presented BAOML-CADC technique applies a thermal equilibrium algorithm-based feature selection(TEA-FS)method for the optimal choice of features.The BAOML-CADC technique uses an extreme learning machine(ELM)model for cyberattack recognition.In addition,a BC-based integrity verification technique is developed to defend against the misrouting attack,showing the innovation of the work.The experimental validation of BAOML-CADC algorithm is tested on a benchmark cyberattack dataset.The obtained values implied the improved performance of the BAOML-CADC algorithm over other techniques.展开更多
Cyberattack detection has become an important research domain owing to increasing number of cybercrimes in recent years.Both Machine Learning(ML)and Deep Learning(DL)classification models are useful in effective ident...Cyberattack detection has become an important research domain owing to increasing number of cybercrimes in recent years.Both Machine Learning(ML)and Deep Learning(DL)classification models are useful in effective identification and classification of cyberattacks.In addition,the involvement of hyper parameters in DL models has a significantly influence upon the overall performance of the classification models.In this background,the current study develops Intelligent Cybersecurity Classification using Chaos Game Optimization with Deep Learning(ICC-CGODL)Model.The goal of the proposed ICC-CGODL model is to recognize and categorize different kinds of attacks made upon data.Besides,ICC-CGODL model primarily performs min-max normalization process to normalize the data into uniform format.In addition,Bidirectional Gated Recurrent Unit(BiGRU)model is utilized for detection and classification of cyberattacks.Moreover,CGO algorithm is also exploited to adjust the hyper parameters involved in BiGRU model which is the novelty of current work.A wide-range of simulation analysis was conducted on benchmark dataset and the results obtained confirmed the significant performance of ICC-CGODL technique than the recent approaches.展开更多
Recently,unmanned aerial vehicles(UAV)or drones are widely employed for several application areas such as surveillance,disaster management,etc.Since UAVs are limited to energy,efficient coordination between them becom...Recently,unmanned aerial vehicles(UAV)or drones are widely employed for several application areas such as surveillance,disaster management,etc.Since UAVs are limited to energy,efficient coordination between them becomes essential to optimally utilize the resources and effective communication among them and base station(BS).Therefore,clustering can be employed as an effective way of accomplishing smart communication systems among multiple UAVs.In this aspect,this paper presents a group teaching optimization algorithm with deep learning enabled smart communication system(GTOADL-SCS)technique for UAV networks.The proposed GTOADL-SCS model encompasses a two stage process namely clustering and classification.At the initial stage,the GTOADL-SCS model includes a GTOA based clustering scheme to elect cluster heads(CHs)and organize clusters.Besides,the GTOADL-SCS model develops a fitness function containing three input parameters as residual energy of UAVs,average neighoring distance,and UAV degree.For classification process,the GTOADLSCS model applies pre-trained densely connected network(DenseNet201)feature extractor with gated recurrent unit(GRU)classifier.For ensuring the enhanced performance of the GTOADL-SCS model,a widespread simulation analysis is performed and the comparative study reported the significant outcomes over the existing approaches with maximum packet delivery ratio(PDR)of 92.60%.展开更多
Multicarrier Waveform(MCW)has several advantages and plays a very important role in cellular systems.Fifth generation(5G)MCW such as Non-Orthogonal Multiple Access(NOMA)and Filter Bank Multicarrier(FBMC)are thought to...Multicarrier Waveform(MCW)has several advantages and plays a very important role in cellular systems.Fifth generation(5G)MCW such as Non-Orthogonal Multiple Access(NOMA)and Filter Bank Multicarrier(FBMC)are thought to be important in 5G implementation.High Peak to Average Power Ratio(PAPR)is seen as a serious concern in MCW since it reduces the efficiency of amplifier use in the user devices.The paper presents a novel Divergence Selective Mapping(DSLM)and Divergence Partial Transmission Sequence(D-PTS)for 5G waveforms.It is seen that the proposed D-SLM and PTS lower PAPR with low computational complexity.The work highlighted a combination of multi-data block partial transmit schemes along with tone reservation.In this,an overlapping factor is used to determine the number of data blocks for every group.Here,considering only those data blocks that have minimum signal power,the use of DSLM and DPTS are required to eliminate the segment’s peaks.Simulation results reveal that the suggested hybrid technique proves to be better than the conventional PTS scheme.Furthermore,the power saving performance of FBMC and NOMA is compared with the Orthogonal Frequency Division Multiplexing(OFDM)waveform.展开更多
Text-To-Speech(TTS)is a speech processing tool that is highly helpful for visually-challenged people.The TTS tool is applied to transform the texts into human-like sounds.However,it is highly challenging to accomplish...Text-To-Speech(TTS)is a speech processing tool that is highly helpful for visually-challenged people.The TTS tool is applied to transform the texts into human-like sounds.However,it is highly challenging to accomplish the TTS out-comes for the non-diacritized text of the Arabic language since it has multiple unique features and rules.Some special characters like gemination and diacritic signs that correspondingly indicate consonant doubling and short vowels greatly impact the precise pronunciation of the Arabic language.But,such signs are not frequently used in the texts written in the Arabic language since its speakers and readers can guess them from the context itself.In this background,the current research article introduces an Optimal Deep Learning-driven Arab Text-to-Speech Synthesizer(ODLD-ATSS)model to help the visually-challenged people in the Kingdom of Saudi Arabia.The prime aim of the presented ODLD-ATSS model is to convert the text into speech signals for visually-challenged people.To attain this,the presented ODLD-ATSS model initially designs a Gated Recurrent Unit(GRU)-based prediction model for diacritic and gemination signs.Besides,the Buckwalter code is utilized to capture,store and display the Arabic texts.To improve the TSS performance of the GRU method,the Aquila Optimization Algorithm(AOA)is used,which shows the novelty of the work.To illustrate the enhanced performance of the proposed ODLD-ATSS model,further experi-mental analyses were conducted.The proposed model achieved a maximum accu-racy of 96.35%,and the experimental outcomes infer the improved performance of the proposed ODLD-ATSS model over other DL-based TSS models.展开更多
基金funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Research Groups Program Grant No.(RGP-1443-0051).
文摘Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentication,and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors’difficulties were tampering detection,authentication,and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection(ADMDTW-TAD)via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document’s appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document,it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes,and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models.
基金the Deanship of Scientific Research at King Khalid University for funding this work through Large Groups Project under grant number(45/43)Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R140)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:22UQU4310373DSR21.
文摘Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital era.Malicious Uniform Resource Locators(URLs)can be embedded in email or Twitter and used to lure vulnerable internet users to implement malicious data in their systems.This may result in compromised security of the systems,scams,and other such cyberattacks.These attacks hijack huge quantities of the available data,incurring heavy financial loss.At the same time,Machine Learning(ML)and Deep Learning(DL)models paved the way for designing models that can detect malicious URLs accurately and classify them.With this motivation,the current article develops an Artificial Fish Swarm Algorithm(AFSA)with Deep Learning Enabled Malicious URL Detection and Classification(AFSADL-MURLC)model.The presented AFSADL-MURLC model intends to differentiate the malicious URLs from genuine URLs.To attain this,AFSADL-MURLC model initially carries out data preprocessing and makes use of glove-based word embedding technique.In addition,the created vector model is then passed onto Gated Recurrent Unit(GRU)classification to recognize the malicious URLs.Finally,AFSA is applied to the proposed model to enhance the efficiency of GRU model.The proposed AFSADL-MURLC technique was experimentally validated using benchmark dataset sourced from Kaggle repository.The simulation results confirmed the supremacy of the proposed AFSADL-MURLC model over recent approaches under distinct measures.
基金The authors extend their appreciation to the King Salman Center for Disability Research for funding this work through Research Group no KSRG-2022-030.
文摘Mobile communication and the Internet of Things(IoT)technologies have recently been established to collect data from human beings and the environment.The data collected can be leveraged to provide intelligent services through different applications.It is an extreme challenge to monitor disabled people from remote locations.It is because day-to-day events like falls heavily result in accidents.For a person with disabilities,a fall event is an important cause of mortality and post-traumatic complications.Therefore,detecting the fall events of disabled persons in smart homes at early stages is essential to provide the necessary support and increase their survival rate.The current study introduces a Whale Optimization Algorithm Deep Transfer Learning-DrivenAutomated Fall Detection(WOADTL-AFD)technique to improve the Quality of Life for persons with disabilities.The primary aim of the presented WOADTL-AFD technique is to identify and classify the fall events to help disabled individuals.To attain this,the proposed WOADTL-AFDmodel initially uses amodified SqueezeNet feature extractor which proficiently extracts the feature vectors.In addition,the WOADTLAFD technique classifies the fall events using an extreme Gradient Boosting(XGBoost)classifier.In the presented WOADTL-AFD technique,the WOA approach is used to fine-tune the hyperparameters involved in the modified SqueezeNet model.The proposedWOADTL-AFD technique was experimentally validated using the benchmark datasets,and the results confirmed the superior performance of the proposedWOADTL-AFD method compared to other recent approaches.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP.1/172/42)Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2023R191)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.This study is supported via funding from Prince Sattam bin Abdulaziz University Project Number(PSAU/2023/R/1444).
文摘Earth resource and environmental monitoring are essential areas that can be used to investigate the environmental conditions and natural resources supporting sustainable policy development,regulatory measures,and their implementation elevating the environment.Large-scale forest fire is considered a major harmful hazard that affects climate change and life over the globe.Therefore,the early identification of forest fires using automated tools is essential to avoid the spread of fire to a large extent.Therefore,this paper focuses on the design of automated forest fire detection using a fusion-based deep learning(AFFD-FDL)model for environmental monitoring.The AFFDFDL technique involves the design of an entropy-based fusion model for feature extraction.The combination of the handcrafted features using histogram of gradients(HOG)with deep features using SqueezeNet and Inception v3 models.Besides,an optimal extreme learning machine(ELM)based classifier is used to identify the existence of fire or not.In order to properly tune the parameters of the ELM model,the oppositional glowworm swarm optimization(OGSO)algorithm is employed and thereby improves the forest fire detection performance.A wide range of simulation analyses takes place on a benchmark dataset and the results are inspected under several aspects.The experimental results highlighted the betterment of the AFFD-FDL technique over the recent state of art techniques.
基金the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP 1/80/43)Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R191)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Melanoma remains a serious illness which is a common formof skin cancer.Since the earlier detection of melanoma reduces the mortality rate,it is essential to design reliable and automated disease diagnosis model using dermoscopic images.The recent advances in deep learning(DL)models find useful to examine the medical image and make proper decisions.In this study,an automated deep learning based melanoma detection and classification(ADL-MDC)model is presented.The goal of the ADL-MDC technique is to examine the dermoscopic images to determine the existence of melanoma.The ADL-MDC technique performs contrast enhancement and data augmentation at the initial stage.Besides,the k-means clustering technique is applied for the image segmentation process.In addition,Adagrad optimizer based Capsule Network(CapsNet)model is derived for effective feature extraction process.Lastly,crow search optimization(CSO)algorithm with sparse autoencoder(SAE)model is utilized for the melanoma classification process.The exploitation of the Adagrad and CSO algorithm helps to properly accomplish improved performance.A wide range of simulation analyses is carried out on benchmark datasets and the results are inspected under several aspects.The simulation results reported the enhanced performance of the ADL-MDC technique over the recent approaches.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R136)PrincessNourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4210118DSR28).
文摘Object detection(OD)in remote sensing images(RSI)acts as a vital part in numerous civilian and military application areas,like urban planning,geographic information system(GIS),and search and rescue functions.Vehicle recognition from RSIs remained a challenging process because of the difficulty of background data and the redundancy of recognition regions.The latest advancements in deep learning(DL)approaches permit the design of effectual OD approaches.This study develops an Artificial Ecosystem Optimizer with Deep Convolutional Neural Network for Vehicle Detection(AEODCNN-VD)model on Remote Sensing Images.The proposed AEODCNN-VD model focuses on the identification of vehicles accurately and rapidly.To detect vehicles,the presented AEODCNN-VD model employs single shot detector(SSD)with Inception network as a baseline model.In addition,Multiway Feature Pyramid Network(MFPN)is used for handling objects of varying sizes in RSIs.The features from the Inception model are passed into theMFPNformultiway andmultiscale feature fusion.Finally,the fused features are passed into bounding box and class prediction networks.For enhancing the detection efficiency of the AEODCNN-VD approach,AEO based hyperparameter optimizer is used,which is stimulated by the energy transfer strategies such as production,consumption,and decomposition in an ecosystem.The performance validation of the presentedmethod on benchmark datasets showed promising performance over recent DL models.
基金This work was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University,through the Research Groups Program Grant No.(RGP-1443-0048).
文摘As the Internet of Things(IoT)endures to develop,a huge count of data has been created.An IoT platform is rather sensitive to security challenges as individual data can be leaked,or sensor data could be used to cause accidents.As typical intrusion detection system(IDS)studies can be frequently designed for working well on databases,it can be unknown if they intend to work well in altering network environments.Machine learning(ML)techniques are depicted to have a higher capacity at assisting mitigate an attack on IoT device and another edge system with reasonable accuracy.This article introduces a new Bird Swarm Algorithm with Wavelet Neural Network for Intrusion Detection(BSAWNN-ID)in the IoT platform.The main intention of the BSAWNN-ID algorithm lies in detecting and classifying intrusions in the IoT platform.The BSAWNN-ID technique primarily designs a feature subset selection using the coyote optimization algorithm(FSS-COA)to attain this.Next,to detect intrusions,the WNN model is utilized.At last,theWNNparameters are optimally modified by the use of BSA.Awidespread experiment is performed to depict the better performance of the BSAWNNID technique.The resultant values indicated the better performance of the BSAWNN-ID technique over other models,with an accuracy of 99.64%on the UNSW-NB15 dataset.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number(RGP 2/158/43)Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R235)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4340237DSR10).
文摘Sleep plays a vital role in optimum working of the brain and the body.Numerous people suffer from sleep-oriented illnesses like apnea,insomnia,etc.Sleep stage classification is a primary process in the quantitative examination of polysomnographic recording.Sleep stage scoring is mainly based on experts’knowledge which is laborious and time consuming.Hence,it can be essential to design automated sleep stage classification model using machine learning(ML)and deep learning(DL)approaches.In this view,this study focuses on the design of Competitive Multi-verse Optimization with Deep Learning Based Sleep Stage Classification(CMVODL-SSC)model using Electroencephalogram(EEG)signals.The proposed CMVODL-SSC model intends to effectively categorize different sleep stages on EEG signals.Primarily,data pre-processing is performed to convert the actual data into useful format.Besides,a cascaded long short term memory(CLSTM)model is employed to perform classification process.At last,the CMVO algorithm is utilized for optimally tuning the hyperparameters involved in the CLSTM model.In order to report the enhancements of the CMVODL-SSC model,a wide range of simulations was carried out and the results ensured the better performance of the CMVODL-SSC model with average accuracy of 96.90%.
基金The authors extend their appreciation to the King Salman center for Disability Research for funding this work through Research Group no KSRG-2022-017.
文摘The problem of producing a natural language description of an image for describing the visual content has gained more attention in natural language processing(NLP)and computer vision(CV).It can be driven by applications like image retrieval or indexing,virtual assistants,image understanding,and support of visually impaired people(VIP).Though the VIP uses other senses,touch and hearing,for recognizing objects and events,the quality of life of those persons is lower than the standard level.Automatic Image captioning generates captions that will be read loudly to the VIP,thereby realizing matters happening around them.This article introduces a Red Deer Optimization with Artificial Intelligence Enabled Image Captioning System(RDOAI-ICS)for Visually Impaired People.The presented RDOAI-ICS technique aids in generating image captions for VIPs.The presented RDOAIICS technique utilizes a neural architectural search network(NASNet)model to produce image representations.Besides,the RDOAI-ICS technique uses the radial basis function neural network(RBFNN)method to generate a textual description.To enhance the performance of the RDOAI-ICS method,the parameter optimization process takes place using the RDO algorithm for NasNet and the butterfly optimization algorithm(BOA)for the RBFNN model,showing the novelty of the work.The experimental evaluation of the RDOAI-ICS method can be tested using a benchmark dataset.The outcomes show the enhancements of the RDOAI-ICS method over other recent Image captioning approaches.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2023R191)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4310373DSR61)This study is supported via funding from Prince Sattam bin Abdulaziz University project number(PSAU/2023/R/1444).
文摘Artificial Intelligence(AI)and Computer Vision(CV)advancements have led to many useful methodologies in recent years,particularly to help visually-challenged people.Object detection includes a variety of challenges,for example,handlingmultiple class images,images that get augmented when captured by a camera and so on.The test images include all these variants as well.These detection models alert them about their surroundings when they want to walk independently.This study compares four CNN-based pre-trainedmodels:ResidualNetwork(ResNet-50),Inception v3,DenseConvolutional Network(DenseNet-121),and SqueezeNet,predominantly used in image recognition applications.Based on the analysis performed on these test images,the study infers that Inception V3 outperformed other pre-trained models in terms of accuracy and speed.To further improve the performance of the Inception v3 model,the thermal exchange optimization(TEO)algorithm is applied to tune the hyperparameters(number of epochs,batch size,and learning rate)showing the novelty of the work.Better accuracy was achieved owing to the inclusion of an auxiliary classifier as a regularizer,hyperparameter optimizer,and factorization approach.Additionally,Inception V3 can handle images of different sizes.This makes Inception V3 the optimum model for assisting visually challenged people in real-world communication when integrated with Internet of Things(IoT)-based devices.
基金The authors extend their appreciation to the King Salman center for Disability Research for funding this work through Research Group no KSRG-2022-030。
文摘Visual impairment is one of the major problems among people of all age groups across the globe.Visually Impaired Persons(VIPs)require help from others to carry out their day-to-day tasks.Since they experience several problems in their daily lives,technical intervention can help them resolve the challenges.In this background,an automatic object detection tool is the need of the hour to empower VIPs with safe navigation.The recent advances in the Internet of Things(IoT)and Deep Learning(DL)techniques make it possible.The current study proposes IoT-assisted Transient Search Optimization with a Lightweight RetinaNetbased object detection(TSOLWR-ODVIP)model to help VIPs.The primary aim of the presented TSOLWR-ODVIP technique is to identify different objects surrounding VIPs and to convey the information via audio message to them.For data acquisition,IoT devices are used in this study.Then,the Lightweight RetinaNet(LWR)model is applied to detect objects accurately.Next,the TSO algorithm is employed for fine-tuning the hyperparameters involved in the LWR model.Finally,the Long Short-Term Memory(LSTM)model is exploited for classifying objects.The performance of the proposed TSOLWR-ODVIP technique was evaluated using a set of objects,and the results were examined under distinct aspects.The comparison study outcomes confirmed that the TSOLWR-ODVIP model could effectually detect and classify the objects,enhancing the quality of life of VIPs.
基金This work was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University,through the Research Groups Program Grant No.(RGP-1443-0051).
文摘With the advent of the Internet of Things(IoT),several devices like sensors nowadays can interact and easily share information.But the IoT model is prone to security concerns as several attackers try to hit the network and make it vulnerable.In such scenarios,security concern is the most prominent.Different models were intended to address these security problems;still,several emergent variants of botnet attacks like Bashlite,Mirai,and Persirai use security breaches.The malware classification and detection in the IoT model is still a problem,as the adversary reliably generates a new variant of IoT malware and actively searches for compromise on the victim devices.This article develops a Sine Cosine Algorithm with Deep Learning based Ransomware Detection and Classification(SCADL-RWDC)method in an IoT environment.In the presented SCADL-RWDCtechnique,the major intention exists in recognizing and classifying ransomware attacks in the IoT platform.The SCADL-RWDC technique uses the SCA feature selection(SCA-FS)model to improve the detection rate.Besides,the SCADL-RWDC technique exploits the hybrid grey wolf optimizer(HGWO)with a gated recurrent unit(GRU)model for ransomware classification.A widespread experimental analysis is performed to exhibit the enhanced ransomware detection outcomes of the SCADL-RWDC technique.The comparison study reported the enhancement of the SCADL-RWDC technique over other models.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number(RGP 2/158/43)Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R161)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4340237DSR11).
文摘Biomedical image processing is widely utilized for disease detection and classification of biomedical images.Tongue color image analysis is an effective and non-invasive tool for carrying out secondary detection at anytime and anywhere.For removing the qualitative aspect,tongue images are quantitatively inspected,proposing a novel disease classification model in an automated way is preferable.This article introduces a novel political optimizer with deep learning enabled tongue color image analysis(PODL-TCIA)technique.The presented PODL-TCIA model purposes to detect the occurrence of the disease by examining the color of the tongue.To attain this,the PODL-TCIA model initially performs image pre-processing to enhance medical image quality.Followed by,Inception with ResNet-v2 model is employed for feature extraction.Besides,political optimizer(PO)with twin support vector machine(TSVM)model is exploited for image classification process,shows the novelty of the work.The design of PO algorithm assists in the optimal parameter selection of the TSVM model.For ensuring the enhanced outcomes of the PODL-TCIA model,a wide-ranging experimental analysis was applied and the outcomes reported the betterment of the PODL-TCIA model over the recent approaches.
基金This work was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University,through the Research Groups Program Grant no.(RGP-1443-0048).
文摘The Internet of Things(IoT)has gained more popularity in research because of its large-scale challenges and implementation.But security was the main concern when witnessing the fast development in its applications and size.It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats.Additionally,machine learning(ML)techniques optimally use a colossal volume of data generated by IoT devices.Deep Learning(DL)related systems were modelled for attack detection in IoT.But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations.This study develops an Artificial Algae Optimization Algorithm with Optimal Deep Belief Network(AAA-ODBN)Enabled Ransomware Detection in an IoT environment.The presented AAAODBN technique mainly intends to recognize and categorize ransomware in the IoT environment.The presented AAA-ODBN technique follows a three-stage process:feature selection,classification,and parameter tuning.In the first stage,the AAA-ODBN technique uses AAA based feature selection(AAA-FS)technique to elect feature subsets.Secondly,the AAA-ODBN technique employs the DBN model for ransomware detection.At last,the dragonfly algorithm(DFA)is utilized for the hyperparameter tuning of the DBN technique.A sequence of simulations is implemented to demonstrate the improved performance of the AAA-ODBN algorithm.The experimental values indicate the significant outcome of the AAA-ODBN model over other models.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R140)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:22UQU4310373DSR15.
文摘Recent developments on Internet and social networking have led to the growth of aggressive language and hate speech.Online provocation,abuses,and attacks are widely termed cyberbullying(CB).The massive quantity of user generated content makes it difficult to recognize CB.Current advancements in machine learning(ML),deep learning(DL),and natural language processing(NLP)tools enable to detect and classify CB in social networks.In this view,this study introduces a spotted hyena optimizer with deep learning driven cybersecurity(SHODLCS)model for OSN.The presented SHODLCS model intends to accomplish cybersecurity from the identification of CB in the OSN.For achieving this,the SHODLCS model involves data pre-processing and TF-IDF based feature extraction.In addition,the cascaded recurrent neural network(CRNN)model is applied for the identification and classification of CB.Finally,the SHO algorithm is exploited to optimally tune the hyperparameters involved in the CRNN model and thereby results in enhanced classifier performance.The experimental validation of the SHODLCS model on the benchmark dataset portrayed the better outcomes of the SHODLCS model over the recent approaches.
基金This work was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University,through the Research Groups Program Grant No.(RGP-1443-0051)。
文摘With recent advancements in information and communication technology,a huge volume of corporate and sensitive user data was shared consistently across the network,making it vulnerable to an attack that may be brought some factors under risk:data availability,confidentiality,and integrity.Intrusion Detection Systems(IDS)were mostly exploited in various networks to help promptly recognize intrusions.Nowadays,blockchain(BC)technology has received much more interest as a means to share data without needing a trusted third person.Therefore,this study designs a new Blockchain Assisted Optimal Machine Learning based Cyberattack Detection and Classification(BAOML-CADC)technique.In the BAOML-CADC technique,the major focus lies in identifying cyberattacks.To do so,the presented BAOML-CADC technique applies a thermal equilibrium algorithm-based feature selection(TEA-FS)method for the optimal choice of features.The BAOML-CADC technique uses an extreme learning machine(ELM)model for cyberattack recognition.In addition,a BC-based integrity verification technique is developed to defend against the misrouting attack,showing the innovation of the work.The experimental validation of BAOML-CADC algorithm is tested on a benchmark cyberattack dataset.The obtained values implied the improved performance of the BAOML-CADC algorithm over other techniques.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP 2/180/43)Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R161)+1 种基金Princess Nourah bint Abdulrahman University,Riyadh,Saudi ArabiaThe authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4210118DSR07).
文摘Cyberattack detection has become an important research domain owing to increasing number of cybercrimes in recent years.Both Machine Learning(ML)and Deep Learning(DL)classification models are useful in effective identification and classification of cyberattacks.In addition,the involvement of hyper parameters in DL models has a significantly influence upon the overall performance of the classification models.In this background,the current study develops Intelligent Cybersecurity Classification using Chaos Game Optimization with Deep Learning(ICC-CGODL)Model.The goal of the proposed ICC-CGODL model is to recognize and categorize different kinds of attacks made upon data.Besides,ICC-CGODL model primarily performs min-max normalization process to normalize the data into uniform format.In addition,Bidirectional Gated Recurrent Unit(BiGRU)model is utilized for detection and classification of cyberattacks.Moreover,CGO algorithm is also exploited to adjust the hyper parameters involved in BiGRU model which is the novelty of current work.A wide-range of simulation analysis was conducted on benchmark dataset and the results obtained confirmed the significant performance of ICC-CGODL technique than the recent approaches.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP 2/158/43)Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R238)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:22UQU4340237DSR13.
文摘Recently,unmanned aerial vehicles(UAV)or drones are widely employed for several application areas such as surveillance,disaster management,etc.Since UAVs are limited to energy,efficient coordination between them becomes essential to optimally utilize the resources and effective communication among them and base station(BS).Therefore,clustering can be employed as an effective way of accomplishing smart communication systems among multiple UAVs.In this aspect,this paper presents a group teaching optimization algorithm with deep learning enabled smart communication system(GTOADL-SCS)technique for UAV networks.The proposed GTOADL-SCS model encompasses a two stage process namely clustering and classification.At the initial stage,the GTOADL-SCS model includes a GTOA based clustering scheme to elect cluster heads(CHs)and organize clusters.Besides,the GTOADL-SCS model develops a fitness function containing three input parameters as residual energy of UAVs,average neighoring distance,and UAV degree.For classification process,the GTOADLSCS model applies pre-trained densely connected network(DenseNet201)feature extractor with gated recurrent unit(GRU)classifier.For ensuring the enhanced performance of the GTOADL-SCS model,a widespread simulation analysis is performed and the comparative study reported the significant outcomes over the existing approaches with maximum packet delivery ratio(PDR)of 92.60%.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP 2/46/43)Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R237)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:22UQU4310373DSR11.
文摘Multicarrier Waveform(MCW)has several advantages and plays a very important role in cellular systems.Fifth generation(5G)MCW such as Non-Orthogonal Multiple Access(NOMA)and Filter Bank Multicarrier(FBMC)are thought to be important in 5G implementation.High Peak to Average Power Ratio(PAPR)is seen as a serious concern in MCW since it reduces the efficiency of amplifier use in the user devices.The paper presents a novel Divergence Selective Mapping(DSLM)and Divergence Partial Transmission Sequence(D-PTS)for 5G waveforms.It is seen that the proposed D-SLM and PTS lower PAPR with low computational complexity.The work highlighted a combination of multi-data block partial transmit schemes along with tone reservation.In this,an overlapping factor is used to determine the number of data blocks for every group.Here,considering only those data blocks that have minimum signal power,the use of DSLM and DPTS are required to eliminate the segment’s peaks.Simulation results reveal that the suggested hybrid technique proves to be better than the conventional PTS scheme.Furthermore,the power saving performance of FBMC and NOMA is compared with the Orthogonal Frequency Division Multiplexing(OFDM)waveform.
基金The authors extend their appreciation to the King Salman center for Disability Research for funding this work through Research Group no KSRG-2022-030.
文摘Text-To-Speech(TTS)is a speech processing tool that is highly helpful for visually-challenged people.The TTS tool is applied to transform the texts into human-like sounds.However,it is highly challenging to accomplish the TTS out-comes for the non-diacritized text of the Arabic language since it has multiple unique features and rules.Some special characters like gemination and diacritic signs that correspondingly indicate consonant doubling and short vowels greatly impact the precise pronunciation of the Arabic language.But,such signs are not frequently used in the texts written in the Arabic language since its speakers and readers can guess them from the context itself.In this background,the current research article introduces an Optimal Deep Learning-driven Arab Text-to-Speech Synthesizer(ODLD-ATSS)model to help the visually-challenged people in the Kingdom of Saudi Arabia.The prime aim of the presented ODLD-ATSS model is to convert the text into speech signals for visually-challenged people.To attain this,the presented ODLD-ATSS model initially designs a Gated Recurrent Unit(GRU)-based prediction model for diacritic and gemination signs.Besides,the Buckwalter code is utilized to capture,store and display the Arabic texts.To improve the TSS performance of the GRU method,the Aquila Optimization Algorithm(AOA)is used,which shows the novelty of the work.To illustrate the enhanced performance of the proposed ODLD-ATSS model,further experi-mental analyses were conducted.The proposed model achieved a maximum accu-racy of 96.35%,and the experimental outcomes infer the improved performance of the proposed ODLD-ATSS model over other DL-based TSS models.