期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Optimized Evaluation of Mobile Base Station by Modern Topological Invariants
1
作者 Khalid Hamid muhammad Waseem Iqbal +3 位作者 muhammad usman ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi 《Computers, Materials & Continua》 SCIE EI 2023年第1期363-378,共16页
Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their traffic.Newresearch directions will lead to fundamental changes in the design of future Fifth... Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their traffic.Newresearch directions will lead to fundamental changes in the design of future Fifthgeneration(5G)cellular networks.For the formal reason,the study solves the physical network of the mobile base station for the prediction of the best characteristics to develop an enhanced network with the help of graph theory.Any number that can be uniquely calculated by a graph is known as a graph invariant.During the last two decades,innumerable numerical graph invariants have been portrayed and used for correlation analysis.In any case,no efficient assessment has been embraced to choose,how much these invariants are connected with a network graph.This paper will talk about two unique variations of the hexagonal graph with great capability of forecasting in the field of optimized mobile base station topology in setting with physical networks.Since K-banhatti sombor invariants(KBSO)and Contrharmonic-quadratic invariants(CQIs)are newly introduced and have various expectation characteristics for various variations of hexagonal graphs or networks.As the hexagonal networks are used in mobile base stations in layered,forms called honeycomb.The review settled the topology of a hexagon of two distinct sorts with two invariants KBSO and CQIs and their reduced forms.The deduced outcomes can be utilized for the modeling of mobile cellular networks,multiprocessors interconnections,microchips,chemical compound synthesis and memory interconnection networks.The results find sharp upper bounds and lower bounds of the honeycomb network to utilize the Mobile base station network(MBSN)for the high load of traffic and minimal traffic also. 展开更多
关键词 Hexagonal networks k-banhatti sombor invariants MAPLE network graph artificial intelligence contraharmonic-quadratic invariants HONEYCOMB
下载PDF
Leaching Fraction (LF) of Irrigation Water for Saline Soils Using Machine Learning
2
作者 Rab Nawaz Bashir Imran Sarwar Bajwa +4 位作者 muhammad Waseem Iqbal muhammad usman ashraf Ahmed Mohammed Alghamdi Adel ABahaddad Khalid Ali Almarhabi 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1915-1930,共16页
Soil salinity is a serious land degradation issue in agriculture.It is a major threat to agriculture productivity.Extra irrigation water is applied to leach down the salts from the root zone of the plants in the form ... Soil salinity is a serious land degradation issue in agriculture.It is a major threat to agriculture productivity.Extra irrigation water is applied to leach down the salts from the root zone of the plants in the form of a Leaching fraction(LF)of irrigation water.For the leaching process to be effective,the LF of irriga-tion water needs to be adjusted according to the environmental conditions and soil salinity level in the form of Evapotranspiration(ET)rate.The relationship between environmental conditions and ET rate is hard to be defined by a linear relationship and data-driven Machine learning(ML)based decisions are required to determine the calibrated Evapotranspiration(ETc)rate.ML-assisted ETc is pro-posed to adjust the LF according to the ETc and soil salinity level.A regression model is proposed to determine the ETc rate according to the prevailing tempera-ture,humidity,and sunshine,which would be used to determine the smart LF according to the ETc and soil salinity level.The proposed model is trained and tested against the Blaney Criddle method of Reference evapotranspiration(ETo)determination.The validation of the model from the test dataset reveals the accu-racy of the ML model in terms of Root mean squared errors(RMSE)are 0.41,Mean absolute errors(MAE)are 0.34,and Mean squared errors(MSE)are 0.28 mm day-1.The applications of the proposed solution in a real-time environ-ment show that the LF by the proposed solution is more effective in reducing the soil salinity as compared to the traditional process of leaching. 展开更多
关键词 Leaching fraction saline soil EVAPOTRANSPIRATION machine learning calibrated evapotranspiration artificial intelligence blaney criddle method
下载PDF
K-Banhatti Sombor Invariants of Certain Computer Networks 被引量:1
3
作者 Khalid Hamid muhammad Waseem Iqbal +4 位作者 Abaid Ur Rehman Virk muhammad usman ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi 《Computers, Materials & Continua》 SCIE EI 2022年第10期15-31,共17页
Any number that can be uniquely determined by a graph is called a graph invariant.During the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation analysis.How... Any number that can be uniquely determined by a graph is called a graph invariant.During the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation analysis.However,no reliable examination has been embraced to decide,how much these invariants are related with a network graph or molecular graph.In this paper,it will discuss three different variants of bridge networks with good potential of prediction in the field of computer science,mathematics,chemistry,pharmacy,informatics and biology in context with physical and chemical structures and networks,because k-banhatti sombor invariants are freshly presented and have numerous prediction qualities for different variants of bridge graphs or networks.The study solved the topology of a bridge graph/networks of three different types with two invariants KBanhatti Sombor Indices and its reduced form.These deduced results can be used for the modeling of computer networks like Local area network(LAN),Metropolitan area network(MAN),and Wide area network(WAN),backbone of internet and other networks/structures of computers,power generation,bio-informatics and chemical compounds synthesis. 展开更多
关键词 Bridge networks INVARIANTS k-banhatti sombor indices MAPLE network graph molecular graph
下载PDF
Recognition of Urdu Handwritten Alphabet Using Convolutional Neural Network (CNN)
4
作者 Gulzar Ahmed Tahir Alyas +4 位作者 muhammad Waseem Iqbal muhammad usman ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi 《Computers, Materials & Continua》 SCIE EI 2022年第11期2967-2984,共18页
Handwritten character recognition systems are used in every field of life nowadays,including shopping malls,banks,educational institutes,etc.Urdu is the national language of Pakistan,and it is the fourth spoken langua... Handwritten character recognition systems are used in every field of life nowadays,including shopping malls,banks,educational institutes,etc.Urdu is the national language of Pakistan,and it is the fourth spoken language in the world.However,it is still challenging to recognize Urdu handwritten characters owing to their cursive nature.Our paper presents a Convolutional Neural Networks(CNN)model to recognize Urdu handwritten alphabet recognition(UHAR)offline and online characters.Our research contributes an Urdu handwritten dataset(aka UHDS)to empower future works in this field.For offline systems,optical readers are used for extracting the alphabets,while diagonal-based extraction methods are implemented in online systems.Moreover,our research tackled the issue concerning the lack of comprehensive and standard Urdu alphabet datasets to empower research activities in the area of Urdu text recognition.To this end,we collected 1000 handwritten samples for each alphabet and a total of 38000 samples from 12 to 25 age groups to train our CNN model using online and offline mediums.Subsequently,we carried out detailed experiments for character recognition,as detailed in the results.The proposed CNN model outperformed as compared to previously published approaches. 展开更多
关键词 Urdu handwritten text recognition handwritten dataset convolutional neural network artificial intelligence machine learning deep learning
下载PDF
Local-Tetra-Patterns for Face Recognition Encoded on Spatial Pyramid Matching
5
作者 Khuram Nawaz Khayam Zahid Mehmood +4 位作者 Hassan Nazeer Chaudhry muhammad usman ashraf usman Tariq Mohammed Nawaf Altouri Khalid Alsubhi 《Computers, Materials & Continua》 SCIE EI 2022年第3期5039-5058,共20页
Face recognition is a big challenge in the research field with a lot of problems like misalignment,illumination changes,pose variations,occlusion,and expressions.Providing a single solution to solve all these problems... Face recognition is a big challenge in the research field with a lot of problems like misalignment,illumination changes,pose variations,occlusion,and expressions.Providing a single solution to solve all these problems at a time is a challenging task.We have put some effort to provide a solution to solving all these issues by introducing a face recognition model based on local tetra patterns and spatial pyramid matching.The technique is based on a procedure where the input image is passed through an algorithm that extracts local features by using spatial pyramid matching andmax-pooling.Finally,the input image is recognized using a robust kernel representation method using extracted features.The qualitative and quantitative analysis of the proposed method is carried on benchmark image datasets.Experimental results showed that the proposed method performs better in terms of standard performance evaluation parameters as compared to state-of-the-art methods on AR,ORL,LFW,and FERET face recognition datasets. 展开更多
关键词 Face recognition local tetra patterns spatial pyramid matching robust kernel representation max-pooling
下载PDF
Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds
6
作者 muhammad Akram muhammad Waseem Iqbal +3 位作者 Syed ashraf Ali muhammad usman ashraf Khalid Alsubhi Hani Moaiteq Aljahdali 《Computers, Materials & Continua》 SCIE EI 2022年第9期6061-6077,共17页
In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext ot... In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless.This paper aims to improve the said limitations by designing of Triple key security algorithm(TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext.Each plaintext character is substituted by an alternative message.The mode of substitution is transformed cyclically which depends on the current position of the modified communication.Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR(XOR)of the 1st key.This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack.By utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples. 展开更多
关键词 Encryption DECRYPTION CIPHER symmetric key cryptography single key attack
下载PDF
Ontology Driven Testing Strategies for IoT Applications
7
作者 muhammad Raza Naqvi muhammad Waseem Iqbal +5 位作者 muhammad usman ashraf Shafiq Ahmad Ahmed T.Soliman Shahzada Khurram muhammad Shafiq Jin-Ghoo Choi 《Computers, Materials & Continua》 SCIE EI 2022年第3期5855-5869,共15页
Internet-of-Things(IoT)has attained a major share in embedded software development.The new era of specialized intelligent systems requires adaptation of customized software engineering approaches.Currently,software en... Internet-of-Things(IoT)has attained a major share in embedded software development.The new era of specialized intelligent systems requires adaptation of customized software engineering approaches.Currently,software engineering has merged the development phases with the technologies provided by industrial automation.The improvements are still required in testing phase for the software developed to IoT solutions.This research aims to assist in developing the testing strategies for IoT applications,therein ontology has been adopted as a knowledge representation technique to different software engineering processes.The proposed ontological model renders 101 methodology by using Protégé.After completion,the ontology was evaluated in three-dimensional view by the domain experts of software testing,IoT and ontology engineering.Satisfied results of the research are showed in interest of the specialists regarding proposed ontology development and suggestions for improvements.The Proposed reasoning-based ontological model for development of testing strategies in IoT application contributes to increase the general understanding of tests in addition to assisting for the development of testing strategies for different IoT devices. 展开更多
关键词 ONTOLOGY software testing internet of things AUTOMATION
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部