期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Improving the Transmission Security of Vein Images Using a Bezier Curve and Long Short-Term Memory
1
作者 Ahmed H.Alhadethi Ikram Smaoui +1 位作者 Ahmed Fakhfakh saad m.darwish 《Computers, Materials & Continua》 SCIE EI 2024年第6期4825-4844,共20页
The act of transmitting photos via the Internet has become a routine and significant activity.Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that c... The act of transmitting photos via the Internet has become a routine and significant activity.Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that can still be further enhanced.This study presents a system that employs a range of approaches and algorithms to ensure the security of transmitted venous images.The main goal of this work is to create a very effective system for compressing individual biometrics in order to improve the overall accuracy and security of digital photographs by means of image compression.This paper introduces a content-based image authentication mechanism that is suitable for usage across an untrusted network and resistant to data loss during transmission.By employing scale attributes and a key-dependent parametric Long Short-Term Memory(LSTM),it is feasible to improve the resilience of digital signatures against image deterioration and strengthen their security against malicious actions.Furthermore,the successful implementation of transmitting biometric data in a compressed format over a wireless network has been accomplished.For applications involving the transmission and sharing of images across a network.The suggested technique utilizes the scalability of a structural digital signature to attain a satisfactory equilibrium between security and picture transfer.An effective adaptive compression strategy was created to lengthen the overall lifetime of the network by sharing the processing of responsibilities.This scheme ensures a large reduction in computational and energy requirements while minimizing image quality loss.This approach employs multi-scale characteristics to improve the resistance of signatures against image deterioration.The proposed system attained a Gaussian noise value of 98%and a rotation accuracy surpassing 99%. 展开更多
关键词 Image transmission image compression text hiding Bezier curve Histogram of Oriented Gradients(HOG) LSTM image enhancement Gaussian noise ROTATION
下载PDF
An Adaptive Hate Speech Detection Approach Using Neutrosophic Neural Networks for Social Media Forensics
2
作者 Yasmine M.Ibrahim Reem Essameldin saad m.darwish 《Computers, Materials & Continua》 SCIE EI 2024年第4期243-262,共20页
Detecting hate speech automatically in social media forensics has emerged as a highly challenging task due tothe complex nature of language used in such platforms. Currently, several methods exist for classifying hate... Detecting hate speech automatically in social media forensics has emerged as a highly challenging task due tothe complex nature of language used in such platforms. Currently, several methods exist for classifying hatespeech, but they still suffer from ambiguity when differentiating between hateful and offensive content and theyalso lack accuracy. The work suggested in this paper uses a combination of the Whale Optimization Algorithm(WOA) and Particle Swarm Optimization (PSO) to adjust the weights of two Multi-Layer Perceptron (MLPs)for neutrosophic sets classification. During the training process of the MLP, the WOA is employed to exploreand determine the optimal set of weights. The PSO algorithm adjusts the weights to optimize the performanceof the MLP as fine-tuning. Additionally, in this approach, two separate MLP models are employed. One MLPis dedicated to predicting degrees of truth membership, while the other MLP focuses on predicting degrees offalse membership. The difference between these memberships quantifies uncertainty, indicating the degree ofindeterminacy in predictions. The experimental results indicate the superior performance of our model comparedto previous work when evaluated on the Davidson dataset. 展开更多
关键词 Hate speech detection whale optimization neutrosophic sets social media forensics
下载PDF
Type-2 Neutrosophic Set and Their Applications in Medical Databases Deadlock Resolution
3
作者 Marwan H.Hassan saad m.darwish Saleh M.Elkaffas 《Computers, Materials & Continua》 SCIE EI 2023年第2期4417-4434,共18页
Electronic patient data gives many advantages,but also new difficulties.Deadlocks may delay procedures like acquiring patient information.Distributed deadlock resolution solutions introduce uncertainty due to inaccura... Electronic patient data gives many advantages,but also new difficulties.Deadlocks may delay procedures like acquiring patient information.Distributed deadlock resolution solutions introduce uncertainty due to inaccurate transaction properties.Soft computing-based solutions have been developed to solve this challenge.In a single framework,ambiguous,vague,incomplete,and inconsistent transaction attribute information has received minimal attention.The work presented in this paper employed type-2 neutrosophic logic,an extension of type-1 neutrosophic logic,to handle uncertainty in real-time deadlock-resolving systems.The proposed method is structured to reflect multiple types of knowledge and relations among transactions’features that include validation factor degree,slackness degree,degree of deadline-missed transaction based on the degree of membership of truthiness,degree ofmembership of indeterminacy,and degree ofmembership of falsity.Here,the footprint of uncertainty(FOU)for truth,indeterminacy,and falsity represents the level of uncertainty that exists in the value of a grade of membership.We employed a distributed real-time transaction processing simulator(DRTTPS)to conduct the simulations and conducted experiments using the benchmark Pima Indians diabetes dataset(PIDD).As the results showed,there is an increase in detection rate and a large drop in rollback rate when this new strategy is used.The performance of Type-2 neutrosophicbased resolution is better than the Type-1 neutrosophic-based approach on the execution ratio scale.The improvement rate has reached 10%to 20%,depending on the number of arrived transactions. 展开更多
关键词 Deadlock recovery type-2 neutrosophic set healthcare databases distributed deadlock detection
下载PDF
One-Class Arabic Signature Verification: A Progressive Fusion of Optimal Features
4
作者 Ansam A.Abdulhussien Mohammad F.Nasrudin +1 位作者 saad m.darwish Zaid A.Alyasseri 《Computers, Materials & Continua》 SCIE EI 2023年第4期219-242,共24页
Signature verification is regarded as the most beneficial behavioral characteristic-based biometric feature in security and fraud protection.It is also a popular biometric authentication technology in forensic and com... Signature verification is regarded as the most beneficial behavioral characteristic-based biometric feature in security and fraud protection.It is also a popular biometric authentication technology in forensic and commercial transactions due to its various advantages,including noninvasiveness,user-friendliness,and social and legal acceptability.According to the literature,extensive research has been conducted on signature verification systems in a variety of languages,including English,Hindi,Bangla,and Chinese.However,the Arabic Offline Signature Verification(OSV)system is still a challenging issue that has not been investigated as much by researchers due to the Arabic script being distinguished by changing letter shapes,diacritics,ligatures,and overlapping,making verification more difficult.Recently,signature verification systems have shown promising results for recognizing signatures that are genuine or forgeries;however,performance on skilled forgery detection is still unsatisfactory.Most existing methods require many learning samples to improve verification accuracy,which is a major drawback because the number of available signature samples is often limited in the practical application of signature verification systems.This study addresses these issues by presenting an OSV system based on multifeature fusion and discriminant feature selection using a genetic algorithm(GA).In contrast to existing methods,which use multiclass learning approaches,this study uses a oneclass learning strategy to address imbalanced signature data in the practical application of a signature verification system.The proposed approach is tested on three signature databases(SID)-Arabic handwriting signatures,CEDAR(Center of Excellence for Document Analysis and Recognition),and UTSIG(University of Tehran Persian Signature),and experimental results show that the proposed system outperforms existing systems in terms of reducing the False Acceptance Rate(FAR),False Rejection Rate(FRR),and Equal Error Rate(ERR).The proposed system achieved 5%improvement. 展开更多
关键词 Offline signature verification biometric system feature fusion one-class classifier
下载PDF
An Adaptive Privacy Preserving Framework for Distributed Association Rule Mining in Healthcare Databases
5
作者 Hasanien K.Kuba Mustafa A.Azzawi +2 位作者 saad m.darwish Oday A.Hassen Ansam A.Abdulhussein 《Computers, Materials & Continua》 SCIE EI 2023年第2期4119-4133,共15页
It is crucial,while using healthcare data,to assess the advantages of data privacy against the possible drawbacks.Data from several sources must be combined for use in many data mining applications.The medical practit... It is crucial,while using healthcare data,to assess the advantages of data privacy against the possible drawbacks.Data from several sources must be combined for use in many data mining applications.The medical practitioner may use the results of association rule mining performed on this aggregated data to better personalize patient care and implement preventive measures.Historically,numerous heuristics(e.g.,greedy search)and metaheuristics-based techniques(e.g.,evolutionary algorithm)have been created for the positive association rule in privacy preserving data mining(PPDM).When it comes to connecting seemingly unrelated diseases and drugs,negative association rules may be more informative than their positive counterparts.It is well-known that during negative association rules mining,a large number of uninteresting rules are formed,making this a difficult problem to tackle.In this research,we offer an adaptive method for negative association rule mining in vertically partitioned healthcare datasets that respects users’privacy.The applied approach dynamically determines the transactions to be interrupted for information hiding,as opposed to predefining them.This study introduces a novel method for addressing the problem of negative association rules in healthcare data mining,one that is based on the Tabu-genetic optimization paradigm.Tabu search is advantageous since it removes a huge number of unnecessary rules and item sets.Experiments using benchmark healthcare datasets prove that the discussed scheme outperforms state-of-the-art solutions in terms of decreasing side effects and data distortions,as measured by the indicator of hiding failure. 展开更多
关键词 Distributed data mining evolutionary computation sanitization process healthcare informatics
下载PDF
Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network 被引量:1
6
作者 Mohamed Ali Ibrahim A.Abd El-Moghith +1 位作者 Mohamed N.El-Derini saad m.darwish 《Computers, Materials & Continua》 SCIE EI 2022年第3期6127-6140,共14页
Routing is a key function inWireless Sensor Networks(WSNs)since it facilitates data transfer to base stations.Routing attacks have the potential to destroy and degrade the functionality ofWSNs.A trustworthy routing sy... Routing is a key function inWireless Sensor Networks(WSNs)since it facilitates data transfer to base stations.Routing attacks have the potential to destroy and degrade the functionality ofWSNs.A trustworthy routing system is essential for routing security andWSN efficiency.Numerous methods have been implemented to build trust between routing nodes,including the use of cryptographic methods and centralized routing.Nonetheless,the majority of routing techniques are unworkable in reality due to the difficulty of properly identifying untrusted routing node activities.At the moment,there is no effective way to avoid malicious node attacks.As a consequence of these concerns,this paper proposes a trusted routing technique that combines blockchain infrastructure,deep neural networks,and Markov Decision Processes(MDPs)to improve the security and efficiency of WSN routing.To authenticate the transmission process,the suggested methodology makes use of a Proof of Authority(PoA)mechanism inside the blockchain network.The validation group required for proofing is chosen using a deep learning approach that prioritizes each node’s characteristics.MDPs are then utilized to determine the suitable next-hop as a forwarding node capable of securely transmitting messages.According to testing data,our routing system outperforms current routing algorithms in a 50%malicious node routing scenario. 展开更多
关键词 Wireless sensor networks trusted routing deep neural network blockchain markov decision
下载PDF
Nature-Inspired Level Set Segmentation Model for 3D-MRI Brain Tumor Detection 被引量:1
7
作者 Oday Ali Hassen Sarmad Omar Abter +3 位作者 Ansam A.Abdulhussein saad m.darwish Yasmine M.Ibrahim Walaa Sheta 《Computers, Materials & Continua》 SCIE EI 2021年第7期961-981,共21页
Medical image segmentation has consistently been a significant topic of research and a prominent goal,particularly in computer vision.Brain tumor research plays a major role in medical imaging applications by providin... Medical image segmentation has consistently been a significant topic of research and a prominent goal,particularly in computer vision.Brain tumor research plays a major role in medical imaging applications by providing a tremendous amount of anatomical and functional knowledge that enhances and allows easy diagnosis and disease therapy preparation.To prevent or minimize manual segmentation error,automated tumor segmentation,and detection became the most demanding process for radiologists and physicians as the tumor often has complex structures.Many methods for detection and segmentation presently exist,but all lack high accuracy.This paper’s key contribution focuses on evaluating machine learning techniques that are supposed to reduce the effect of frequently found issues in brain tumor research.Furthermore,attention concentrated on the challenges related to level set segmentation.The study proposed in this paper uses the Population-based Artificial Bee Colony Clustering(P-ABCC)methodology to reliably collect initial contour points,which helps minimize the number of iterations and segmentation errors of the level-set process.The proposed model measures cluster centroids(ABC populations)and uses a level-set approach to resolve contour differences as brain tumors vary as they have irregular form,structure,and volume.The suggested model comprises of three major steps:first,pre-processing to separate the brain from the head and improves contrast stretching.Secondly,P-ABCC is used to obtain tumor edges that are utilized as an initial MRI sequence contour.The level-set segmentation is then used to detect tumor regions from all volume slices with fewer iterations.Results suggest improved model efficiency compared to state-of-the-art methods for both datasets BRATS 2019 and BRATS 2017.At BRATS 2019,dice progress was achieved for Entire Tumor(WT),Tumor Center(TC),and Improved Tumor(ET)by 0.03%,0.03%,and 0.01%respectively.At BRATS 2017,an increase in precision for WT was reached by 5.27%. 展开更多
关键词 3D-MRI tumor diagnosis bio-inspired clustering ABC optimization multimodal detection
下载PDF
Database Recovery Technique for Mobile Computing:A Game Theory Approach
8
作者 Magda M.Madbouly Yasser F.Mokhtar saad m.darwish 《Computers, Materials & Continua》 SCIE EI 2022年第2期3205-3219,共15页
Contact between mobile hosts and database servers presents many problems in theMobile Database System(MDS).It is harmed by a variety of causes,including handoff,inadequate capacity,frequent transaction updates,and rep... Contact between mobile hosts and database servers presents many problems in theMobile Database System(MDS).It is harmed by a variety of causes,including handoff,inadequate capacity,frequent transaction updates,and repeated failures,both of which contribute to serious issues with the information system’s consistency.However,error tolerance technicality allows devices to continue performing their functions in the event of a failure.The aim of this paper is to identify the optimal recovery approach from among the available state-of-the-art techniques in MDS by employing game theory.Several of the presented recovery protocols are chosen and evaluated in order to determine the most critical factors affecting the recovery mechanism,such as the number of processes,the time required to deliver messages,and the number of messages logged-in time.Then,using the suggested payout matrix,the game theory strategy is adapted to choose the optimum recovery technique for the specified environmental variables.The NS2 simulatorwas used to carry out the tests and apply the chosen recovery protocols.The experiments validate the proposed model’s usefulness in comparison to other methods. 展开更多
关键词 Mobile computing game theory decision making mobile database recovery
下载PDF
Realistic Smile Expression Recognition Approach Using Ensemble Classifier with Enhanced Bagging
9
作者 Oday A.Hassen Nur Azman Abu +1 位作者 Zaheera Zainal Abidin saad m.darwish 《Computers, Materials & Continua》 SCIE EI 2022年第2期2453-2469,共17页
A robust smile recognition system could be widely used for many real-world applications.Classification of a facial smile in an unconstrained setting is difficult due to the invertible and wide variety in face images.I... A robust smile recognition system could be widely used for many real-world applications.Classification of a facial smile in an unconstrained setting is difficult due to the invertible and wide variety in face images.In this paper,an adaptive model for smile expression classification is suggested that integrates a fast features extraction algorithm and cascade classifiers.Our model takes advantage of the intrinsic association between face detection,smile,and other face features to alleviate the over-fitting issue on the limited training set and increase classification results.The features are extracted taking into account to exclude any unnecessary coefficients in the feature vector;thereby enhancing the discriminatory capacity of the extracted features and reducing the computational process.Still,the main causes of error in learning are due to noise,bias,and variance.Ensemble helps to minimize these factors.Combinations of multiple classifiers decrease variance,especially in the case of unstable classifiers,and may produce a more reliable classification than a single classifier.However,a shortcoming of bagging as the best ensemble classifier is its random selection,where the classification performance relies on the chance to pick an appropriate subset of training items.The suggested model employs a modified form of bagging while creating training sets to deal with this challenge(error-based bootstrapping).The experimental results for smile classification on the JAFFE,CK+,and CK+48 benchmark datasets show the feasibility of our proposed model. 展开更多
关键词 Ensemble classifier smile expression detection features extraction
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部