期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification 被引量:1
1
作者 Noureen Talpur Said Jadid Abdulkadir +2 位作者 Mohd Hilmi Hasan Hitham Alhussian Ayed Alwadain 《Computers, Materials & Continua》 SCIE EI 2023年第3期5799-5820,共22页
Machine learning(ML)practices such as classification have played a very important role in classifying diseases in medical science.Since medical science is a sensitive field,the pre-processing of medical data requires ... Machine learning(ML)practices such as classification have played a very important role in classifying diseases in medical science.Since medical science is a sensitive field,the pre-processing of medical data requires careful handling to make quality clinical decisions.Generally,medical data is considered high-dimensional and complex data that contains many irrelevant and redundant features.These factors indirectly upset the disease prediction and classification accuracy of any ML model.To address this issue,various data pre-processing methods called Feature Selection(FS)techniques have been presented in the literature.However,the majority of such techniques frequently suffer from local minima issues due to large solution space.Thus,this study has proposed a novel wrapper-based Sand Cat SwarmOptimization(SCSO)technique as an FS approach to find optimum features from ten benchmark medical datasets.The SCSO algorithm replicates the hunting and searching strategies of the sand cat while having the advantage of avoiding local optima and finding the ideal solution with minimal control variables.Moreover,K-Nearest Neighbor(KNN)classifier was used to evaluate the effectiveness of the features identified by the proposed SCSO algorithm.The performance of the proposed SCSO algorithm was compared with six state-of-the-art and recent wrapper-based optimization algorithms using the validation metrics of classification accuracy,optimum feature size,and computational cost in seconds.The simulation results on the benchmark medical datasets revealed that the proposed SCSO-KNN approach has outperformed comparative algorithms with an average classification accuracy of 93.96%by selecting 14.2 features within 1.91 s.Additionally,the Wilcoxon rank test was used to perform the significance analysis between the proposed SCSOKNN method and six other algorithms for a p-value less than 5.00E-02.The findings revealed that the proposed algorithm produces better outcomes with an average p-value of 1.82E-02.Moreover,potential future directions are also suggested as a result of the study’s promising findings. 展开更多
关键词 Machine learning OPTIMIZATION feature selection CLASSIFICATION medical data
下载PDF
Enhanced Multi-Objective Grey Wolf Optimizer with Lévy Flight and Mutation Operators for Feature Selection
2
作者 Qasem Al-Tashi Tareq M Shami +9 位作者 Said Jadid Abdulkadir Emelia Akashah Patah Akhir Ayed Alwadain Hitham Alhussain Alawi Alqushaibi Helmi MD Rais Amgad Muneer Maliazurina B.Saad Jia Wu Seyedali Mirjalili 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1937-1966,共30页
The process of selecting features or reducing dimensionality can be viewed as a multi-objective minimization problem in which both the number of features and error rate must be minimized.While it is a multi-objective ... The process of selecting features or reducing dimensionality can be viewed as a multi-objective minimization problem in which both the number of features and error rate must be minimized.While it is a multi-objective problem,current methods tend to treat feature selection as a single-objective optimization task.This paper presents enhanced multi-objective grey wolf optimizer with Lévy flight and mutation phase(LMuMOGWO)for tackling feature selection problems.The proposed approach integrates two effective operators into the existing Multi-objective Grey Wolf optimizer(MOGWO):a Lévy flight and a mutation operator.The Lévy flight,a type of random walk with jump size determined by the Lévy distribution,enhances the global search capability of MOGWO,with the objective of maximizing classification accuracy while minimizing the number of selected features.The mutation operator is integrated to add more informative features that can assist in enhancing classification accuracy.As feature selection is a binary problem,the continuous search space is converted into a binary space using the sigmoid function.To evaluate the classification performance of the selected feature subset,the proposed approach employs a wrapper-based Artificial Neural Network(ANN).The effectiveness of the LMuMOGWO is validated on 12 conventional UCI benchmark datasets and compared with two existing variants of MOGWO,BMOGWO-S(based sigmoid),BMOGWO-V(based tanh)as well as Non-dominated Sorting Genetic Algorithm II(NSGA-II)and Multi-objective Particle Swarm Optimization(BMOPSO).The results demonstrate that the proposed LMuMOGWO approach is capable of successfully evolving and improving a set of randomly generated solutions for a given optimization problem.Moreover,the proposed approach outperforms existing approaches in most cases in terms of classification error rate,feature reduction,and computational cost. 展开更多
关键词 Feature selection multi-objective optimization grey wolf optimizer Lévy flight MUTATION classification
下载PDF
Secure Transmission of Compressed Medical Image Sequences on Communication Networks Using Motion Vector Watermarking
3
作者 Rafi Ullah Mohd Hilmi bin Hasan +1 位作者 Sultan Daud Khan Mussadiq Abdul Rahim 《Computers, Materials & Continua》 SCIE EI 2024年第3期3283-3301,共19页
Medical imaging plays a key role within modern hospital management systems for diagnostic purposes.Compression methodologies are extensively employed to mitigate storage demands and enhance transmission speed,all whil... Medical imaging plays a key role within modern hospital management systems for diagnostic purposes.Compression methodologies are extensively employed to mitigate storage demands and enhance transmission speed,all while upholding image quality.Moreover,an increasing number of hospitals are embracing cloud computing for patient data storage,necessitating meticulous scrutiny of server security and privacy protocols.Nevertheless,considering the widespread availability of multimedia tools,the preservation of digital data integrity surpasses the significance of compression alone.In response to this concern,we propose a secure storage and transmission solution for compressed medical image sequences,such as ultrasound images,utilizing a motion vector watermarking scheme.The watermark is generated employing an error-correcting code known as Bose-Chaudhuri-Hocquenghem(BCH)and is subsequently embedded into the compressed sequence via block-based motion vectors.In the process of watermark embedding,motion vectors are selected based on their magnitude and phase angle.When embedding watermarks,no specific spatial area,such as a region of interest(ROI),is used in the images.The embedding of watermark bits is dependent on motion vectors.Although reversible watermarking allows the restoration of the original image sequences,we use the irreversible watermarking method.The reason for this is that the use of reversible watermarks may impede the claims of ownership and legal rights.The restoration of original data or images may call into question ownership or other legal claims.The peak signal-to-noise ratio(PSNR)and structural similarity index(SSIM)serve as metrics for evaluating the watermarked image quality.Across all images,the PSNR value exceeds 46 dB,and the SSIM value exceeds 0.92.Experimental results substantiate the efficacy of the proposed technique in preserving data integrity. 展开更多
关键词 Block matching algorithm(BMA) compression full-search algorithm motion vectors ultrasound image sequence WATERMARKING
下载PDF
MCBAN: A Small Object Detection Multi-Convolutional Block Attention Network
4
作者 Hina Bhanbhro Yew Kwang Hooi +2 位作者 Mohammad Nordin Bin Zakaria Worapan Kusakunniran Zaira Hassan Amur 《Computers, Materials & Continua》 SCIE EI 2024年第11期2243-2259,共17页
Object detection has made a significant leap forward in recent years.However,the detection of small objects continues to be a great difficulty for various reasons,such as they have a very small size and they are susce... Object detection has made a significant leap forward in recent years.However,the detection of small objects continues to be a great difficulty for various reasons,such as they have a very small size and they are susceptible to missed detection due to background noise.Additionally,small object information is affected due to the downsampling operations.Deep learning-based detection methods have been utilized to address the challenge posed by small objects.In this work,we propose a novel method,the Multi-Convolutional Block Attention Network(MCBAN),to increase the detection accuracy of minute objects aiming to overcome the challenge of information loss during the downsampling process.The multi-convolutional attention block(MCAB);channel attention and spatial attention module(SAM)that make up MCAB,have been crafted to accomplish small object detection with higher precision.We have carried out the experiments on the Karlsruhe Institute of Technology and Toyota Technological Institute(KITTI)and Pattern Analysis,Statical Modeling and Computational Learning(PASCAL)Visual Object Classes(VOC)datasets and have followed a step-wise process to analyze the results.These experiment results demonstrate that significant gains in performance are achieved,such as 97.75%for KITTI and 88.97%for PASCAL VOC.The findings of this study assert quite unequivocally the fact that MCBAN is much more efficient in the small object detection domain as compared to other existing approaches. 展开更多
关键词 Multi-convolutional channel attention spatial attention YOLO
下载PDF
Context and Machine Learning Based Trust Management Framework for Internet of Vehicles 被引量:1
5
作者 Abdul Rehman Mohd Fadzil Hassan +4 位作者 Yew Kwang Hooi Muhammad Aasim Qureshi Tran Duc Chung Rehan Akbar Sohail Safdar 《Computers, Materials & Continua》 SCIE EI 2021年第9期4125-4142,共18页
Trust is one of the core components of any ad hoc network security system.Trust management(TM)has always been a challenging issue in a vehicular network.One such developing network is the Internet of vehicles(IoV),whi... Trust is one of the core components of any ad hoc network security system.Trust management(TM)has always been a challenging issue in a vehicular network.One such developing network is the Internet of vehicles(IoV),which is expected to be an essential part of smart cities.IoV originated from the merger of Vehicular ad hoc networks(VANET)and the Internet of things(IoT).Security is one of the main barriers in the on-road IoV implementation.Existing security standards are insufficient to meet the extremely dynamic and rapidly changing IoV requirements.Trust plays a vital role in ensuring security,especially during vehicle to vehicle communication.Vehicular networks,having a unique nature among other wireless ad hoc networks,require dedicated efforts to develop trust protocols.Current TM schemes are inflexible and static.Predefined scenarios and limited parameters are the basis for existing TM models that are not suitable for vehicle networks.The vehicular network requires agile and adaptive solutions to ensure security,especially when it comes to critical messages.The vehicle network’s wireless nature increases its attack surface and exposes the network to numerous security threats.Moreover,internet involvement makes it more vulnerable to cyberattacks.The proposed TM framework is based on context-based cognition and machine learning to be best suited to IoV dynamics.Machine learning is the best solution to utilize the big data produced by vehicle sensors.To handle the uncertainty Bayesian machine learning statistical model is used.The proposed framework can adapt scenarios dynamically and infer using the maximum possible parameter available.The results indicated better performance than existing TM methods.Furthermore,for future work,a high-level machine learning model is proposed. 展开更多
关键词 Internet of vehicles(IoV) trust management(TM) vehicular ad hoc network(VANET) machine learning context awareness bayesian learning
下载PDF
Counting and Randomly Generating <i>k</i>-Ary Trees
6
作者 James F. Korsh 《Applied Mathematics》 2021年第12期1210-1215,共6页
<em>k</em>-ary trees are one of the most basic data structures in Computer Science. A new method is presented to determine how many there are with n nodes. This method gives additional insight into their s... <em>k</em>-ary trees are one of the most basic data structures in Computer Science. A new method is presented to determine how many there are with n nodes. This method gives additional insight into their structure and provides a new algo-rithm to efficiently generate such a tree randomly. 展开更多
关键词 Combinatorial Problems k-Ary Trees Random Generation
下载PDF
Transfer Learning-Based Semi-Supervised Generative Adversarial Network for Malaria Classification
7
作者 Ibrar Amin Saima Hassan +1 位作者 Samir Brahim Belhaouari Muhammad Hamza Azam 《Computers, Materials & Continua》 SCIE EI 2023年第3期6335-6349,共15页
Malaria is a lethal disease responsible for thousands of deaths worldwide every year.Manual methods of malaria diagnosis are timeconsuming that require a great deal of human expertise and efforts.Computerbased automat... Malaria is a lethal disease responsible for thousands of deaths worldwide every year.Manual methods of malaria diagnosis are timeconsuming that require a great deal of human expertise and efforts.Computerbased automated diagnosis of diseases is progressively becoming popular.Although deep learning models show high performance in the medical field,it demands a large volume of data for training which is hard to acquire for medical problems.Similarly,labeling of medical images can be done with the help of medical experts only.Several recent studies have utilized deep learning models to develop efficient malaria diagnostic system,which showed promising results.However,the most common problem with these models is that they need a large amount of data for training.This paper presents a computer-aided malaria diagnosis system that combines a semi-supervised generative adversarial network and transfer learning.The proposed model is trained in a semi-supervised manner and requires less training data than conventional deep learning models.Performance of the proposed model is evaluated on a publicly available dataset of blood smear images(with malariainfected and normal class)and achieved a classification accuracy of 96.6%. 展开更多
关键词 Generative adversarial network transfer learning SEMI-SUPERVISED MALARIA VGG16
下载PDF
A Novel Auto-Annotation Technique for Aspect Level Sentiment Analysis 被引量:1
8
作者 Muhammad Aasim Qureshi Muhammad Asif +4 位作者 Mohd Fadzil Hassan Ghulam Mustafa Muhammad Khurram Ehsan Aasim Ali Unaza Sajid 《Computers, Materials & Continua》 SCIE EI 2022年第3期4987-5004,共18页
In machine learning,sentiment analysis is a technique to find and analyze the sentiments hidden in the text.For sentiment analysis,annotated data is a basic requirement.Generally,this data is manually annotated.Manual... In machine learning,sentiment analysis is a technique to find and analyze the sentiments hidden in the text.For sentiment analysis,annotated data is a basic requirement.Generally,this data is manually annotated.Manual annotation is time consuming,costly and laborious process.To overcome these resource constraints this research has proposed a fully automated annotation technique for aspect level sentiment analysis.Dataset is created from the reviews of ten most popular songs on YouTube.Reviews of five aspects—voice,video,music,lyrics and song,are extracted.An N-Gram based technique is proposed.Complete dataset consists of 369436 reviews that took 173.53 s to annotate using the proposed technique while this dataset might have taken approximately 2.07 million seconds(575 h)if it was annotated manually.For the validation of the proposed technique,a sub-dataset—Voice,is annotated manually as well as with the proposed technique.Cohen’s Kappa statistics is used to evaluate the degree of agreement between the two annotations.The high Kappa value(i.e.,0.9571%)shows the high level of agreement between the two.This validates that the quality of annotation of the proposed technique is as good as manual annotation even with far less computational cost.This research also contributes in consolidating the guidelines for the manual annotation process. 展开更多
关键词 Machine learning natural language processing ANNOTATION semi-annotated technique reviews annotation text annotation corpus annotation
下载PDF
Generalized Model of Blood Flow in a Vertical Tube with Suspension of Gold Nanomaterials: Applications in the Cancer Therapy
9
作者 Anees Imtiaz Oi-Mean Foong +3 位作者 Aamina Aamina Nabeel Khan Farhad Ali Ilyas Khan 《Computers, Materials & Continua》 SCIE EI 2020年第10期171-192,共22页
Gold metallic nanoparticles are generally used within a lab as a tracer,to uncover on the presence of specific proteins or DNA in a sample,as well as for the recognition of various antibiotics.They are bio companionab... Gold metallic nanoparticles are generally used within a lab as a tracer,to uncover on the presence of specific proteins or DNA in a sample,as well as for the recognition of various antibiotics.They are bio companionable and have properties to carry thermal energy to tumor cells by utilizing different clinical approaches.As the cancer cells are very smaller so for the infiltration,the properly sized nanoparticles have been injected in the blood.For this reason,gold nanoparticles are very effective.Keeping in mind the above applications,in the present work a generalized model of blood flow containing gold nanoparticles is considered in this work.The blood motion is considered in a cylindrical tube under the oscillating pressure gradient and magnetic field.The problem formulation is done using two types of fractional approaches namely CF(Caputo Fabrizio)and AB(Atangana-Baleanue)derivatives,whereas blood is considered as a counter-example of Casson fluid.Exact solutions of the problem are obtained using joint Laplace and Hankel transforms,and a comparative analysis is made between CF and AB.Results are computed in tables and shown in various plots for embedded parameters and discussed.It is found that adding 0.04-unit gold nanoparticles to blood,increase its heat transfer rate by 4 percent compared to regular blood.It is also noted that the heat transfer can be enhanced in the blood with memory. 展开更多
关键词 Gold nanoparticles heat transfer enhancement blood flow Casson fluid AB CF fractional derivatives
下载PDF
Hyper-Parameter Optimization of Semi-Supervised GANs Based-Sine Cosine Algorithm for Multimedia Datasets
10
作者 Anas Al-Ragehi Said Jadid Abdulkadir +2 位作者 Amgad Muneer Safwan Sadeq Qasem Al-Tashi 《Computers, Materials & Continua》 SCIE EI 2022年第10期2169-2186,共18页
Generative Adversarial Networks(GANs)are neural networks that allow models to learn deep representations without requiring a large amount of training data.Semi-Supervised GAN Classifiers are a recent innovation in GAN... Generative Adversarial Networks(GANs)are neural networks that allow models to learn deep representations without requiring a large amount of training data.Semi-Supervised GAN Classifiers are a recent innovation in GANs,where GANs are used to classify generated images into real and fake and multiple classes,similar to a general multi-class classifier.However,GANs have a sophisticated design that can be challenging to train.This is because obtaining the proper set of parameters for all models-generator,discriminator,and classifier is complex.As a result,training a single GAN model for different datasets may not produce satisfactory results.Therefore,this study proposes an SGAN model(Semi-Supervised GAN Classifier).First,a baseline model was constructed.The model was then enhanced by leveraging the Sine-Cosine Algorithm and Synthetic Minority Oversampling Technique(SMOTE).SMOTE was used to address class imbalances in the dataset,while Sine Cosine Algorithm(SCA)was used to optimize the weights of the classifier models.The optimal set of hyperparameters(learning rate and batch size)were obtained using grid manual search.Four well-known benchmark datasets and a set of evaluation measures were used to validate the proposed model.The proposed method was then compared against existing models,and the results on each dataset were recorded and demonstrated the effectiveness of the proposed model.The proposed model successfully showed improved test accuracy scores of 1%,2%,15%,and 5%on benchmarking multimedia datasets;Modified National Institute of Standards and Technology(MNIST)digits,Fashion MNIST,Pneumonia Chest X-ray,and Facial Emotion Detection Dataset,respectively. 展开更多
关键词 Generative adversarial networks semi-supervised generative adversarial network sine-cosine algorithm SMOTE principal component analysis grid search
下载PDF
Towards Auction-Based HPC Computing in the Cloud
11
作者 Moussa Taifi Justin Y. Shi Abdallah Khreishah 《Computer Technology and Application》 2012年第7期499-509,共11页
Cloud computing is expanding widely in the world of IT infrastructure. This is due partly to the cost-saving effect of economies of scale. Fair market conditions can in theory provide a healthy environment to reflect ... Cloud computing is expanding widely in the world of IT infrastructure. This is due partly to the cost-saving effect of economies of scale. Fair market conditions can in theory provide a healthy environment to reflect the most reasonable costs of computations. While fixed cloud pricing provides an attractive low entry barrier for compute-intensive applications, both the consumer and supplier of computing resources can see high efficiency for their investments by participating in auction-based exchanges. There are huge incentives for the cloud provider to offer auctioned resources. However, from the consumer perspective, using these resources is a sparsely discussed challenge. This paper reports a methodology and framework designed to address the challenges of using HPC (High Performance Computing) applications on auction-based cloud clusters. The authors focus on HPC applications and describe a method for determining bid-aware checkpointing intervals. They extend a theoretical model for determining checkpoint intervals using statistical analysis of pricing histories. Also the latest developments in the SpotHPC framework are introduced which aim at facilitating the managed execution of real MPI applications on auction-based cloud environments. The authors use their model to simulate a set of algorithms with different computing and communication densities. The results show the complex interactions between optimal bidding strategies and parallel applications performance. 展开更多
关键词 Auction-based cloud computing fault tolerance cloud HPC (high performance computing)
下载PDF
Effect of the Spin-Orbit Interaction (Heisenberg XYZ Model) on Partial Entangled Quantum Network
12
作者 Abdel-Haleem Abdel-Aty Nordin Zakaria +1 位作者 Lee Yen Cheong Nasser Metwally 《Journal of Quantum Information Science》 2014年第1期1-17,共17页
Dzyaloshiniskii-Moriya (DM) interaction in three directions (Dx, Dy and Dz) is used to generate entangled network from partially entangled states in the presence of the spin-orbit coupling. The effect of the spin coup... Dzyaloshiniskii-Moriya (DM) interaction in three directions (Dx, Dy and Dz) is used to generate entangled network from partially entangled states in the presence of the spin-orbit coupling. The effect of the spin coupling on the entanglement between any two nodes of the network is investigated. The entanglement is quantified using Woottores concurrence method. It is shown that the entanglement decays as the coupling increases. For larger values of the spin coupling, the entanglement oscillates within finite bounds. For the initially entangled channels, the upper bound does not exceed its initial value, whereas the entanglement reaches its maximum value for the channels generated via indirect interaction. 展开更多
关键词 Quantum Network ENTANGLEMENT SPIN-ORBIT Interaction
下载PDF
Aspect-Oriented Modeling and Verification with Finite State Machines
13
作者 徐殿祥 Omar El-Ariss +1 位作者 许巍峰 王林章 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第5期949-961,共13页
Aspect-oriented programming modularizes crosscutting concerns into aspects with the advice invoked at the specified points of program execution. Aspects can be used in a harmful way that invalidates desired properties... Aspect-oriented programming modularizes crosscutting concerns into aspects with the advice invoked at the specified points of program execution. Aspects can be used in a harmful way that invalidates desired properties and even destroys the conceptual integrity of programs. To assure the quality of an aspect-oriented system, rigorous analysis and design of aspects are highly desirable. In this paper, we present an approach to aspect-oriented modeling and verification with finite state machines. Our approach provides explicit notations (e.g., pointcut, advice and aspect) for capturing crosscutting concerns and incremental modification requirements with respect to class state models. For verification purposes, we compose the aspect models and class models in an aspect-oriented model through a weaving mechanism. Then we transform the woven models and the class models not affected by the aspects into FSP (Finite State Processes), which are to be checked by the LTSA (Labeled Transition System Analyzer) model checker against the desired system properties. We have applied our approach to the modeling and verification of three aspect-oriented systems. To further evaluate the effectiveness of verification, we created a large number of flawed aspect models and verified them against the system requirements. The results show that the verification has revealed all flawed models. This indicates that our approach is effective in quality assurance of aspect-oriented state models. As such, our approach can be used for model-checking state-based specification of aspect-oriented design and can uncover some system design problems before the system is implemented. 展开更多
关键词 aspect-oriented modeling finite state machines MODELING VERIFICATION model checking
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部