期刊文献+
共找到85篇文章
< 1 2 5 >
每页显示 20 50 100
Sepsis Prediction Using CNNBDLSTM and Temporal Derivatives Feature Extraction in the IoT Medical Environment
1
作者 Sapiah Sakri Shakila Basheer +4 位作者 Zuhaira Muhammad Zain Nurul Halimatul Asmak Ismail Dua’Abdellatef Nassar Manal Abdullah Alohali Mais Ayman Alharaki 《Computers, Materials & Continua》 SCIE EI 2024年第4期1157-1185,共29页
Background:Sepsis,a potentially fatal inflammatory disease triggered by infection,carries significant healthimplications worldwide.Timely detection is crucial as sepsis can rapidly escalate if left undetected.Recentad... Background:Sepsis,a potentially fatal inflammatory disease triggered by infection,carries significant healthimplications worldwide.Timely detection is crucial as sepsis can rapidly escalate if left undetected.Recentadvancements in deep learning(DL)offer powerful tools to address this challenge.Aim:Thus,this study proposeda hybrid CNNBDLSTM,a combination of a convolutional neural network(CNN)with a bi-directional long shorttermmemory(BDLSTM)model to predict sepsis onset.Implementing the proposed model provides a robustframework that capitalizes on the complementary strengths of both architectures,resulting in more accurate andtimelier predictions.Method:The sepsis prediction method proposed here utilizes temporal feature extraction todelineate six distinct time frames before the onset of sepsis.These time frames adhere to the sepsis-3 standardrequirement,which incorporates 12-h observation windows preceding sepsis onset.All models were trained usingthe Medical Information Mart for Intensive Care III(MIMIC-III)dataset,which sourced 61,522 patients with 40clinical variables obtained from the IoT medical environment.The confusion matrix,the area under the receiveroperating characteristic curve(AUCROC)curve,the accuracy,the precision,the F1-score,and the recall weredeployed to evaluate themodels.Result:The CNNBDLSTMmodel demonstrated superior performance comparedto the benchmark and other models,achieving an AUCROC of 99.74%and an accuracy of 99.15%one hour beforesepsis onset.These results indicate that the CNNBDLSTM model is highly effective in predicting sepsis onset,particularly within a close proximity of one hour.Implication:The results could assist practitioners in increasingthe potential survival of the patient one hour before sepsis onset. 展开更多
关键词 Temporal derivatives hybrid deep learning predicting sepsis onset MIMIC III machine learning(ML) deep learning
下载PDF
Behaviour recognition based on the integration of multigranular motion features in the Internet of Things
2
作者 Lizong Zhang Yiming Wang +3 位作者 Ke Yan Yi Su Nawaf Alharbe Shuxin Feng 《Digital Communications and Networks》 SCIE CSCD 2024年第3期666-675,共10页
With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analy... With the adoption of cutting-edge communication technologies such as 5G/6G systems and the extensive development of devices,crowdsensing systems in the Internet of Things(IoT)are now conducting complicated video analysis tasks such as behaviour recognition.These applications have dramatically increased the diversity of IoT systems.Specifically,behaviour recognition in videos usually requires a combinatorial analysis of the spatial information about objects and information about their dynamic actions in the temporal dimension.Behaviour recognition may even rely more on the modeling of temporal information containing short-range and long-range motions,in contrast to computer vision tasks involving images that focus on understanding spatial information.However,current solutions fail to jointly and comprehensively analyse short-range motions between adjacent frames and long-range temporal aggregations at large scales in videos.In this paper,we propose a novel behaviour recognition method based on the integration of multigranular(IMG)motion features,which can provide support for deploying video analysis in multimedia IoT crowdsensing systems.In particular,we achieve reliable motion information modeling by integrating a channel attention-based short-term motion feature enhancement module(CSEM)and a cascaded long-term motion feature integration module(CLIM).We evaluate our model on several action recognition benchmarks,such as HMDB51,Something-Something and UCF101.The experimental results demonstrate that our approach outperforms the previous state-of-the-art methods,which confirms its effective-ness and efficiency. 展开更多
关键词 Behaviour recognition Motion features Attention mechanism Internet of things Crowdsensing
下载PDF
Deep Learning-Based ECG Classification for Arterial Fibrillation Detection
3
作者 Muhammad Sohail Irshad Tehreem Masood +3 位作者 Arfan Jaffar Muhammad Rashid Sheeraz Akram Abeer Aljohani 《Computers, Materials & Continua》 SCIE EI 2024年第6期4805-4824,共20页
The application of deep learning techniques in the medical field,specifically for Atrial Fibrillation(AFib)detection through Electrocardiogram(ECG)signals,has witnessed significant interest.Accurate and timely diagnos... The application of deep learning techniques in the medical field,specifically for Atrial Fibrillation(AFib)detection through Electrocardiogram(ECG)signals,has witnessed significant interest.Accurate and timely diagnosis increases the patient’s chances of recovery.However,issues like overfitting and inconsistent accuracy across datasets remain challenges.In a quest to address these challenges,a study presents two prominent deep learning architectures,ResNet-50 and DenseNet-121,to evaluate their effectiveness in AFib detection.The aim was to create a robust detection mechanism that consistently performs well.Metrics such as loss,accuracy,precision,sensitivity,and Area Under the Curve(AUC)were utilized for evaluation.The findings revealed that ResNet-50 surpassed DenseNet-121 in all evaluated categories.It demonstrated lower loss rate 0.0315 and 0.0305 superior accuracy of 98.77%and 98.88%,precision of 98.78%and 98.89%and sensitivity of 98.76%and 98.86%for training and validation,hinting at its advanced capability for AFib detection.These insights offer a substantial contribution to the existing literature on deep learning applications for AFib detection from ECG signals.The comparative performance data assists future researchers in selecting suitable deep-learning architectures for AFib detection.Moreover,the outcomes of this study are anticipated to stimulate the development of more advanced and efficient ECG-based AFib detection methodologies,for more accurate and early detection of AFib,thereby fostering improved patient care and outcomes. 展开更多
关键词 Convolution neural network atrial fibrillation area under curve ECG false positive rate deep learning CLASSIFICATION
下载PDF
Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network
4
作者 Deema Alsekait Mohammed Zakariah +2 位作者 Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2024年第11期2395-2436,共42页
The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability t... The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks.Further,the study suggests using an advanced approach that utilizes machine learning,specifically the Wide Residual Network(WRN),to identify hidden malware in IoT systems.The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices,using the MalMemAnalysis dataset.Moreover,thorough experimentation provides evidence for the effectiveness of the WRN-based strategy,resulting in exceptional performance measures such as accuracy,precision,F1-score,and recall.The study of the test data demonstrates highly impressive results,with a multiclass accuracy surpassing 99.97%and a binary class accuracy beyond 99.98%.The results emphasize the strength and dependability of using advanced deep learning methods such as WRN for identifying hidden malware risks in IoT environments.Furthermore,a comparison examination with the current body of literature emphasizes the originality and efficacy of the suggested methodology.This research builds upon previous studies that have investigated several machine learning methods for detecting malware on IoT devices.However,it distinguishes itself by showcasing exceptional performance metrics and validating its findings through thorough experimentation with real-world datasets.Utilizing WRN offers benefits in managing the intricacies of malware detection,emphasizing its capacity to enhance the security of IoT ecosystems.To summarize,this work proposes an effective way to address privacy concerns on IoT devices by utilizing advanced machine learning methods.The research provides useful insights into the changing landscape of IoT cybersecurity by emphasizing methodological rigor and conducting comparative performance analysis.Future research could focus on enhancing the recommended approach by adding more datasets and leveraging real-time monitoring capabilities to strengthen IoT devices’defenses against new cybersecurity threats. 展开更多
关键词 Obfuscated malware detection IoT devices Wide Residual Network(WRN) malware detection machine learning
下载PDF
Optimizing the Clinical Decision Support System (CDSS) by Using Recurrent Neural Network (RNN) Language Models for Real-Time Medical Query Processing
5
作者 Israa Ibraheem Al Barazanchi Wahidah Hashim +4 位作者 Reema Thabit Mashary Nawwaf Alrasheedy Abeer Aljohan Jongwoon Park Byoungchol Chang 《Computers, Materials & Continua》 SCIE EI 2024年第12期4787-4832,共46页
This research aims to enhance Clinical Decision Support Systems(CDSS)within Wireless Body Area Networks(WBANs)by leveraging advanced machine learning techniques.Specifically,we target the challenges of accurate diagno... This research aims to enhance Clinical Decision Support Systems(CDSS)within Wireless Body Area Networks(WBANs)by leveraging advanced machine learning techniques.Specifically,we target the challenges of accurate diagnosis in medical imaging and sequential data analysis using Recurrent Neural Networks(RNNs)with Long Short-Term Memory(LSTM)layers and echo state cells.These models are tailored to improve diagnostic precision,particularly for conditions like rotator cuff tears in osteoporosis patients and gastrointestinal diseases.Traditional diagnostic methods and existing CDSS frameworks often fall short in managing complex,sequential medical data,struggling with long-term dependencies and data imbalances,resulting in suboptimal accuracy and delayed decisions.Our goal is to develop Artificial Intelligence(AI)models that address these shortcomings,offering robust,real-time diagnostic support.We propose a hybrid RNN model that integrates SimpleRNN,LSTM layers,and echo state cells to manage long-term dependencies effectively.Additionally,we introduce CG-Net,a novel Convolutional Neural Network(CNN)framework for gastrointestinal disease classification,which outperforms traditional CNN models.We further enhance model performance through data augmentation and transfer learning,improving generalization and robustness against data scarcity and imbalance.Comprehensive validation,including 5-fold cross-validation and metrics such as accuracy,precision,recall,F1-score,and Area Under the Curve(AUC),confirms the models’reliability.Moreover,SHapley Additive exPlanations(SHAP)and Local Interpretable Model-agnostic Explanations(LIME)are employed to improve model interpretability.Our findings show that the proposed models significantly enhance diagnostic accuracy and efficiency,offering substantial advancements in WBANs and CDSS. 展开更多
关键词 Computer science clinical decision support system(CDSS) medical queries healthcare deep learning recurrent neural network(RNN) long short-term memory(LSTM)
下载PDF
A comparative in vitro study on the effect of SGLT2 inhibitors on chemosensitivity to doxorubicin in MCF-7 breast cancer cells
6
作者 SHAHID KARIM ALANOUD NAHER ALGHANMI +5 位作者 MAHA JAMAL HUDA ALKREATHY ALAM JAMAL HIND A.ALKHATABI MOHAMMED BAZUHAIR AFTAB AHMAD 《Oncology Research》 SCIE 2024年第5期817-830,共14页
Cancer frequently develops resistance to the majority of chemotherapy treatments.This study aimed to examine the synergistic cytotoxic and antitumor effects of SGLT2 inhibitors,specifically Canagliflozin(CAN),Dapaglif... Cancer frequently develops resistance to the majority of chemotherapy treatments.This study aimed to examine the synergistic cytotoxic and antitumor effects of SGLT2 inhibitors,specifically Canagliflozin(CAN),Dapagliflozin(DAP),Empagliflozin(EMP),and Doxorubicin(DOX),using in vitro experimentation.The precise combination of CAN+DOX has been found to greatly enhance the cytotoxic effects of doxorubicin(DOX)in MCF-7 cells.Interestingly,it was shown that cancer cells exhibit an increased demand for glucose and ATP in order to support their growth.Notably,when these medications were combined with DOX,there was a considerable inhibition of glucose consumption,as well as reductions in intracellular ATP and lactate levels.Moreover,this effect was found to be dependent on the dosages of the drugs.In addition to effectively inhibiting the cell cycle,the combination of CAN+DOX induces substantial modifications in both cell cycle and apoptotic gene expression.This work represents the initial report on the beneficial impact of SGLT2 inhibitor medications,namely CAN,DAP,and EMP,on the responsiveness to the anticancer properties of DOX.The underlying molecular mechanisms potentially involve the suppression of the function of SGLT2. 展开更多
关键词 SGLT2 Cancer CYTOTOXICITY ATP Cell cycle
下载PDF
Efficient Intelligent E-Learning Behavior-Based Analytics of Student’s Performance Using Deep Forest Model
7
作者 Raed Alotaibi Omar Reyad Mohamed Esmail Karar 《Computer Systems Science & Engineering》 2024年第5期1133-1147,共15页
E-learning behavior data indicates several students’activities on the e-learning platform such as the number of accesses to a set of resources and number of participants in lectures.This article proposes a new analyt... E-learning behavior data indicates several students’activities on the e-learning platform such as the number of accesses to a set of resources and number of participants in lectures.This article proposes a new analytics systemto support academic evaluation for students via e-learning activities to overcome the challenges faced by traditional learning environments.The proposed e-learning analytics system includes a new deep forest model.It consists of multistage cascade random forests with minimal hyperparameters compared to traditional deep neural networks.The developed forest model can analyze each student’s activities during the use of an e-learning platform to give accurate expectations of the student’s performance before ending the semester and/or the final exam.Experiments have been conducted on the Open University Learning Analytics Dataset(OULAD)of 32,593 students.Our proposed deep model showed a competitive accuracy score of 98.0%compared to artificial intelligence-based models,such as ConvolutionalNeuralNetwork(CNN)and Long Short-TermMemory(LSTM)in previous studies.That allows academic advisors to support expected failed students significantly and improve their academic level at the right time.Consequently,the proposed analytics system can enhance the quality of educational services for students in an innovative e-learning framework. 展开更多
关键词 E-LEARNING behavior data student evaluation artificial intelligence machine learning
下载PDF
Current updates on the epidemiology,pathogenesis and development of small molecule therapeutics for the treatment of Ebola virus infections
8
作者 Shah Alam Khan Neelima Shrivastava +2 位作者 MdJawaid Akhtar Aftab Ahmad Asif Husain 《Asian Pacific Journal of Tropical Medicine》 SCIE CAS 2024年第7期285-298,I0001-I0007,共21页
Ebola virus disease(EVD)is a rare,highly contagious and a deadly disease with a variable fatality rate ranging from 30%to 90%.Over the past two decades,Ebola pandemic has severely affected the sub-Sahara region includ... Ebola virus disease(EVD)is a rare,highly contagious and a deadly disease with a variable fatality rate ranging from 30%to 90%.Over the past two decades,Ebola pandemic has severely affected the sub-Sahara region including Democratic Republic of the Congo(DRC),and Uganda.The causative agents of the most EVD cases are three distinct species out of six Ebolaviruses namely Zaire Ebolavirus(ZEBOV),Sudan Ebolavirus(SUDV)and Bundibugyo Ebolavirus(BDBV).In recent years,significant strides have been made in therapeutic interventions.Notably,the US Food and Drug Administration has approved two monoclonal antibodies:InmazebTM(REGN-EB3)and Ansuvimab or EbangaTM.Additionally,many small molecules are currently in the developmental stage,promising further progress in medical treatment.Addressing the critical need for preventive measures,this review provides an in-depth analysis of the licensed Ebola vaccines-Ervebo and the combination of Zabdeno(Ad26.ZEBOV)and Mvabea(MVA-BN-Filo)as well as the vaccines which are currently being tested for their efficacy and safety in clinical studies.These vaccines might play an important role in curbing the spread and mitigating the impact of this lethal disease.The current treatment landscape for EVD encompasses both nutritional(supportive)and drug therapies.The review comprehensively details the origin,pathogenesis,and epidemiology of EVD,shedding light on the ongoing efforts to combat this devastating disease.It explores small molecules in various stages of the development,discusses patents filed or granted,and delves into the clinical and supportive therapies that form the cornerstone of EVD management.This review aims to provide the recent developments made in the design and synthesis of small molecules for scientific community to facilitate a deeper understanding of the disease and fostering the development of effective strategies for prevention,treatment,and control of EVD. 展开更多
关键词 EBOLA EPIDEMIC Vaccine Ebola virus diseas
下载PDF
Phishing Attacks Detection Using EnsembleMachine Learning Algorithms
9
作者 Nisreen Innab Ahmed Abdelgader Fadol Osman +4 位作者 Mohammed Awad Mohammed Ataelfadiel Marwan Abu-Zanona Bassam Mohammad Elzaghmouri Farah H.Zawaideh Mouiad Fadeil Alawneh 《Computers, Materials & Continua》 SCIE EI 2024年第7期1325-1345,共21页
Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based institutions.Data indicates a persistent rise ... Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based institutions.Data indicates a persistent rise in phishing attacks.Moreover,these fraudulent schemes are progressively becoming more intricate,thereby rendering them more challenging to identify.Hence,it is imperative to utilize sophisticated algorithms to address this issue.Machine learning is a highly effective approach for identifying and uncovering these harmful behaviors.Machine learning(ML)approaches can identify common characteristics in most phishing assaults.In this paper,we propose an ensemble approach and compare it with six machine learning techniques to determine the type of website and whether it is normal or not based on two phishing datasets.After that,we used the normalization technique on the dataset to transform the range of all the features into the same range.The findings of this paper for all algorithms are as follows in the first dataset based on accuracy,precision,recall,and F1-score,respectively:Decision Tree(DT)(0.964,0.961,0.976,0.968),Random Forest(RF)(0.970,0.964,0.984,0.974),Gradient Boosting(GB)(0.960,0.959,0.971,0.965),XGBoost(XGB)(0.973,0.976,0.976,0.976),AdaBoost(0.934,0.934,0.950,0.942),Multi Layer Perceptron(MLP)(0.970,0.971,0.976,0.974)and Voting(0.978,0.975,0.987,0.981).So,the Voting classifier gave the best results.While in the second dataset,all the algorithms gave the same results in four evaluation metrics,which indicates that each of them can effectively accomplish the prediction process.Also,this approach outperformed the previous work in detecting phishing websites with high accuracy,a lower false negative rate,a shorter prediction time,and a lower false positive rate. 展开更多
关键词 Social engineering ATTACKS phishing attacks machine learning SECURITY artificial intelligence
下载PDF
Sports Events Recognition Using Multi Features and Deep Belief Network
10
作者 Bayan Alabdullah Muhammad Tayyab +4 位作者 Yahay AlQahtani Naif Al Mudawi Asaad Algarni Ahmad Jalal Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2024年第10期309-326,共18页
In the modern era of a growing population,it is arduous for humans to monitor every aspect of sports,events occurring around us,and scenarios or conditions.This recognition of different types of sports and events has ... In the modern era of a growing population,it is arduous for humans to monitor every aspect of sports,events occurring around us,and scenarios or conditions.This recognition of different types of sports and events has increasingly incorporated the use of machine learning and artificial intelligence.This research focuses on detecting and recognizing events in sequential photos characterized by several factors,including the size,location,and position of people’s body parts in those pictures,and the influence around those people.Common approaches utilized,here are feature descriptors such as MSER(Maximally Stable Extremal Regions),SIFT(Scale-Invariant Feature Transform),and DOF(degree of freedom)between the joint points are applied to the skeleton points.Moreover,for the same purposes,other features such as BRISK(Binary Robust Invariant Scalable Keypoints),ORB(Oriented FAST and Rotated BRIEF),and HOG(Histogram of Oriented Gradients)are applied on full body or silhouettes.The integration of these techniques increases the discriminative nature of characteristics retrieved in the identification process of the event,hence improving the efficiency and reliability of the entire procedure.These extracted features are passed to the early fusion and DBscan for feature fusion and optimization.Then deep belief,network is employed for recognition.Experimental results demonstrate a separate experiment’s detection average recognition rate of 87%in the HMDB51 video database and 89%in the YouTube database,showing a better perspective than the current methods in sports and event identification. 展开更多
关键词 Machine learning SILHOUETTES extremal regions joint points scalable keypoints
下载PDF
Numerical Analysis of Bacterial Meningitis Stochastic Delayed Epidemic Model through Computational Methods
11
作者 Umar Shafique Mohamed Mahyoub Al-Shamiri +3 位作者 Ali Raza Emad Fadhal Muhammad Rafiq Nauman Ahmed 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期311-329,共19页
Based on theWorld Health Organization(WHO),Meningitis is a severe infection of the meninges,the membranes covering the brain and spinal cord.It is a devastating disease and remains a significant public health challeng... Based on theWorld Health Organization(WHO),Meningitis is a severe infection of the meninges,the membranes covering the brain and spinal cord.It is a devastating disease and remains a significant public health challenge.This study investigates a bacterial meningitis model through deterministic and stochastic versions.Four-compartment population dynamics explain the concept,particularly the susceptible population,carrier,infected,and recovered.The model predicts the nonnegative equilibrium points and reproduction number,i.e.,the Meningitis-Free Equilibrium(MFE),and Meningitis-Existing Equilibrium(MEE).For the stochastic version of the existing deterministicmodel,the twomethodologies studied are transition probabilities and non-parametric perturbations.Also,positivity,boundedness,extinction,and disease persistence are studiedrigorouslywiththe helpofwell-known theorems.Standard and nonstandard techniques such as EulerMaruyama,stochastic Euler,stochastic Runge Kutta,and stochastic nonstandard finite difference in the sense of delay have been presented for computational analysis of the stochastic model.Unfortunately,standard methods fail to restore the biological properties of the model,so the stochastic nonstandard finite difference approximation is offered as an efficient,low-cost,and independent of time step size.In addition,the convergence,local,and global stability around the equilibria of the nonstandard computational method is studied by assuming the perturbation effect is zero.The simulations and comparison of the methods are presented to support the theoretical results and for the best visualization of results. 展开更多
关键词 Bacterial Meningitis disease stochastic delayed model stability analysis extinction and persistence computational methods
下载PDF
Heart-Net: AMulti-Modal Deep Learning Approach for Diagnosing Cardiovascular Diseases
12
作者 DeemaMohammed Alsekait Ahmed Younes Shdefat +5 位作者 AymanNabil Asif Nawaz Muhammad Rizwan Rashid Rana Zohair Ahmed Hanaa Fathi Diaa Salama Abd Elminaam 《Computers, Materials & Continua》 SCIE EI 2024年第9期3967-3990,共24页
Heart disease remains a leading cause of morbidity and mortality worldwide,highlighting the need for improved diagnostic methods.Traditional diagnostics face limitations such as reliance on single-modality data and vu... Heart disease remains a leading cause of morbidity and mortality worldwide,highlighting the need for improved diagnostic methods.Traditional diagnostics face limitations such as reliance on single-modality data and vulnerability to apparatus faults,which can reduce accuracy,especially with poor-quality images.Additionally,these methods often require significant time and expertise,making them less accessible in resource-limited settings.Emerging technologies like artificial intelligence and machine learning offer promising solutions by integrating multi-modality data and enhancing diagnostic precision,ultimately improving patient outcomes and reducing healthcare costs.This study introduces Heart-Net,a multi-modal deep learning framework designed to enhance heart disease diagnosis by integrating data from Cardiac Magnetic Resonance Imaging(MRI)and Electrocardiogram(ECG).Heart-Net uses a 3D U-Net for MRI analysis and a Temporal Convolutional Graph Neural Network(TCGN)for ECG feature extraction,combining these through an attention mechanism to emphasize relevant features.Classification is performed using Optimized TCGN.This approach improves early detection,reduces diagnostic errors,and supports personalized risk assessments and continuous health monitoring.The proposed approach results show that Heart-Net significantly outperforms traditional single-modality models,achieving accuracies of 92.56%forHeartnetDataset Ⅰ(HNET-DSⅠ),93.45%forHeartnetDataset Ⅱ(HNET-DSⅡ),and 91.89%for Heartnet Dataset Ⅲ(HNET-DSⅢ),mitigating the impact of apparatus faults and image quality issues.These findings underscore the potential of Heart-Net to revolutionize heart disease diagnostics and improve clinical outcomes. 展开更多
关键词 Heart diseases magnetic resonance imaging ELECTROCARDIOGRAM deep learning CLASSIFICATION
下载PDF
Enhanced Arithmetic Optimization Algorithm Guided by a Local Search for the Feature Selection Problem
13
作者 Sana Jawarneh 《Intelligent Automation & Soft Computing》 2024年第3期511-525,共15页
High-dimensional datasets present significant challenges for classification tasks.Dimensionality reduction,a crucial aspect of data preprocessing,has gained substantial attention due to its ability to improve classifi... High-dimensional datasets present significant challenges for classification tasks.Dimensionality reduction,a crucial aspect of data preprocessing,has gained substantial attention due to its ability to improve classification per-formance.However,identifying the optimal features within high-dimensional datasets remains a computationally demanding task,necessitating the use of efficient algorithms.This paper introduces the Arithmetic Optimization Algorithm(AOA),a novel approach for finding the optimal feature subset.AOA is specifically modified to address feature selection problems based on a transfer function.Additionally,two enhancements are incorporated into the AOA algorithm to overcome limitations such as limited precision,slow convergence,and susceptibility to local optima.The first enhancement proposes a new method for selecting solutions to be improved during the search process.This method effectively improves the original algorithm’s accuracy and convergence speed.The second enhancement introduces a local search with neighborhood strategies(AOA_NBH)during the AOA exploitation phase.AOA_NBH explores the vast search space,aiding the algorithm in escaping local optima.Our results demonstrate that incorporating neighborhood methods enhances the output and achieves significant improvement over state-of-the-art methods. 展开更多
关键词 Arithmetic optimization algorithm CLASSIFICATION feature selection problem optimization
下载PDF
A Low Complexity ML-Based Methods for Malware Classification
14
作者 Mahmoud E.Farfoura Ahmad Alkhatib +4 位作者 Deema Mohammed Alsekait Mohammad Alshinwan Sahar A.El-Rahman Didi Rosiyadi Diaa Salama Abd Elminaam 《Computers, Materials & Continua》 SCIE EI 2024年第9期4833-4857,共25页
The article describes a new method for malware classification,based on a Machine Learning(ML)model architecture specifically designed for malware detection,enabling real-time and accurate malware identification.Using ... The article describes a new method for malware classification,based on a Machine Learning(ML)model architecture specifically designed for malware detection,enabling real-time and accurate malware identification.Using an innovative feature dimensionality reduction technique called the Interpolation-based Feature Dimensionality Reduction Technique(IFDRT),the authors have significantly reduced the feature space while retaining critical information necessary for malware classification.This technique optimizes the model’s performance and reduces computational requirements.The proposed method is demonstrated by applying it to the BODMAS malware dataset,which contains 57,293 malware samples and 77,142 benign samples,each with a 2381-feature vector.Through the IFDRT method,the dataset is transformed,reducing the number of features while maintaining essential data for accurate classification.The evaluation results show outstanding performance,with an F1 score of 0.984 and a high accuracy of 98.5%using only two reduced features.This demonstrates the method’s ability to classify malware samples accurately while minimizing processing time.The method allows for improving computational efficiency by reducing the feature space,which decreases the memory and time requirements for training and prediction.The new method’s effectiveness is confirmed by the calculations,which indicate significant improvements in malware classification accuracy and efficiency.The research results enhance existing malware detection techniques and can be applied in various cybersecurity applications,including real-timemalware detection on resource-constrained devices.Novelty and scientific contribution lie in the development of the IFDRT method,which provides a robust and efficient solution for feature reduction in ML-based malware classification,paving the way for more effective and scalable cybersecurity measures. 展开更多
关键词 Malware detection ML-based models dimensionality reduction feature engineering
下载PDF
A Novel Hybrid Architecture for Superior IoT Threat Detection through Real IoT Environments
15
作者 Bassam Mohammad Elzaghmouri Yosef Hasan Fayez Jbara +7 位作者 Said Elaiwat Nisreen Innab Ahmed Abdelgader Fadol Osman Mohammed Awad Mohammed Ataelfadiel Farah H.Zawaideh Mouiad Fadeil Alawneh Asef Al-Khateeb Marwan Abu-Zanona 《Computers, Materials & Continua》 SCIE EI 2024年第11期2299-2316,共18页
As the Internet of Things(IoT)continues to expand,incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats,necessitating robust defense mechanisms.This paper presents an ... As the Internet of Things(IoT)continues to expand,incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats,necessitating robust defense mechanisms.This paper presents an innovative hybrid deep learning architecture that excels at detecting IoT threats in real-world settings.Our proposed model combines Convolutional Neural Networks(CNN),Bidirectional Long Short-Term Memory(BLSTM),Gated Recurrent Units(GRU),and Attention mechanisms into a cohesive framework.This integrated structure aims to enhance the detection and classification of complex cyber threats while accommodating the operational constraints of diverse IoT systems.We evaluated our model using the RT-IoT2022 dataset,which includes various devices,standard operations,and simulated attacks.Our research’s significance lies in the comprehensive evaluation metrics,including Cohen Kappa and Matthews Correlation Coefficient(MCC),which underscore the model’s reliability and predictive quality.Our model surpassed traditional machine learning algorithms and the state-of-the-art,achieving over 99.6%precision,recall,F1-score,False Positive Rate(FPR),Detection Time,and accuracy,effectively identifying specific threats such as Message Queuing Telemetry Transport(MQTT)Publish,Denial of Service Synchronize network packet crafting tool(DOS SYN Hping),and Network Mapper Operating System Detection(NMAP OS DETECTION).The experimental analysis reveals a significant improvement over existing detection systems,significantly enhancing IoT security paradigms.Through our experimental analysis,we have demonstrated a remarkable enhancement in comparison to existing detection systems,which significantly strength-ens the security standards of IoT.Our model effectively addresses the need for advanced,dependable,and adaptable security solutions,serving as a symbol of the power of deep learning in strengthening IoT ecosystems amidst the constantly evolving cyber threat landscape.This achievement marks a significant stride towards protecting the integrity of IoT infrastructure,ensuring operational resilience,and building privacy in this groundbreaking technology. 展开更多
关键词 A hybrid deep learning model IoT threat detection real IoT environments CYBERSECURITY attention mechanism
下载PDF
Privacy-Preserving Information Fusion Technique for Device to Server-Enabled Communication in the Internet of Things:A Hybrid Approach
16
作者 Amal Al-Rasheed Rahim Khan +3 位作者 Tahani Alsaed Mahwish Kundi Mohamad Hanif Md.Saad Mahidur R.Sarker 《Computers, Materials & Continua》 SCIE EI 2024年第7期1305-1323,共19页
Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both cus... Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both customers,i.e.,people,and industries as wearable devices collect sensitive information about patients(both admitted and outdoor)in smart healthcare infrastructures.In addition to privacy,outliers or noise are among the crucial issues,which are directly correlated with IoT infrastructures,as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing,i.e.,transmitting.Therefore,the development of privacy-preserving information fusion techniques is highly encouraged,especially those designed for smart IoT-enabled domains.In this paper,we are going to present an effective hybrid approach that can refine raw data values captured by the respectivemember device before transmission while preserving its privacy through the utilization of the differential privacy technique in IoT infrastructures.Sliding window,i.e.,δi based dynamic programming methodology,is implemented at the device level to ensure precise and accurate detection of outliers or noisy data,and refine it prior to activation of the respective transmission activity.Additionally,an appropriate privacy budget has been selected,which is enough to ensure the privacy of every individualmodule,i.e.,a wearable device such as a smartwatch attached to the patient’s body.In contrast,the end module,i.e.,the server in this case,can extract important information with approximately the maximum level of accuracy.Moreover,refined data has been processed by adding an appropriate nose through the Laplace mechanism to make it useless or meaningless for the adversary modules in the IoT.The proposed hybrid approach is trusted from both the device’s privacy and the integrity of the transmitted information perspectives.Simulation and analytical results have proved that the proposed privacy-preserving information fusion technique for wearable devices is an ideal solution for resource-constrained infrastructures such as IoT and the Internet ofMedical Things,where both device privacy and information integrity are important.Finally,the proposed hybrid approach is proven against well-known intruder attacks,especially those related to the privacy of the respective device in IoT infrastructures. 展开更多
关键词 Internet of things information fusion differential privacy dynamic programming Laplace function
下载PDF
A New Framework for Scholarship Predictor Using a Machine Learning Approach
17
作者 Bushra Kanwal Rana Saud Shoukat +3 位作者 Saif Ur Rehman Mahwish Kundi Tahani AlSaedi Abdulrahman Alahmadi 《Intelligent Automation & Soft Computing》 2024年第5期829-854,共26页
Education is the base of the survival and growth of any state,but due to resource scarcity,students,particularly at the university level,are forced into a difficult situation.Scholarships are the most significant fina... Education is the base of the survival and growth of any state,but due to resource scarcity,students,particularly at the university level,are forced into a difficult situation.Scholarships are the most significant financial aid mechanisms developed to overcome such obstacles and assist the students in continuing with their higher studies.In this study,the convoluted situation of scholarship eligibility criteria,including parental income,responsibilities,and academic achievements,is addressed.In an attempt to maximize the scholarship selection process,numerous machine learning algorithms,including Support Vector Machines,Neural Networks,K-Nearest Neighbors,and the C4.5 algorithm,were applied.The C4.5 algorithm,owing to its efficiency in the prediction of scholarship beneficiaries based on extraneous factors,was capable of predicting a phenomenal 95.62%of predictions using extensive data of a well-esteemed government sector university from Pakistan.This percentage is 4%and 15%better than the remainder of the methods tested,and it depicts the extent of the potential for the technique to enhance the scholarship selection process.The Decision Support Systems(DSS)would not only save the administrative cost but would also create a fair and transparent process in place.In a world where accessibility to education is the key,this research provides data-oriented consolidation to ensure that deserving students are helped and allowed to get the financial assistance that they need to reach higher studies and bridge the gap between the demands of the day and the institutions of intellect. 展开更多
关键词 EDUCATION data mining C4.5 algorithm decision support system scholarship guarantee machine learning
下载PDF
Malware Attacks Detection in IoT Using Recurrent Neural Network(RNN)
18
作者 Abeer Abdullah Alsadhan Abdullah A.Al-Atawi +3 位作者 Hanen karamti Abid Jameel Islam Zada Tan N.Nguyen 《Intelligent Automation & Soft Computing》 2024年第2期135-155,共21页
IoT(Internet of Things)devices are being used more and more in a variety of businesses and for a variety of tasks,such as environmental data collection in both civilian and military situations.They are a desirable att... IoT(Internet of Things)devices are being used more and more in a variety of businesses and for a variety of tasks,such as environmental data collection in both civilian and military situations.They are a desirable attack target for malware intended to infect specific IoT devices due to their growing use in a variety of applications and their increasing computational and processing power.In this study,we investigate the possibility of detecting IoT malware using recurrent neural networks(RNNs).RNNis used in the proposed method to investigate the execution operation codes of ARM-based Internet of Things apps(OpCodes).To train our algorithms,we employ a dataset of IoT applications that includes 281 malicious and 270 benign pieces of software.The trained model is then put to the test using 100 brand-new IoT malware samples across three separate LSTM settings.Model exposure was not previously conducted on these samples.Detecting newly crafted malware samples with 2-layer neurons had the highest accuracy(98.18%)in the 10-fold cross validation experiment.A comparison of the LSTMtechnique to other machine learning classifiers shows that it yields the best results. 展开更多
关键词 MALWARE malicious code code obfuscation IOT machine learning deep learning
下载PDF
The Role of Machine Learning and Deep Learning Approaches to Improve Optical Communication Systems
19
作者 Weam M. Binjumah 《Journal of Intelligent Learning Systems and Applications》 2024年第4期418-429,共12页
In recent years, there has been a revolution in the way that we transmit information through optical communication systems, allowing for fast and high-capacity data transmission using optical communication systems. Du... In recent years, there has been a revolution in the way that we transmit information through optical communication systems, allowing for fast and high-capacity data transmission using optical communication systems. Due to the growing demand for higher-capacity and faster networks, traditional optical communication systems are reaching their limits due to the increasing demand for faster and higher-capacity networks. The advent of machine learning and deep learning approaches has led to the emergence of powerful tools that can dramatically enhance the performance of optical communication systems with significant efficiency improvements. In this paper, we provide an overview of the role that machine learning (ML) and deep learning can play in enhancing the performance of various aspects of optical communication systems, including modulation techniques, channel modelling, equalization, and system optimization methods. The paper discusses the advantages of these approaches, such as improved spectral efficiency, reduced latency, and improved robustness to impairments in the channel, such as spectrum degradation. Additionally, a discussion is made regarding the potential challenges and limitations associated with using machine learning and deep learning in optical communication systems as well as their potential benefits. The purpose of this paper is to provide insight and highlight the potential of these approaches to improve optical communication in the future. 展开更多
关键词 Machine Learning Deep Learning Optical Communication Design Science Research Literature Review
下载PDF
Integration of Ideological and Political Education into the Probability Theory and Mathematical Statistics Course:A Teaching Design Based on Estimation and Hypothesis Testing
20
作者 Guangyu Li 《Journal of Contemporary Educational Research》 2024年第9期248-254,共7页
With the rapid development of higher education in China,colleges and universities are facing new challenges and impacts in talent training.Probability Theory and Mathematical Statistics is one of the important courses... With the rapid development of higher education in China,colleges and universities are facing new challenges and impacts in talent training.Probability Theory and Mathematical Statistics is one of the important courses in higher education for science and engineering majors and economics and management majors.Its critical role in cultivating students’thinking skills and improving their problem-solving skills is self-evident.Course ideological and political education construction is an important link in college talent training work.Combining ideological and political education with course teaching can help students establish correct value concepts and play a certain role in improving their comprehensive ability and quality.At present,the construction of ideological and political education in the Probability Theory and Mathematical Statistics course still faces some problems,mainly manifested in the lack of attention paid by teachers to course ideological and political education,insufficient exploitation of ideological and political elements,and the simplification of ideological and political education implementation methods.In order to comprehensively deepen the construction of course ideological and political education in line with the actual needs of Probability Theory and Mathematical Statistics course teaching,we should strengthen the construction of teacher teams,improve teachers’ability to carry out course ideological and political education,integrate educational resources,develop educational resources for ideological and political education,and innovate teaching methods to improve the overall effect of ideological and political education integration. 展开更多
关键词 Probability Theory and Mathematical Statistics Course education Teaching strategy
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部