期刊文献+
共找到24篇文章
< 1 2 >
每页显示 20 50 100
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
1
作者 Syeda Wajiha Zahra Muhammad Nadeem +6 位作者 Ali Arshad Saman Riaz Muhammad Abu Bakr ashit kumar dutta Zaid Alzaid Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2024年第1期589-616,共28页
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear... Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms. 展开更多
关键词 Replay attack MALWARE message attack file encryption CRYPTOLOGY data security
下载PDF
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
2
作者 Ali Arshad Muhammad Nadeem +6 位作者 Saman Riaz Syeda Wajiha Zahra ashit kumar dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第5期3065-3089,共25页
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog... There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm. 展开更多
关键词 CRYPTOGRAPHY symmetric cipher text ENCRYPTION matrix cipher encoding decoding hill matrix 64-bit encryption
下载PDF
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
3
作者 Muhammad Nadeem Ali Arshad +4 位作者 Saman Riaz Syeda Wajiha Zahra ashit kumar dutta Moteeb Al Moteri Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第2期4059-4079,共21页
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve... Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data.This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse.If this algorithm is applied to the cloud network,the attacker will not be able to access the data.To encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been implemented.After that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this text.The capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain text.The data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been obtained.At the end of the article,the latest technique will be compared with different techniques.There will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis. 展开更多
关键词 Symmetric CRYPTOGRAPHY CIPHERTEXT encryption DECRYPTION cloud security matrix cipher
下载PDF
Sailfish Optimizer with EfficientNet Model for Apple Leaf Disease Detection
4
作者 Mazen Mushabab Alqahtani ashit kumar dutta +4 位作者 Sultan Almotairi M.Ilayaraja Amani Abdulrahman Albraikan Fahd N.Al-Wesabi Mesfer Al Duhayyim 《Computers, Materials & Continua》 SCIE EI 2023年第1期217-233,共17页
Recent developments in digital cameras and electronic gadgets coupled with Machine Learning(ML)and Deep Learning(DL)-based automated apple leaf disease detection models are commonly employed as reasonable alternatives... Recent developments in digital cameras and electronic gadgets coupled with Machine Learning(ML)and Deep Learning(DL)-based automated apple leaf disease detection models are commonly employed as reasonable alternatives to traditional visual inspection models.In this background,the current paper devises an Effective Sailfish Optimizer with EfficientNet-based Apple Leaf disease detection(ESFO-EALD)model.The goal of the proposed ESFO-EALD technique is to identify the occurrence of plant leaf diseases automatically.In this scenario,Median Filtering(MF)approach is utilized to boost the quality of apple plant leaf images.Moreover,SFO with Kapur’s entropy-based segmentation technique is also utilized for the identification of the affected plant region from test image.Furthermore,Adam optimizer with EfficientNet-based feature extraction and Spiking Neural Network(SNN)-based classification are employed to detect and classify the apple plant leaf images.A wide range of simulations was conducted to ensure the effective outcomes of ESFO-EALD technique on benchmark dataset.The results reported the supremacy of the proposed ESFO-EALD approach than the existing approaches. 展开更多
关键词 AGRICULTURE computer vision image processing deep learning metaheuristics image segmentation
下载PDF
Optimal Sparse Autoencoder Based Sleep Stage Classification Using Biomedical Signals
5
作者 ashit kumar dutta Yasser Albagory +2 位作者 Manal Al Faraj Yasir A.M.Eltahir Abdul Rahaman Wahab Sait 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1517-1529,共13页
The recently developed machine learning(ML)models have the ability to obtain high detection rate using biomedical signals.Therefore,this article develops an Optimal Sparse Autoencoder based Sleep Stage Classification M... The recently developed machine learning(ML)models have the ability to obtain high detection rate using biomedical signals.Therefore,this article develops an Optimal Sparse Autoencoder based Sleep Stage Classification Model on Electroencephalography(EEG)Biomedical Signals,named OSAE-SSCEEG technique.The major intention of the OSAE-SSCEEG technique is tofind the sleep stage disorders using the EEG biomedical signals.The OSAE-SSCEEG technique primarily undergoes preprocessing using min-max data normalization approach.Moreover,the classification of sleep stages takes place using the Sparse Autoencoder with Smoothed Regularization(SAE-SR)with softmax(SM)approach.Finally,the parameter optimization of the SAE-SR technique is carried out by the use of Coyote Optimization Algorithm(COA)and it leads to boosted classification efficiency.In order to ensure the enhanced performance of the OSAE-SSCEEG technique,a wide ranging simulation analysis is performed and the obtained results demonstrate the betterment of the OSAE-SSCEEG tech-nique over the recent methods. 展开更多
关键词 Biomedical signals EEG sleep stage classification machine learning autoencoder softmax parameter tuning
下载PDF
An Optimization Approach for Convolutional Neural Network Using Non-Dominated Sorted Genetic Algorithm-Ⅱ
6
作者 Afia Zafar Muhammad Aamir +6 位作者 Nazri Mohd Nawi Ali Arshad Saman Riaz Abdulrahman Alruban ashit kumar dutta Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第3期5641-5661,共21页
In computer vision,convolutional neural networks have a wide range of uses.Images representmost of today’s data,so it’s important to know how to handle these large amounts of data efficiently.Convolutional neural ne... In computer vision,convolutional neural networks have a wide range of uses.Images representmost of today’s data,so it’s important to know how to handle these large amounts of data efficiently.Convolutional neural networks have been shown to solve image processing problems effectively.However,when designing the network structure for a particular problem,you need to adjust the hyperparameters for higher accuracy.This technique is time consuming and requires a lot of work and domain knowledge.Designing a convolutional neural network architecture is a classic NP-hard optimization challenge.On the other hand,different datasets require different combinations of models or hyperparameters,which can be time consuming and inconvenient.Various approaches have been proposed to overcome this problem,such as grid search limited to low-dimensional space and queuing by random selection.To address this issue,we propose an evolutionary algorithm-based approach that dynamically enhances the structure of Convolution Neural Networks(CNNs)using optimized hyperparameters.This study proposes a method using Non-dominated sorted genetic algorithms(NSGA)to improve the hyperparameters of the CNN model.In addition,different types and parameter ranges of existing genetic algorithms are used.Acomparative study was conducted with various state-of-the-art methodologies and algorithms.Experiments have shown that our proposed approach is superior to previous methods in terms of classification accuracy,and the results are published in modern computing literature. 展开更多
关键词 Non-dominated sorted genetic algorithm convolutional neural network hyper-parameter OPTIMIZATION
下载PDF
Intelligent Smart Grid Stability Predictive Model for Cyber-Physical Energy Systems
7
作者 ashit kumar dutta Manal Al Faraj +2 位作者 Yasser Albagory Mohammad zeid M Alzamil Abdul Rahaman Wahab Sait 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1219-1231,共13页
A cyber physical energy system(CPES)involves a combination of pro-cessing,network,and physical processes.The smart grid plays a vital role in the CPES model where information technology(IT)can be related to the physic... A cyber physical energy system(CPES)involves a combination of pro-cessing,network,and physical processes.The smart grid plays a vital role in the CPES model where information technology(IT)can be related to the physical system.At the same time,the machine learning(ML)modelsfind useful for the smart grids integrated into the CPES for effective decision making.Also,the smart grids using ML and deep learning(DL)models are anticipated to lessen the requirement of placing many power plants for electricity utilization.In this aspect,this study designs optimal multi-head attention based bidirectional long short term memory(OMHA-MBLSTM)technique for smart grid stability predic-tion in CPES.The proposed OMHA-MBLSTM technique involves three subpro-cesses such as pre-processing,prediction,and hyperparameter optimization.The OMHA-MBLSTM technique employs min-max normalization as a pre-proces-sing step.Besides,the MBLSTM model is applied for the prediction of stability level of the smart grids in CPES.At the same time,the moth swarm algorithm(MHA)is utilized for optimally modifying the hyperparameters involved in the MBLSTM model.To ensure the enhanced outcomes of the OMHA-MBLSTM technique,a series of simulations were carried out and the results are inspected under several aspects.The experimental results pointed out the better outcomes of the OMHA-MBLSTM technique over the recent models. 展开更多
关键词 Stability prediction smart grid cyber physical energy systems deep learning data analytics moth swarm algorithm
下载PDF
Intelligent Student Mental Health Assessment Model on Learning Management System
8
作者 Nasser Ali Aljarallah ashit kumar dutta +1 位作者 Majed Alsanea Abdul Rahaman Wahab Sait 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1853-1868,共16页
A learning management system(LMS)is a software or web based application,commonly utilized for planning,designing,and assessing a particular learning procedure.Generally,the LMS offers a method of creating and deliveri... A learning management system(LMS)is a software or web based application,commonly utilized for planning,designing,and assessing a particular learning procedure.Generally,the LMS offers a method of creating and delivering content to the instructor,monitoring students’involvement,and validating their outcomes.Since mental health issues become common among studies in higher education globally,it is needed to properly determine it to improve mental stabi-lity.This article develops a new seven spot lady bird feature selection with opti-mal sparse autoencoder(SSLBFS-OSAE)model to assess students’mental health on LMS.The major aim of the SSLBFS-OSAE model is to determine the proper health status of the students with respect to depression,anxiety,and stress(DAS).The SSLBFS-OSAE model involves a new SSLBFS model to elect a useful set of features.In addition,OSAE model is applied for the classification of mental health conditions and the performance can be improved by the use of cuckoo search optimization(CSO)based parameter tuning process.The design of CSO algorithm for optimally tuning the SAE parameters results in enhanced classifica-tion outcomes.For examining the improved classifier results of the SSLBFS-OSAE model,a comprehensive results analysis is done and the obtained values highlighted the supremacy of the SSLBFS model over its recent methods interms of different measures. 展开更多
关键词 Learning management system mental health assessment intelligent models machine learning feature selection performance assessment
下载PDF
Colliding Bodies Optimization with Machine Learning Based Parkinson’s Disease Diagnosis
9
作者 ashit kumar dutta Nazik M.A.Zakari +1 位作者 Yasser Albagory Abdul Rahaman Wahab Sait 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2195-2207,共13页
Parkinson’s disease(PD)is one of the primary vital degenerative diseases that affect the Central Nervous System among elderly patients.It affect their quality of life drastically and millions of seniors are diagnosed... Parkinson’s disease(PD)is one of the primary vital degenerative diseases that affect the Central Nervous System among elderly patients.It affect their quality of life drastically and millions of seniors are diagnosed with PD every year worldwide.Several models have been presented earlier to detect the PD using various types of measurement data like speech,gait patterns,etc.Early identification of PD is important owing to the fact that the patient can offer important details which helps in slowing down the progress of PD.The recently-emerging Deep Learning(DL)models can leverage the past data to detect and classify PD.With this motivation,the current study develops a novel Colliding Bodies Optimization Algorithm with Optimal Kernel Extreme Learning Machine(CBO-OKELM)for diagnosis and classification of PD.The goal of the proposed CBO-OKELM technique is to identify whether PD exists or not.CBO-OKELM technique involves the design of Colliding Bodies Optimization-based Feature Selection(CBO-FS)technique for optimal subset of features.In addition,Water Strider Algorithm(WSA)with Kernel Extreme Learning Machine(KELM)model is also developed for the classification of PD.CBO algorithm is used to elect the optimal set of fea-tures whereas WSA is utilized for parameter tuning of KELM model which alto-gether helps in accomplishing the maximum PD diagnostic performance.The experimental analysis was conducted for CBO-OKELM technique against four benchmark datasets and the model portrayed better performance such as 95.68%,96.34%,92.49%,and 92.36%on Speech PD,Voice PD,Hand PD Mean-der,and Hand PD Spiral datasets respectively. 展开更多
关键词 Parkinson’s disease colliding bodies optimization algorithm feature selection metaheuristics classification kelm model
下载PDF
Optimal Deep Belief Network Enabled Cybersecurity Phishing Email Classification
10
作者 ashit kumar dutta T.Meyyappan +4 位作者 Basit Qureshi Majed Alsanea Anas Waleed Abulfaraj Manal M.Al Faraj Abdul Rahaman Wahab Sait 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2701-2713,共13页
Recently,developments of Internet and cloud technologies have resulted in a considerable rise in utilization of online media for day to day lives.It results in illegal access to users’private data and compromises it.... Recently,developments of Internet and cloud technologies have resulted in a considerable rise in utilization of online media for day to day lives.It results in illegal access to users’private data and compromises it.Phishing is a popular attack which tricked the user into accessing malicious data and gaining the data.Proper identification of phishing emails can be treated as an essential process in the domain of cybersecurity.This article focuses on the design of bio-geography based optimization with deep learning for Phishing Email detection and classification(BBODL-PEDC)model.The major intention of the BBODL-PEDC model is to distinguish emails between legitimate and phishing.The BBODL-PEDC model initially performs data pre-processing in three levels namely email cleaning,tokenization,and stop word elimination.Besides,TF-IDF model is applied for the extraction of useful feature vectors.Moreover,optimal deep belief network(DBN)model is used for the email classification and its efficacy can be boosted by the BBO based hyperparameter tuning process.The performance validation of the BBODL-PEDC model can be performed using benchmark dataset and the results are assessed under several dimensions.Extensive comparative studies reported the superior outcomes of the BBODL-PEDC model over the recent approaches. 展开更多
关键词 CYBERSECURITY phishing email data classification deep learning biogeography based optimization hyperparameter tuning
下载PDF
Fuzzy with Metaheuristics Based Routing for Clustered Wireless Sensor Networks
11
作者 ashit kumar dutta Yasser Albagory +2 位作者 Majed Alsanea Abdul Rahaman Wahab Sait Hazim Saleh AlRawashdeh 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期367-380,共14页
Wireless sensor network(WSN)plays a vital part in real time tracking and data collection applications.WSN incorporates a set of numerous sensor nodes(SNs)commonly utilized to observe the target region.The SNs operate ... Wireless sensor network(WSN)plays a vital part in real time tracking and data collection applications.WSN incorporates a set of numerous sensor nodes(SNs)commonly utilized to observe the target region.The SNs operate using an inbuilt battery and it is not easier to replace or charge it.Therefore,proper utilization of available energy in the SNs is essential to prolong the lifetime of the WSN.In this study,an effective Type-II Fuzzy Logic with Butterfly Optimization Based Route Selection(TFL-BOARS)has been developed for clustered WSN.The TFL-BOARS technique intends to optimally select the cluster heads(CHs)and routes in the clustered WSN.Besides,the TFL-BOARS technique incorporates Type-II Fuzzy Logic(T2FL)technique with distinct input parameters namely residual energy(RE),link quality(LKQ),trust level(TRL),inter-cluster distance(ICD)and node degree(NDE)to select CHs and construct clusters.Also,the butterfly optimization algorithm based route selection(BOARS)technique is derived to select optimal set of routes in the WSN.In addition,the BOARS technique has computed afitness function using three parameters such as communication cost,distance and delay.In order to demonstrate the improved energy effectiveness and prolonged lifetime of the WSN,a wide-ranging simulation analysis was implemented and the experimental results reported the supremacy of the TFL-BOARS technique. 展开更多
关键词 Type II-fuzzy logic UNCERTAINTY WSN energy LIFETIME route selection
下载PDF
Optimal Weighted Extreme Learning Machine for Cybersecurity Fake News Classification
12
作者 ashit kumar dutta Basit Qureshi +3 位作者 Yasser Albagory Majed Alsanea Manal Al Faraj Abdul Rahaman Wahab Sait 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2395-2409,共15页
Fake news and its significance carried the significance of affecting diverse aspects of diverse entities,ranging from a city lifestyle to a country global relativity,various methods are available to collect and determ... Fake news and its significance carried the significance of affecting diverse aspects of diverse entities,ranging from a city lifestyle to a country global relativity,various methods are available to collect and determine fake news.The recently developed machine learning(ML)models can be employed for the detection and classification of fake news.This study designs a novel Chaotic Ant Swarm with Weighted Extreme Learning Machine(CAS-WELM)for Cybersecurity Fake News Detection and Classification.The goal of the CAS-WELM technique is to discriminate news into fake and real.The CAS-WELM technique initially pre-processes the input data and Glove technique is used for word embed-ding process.Then,N-gram based feature extraction technique is derived to gen-erate feature vectors.Lastly,WELM model is applied for the detection and classification of fake news,in which the weight value of the WELM model can be optimally adjusted by the use of CAS algorithm.The performance validation of the CAS-WELM technique is carried out using the benchmark dataset and the results are inspected under several dimensions.The experimental results reported the enhanced outcomes of the CAS-WELM technique over the recent approaches. 展开更多
关键词 CYBERSECURITY CYBERCRIME fake news data classification machine learning metaheuristics
下载PDF
Ensemble Deep Learning with Chimp Optimization Based Medical Data Classification
13
作者 ashit kumar dutta Yasser Albagory +2 位作者 Majed Alsanea Hamdan I.Almohammed Abdul Rahaman Wahab Sait 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1643-1655,共13页
Eye state classification acts as a vital part of the biomedical sector,for instance,smart home device control,drowsy driving recognition,and so on.The modifications in the cognitive levels can be reflected via transformi... Eye state classification acts as a vital part of the biomedical sector,for instance,smart home device control,drowsy driving recognition,and so on.The modifications in the cognitive levels can be reflected via transforming the electro-encephalogram(EEG)signals.The deep learning(DL)models automated extract the features and often showcased improved outcomes over the conventional clas-sification model in the recognition processes.This paper presents an Ensemble Deep Learning with Chimp Optimization Algorithm for EEG Eye State Classifi-cation(EDLCOA-ESC).The proposed EDLCOA-ESC technique involves min-max normalization approach as a pre-processing step.Besides,wavelet packet decomposition(WPD)technique is employed for the extraction of useful features from the EEG signals.In addition,an ensemble of deep sparse autoencoder(DSAE)and kernel ridge regression(KRR)models are employed for EEG Eye State classification.Finally,hyperparameters tuning of the DSAE model takes place using COA and thereby boost the classification results to a maximum extent.An extensive range of simulation analysis on the benchmark dataset is car-ried out and the results reported the promising performance of the EDLCOA-ESC technique over the recent approaches with maximum accuracy of 98.50%. 展开更多
关键词 EEG eye state data classification deep learning medical data analysis chimp optimization algorithm
下载PDF
Cat Swarm with Fuzzy Cognitive Maps for Automated Soil Classification
14
作者 ashit kumar dutta Yasser Albagory +2 位作者 Manal Al Faraj Majed Alsanea Abdul Rahaman Wahab Sait 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1419-1432,共14页
Accurate soil prediction is a vital parameter involved to decide appro-priate crop,which is commonly carried out by the farmers.Designing an auto-mated soil prediction tool helps to considerably improve the efficacy of... Accurate soil prediction is a vital parameter involved to decide appro-priate crop,which is commonly carried out by the farmers.Designing an auto-mated soil prediction tool helps to considerably improve the efficacy of the farmers.At the same time,fuzzy logic(FL)approaches can be used for the design of predictive models,particularly,Fuzzy Cognitive Maps(FCMs)have involved the concept of uncertainty representation and cognitive mapping.In other words,the FCM is an integration of the recurrent neural network(RNN)and FL involved in the knowledge engineering phase.In this aspect,this paper introduces effective fuzzy cognitive maps with cat swarm optimization for automated soil classifica-tion(FCMCSO-ASC)technique.The goal of the FCMCSO-ASC technique is to identify and categorize seven different types of soil.To accomplish this,the FCMCSO-ASC technique incorporates local diagonal extrema pattern(LDEP)as a feature extractor for producing a collection of feature vectors.In addition,the FCMCSO model is applied for soil classification and the weight values of the FCM model are optimally adjusted by the use of CSO algorithm.For exam-ining the enhanced soil classification outcomes of the FCMCSO-ASC technique,a series of simulations were carried out on benchmark dataset and the experimen-tal outcomes reported the enhanced performance of the FCMCSO-ASC technique over the recent techniques with maximum accuracy of 96.84%. 展开更多
关键词 Soil classification intelligent models fuzzy cognitive maps cat swarm optimization fuzzy logic
下载PDF
Cat and Mouse Optimizer with Artificial Intelligence Enabled Biomedical Data Classification
15
作者 B.Kalpana S.Dhanasekaran +4 位作者 T.Abirami ashit kumar dutta Marwa Obayya Jaber S.Alzahrani Manar Ahmed Hamza 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2243-2257,共15页
Biomedical data classification has become a hot research topic in recent years,thanks to the latest technological advancements made in healthcare.Biome-dical data is usually examined by physicians for decision making ... Biomedical data classification has become a hot research topic in recent years,thanks to the latest technological advancements made in healthcare.Biome-dical data is usually examined by physicians for decision making process in patient treatment.Since manual diagnosis is a tedious and time consuming task,numerous automated models,using Artificial Intelligence(AI)techniques,have been presented so far.With this motivation,the current research work presents a novel Biomedical Data Classification using Cat and Mouse Based Optimizer with AI(BDC-CMBOAI)technique.The aim of the proposed BDC-CMBOAI technique is to determine the occurrence of diseases using biomedical data.Besides,the proposed BDC-CMBOAI technique involves the design of Cat and Mouse Optimizer-based Feature Selection(CMBO-FS)technique to derive a useful subset of features.In addition,Ridge Regression(RR)model is also utilized as a classifier to identify the existence of disease.The novelty of the current work is its designing of CMBO-FS model for data classification.Moreover,CMBO-FS technique is used to get rid of unwanted features and boosts the classification accuracy.The results of the experimental analysis accomplished by BDC-CMBOAI technique on benchmark medical dataset established the supremacy of the proposed technique under different evaluation measures. 展开更多
关键词 Artificial intelligence biomedical data feature selection cat and mouse optimizer ridge regression
下载PDF
Optimal Machine Learning Enabled Performance Monitoring for Learning Management Systems
16
作者 ashit kumar dutta Mazen Mushabab Alqahtani +2 位作者 Yasser Albagory Abdul Rahaman Wahab Sait Majed Alsanea 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2277-2292,共16页
Learning Management System(LMS)is an application software that is used in automation,delivery,administration,tracking,and reporting of courses and programs in educational sector.The LMS which exploits machine learning... Learning Management System(LMS)is an application software that is used in automation,delivery,administration,tracking,and reporting of courses and programs in educational sector.The LMS which exploits machine learning(ML)has the ability of accessing user data and exploit it for improving the learning experience.The recently developed artificial intelligence(AI)and ML models helps to accomplish effective performance monitoring for LMS.Among the different processes involved in ML based LMS,feature selection and classification processesfind beneficial.In this motivation,this study introduces Glowworm-based Feature Selection with Machine Learning Enabled Performance Monitoring(GSO-MFWELM)technique for LMS.The key objective of the proposed GSO-MFWELM technique is to effectually monitor the performance in LMS.The pro-posed GSO-MFWELM technique involves GSO-based feature selection techni-que to select the optimal features.Besides,Weighted Extreme Learning Machine(WELM)model is applied for classification process whereas the parameters involved in WELM model are optimallyfine-tuned with the help of May-fly Optimization(MFO)algorithm.The design of GSO and MFO techniques result in reduced computation complexity and improved classification performance.The presented GSO-MFWELM technique was validated for its performance against benchmark dataset and the results were inspected under several aspects.The simulation results established the supremacy of GSO-MFWELM technique over recent approaches with the maximum classification accuracy of 0.9589. 展开更多
关键词 Learning management system data mining performance monitoring machine learning feature selection
下载PDF
Design of QoS Aware Routing Protocol for IoT Assisted Clustered WSN 被引量:1
17
作者 ashit kumar dutta S.Srinivasan +4 位作者 Bobbili Prasada Rao B.Hemalatha Irina V.Pustokhina Denis A.Pustokhin Gyanendra Prasad Joshi 《Computers, Materials & Continua》 SCIE EI 2022年第5期3785-3801,共17页
In current days,the domain of Internet of Things(IoT)and Wireless Sensor Networks(WSN)are combined for enhancing the sensor related data transmission in the forthcoming networking applications.Clustering and routing t... In current days,the domain of Internet of Things(IoT)and Wireless Sensor Networks(WSN)are combined for enhancing the sensor related data transmission in the forthcoming networking applications.Clustering and routing techniques are treated as the effective methods highly used to attain reduced energy consumption and lengthen the lifetime of the WSN assisted IoT networks.In this view,this paper presents an Ensemble of Metaheuristic Optimization based QoS aware Clustering with Multihop Routing(EMOQoSCMR)Protocol for IoT assisted WSN.The proposed EMO-QoSCMR protocol aims to achieve QoS parameters such as energy,throughput,delay,and lifetime.The proposed model involves two stage processes namely clustering and routing.Firstly,the EMO-QoSCMR protocol involves crossentropy rain optimization algorithm based clustering(CEROAC)technique to select an optimal set of cluster heads(CHs)and construct clusters.Besides,oppositional chaos game optimization based routing(OCGOR)technique is employed for the optimal set of routes in the IoT assisted WSN.The proposed model derives a fitness function based on the parameters involved in the IoT nodes such as residual energy,distance to sink node,etc.The proposed EMOQoSCMR technique has resulted to an enhanced NAN of 64 nodes whereas the LEACH,PSO-ECHS,E-OEERP,and iCSHS methods have resulted in a lesser NAN of 2,10,42,and 51 rounds.The performance of the presented protocol has been evaluated interms of energy efficiency and network lifetime. 展开更多
关键词 Internet of things wireless sensor networks CLUSTERING ROUTING metaheuristics cluster head selection QoS parameters
下载PDF
Intelligent Feature Selection with Deep Learning Based Financial Risk Assessment Model 被引量:1
18
作者 Thavavel Vaiyapuri K.Priyadarshini +4 位作者 A.Hemlathadhevi M.Dhamodaran ashit kumar dutta Irina V.Pustokhina Denis A.Pustokhin 《Computers, Materials & Continua》 SCIE EI 2022年第8期2429-2444,共16页
Due to global financial crisis,risk management has received significant attention to avoid loss and maximize profit in any business.Since the financial crisis prediction(FCP)process is mainly based on data driven deci... Due to global financial crisis,risk management has received significant attention to avoid loss and maximize profit in any business.Since the financial crisis prediction(FCP)process is mainly based on data driven decision making and intelligent models,artificial intelligence(AI)and machine learning(ML)models are widely utilized.This article introduces an intelligent feature selection with deep learning based financial risk assessment model(IFSDL-FRA).The proposed IFSDL-FRA technique aims to determine the financial crisis of a company or enterprise.In addition,the IFSDL-FRA technique involves the design of new water strider optimization algorithm based feature selection(WSOA-FS)manner to an optimum selection of feature subsets.Moreover,Deep Random Vector Functional Link network(DRVFLN)classification technique was applied to properly allot the class labels to the financial data.Furthermore,improved fruit fly optimization algorithm(IFFOA)based hyperparameter tuning process is carried out to optimally tune the hyperparameters of the DRVFLN model.For enhancing the better performance of the IFSDL-FRA technique,an extensive set of simulations are implemented on benchmark financial datasets and the obtained outcomes determine the betterment of IFSDL-FRA technique on the recent state of art approaches. 展开更多
关键词 Financial risks intelligent models financial crisis prediction deep learning feature selection metaheuristics
下载PDF
Optimal Deep Learning Enabled Statistical Analysis Model for Traffic Prediction 被引量:1
19
作者 ashit kumar dutta S.Srinivasan +4 位作者 S.N.kumar T.S.Balaji Won Il Lee Gyanendra Prasad Joshi Sung Won Kim 《Computers, Materials & Continua》 SCIE EI 2022年第9期5563-5576,共14页
Due to the advances of intelligent transportation system(ITSs),traffic forecasting has gained significant interest as robust traffic prediction acts as an important part in different ITSs namely traffic signal control... Due to the advances of intelligent transportation system(ITSs),traffic forecasting has gained significant interest as robust traffic prediction acts as an important part in different ITSs namely traffic signal control,navigation,route mapping,etc.The traffic prediction model aims to predict the traffic conditions based on the past traffic data.For more accurate traffic prediction,this study proposes an optimal deep learning-enabled statistical analysis model.This study offers the design of optimal convolutional neural network with attention long short term memory(OCNN-ALSTM)model for traffic prediction.The proposed OCNN-ALSTM technique primarily preprocesses the traffic data by the use of min-max normalization technique.Besides,OCNN-ALSTM technique was executed for classifying and predicting the traffic data in real time cases.For enhancing the predictive outcomes of the OCNN-ALSTM technique,the bird swarm algorithm(BSA)is employed to it and thereby overall efficacy of the network gets improved.The design of BSA for optimal hyperparameter tuning of the CNN-ALSTM model shows the novelty of the work.The experimental validation of the OCNNALSTM technique is performed using benchmark datasets and the results are examined under several aspects.The simulation results reported the enhanced outcomes of the OCNN-ALSTM model over the recent methods under several dimensions. 展开更多
关键词 Statistical analysis predictive models deep learning traffic prediction bird swarm algorithm
下载PDF
Hybrid Deep Learning Enabled Air Pollution Monitoring in ITS Environment
20
作者 ashit kumar dutta Jenyfal Sampson +4 位作者 Sultan Ahmad T.Avudaiappan Kanagaraj Narayanasamy Irina V.Pustokhina Denis A.Pustokhin 《Computers, Materials & Continua》 SCIE EI 2022年第7期1157-1172,共16页
Intelligent Transportation Systems(ITS)have become a vital part in improving human lives and modern economy.It aims at enhancing road safety and environmental quality.There is a tremendous increase observed in the num... Intelligent Transportation Systems(ITS)have become a vital part in improving human lives and modern economy.It aims at enhancing road safety and environmental quality.There is a tremendous increase observed in the number of vehicles in recent years,owing to increasing population.Each vehicle has its own individual emission rate;however,the issue arises when the emission rate crosses a standard value.Owing to the technological advances made in Artificial Intelligence(AI)techniques,it is easy to leverage it to develop prediction approaches so as to monitor and control air pollution.The current research paper presents Oppositional Shark Shell Optimization with Hybrid Deep Learning Model for Air Pollution Monitoring(OSSOHDLAPM)in ITS environment.The proposed OSSO-HDLAPM technique includes a set of sensors embedded in vehicles to measure the level of pollutants.In addition,hybridized Convolution Neural Network with Long Short-Term Memory(HCNN-LSTM)model is used to predict pollutant level based on the data attained earlier by the sensors.In HCNN-LSTM model,the hyperparameters are selected and optimized using OSSO algorithm.In order to validate the performance of the proposed OSSO-HDLAPM technique,a series of experiments was conducted and the obtained results showcase the superior performance of OSSO-HDLAPM technique under different evaluation parameters. 展开更多
关键词 Deep learning air pollution environment monitoring internet of things intelligent transportation systems oppositional learning LSTM model
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部