期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Artificial Intelligence Based Sentiment Analysis for Health Crisis Management in Smart Cities 被引量:1
1
作者 Anwer Mustafa Hilal Badria Sulaiman Alfurhood +3 位作者 Fahd N.Al-Wesabi Manar Ahmed Hamza Mesfer Al Duhayyim huda g.iskandar 《Computers, Materials & Continua》 SCIE EI 2022年第4期143-157,共15页
Smart city promotes the unification of conventional urban infrastructure and information technology (IT) to improve the quality of living andsustainable urban services in the city. To accomplish this, smart cities nec... Smart city promotes the unification of conventional urban infrastructure and information technology (IT) to improve the quality of living andsustainable urban services in the city. To accomplish this, smart cities necessitate collaboration among the public as well as private sectors to install ITplatforms to collect and examine massive quantities of data. At the same time,it is essential to design effective artificial intelligence (AI) based tools to handlehealthcare crisis situations in smart cities. To offer proficient services to peopleduring healthcare crisis time, the authorities need to look closer towardsthem. Sentiment analysis (SA) in social networking can provide valuableinformation regarding public opinion towards government actions. With thismotivation, this paper presents a new AI based SA tool for healthcare crisismanagement (AISA-HCM) in smart cities. The AISA-HCM technique aimsto determine the emotions of the people during the healthcare crisis time, suchas COVID-19. The proposed AISA-HCM technique involves distinct operations such as pre-processing, feature extraction, and classification. Besides,brain storm optimization (BSO) with deep belief network (DBN), called BSODBN model is employed for feature extraction. Moreover, beetle antennasearch with extreme learning machine (BAS-ELM) method was utilized forclassifying the sentiments as to various classes. The use of BSO and BASalgorithms helps to effectively modify the parameters involved in the DBNand ELM models respectively. The performance validation of the AISA-HCMtechnique takes place using Twitter data and the outcomes are examinedwith respect to various measures. The experimental outcomes highlighted theenhanced performance of the AISA-HCM technique over the recent state ofart SA approaches with the maximum precision of 0.89, recall of 0.88, Fmeasure of 0.89, and accuracy of 0.94. 展开更多
关键词 Smart city sentiment analysis artificial intelligence healthcare management metaheuristics deep learning parameter tuning
下载PDF
Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text 被引量:1
2
作者 Mohammad Alamgeer Fahd N.Al-Wesabi +5 位作者 huda g.iskandar Imran Khan Nadhem Nemri Mohammad Medani Mohammed Abdullah Al-Hagery Ali Mohammed Al-Sharafi 《Computers, Materials & Continua》 SCIE EI 2022年第5期2497-2513,共17页
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a... Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach.The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text.Moreover,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any tampering.SFASCDW has been implemented using PHP with VS code IDE.The robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and deletion.The SFASCDW was found to be effective and could be applicable in detecting any possible tampering. 展开更多
关键词 WATERMARKING soft computing text analysis hidden Markov model content authentication
下载PDF
Arabic Feature-Based Text Watermarking Technique for Sensitive Detecting Tampering Attack 被引量:1
3
作者 Fahd N.Al-Wesabi huda g.iskandar +5 位作者 Saleh Alzahrani Abdelzahir Abdelmaboud Mohammed Abdul Nadhem Nemri Mohammad Medani Mohammed Y.Alghamdi 《Computers, Materials & Continua》 SCIE EI 2021年第9期3789-3806,共18页
In this article,a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet(HFDATAI)is proposed by integrating digital watermarking and hidden Markov model as a strategy for ... In this article,a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet(HFDATAI)is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing.The HFDATAI solution technically integrates and senses the watermark without modifying the original text.The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated,null-watermarking approach to enhance the proposed approach’s efficiency,accuracy,and intensity.The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of the Arabic language.In addition,the features of the interrelationship among text contexts and characteristics of watermark information extraction that is used later validated for detecting any tampering of the Arabic-text attacked.The HFDATAI strategy was introduced based on PHP with included IDE of VS code.Experiments of four separate duration datasets in random sites illustrate the fragility,efficacy,and applicability of HFDATAI by using the three common tampering attacks i.e.,insertion,reorder,and deletion.The HFDATAI was found to be effective,applicable,and very sensitive for detecting any possible tampering on Arabic text. 展开更多
关键词 WATERMARKING soft computing text analysis hidden Markov model content authentication
下载PDF
An Optimized Design of Antenna Arrays for the Smart Antenna Systems
4
作者 Fahd N.Al-Wesabi Murad A.A.Almekhlafi +7 位作者 huda g.iskandar Adnan Zain Saleh Alzahrani Mohammed Alamgeer Nadhem Nemri Sami Dhabi Mohammad Medani Ali.M.Al-Sharafi 《Computers, Materials & Continua》 SCIE EI 2021年第11期1979-1994,共16页
In recent years,there has been an increasing demand to improve cellular communication services in several aspects.The aspect that received the most attention is improving the quality of coverage through using smart an... In recent years,there has been an increasing demand to improve cellular communication services in several aspects.The aspect that received the most attention is improving the quality of coverage through using smart antennas which consist of array antennas.this paper investigates the main characteristics and design of the three types of array antennas of the base station for better coverage through simulation(MATLAB)which provides field and strength patterns measured in polar and rectangular coordinates for a variety of conditions including broadsides,ordinary End-fire,and increasing directivity End-fire which is typically used in smart antennas.The method of analysis was applied to twenty experiments of process design to each antenna type separately,so sixty results were obtained from the radiation pattern indicating the parameters for each radiation pattern.Moreover,nineteen design experiments were described in this section.It is hoped that the results obtained from this study will help engineers solve coverage problems as well as improve the quality of cellular communication networks. 展开更多
关键词 Smart antenna antenna arrays patterns construction COVERAGE
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部