期刊文献+
共找到79篇文章
< 1 2 4 >
每页显示 20 50 100
Digital Text Document Watermarking Based Tampering Attack Detection via Internet
1
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 Fahd N.Al-Wesabi Mesfer Al Duhayyim anwer mustafa hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 2024年第3期759-771,共13页
Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentica... Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentication,and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors’difficulties were tampering detection,authentication,and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection(ADMDTW-TAD)via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document’s appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document,it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes,and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models. 展开更多
关键词 Content authentication tampering attacks detection model SECURITY digital watermarking
下载PDF
Malicious URL Classification Using Artificial Fish Swarm Optimization and Deep Learning
2
作者 anwer mustafa hilal Aisha Hassan Abdalla Hashim +5 位作者 Heba G.Mohamed Mohamed K.Nour Mashael M.Asiri Ali M.Al-Sharafi Mahmoud Othman Abdelwahed Motwakel 《Computers, Materials & Continua》 SCIE EI 2023年第1期607-621,共15页
Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital era.Malicious Uniform Resource Locators(URLs)can be embedded in email or Twitter and used... Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital era.Malicious Uniform Resource Locators(URLs)can be embedded in email or Twitter and used to lure vulnerable internet users to implement malicious data in their systems.This may result in compromised security of the systems,scams,and other such cyberattacks.These attacks hijack huge quantities of the available data,incurring heavy financial loss.At the same time,Machine Learning(ML)and Deep Learning(DL)models paved the way for designing models that can detect malicious URLs accurately and classify them.With this motivation,the current article develops an Artificial Fish Swarm Algorithm(AFSA)with Deep Learning Enabled Malicious URL Detection and Classification(AFSADL-MURLC)model.The presented AFSADL-MURLC model intends to differentiate the malicious URLs from genuine URLs.To attain this,AFSADL-MURLC model initially carries out data preprocessing and makes use of glove-based word embedding technique.In addition,the created vector model is then passed onto Gated Recurrent Unit(GRU)classification to recognize the malicious URLs.Finally,AFSA is applied to the proposed model to enhance the efficiency of GRU model.The proposed AFSADL-MURLC technique was experimentally validated using benchmark dataset sourced from Kaggle repository.The simulation results confirmed the supremacy of the proposed AFSADL-MURLC model over recent approaches under distinct measures. 展开更多
关键词 Malicious URL CYBERSECURITY deep learning machine learning metaheuristics gated recurrent unit
下载PDF
Deep Transfer Learning Driven Automated Fall Detection for Quality of Living of Disabled Persons
3
作者 Nabil Almalki Mrim M.Alnfiai +3 位作者 Fahd N.Al-Wesabi Mesfer Alduhayyem anwer mustafa hilal Manar Ahmed Hamza 《Computers, Materials & Continua》 SCIE EI 2023年第3期6719-6736,共18页
Mobile communication and the Internet of Things(IoT)technologies have recently been established to collect data from human beings and the environment.The data collected can be leveraged to provide intelligent services... Mobile communication and the Internet of Things(IoT)technologies have recently been established to collect data from human beings and the environment.The data collected can be leveraged to provide intelligent services through different applications.It is an extreme challenge to monitor disabled people from remote locations.It is because day-to-day events like falls heavily result in accidents.For a person with disabilities,a fall event is an important cause of mortality and post-traumatic complications.Therefore,detecting the fall events of disabled persons in smart homes at early stages is essential to provide the necessary support and increase their survival rate.The current study introduces a Whale Optimization Algorithm Deep Transfer Learning-DrivenAutomated Fall Detection(WOADTL-AFD)technique to improve the Quality of Life for persons with disabilities.The primary aim of the presented WOADTL-AFD technique is to identify and classify the fall events to help disabled individuals.To attain this,the proposed WOADTL-AFDmodel initially uses amodified SqueezeNet feature extractor which proficiently extracts the feature vectors.In addition,the WOADTLAFD technique classifies the fall events using an extreme Gradient Boosting(XGBoost)classifier.In the presented WOADTL-AFD technique,the WOA approach is used to fine-tune the hyperparameters involved in the modified SqueezeNet model.The proposedWOADTL-AFD technique was experimentally validated using the benchmark datasets,and the results confirmed the superior performance of the proposedWOADTL-AFD method compared to other recent approaches. 展开更多
关键词 Quality of living disabled persons intelligent models deep learning fall detection whale optimization algorithm
下载PDF
Fusion-Based Deep Learning Model for Automated Forest Fire Detection
4
作者 Mesfer Al Duhayyim Majdy M.Eltahir +5 位作者 Ola Abdelgney Omer Ali Amani Abdulrahman Albraikan Fahd N.Al-Wesabi anwer mustafa hilal Manar Ahmed Hamza Mohammed Rizwanullah 《Computers, Materials & Continua》 SCIE EI 2023年第10期1355-1371,共17页
Earth resource and environmental monitoring are essential areas that can be used to investigate the environmental conditions and natural resources supporting sustainable policy development,regulatory measures,and thei... Earth resource and environmental monitoring are essential areas that can be used to investigate the environmental conditions and natural resources supporting sustainable policy development,regulatory measures,and their implementation elevating the environment.Large-scale forest fire is considered a major harmful hazard that affects climate change and life over the globe.Therefore,the early identification of forest fires using automated tools is essential to avoid the spread of fire to a large extent.Therefore,this paper focuses on the design of automated forest fire detection using a fusion-based deep learning(AFFD-FDL)model for environmental monitoring.The AFFDFDL technique involves the design of an entropy-based fusion model for feature extraction.The combination of the handcrafted features using histogram of gradients(HOG)with deep features using SqueezeNet and Inception v3 models.Besides,an optimal extreme learning machine(ELM)based classifier is used to identify the existence of fire or not.In order to properly tune the parameters of the ELM model,the oppositional glowworm swarm optimization(OGSO)algorithm is employed and thereby improves the forest fire detection performance.A wide range of simulation analyses takes place on a benchmark dataset and the results are inspected under several aspects.The experimental results highlighted the betterment of the AFFD-FDL technique over the recent state of art techniques. 展开更多
关键词 Environment monitoring remote sensing forest fire detection deep learning machine learning fusion model
下载PDF
Automated Deep Learning Based Melanoma Detection and Classification Using Biomedical Dermoscopic Images
5
作者 Amani Abdulrahman Albraikan Nadhem NEMRI +3 位作者 Mimouna Abdullah Alkhonaini anwer mustafa hilal Ishfaq Yaseen Abdelwahed Motwakel 《Computers, Materials & Continua》 SCIE EI 2023年第2期2443-2459,共17页
Melanoma remains a serious illness which is a common formof skin cancer.Since the earlier detection of melanoma reduces the mortality rate,it is essential to design reliable and automated disease diagnosis model using... Melanoma remains a serious illness which is a common formof skin cancer.Since the earlier detection of melanoma reduces the mortality rate,it is essential to design reliable and automated disease diagnosis model using dermoscopic images.The recent advances in deep learning(DL)models find useful to examine the medical image and make proper decisions.In this study,an automated deep learning based melanoma detection and classification(ADL-MDC)model is presented.The goal of the ADL-MDC technique is to examine the dermoscopic images to determine the existence of melanoma.The ADL-MDC technique performs contrast enhancement and data augmentation at the initial stage.Besides,the k-means clustering technique is applied for the image segmentation process.In addition,Adagrad optimizer based Capsule Network(CapsNet)model is derived for effective feature extraction process.Lastly,crow search optimization(CSO)algorithm with sparse autoencoder(SAE)model is utilized for the melanoma classification process.The exploitation of the Adagrad and CSO algorithm helps to properly accomplish improved performance.A wide range of simulation analyses is carried out on benchmark datasets and the results are inspected under several aspects.The simulation results reported the enhanced performance of the ADL-MDC technique over the recent approaches. 展开更多
关键词 Biomedical images dermoscopic images deep learning melanoma detection machine learning
下载PDF
Optimal Deep Convolutional Neural Network for Vehicle Detection in Remote Sensing Images
6
作者 Saeed Masoud Alshahrani Saud S.Alotaibi +5 位作者 Shaha Al-Otaibi Mohamed Mousa anwer mustafa hilal Amgad Atta Abdelmageed Abdelwahed Motwakel Mohamed I.Eldesouki 《Computers, Materials & Continua》 SCIE EI 2023年第2期3117-3131,共15页
Object detection(OD)in remote sensing images(RSI)acts as a vital part in numerous civilian and military application areas,like urban planning,geographic information system(GIS),and search and rescue functions.Vehicle ... Object detection(OD)in remote sensing images(RSI)acts as a vital part in numerous civilian and military application areas,like urban planning,geographic information system(GIS),and search and rescue functions.Vehicle recognition from RSIs remained a challenging process because of the difficulty of background data and the redundancy of recognition regions.The latest advancements in deep learning(DL)approaches permit the design of effectual OD approaches.This study develops an Artificial Ecosystem Optimizer with Deep Convolutional Neural Network for Vehicle Detection(AEODCNN-VD)model on Remote Sensing Images.The proposed AEODCNN-VD model focuses on the identification of vehicles accurately and rapidly.To detect vehicles,the presented AEODCNN-VD model employs single shot detector(SSD)with Inception network as a baseline model.In addition,Multiway Feature Pyramid Network(MFPN)is used for handling objects of varying sizes in RSIs.The features from the Inception model are passed into theMFPNformultiway andmultiscale feature fusion.Finally,the fused features are passed into bounding box and class prediction networks.For enhancing the detection efficiency of the AEODCNN-VD approach,AEO based hyperparameter optimizer is used,which is stimulated by the energy transfer strategies such as production,consumption,and decomposition in an ecosystem.The performance validation of the presentedmethod on benchmark datasets showed promising performance over recent DL models. 展开更多
关键词 Object detection remote sensing vehicle detection artificial ecosystem optimizer convolutional neural network
下载PDF
Optimal Wavelet Neural Network-Based Intrusion Detection in Internet of Things Environment
7
作者 Heba G.Mohamed Fadwa Alrowais +3 位作者 Mohammed Abdullah Al-Hagery Mesfer Al Duhayyim anwer mustafa hilal Abdelwahed Motwakel 《Computers, Materials & Continua》 SCIE EI 2023年第5期4467-4483,共17页
As the Internet of Things(IoT)endures to develop,a huge count of data has been created.An IoT platform is rather sensitive to security challenges as individual data can be leaked,or sensor data could be used to cause ... As the Internet of Things(IoT)endures to develop,a huge count of data has been created.An IoT platform is rather sensitive to security challenges as individual data can be leaked,or sensor data could be used to cause accidents.As typical intrusion detection system(IDS)studies can be frequently designed for working well on databases,it can be unknown if they intend to work well in altering network environments.Machine learning(ML)techniques are depicted to have a higher capacity at assisting mitigate an attack on IoT device and another edge system with reasonable accuracy.This article introduces a new Bird Swarm Algorithm with Wavelet Neural Network for Intrusion Detection(BSAWNN-ID)in the IoT platform.The main intention of the BSAWNN-ID algorithm lies in detecting and classifying intrusions in the IoT platform.The BSAWNN-ID technique primarily designs a feature subset selection using the coyote optimization algorithm(FSS-COA)to attain this.Next,to detect intrusions,the WNN model is utilized.At last,theWNNparameters are optimally modified by the use of BSA.Awidespread experiment is performed to depict the better performance of the BSAWNNID technique.The resultant values indicated the better performance of the BSAWNN-ID technique over other models,with an accuracy of 99.64%on the UNSW-NB15 dataset. 展开更多
关键词 Internet of things wavelet neural network SECURITY intrusion detection machine learning
下载PDF
Competitive Multi-Verse Optimization with Deep Learning Based Sleep Stage Classification
8
作者 anwer mustafa hilal Amal Al-Rasheed +5 位作者 Jaber SAlzahrani Majdy M.Eltahir Mesfer Al Duhayyim Nermin M.Salem Ishfaq Yaseen Abdelwahed Motwakel 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1249-1263,共15页
Sleep plays a vital role in optimum working of the brain and the body.Numerous people suffer from sleep-oriented illnesses like apnea,insomnia,etc.Sleep stage classification is a primary process in the quantitative ex... Sleep plays a vital role in optimum working of the brain and the body.Numerous people suffer from sleep-oriented illnesses like apnea,insomnia,etc.Sleep stage classification is a primary process in the quantitative examination of polysomnographic recording.Sleep stage scoring is mainly based on experts’knowledge which is laborious and time consuming.Hence,it can be essential to design automated sleep stage classification model using machine learning(ML)and deep learning(DL)approaches.In this view,this study focuses on the design of Competitive Multi-verse Optimization with Deep Learning Based Sleep Stage Classification(CMVODL-SSC)model using Electroencephalogram(EEG)signals.The proposed CMVODL-SSC model intends to effectively categorize different sleep stages on EEG signals.Primarily,data pre-processing is performed to convert the actual data into useful format.Besides,a cascaded long short term memory(CLSTM)model is employed to perform classification process.At last,the CMVO algorithm is utilized for optimally tuning the hyperparameters involved in the CLSTM model.In order to report the enhancements of the CMVODL-SSC model,a wide range of simulations was carried out and the results ensured the better performance of the CMVODL-SSC model with average accuracy of 96.90%. 展开更多
关键词 Signal processing EEG signals sleep stage classification clstm model deep learning cmvo algorithm
下载PDF
Red Deer Optimization with Artificial Intelligence Enabled Image Captioning System for Visually Impaired People
9
作者 anwer mustafa hilal Fadwa Alrowais +1 位作者 Fahd N.Al-Wesabi Radwa Marzouk 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1929-1945,共17页
The problem of producing a natural language description of an image for describing the visual content has gained more attention in natural language processing(NLP)and computer vision(CV).It can be driven by applicatio... The problem of producing a natural language description of an image for describing the visual content has gained more attention in natural language processing(NLP)and computer vision(CV).It can be driven by applications like image retrieval or indexing,virtual assistants,image understanding,and support of visually impaired people(VIP).Though the VIP uses other senses,touch and hearing,for recognizing objects and events,the quality of life of those persons is lower than the standard level.Automatic Image captioning generates captions that will be read loudly to the VIP,thereby realizing matters happening around them.This article introduces a Red Deer Optimization with Artificial Intelligence Enabled Image Captioning System(RDOAI-ICS)for Visually Impaired People.The presented RDOAI-ICS technique aids in generating image captions for VIPs.The presented RDOAIICS technique utilizes a neural architectural search network(NASNet)model to produce image representations.Besides,the RDOAI-ICS technique uses the radial basis function neural network(RBFNN)method to generate a textual description.To enhance the performance of the RDOAI-ICS method,the parameter optimization process takes place using the RDO algorithm for NasNet and the butterfly optimization algorithm(BOA)for the RBFNN model,showing the novelty of the work.The experimental evaluation of the RDOAI-ICS method can be tested using a benchmark dataset.The outcomes show the enhancements of the RDOAI-ICS method over other recent Image captioning approaches. 展开更多
关键词 Machine learning image captioning visually impaired people parameter tuning artificial intelligence metaheuristics
下载PDF
Intelligent Deep Convolutional Neural Network Based Object DetectionModel for Visually Challenged People
10
作者 S.Kiruthika Devi Amani Abdulrahman Albraikan +3 位作者 Fahd N.Al-Wesabi Mohamed K.Nour Ahmed Ashour anwer mustafa hilal 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3191-3207,共17页
Artificial Intelligence(AI)and Computer Vision(CV)advancements have led to many useful methodologies in recent years,particularly to help visually-challenged people.Object detection includes a variety of challenges,fo... Artificial Intelligence(AI)and Computer Vision(CV)advancements have led to many useful methodologies in recent years,particularly to help visually-challenged people.Object detection includes a variety of challenges,for example,handlingmultiple class images,images that get augmented when captured by a camera and so on.The test images include all these variants as well.These detection models alert them about their surroundings when they want to walk independently.This study compares four CNN-based pre-trainedmodels:ResidualNetwork(ResNet-50),Inception v3,DenseConvolutional Network(DenseNet-121),and SqueezeNet,predominantly used in image recognition applications.Based on the analysis performed on these test images,the study infers that Inception V3 outperformed other pre-trained models in terms of accuracy and speed.To further improve the performance of the Inception v3 model,the thermal exchange optimization(TEO)algorithm is applied to tune the hyperparameters(number of epochs,batch size,and learning rate)showing the novelty of the work.Better accuracy was achieved owing to the inclusion of an auxiliary classifier as a regularizer,hyperparameter optimizer,and factorization approach.Additionally,Inception V3 can handle images of different sizes.This makes Inception V3 the optimum model for assisting visually challenged people in real-world communication when integrated with Internet of Things(IoT)-based devices. 展开更多
关键词 Pre-trained models object detection visually challenged people deep learning Inception V3 DenseNet-121
下载PDF
IoT-Driven Optimal Lightweight RetinaNet-Based Object Detection for Visually Impaired People
11
作者 Mesfer Alduhayyem Mrim M.Alnfiai +3 位作者 Nabil Almalki Fahd N.Al-Wesabi anwer mustafa hilal Manar Ahmed Hamza 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期475-489,共15页
Visual impairment is one of the major problems among people of all age groups across the globe.Visually Impaired Persons(VIPs)require help from others to carry out their day-to-day tasks.Since they experience several ... Visual impairment is one of the major problems among people of all age groups across the globe.Visually Impaired Persons(VIPs)require help from others to carry out their day-to-day tasks.Since they experience several problems in their daily lives,technical intervention can help them resolve the challenges.In this background,an automatic object detection tool is the need of the hour to empower VIPs with safe navigation.The recent advances in the Internet of Things(IoT)and Deep Learning(DL)techniques make it possible.The current study proposes IoT-assisted Transient Search Optimization with a Lightweight RetinaNetbased object detection(TSOLWR-ODVIP)model to help VIPs.The primary aim of the presented TSOLWR-ODVIP technique is to identify different objects surrounding VIPs and to convey the information via audio message to them.For data acquisition,IoT devices are used in this study.Then,the Lightweight RetinaNet(LWR)model is applied to detect objects accurately.Next,the TSO algorithm is employed for fine-tuning the hyperparameters involved in the LWR model.Finally,the Long Short-Term Memory(LSTM)model is exploited for classifying objects.The performance of the proposed TSOLWR-ODVIP technique was evaluated using a set of objects,and the results were examined under distinct aspects.The comparison study outcomes confirmed that the TSOLWR-ODVIP model could effectually detect and classify the objects,enhancing the quality of life of VIPs. 展开更多
关键词 Visually impaired people deep learning object detection computer vision long short-term memory transient search optimization
下载PDF
Optimal Deep Learning Based Ransomware Detection and Classification in the Internet of Things Environment
12
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 Fahd N.Al-Wesabi Mesfer Al Duhayyim anwer mustafa hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3087-3102,共16页
With the advent of the Internet of Things(IoT),several devices like sensors nowadays can interact and easily share information.But the IoT model is prone to security concerns as several attackers try to hit the networ... With the advent of the Internet of Things(IoT),several devices like sensors nowadays can interact and easily share information.But the IoT model is prone to security concerns as several attackers try to hit the network and make it vulnerable.In such scenarios,security concern is the most prominent.Different models were intended to address these security problems;still,several emergent variants of botnet attacks like Bashlite,Mirai,and Persirai use security breaches.The malware classification and detection in the IoT model is still a problem,as the adversary reliably generates a new variant of IoT malware and actively searches for compromise on the victim devices.This article develops a Sine Cosine Algorithm with Deep Learning based Ransomware Detection and Classification(SCADL-RWDC)method in an IoT environment.In the presented SCADL-RWDCtechnique,the major intention exists in recognizing and classifying ransomware attacks in the IoT platform.The SCADL-RWDC technique uses the SCA feature selection(SCA-FS)model to improve the detection rate.Besides,the SCADL-RWDC technique exploits the hybrid grey wolf optimizer(HGWO)with a gated recurrent unit(GRU)model for ransomware classification.A widespread experimental analysis is performed to exhibit the enhanced ransomware detection outcomes of the SCADL-RWDC technique.The comparison study reported the enhancement of the SCADL-RWDC technique over other models. 展开更多
关键词 SECURITY IoT network ransomware attack deep learning metaheuristics
下载PDF
Political Optimizer with Deep Learning-Enabled Tongue Color Image Analysis Model
13
作者 anwer mustafa hilal Eatedal Alabdulkreem +5 位作者 Jaber S.Alzahrani Majdy M.Eltahir Mohamed I.Eldesouki Ishfaq Yaseen Abdelwahed Motwakel Radwa Marzouk 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1129-1143,共15页
Biomedical image processing is widely utilized for disease detection and classification of biomedical images.Tongue color image analysis is an effective and non-invasive tool for carrying out secondary detection at an... Biomedical image processing is widely utilized for disease detection and classification of biomedical images.Tongue color image analysis is an effective and non-invasive tool for carrying out secondary detection at anytime and anywhere.For removing the qualitative aspect,tongue images are quantitatively inspected,proposing a novel disease classification model in an automated way is preferable.This article introduces a novel political optimizer with deep learning enabled tongue color image analysis(PODL-TCIA)technique.The presented PODL-TCIA model purposes to detect the occurrence of the disease by examining the color of the tongue.To attain this,the PODL-TCIA model initially performs image pre-processing to enhance medical image quality.Followed by,Inception with ResNet-v2 model is employed for feature extraction.Besides,political optimizer(PO)with twin support vector machine(TSVM)model is exploited for image classification process,shows the novelty of the work.The design of PO algorithm assists in the optimal parameter selection of the TSVM model.For ensuring the enhanced outcomes of the PODL-TCIA model,a wide-ranging experimental analysis was applied and the outcomes reported the betterment of the PODL-TCIA model over the recent approaches. 展开更多
关键词 Tongue color image analysis political optimizer twin support vector machine inception model deep learning
下载PDF
Artificial Algae Optimization with Deep Belief Network Enabled Ransomware Detection in IoT Environment
14
作者 Mesfer Al Duhayyim Heba G.Mohamed +3 位作者 Fadwa Alrowais Fahd N.Al-Wesabi anwer mustafa hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1293-1310,共18页
The Internet of Things(IoT)has gained more popularity in research because of its large-scale challenges and implementation.But security was the main concern when witnessing the fast development in its applications and... The Internet of Things(IoT)has gained more popularity in research because of its large-scale challenges and implementation.But security was the main concern when witnessing the fast development in its applications and size.It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats.Additionally,machine learning(ML)techniques optimally use a colossal volume of data generated by IoT devices.Deep Learning(DL)related systems were modelled for attack detection in IoT.But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations.This study develops an Artificial Algae Optimization Algorithm with Optimal Deep Belief Network(AAA-ODBN)Enabled Ransomware Detection in an IoT environment.The presented AAAODBN technique mainly intends to recognize and categorize ransomware in the IoT environment.The presented AAA-ODBN technique follows a three-stage process:feature selection,classification,and parameter tuning.In the first stage,the AAA-ODBN technique uses AAA based feature selection(AAA-FS)technique to elect feature subsets.Secondly,the AAA-ODBN technique employs the DBN model for ransomware detection.At last,the dragonfly algorithm(DFA)is utilized for the hyperparameter tuning of the DBN technique.A sequence of simulations is implemented to demonstrate the improved performance of the AAA-ODBN algorithm.The experimental values indicate the significant outcome of the AAA-ODBN model over other models. 展开更多
关键词 Internet of things deep learning CYBERSECURITY ransomware detection feature selection
下载PDF
Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks
15
作者 anwer mustafa hilal Aisha Hassan Abdalla Hashim +5 位作者 Heba G.Mohamed Lubna A.Alharbi Mohamed K.Nour Abdullah Mohamed Ahmed S.Almasoud Abdelwahed Motwakel 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2033-2047,共15页
Recent developments on Internet and social networking have led to the growth of aggressive language and hate speech.Online provocation,abuses,and attacks are widely termed cyberbullying(CB).The massive quantity of use... Recent developments on Internet and social networking have led to the growth of aggressive language and hate speech.Online provocation,abuses,and attacks are widely termed cyberbullying(CB).The massive quantity of user generated content makes it difficult to recognize CB.Current advancements in machine learning(ML),deep learning(DL),and natural language processing(NLP)tools enable to detect and classify CB in social networks.In this view,this study introduces a spotted hyena optimizer with deep learning driven cybersecurity(SHODLCS)model for OSN.The presented SHODLCS model intends to accomplish cybersecurity from the identification of CB in the OSN.For achieving this,the SHODLCS model involves data pre-processing and TF-IDF based feature extraction.In addition,the cascaded recurrent neural network(CRNN)model is applied for the identification and classification of CB.Finally,the SHO algorithm is exploited to optimally tune the hyperparameters involved in the CRNN model and thereby results in enhanced classifier performance.The experimental validation of the SHODLCS model on the benchmark dataset portrayed the better outcomes of the SHODLCS model over the recent approaches. 展开更多
关键词 CYBERSECURITY CYBERBULLYING online social network deep learning spotted hyena optimizer
下载PDF
Blockchain Assisted Optimal Machine Learning Based Cyberattack Detection and Classification Scheme
16
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 Fahd N.Al-Wesabi Mesfer Al Duhayyim anwer mustafa hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3583-3598,共16页
With recent advancements in information and communication technology,a huge volume of corporate and sensitive user data was shared consistently across the network,making it vulnerable to an attack that may be brought ... With recent advancements in information and communication technology,a huge volume of corporate and sensitive user data was shared consistently across the network,making it vulnerable to an attack that may be brought some factors under risk:data availability,confidentiality,and integrity.Intrusion Detection Systems(IDS)were mostly exploited in various networks to help promptly recognize intrusions.Nowadays,blockchain(BC)technology has received much more interest as a means to share data without needing a trusted third person.Therefore,this study designs a new Blockchain Assisted Optimal Machine Learning based Cyberattack Detection and Classification(BAOML-CADC)technique.In the BAOML-CADC technique,the major focus lies in identifying cyberattacks.To do so,the presented BAOML-CADC technique applies a thermal equilibrium algorithm-based feature selection(TEA-FS)method for the optimal choice of features.The BAOML-CADC technique uses an extreme learning machine(ELM)model for cyberattack recognition.In addition,a BC-based integrity verification technique is developed to defend against the misrouting attack,showing the innovation of the work.The experimental validation of BAOML-CADC algorithm is tested on a benchmark cyberattack dataset.The obtained values implied the improved performance of the BAOML-CADC algorithm over other techniques. 展开更多
关键词 Cyberattack machine learning blockchain thermal equilibrium algorithm feature selection
下载PDF
Intelligent Cybersecurity Classification Using Chaos Game Optimization with Deep Learning Model
17
作者 Eatedal Alabdulkreem Saud S.Alotaibi +5 位作者 Mohammad Alamgeer Radwa Marzouk anwer mustafa hilal Abdelwahed Motwakel Abu Sarwar Zamani Mohammed Rizwanullah 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期971-983,共13页
Cyberattack detection has become an important research domain owing to increasing number of cybercrimes in recent years.Both Machine Learning(ML)and Deep Learning(DL)classification models are useful in effective ident... Cyberattack detection has become an important research domain owing to increasing number of cybercrimes in recent years.Both Machine Learning(ML)and Deep Learning(DL)classification models are useful in effective identification and classification of cyberattacks.In addition,the involvement of hyper parameters in DL models has a significantly influence upon the overall performance of the classification models.In this background,the current study develops Intelligent Cybersecurity Classification using Chaos Game Optimization with Deep Learning(ICC-CGODL)Model.The goal of the proposed ICC-CGODL model is to recognize and categorize different kinds of attacks made upon data.Besides,ICC-CGODL model primarily performs min-max normalization process to normalize the data into uniform format.In addition,Bidirectional Gated Recurrent Unit(BiGRU)model is utilized for detection and classification of cyberattacks.Moreover,CGO algorithm is also exploited to adjust the hyper parameters involved in BiGRU model which is the novelty of current work.A wide-range of simulation analysis was conducted on benchmark dataset and the results obtained confirmed the significant performance of ICC-CGODL technique than the recent approaches. 展开更多
关键词 Deep learning chaos game optimization CYBERSECURITY chaos game optimization cyberattack
下载PDF
Optimal Deep Learning Enabled Communication System for Unmanned Aerial Vehicles
18
作者 anwer mustafa hilal Jaber S.Alzahrani +5 位作者 Dalia H.Elkamchouchi Majdy M.Eltahir Ahmed S.Almasoud Abdelwahed Motwakel Abu Sarwar Zamani Ishfaq Yaseen 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期955-969,共15页
Recently,unmanned aerial vehicles(UAV)or drones are widely employed for several application areas such as surveillance,disaster management,etc.Since UAVs are limited to energy,efficient coordination between them becom... Recently,unmanned aerial vehicles(UAV)or drones are widely employed for several application areas such as surveillance,disaster management,etc.Since UAVs are limited to energy,efficient coordination between them becomes essential to optimally utilize the resources and effective communication among them and base station(BS).Therefore,clustering can be employed as an effective way of accomplishing smart communication systems among multiple UAVs.In this aspect,this paper presents a group teaching optimization algorithm with deep learning enabled smart communication system(GTOADL-SCS)technique for UAV networks.The proposed GTOADL-SCS model encompasses a two stage process namely clustering and classification.At the initial stage,the GTOADL-SCS model includes a GTOA based clustering scheme to elect cluster heads(CHs)and organize clusters.Besides,the GTOADL-SCS model develops a fitness function containing three input parameters as residual energy of UAVs,average neighoring distance,and UAV degree.For classification process,the GTOADLSCS model applies pre-trained densely connected network(DenseNet201)feature extractor with gated recurrent unit(GRU)classifier.For ensuring the enhanced performance of the GTOADL-SCS model,a widespread simulation analysis is performed and the comparative study reported the significant outcomes over the existing approaches with maximum packet delivery ratio(PDR)of 92.60%. 展开更多
关键词 Unmanned aerial vehicles energy efficiency smart communication system deep learning
下载PDF
Peak-Average-Power Ratio Techniques for 5G Waveforms Using D-SLM and D-PTS
19
作者 Himanshu Sharma karthikeyan Rajagopal +7 位作者 G.Gugapriya Rajneesh Pareek Arun Kumar HayaMesfer Alshahrani Mohamed K.Nour Hany Mahgoub Mohamed Mousa anwer mustafa hilal 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1199-1210,共12页
Multicarrier Waveform(MCW)has several advantages and plays a very important role in cellular systems.Fifth generation(5G)MCW such as Non-Orthogonal Multiple Access(NOMA)and Filter Bank Multicarrier(FBMC)are thought to... Multicarrier Waveform(MCW)has several advantages and plays a very important role in cellular systems.Fifth generation(5G)MCW such as Non-Orthogonal Multiple Access(NOMA)and Filter Bank Multicarrier(FBMC)are thought to be important in 5G implementation.High Peak to Average Power Ratio(PAPR)is seen as a serious concern in MCW since it reduces the efficiency of amplifier use in the user devices.The paper presents a novel Divergence Selective Mapping(DSLM)and Divergence Partial Transmission Sequence(D-PTS)for 5G waveforms.It is seen that the proposed D-SLM and PTS lower PAPR with low computational complexity.The work highlighted a combination of multi-data block partial transmit schemes along with tone reservation.In this,an overlapping factor is used to determine the number of data blocks for every group.Here,considering only those data blocks that have minimum signal power,the use of DSLM and DPTS are required to eliminate the segment’s peaks.Simulation results reveal that the suggested hybrid technique proves to be better than the conventional PTS scheme.Furthermore,the power saving performance of FBMC and NOMA is compared with the Orthogonal Frequency Division Multiplexing(OFDM)waveform. 展开更多
关键词 5G PAPR D-SLM D-PTS
下载PDF
Deep Learning Driven Arabic Text to Speech Synthesizer for Visually Challenged People
20
作者 Mrim M.Alnfiai Nabil Almalki +3 位作者 Fahd N.Al-Wesabi Mesfer Alduhayyem anwer mustafa hilal Manar Ahmed Hamza 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期2639-2652,共14页
Text-To-Speech(TTS)is a speech processing tool that is highly helpful for visually-challenged people.The TTS tool is applied to transform the texts into human-like sounds.However,it is highly challenging to accomplish... Text-To-Speech(TTS)is a speech processing tool that is highly helpful for visually-challenged people.The TTS tool is applied to transform the texts into human-like sounds.However,it is highly challenging to accomplish the TTS out-comes for the non-diacritized text of the Arabic language since it has multiple unique features and rules.Some special characters like gemination and diacritic signs that correspondingly indicate consonant doubling and short vowels greatly impact the precise pronunciation of the Arabic language.But,such signs are not frequently used in the texts written in the Arabic language since its speakers and readers can guess them from the context itself.In this background,the current research article introduces an Optimal Deep Learning-driven Arab Text-to-Speech Synthesizer(ODLD-ATSS)model to help the visually-challenged people in the Kingdom of Saudi Arabia.The prime aim of the presented ODLD-ATSS model is to convert the text into speech signals for visually-challenged people.To attain this,the presented ODLD-ATSS model initially designs a Gated Recurrent Unit(GRU)-based prediction model for diacritic and gemination signs.Besides,the Buckwalter code is utilized to capture,store and display the Arabic texts.To improve the TSS performance of the GRU method,the Aquila Optimization Algorithm(AOA)is used,which shows the novelty of the work.To illustrate the enhanced performance of the proposed ODLD-ATSS model,further experi-mental analyses were conducted.The proposed model achieved a maximum accu-racy of 96.35%,and the experimental outcomes infer the improved performance of the proposed ODLD-ATSS model over other DL-based TSS models. 展开更多
关键词 Saudi Arabia visually challenged people deep learning Aquila optimizer gated recurrent unit
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部