Smart city promotes the unification of conventional urban infrastructure and information technology (IT) to improve the quality of living andsustainable urban services in the city. To accomplish this, smart cities nec...Smart city promotes the unification of conventional urban infrastructure and information technology (IT) to improve the quality of living andsustainable urban services in the city. To accomplish this, smart cities necessitate collaboration among the public as well as private sectors to install ITplatforms to collect and examine massive quantities of data. At the same time,it is essential to design effective artificial intelligence (AI) based tools to handlehealthcare crisis situations in smart cities. To offer proficient services to peopleduring healthcare crisis time, the authorities need to look closer towardsthem. Sentiment analysis (SA) in social networking can provide valuableinformation regarding public opinion towards government actions. With thismotivation, this paper presents a new AI based SA tool for healthcare crisismanagement (AISA-HCM) in smart cities. The AISA-HCM technique aimsto determine the emotions of the people during the healthcare crisis time, suchas COVID-19. The proposed AISA-HCM technique involves distinct operations such as pre-processing, feature extraction, and classification. Besides,brain storm optimization (BSO) with deep belief network (DBN), called BSODBN model is employed for feature extraction. Moreover, beetle antennasearch with extreme learning machine (BAS-ELM) method was utilized forclassifying the sentiments as to various classes. The use of BSO and BASalgorithms helps to effectively modify the parameters involved in the DBNand ELM models respectively. The performance validation of the AISA-HCMtechnique takes place using Twitter data and the outcomes are examinedwith respect to various measures. The experimental outcomes highlighted theenhanced performance of the AISA-HCM technique over the recent state ofart SA approaches with the maximum precision of 0.89, recall of 0.88, Fmeasure of 0.89, and accuracy of 0.94.展开更多
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a...Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach.The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text.Moreover,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any tampering.SFASCDW has been implemented using PHP with VS code IDE.The robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and deletion.The SFASCDW was found to be effective and could be applicable in detecting any possible tampering.展开更多
In this article,a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet(HFDATAI)is proposed by integrating digital watermarking and hidden Markov model as a strategy for ...In this article,a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet(HFDATAI)is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing.The HFDATAI solution technically integrates and senses the watermark without modifying the original text.The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated,null-watermarking approach to enhance the proposed approach’s efficiency,accuracy,and intensity.The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of the Arabic language.In addition,the features of the interrelationship among text contexts and characteristics of watermark information extraction that is used later validated for detecting any tampering of the Arabic-text attacked.The HFDATAI strategy was introduced based on PHP with included IDE of VS code.Experiments of four separate duration datasets in random sites illustrate the fragility,efficacy,and applicability of HFDATAI by using the three common tampering attacks i.e.,insertion,reorder,and deletion.The HFDATAI was found to be effective,applicable,and very sensitive for detecting any possible tampering on Arabic text.展开更多
In recent years,there has been an increasing demand to improve cellular communication services in several aspects.The aspect that received the most attention is improving the quality of coverage through using smart an...In recent years,there has been an increasing demand to improve cellular communication services in several aspects.The aspect that received the most attention is improving the quality of coverage through using smart antennas which consist of array antennas.this paper investigates the main characteristics and design of the three types of array antennas of the base station for better coverage through simulation(MATLAB)which provides field and strength patterns measured in polar and rectangular coordinates for a variety of conditions including broadsides,ordinary End-fire,and increasing directivity End-fire which is typically used in smart antennas.The method of analysis was applied to twenty experiments of process design to each antenna type separately,so sixty results were obtained from the radiation pattern indicating the parameters for each radiation pattern.Moreover,nineteen design experiments were described in this section.It is hoped that the results obtained from this study will help engineers solve coverage problems as well as improve the quality of cellular communication networks.展开更多
文摘Smart city promotes the unification of conventional urban infrastructure and information technology (IT) to improve the quality of living andsustainable urban services in the city. To accomplish this, smart cities necessitate collaboration among the public as well as private sectors to install ITplatforms to collect and examine massive quantities of data. At the same time,it is essential to design effective artificial intelligence (AI) based tools to handlehealthcare crisis situations in smart cities. To offer proficient services to peopleduring healthcare crisis time, the authorities need to look closer towardsthem. Sentiment analysis (SA) in social networking can provide valuableinformation regarding public opinion towards government actions. With thismotivation, this paper presents a new AI based SA tool for healthcare crisismanagement (AISA-HCM) in smart cities. The AISA-HCM technique aimsto determine the emotions of the people during the healthcare crisis time, suchas COVID-19. The proposed AISA-HCM technique involves distinct operations such as pre-processing, feature extraction, and classification. Besides,brain storm optimization (BSO) with deep belief network (DBN), called BSODBN model is employed for feature extraction. Moreover, beetle antennasearch with extreme learning machine (BAS-ELM) method was utilized forclassifying the sentiments as to various classes. The use of BSO and BASalgorithms helps to effectively modify the parameters involved in the DBNand ELM models respectively. The performance validation of the AISA-HCMtechnique takes place using Twitter data and the outcomes are examinedwith respect to various measures. The experimental outcomes highlighted theenhanced performance of the AISA-HCM technique over the recent state ofart SA approaches with the maximum precision of 0.89, recall of 0.88, Fmeasure of 0.89, and accuracy of 0.94.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP.1/147/42),Received by Fahd N.Al-Wesabi.www.kku.edu.sa.
文摘Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach.The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text.Moreover,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any tampering.SFASCDW has been implemented using PHP with VS code IDE.The robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and deletion.The SFASCDW was found to be effective and could be applicable in detecting any possible tampering.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(G.R.P./14/42),Received by Fahd N.Al-Wesabi.www.kku.edu.sa.
文摘In this article,a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet(HFDATAI)is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing.The HFDATAI solution technically integrates and senses the watermark without modifying the original text.The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated,null-watermarking approach to enhance the proposed approach’s efficiency,accuracy,and intensity.The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of the Arabic language.In addition,the features of the interrelationship among text contexts and characteristics of watermark information extraction that is used later validated for detecting any tampering of the Arabic-text attacked.The HFDATAI strategy was introduced based on PHP with included IDE of VS code.Experiments of four separate duration datasets in random sites illustrate the fragility,efficacy,and applicability of HFDATAI by using the three common tampering attacks i.e.,insertion,reorder,and deletion.The HFDATAI was found to be effective,applicable,and very sensitive for detecting any possible tampering on Arabic text.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP 2/25/42),Received by Fahd N.Al-Wesabi.www.kku.edu.sa.
文摘In recent years,there has been an increasing demand to improve cellular communication services in several aspects.The aspect that received the most attention is improving the quality of coverage through using smart antennas which consist of array antennas.this paper investigates the main characteristics and design of the three types of array antennas of the base station for better coverage through simulation(MATLAB)which provides field and strength patterns measured in polar and rectangular coordinates for a variety of conditions including broadsides,ordinary End-fire,and increasing directivity End-fire which is typically used in smart antennas.The method of analysis was applied to twenty experiments of process design to each antenna type separately,so sixty results were obtained from the radiation pattern indicating the parameters for each radiation pattern.Moreover,nineteen design experiments were described in this section.It is hoped that the results obtained from this study will help engineers solve coverage problems as well as improve the quality of cellular communication networks.