期刊文献+
共找到55篇文章
< 1 2 3 >
每页显示 20 50 100
Sentiment Analysis with Tweets Behaviour in Twitter Streaming API 被引量:1
1
作者 Kuldeep Chouhan Mukesh Yadav +4 位作者 Ranjeet Kumar Rout Kshira Sagar Sahoo NZ Jhanjhi mehedi masud Sultan Aljahdali 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1113-1128,共16页
Twitter is a radiant platform with a quick and effective technique to analyze users’perceptions of activities on social media.Many researchers and industry experts show their attention to Twitter sentiment analysis t... Twitter is a radiant platform with a quick and effective technique to analyze users’perceptions of activities on social media.Many researchers and industry experts show their attention to Twitter sentiment analysis to recognize the stakeholder group.The sentiment analysis needs an advanced level of approaches including adoption to encompass data sentiment analysis and various machine learning tools.An assessment of sentiment analysis in multiple fields that affect their elevations among the people in real-time by using Naive Bayes and Support Vector Machine(SVM).This paper focused on analysing the distinguished sentiment techniques in tweets behaviour datasets for various spheres such as healthcare,behaviour estimation,etc.In addition,the results in this work explore and validate the statistical machine learning classifiers that provide the accuracy percentages attained in terms of positive,negative and neutral tweets.In this work,we obligated Twitter Application Programming Interface(API)account and programmed in python for sentiment analysis approach for the computational measure of user’s perceptions that extract a massive number of tweets and provide market value to the Twitter account proprietor.To distinguish the results in terms of the performance evaluation,an error analysis investigates the features of various stakeholders comprising social media analytics researchers,Natural Language Processing(NLP)developers,engineering managers and experts involved to have a decision-making approach. 展开更多
关键词 Machine learning Naive Bayes natural language processing sentiment analysis social media analytics support vector machine Twitter application programming interface
下载PDF
Machine Learning and Artificial Neural Network for Predicting Heart Failure Risk
2
作者 Polin Rahman Ahmed Rifat +3 位作者 MD.IftehadAmjad Chy Mohammad Monirujjaman Khan mehedi masud Sultan Aljahdali 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期757-775,共19页
Heart failure is now widely spread throughout the world.Heart disease affects approximately 48%of the population.It is too expensive and also difficult to cure the disease.This research paper represents machine learni... Heart failure is now widely spread throughout the world.Heart disease affects approximately 48%of the population.It is too expensive and also difficult to cure the disease.This research paper represents machine learning models to predict heart failure.The fundamental concept is to compare the correctness of various Machine Learning(ML)algorithms and boost algorithms to improve models’accuracy for prediction.Some supervised algorithms like K-Nearest Neighbor(KNN),Support Vector Machine(SVM),Decision Trees(DT),Random Forest(RF),Logistic Regression(LR)are considered to achieve the best results.Some boosting algorithms like Extreme Gradient Boosting(XGBoost)and Cat-Boost are also used to improve the prediction using Artificial Neural Networks(ANN).This research also focuses on data visualization to identify patterns,trends,and outliers in a massive data set.Python and Scikit-learns are used for ML.Tensor Flow and Keras,along with Python,are used for ANN model train-ing.The DT and RF algorithms achieved the highest accuracy of 95%among the classifiers.Meanwhile,KNN obtained a second height accuracy of 93.33%.XGBoost had a gratified accuracy of 91.67%,SVM,CATBoost,and ANN had an accuracy of 90%,and LR had 88.33%accuracy. 展开更多
关键词 Heart failure prediction data visualization machine learning k-nearest neighbors support vector machine decision tree random forest logistic regression xgboost and catboost artificial neural network
下载PDF
A Secure Multi-factor Authentication Protocol for Healthcare Services Using Cloud-based SDN
3
作者 Sugandhi Midha Sahil Verma +4 位作者 Kavita Mohit Mittal Nz Jhanjhi mehedi masud Mohammed A.AlZain 《Computers, Materials & Continua》 SCIE EI 2023年第2期3711-3726,共16页
Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the network.Enterprises and Cloud providers both leverage the benefits as networks can be configured... Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the network.Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application requirement.The integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care services.It has improved the real-time monitoring of patients by medical practitioners.Patients’data get stored at the central server on the cloud from where it is available to medical practitioners in no time.The centralisation of data on the server makes it more vulnerable to malicious attacks and causes a major threat to patients’privacy.In recent days,several schemes have been proposed to ensure the safety of patients’data.But most of the techniques still lack the practical implementation and safety of data.In this paper,a secure multi-factor authentication protocol using a hash function has been proposed.BAN(Body Area Network)logic has been used to formally analyse the proposed scheme and ensure that no unauthenticated user can steal sensitivepatient information.Security Protocol Animator(SPAN)–Automated Validation of Internet Security Protocols and Applications(AVISPA)tool has been used for simulation.The results prove that the proposed scheme ensures secure access to the database in terms of spoofing and identification.Performance comparisons of the proposed scheme with other related historical schemes regarding time complexity,computation cost which accounts to only 423 ms in proposed,and security parameters such as identification and spoofing prove its efficiency. 展开更多
关键词 Multi-factor AUTHENTICATION hash function BAN logic SPANAVISPA
下载PDF
Neural Cryptography with Fog Computing Network for Health Monitoring Using IoMT
4
作者 G.Ravikumar K.Venkatachalam +2 位作者 Mohammed A.AlZain mehedi masud Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期945-959,共15页
Sleep apnea syndrome(SAS)is a breathing disorder while a person is asleep.The traditional method for examining SAS is Polysomnography(PSG).The standard procedure of PSG requires complete overnight observation in a lab... Sleep apnea syndrome(SAS)is a breathing disorder while a person is asleep.The traditional method for examining SAS is Polysomnography(PSG).The standard procedure of PSG requires complete overnight observation in a laboratory.PSG typically provides accurate results,but it is expensive and time consuming.However,for people with Sleep apnea(SA),available beds and laboratories are limited.Resultantly,it may produce inaccurate diagnosis.Thus,this paper proposes the Internet of Medical Things(IoMT)framework with a machine learning concept of fully connected neural network(FCNN)with k-near-est neighbor(k-NN)classifier.This paper describes smart monitoring of a patient’s sleeping habit and diagnosis of SA using FCNN-KNN+average square error(ASE).For diagnosing SA,the Oxygen saturation(SpO2)sensor device is popularly used for monitoring the heart rate and blood oxygen level.This diagnosis information is securely stored in the IoMT fog computing network.Doctors can care-fully monitor the SA patient remotely on the basis of sensor values,which are efficiently stored in the fog computing network.The proposed technique takes less than 0.2 s with an accuracy of 95%,which is higher than existing models. 展开更多
关键词 Sleep apnea POLYSOMNOGRAPHY IOMT fog node security neural network KNN signature encryption sensor
下载PDF
Breast Cancer Detection Using Breastnet-18 Augmentation with Fine Tuned Vgg-16
5
作者 S.J.K.Jagadeesh Kumar P.Parthasarathi +3 位作者 Mofreh A.Hogo mehedi masud Jehad F.Al-Amri Mohamed Abouhawwash 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期2363-2378,共16页
Women from middle age to old age are mostly screened positive for Breast cancer which leads to death.Times over the past decades,the overall sur-vival rate in breast cancer has improved due to advancements in early-st... Women from middle age to old age are mostly screened positive for Breast cancer which leads to death.Times over the past decades,the overall sur-vival rate in breast cancer has improved due to advancements in early-stage diag-nosis and tailored therapy.Today all hospital brings high awareness and early detection technologies for breast cancer.This increases the survival rate of women.Though traditional breast cancer treatment takes so long,early cancer techniques require an automation system.This research provides a new methodol-ogy for classifying breast cancer using ultrasound pictures that use deep learning and the combination of the best characteristics.Initially,after successful learning of Convolutional Neural Network(CNN)algorithms,data augmentation is used to enhance the representation of the feature dataset.Then it uses BreastNet18 withfine-tuned VGG-16 model for pre-training the augmented dataset.For feature classification,Entropy controlled Whale Optimization Algorithm(EWOA)is used.The features that have been optimized using the EWOA were utilized to fuse and optimize the data.To identify the breast cancer pictures,training classifiers are used.By using the novel probability-based serial technique,the best-chosen characteristics are fused and categorized by machine learning techniques.The main objective behind the research is to increase tumor prediction accuracy for saving human life.The testing was performed using a dataset of enhanced Breast Ultrasound Images(BUSI).The proposed method improves the accuracy com-pared with the existing methods. 展开更多
关键词 Deep learning classification data augmentation feature extraction the fusion of features breast cancer optimization classification
下载PDF
Proof of Activity Protocol for IoMT Data Security
6
作者 R.Rajadevi K.Venkatachalam +2 位作者 mehedi masud Mohammed A.AlZain Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期339-350,共12页
The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide heal... The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide healthcare services without physical appearance.With the use of sensors,IoMT applications are used in healthcare management.In such applications,one of the most important factors is data security,given that its transmission over the network may cause obtrusion.For data security in IoMT systems,blockchain is used due to its numerous blocks for secure data storage.In this study,Blockchain-assisted secure data management framework(BSDMF)and Proof of Activity(PoA)protocol using malicious code detection algorithm is used in the proposed data security for the healthcare system.The main aim is to enhance the data security over the networks.The PoA protocol enhances high security of data from the literature review.By replacing the malicious node from the block,the PoA can provide high security for medical data in the blockchain.Comparison with existing systems shows that the proposed simulation with BSD-Malicious code detection algorithm achieves higher accuracy ratio,precision ratio,security,and efficiency and less response time for Blockchain-enabled healthcare systems. 展开更多
关键词 Blockchain IoMT malicious code detection SECURITY secure data management framework data management POA
下载PDF
Healthcare Monitoring Using Ensemble Classifiers in Fog Computing Framework
7
作者 P.M.Arunkumar mehedi masud +1 位作者 Sultan Aljahdali Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2265-2280,共16页
Nowadays,the cloud environment faces numerous issues like synchronizing information before the switch over the data migration.The requirement for a centralized internet of things(IoT)-based system has been restricted ... Nowadays,the cloud environment faces numerous issues like synchronizing information before the switch over the data migration.The requirement for a centralized internet of things(IoT)-based system has been restricted to some extent.Due to low scalability on security considerations,the cloud seems uninteresting.Since healthcare networks demand computer operations on large amounts of data,the sensitivity of device latency evolved among health networks is a challenging issue.In comparison to cloud domains,the new paradigms of fog computing give fresh alternatives by bringing resources closer to users by providing low latency and energy-efficient data processing solutions.Previous fog computing frameworks have various flaws,such as overvaluing response time or ignoring the accuracy of the result yet handling both at the same time compromises the network community.In this proposed work,Health Fog is integrated with the Optimized Cascaded Convolution Neural Network framework for diagnosing heart disease.Initially,the data is collected,and then pre-processing is done by Linear Discriminant Analysis.Then the features are extracted and optimized using Galactic Swarm Optimization.The optimized features are given into the Health Fog framework for diagnosing heart disease patients.It uses ensemble-based deep learning in edge computing devices,which automatically monitors real-life health networks such as heart disease analysis.Finally,the classifiers such as bagging,boosting,XGBoost,Multi-Layer Perceptron(MLP),and Partitions(PART)are used for classifying the data.Then the majority voting classifier predicts the result.This work uses FogBus architecture and evaluates the execution of power usage,bandwidth of the network,latency,execution time,and accuracy. 展开更多
关键词 Healthfog FogBus cascaded convolution neural network cloud computing heart disease automatic health monitoring internet of things
下载PDF
Improved Video Steganography with Dual Cover Medium,DNA and Complex Frames
8
作者 Asma Sajjad Humaira Ashraf +3 位作者 NZ Jhanjhi Mamoona Humayun mehedi masud Mohammed A.AlZain 《Computers, Materials & Continua》 SCIE EI 2023年第2期3881-3898,共18页
The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive... The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive information securely,researchers are combining robust cryptography and steganographic approaches.The objective of this research is to introduce a more secure method of video steganography by using Deoxyribonucleic acid(DNA)for embedding encrypted data and an intelligent frame selection algorithm to improve video imperceptibility.In the previous approach,DNA was used only for frame selection.If this DNA is compromised,then our frames with the hidden and unencrypted data will be exposed.Moreover the frame selected in this way were random frames,and no consideration was made to the contents of frames.Hiding data in this way introduces visible artifacts in video.In the proposed approach rather than using DNA for frame selection we have created a fakeDNA out of our data and then embedded it in a video file on intelligently selected frames called the complex frames.Using chaotic maps and linear congruential generators,a unique pixel set is selected each time only from the identified complex frames,and encrypted data is embedded in these random locations.Experimental results demonstrate that the proposed technique shows minimum degradation of the stenographic video hence reducing the very first chances of visual surveillance.Further,the selection of complex frames for embedding and creation of a fake DNA as proposed in this research have higher peak signal-to-noise ratio(PSNR)and reduced mean squared error(MSE)values that indicate improved results.The proposed methodology has been implemented in Matlab. 展开更多
关键词 Video steganography data encryption DNA embedding frame selection
下载PDF
Energy Efficient Unequal Fault Tolerance Clustering Approach
9
作者 Sowjanya Ramisetty Divya Anand +4 位作者 Kavita Sahil Verma NZ Jhanjhi mehedi masud Mohammed Baz 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1971-1983,共13页
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul... For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but fault tolerance and energy balancing gives equal importance for improving the network lifetime.For saving energy in WSNs,clustering is considered as one of the effective methods for Wireless Sensor Networks.Because of the excessive overload,more energy consumed by cluster heads(CHs)in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to failure.For increasing the WSNs’lifetime,the CHs selection has played a key role in energy consumption for sensor nodes.An Energy Efficient Unequal Fault Tolerant Clustering Approach(EEUFTC)is proposed for reducing the energy utilization through the intelligent methods like Particle Swarm Optimization(PSO).In this approach,an optimal Master Cluster Head(MCH)-Master data Aggregator(MDA),selection method is proposed which uses the fitness values and they evaluate based on the PSO for two optimal nodes in each cluster to act as Master Data Aggregator(MDA),and Master Cluster Head.The data from the cluster members collected by the chosen MCH exclusively and the MDA is used for collected data reception from MCH transmits to the BS.Thus,the MCH overhead reduces.During the heavy communication of data,overhead controls using the scheduling of Energy-Efficient Time Division Multiple Access(EE-TDMA).To describe the proposed method superiority based on various performance metrics,simulation and results are compared to the existing methods. 展开更多
关键词 ENERGY-EFFICIENCY unequal fault tolerant clustering approach particle swarm optimization master data aggregator energy efficient time division multiple access optimal nodes
下载PDF
Bayes-Q-Learning Algorithm in Edge Computing for Waste Tracking
10
作者 D.Palanikkumar R.Ramesh Kumar +2 位作者 mehedi masud Mrim M.Alnfiai Mohamed Abouhawwash 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期2425-2440,共16页
The major environmental hazard in this pandemic is the unhygienic dis-posal of medical waste.Medical wastage is not properly managed it will become a hazard to the environment and humans.Managing medical wastage is a ... The major environmental hazard in this pandemic is the unhygienic dis-posal of medical waste.Medical wastage is not properly managed it will become a hazard to the environment and humans.Managing medical wastage is a major issue in the city,municipalities in the aspects of the environment,and logistics.An efficient supply chain with edge computing technology is used in managing medical waste.The supply chain operations include processing of waste collec-tion,transportation,and disposal of waste.Many research works have been applied to improve the management of wastage.The main issues in the existing techniques are ineffective and expensive and centralized edge computing which leads to failure in providing security,trustworthiness,and transparency.To over-come these issues,in this paper we implement an efficient Naive Bayes classifier algorithm and Q-Learning algorithm in decentralized edge computing technology with a binary bat optimization algorithm(NBQ-BBOA).This proposed work is used to track,detect,and manage medical waste.To minimize the transferring cost of medical wastage from various nodes,the Q-Learning algorithm is used.The accuracy obtained for the Naïve Bayes algorithm is 88%,the Q-Learning algo-rithm is 82%and NBQ-BBOA is 98%.The error rate of Root Mean Square Error(RMSE)and Mean Error(MAE)for the proposed work NBQ-BBOA are 0.012 and 0.045. 展开更多
关键词 Binary bat algorithm naïve bayes supply chain EDGE medical wastage
下载PDF
FSE2R:An Improved Collision-Avoidance-based Energy Efficient Route Selection Protocolin USN
11
作者 Prasant Ku.Dash Lopamudra Hota +3 位作者 Madhumita Panda N.Z.Jhanjhi Kshira Sagar Sahoo mehedi masud 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2225-2242,共18页
The 3D Underwater Sensor Network(USNs)has become the most optimistic medium for tracking and monitoring underwater environment.Energy and collision are two most critical factors in USNs for both sparse and dense regio... The 3D Underwater Sensor Network(USNs)has become the most optimistic medium for tracking and monitoring underwater environment.Energy and collision are two most critical factors in USNs for both sparse and dense regions.Due to harsh ocean environment,it is a challenge to design a reliable energy efficient with collision free protocol.Diversity in link qualities may cause collision and frequent communication lead to energy loss;that effects the network performance.To overcome these challenges a novel protocol Forwarder Selection Energy Efficient Routing(FSE2R)is proposed.Our proposal’s key idea is based on computation of node distance from the sink,Residual Energy(RE)of each node and Signal to Interference Noise Ratio(SINR).The node distance from sink and RE is computed for reliable forwarder node selection and SINR is used for analysis of collision.The novel proposal compares with existing protocols like H2AB,DEEP,and E2LR to achieve Quality of Service(QoS)in terms of through-put,packet delivery ratio and energy consumption.The comparative analysis shows that FSE2R gives on an average 30%less energy consumption,24.62%better PDR and 48.31%less end-to-end delay compared to other protocols. 展开更多
关键词 USN energy efficiency collision avoidance MAC SINR
下载PDF
Butterfly Optimized Feature Selection with Fuzzy C-Means Classifier for Thyroid Prediction
12
作者 S.J.K.Jagadeesh Kumar P.Parthasarathi +2 位作者 mehedi masud Jehad F.Al-Amri Mohamed Abouhawwash 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2909-2924,共16页
The main task of thyroid hormones is controlling the metabolism rate of humans,the development of neurons,and the significant growth of reproductive activities.In medical science,thyroid disorder will lead to creating ... The main task of thyroid hormones is controlling the metabolism rate of humans,the development of neurons,and the significant growth of reproductive activities.In medical science,thyroid disorder will lead to creating thyroiditis and thyroid cancer.The two main thyroid disorders are hyperthyroidism and hypothyroidism.Many research works focus on the prediction of thyroid disorder.To improve the accuracy in the classification of thyroid disorder this paper pro-poses optimization-based feature selection by using differential evolution with the Butterfly optimization algorithm(DE-BOA).For the classifier fuzzy C-means algorithm(FCM)is used.The proposed DEBOA-FCM is evaluated with para-metric metric measures of sensitivity,specificity,and accuracy.In this work,the thyroid disease dataset collected from the machine learning University of Cali-fornia Irvine(UCI)database was used.The accuracy rate for the Differential Evo-lutionary algorithm got 0.884,the Butterfly optimization algorithm got 0.906,Fuzzy C-Means algorithm got 0.899 and DEBOA+Focused Concept Miner(FCM)proposed work 0.943. 展开更多
关键词 FUZZY BUTTERFLY differential evolution THYROID HYPERTHYROID
下载PDF
Covid-19 Detection Using Deep Correlation-Grey Wolf Optimizer
13
作者 K.S.Bhuvaneshwari Ahmed Najat Ahmed +2 位作者 mehedi masud Samah H.Alajmani Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2933-2945,共13页
The immediate and quick spread of the coronavirus has become a life-threatening disease around the globe.The widespread illness has dramatically changed almost all sectors,moving from offline to online,resulting in a ... The immediate and quick spread of the coronavirus has become a life-threatening disease around the globe.The widespread illness has dramatically changed almost all sectors,moving from offline to online,resulting in a new normal lifestyle for people.The impact of coronavirus is tremendous in the healthcare sector,which has experienced a decline in the first quarter of 2020.This pandemic has created an urge to use computer-aided diagnosis techniques for classifying the Covid-19 dataset to reduce the burden of clinical results.The current situation motivated me to choose correlationbased development called correlation-based grey wolf optimizer to perform accurate classification.A proposed multistage model helps to identify Covid from Computed Tomography(CT)scan image.The first process uses a convolutional neural network(CNN)for extracting the feature from the CT scans.The Pearson coefficient filter method is applied to remove redundant and irrelevant features.Finally,theGrey wolf optimizer is used to choose optimal features.Experimental analysis proves that this determines the optimal characteristics to detect the deadly disease.The proposed model’s accuracy is 14%higher than the krill herd and bacterial foraging optimization for severe accurate respiratory syndrome image(SARS-CoV-2 CT)dataset.The COVID CT image dataset is 22%higher than the existing krill herd and bacterial foraging optimization techniques.The proposed techniques help to increase the classification accuracy of the algorithm in most cases,which marks the stability of the stated result.Comparative analysis reveals that the proposed classification technique to predict COVID-19 withmaximumaccuracy of 98%outperforms other competitive approaches. 展开更多
关键词 COVID-19 feature selection CT image CLASSIFICATION features extraction
下载PDF
A Boosted Tree-Based Predictive Model for Business Analytics
14
作者 Mohammad Al-Omari Fadi Qutaishat +2 位作者 Majdi Rawashdeh Samah H.Alajmani mehedi masud 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期515-527,共13页
Business Analytics is one of the vital processes that must be incorpo-rated into any business.It supports decision-makers in analyzing and predicting future trends based on facts(Data-driven decisions),especially when... Business Analytics is one of the vital processes that must be incorpo-rated into any business.It supports decision-makers in analyzing and predicting future trends based on facts(Data-driven decisions),especially when dealing with a massive amount of business data.Decision Trees are essential for business ana-lytics to predict business opportunities and future trends that can retain corpora-tions’competitive advantage and survival and improve their business value.This research proposes a tree-based predictive model for business analytics.The model is developed based on ranking business features and gradient-boosted trees.For validation purposes,the model is tested on a real-world dataset of Universal Bank to predict personal loan acceptance.It is validated based on Accuracy,Precision,Recall,and F-score.The experimentfindings show that the proposed model can predict personal loan acceptance efficiently and effectively with better accuracy than the traditional tree-based models.The model can also deal with a massive amount of business data and support corporations’decision-making process. 展开更多
关键词 Business analytics decision trees machine learning business value decision making
下载PDF
A Pattern Classification Model for Vowel Data Using Fuzzy Nearest Neighbor
15
作者 Monika Khandelwal Ranjeet Kumar Rout +4 位作者 Saiyed Umer Kshira Sagar Sahoo NZ Jhanjhi Mohammad Shorfuzzaman mehedi masud 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3587-3598,共12页
Classification of the patterns is a crucial structure of research and applications. Using fuzzy set theory, classifying the patterns has become of great interest because of its ability to understand the parameters. ... Classification of the patterns is a crucial structure of research and applications. Using fuzzy set theory, classifying the patterns has become of great interest because of its ability to understand the parameters. One of the problemsobserved in the fuzzification of an unknown pattern is that importance is givenonly to the known patterns but not to their features. In contrast, features of thepatterns play an essential role when their respective patterns overlap. In this paper,an optimal fuzzy nearest neighbor model has been introduced in which a fuzzifi-cation process has been carried out for the unknown pattern using k nearest neighbor. With the help of the fuzzification process, the membership matrix has beenformed. In this membership matrix, fuzzification has been carried out of the features of the unknown pattern. Classification results are verified on a completelyllabelled Telugu vowel data set, and the accuracy is compared with the differentmodels and the fuzzy k nearest neighbor algorithm. The proposed model gives84.86% accuracy on 50% training data set and 89.35% accuracy on 80% trainingdata set. The proposed classifier learns well enough with a small amount of training data, resulting in an efficient and faster approach. 展开更多
关键词 Nearest neighbors fuzzy classification patterns recognition reasoning rule membership matrix
下载PDF
Deep Fake Detection Using Computer Vision-Based Deep Neural Network with Pairwise Learning
16
作者 R.Saravana Ram M.Vinoth Kumar +3 位作者 Tareq M.Al-shami mehedi masud Hanan Aljuaid Mohamed Abouhawwash 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2449-2462,共14页
Deep learning-based approaches are applied successfully in manyfields such as deepFake identification,big data analysis,voice recognition,and image recognition.Deepfake is the combination of deep learning in fake creati... Deep learning-based approaches are applied successfully in manyfields such as deepFake identification,big data analysis,voice recognition,and image recognition.Deepfake is the combination of deep learning in fake creation,which states creating a fake image or video with the help of artificial intelligence for political abuse,spreading false information,and pornography.The artificial intel-ligence technique has a wide demand,increasing the problems related to privacy,security,and ethics.This paper has analyzed the features related to the computer vision of digital content to determine its integrity.This method has checked the computer vision features of the image frames using the fuzzy clustering feature extraction method.By the proposed deep belief network with loss handling,the manipulation of video/image is found by means of a pairwise learning approach.This proposed approach has improved the accuracy of the detection rate by 98%on various datasets. 展开更多
关键词 Deep fake deep belief network fuzzy clustering feature extraction pairwise learning
下载PDF
An Automatic Deep Neural Network Model for Fingerprint Classification
17
作者 Amira Tarek Mahmoud Wael AAwad +4 位作者 Gamal Behery Mohamed Abouhawwash mehedi masud Hanan Aljuaid Ahmed Ismail Ebada 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期2007-2023,共17页
The accuracy offingerprint recognition model is extremely important due to its usage in forensic and securityfields.Anyfingerprint recognition system has particular network architecture whereas many other networks achiev... The accuracy offingerprint recognition model is extremely important due to its usage in forensic and securityfields.Anyfingerprint recognition system has particular network architecture whereas many other networks achieve higher accuracy.To solve this problem in a unified model,this paper proposes a model that can automatically specify itself.So,it is called an automatic deep neural net-work(ADNN).Our algorithm can specify the appropriate architecture of the neur-al network used and some significant parameters of this network.These parameters are the number offilters,epochs,and iterations.It guarantees the high-est accuracy by updating itself until achieving 99%accuracy then it stops and out-puts the result.Moreover,this paper proposes an end-to-end methodology for recognizing a person’s identity from the inputfingerprint image based on a resi-dual convolutional neural network.It is a complete system and is fully automated whether in the features extraction stage or the classification stage.Our goal is to automate thisfingerprint recognition system because the more automatic the sys-tem is,the more time and effort it saves.Our model also allows users to react by inputting the initial values of these parameters.Then,the model updates itself until itfinds the optimal values for the parameters and achieves the best accuracy.Another advantage of our algorithm is that it can recognize people from their thumb and otherfingers and its ability to recognize distorted samples.Our algo-rithm achieved 99.75%accuracy on the publicfingerprint dataset(SOCOFing).This is the best accuracy compared with other models. 展开更多
关键词 Automatic system fingerprint classification residual networks deep learning
下载PDF
An Improved Encoder-Decoder CNN with Region-Based Filtering for Vibrant Colorization
18
作者 Mrityunjoy Gain Md Arifur Rahman +4 位作者 Rameswar Debnath MrimMAlnfiai Abdullah Sheikh mehedi masud Anupam Kumar Bairagi 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1059-1077,共19页
Colorization is the practice of adding appropriate chromatic values to monochrome photographs or videos.A real-valued luminance image can be mapped to a three-dimensional color image.However,it is a severely ill-defin... Colorization is the practice of adding appropriate chromatic values to monochrome photographs or videos.A real-valued luminance image can be mapped to a three-dimensional color image.However,it is a severely ill-defined problem and not has a single solution.In this paper,an encoder-decoder Convolutional Neural Network(CNN)model is used for colorizing gray images where the encoder is a Densely Connected Convolutional Network(DenseNet)and the decoder is a conventional CNN.The DenseNet extracts image features from gray images and the conventional CNN outputs a^(*)b^(*)color channels.Due to a large number of desaturated color components compared to saturated color components in the training images,the saturated color components have a strong tendency towards desaturated color components in the predicted a^(*)b^(*)channel.To solve the problems,we rebalance the predicted a^(*)b^(*)color channel by smoothing every subregion individually using the average filter.2 stage k-means clustering technique is applied to divide the subregions.Then we apply Gamma transformation in the entire a^(*)b^(*)channel to saturate the image.We compare our proposed method with several existing methods.From the experimental results,we see that our proposed method has made some notable improvements over the existing methods and color representation of gray-scale images by our proposed method is more plausible to visualize.Additionally,our suggested approach beats other approaches in terms of Peak Signal-to-Noise Ratio(PSNR),Structural Similarity Index Measure(SSIM)and Histogram. 展开更多
关键词 COLORIZATION DenseNet desaturation K-MEANS
下载PDF
A Novel Approximate Message Passing Detection for Massive MIMO 5G System
19
作者 Nidhi Gour Rajneesh Pareek +5 位作者 Karthikeyan Rajagopal Himanshu Sharma Mrim M.Alnfiai Mohammed A.AlZain mehedi masud Arun Kumar 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2827-2835,共9页
Massive-Multiple Inputs and Multiple Outputs(M-MIMO)is considered as one of the standard techniques in improving the performance of Fifth Generation(5G)radio.5G signal detection with low propagation delay and high thr... Massive-Multiple Inputs and Multiple Outputs(M-MIMO)is considered as one of the standard techniques in improving the performance of Fifth Generation(5G)radio.5G signal detection with low propagation delay and high throughput with minimum computational intricacy are some of the serious concerns in the deployment of 5G.The evaluation of 5G promises a high quality of service(QoS),a high data rate,low latency,and spectral efficiency,ensuring several applications that will improve the services in every sector.The existing detection techniques cannot be utilised in 5G and beyond 5G due to the high complexity issues in their implementation.In the proposed article,the Approximation Message Passing(AMP)is implemented and compared with the existing Minimum Mean Square Error(MMSE)and Message Passing Detector(MPD)algorithms.The outcomes of the work show that the performance of Bit Error Rate(BER)is improved with minimal complexity. 展开更多
关键词 AMP MMSE MPD 5G
下载PDF
Unmanned Aerial Vehicle Assisted Forest Fire Detection Using Deep Convolutional Neural Network
20
作者 A.K.Z Rasel Rahman S.M.Nabil Sakif +3 位作者 Niloy Sikder mehedi masud Hanan Aljuaid Anupam Kumar Bairagi 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3259-3277,共19页
Disasters may occur at any time and place without little to no presage in advance.With the development of surveillance and forecasting systems,it is now possible to forebode the most life-threatening and formidable di... Disasters may occur at any time and place without little to no presage in advance.With the development of surveillance and forecasting systems,it is now possible to forebode the most life-threatening and formidable disasters.However,forestfires are among the ones that are still hard to anticipate beforehand,and the technologies to detect and plot their possible courses are still in development.Unmanned Aerial Vehicle(UAV)image-basedfire detection systems can be a viable solution to this problem.However,these automatic systems use advanced deep learning and image processing algorithms at their core and can be tuned to provide accurate outcomes.Therefore,this article proposed a forestfire detection method based on a Convolutional Neural Network(CNN)architecture using a newfire detection dataset.Notably,our method also uses separable convolution layers(requiring less computational resources)for immediatefire detection and typical convolution layers.Thus,making it suitable for real-time applications.Consequently,after being trained on the dataset,experimental results show that the method can identify forestfires within images with a 97.63%accuracy,98.00%F1 Score,and 80%Kappa.Hence,if deployed in practical circumstances,this identification method can be used as an assistive tool to detectfire outbreaks,allowing the authorities to respond quickly and deploy preventive measures to minimize damage. 展开更多
关键词 Forestfire detection UAV CNN machine learning
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部