期刊文献+
共找到47篇文章
< 1 2 3 >
每页显示 20 50 100
Network traffic classification:Techniques,datasets,and challenges
1
作者 Ahmad Azab Mahmoud Khasawneh +2 位作者 Saed Alrabaee Kim-Kwang Raymond Choo Maysa Sarsour 《Digital Communications and Networks》 SCIE CSCD 2024年第3期676-692,共17页
In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the... In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the quality of service,preventing application choke points,and facilitating malicious behavior identification.In this paper,we review existing network classification techniques,such as port-based identification and those based on deep packet inspection,statistical features in conjunction with machine learning,and deep learning algorithms.We also explain the implementations,advantages,and limitations associated with these techniques.Our review also extends to publicly available datasets used in the literature.Finally,we discuss existing and emerging challenges,as well as future research directions. 展开更多
关键词 Network classification Machine learning Deep learning Deep packet inspection Traffic monitoring
下载PDF
Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine
2
作者 Arslan Akram Imran Khan +4 位作者 Javed Rashid Mubbashar Saddique Muhammad Idrees Yazeed Yasin Ghadi Abdulmohsen Algarni 《Computers, Materials & Continua》 SCIE EI 2024年第1期1311-1328,共18页
Algorithms for steganography are methods of hiding data transfers in media files.Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial i... Algorithms for steganography are methods of hiding data transfers in media files.Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image analysis.Images with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for classification.To address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of images.Support Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or cover.The Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the proposedmethod.Using WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods. 展开更多
关键词 CURVELETS fast fourier transformation support vector machine high pass filters STEGANOGRAPHY
下载PDF
Enhancing Mild Cognitive Impairment Detection through Efficient Magnetic Resonance Image Analysis
3
作者 Atif Mehmood Zhonglong Zheng +7 位作者 Rizwan Khan Ahmad Al Smadi Farah Shahid Shahid Iqbal Mutasem K.Alsmadi Yazeed Yasin Ghadi Syed Aziz Shah Mostafa M.Ibrahim 《Computers, Materials & Continua》 SCIE EI 2024年第8期2081-2098,共18页
Neuroimaging has emerged over the last few decades as a crucial tool in diagnosing Alzheimer’s disease(AD).Mild cognitive impairment(MCI)is a condition that falls between the spectrum of normal cognitive function and... Neuroimaging has emerged over the last few decades as a crucial tool in diagnosing Alzheimer’s disease(AD).Mild cognitive impairment(MCI)is a condition that falls between the spectrum of normal cognitive function and AD.However,previous studies have mainly used handcrafted features to classify MCI,AD,and normal control(NC)individuals.This paper focuses on using gray matter(GM)scans obtained through magnetic resonance imaging(MRI)for the diagnosis of individuals with MCI,AD,and NC.To improve classification performance,we developed two transfer learning strategies with data augmentation(i.e.,shear range,rotation,zoom range,channel shift).The first approach is a deep Siamese network(DSN),and the second approach involves using a cross-domain strategy with customized VGG-16.We performed experiments on the Alzheimer’s Disease Neuroimaging Initiative(ADNI)dataset to evaluate the performance of our proposed models.Our experimental results demonstrate superior performance in classifying the three binary classification tasks:NC vs.AD,NC vs.MCI,and MCI vs.AD.Specifically,we achieved a classification accuracy of 97.68%,94.25%,and 92.18%for the three cases,respectively.Our study proposes two transfer learning strategies with data augmentation to accurately diagnose MCI,AD,and normal control individuals using GM scans.Our findings provide promising results for future research and clinical applications in the early detection and diagnosis of AD. 展开更多
关键词 Alzheimer’s disease mild cognitive impairment normal control transfer learning CLASSIFICATION augmentation
下载PDF
A novel medical image data protection scheme for smart healthcare system
4
作者 Mujeeb Ur Rehman Arslan Shafique +6 位作者 Muhammad Shahbaz Khan Maha Driss Wadii Boulila Yazeed Yasin Ghadi Suresh Babu Changalasetty Majed Alhaisoni Jawad Ahmad 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第4期821-836,共16页
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the Internet.Recently,smart healthcare has emerged as a significant application of ... The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the Internet.Recently,smart healthcare has emerged as a significant application of the IoMT,particularly in the context of knowledge‐based learning systems.Smart healthcare systems leverage knowledge‐based learning to become more context‐aware,adaptable,and auditable while maintain-ing the ability to learn from historical data.In smart healthcare systems,devices capture images,such as X‐rays,Magnetic Resonance Imaging.The security and integrity of these images are crucial for the databases used in knowledge‐based learning systems to foster structured decision‐making and enhance the learning abilities of AI.Moreover,in knowledge‐driven systems,the storage and transmission of HD medical images exert a burden on the limited bandwidth of the communication channel,leading to data trans-mission delays.To address the security and latency concerns,this paper presents a lightweight medical image encryption scheme utilising bit‐plane decomposition and chaos theory.The results of the experiment yield entropy,energy,and correlation values of 7.999,0.0156,and 0.0001,respectively.This validates the effectiveness of the encryption system proposed in this paper,which offers high‐quality encryption,a large key space,key sensitivity,and resistance to statistical attacks. 展开更多
关键词 data analysis medical image processing SECURITY
下载PDF
Synergistic Swarm Optimization Algorithm
5
作者 Sharaf Alzoubi Laith Abualigah +3 位作者 Mohamed Sharaf Mohammad Sh.Daoud Nima Khodadadi Heming Jia 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期2557-2604,共48页
This research paper presents a novel optimization method called the Synergistic Swarm Optimization Algorithm(SSOA).The SSOA combines the principles of swarmintelligence and synergistic cooperation to search for optima... This research paper presents a novel optimization method called the Synergistic Swarm Optimization Algorithm(SSOA).The SSOA combines the principles of swarmintelligence and synergistic cooperation to search for optimal solutions efficiently.A synergistic cooperation mechanism is employed,where particles exchange information and learn from each other to improve their search behaviors.This cooperation enhances the exploitation of promising regions in the search space while maintaining exploration capabilities.Furthermore,adaptive mechanisms,such as dynamic parameter adjustment and diversification strategies,are incorporated to balance exploration and exploitation.By leveraging the collaborative nature of swarm intelligence and integrating synergistic cooperation,the SSOAmethod aims to achieve superior convergence speed and solution quality performance compared to other optimization algorithms.The effectiveness of the proposed SSOA is investigated in solving the 23 benchmark functions and various engineering design problems.The experimental results highlight the effectiveness and potential of the SSOA method in addressing challenging optimization problems,making it a promising tool for a wide range of applications in engineering and beyond.Matlab codes of SSOA are available at:https://www.mathworks.com/matlabcentral/fileexchange/153466-synergistic-swarm-optimization-algorithm. 展开更多
关键词 Synergistic swarm optimization algorithm optimization algorithm METAHEURISTIC engineering problems benchmark functions
下载PDF
Pedestrian Physical Education Training Over Visualization Tool
6
作者 Tamara al Shloul Israr Akhter +3 位作者 Suliman A.Alsuhibany Yazeed Yasin Ghadi Ahmad Jalal Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2022年第11期2389-2405,共17页
E-learning approaches are one of the most important learning platforms for the learner through electronic equipment.Such study techniques are useful for other groups of learners such as the crowd,pedestrian,sports,tra... E-learning approaches are one of the most important learning platforms for the learner through electronic equipment.Such study techniques are useful for other groups of learners such as the crowd,pedestrian,sports,transports,communication,emergency services,management systems and education sectors.E-learning is still a challenging domain for researchers and developers to find new trends and advanced tools and methods.Many of them are currently working on this domain to fulfill the requirements of industry and the environment.In this paper,we proposed a method for pedestrian behavior mining of aerial data,using deep flow feature,graph mining technique,and convocational neural network.For input data,the state-of-the-art crowd activity University of Minnesota(UMN)dataset is adopted,which contains the aerial indoor and outdoor view of the pedestrian,for simplification of extra information and computational cost reduction the pre-processing is applied.Deep flow features are extracted to find more accurate information.Furthermore,to deal with repetition in features data and features mining the graph mining algorithm is applied,while Convolution Neural Network(CNN)is applied for pedestrian behavior mining.The proposed method shows 84.50%of mean accuracy and a 15.50%of error rate.Therefore,the achieved results show more accuracy as compared to state-ofthe-art classification algorithms such as decision tree,artificial neural network(ANN). 展开更多
关键词 Artificial intelligence behavior mining convolution neural network(CNN) deep flow e-learning environment
下载PDF
Analysis and Design of University Teaching Equipment Management Information System
7
作者 Yu Xue Xiang Jiao +2 位作者 Chishe Wang Huanlun Chen Moayad Aloqaily 《Journal of Cyber Security》 2021年第3期177-185,共9页
Teaching equipment management is an important factor for colleges and universities to improve their teaching level,and its management level directly affects the service life and efficiency of teaching equipment.But in... Teaching equipment management is an important factor for colleges and universities to improve their teaching level,and its management level directly affects the service life and efficiency of teaching equipment.But in recent years,our university recruitment of students scale is increasing year by year,the size of the corresponding teaching equipment is also growing,therefore to develop a teaching equipment management information system is necessary,not only can help universities to effective use of the existing teaching resources,also can update scrap equipment,related equipment maintenance,and build a good learning environment to students and to the improvement of the teaching quality of colleges and universities play a reliable safeguard role.This paper first introduces some common development tools,and then analyzes the user functional requirements and data requirements of the system,and analyzes the feasibility of the system development from many aspects,finally based on B/S mode,using Java language,JSP technology and MySQL database design and implementation of a teaching equipment management information system.The main functional modules of the system include equipment basic information management,equipment loan and return information management,equipment maintenance information management,equipment scrap information management,the interface of each functional module is shown in the paper. 展开更多
关键词 Information systems teaching equipment management system analysis
下载PDF
Home Automation-Based Health Assessment Along Gesture Recognition via Inertial Sensors
8
作者 Hammad Rustam Muhammad Muneeb +4 位作者 Suliman A.Alsuhibany Yazeed Yasin Ghadi Tamara Al Shloul Ahmad Jalal Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2023年第4期2331-2346,共16页
Hand gesture recognition (HGR) is used in a numerous applications,including medical health-care, industrial purpose and sports detection.We have developed a real-time hand gesture recognition system using inertialsens... Hand gesture recognition (HGR) is used in a numerous applications,including medical health-care, industrial purpose and sports detection.We have developed a real-time hand gesture recognition system using inertialsensors for the smart home application. Developing such a model facilitatesthe medical health field (elders or disabled ones). Home automation has alsobeen proven to be a tremendous benefit for the elderly and disabled. Residentsare admitted to smart homes for comfort, luxury, improved quality of life,and protection against intrusion and burglars. This paper proposes a novelsystem that uses principal component analysis, linear discrimination analysisfeature extraction, and random forest as a classifier to improveHGRaccuracy.We have achieved an accuracy of 94% over the publicly benchmarked HGRdataset. The proposed system can be used to detect hand gestures in thehealthcare industry as well as in the industrial and educational sectors. 展开更多
关键词 Genetic algorithm human locomotion activity recognition human–computer interaction human gestures recognition principal hand gestures recognition inertial sensors principal component analysis linear discriminant analysis stochastic neighbor embedding
下载PDF
Infrared Spectroscopy-Based Chemometric Analysis for Lard Differentiation in Meat Samples
9
作者 Muhammad Aadil Siddiqui M.H.Md Khir +3 位作者 Zaka Ullah Muath Al Hasan Abdul Saboor Saeed Ahmed Magsi 《Computers, Materials & Continua》 SCIE EI 2023年第5期2859-2871,共13页
One of the most pressing concerns for the consumer market is the detection of adulteration in meat products due to their preciousness.The rapid and accurate identification mechanism for lard adulteration in meat produ... One of the most pressing concerns for the consumer market is the detection of adulteration in meat products due to their preciousness.The rapid and accurate identification mechanism for lard adulteration in meat products is highly necessary,for developing a mechanism trusted by consumers and that can be used to make a definitive diagnosis.Fourier Transform Infrared Spectroscopy(FTIR)is used in this work to identify lard adulteration in cow,lamb,and chicken samples.A simplified extraction method was implied to obtain the lipids from pure and adulterated meat.Adulterated samples were obtained by mixing lard with chicken,lamb,and beef with different concentrations(10%–50%v/v).Principal component analysis(PCA)and partial least square(PLS)were used to develop a calibration model at 800–3500 cm^(−1).Three-dimension PCA was successfully used by dividing the spectrum in three regions to classify lard meat adulteration in chicken,lamb,and beef samples.The corresponding FTIR peaks for the lard have been observed at 1159.6,1743.4,2853.1,and 2922.5 cm−1,which differentiate chicken,lamb,and beef samples.The wavenumbers offer the highest determination coefficient R2 value of 0.846 and lowest root mean square error of calibration(RMSEC)and root mean square error prediction(RMSEP)with an accuracy of 84.6%.Even the tiniest fat adulteration up to 10%can be reliably discovered using this methodology. 展开更多
关键词 Fourier transform infrared spectroscopy LARD HALAL PCA PLS RMSEC RMSEP
下载PDF
Student’s Health Exercise Recognition Tool for E-Learning Education
10
作者 Tamara al Shloul Madiha Javeed +4 位作者 Munkhjargal Gochoo Suliman AAlsuhibany Yazeed Yasin Ghadi Ahmad Jalal Jeongmin Park 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期149-161,共13页
Due to the recently increased requirements of e-learning systems,multiple educational institutes such as kindergarten have transformed their learning towards virtual education.Automated student health exercise is a di... Due to the recently increased requirements of e-learning systems,multiple educational institutes such as kindergarten have transformed their learning towards virtual education.Automated student health exercise is a difficult task but an important one due to the physical education needs especially in young learners.The proposed system focuses on the necessary implementation of student health exercise recognition(SHER)using a modified Quaternion-basedfilter for inertial data refining and data fusion as the pre-processing steps.Further,cleansed data has been segmented using an overlapping windowing approach followed by patterns identification in the form of static and kinematic signal patterns.Furthermore,these patterns have been utilized to extract cues for both patterned signals,which are further optimized using Fisher’s linear discriminant analysis(FLDA)technique.Finally,the physical exercise activities have been categorized using extended Kalmanfilter(EKF)-based neural networks.This system can be implemented in multiple educational establishments including intelligent training systems,virtual mentors,smart simulations,and interactive learning management methods. 展开更多
关键词 E-LEARNING exercise recognition online physical education student’s healthcare
下载PDF
Automatic Anomaly Monitoring in Public Surveillance Areas
11
作者 Mohammed Alarfaj Mahwish Pervaiz +4 位作者 Yazeed Yasin Ghadi Tamara al Shloul Suliman A.Alsuhibany Ahmad Jalal Jeongmin Park 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2655-2671,共17页
With the dramatic increase in video surveillance applications and public safety measures,the need for an accurate and effective system for abnormal/sus-picious activity classification also increases.Although it has mul... With the dramatic increase in video surveillance applications and public safety measures,the need for an accurate and effective system for abnormal/sus-picious activity classification also increases.Although it has multiple applications,the problem is very challenging.In this paper,a novel approach for detecting nor-mal/abnormal activity has been proposed.We used the Gaussian Mixture Model(GMM)and Kalmanfilter to detect and track the objects,respectively.After that,we performed shadow removal to segment an object and its shadow.After object segmentation we performed occlusion detection method to detect occlusion between multiple human silhouettes and we implemented a novel method for region shrinking to isolate occluded humans.Fuzzy c-mean is utilized to verify human silhouettes and motion based features including velocity and opticalflow are extracted for each identified silhouettes.Gray Wolf Optimizer(GWO)is used to optimize feature set followed by abnormal event classification that is performed using the XG-Boost classifier.This system is applicable in any surveillance appli-cation used for event detection or anomaly detection.Performance of proposed system is evaluated using University of Minnesota(UMN)dataset and UBI(Uni-versity of Beira Interior)-Fight dataset,each having different type of anomaly.The mean accuracy for the UMN and UBI-Fight datasets is 90.14%and 76.9%respec-tively.These results are more accurate as compared to other existing methods. 展开更多
关键词 Abnormal event classification gray wolf optimizer region shrinking xg-boost classifier
下载PDF
Experimental Evaluation of Trilateration-Based Outdoor Localizationwith LoRaWAN
12
作者 Saeed Ahmed Magsi Mohd Haris Bin Md Khir +5 位作者 Illani Bt Mohd Nawi Muath Al Hasan Zaka Ullah Fasih Ullah Khan Abdul Saboor Muhammad Aadil Siddiqui 《Computers, Materials & Continua》 SCIE EI 2023年第4期845-862,共18页
Long Range Wide Area Network (LoRaWAN) in the Internet ofThings (IoT) domain has been the subject of interest for researchers. Thereis an increasing demand to localize these IoT devices using LoRaWAN dueto the quickly... Long Range Wide Area Network (LoRaWAN) in the Internet ofThings (IoT) domain has been the subject of interest for researchers. Thereis an increasing demand to localize these IoT devices using LoRaWAN dueto the quickly growing number of IoT devices. LoRaWAN is well suited tosupport localization applications in IoTs due to its low power consumptionand long range. Multiple approaches have been proposed to solve the localizationproblem using LoRaWAN. The Expected Signal Power (ESP) basedtrilateration algorithm has the significant potential for localization becauseESP can identify the signal’s energy below the noise floor with no additionalhardware requirements and ease of implementation. This research articleoffers the technical evaluation of the trilateration technique, its efficiency,and its limitations for the localization using LoRa ESP in a large outdoorpopulated campus environment. Additionally, experimental evaluations areconducted to determine the effects of frequency hopping, outlier removal, andincreasing the number of gateways on localization accuracy. Results obtainedfrom the experiment show the importance of calculating the path loss exponentfor every frequency to circumvent the high localization error because ofthe frequency hopping, thus improving the localization performance withoutthe need of using only a single frequency. 展开更多
关键词 LoRaWAN LOCALIZATION expected signal power(ESP) path loss exponent(PLE) TRILATERATION
下载PDF
Aspect-Based Sentiment Classification Using Deep Learning and Hybrid of Word Embedding and Contextual Position
13
作者 Waqas Ahmad Hikmat Ullah Khan +3 位作者 Fawaz Khaled Alarfaj Saqib Iqbal Abdullah Mohammad Alomair Naif Almusallam 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期3101-3124,共24页
Aspect-based sentiment analysis aims to detect and classify the sentiment polarities as negative,positive,or neutral while associating them with their identified aspects from the corresponding context.In this regard,p... Aspect-based sentiment analysis aims to detect and classify the sentiment polarities as negative,positive,or neutral while associating them with their identified aspects from the corresponding context.In this regard,prior methodologies widely utilize either word embedding or tree-based rep-resentations.Meanwhile,the separate use of those deep features such as word embedding and tree-based dependencies has become a significant cause of information loss.Generally,word embedding preserves the syntactic and semantic relations between a couple of terms lying in a sentence.Besides,the tree-based structure conserves the grammatical and logical dependencies of context.In addition,the sentence-oriented word position describes a critical factor that influences the contextual information of a targeted sentence.Therefore,knowledge of the position-oriented information of words in a sentence has been considered significant.In this study,we propose to use word embedding,tree-based representation,and contextual position information in combination to evaluate whether their combination will improve the result’s effectiveness or not.In the meantime,their joint utilization enhances the accurate identification and extraction of targeted aspect terms,which also influences their classification process.In this research paper,we propose a method named Attention Based Multi-Channel Convolutional Neural Net-work(Att-MC-CNN)that jointly utilizes these three deep features such as word embedding with tree-based structure and contextual position informa-tion.These three parameters deliver to Multi-Channel Convolutional Neural Network(MC-CNN)that identifies and extracts the potential terms and classifies their polarities.In addition,these terms have been further filtered with the attention mechanism,which determines the most significant words.The empirical analysis proves the proposed approach’s effectiveness compared to existing techniques when evaluated on standard datasets.The experimental results represent our approach outperforms in the F1 measure with an overall achievement of 94%in identifying aspects and 92%in the task of sentiment classification. 展开更多
关键词 Sentiment analysis word embedding aspect extraction consistency tree multichannel convolutional neural network contextual position information
下载PDF
A New S-Box Design System for Data Encryption Using Artificial Bee Colony Algorithm
14
作者 Yazeed Yasin Ghadi Mohammed SAlshehri +4 位作者 Sultan Almakdi Oumaima Saidani Nazik Alturki Fawad Masood Muhammad Shahbaz Khan 《Computers, Materials & Continua》 SCIE EI 2023年第10期781-797,共17页
Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal ... Securing digital image data is a key concern in today’s information-driven society.Effective encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal role in many symmetric encryption systems.This study introduces an innovative approach to creating S-boxes for encryption algorithms.The proposed S-boxes are tested for validity and non-linearity by incorporating them into an image encryption scheme.The nonlinearity measure of the proposed S-boxes is 112.These qualities significantly enhance its resistance to common cryptographic attacks,ensuring high image data security.Furthermore,to assess the robustness of the S-boxes,an encryption system has also been proposed and the proposed S-boxes have been integrated into the designed encryption system.To validate the effectiveness of the proposed encryption system,a comprehensive security analysis including brute force attack and histogram analysis has been performed.In addition,to determine the level of security during the transmission and storage of digital content,the encryption system’s Number of Pixel Change Rate(NPCR),and Unified Averaged Changed Intensity(UACI)are calculated.The results indicate a 99.71%NPCR and 33.51%UACI.These results demonstrate that the proposed S-boxes offer a significant level of security for digital content throughout its transmission and storage. 展开更多
关键词 S-BOX CHAOS artificial bee colony image encryption
下载PDF
A Novel Parallel Computing Confidentiality Scheme Based on Hindmarsh-Rose Model
15
作者 Jawad Ahmad Mimonah Al Qathrady +3 位作者 Mohammed SAlshehri Yazeed Yasin Ghadi Mujeeb Ur Rehman Syed Aziz Shah 《Computers, Materials & Continua》 SCIE EI 2023年第8期1325-1341,共17页
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this network.Additionally,given the limitations of computers,it becomes evenmore important to empl... Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this network.Additionally,given the limitations of computers,it becomes evenmore important to employ efficient and fast image encryption techniques.While 1D chaotic maps offer a practical approach to real-time image encryption,their limited flexibility and increased vulnerability restrict their practical application.In this research,we have utilized a 3DHindmarsh-Rosemodel to construct a secure cryptosystem.The randomness of the chaotic map is assessed through standard analysis.The proposed system enhances security by incorporating an increased number of system parameters and a wide range of chaotic parameters,as well as ensuring a uniformdistribution of chaotic signals across the entire value space.Additionally,a fast image encryption technique utilizing the new chaotic system is proposed.The novelty of the approach is confirmed through time complexity analysis.To further strengthen the resistance against cryptanalysis attacks and differential attacks,the SHA-256 algorithm is employed for secure key generation.Experimental results through a number of parameters demonstrate the strong cryptographic performance of the proposed image encryption approach,highlighting its exceptional suitability for secure communication.Moreover,the security of the proposed scheme has been compared with stateof-the-art image encryption schemes,and all comparison metrics indicate the superior performance of the proposed scheme. 展开更多
关键词 Hindmarsh-rose model image encryption SHA-256 parallel computing
下载PDF
An Ingenious IoT Based Crop Prediction System Using ML and EL
16
作者 Shabana Ramzan Yazeed Yasin Ghadi +2 位作者 Hanan Aljuaid Aqsa Mahmood Basharat Ali 《Computers, Materials & Continua》 SCIE EI 2024年第4期183-199,共17页
Traditional farming procedures are time-consuming and expensive as based on manual labor. Farmers haveno proper knowledge to select which crop is suitable to grow according to the environmental factors and soilcharact... Traditional farming procedures are time-consuming and expensive as based on manual labor. Farmers haveno proper knowledge to select which crop is suitable to grow according to the environmental factors and soilcharacteristics. This is the main reason for the low yield of crops and the economic crisis in the agricultural sectorof the different countries. The use of modern technologies such as the Internet of Things (IoT), machine learning,and ensemble learning can facilitate farmers to observe different factors such as soil electrical conductivity (EC),and environmental factors like temperature to improve crop yield. These parameters play a vital role in suggestinga suitable crop to cope the food scarcity. This paper proposes a systemcomprised of twomodules, first module usesstatic data and the second module takes hybrid data collection (IoT-based real-time data and manual data) withmachine learning and ensemble learning algorithms to suggest the suitable crop in the farm to maximize the yield.Python is used to train the model that predicts the crop. This system proposed an intelligent and low-cost solutionfor the farmers to process the data and predict the suitable crop.We implemented the proposed system in the field.The efficiency and accuracy of the proposed system are confirmed by the generated results to predict the crop. 展开更多
关键词 Machine learning Internet of Things sensors ensemble learning
下载PDF
A Visual Cryptography Based Digital Image Copyright Protection 被引量:6
17
作者 Adel Hammad Abusitta 《Journal of Information Security》 2012年第2期96-104,共9页
A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selec... A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image. 展开更多
关键词 IMAGE WATERMARK PATTERN Visual CRYPTOGRAPHY Digital IMAGE COPYRIGHT
下载PDF
Automated Facial Expression Recognition and Age Estimation Using Deep Learning 被引量:1
18
作者 Syeda Amna Rizwan Yazeed Yasin Ghadi +1 位作者 Ahmad Jalal Kibum Kim 《Computers, Materials & Continua》 SCIE EI 2022年第6期5235-5252,共18页
With the advancement of computer vision techniques in surveillance systems,the need for more proficient,intelligent,and sustainable facial expressions and age recognition is necessary.The main purpose of this study is... With the advancement of computer vision techniques in surveillance systems,the need for more proficient,intelligent,and sustainable facial expressions and age recognition is necessary.The main purpose of this study is to develop accurate facial expressions and an age recognition system that is capable of error-free recognition of human expression and age in both indoor and outdoor environments.The proposed system first takes an input image pre-process it and then detects faces in the entire image.After that landmarks localization helps in the formation of synthetic face mask prediction.A novel set of features are extracted and passed to a classifier for the accurate classification of expressions and age group.The proposed system is tested over two benchmark datasets,namely,the Gallagher collection person dataset and the Images of Groups dataset.The system achieved remarkable results over these benchmark datasets about recognition accuracy and computational time.The proposed system would also be applicable in different consumer application domains such as online business negotiations,consumer behavior analysis,E-learning environments,and emotion robotics. 展开更多
关键词 Feature extraction face expression model local transform features and recurrent neural network(RNN)
下载PDF
Real-Time Violent Action Recognition Using Key Frames Extraction and Deep Learning 被引量:1
19
作者 Muzamil Ahmed Muhammad Ramzan +5 位作者 Hikmat Ullah Khan Saqib Iqbal Muhammad Attique Khan Jung-In Choi Yunyoung Nam Seifedine Kadry 《Computers, Materials & Continua》 SCIE EI 2021年第11期2217-2230,共14页
Violence recognition is crucial because of its applications in activities related to security and law enforcement.Existing semi-automated systems have issues such as tedious manual surveillances,which causes human err... Violence recognition is crucial because of its applications in activities related to security and law enforcement.Existing semi-automated systems have issues such as tedious manual surveillances,which causes human errors and makes these systems less effective.Several approaches have been proposed using trajectory-based,non-object-centric,and deep-learning-based methods.Previous studies have shown that deep learning techniques attain higher accuracy and lower error rates than those of other methods.However,the their performance must be improved.This study explores the state-of-the-art deep learning architecture of convolutional neural networks(CNNs)and inception V4 to detect and recognize violence using video data.In the proposed framework,the keyframe extraction technique eliminates duplicate consecutive frames.This keyframing phase reduces the training data size and hence decreases the computational cost by avoiding duplicate frames.For feature selection and classification tasks,the applied sequential CNN uses one kernel size,whereas the inception v4 CNN uses multiple kernels for different layers of the architecture.For empirical analysis,four widely used standard datasets are used with diverse activities.The results confirm that the proposed approach attains 98%accuracy,reduces the computational cost,and outperforms the existing techniques of violence detection and recognition. 展开更多
关键词 Violence detection violence recognition deep learning convolutional neural network inception v4 keyframe extraction
下载PDF
An Intelligent HealthCare Monitoring Framework for Daily Assistant Living
20
作者 Yazeed Yasin Ghadi Nida Khalid +3 位作者 Suliman A.Alsuhibany Tamara al Shloul Ahmad Jalal Jeongmin Park 《Computers, Materials & Continua》 SCIE EI 2022年第8期2597-2615,共19页
Human Activity Recognition(HAR)plays an important role in life care and health monitoring since it involves examining various activities of patients at homes,hospitals,or offices.Hence,the proposed system integrates H... Human Activity Recognition(HAR)plays an important role in life care and health monitoring since it involves examining various activities of patients at homes,hospitals,or offices.Hence,the proposed system integrates Human-Human Interaction(HHI)and Human-Object Interaction(HOI)recognition to provide in-depth monitoring of the daily routine of patients.We propose a robust system comprising both RGB(red,green,blue)and depth information.In particular,humans in HHI datasets are segmented via connected components analysis and skin detection while the human and object in HOI datasets are segmented via saliency map.To track the movement of humans,we proposed orientation and thermal features.A codebook is generated using Linde-Buzo-Gray(LBG)algorithm for vector quantization.Then,the quantized vectors generated from image sequences of HOI are given to Artificial Neural Network(ANN)while the quantized vectors generated from image sequences of HHI are given to K-ary tree hashing for classification.There are two publicly available datasets used for experimentation on HHI recognition:Stony Brook University(SBU)Kinect interaction and the University of Lincoln’s(UoL)3D social activity dataset.Furthermore,two publicly available datasets are used for experimentation on HOI recognition:Nanyang Technological University(NTU)RGB-D and Sun Yat-Sen University(SYSU)3D HOI datasets.The results proved the validity of the proposed system. 展开更多
关键词 Artificial neural network human-human interaction humanobject interaction k-ary tree hashing machine learning
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部