期刊文献+
共找到74篇文章
< 1 2 4 >
每页显示 20 50 100
Digital Text Document Watermarking Based Tampering Attack Detection via Internet
1
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 fahd n.al-wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 2024年第3期759-771,共13页
Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentica... Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentication,and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors’difficulties were tampering detection,authentication,and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection(ADMDTW-TAD)via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document’s appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document,it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes,and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models. 展开更多
关键词 Content authentication tampering attacks detection model SECURITY digital watermarking
下载PDF
An Intelligent Hazardous Waste Detection and Classification Model Using Ensemble Learning Techniques
2
作者 Mesfer Al Duhayyim Saud S.Alotaibi +5 位作者 Shaha Al-Otaibi fahd n.al-wesabi Mahmoud Othman Ishfaq Yaseen Mohammed Rizwanullah Abdelwahed Motwakel 《Computers, Materials & Continua》 SCIE EI 2023年第2期3315-3332,共18页
Proper waste management models using recent technologies like computer vision,machine learning(ML),and deep learning(DL)are needed to effectively handle the massive quantity of increasing waste.Therefore,waste classif... Proper waste management models using recent technologies like computer vision,machine learning(ML),and deep learning(DL)are needed to effectively handle the massive quantity of increasing waste.Therefore,waste classification becomes a crucial topic which helps to categorize waste into hazardous or non-hazardous ones and thereby assist in the decision making of the waste management process.This study concentrates on the design of hazardous waste detection and classification using ensemble learning(HWDC-EL)technique to reduce toxicity and improve human health.The goal of the HWDC-EL technique is to detect the multiple classes of wastes,particularly hazardous and non-hazardous wastes.The HWDC-EL technique involves the ensemble of three feature extractors using Model Averaging technique namely discrete local binary patterns(DLBP),EfficientNet,and DenseNet121.In addition,the flower pollination algorithm(FPA)based hyperparameter optimizers are used to optimally adjust the parameters involved in the EfficientNet and DenseNet121 models.Moreover,a weighted voting-based ensemble classifier is derived using three machine learning algorithms namely support vector machine(SVM),extreme learning machine(ELM),and gradient boosting tree(GBT).The performance of the HWDC-EL technique is tested using a benchmark Garbage dataset and it obtains a maximum accuracy of 98.85%. 展开更多
关键词 Hazardous waste image classification ensemble learning deep learning intelligent models human health weighted voting model
下载PDF
Sailfish Optimizer with EfficientNet Model for Apple Leaf Disease Detection
3
作者 Mazen Mushabab Alqahtani Ashit Kumar Dutta +4 位作者 Sultan Almotairi M.Ilayaraja Amani Abdulrahman Albraikan fahd n.al-wesabi Mesfer Al Duhayyim 《Computers, Materials & Continua》 SCIE EI 2023年第1期217-233,共17页
Recent developments in digital cameras and electronic gadgets coupled with Machine Learning(ML)and Deep Learning(DL)-based automated apple leaf disease detection models are commonly employed as reasonable alternatives... Recent developments in digital cameras and electronic gadgets coupled with Machine Learning(ML)and Deep Learning(DL)-based automated apple leaf disease detection models are commonly employed as reasonable alternatives to traditional visual inspection models.In this background,the current paper devises an Effective Sailfish Optimizer with EfficientNet-based Apple Leaf disease detection(ESFO-EALD)model.The goal of the proposed ESFO-EALD technique is to identify the occurrence of plant leaf diseases automatically.In this scenario,Median Filtering(MF)approach is utilized to boost the quality of apple plant leaf images.Moreover,SFO with Kapur’s entropy-based segmentation technique is also utilized for the identification of the affected plant region from test image.Furthermore,Adam optimizer with EfficientNet-based feature extraction and Spiking Neural Network(SNN)-based classification are employed to detect and classify the apple plant leaf images.A wide range of simulations was conducted to ensure the effective outcomes of ESFO-EALD technique on benchmark dataset.The results reported the supremacy of the proposed ESFO-EALD approach than the existing approaches. 展开更多
关键词 AGRICULTURE computer vision image processing deep learning metaheuristics image segmentation
下载PDF
Deep Transfer Learning Driven Automated Fall Detection for Quality of Living of Disabled Persons
4
作者 nabil Almalki Mrim M.Alnfiai +3 位作者 fahd n.al-wesabi Mesfer Alduhayyem Anwer Mustafa Hilal Manar Ahmed Hamza 《Computers, Materials & Continua》 SCIE EI 2023年第3期6719-6736,共18页
Mobile communication and the Internet of Things(IoT)technologies have recently been established to collect data from human beings and the environment.The data collected can be leveraged to provide intelligent services... Mobile communication and the Internet of Things(IoT)technologies have recently been established to collect data from human beings and the environment.The data collected can be leveraged to provide intelligent services through different applications.It is an extreme challenge to monitor disabled people from remote locations.It is because day-to-day events like falls heavily result in accidents.For a person with disabilities,a fall event is an important cause of mortality and post-traumatic complications.Therefore,detecting the fall events of disabled persons in smart homes at early stages is essential to provide the necessary support and increase their survival rate.The current study introduces a Whale Optimization Algorithm Deep Transfer Learning-DrivenAutomated Fall Detection(WOADTL-AFD)technique to improve the Quality of Life for persons with disabilities.The primary aim of the presented WOADTL-AFD technique is to identify and classify the fall events to help disabled individuals.To attain this,the proposed WOADTL-AFDmodel initially uses amodified SqueezeNet feature extractor which proficiently extracts the feature vectors.In addition,the WOADTLAFD technique classifies the fall events using an extreme Gradient Boosting(XGBoost)classifier.In the presented WOADTL-AFD technique,the WOA approach is used to fine-tune the hyperparameters involved in the modified SqueezeNet model.The proposedWOADTL-AFD technique was experimentally validated using the benchmark datasets,and the results confirmed the superior performance of the proposedWOADTL-AFD method compared to other recent approaches. 展开更多
关键词 Quality of living disabled persons intelligent models deep learning fall detection whale optimization algorithm
下载PDF
Fusion-Based Deep Learning Model for Automated Forest Fire Detection
5
作者 Mesfer Al Duhayyim Majdy M.Eltahir +5 位作者 Ola Abdelgney Omer Ali Amani Abdulrahman Albraikan fahd n.al-wesabi Anwer Mustafa Hilal Manar Ahmed Hamza Mohammed Rizwanullah 《Computers, Materials & Continua》 SCIE EI 2023年第10期1355-1371,共17页
Earth resource and environmental monitoring are essential areas that can be used to investigate the environmental conditions and natural resources supporting sustainable policy development,regulatory measures,and thei... Earth resource and environmental monitoring are essential areas that can be used to investigate the environmental conditions and natural resources supporting sustainable policy development,regulatory measures,and their implementation elevating the environment.Large-scale forest fire is considered a major harmful hazard that affects climate change and life over the globe.Therefore,the early identification of forest fires using automated tools is essential to avoid the spread of fire to a large extent.Therefore,this paper focuses on the design of automated forest fire detection using a fusion-based deep learning(AFFD-FDL)model for environmental monitoring.The AFFDFDL technique involves the design of an entropy-based fusion model for feature extraction.The combination of the handcrafted features using histogram of gradients(HOG)with deep features using SqueezeNet and Inception v3 models.Besides,an optimal extreme learning machine(ELM)based classifier is used to identify the existence of fire or not.In order to properly tune the parameters of the ELM model,the oppositional glowworm swarm optimization(OGSO)algorithm is employed and thereby improves the forest fire detection performance.A wide range of simulation analyses takes place on a benchmark dataset and the results are inspected under several aspects.The experimental results highlighted the betterment of the AFFD-FDL technique over the recent state of art techniques. 展开更多
关键词 Environment monitoring remote sensing forest fire detection deep learning machine learning fusion model
下载PDF
Red Deer Optimization with Artificial Intelligence Enabled Image Captioning System for Visually Impaired People
6
作者 Anwer Mustafa Hilal Fadwa Alrowais +1 位作者 fahd n.al-wesabi Radwa Marzouk 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1929-1945,共17页
The problem of producing a natural language description of an image for describing the visual content has gained more attention in natural language processing(NLP)and computer vision(CV).It can be driven by applicatio... The problem of producing a natural language description of an image for describing the visual content has gained more attention in natural language processing(NLP)and computer vision(CV).It can be driven by applications like image retrieval or indexing,virtual assistants,image understanding,and support of visually impaired people(VIP).Though the VIP uses other senses,touch and hearing,for recognizing objects and events,the quality of life of those persons is lower than the standard level.Automatic Image captioning generates captions that will be read loudly to the VIP,thereby realizing matters happening around them.This article introduces a Red Deer Optimization with Artificial Intelligence Enabled Image Captioning System(RDOAI-ICS)for Visually Impaired People.The presented RDOAI-ICS technique aids in generating image captions for VIPs.The presented RDOAIICS technique utilizes a neural architectural search network(NASNet)model to produce image representations.Besides,the RDOAI-ICS technique uses the radial basis function neural network(RBFNN)method to generate a textual description.To enhance the performance of the RDOAI-ICS method,the parameter optimization process takes place using the RDO algorithm for NasNet and the butterfly optimization algorithm(BOA)for the RBFNN model,showing the novelty of the work.The experimental evaluation of the RDOAI-ICS method can be tested using a benchmark dataset.The outcomes show the enhancements of the RDOAI-ICS method over other recent Image captioning approaches. 展开更多
关键词 Machine learning image captioning visually impaired people parameter tuning artificial intelligence metaheuristics
下载PDF
Intelligent Deep Convolutional Neural Network Based Object DetectionModel for Visually Challenged People
7
作者 S.Kiruthika Devi Amani Abdulrahman Albraikan +3 位作者 fahd n.al-wesabi Mohamed K.nour Ahmed Ashour Anwer Mustafa Hilal 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3191-3207,共17页
Artificial Intelligence(AI)and Computer Vision(CV)advancements have led to many useful methodologies in recent years,particularly to help visually-challenged people.Object detection includes a variety of challenges,fo... Artificial Intelligence(AI)and Computer Vision(CV)advancements have led to many useful methodologies in recent years,particularly to help visually-challenged people.Object detection includes a variety of challenges,for example,handlingmultiple class images,images that get augmented when captured by a camera and so on.The test images include all these variants as well.These detection models alert them about their surroundings when they want to walk independently.This study compares four CNN-based pre-trainedmodels:ResidualNetwork(ResNet-50),Inception v3,DenseConvolutional Network(DenseNet-121),and SqueezeNet,predominantly used in image recognition applications.Based on the analysis performed on these test images,the study infers that Inception V3 outperformed other pre-trained models in terms of accuracy and speed.To further improve the performance of the Inception v3 model,the thermal exchange optimization(TEO)algorithm is applied to tune the hyperparameters(number of epochs,batch size,and learning rate)showing the novelty of the work.Better accuracy was achieved owing to the inclusion of an auxiliary classifier as a regularizer,hyperparameter optimizer,and factorization approach.Additionally,Inception V3 can handle images of different sizes.This makes Inception V3 the optimum model for assisting visually challenged people in real-world communication when integrated with Internet of Things(IoT)-based devices. 展开更多
关键词 Pre-trained models object detection visually challenged people deep learning Inception V3 DenseNet-121
下载PDF
IoT-Driven Optimal Lightweight RetinaNet-Based Object Detection for Visually Impaired People
8
作者 Mesfer Alduhayyem Mrim M.Alnfiai +3 位作者 nabil Almalki fahd n.al-wesabi Anwer Mustafa Hilal Manar Ahmed Hamza 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期475-489,共15页
Visual impairment is one of the major problems among people of all age groups across the globe.Visually Impaired Persons(VIPs)require help from others to carry out their day-to-day tasks.Since they experience several ... Visual impairment is one of the major problems among people of all age groups across the globe.Visually Impaired Persons(VIPs)require help from others to carry out their day-to-day tasks.Since they experience several problems in their daily lives,technical intervention can help them resolve the challenges.In this background,an automatic object detection tool is the need of the hour to empower VIPs with safe navigation.The recent advances in the Internet of Things(IoT)and Deep Learning(DL)techniques make it possible.The current study proposes IoT-assisted Transient Search Optimization with a Lightweight RetinaNetbased object detection(TSOLWR-ODVIP)model to help VIPs.The primary aim of the presented TSOLWR-ODVIP technique is to identify different objects surrounding VIPs and to convey the information via audio message to them.For data acquisition,IoT devices are used in this study.Then,the Lightweight RetinaNet(LWR)model is applied to detect objects accurately.Next,the TSO algorithm is employed for fine-tuning the hyperparameters involved in the LWR model.Finally,the Long Short-Term Memory(LSTM)model is exploited for classifying objects.The performance of the proposed TSOLWR-ODVIP technique was evaluated using a set of objects,and the results were examined under distinct aspects.The comparison study outcomes confirmed that the TSOLWR-ODVIP model could effectually detect and classify the objects,enhancing the quality of life of VIPs. 展开更多
关键词 Visually impaired people deep learning object detection computer vision long short-term memory transient search optimization
下载PDF
Machine Learning Based Cybersecurity Threat Detection for Secure IoT Assisted Cloud Environment
9
作者 Z.Faizal Khan Saeed M.Alshahrani +6 位作者 Abdulrahman Alghamdi Someah Alangari nouf Ibrahim Altamami Khalid A.Alissa Sana Alazwari Mesfer Al Duhayyim fahd n.al-wesabi 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期855-871,共17页
The Internet of Things(IoT)is determine enormous economic openings for industries and allow stimulating innovation which obtain between domains in childcare for eldercare,in health service to energy,and in developed t... The Internet of Things(IoT)is determine enormous economic openings for industries and allow stimulating innovation which obtain between domains in childcare for eldercare,in health service to energy,and in developed to transport.Cybersecurity develops a difficult problem in IoT platform whereas the presence of cyber-attack requires that solved.The progress of automatic devices for cyber-attack classifier and detection employing Artificial Intelligence(AI)andMachine Learning(ML)devices are crucial fact to realize security in IoT platform.It can be required for minimizing the issues of security based on IoT devices efficiently.Thus,this research proposal establishes novel mayfly optimized with Regularized Extreme Learning Machine technique called as MFO-RELM model for Cybersecurity Threat classification and detection fromthe cloud and IoT environments.The proposed MFORELM model provides the effective detection of cybersecurity threat which occur in the cloud and IoT platforms.To accomplish this,the MFO-RELM technique pre-processed the actual cloud and IoT data as to meaningful format.Besides,the proposed models will receive the pre-processing data and carry out the classifier method.For boosting the efficiency of the proposed models,theMFOtechnique was utilized to it.The experiential outcome of the proposed technique was tested utilizing the standard CICIDS 2017 dataset,and the outcomes are examined under distinct aspects. 展开更多
关键词 Mayfly optimization machine learning artificial intelligence CYBERSECURITY threat detection
下载PDF
Optimal Deep Learning Based Ransomware Detection and Classification in the Internet of Things Environment
10
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 fahd n.al-wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3087-3102,共16页
With the advent of the Internet of Things(IoT),several devices like sensors nowadays can interact and easily share information.But the IoT model is prone to security concerns as several attackers try to hit the networ... With the advent of the Internet of Things(IoT),several devices like sensors nowadays can interact and easily share information.But the IoT model is prone to security concerns as several attackers try to hit the network and make it vulnerable.In such scenarios,security concern is the most prominent.Different models were intended to address these security problems;still,several emergent variants of botnet attacks like Bashlite,Mirai,and Persirai use security breaches.The malware classification and detection in the IoT model is still a problem,as the adversary reliably generates a new variant of IoT malware and actively searches for compromise on the victim devices.This article develops a Sine Cosine Algorithm with Deep Learning based Ransomware Detection and Classification(SCADL-RWDC)method in an IoT environment.In the presented SCADL-RWDCtechnique,the major intention exists in recognizing and classifying ransomware attacks in the IoT platform.The SCADL-RWDC technique uses the SCA feature selection(SCA-FS)model to improve the detection rate.Besides,the SCADL-RWDC technique exploits the hybrid grey wolf optimizer(HGWO)with a gated recurrent unit(GRU)model for ransomware classification.A widespread experimental analysis is performed to exhibit the enhanced ransomware detection outcomes of the SCADL-RWDC technique.The comparison study reported the enhancement of the SCADL-RWDC technique over other models. 展开更多
关键词 SECURITY IoT network ransomware attack deep learning metaheuristics
下载PDF
Artificial Algae Optimization with Deep Belief Network Enabled Ransomware Detection in IoT Environment
11
作者 Mesfer Al Duhayyim Heba G.Mohamed +3 位作者 Fadwa Alrowais fahd n.al-wesabi Anwer Mustafa Hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1293-1310,共18页
The Internet of Things(IoT)has gained more popularity in research because of its large-scale challenges and implementation.But security was the main concern when witnessing the fast development in its applications and... The Internet of Things(IoT)has gained more popularity in research because of its large-scale challenges and implementation.But security was the main concern when witnessing the fast development in its applications and size.It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats.Additionally,machine learning(ML)techniques optimally use a colossal volume of data generated by IoT devices.Deep Learning(DL)related systems were modelled for attack detection in IoT.But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations.This study develops an Artificial Algae Optimization Algorithm with Optimal Deep Belief Network(AAA-ODBN)Enabled Ransomware Detection in an IoT environment.The presented AAAODBN technique mainly intends to recognize and categorize ransomware in the IoT environment.The presented AAA-ODBN technique follows a three-stage process:feature selection,classification,and parameter tuning.In the first stage,the AAA-ODBN technique uses AAA based feature selection(AAA-FS)technique to elect feature subsets.Secondly,the AAA-ODBN technique employs the DBN model for ransomware detection.At last,the dragonfly algorithm(DFA)is utilized for the hyperparameter tuning of the DBN technique.A sequence of simulations is implemented to demonstrate the improved performance of the AAA-ODBN algorithm.The experimental values indicate the significant outcome of the AAA-ODBN model over other models. 展开更多
关键词 Internet of things deep learning CYBERSECURITY ransomware detection feature selection
下载PDF
Search and Rescue Optimization with Machine Learning Enabled Cybersecurity Model
12
作者 Hanan Abdullah Mengash Jaber S.Alzahrani +4 位作者 Majdy M.Eltahir fahd n.al-wesabi Abdullah Mohamed Manar Ahmed Hamza Radwa Marzouk 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1393-1407,共15页
Presently,smart cities play a vital role to enhance the quality of living among human beings in several ways such as online shopping,e-learning,ehealthcare,etc.Despite the benefits of advanced technologies,issues are ... Presently,smart cities play a vital role to enhance the quality of living among human beings in several ways such as online shopping,e-learning,ehealthcare,etc.Despite the benefits of advanced technologies,issues are also existed from the transformation of the physical word into digital word,particularly in online social networks(OSN).Cyberbullying(CB)is a major problem in OSN which needs to be addressed by the use of automated natural language processing(NLP)and machine learning(ML)approaches.This article devises a novel search and rescue optimization with machine learning enabled cybersecurity model for online social networks,named SRO-MLCOSN model.The presented SRO-MLCOSN model focuses on the identification of CB that occurred in social networking sites.The SRO-MLCOSN model initially employs Glove technique for word embedding process.Besides,a multiclass-weighted kernel extreme learning machine(M-WKELM)model is utilized for effectual identification and categorization of CB.Finally,Search and Rescue Optimization(SRO)algorithm is exploited to fine tune the parameters involved in the M-WKELM model.The experimental validation of the SRO-MLCOSN model on the benchmark dataset reported significant outcomes over the other approaches with precision,recall,and F1-score of 96.24%,98.71%,and 97.46%respectively. 展开更多
关键词 CYBERSECURITY CYBERBULLYING social networking machine learning search and rescue optimization
下载PDF
Blockchain Assisted Optimal Machine Learning Based Cyberattack Detection and Classification Scheme
13
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 fahd n.al-wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3583-3598,共16页
With recent advancements in information and communication technology,a huge volume of corporate and sensitive user data was shared consistently across the network,making it vulnerable to an attack that may be brought ... With recent advancements in information and communication technology,a huge volume of corporate and sensitive user data was shared consistently across the network,making it vulnerable to an attack that may be brought some factors under risk:data availability,confidentiality,and integrity.Intrusion Detection Systems(IDS)were mostly exploited in various networks to help promptly recognize intrusions.Nowadays,blockchain(BC)technology has received much more interest as a means to share data without needing a trusted third person.Therefore,this study designs a new Blockchain Assisted Optimal Machine Learning based Cyberattack Detection and Classification(BAOML-CADC)technique.In the BAOML-CADC technique,the major focus lies in identifying cyberattacks.To do so,the presented BAOML-CADC technique applies a thermal equilibrium algorithm-based feature selection(TEA-FS)method for the optimal choice of features.The BAOML-CADC technique uses an extreme learning machine(ELM)model for cyberattack recognition.In addition,a BC-based integrity verification technique is developed to defend against the misrouting attack,showing the innovation of the work.The experimental validation of BAOML-CADC algorithm is tested on a benchmark cyberattack dataset.The obtained values implied the improved performance of the BAOML-CADC algorithm over other techniques. 展开更多
关键词 Cyberattack machine learning blockchain thermal equilibrium algorithm feature selection
下载PDF
Deep Learning Driven Arabic Text to Speech Synthesizer for Visually Challenged People
14
作者 Mrim M.Alnfiai nabil Almalki +3 位作者 fahd n.al-wesabi Mesfer Alduhayyem Anwer Mustafa Hilal Manar Ahmed Hamza 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期2639-2652,共14页
Text-To-Speech(TTS)is a speech processing tool that is highly helpful for visually-challenged people.The TTS tool is applied to transform the texts into human-like sounds.However,it is highly challenging to accomplish... Text-To-Speech(TTS)is a speech processing tool that is highly helpful for visually-challenged people.The TTS tool is applied to transform the texts into human-like sounds.However,it is highly challenging to accomplish the TTS out-comes for the non-diacritized text of the Arabic language since it has multiple unique features and rules.Some special characters like gemination and diacritic signs that correspondingly indicate consonant doubling and short vowels greatly impact the precise pronunciation of the Arabic language.But,such signs are not frequently used in the texts written in the Arabic language since its speakers and readers can guess them from the context itself.In this background,the current research article introduces an Optimal Deep Learning-driven Arab Text-to-Speech Synthesizer(ODLD-ATSS)model to help the visually-challenged people in the Kingdom of Saudi Arabia.The prime aim of the presented ODLD-ATSS model is to convert the text into speech signals for visually-challenged people.To attain this,the presented ODLD-ATSS model initially designs a Gated Recurrent Unit(GRU)-based prediction model for diacritic and gemination signs.Besides,the Buckwalter code is utilized to capture,store and display the Arabic texts.To improve the TSS performance of the GRU method,the Aquila Optimization Algorithm(AOA)is used,which shows the novelty of the work.To illustrate the enhanced performance of the proposed ODLD-ATSS model,further experi-mental analyses were conducted.The proposed model achieved a maximum accu-racy of 96.35%,and the experimental outcomes infer the improved performance of the proposed ODLD-ATSS model over other DL-based TSS models. 展开更多
关键词 Saudi Arabia visually challenged people deep learning Aquila optimizer gated recurrent unit
下载PDF
Hand Gesture Recognition for Disabled People Using Bayesian Optimization with Transfer Learning
15
作者 Fadwa Alrowais Radwa Marzouk +1 位作者 fahd n.al-wesabi Anwer Mustafa Hilal 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期3325-3342,共18页
Sign language recognition can be treated as one of the efficient solu-tions for disabled people to communicate with others.It helps them to convey the required data by the use of sign language with no issues.The lates... Sign language recognition can be treated as one of the efficient solu-tions for disabled people to communicate with others.It helps them to convey the required data by the use of sign language with no issues.The latest develop-ments in computer vision and image processing techniques can be accurately uti-lized for the sign recognition process by disabled people.American Sign Language(ASL)detection was challenging because of the enhancing intraclass similarity and higher complexity.This article develops a new Bayesian Optimiza-tion with Deep Learning-Driven Hand Gesture Recognition Based Sign Language Communication(BODL-HGRSLC)for Disabled People.The BODL-HGRSLC technique aims to recognize the hand gestures for disabled people’s communica-tion.The presented BODL-HGRSLC technique integrates the concepts of compu-ter vision(CV)and DL models.In the presented BODL-HGRSLC technique,a deep convolutional neural network-based residual network(ResNet)model is applied for feature extraction.Besides,the presented BODL-HGRSLC model uses Bayesian optimization for the hyperparameter tuning process.At last,a bidir-ectional gated recurrent unit(BiGRU)model is exploited for the HGR procedure.A wide range of experiments was conducted to demonstrate the enhanced perfor-mance of the presented BODL-HGRSLC model.The comprehensive comparison study reported the improvements of the BODL-HGRSLC model over other DL models with maximum accuracy of 99.75%. 展开更多
关键词 Deep learning hand gesture recognition disabled people computer vision bayesian optimization
下载PDF
A Hybrid Intelligent Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet 被引量:10
16
作者 fahd n.al-wesabi 《Computers, Materials & Continua》 SCIE EI 2021年第1期195-211,共17页
In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authenticati... In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authentication and tampering detection of Arabic text contents.The proposed approach known as Second order of Alphanumeric Mechanism of Markov model and Zero-Watermarking Approach(SAMMZWA).Second level order of alphanumeric mechanism based on hidden Markov model is integrated with text zero-watermarking techniques to improve the overall performance and tampering detection accuracy of the proposed approach.The SAMMZWA approach embeds and detects the watermark logically without altering the original text document.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SAMMZWA has been implemented and validated with attacked Arabic text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods. 展开更多
关键词 HMM NLP text analysis ZERO-WATERMARKING tampering detection
下载PDF
A Smart English Text Zero-Watermarking Approach Based on Third-Level Order and Word Mechanism of Markov Model 被引量:9
17
作者 fahd n.al-wesabi 《Computers, Materials & Continua》 SCIE EI 2020年第11期1137-1156,共20页
Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researche... Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researchers encounter.Content authentication and tampering detection of digital contents have become a major concern in the area of communication and information exchange via the Internet.In this paper,an intelligent text Zero-Watermarking approach SETZWMWMM(Smart English Text Zero-Watermarking Approach Based on Mid-Level Order and Word Mechanism of Markov Model)has been proposed for the content authentication and tampering detection of English text contents.The SETZWMWMM approach embeds and detects the watermark logically without altering the original English text document.Based on Hidden Markov Model(HMM),Third level order of word mechanism is used to analyze the interrelationship between contexts of given English texts.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SETZWMWMM has been implemented and validated with attacked English text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive and efficient for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods. 展开更多
关键词 Content authentication hidden Markov model ZERO-WATERMARKING NLP tampering detection.
下载PDF
Federated Learning with Blockchain Assisted Image Classification for Clustered UAV Networks 被引量:4
18
作者 Ibrahim Abunadi Maha M.Althobaiti +5 位作者 fahd n.al-wesabi Anwer Mustafa Hilal Mohammad Medani Manar Ahmed Hamza Mohammed Rizwanullah Abu Serwar Zamani 《Computers, Materials & Continua》 SCIE EI 2022年第7期1195-1212,共18页
The evolving“Industry 4.0”domain encompasses a collection of future industrial developments with cyber-physical systems(CPS),Internet of things(IoT),big data,cloud computing,etc.Besides,the industrial Internet of th... The evolving“Industry 4.0”domain encompasses a collection of future industrial developments with cyber-physical systems(CPS),Internet of things(IoT),big data,cloud computing,etc.Besides,the industrial Internet of things(IIoT)directs data from systems for monitoring and controlling the physical world to the data processing system.A major novelty of the IIoT is the unmanned aerial vehicles(UAVs),which are treated as an efficient remote sensing technique to gather data from large regions.UAVs are commonly employed in the industrial sector to solve several issues and help decision making.But the strict regulations leading to data privacy possibly hinder data sharing across autonomous UAVs.Federated learning(FL)becomes a recent advancement of machine learning(ML)which aims to protect user data.In this aspect,this study designs federated learning with blockchain assisted image classification model for clustered UAV networks(FLBIC-CUAV)on IIoT environment.The proposed FLBIC-CUAV technique involves three major processes namely clustering,blockchain enabled secure communication and FL based image classification.For UAV cluster construction process,beetle swarm optimization(BSO)algorithm with three input parameters is designed to cluster the UAVs for effective communication.In addition,blockchain enabled secure data transmission process take place to transmit the data from UAVs to cloud servers.Finally,the cloud server uses an FL with Residual Network model to carry out the image classification process.A wide range of simulation analyses takes place for ensuring the betterment of the FLBIC-CUAV approach.The experimental outcomes portrayed the betterment of the FLBIC-CUAV approach over the recent state of art methods. 展开更多
关键词 UAV networks CLUSTERING secure communication blockchain federated learning image classification
下载PDF
Feature Selection with Optimal Stacked Sparse Autoencoder for Data Mining 被引量:4
19
作者 Manar Ahmed Hamza Siwar Ben Haj Hassine +5 位作者 Ibrahim Abunadi fahd n.al-wesabi Hadeel Alsolai Anwer Mustafa Hilal Ishfaq Yaseen Abdelwahed Motwakel 《Computers, Materials & Continua》 SCIE EI 2022年第8期2581-2596,共16页
Data mining in the educational field can be used to optimize the teaching and learning performance among the students.The recently developed machine learning(ML)and deep learning(DL)approaches can be utilized to mine ... Data mining in the educational field can be used to optimize the teaching and learning performance among the students.The recently developed machine learning(ML)and deep learning(DL)approaches can be utilized to mine the data effectively.This study proposes an Improved Sailfish Optimizer-based Feature SelectionwithOptimal Stacked Sparse Autoencoder(ISOFS-OSSAE)for data mining and pattern recognition in the educational sector.The proposed ISOFS-OSSAE model aims to mine the educational data and derive decisions based on the feature selection and classification process.Moreover,the ISOFS-OSSAEmodel involves the design of the ISOFS technique to choose an optimal subset of features.Moreover,the swallow swarm optimization(SSO)with the SSAE model is derived to perform the classification process.To showcase the enhanced outcomes of the ISOFSOSSAE model,a wide range of experiments were taken place on a benchmark dataset from the University of California Irvine(UCI)Machine Learning Repository.The simulation results pointed out the improved classification performance of the ISOFS-OSSAE model over the recent state of art approaches interms of different performance measures. 展开更多
关键词 Data mining pattern recognition feature selection data classification SSAE model
下载PDF
Entropy-Based Watermarking Approach for Sensitive Tamper Detection of Arabic Text 被引量:4
20
作者 fahd n.al-wesabi 《Computers, Materials & Continua》 SCIE EI 2021年第6期3635-3648,共14页
The digital text media is the most common media transferred via the internet for various purposes and is very sensitive to transfer online with the possibility to be tampered illegally by the tampering attacks.Therefo... The digital text media is the most common media transferred via the internet for various purposes and is very sensitive to transfer online with the possibility to be tampered illegally by the tampering attacks.Therefore,improving the security and authenticity of the text when it is transferred via the internet has become one of the most difcult challenges that researchers face today.Arabic text is more sensitive than other languages due to Harakat’s existence in Arabic diacritics such as Kasra,and Damma in which making basic changes such as modifying diacritic arrangements can lead to change the text meaning.In this paper,an intelligent hybrid solution is proposed with highly sensitive detection for any tampering on Arabic text exchanged via the internet.Natural language processing,entropy,and watermarking techniques have been integrated into this method to improve the security and reliability of Arabic text without limitations in text nature or size,and type or volumes of tampering attack.The proposed scheme is implemented,simulated,and validated using four standard Arabic datasets of varying lengths under multiple random locations of insertion,reorder,and deletion attacks.The experimental and simulation results prove the accuracy of tampering detection of the proposed scheme against all kinds of tampering attacks.Comparison results show that the proposed approach outperforms all of the other baseline approaches in terms of tampering detection accuracy. 展开更多
关键词 ENTROPY text features tamper detection arabic text NLP
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部