期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Deep Learning Empowered Cybersecurity Spam Bot Detection for Online Social Networks 被引量:1
1
作者 Mesfer Al Duhayyim Haya Mesfer Alshahrani +3 位作者 Fahd NAl-Wesabi mohammed alamgeer Anwer Mustafa Hilal mohammed Rizwanullah 《Computers, Materials & Continua》 SCIE EI 2022年第3期6257-6270,共14页
Cybersecurity encompasses various elements such as strategies,policies,processes,and techniques to accomplish availability,confidentiality,and integrity of resource processing,network,software,and data from attacks.In... Cybersecurity encompasses various elements such as strategies,policies,processes,and techniques to accomplish availability,confidentiality,and integrity of resource processing,network,software,and data from attacks.In this scenario,the rising popularity of Online Social Networks(OSN)is under threat from spammers for which effective spam bot detection approaches should be developed.Earlier studies have developed different approaches for the detection of spam bots in OSN.But those techniques primarily concentrated on hand-crafted features to capture the features of malicious users while the application of Deep Learning(DL)models needs to be explored.With this motivation,the current research article proposes a Spam Bot Detection technique using Hybrid DL model abbreviated as SBDHDL.The proposed SBD-HDL technique focuses on the detection of spam bots that exist in OSNs.The technique has different stages of operations such as pre-processing,classification,and parameter optimization.Besides,SBD-HDL technique hybridizes Graph Convolutional Network(GCN)with Recurrent Neural Network(RNN)model for spam bot classification process.In order to enhance the detection performance of GCN-RNN model,hyperparameters are tuned using Lion Optimization Algorithm(LOA).Both hybridization of GCN-RNN and LOA-based hyperparameter tuning process make the current work,a first-of-its-kind in this domain.The experimental validation of the proposed SBD-HDL technique,conducted upon benchmark dataset,established the supremacy of the technique since it was validated under different measures. 展开更多
关键词 CYBERSECURITY spam bot data classification social networks TWITTER deep learning
下载PDF
Intelligent Deep Learning Based Automated Fish Detection Model for UWSN
2
作者 Mesfer Al Duhayyim Haya Mesfer Alshahrani +3 位作者 Fahd NAl-Wesabi mohammed alamgeer Anwer Mustafa Hilal Manar Ahmed Hamza 《Computers, Materials & Continua》 SCIE EI 2022年第3期5871-5887,共17页
An exponential growth in advanced technologies has resulted in the exploration of Ocean spaces.It has paved the way for new opportunities that can address questions relevant to diversity,uniqueness,and difficulty of m... An exponential growth in advanced technologies has resulted in the exploration of Ocean spaces.It has paved the way for new opportunities that can address questions relevant to diversity,uniqueness,and difficulty of marine life.Underwater Wireless Sensor Networks(UWSNs)are widely used to leverage such opportunities while these networks include a set of vehicles and sensors to monitor the environmental conditions.In this scenario,it is fascinating to design an automated fish detection technique with the help of underwater videos and computer vision techniques so as to estimate and monitor fish biomass in water bodies.Several models have been developed earlier for fish detection.However,they lack robustness to accommodate considerable differences in scenes owing to poor luminosity,fish orientation,structure of seabed,aquatic plantmovement in the background and distinctive shapes and texture of fishes from different genus.With this motivation,the current research article introduces an Intelligent Deep Learning based Automated Fish Detection model for UWSN,named IDLAFD-UWSN model.The presented IDLAFD-UWSN model aims at automatic detection of fishes from underwater videos,particularly in blurred and crowded environments.IDLAFD-UWSN model makes use of Mask Region Convolutional Neural Network(Mask RCNN)with Capsule Network as a baseline model for fish detection.Besides,in order to train Mask RCNN,background subtraction process using GaussianMixtureModel(GMM)model is applied.This model makes use of motion details of fishes in video which consequently integrates the outcome with actual image for the generation of fish-dependent candidate regions.Finally,Wavelet Kernel Extreme Learning Machine(WKELM)model is utilized as a classifier model.The performance of the proposed IDLAFD-UWSN model was tested against benchmark underwater video dataset and the experimental results achieved by IDLAFD-UWSN model were promising in comparison with other state-of-the-art methods under different aspects with the maximum accuracy of 98%and 97%on the applied blurred and crowded datasets respectively. 展开更多
关键词 AQUACULTURE background subtraction deep learning fish detection marine surveillance underwater sensor networks
下载PDF
An Optimal Text Watermarking Method for Sensitive Detecting of Illegal Tampering Attacks
3
作者 Anwer Mustafa Hilal Fahd N.Al-Wesabi +3 位作者 mohammed alamgeer Manar Ahmed Hamza Mohammad Mahzari Murad A.Almekhlafi 《Computers, Materials & Continua》 SCIE EI 2022年第3期5583-5600,共18页
Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research issue.The main challenges faced by researchers are how ... Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research issue.The main challenges faced by researchers are how to hide the information within the text to use it later for authentication and attacks tampering detection without effects on the meaning and size of the given digital text.In this paper,an efficient text-based watermarking method has been proposed for detecting the illegal tampering attacks on theArabic text transmitted online via an Internet network.Towards this purpose,the accuracy of tampering detection and watermark robustness has been improved of the proposed method as compared with the existing approaches.In the proposed method,both embedding and extracting of the watermark are logically implemented,which causes no change in the digital text.This is achieved by using the third level and alphanumeric strategy of the Markov model as a text analysis technique for analyzing the Arabic contents to obtain its features which are considered as the digital watermark.This digital watermark will be used later to detecting any tampering of illegal attack on the received Arabic text.An extensive set of experiments using four data sets of varying lengths proves the effectiveness of our approach in terms of detection accuracy,robustness,and effectiveness under multiple random locations of the common tampering attacks. 展开更多
关键词 Text analysis text-watermarking tampering detection text authentication
下载PDF
An Optimized Design of Antenna Arrays for the Smart Antenna Systems
4
作者 Fahd N.Al-Wesabi Murad A.A.Almekhlafi +7 位作者 Huda G.Iskandar Adnan Zain Saleh Alzahrani mohammed alamgeer Nadhem Nemri Sami Dhabi Mohammad Medani Ali.M.Al-Sharafi 《Computers, Materials & Continua》 SCIE EI 2021年第11期1979-1994,共16页
In recent years,there has been an increasing demand to improve cellular communication services in several aspects.The aspect that received the most attention is improving the quality of coverage through using smart an... In recent years,there has been an increasing demand to improve cellular communication services in several aspects.The aspect that received the most attention is improving the quality of coverage through using smart antennas which consist of array antennas.this paper investigates the main characteristics and design of the three types of array antennas of the base station for better coverage through simulation(MATLAB)which provides field and strength patterns measured in polar and rectangular coordinates for a variety of conditions including broadsides,ordinary End-fire,and increasing directivity End-fire which is typically used in smart antennas.The method of analysis was applied to twenty experiments of process design to each antenna type separately,so sixty results were obtained from the radiation pattern indicating the parameters for each radiation pattern.Moreover,nineteen design experiments were described in this section.It is hoped that the results obtained from this study will help engineers solve coverage problems as well as improve the quality of cellular communication networks. 展开更多
关键词 Smart antenna antenna arrays patterns construction COVERAGE
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部