Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their traffic.Newresearch directions will lead to fundamental changes in the design of future Fifth...Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their traffic.Newresearch directions will lead to fundamental changes in the design of future Fifthgeneration(5G)cellular networks.For the formal reason,the study solves the physical network of the mobile base station for the prediction of the best characteristics to develop an enhanced network with the help of graph theory.Any number that can be uniquely calculated by a graph is known as a graph invariant.During the last two decades,innumerable numerical graph invariants have been portrayed and used for correlation analysis.In any case,no efficient assessment has been embraced to choose,how much these invariants are connected with a network graph.This paper will talk about two unique variations of the hexagonal graph with great capability of forecasting in the field of optimized mobile base station topology in setting with physical networks.Since K-banhatti sombor invariants(KBSO)and Contrharmonic-quadratic invariants(CQIs)are newly introduced and have various expectation characteristics for various variations of hexagonal graphs or networks.As the hexagonal networks are used in mobile base stations in layered,forms called honeycomb.The review settled the topology of a hexagon of two distinct sorts with two invariants KBSO and CQIs and their reduced forms.The deduced outcomes can be utilized for the modeling of mobile cellular networks,multiprocessors interconnections,microchips,chemical compound synthesis and memory interconnection networks.The results find sharp upper bounds and lower bounds of the honeycomb network to utilize the Mobile base station network(MBSN)for the high load of traffic and minimal traffic also.展开更多
Soil salinity is a serious land degradation issue in agriculture.It is a major threat to agriculture productivity.Extra irrigation water is applied to leach down the salts from the root zone of the plants in the form ...Soil salinity is a serious land degradation issue in agriculture.It is a major threat to agriculture productivity.Extra irrigation water is applied to leach down the salts from the root zone of the plants in the form of a Leaching fraction(LF)of irrigation water.For the leaching process to be effective,the LF of irriga-tion water needs to be adjusted according to the environmental conditions and soil salinity level in the form of Evapotranspiration(ET)rate.The relationship between environmental conditions and ET rate is hard to be defined by a linear relationship and data-driven Machine learning(ML)based decisions are required to determine the calibrated Evapotranspiration(ETc)rate.ML-assisted ETc is pro-posed to adjust the LF according to the ETc and soil salinity level.A regression model is proposed to determine the ETc rate according to the prevailing tempera-ture,humidity,and sunshine,which would be used to determine the smart LF according to the ETc and soil salinity level.The proposed model is trained and tested against the Blaney Criddle method of Reference evapotranspiration(ETo)determination.The validation of the model from the test dataset reveals the accu-racy of the ML model in terms of Root mean squared errors(RMSE)are 0.41,Mean absolute errors(MAE)are 0.34,and Mean squared errors(MSE)are 0.28 mm day-1.The applications of the proposed solution in a real-time environ-ment show that the LF by the proposed solution is more effective in reducing the soil salinity as compared to the traditional process of leaching.展开更多
Any number that can be uniquely determined by a graph is called a graph invariant.During the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation analysis.How...Any number that can be uniquely determined by a graph is called a graph invariant.During the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation analysis.However,no reliable examination has been embraced to decide,how much these invariants are related with a network graph or molecular graph.In this paper,it will discuss three different variants of bridge networks with good potential of prediction in the field of computer science,mathematics,chemistry,pharmacy,informatics and biology in context with physical and chemical structures and networks,because k-banhatti sombor invariants are freshly presented and have numerous prediction qualities for different variants of bridge graphs or networks.The study solved the topology of a bridge graph/networks of three different types with two invariants KBanhatti Sombor Indices and its reduced form.These deduced results can be used for the modeling of computer networks like Local area network(LAN),Metropolitan area network(MAN),and Wide area network(WAN),backbone of internet and other networks/structures of computers,power generation,bio-informatics and chemical compounds synthesis.展开更多
Handwritten character recognition systems are used in every field of life nowadays,including shopping malls,banks,educational institutes,etc.Urdu is the national language of Pakistan,and it is the fourth spoken langua...Handwritten character recognition systems are used in every field of life nowadays,including shopping malls,banks,educational institutes,etc.Urdu is the national language of Pakistan,and it is the fourth spoken language in the world.However,it is still challenging to recognize Urdu handwritten characters owing to their cursive nature.Our paper presents a Convolutional Neural Networks(CNN)model to recognize Urdu handwritten alphabet recognition(UHAR)offline and online characters.Our research contributes an Urdu handwritten dataset(aka UHDS)to empower future works in this field.For offline systems,optical readers are used for extracting the alphabets,while diagonal-based extraction methods are implemented in online systems.Moreover,our research tackled the issue concerning the lack of comprehensive and standard Urdu alphabet datasets to empower research activities in the area of Urdu text recognition.To this end,we collected 1000 handwritten samples for each alphabet and a total of 38000 samples from 12 to 25 age groups to train our CNN model using online and offline mediums.Subsequently,we carried out detailed experiments for character recognition,as detailed in the results.The proposed CNN model outperformed as compared to previously published approaches.展开更多
Face recognition is a big challenge in the research field with a lot of problems like misalignment,illumination changes,pose variations,occlusion,and expressions.Providing a single solution to solve all these problems...Face recognition is a big challenge in the research field with a lot of problems like misalignment,illumination changes,pose variations,occlusion,and expressions.Providing a single solution to solve all these problems at a time is a challenging task.We have put some effort to provide a solution to solving all these issues by introducing a face recognition model based on local tetra patterns and spatial pyramid matching.The technique is based on a procedure where the input image is passed through an algorithm that extracts local features by using spatial pyramid matching andmax-pooling.Finally,the input image is recognized using a robust kernel representation method using extracted features.The qualitative and quantitative analysis of the proposed method is carried on benchmark image datasets.Experimental results showed that the proposed method performs better in terms of standard performance evaluation parameters as compared to state-of-the-art methods on AR,ORL,LFW,and FERET face recognition datasets.展开更多
In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext ot...In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless.This paper aims to improve the said limitations by designing of Triple key security algorithm(TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext.Each plaintext character is substituted by an alternative message.The mode of substitution is transformed cyclically which depends on the current position of the modified communication.Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR(XOR)of the 1st key.This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack.By utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples.展开更多
Internet-of-Things(IoT)has attained a major share in embedded software development.The new era of specialized intelligent systems requires adaptation of customized software engineering approaches.Currently,software en...Internet-of-Things(IoT)has attained a major share in embedded software development.The new era of specialized intelligent systems requires adaptation of customized software engineering approaches.Currently,software engineering has merged the development phases with the technologies provided by industrial automation.The improvements are still required in testing phase for the software developed to IoT solutions.This research aims to assist in developing the testing strategies for IoT applications,therein ontology has been adopted as a knowledge representation technique to different software engineering processes.The proposed ontological model renders 101 methodology by using Protégé.After completion,the ontology was evaluated in three-dimensional view by the domain experts of software testing,IoT and ontology engineering.Satisfied results of the research are showed in interest of the specialists regarding proposed ontology development and suggestions for improvements.The Proposed reasoning-based ontological model for development of testing strategies in IoT application contributes to increase the general understanding of tests in addition to assisting for the development of testing strategies for different IoT devices.展开更多
基金funded by the Deanship of Scientific Research(DSR),King Abdul-Aziz University,Jeddah,Saudi Arabia under Grant No.(RG−11–611–43).
文摘Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their traffic.Newresearch directions will lead to fundamental changes in the design of future Fifthgeneration(5G)cellular networks.For the formal reason,the study solves the physical network of the mobile base station for the prediction of the best characteristics to develop an enhanced network with the help of graph theory.Any number that can be uniquely calculated by a graph is known as a graph invariant.During the last two decades,innumerable numerical graph invariants have been portrayed and used for correlation analysis.In any case,no efficient assessment has been embraced to choose,how much these invariants are connected with a network graph.This paper will talk about two unique variations of the hexagonal graph with great capability of forecasting in the field of optimized mobile base station topology in setting with physical networks.Since K-banhatti sombor invariants(KBSO)and Contrharmonic-quadratic invariants(CQIs)are newly introduced and have various expectation characteristics for various variations of hexagonal graphs or networks.As the hexagonal networks are used in mobile base stations in layered,forms called honeycomb.The review settled the topology of a hexagon of two distinct sorts with two invariants KBSO and CQIs and their reduced forms.The deduced outcomes can be utilized for the modeling of mobile cellular networks,multiprocessors interconnections,microchips,chemical compound synthesis and memory interconnection networks.The results find sharp upper bounds and lower bounds of the honeycomb network to utilize the Mobile base station network(MBSN)for the high load of traffic and minimal traffic also.
基金funded by the Deanship of Scientific Research(DSR),King AbdulAziz University,Jeddah,Saudi Arabia under Grant No.(RG-11-611-43).
文摘Soil salinity is a serious land degradation issue in agriculture.It is a major threat to agriculture productivity.Extra irrigation water is applied to leach down the salts from the root zone of the plants in the form of a Leaching fraction(LF)of irrigation water.For the leaching process to be effective,the LF of irriga-tion water needs to be adjusted according to the environmental conditions and soil salinity level in the form of Evapotranspiration(ET)rate.The relationship between environmental conditions and ET rate is hard to be defined by a linear relationship and data-driven Machine learning(ML)based decisions are required to determine the calibrated Evapotranspiration(ETc)rate.ML-assisted ETc is pro-posed to adjust the LF according to the ETc and soil salinity level.A regression model is proposed to determine the ETc rate according to the prevailing tempera-ture,humidity,and sunshine,which would be used to determine the smart LF according to the ETc and soil salinity level.The proposed model is trained and tested against the Blaney Criddle method of Reference evapotranspiration(ETo)determination.The validation of the model from the test dataset reveals the accu-racy of the ML model in terms of Root mean squared errors(RMSE)are 0.41,Mean absolute errors(MAE)are 0.34,and Mean squared errors(MSE)are 0.28 mm day-1.The applications of the proposed solution in a real-time environ-ment show that the LF by the proposed solution is more effective in reducing the soil salinity as compared to the traditional process of leaching.
基金This project was funded by the Deanship of Scientific Research(DSR),King Abdul-Aziz University,Jeddah,Saudi Arabia under Grant No.(RG-11-611-43).
文摘Any number that can be uniquely determined by a graph is called a graph invariant.During the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation analysis.However,no reliable examination has been embraced to decide,how much these invariants are related with a network graph or molecular graph.In this paper,it will discuss three different variants of bridge networks with good potential of prediction in the field of computer science,mathematics,chemistry,pharmacy,informatics and biology in context with physical and chemical structures and networks,because k-banhatti sombor invariants are freshly presented and have numerous prediction qualities for different variants of bridge graphs or networks.The study solved the topology of a bridge graph/networks of three different types with two invariants KBanhatti Sombor Indices and its reduced form.These deduced results can be used for the modeling of computer networks like Local area network(LAN),Metropolitan area network(MAN),and Wide area network(WAN),backbone of internet and other networks/structures of computers,power generation,bio-informatics and chemical compounds synthesis.
基金This project was funded by the Deanship of Scientific Research(DSR),King Abdul-Aziz University,Jeddah,Saudi Arabia under Grant No.(RG-11-611-43).
文摘Handwritten character recognition systems are used in every field of life nowadays,including shopping malls,banks,educational institutes,etc.Urdu is the national language of Pakistan,and it is the fourth spoken language in the world.However,it is still challenging to recognize Urdu handwritten characters owing to their cursive nature.Our paper presents a Convolutional Neural Networks(CNN)model to recognize Urdu handwritten alphabet recognition(UHAR)offline and online characters.Our research contributes an Urdu handwritten dataset(aka UHDS)to empower future works in this field.For offline systems,optical readers are used for extracting the alphabets,while diagonal-based extraction methods are implemented in online systems.Moreover,our research tackled the issue concerning the lack of comprehensive and standard Urdu alphabet datasets to empower research activities in the area of Urdu text recognition.To this end,we collected 1000 handwritten samples for each alphabet and a total of 38000 samples from 12 to 25 age groups to train our CNN model using online and offline mediums.Subsequently,we carried out detailed experiments for character recognition,as detailed in the results.The proposed CNN model outperformed as compared to previously published approaches.
基金This project was funded by the Deanship of Scientific Research(DSR)at King Abdul Aziz University,Jeddah,under Grant No.KEP-10-611-42.The authors,therefore,acknowledge with thanks DSR technical and financial support.
文摘Face recognition is a big challenge in the research field with a lot of problems like misalignment,illumination changes,pose variations,occlusion,and expressions.Providing a single solution to solve all these problems at a time is a challenging task.We have put some effort to provide a solution to solving all these issues by introducing a face recognition model based on local tetra patterns and spatial pyramid matching.The technique is based on a procedure where the input image is passed through an algorithm that extracts local features by using spatial pyramid matching andmax-pooling.Finally,the input image is recognized using a robust kernel representation method using extracted features.The qualitative and quantitative analysis of the proposed method is carried on benchmark image datasets.Experimental results showed that the proposed method performs better in terms of standard performance evaluation parameters as compared to state-of-the-art methods on AR,ORL,LFW,and FERET face recognition datasets.
基金This project was funded by the Deanship of Scientific Research(DSR),King Abdul-Aziz University,Jeddah,Saudi Arabia under Grant No.(D-63-611-1442).
文摘In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless.This paper aims to improve the said limitations by designing of Triple key security algorithm(TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext.Each plaintext character is substituted by an alternative message.The mode of substitution is transformed cyclically which depends on the current position of the modified communication.Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR(XOR)of the 1st key.This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack.By utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples.
基金This work was supported by the King Saud University(in Riyadh,Saudi Arabia)through the Researcher Support Project Number(RSP-2021/387).
文摘Internet-of-Things(IoT)has attained a major share in embedded software development.The new era of specialized intelligent systems requires adaptation of customized software engineering approaches.Currently,software engineering has merged the development phases with the technologies provided by industrial automation.The improvements are still required in testing phase for the software developed to IoT solutions.This research aims to assist in developing the testing strategies for IoT applications,therein ontology has been adopted as a knowledge representation technique to different software engineering processes.The proposed ontological model renders 101 methodology by using Protégé.After completion,the ontology was evaluated in three-dimensional view by the domain experts of software testing,IoT and ontology engineering.Satisfied results of the research are showed in interest of the specialists regarding proposed ontology development and suggestions for improvements.The Proposed reasoning-based ontological model for development of testing strategies in IoT application contributes to increase the general understanding of tests in addition to assisting for the development of testing strategies for different IoT devices.