期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Image Splicing Forgery Detection Using Feature-Based of Sonine Functions and Deep Features
1
作者 Ala’a R.Al-Shamasneh Rabha W.Ibrahim 《Computers, Materials & Continua》 SCIE EI 2024年第1期795-810,共16页
The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research topic.One of the most popular methods for manipulating digital images is image splicing,whic... The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research topic.One of the most popular methods for manipulating digital images is image splicing,which involves copying a specific area from one image and pasting it into another.Attempts were made to mitigate the effects of image splicing,which continues to be a significant research challenge.This study proposes a new splicing detectionmodel,combining Sonine functions-derived convex-based features and deep features.Two stages make up the proposed method.The first step entails feature extraction,then classification using the“support vector machine”(SVM)to differentiate authentic and spliced images.The proposed Sonine functions-based feature extraction model reveals the spliced texture details by extracting some clues about the probability of image pixels.The proposed model achieved an accuracy of 98.93% when tested with the CASIA V2.0 dataset“Chinese Academy of Sciences,Institute of Automation”which is a publicly available dataset for forgery classification.The experimental results show that,for image splicing forgery detection,the proposed Sonine functions-derived convex-based features and deep features outperform state-of-the-art techniques in terms of accuracy,precision,and recall.Overall,the obtained detection accuracy attests to the benefit of using the Sonine functions alongside deep feature representations.Finding the regions or locations where image tampering has taken place is limited by the study.Future research will need to look into advanced image analysis techniques that can offer a higher degree of accuracy in identifying and localizing tampering regions. 展开更多
关键词 Image forgery image splicing deep learning Sonine functions
下载PDF
Latent Space Representational Learning of Deep Features for Acute Lymphoblastic Leukemia Diagnosis
2
作者 Ghada Emam Atteia 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期361-376,共16页
Acute Lymphoblastic Leukemia(ALL)is a fatal malignancy that is featured by the abnormal increase of immature lymphocytes in blood or bone marrow.Early prognosis of ALL is indispensable for the effectual remediation of... Acute Lymphoblastic Leukemia(ALL)is a fatal malignancy that is featured by the abnormal increase of immature lymphocytes in blood or bone marrow.Early prognosis of ALL is indispensable for the effectual remediation of this disease.Initial screening of ALL is conducted through manual examination of stained blood smear microscopic images,a process which is time-consuming and prone to errors.Therefore,many deep learning-based computer-aided diagnosis(CAD)systems have been established to automatically diagnose ALL.This paper proposes a novel hybrid deep learning system for ALL diagnosis in blood smear images.The introduced system integrates the proficiency of autoencoder networks in feature representational learning in latent space with the superior feature extraction capability of standard pretrained convolutional neural networks(CNNs)to identify the existence of ALL in blood smears.An augmented set of deep image features are formed from the features extracted by GoogleNet and Inception-v3 CNNs from a hybrid dataset of microscopic blood smear images.A sparse autoencoder network is designed to create an abstract set of significant latent features from the enlarged image feature set.The latent features are used to perform image classification using Support Vector Machine(SVM)classifier.The obtained results show that the latent features improve the classification performance of the proposed ALL diagnosis system over the original image features.Moreover,the classification performance of the system with various sizes of the latent feature set is evaluated.The retrieved results reveal that the introduced ALL diagnosis system superiorly compete the state of the art. 展开更多
关键词 Autoencoder deep learning CNN LEUKEMIA diagnosis computeraided diagnosis
下载PDF
RoGRUT: A Hybrid Deep Learning Model for Detecting Power Trapping in Smart Grids
3
作者 Farah Mohammad Saad Al-Ahmadi Jalal Al-Muhtadi 《Computers, Materials & Continua》 SCIE EI 2024年第5期3175-3192,共18页
Electricity theft is a widespread non-technical issue that has a negative impact on both power grids and electricity users.It hinders the economic growth of utility companies,poses electrical risks,and impacts the hig... Electricity theft is a widespread non-technical issue that has a negative impact on both power grids and electricity users.It hinders the economic growth of utility companies,poses electrical risks,and impacts the high energy costs borne by consumers.The development of smart grids is crucial for the identification of power theft since these systems create enormous amounts of data,including information on client consumption,which may be used to identify electricity theft using machine learning and deep learning techniques.Moreover,there also exist different solutions such as hardware-based solutions to detect electricity theft that may require human resources and expensive hardware.Computer-based solutions are presented in the literature to identify electricity theft but due to the dimensionality curse,class imbalance issue and improper hyper-parameter tuning of such models lead to poor performance.In this research,a hybrid deep learning model abbreviated as RoGRUT is proposed to detect electricity theft as amalicious and non-malicious activity.The key steps of the RoGRUT are data preprocessing that covers the problem of class imbalance,feature extraction and final theft detection.Different advanced-level models like RoBERTa is used to address the curse of dimensionality issue,the near miss for class imbalance,and transfer learning for classification.The effectiveness of the RoGRUTis evaluated using the dataset fromactual smartmeters.A significant number of simulations demonstrate that,when compared to its competitors,the RoGRUT achieves the best classification results.The performance evaluation of the proposed model revealed exemplary results across variousmetrics.The accuracy achieved was 88%,with precision at an impressive 86%and recall reaching 84%.The F1-Score,a measure of overall performance,stood at 85%.Furthermore,themodel exhibited a noteworthyMatthew correlation coefficient of 78%and excelled with an area under the curve of 91%. 展开更多
关键词 Electricity theft smart grid RoBERTa GRU transfer learning
下载PDF
Risk Prevention and Control for Agricultural Non-Point Source Pollution Based on the Process of Pressure-Transformation-Absorption in Chongqing, China 被引量:1
4
作者 ZHU Kangwen CHEN Yucheng +6 位作者 ZHANG Sheng YANG Zhimin HUANG Lei LEI Bo XIONG Hailing WU Sheng LI Xixi 《Chinese Geographical Science》 SCIE CSCD 2021年第4期735-750,共16页
According to China’s second national survey of pollution sources, the contribution of agricultural non-point sources(ANS) to water pollution is still high. Risk prevention and control are the main means to control co... According to China’s second national survey of pollution sources, the contribution of agricultural non-point sources(ANS) to water pollution is still high. Risk prevention and control are the main means to control costs and improve the efficiency of ANS, but most studies directly take pollution load as the risk standard, leading to a considerable misjudgment of the actual pollution risk. To objectively reflect the risk of agricultural non-point source pollution(ANSP) in Chongqing, China, we investigated the influences of initial source input, intermediate transformation, and terminal absorption of pollutants via literature research and the Delphi method and built a PTA(pressure kinetic energy, transformation kinetic energy, and absorption kinetic energy) model that covers 12 factors, with the support of geographical information system(GIS) technology. The terrain factor calculation results and the calculation results of other factors were optimized by Python tools to reduce human error and workload. Via centroid migration analysis and Kernel density analysis, the risk level, spatial aggregation degree, and key prevention and control regions could be accurately determined. There was a positive correlation between the water quality of the rivers in Chongqing and the risk assessment results of different periods, indirectly reflecting the reliability of the assessment results by the proposed model. There was an obvious tendency for the low-risk regions transforming into high-risk regions. The proportion of high-risk regions and extremely high-risk regions increased from 17.82% and 16.63%in 2000 to 18.10% and 16.76% in 2015, respectively. And the risk level in the main urban areas was significantly higher than that in the southeastern and northeastern areas of Chongqing. The centroids of all grades of risky areas presented a successive distribution from west to east, and the centroids of high-risk and extremely high-risk regions shifted eastward. From 2000 to 2015, the centroids of highrisk and extremely high-risk regions moved 4.63 km(1.68°) and 4.48 km(12.08°) east by north, respectively. The kernel density analysis results showed that the high-risk regions were mainly concentrated in the main urban areas and that the distribution of agglomeration areas overall displayed a transition trend from contiguous distribution to decentralized concentration. The risk levels of the regions with a high proportion of cultivated land and artificial surface were significantly increased, and the occupation of cultivated land in the process of urbanization promoted the movement of the centroids of high-risk and extremely high-risk regions. The identification of key areas for risk prevention and control provides data scientific basis for the development of prevention and control strategies. 展开更多
关键词 geographic information system(GIS) agricultural non-point source pollution(ANSP) risk assessment Kernel density CHONGQING China
下载PDF
Deep Learning Based Cyber Event Detection from Open-Source Re-Emerging Social Data
5
作者 Farah Mohammad Saad Al-Ahmadi Jalal Al-Muhtadi 《Computers, Materials & Continua》 SCIE EI 2023年第8期1423-1438,共16页
Social media forums have emerged as the most popular form of communication in the modern technology era,allowing people to discuss and express their opinions.This increases the amount of material being shared on socia... Social media forums have emerged as the most popular form of communication in the modern technology era,allowing people to discuss and express their opinions.This increases the amount of material being shared on social media sites.There is a wealth of information about the threat that may be found in such open data sources.The security of already-deployed software and systems relies heavily on the timely detection of newly-emerging threats to their safety that can be gleaned from such information.Despite the fact that several models for detecting cybersecurity events have been presented,it remains challenging to extract security events from the vast amounts of unstructured text present in public data sources.The majority of the currently available methods concentrate on detecting events that have a high number of dimensions.This is because the unstructured text in open data sources typically contains a large number of dimensions.However,to react to attacks quicker than they can be launched,security analysts and information technology operators need to be aware of critical security events as soon as possible,regardless of how often they are reported.This research provides a unique event detection method that can swiftly identify significant security events from open forums such as Twitter.The proposed work identified new threats and the revival of an attack or related event,independent of the volume of mentions relating to those events on Twitter.In this research work,deep learning has been used to extract predictive features from open-source text.The proposed model is composed of data collection,data transformation,feature extraction using deep learning,Latent Dirichlet Allocation(LDA)based medium-level cyber-event detection and final Google Trends-based high-level cyber-event detection.The proposed technique has been evaluated on numerous datasets.Experiment results show that the proposed method outperforms existing methods in detecting cyber events by giving 95.96% accuracy. 展开更多
关键词 Social media TWITTER CYBER EVENTS deep learning
下载PDF
IoT-Based Women Safety Gadgets (WSG): Vision, Architecture, and Design Trends
6
作者 Sharad Saxena Shailendra Mishra +5 位作者 Mohammed Baljon Shamiksha Mishra Sunil Kumar Sharma Prakhar Goel Shubham Gupta Vinay Kishore 《Computers, Materials & Continua》 SCIE EI 2023年第7期1027-1045,共19页
In recent years,the growth of female employees in the commercial market and industries has increased.As a result,some people think travelling to distant and isolated locations during odd hours generates new threats to... In recent years,the growth of female employees in the commercial market and industries has increased.As a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s safety.The exponential increase in assaults and attacks on women,on the other hand,is posing a threat to women’s growth,development,and security.At the time of the attack,it appears the women were immobilized and needed immediate support.Only self-defense isn’t sufficient against abuse;a new technological solution is desired and can be used as quickly as hitting a switch or button.The proposed Women Safety Gadget(WSG)aims to design a wearable safety device model based on Internet-of-Things(IoT)and Cloud Technology.It is designed in three layers,namely layer-1,having an android app;layer-2,with messaging and location tracking system;and layer-3,which updates information in the cloud database.WSG can detect an unsafe condition by the pressure sensor of the finger on the artificial nail,consequently diffuses a pepper spray,and automatically notifies the saved closest contacts and police station through messaging and location settings.WSG has a response time of 1000 ms once the nail is pressed;the average time for pulse rate measure is 0.475 s,and diffusing the pepper spray is 0.2–0.5 s.The average activation time is 2.079 s. 展开更多
关键词 PERPETRATOR SAFETY IOT women security GPS tracking GSM
下载PDF
Secure Rotation Invariant Face Detection System for Authentication
7
作者 Amit Verma Mohammed Baljon +4 位作者 Shailendra Mishra Iqbaldeep Kaur Ritika Saini Sharad Saxena Sanjay Kumar Sharma 《Computers, Materials & Continua》 SCIE EI 2022年第1期1955-1974,共20页
Biometric applications widely use the face as a component for recognition and automatic detection.Face rotation is a variable component and makes face detection a complex and challenging task with varied angles and ro... Biometric applications widely use the face as a component for recognition and automatic detection.Face rotation is a variable component and makes face detection a complex and challenging task with varied angles and rotation.This problem has been investigated,and a novice algorithm,namely RIFDS(Rotation Invariant Face Detection System),has been devised.The objective of the paper is to implement a robust method for face detection taken at various angle.Further to achieve better results than known algorithms for face detection.In RIFDS Polar Harmonic Transforms(PHT)technique is combined with Multi-Block Local Binary Pattern(MBLBP)in a hybrid manner.The MBLBP is used to extract texture patterns from the digital image,and the PHT is used to manage invariant rotation characteristics.In this manner,RIFDS can detect human faces at different rotations and with different facial expressions.The RIFDS performance is validated on different face databases like LFW,ORL,CMU,MIT-CBCL,JAFFF Face Databases,and Lena images.The results show that the RIFDS algorithm can detect faces at varying angles and at different image resolutions and with an accuracy of 99.9%.The RIFDS algorithm outperforms previous methods like Viola-Jones,Multi-blockLocal Binary Pattern(MBLBP),and Polar HarmonicTransforms(PHTs).The RIFDS approach has a further scope with a genetic algorithm to detect faces(approximation)even from shadows. 展开更多
关键词 Pose variations face detection frontal faces facial expressions emotions
下载PDF
THS-GWNN:a deep learning framework for temporal network link prediction
8
作者 Xian MO Jun PANG Zhiming LIU 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第2期174-176,共3页
1 Introduction and main contributions Link prediction for temporal networks aims to evaluate the likelihood of the future linkage among nodes,which has significant applications in social networks,biological networks a... 1 Introduction and main contributions Link prediction for temporal networks aims to evaluate the likelihood of the future linkage among nodes,which has significant applications in social networks,biological networks and traffic analysis[1],etc.Network embedding[2]is an important analytical tool for temporal network link prediction,which helps us better understand network evolution[3].How to encode high-dimensional and non-Euclidean network information is a crucial problem for node embedding in temporal networks.One of the challenges is to reveal the spatial structure at each timestamp and the temporal property over time[4].Some existing work[5]shows that extracting the spatial relation of each node can be used as a valid feature representation for each node.Moreover,the emergence of deep learning techniques[4,5]brings new insights for learning temporal properties,but most models using deep learning still fail to achieve satisfying prediction accuracy. 展开更多
关键词 NETWORK PREDICTION NETWORKS
原文传递
Probabilistic synthesis against GR(1) winning condition
9
作者 Wei ZHAO Rui LI +2 位作者 Wanwei LIU Wei DONG Zhiming LIU 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第2期17-25,共9页
Reactive synthesis is a technique for automatic generation of a reactive system from a high level specification.The system is reactive in the sense that it reacts to the inputs from the environment.The specification i... Reactive synthesis is a technique for automatic generation of a reactive system from a high level specification.The system is reactive in the sense that it reacts to the inputs from the environment.The specification is in general given as a linear temporal logic(LTL)formula.The behaviour of the system interacting with the environment can be represented as a game in which the system plays against the environment.Thus,a problem of reactive synthesis is commonly treated as solving such a game with the specification as the winning condition.Reactive synthesis has been thoroughly investigated for more two decades.A well-known challenge is to deal with the complex uncertainty of the environment.We understand that a major issue is due to the lack of a sufficient treatment of probabilistic properties in the traditional models.For example,a two-player game defined by a standard Kriple structure does not consider probabilistic transitions in reaction to the uncertain physical environment;and a Markov Decision Process(MDP)in general does not explicitly separate the system from its environment and it does not describe the interaction between system and the environment.In this paper,we propose a new and more general model which combines the two-player game and the MDP.Furthermore,we study probabilistic reactive synthesis for the games of General Reactivity of Rank 1(i.e.,GR(1))defined in this model.More specifically,we present an algorithm,which for given model,a location and a GR(1)specification,determines the strategy for each player how to maximize/minimize the probabilities of the satisfaction of at location.We use an example to describe the model of probabilistic games and demonstrate our algorithm. 展开更多
关键词 reactive system probabilistic synthesis GR(1)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部