期刊文献+
共找到74篇文章
< 1 2 4 >
每页显示 20 50 100
Digital Text Document Watermarking Based Tampering Attack Detection via Internet
1
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 fahd n.al-wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 2024年第3期759-771,共13页
Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentica... Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentication,and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors’difficulties were tampering detection,authentication,and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection(ADMDTW-TAD)via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document’s appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document,it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes,and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models. 展开更多
关键词 Content authentication tampering attacks detection model SECURITY digital watermarking
下载PDF
A Hybrid Intelligent Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet 被引量:10
2
作者 fahd n.al-wesabi 《Computers, Materials & Continua》 SCIE EI 2021年第1期195-211,共17页
In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authenticati... In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authentication and tampering detection of Arabic text contents.The proposed approach known as Second order of Alphanumeric Mechanism of Markov model and Zero-Watermarking Approach(SAMMZWA).Second level order of alphanumeric mechanism based on hidden Markov model is integrated with text zero-watermarking techniques to improve the overall performance and tampering detection accuracy of the proposed approach.The SAMMZWA approach embeds and detects the watermark logically without altering the original text document.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SAMMZWA has been implemented and validated with attacked Arabic text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods. 展开更多
关键词 HMM NLP text analysis ZERO-WATERMARKING tampering detection
下载PDF
A Smart English Text Zero-Watermarking Approach Based on Third-Level Order and Word Mechanism of Markov Model 被引量:9
3
作者 fahd n.al-wesabi 《Computers, Materials & Continua》 SCIE EI 2020年第11期1137-1156,共20页
Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researche... Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researchers encounter.Content authentication and tampering detection of digital contents have become a major concern in the area of communication and information exchange via the Internet.In this paper,an intelligent text Zero-Watermarking approach SETZWMWMM(Smart English Text Zero-Watermarking Approach Based on Mid-Level Order and Word Mechanism of Markov Model)has been proposed for the content authentication and tampering detection of English text contents.The SETZWMWMM approach embeds and detects the watermark logically without altering the original English text document.Based on Hidden Markov Model(HMM),Third level order of word mechanism is used to analyze the interrelationship between contexts of given English texts.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SETZWMWMM has been implemented and validated with attacked English text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive and efficient for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods. 展开更多
关键词 Content authentication hidden Markov model ZERO-WATERMARKING NLP tampering detection.
下载PDF
Federated Learning with Blockchain Assisted Image Classification for Clustered UAV Networks 被引量:4
4
作者 Ibrahim Abunadi Maha M.Althobaiti +5 位作者 fahd n.al-wesabi Anwer Mustafa Hilal Mohammad Medani Manar Ahmed Hamza Mohammed Rizwanullah Abu Serwar Zamani 《Computers, Materials & Continua》 SCIE EI 2022年第7期1195-1212,共18页
The evolving“Industry 4.0”domain encompasses a collection of future industrial developments with cyber-physical systems(CPS),Internet of things(IoT),big data,cloud computing,etc.Besides,the industrial Internet of th... The evolving“Industry 4.0”domain encompasses a collection of future industrial developments with cyber-physical systems(CPS),Internet of things(IoT),big data,cloud computing,etc.Besides,the industrial Internet of things(IIoT)directs data from systems for monitoring and controlling the physical world to the data processing system.A major novelty of the IIoT is the unmanned aerial vehicles(UAVs),which are treated as an efficient remote sensing technique to gather data from large regions.UAVs are commonly employed in the industrial sector to solve several issues and help decision making.But the strict regulations leading to data privacy possibly hinder data sharing across autonomous UAVs.Federated learning(FL)becomes a recent advancement of machine learning(ML)which aims to protect user data.In this aspect,this study designs federated learning with blockchain assisted image classification model for clustered UAV networks(FLBIC-CUAV)on IIoT environment.The proposed FLBIC-CUAV technique involves three major processes namely clustering,blockchain enabled secure communication and FL based image classification.For UAV cluster construction process,beetle swarm optimization(BSO)algorithm with three input parameters is designed to cluster the UAVs for effective communication.In addition,blockchain enabled secure data transmission process take place to transmit the data from UAVs to cloud servers.Finally,the cloud server uses an FL with Residual Network model to carry out the image classification process.A wide range of simulation analyses takes place for ensuring the betterment of the FLBIC-CUAV approach.The experimental outcomes portrayed the betterment of the FLBIC-CUAV approach over the recent state of art methods. 展开更多
关键词 UAV networks CLUSTERING secure communication blockchain federated learning image classification
下载PDF
Feature Selection with Optimal Stacked Sparse Autoencoder for Data Mining 被引量:4
5
作者 Manar Ahmed Hamza Siwar Ben Haj Hassine +5 位作者 Ibrahim Abunadi fahd n.al-wesabi Hadeel Alsolai Anwer Mustafa Hilal Ishfaq Yaseen Abdelwahed Motwakel 《Computers, Materials & Continua》 SCIE EI 2022年第8期2581-2596,共16页
Data mining in the educational field can be used to optimize the teaching and learning performance among the students.The recently developed machine learning(ML)and deep learning(DL)approaches can be utilized to mine ... Data mining in the educational field can be used to optimize the teaching and learning performance among the students.The recently developed machine learning(ML)and deep learning(DL)approaches can be utilized to mine the data effectively.This study proposes an Improved Sailfish Optimizer-based Feature SelectionwithOptimal Stacked Sparse Autoencoder(ISOFS-OSSAE)for data mining and pattern recognition in the educational sector.The proposed ISOFS-OSSAE model aims to mine the educational data and derive decisions based on the feature selection and classification process.Moreover,the ISOFS-OSSAEmodel involves the design of the ISOFS technique to choose an optimal subset of features.Moreover,the swallow swarm optimization(SSO)with the SSAE model is derived to perform the classification process.To showcase the enhanced outcomes of the ISOFSOSSAE model,a wide range of experiments were taken place on a benchmark dataset from the University of California Irvine(UCI)Machine Learning Repository.The simulation results pointed out the improved classification performance of the ISOFS-OSSAE model over the recent state of art approaches interms of different performance measures. 展开更多
关键词 Data mining pattern recognition feature selection data classification SSAE model
下载PDF
Entropy-Based Watermarking Approach for Sensitive Tamper Detection of Arabic Text 被引量:4
6
作者 fahd n.al-wesabi 《Computers, Materials & Continua》 SCIE EI 2021年第6期3635-3648,共14页
The digital text media is the most common media transferred via the internet for various purposes and is very sensitive to transfer online with the possibility to be tampered illegally by the tampering attacks.Therefo... The digital text media is the most common media transferred via the internet for various purposes and is very sensitive to transfer online with the possibility to be tampered illegally by the tampering attacks.Therefore,improving the security and authenticity of the text when it is transferred via the internet has become one of the most difcult challenges that researchers face today.Arabic text is more sensitive than other languages due to Harakat’s existence in Arabic diacritics such as Kasra,and Damma in which making basic changes such as modifying diacritic arrangements can lead to change the text meaning.In this paper,an intelligent hybrid solution is proposed with highly sensitive detection for any tampering on Arabic text exchanged via the internet.Natural language processing,entropy,and watermarking techniques have been integrated into this method to improve the security and reliability of Arabic text without limitations in text nature or size,and type or volumes of tampering attack.The proposed scheme is implemented,simulated,and validated using four standard Arabic datasets of varying lengths under multiple random locations of insertion,reorder,and deletion attacks.The experimental and simulation results prove the accuracy of tampering detection of the proposed scheme against all kinds of tampering attacks.Comparison results show that the proposed approach outperforms all of the other baseline approaches in terms of tampering detection accuracy. 展开更多
关键词 ENTROPY text features tamper detection arabic text NLP
下载PDF
Modeling of Artificial Intelligence Based Traffic Flow Prediction with Weather Conditions 被引量:3
7
作者 Mesfer Al Duhayyim Amani Abdulrahman Albraikan +5 位作者 fahd n.al-wesabi Hiba M.Burbur Mohammad Alamgeer Anwer Mustafa Hilal Manar Ahmed Hamza Mohammed Rizwanullah 《Computers, Materials & Continua》 SCIE EI 2022年第5期3953-3968,共16页
Short-term traffic flow prediction (TFP) is an important area inintelligent transportation system (ITS), which is used to reduce traffic congestion. But the avail of traffic flow data with temporal features and period... Short-term traffic flow prediction (TFP) is an important area inintelligent transportation system (ITS), which is used to reduce traffic congestion. But the avail of traffic flow data with temporal features and periodicfeatures are susceptible to weather conditions, making TFP a challengingissue. TFP process are significantly influenced by several factors like accidentand weather. Particularly, the inclement weather conditions may have anextreme impact on travel time and traffic flow. Since most of the existing TFPtechniques do not consider the impact of weather conditions on the TF, it isneeded to develop effective TFP with the consideration of extreme weatherconditions. In this view, this paper designs an artificial intelligence based TFPwith weather conditions (AITFP-WC) for smart cities. The goal of the AITFPWC model is to enhance the performance of the TFP model with the inclusionof weather related conditions. The proposed AITFP-WC technique includesElman neural network (ENN) model to predict the flow of traffic in smartcities. Besides, tunicate swarm algorithm with feed forward neural networks(TSA-FFNN) model is employed for the weather and periodicity analysis. Atlast, a fusion of TFP and WPA processes takes place using the FFNN modelto determine the final prediction output. In order to assess the enhancedpredictive outcome of the AITFP-WC model, an extensive simulation analysisis carried out. The experimental values highlighted the enhanced performanceof the AITFP-WC technique over the recent state of art methods. 展开更多
关键词 Smart cities artificial intelligence urban transportation deep learning weather condition TFP
下载PDF
Artificial Intelligence Enabled Apple Leaf Disease Classification for Precision Agriculture 被引量:3
8
作者 fahd n.al-wesabi Amani Abdulrahman Albraikan +3 位作者 Anwer Mustafa Hilal Majdy M.Eltahir Manar Ahmed Hamza Abu Sarwar Zamani 《Computers, Materials & Continua》 SCIE EI 2022年第3期6223-6238,共16页
Precision agriculture enables the recent technological advancements in farming sector to observe,measure,and analyze the requirements of individual fields and crops.The recent developments of computer vision and artif... Precision agriculture enables the recent technological advancements in farming sector to observe,measure,and analyze the requirements of individual fields and crops.The recent developments of computer vision and artificial intelligence(AI)techniques find a way for effective detection of plants,diseases,weeds,pests,etc.On the other hand,the detection of plant diseases,particularly apple leaf diseases using AI techniques can improve productivity and reduce crop loss.Besides,earlier and precise apple leaf disease detection can minimize the spread of the disease.Earlier works make use of traditional image processing techniques which cannot assure high detection rate on apple leaf diseases.With this motivation,this paper introduces a novel AI enabled apple leaf disease classification(AIE-ALDC)technique for precision agriculture.The proposed AIE-ALDC technique involves orientation based data augmentation and Gaussian filtering based noise removal processes.In addition,the AIE-ALDC technique includes a Capsule Network(CapsNet)based feature extractor to generate a helpful set of feature vectors.Moreover,water wave optimization(WWO)technique is employed as a hyperparameter optimizer of the CapsNet model.Finally,bidirectional long short term memory(BiLSTM)model is used as a classifier to determine the appropriate class labels of the apple leaf images.The design of AIE-ALDC technique incorporating theWWO based CapsNetmodel with BiLSTM classifier shows the novelty of the work.Awide range of experiments was performed to showcase the supremacy of the AIE-ALDC technique.The experimental results demonstrate the promising performance of the AIEALDC technique over the recent state of art methods. 展开更多
关键词 Artificial intelligence apple leaf plant disease precision agriculture deep learning data augmentation
下载PDF
Energy Aware Data Collection with Route Planning for 6G Enabled UAV Communication 被引量:2
9
作者 Mesfer Al Duhayyim Marwa Obayya +3 位作者 fahd n.al-wesabi Anwer Mustafa Hilal Mohammed Rizwanullah Majdy M.Eltahir 《Computers, Materials & Continua》 SCIE EI 2022年第4期825-842,共18页
With technological advancements in 6G and Internet of Things(IoT), the incorporation of Unmanned Aerial Vehicles (UAVs) and cellularnetworks has become a hot research topic. At present, the proficient evolution of 6G ... With technological advancements in 6G and Internet of Things(IoT), the incorporation of Unmanned Aerial Vehicles (UAVs) and cellularnetworks has become a hot research topic. At present, the proficient evolution of 6G networks allows the UAVs to offer cost-effective and timelysolutions for real-time applications such as medicine, tracking, surveillance,etc. Energy efficiency, data collection, and route planning are crucial processesto improve the network communication. These processes are highly difficultowing to high mobility, presence of non-stationary links, dynamic topology,and energy-restricted UAVs. With this motivation, the current research paperpresents a novel Energy Aware Data Collection with Routing Planning for6G-enabled UAV communication (EADCRP-6G) technique. The goal of theproposed EADCRP-6G technique is to conduct energy-efficient cluster-baseddata collection and optimal route planning for 6G-enabled UAV networks.EADCRP-6G technique deploys Improved Red Deer Algorithm-based Clustering (IRDAC) technique to elect an optimal set of Cluster Heads (CH) andorganize these clusters. Besides, Artificial Fish Swarm-based Route Planning(AFSRP) technique is applied to choose an optimum set of routes for UAVcommunication in 6G networks. In order to validated whether the proposedEADCRP-6G technique enhances the performance, a series of simulationswas performed and the outcomes were investigated under different dimensions.The experimental results showcase that the proposed model outperformed allother existing models under different evaluation parameters. 展开更多
关键词 Unmanned aerial vehicle 6G networks artificial intelligence energy efficiency CLUSTERING route planning data collection metaheuristics
下载PDF
A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship 被引量:3
10
作者 fahd n.al-wesabi Saleh Alzahrani +3 位作者 Fuad Alyarimi Mohammed Abdul nadhem nemri Mohammed M.Almazah 《Computer Systems Science & Engineering》 SCIE EI 2021年第6期297-311,共15页
In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The thir... In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The third gram of alphanumeric of the Markov model has been used with text-watermarking technologies to improve the performance and accuracy of tampering detection issues which are limited by the existing works reviewed in the literature of this study.The third-grade level of the Markov model has been used in this method as natural language processing technology to analyze an English text and extract the textual characteristics of the given contexts.Moreover,the extracted features have been utilized as watermark information and then validated with the attacked English text to detect any suspected tampering occurred on it.The embedding mechanism of CAZWNLP method will be achieved logically without effects or modifying the original text document to embed a watermark key.CAZWNLP has been implemented using VS code IDE with PHP.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach. 展开更多
关键词 NLP text analysis English text watermarking ROBUSTNESS tampering detection
下载PDF
Artificial Intelligence Based Prostate Cancer Classification Model Using Biomedical Images 被引量:2
11
作者 Areej A.Malibari Reem Alshahrani +3 位作者 fahd n.al-wesabi Siwar Ben Haj Hassine Mimouna Abdullah Alkhonaini Anwer Mustafa Hilal 《Computers, Materials & Continua》 SCIE EI 2022年第8期3799-3813,共15页
Medical image processing becomes a hot research topic in healthcare sector for effective decision making and diagnoses of diseases.Magnetic resonance imaging(MRI)is a widely utilized tool for the classification and de... Medical image processing becomes a hot research topic in healthcare sector for effective decision making and diagnoses of diseases.Magnetic resonance imaging(MRI)is a widely utilized tool for the classification and detection of prostate cancer.Since the manual screening process of prostate cancer is difficult,automated diagnostic methods become essential.This study develops a novel Deep Learning based Prostate Cancer Classification(DTL-PSCC)model using MRI images.The presented DTL-PSCC technique encompasses EfficientNet based feature extractor for the generation of a set of feature vectors.In addition,the fuzzy k-nearest neighbour(FKNN)model is utilized for classification process where the class labels are allotted to the input MRI images.Moreover,the membership value of the FKNN model can be optimally tuned by the use of krill herd algorithm(KHA)which results in improved classification performance.In order to demonstrate the good classification outcome of the DTL-PSCC technique,a wide range of simulations take place on benchmark MRI datasets.The extensive comparative results ensured the betterment of the DTL-PSCC technique over the recent methods with the maximum accuracy of 85.09%. 展开更多
关键词 MRI images prostate cancer deep learning medical image processing metaheuristics krill herd algorithm
下载PDF
Automated Multi-Document Biomedical Text Summarization Using Deep Learning Model 被引量:2
12
作者 Ahmed S.Almasoud Siwar Ben Haj Hassine +5 位作者 fahd n.al-wesabi Mohamed K.nour Anwer Mustafa Hilal Mesfer Al Duhayyim Manar Ahmed Hamza Abdelwahed Motwakel 《Computers, Materials & Continua》 SCIE EI 2022年第6期5799-5815,共17页
Due to the advanced developments of the Internet and information technologies,a massive quantity of electronic data in the biomedical sector has been exponentially increased.To handle the huge amount of biomedical dat... Due to the advanced developments of the Internet and information technologies,a massive quantity of electronic data in the biomedical sector has been exponentially increased.To handle the huge amount of biomedical data,automated multi-document biomedical text summarization becomes an effective and robust approach of accessing the increased amount of technical and medical literature in the biomedical sector through the summarization of multiple source documents by retaining the significantly informative data.So,multi-document biomedical text summarization acts as a vital role to alleviate the issue of accessing precise and updated information.This paper presents a Deep Learning based Attention Long Short Term Memory(DLALSTM)Model for Multi-document Biomedical Text Summarization.The proposed DL-ALSTM model initially performs data preprocessing to convert the available medical data into a compatible format for further processing.Then,the DL-ALSTM model gets executed to summarize the contents from the multiple biomedical documents.In order to tune the summarization performance of the DL-ALSTM model,chaotic glowworm swarm optimization(CGSO)algorithm is employed.Extensive experimentation analysis is performed to ensure the betterment of the DL-ALSTM model and the results are investigated using the PubMed dataset.Comprehensive comparative result analysis is carried out to showcase the efficiency of the proposed DL-ALSTM model with the recently presented models. 展开更多
关键词 BIOMEDICAL text summarization healthcare deep learning lstm parameter tuning
下载PDF
Detection of Lung Tumor Using ASPP-Unet with Whale Optimization Algorithm 被引量:2
13
作者 Mimouna Abdullah Alkhonaini Siwar Ben Haj Hassine +5 位作者 Marwa Obayya fahd n.al-wesabi Anwer Mustafa Hilal Manar Ahmed Hamza Abdelwahed Motwakel Mesfer Al Duhayyim 《Computers, Materials & Continua》 SCIE EI 2022年第8期3511-3527,共17页
The unstructured growth of abnormal cells in the lung tissue creates tumor.The early detection of lung tumor helps the patients avoiding the death rate and gives better treatment.Various medical image modalities can h... The unstructured growth of abnormal cells in the lung tissue creates tumor.The early detection of lung tumor helps the patients avoiding the death rate and gives better treatment.Various medical image modalities can help the physicians in the diagnosis of disease.Many research works have been proposed for the early detection of lung tumor.High computation time and misidentification of tumor are the prevailing issues.In order to overcome these issues,this paper has proposed a hybrid classifier of Atrous Spatial Pyramid Pooling(ASPP)-Unet architecture withWhale Optimization Algorithm(ASPP-Unet-WOA).To get a fine tuning detection of tumor in the Computed Tomography(CT)of lung image,this model needs pre-processing using Gabor filter.Secondly,feature segmentation is done using Guaranteed Convergence Particle Swarm Optimization.Thirdly,feature selection is done using Binary Grasshopper Optimization Algorithm.This proposed(ASPPUnet-WOA)is implemented in the dataset of National Cancer Institute(NCI)Lung Cancer Database Consortium.Various performance metric measures are evaluated and compared to the existing classifiers.The accuracy of Deep Convolutional Neural Network(DCNN)is 93.45%,Convolutional Neural Network(CNN)is 91.67%,UNet obtains 95.75%and ASPP-UNet-WOA obtains 98.68%.compared to the other techniques. 展开更多
关键词 CLASSIFIER whale optimization ASPP-unet gabor filter lung tumor
下载PDF
Optimized Stacked Autoencoder for IoT Enabled Financial Crisis Prediction Model 被引量:2
14
作者 Mesfer Al Duhayyim Hadeel Alsolai +5 位作者 fahd n.al-wesabi nadhem nemri Hany Mahgoub Anwer Mustafa Hilal Manar Ahmed Hamza Mohammed Rizwanullah 《Computers, Materials & Continua》 SCIE EI 2022年第4期1079-1094,共16页
Recently,Financial Technology(FinTech)has received more attention among financial sectors and researchers to derive effective solutions for any financial institution or firm.Financial crisis prediction(FCP)is an essen... Recently,Financial Technology(FinTech)has received more attention among financial sectors and researchers to derive effective solutions for any financial institution or firm.Financial crisis prediction(FCP)is an essential topic in business sector that finds it useful to identify the financial condition of a financial institution.At the same time,the development of the internet of things(IoT)has altered the mode of human interaction with the physical world.The IoT can be combined with the FCP model to examine the financial data from the users and perform decision making process.This paper presents a novel multi-objective squirrel search optimization algorithm with stacked autoencoder(MOSSA-SAE)model for FCP in IoT environment.The MOSSA-SAE model encompasses different subprocesses namely preprocessing,class imbalance handling,parameter tuning,and classification.Primarily,the MOSSA-SAE model allows the IoT devices such as smartphones,laptops,etc.,to collect the financial details of the users which are then transmitted to the cloud for further analysis.In addition,SMOTE technique is employed to handle class imbalance problems.The goal of MOSSA in SMOTE is to determine the oversampling rate and area of nearest neighbors of SMOTE.Besides,SAE model is utilized as a classification technique to determine the class label of the financial data.At the same time,the MOSSA is applied to appropriately select the‘weights’and‘bias’values of the SAE.An extensive experimental validation process is performed on the benchmark financial dataset and the results are examined under distinct aspects.The experimental values ensured the superior performance of the MOSSA-SAE model on the applied dataset. 展开更多
关键词 Financial data financial crisis prediction class imbalance problem internet of things stacked autoencoder
下载PDF
Integration of Fog Computing for Health Record Management Using Blockchain Technology 被引量:1
15
作者 Mesfer AI Duhayyim fahd n.al-wesabi +5 位作者 Radwa Marzouk Abdalla Ibrahim Abdalla Musa noha negm Anwer Mustafa Hilal Manar Ahmed Hamza Mohammed Rizwanullah 《Computers, Materials & Continua》 SCIE EI 2022年第5期4135-4149,共15页
Internet of Medical Things (IoMT) is a breakthrough technologyin the transfer of medical data via a communication system. Wearable sensordevices collect patient data and transfer them through mobile internet, thatis, ... Internet of Medical Things (IoMT) is a breakthrough technologyin the transfer of medical data via a communication system. Wearable sensordevices collect patient data and transfer them through mobile internet, thatis, the IoMT. Recently, the shift in paradigm from manual data storage toelectronic health recording on fog, edge, and cloud computing has been noted.These advanced computing technologies have facilitated medical services withminimum cost and available conditions. However, the IoMT raises a highconcern on network security and patient data privacy in the health caresystem. The main issue is the transmission of health data with high security inthe fog computing model. In today’s market, the best solution is blockchaintechnology. This technology provides high-end security and authenticationin storing and transferring data. In this research, a blockchain-based fogcomputing model is proposed for the IoMT. The proposed technique embedsa block chain with the yet another consensus (YAC) protocol building securityinfrastructure into fog computing for storing and transferring IoMT data inthe network. YAC is a consensus protocol that authenticates the input datain the block chain. In this scenario, the patients and their family membersare allowed to access the data. The empirical outcome of the proposedtechnique indicates high reliability and security against dangerous threats.The major advantages of using the blockchain model are high transparency,good traceability, and high processing speed. The technique also exhibitshigh reliability and efficiency in accessing data with secure transmission. Theproposed technique achieves 95% reliability in transferring a large number offiles up to 10,000. 展开更多
关键词 Fog computing IoMT block chain YAC security IOT consensus protocol
下载PDF
Artificial Intelligence Based Data Offloading Technique for Secure MEC Systems 被引量:1
16
作者 Fadwa Alrowais Ahmed S.Almasoud +5 位作者 Radwa Marzouk fahd n.al-wesabi Anwer Mustafa Hilal Mohammed Rizwanullah Abdelwahed Motwakel Ishfaq Yaseen 《Computers, Materials & Continua》 SCIE EI 2022年第8期2783-2795,共13页
Mobile edge computing(MEC)provides effective cloud services and functionality at the edge device,to improve the quality of service(QoS)of end users by offloading the high computation tasks.Currently,the introduction o... Mobile edge computing(MEC)provides effective cloud services and functionality at the edge device,to improve the quality of service(QoS)of end users by offloading the high computation tasks.Currently,the introduction of deep learning(DL)and hardware technologies paves amethod in detecting the current traffic status,data offloading,and cyberattacks in MEC.This study introduces an artificial intelligence with metaheuristic based data offloading technique for Secure MEC(AIMDO-SMEC)systems.The proposed AIMDO-SMEC technique incorporates an effective traffic prediction module using Siamese Neural Networks(SNN)to determine the traffic status in the MEC system.Also,an adaptive sampling cross entropy(ASCE)technique is utilized for data offloading in MEC systems.Moreover,the modified salp swarm algorithm(MSSA)with extreme gradient boosting(XGBoost)technique was implemented to identification and classification of cyberattack that exist in the MEC systems.For examining the enhanced outcomes of the AIMDO-SMEC technique,a comprehensive experimental analysis is carried out and the results demonstrated the enhanced outcomes of the AIMDOSMEC technique with the minimal completion time of tasks(CTT)of 0.680. 展开更多
关键词 Data offloading mobile edge computing security machine learning artificial intelligence XGBoost salp swarm algorithm
下载PDF
Artificial Intelligence Based Sentiment Analysis for Health Crisis Management in Smart Cities 被引量:1
17
作者 Anwer Mustafa Hilal Badria Sulaiman Alfurhood +3 位作者 fahd n.al-wesabi Manar Ahmed Hamza Mesfer Al Duhayyim Huda G.Iskandar 《Computers, Materials & Continua》 SCIE EI 2022年第4期143-157,共15页
Smart city promotes the unification of conventional urban infrastructure and information technology (IT) to improve the quality of living andsustainable urban services in the city. To accomplish this, smart cities nec... Smart city promotes the unification of conventional urban infrastructure and information technology (IT) to improve the quality of living andsustainable urban services in the city. To accomplish this, smart cities necessitate collaboration among the public as well as private sectors to install ITplatforms to collect and examine massive quantities of data. At the same time,it is essential to design effective artificial intelligence (AI) based tools to handlehealthcare crisis situations in smart cities. To offer proficient services to peopleduring healthcare crisis time, the authorities need to look closer towardsthem. Sentiment analysis (SA) in social networking can provide valuableinformation regarding public opinion towards government actions. With thismotivation, this paper presents a new AI based SA tool for healthcare crisismanagement (AISA-HCM) in smart cities. The AISA-HCM technique aimsto determine the emotions of the people during the healthcare crisis time, suchas COVID-19. The proposed AISA-HCM technique involves distinct operations such as pre-processing, feature extraction, and classification. Besides,brain storm optimization (BSO) with deep belief network (DBN), called BSODBN model is employed for feature extraction. Moreover, beetle antennasearch with extreme learning machine (BAS-ELM) method was utilized forclassifying the sentiments as to various classes. The use of BSO and BASalgorithms helps to effectively modify the parameters involved in the DBNand ELM models respectively. The performance validation of the AISA-HCMtechnique takes place using Twitter data and the outcomes are examinedwith respect to various measures. The experimental outcomes highlighted theenhanced performance of the AISA-HCM technique over the recent state ofart SA approaches with the maximum precision of 0.89, recall of 0.88, Fmeasure of 0.89, and accuracy of 0.94. 展开更多
关键词 Smart city sentiment analysis artificial intelligence healthcare management metaheuristics deep learning parameter tuning
下载PDF
Intelligent DoS Attack Detection with Congestion Control Technique for VANETs 被引量:1
18
作者 R.Gopi Mahantesh Mathapati +4 位作者 B.Prasad Sultan Ahmad fahd n.al-wesabi Manal Abdullah Alohali Anwer Mustafa Hilal 《Computers, Materials & Continua》 SCIE EI 2022年第7期141-156,共16页
VehicularAd hoc Network(VANET)has become an integral part of Intelligent Transportation Systems(ITS)in today’s life.VANET is a network that can be heavily scaled up with a number of vehicles and road side units that ... VehicularAd hoc Network(VANET)has become an integral part of Intelligent Transportation Systems(ITS)in today’s life.VANET is a network that can be heavily scaled up with a number of vehicles and road side units that keep fluctuating in real world.VANET is susceptible to security issues,particularly DoS attacks,owing to maximum unpredictability in location.So,effective identification and the classification of attacks have become the major requirements for secure data transmission in VANET.At the same time,congestion control is also one of the key research problems in VANET which aims at minimizing the time expended on roads and calculating travel time as well as waiting time at intersections,for a traveler.With this motivation,the current research paper presents an intelligent DoS attack detection with Congestion Control(IDoS-CC)technique for VANET.The presented IDoSCC technique involves two-stage processes namely,Teaching and Learning Based Optimization(TLBO)-based Congestion Control(TLBO-CC)and Gated Recurrent Unit(GRU)-based DoS detection(GRU-DoSD).The goal of IDoS-CC technique is to reduce the level of congestion and detect the attacks that exist in the network.TLBO algorithm is also involved in IDoS-CC technique for optimization of the routes taken by vehicles via traffic signals and to minimize the congestion on a particular route instantaneously so as to assure minimal fuel utilization.TLBO is applied to avoid congestion on roadways.Besides,GRU-DoSD model is employed as a classification model to effectively discriminate the compromised and genuine vehicles in the network.The outcomes from a series of simulation analyses highlight the supremacy of the proposed IDoS-CC technique as it reduced the congestion and successfully identified the DoS attacks in network. 展开更多
关键词 VANET intelligent transportation systems congestion control attack detection dos attack deep learning
下载PDF
An Automated Deep Learning Based Muscular Dystrophy Detection and Classification Model 被引量:1
19
作者 T.Gopalakrishnan Periakaruppan Sudhakaran +4 位作者 K.C.Ramya K.Sathesh Kumar fahd n.al-wesabi Manal Abdullah Alohali Anwer Mustafa Hilal 《Computers, Materials & Continua》 SCIE EI 2022年第4期305-320,共16页
Muscular Dystrophy (MD) is a group of inherited muscular diseases that are commonly diagnosed with the help of techniques such asmuscle biopsy, clinical presentation, and Muscle Magnetic Resonance Imaging(MRI). Among ... Muscular Dystrophy (MD) is a group of inherited muscular diseases that are commonly diagnosed with the help of techniques such asmuscle biopsy, clinical presentation, and Muscle Magnetic Resonance Imaging(MRI). Among these techniques, Muscle MRI recommends the diagnosis ofmuscular dystrophy through identification of the patterns that exist in musclefatty replacement. But the patterns overlap among various diseases whereasthere is a lack of knowledge prevalent with regards to disease-specific patterns.Therefore, artificial intelligence techniques can be used in the diagnosis ofmuscular dystrophies, which enables us to analyze, learn, and predict forthe future. In this scenario, the current research article presents an automated muscular dystrophy detection and classification model using SynergicDeep Learning (SDL) method with extreme Gradient Boosting (XGBoost),called SDL-XGBoost. SDL-XGBoost model has been proposed to act as anautomated deep learning (DL) model that examines the muscle MRI dataand diagnose muscular dystrophies. SDL-XGBoost model employs Kapur’sentropy based Region of Interest (RoI) for detection purposes. Besides, SDLbased feature extraction process is applied to derive a useful set of featurevectors. Finally, XGBoost model is employed as a classification approach todetermine proper class labels for muscle MRI data. The researcher conductedextensive set of simulations to showcase the superior performance of SDLXGBoost model. The obtained experimental values highlighted the supremacyof SDL-XGBoost model over other methods in terms of high accuracy being96.18% and 94.25% classification performance upon DMD and BMD respectively. Therefore, SDL-XGBoost model can help physicians in the diagnosis of muscular dystrophies by identifying the patterns of muscle fatty replacementin muscle MRI. 展开更多
关键词 Muscle magnetic resonance imaging XGBoost synergic deep learning roI detection kapur’s entropy muscular dystrophies
下载PDF
Text Analysis-Based Watermarking Approach for Tampering Detection of English Text 被引量:1
20
作者 fahd n.al-wesabi 《Computers, Materials & Continua》 SCIE EI 2021年第6期3701-3719,共19页
Due to the rapid increase in the exchange of text information via internet networks,the security and the reliability of digital content have become a major research issue.The main challenges faced by researchers are a... Due to the rapid increase in the exchange of text information via internet networks,the security and the reliability of digital content have become a major research issue.The main challenges faced by researchers are authentication,integrity verication,and tampering detection of the digital contents.In this paper,text zero-watermarking and text feature-based approach is proposed to improve the tampering detection accuracy of English text contents.The proposed approach embeds and detects the watermark logically without altering the original English text document.Based on hidden Markov model(HMM),the fourth level order of the word mechanism is used to analyze the contents of the given English text to nd the interrelationship between the contexts.The extracted features are used as watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,the proposed approach has been implemented and validated with attacked English text.Experiments were performed using four standard datasets of varying lengths under multiple random locations of insertion,reorder,and deletion attacks.The experimental and simulation results prove the tampering detection accuracy of our method against all kinds of tampering attacks.Comparison results show that our proposed approach outperforms all the other baseline approaches in terms of tampering detection accuracy. 展开更多
关键词 Text analysis English language processing hidden Markov model ZERO-WATERMARKING content authentication tampering detection
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部