One of the most recent developments in the field of graph theory is the analysis of networks such as Butterfly networks,Benes networks,Interconnection networks,and David-derived networks using graph theoretic paramete...One of the most recent developments in the field of graph theory is the analysis of networks such as Butterfly networks,Benes networks,Interconnection networks,and David-derived networks using graph theoretic parameters.The topological indices(TIs)have been widely used as graph invariants among various graph theoretic tools.Quantitative structure activity relationships(QSAR)and quantitative structure property relationships(QSPR)need the use of TIs.Different structure-based parameters,such as the degree and distance of vertices in graphs,contribute to the determination of the values of TIs.Among other recently introduced novelties,the classes of ev-degree and ve-degree dependent TIs have been extensively explored for various graph families.The current research focuses on the development of formulae for different ev-degree and ve-degree dependent TIs for s−dimensional Benes network and certain networks derived from it.In the end,a comparison between the values of the TIs for these networks has been presented through graphical tools.展开更多
Data Encryption Standard(DES)is a symmetric key cryptosystem that is applied in different cryptosystems of recent times.However,researchers found defects in the main assembling of the DES and declared it insecure agai...Data Encryption Standard(DES)is a symmetric key cryptosystem that is applied in different cryptosystems of recent times.However,researchers found defects in the main assembling of the DES and declared it insecure against linear and differential cryptanalysis.In this paper,we have studied the faults and made improvements in their internal structure and get the new algorithm for Improved DES.The improvement is being made in the substitution step,which is the only nonlinear component of the algorithm.This alteration provided us with great outcomes and increase the strength of DES.Accordingly,a novel 6×6 good quality S-box construction scheme has been hired in the substitution phase of the DES.The construction involves the Galois field method and generates robust S-boxes that are used to secure the scheme against linear and differential attacks.Then again,the key space of the improved DES has been enhanced against the brute force attack.The out-comes of different performance analyses depict the strength of our proposed substitution boxes which also guarantees the strength of the overall DES.展开更多
Electrocardiogram(ECG)signal is a measure of the heart’s electrical activity.Recently,ECG detection and classification have benefited from the use of computer-aided systems by cardiologists.The goal of this paper is ...Electrocardiogram(ECG)signal is a measure of the heart’s electrical activity.Recently,ECG detection and classification have benefited from the use of computer-aided systems by cardiologists.The goal of this paper is to improve the accuracy of ECG classification by combining the Dipper Throated Optimization(DTO)and Differential Evolution Algorithm(DEA)into a unified algorithm to optimize the hyperparameters of neural network(NN)for boosting the ECG classification accuracy.In addition,we proposed a new feature selection method for selecting the significant feature that can improve the overall performance.To prove the superiority of the proposed approach,several experimentswere conducted to compare the results achieved by the proposed approach and other competing approaches.Moreover,statistical analysis is performed to study the significance and stability of the proposed approach using Wilcoxon and ANOVA tests.Experimental results confirmed the superiority and effectiveness of the proposed approach.The classification accuracy achieved by the proposed approach is(99.98%).展开更多
Breast Arterial Calcification(BAC)is a mammographic decision dissimilar to cancer and commonly observed in elderly women.Thus identifying BAC could provide an expense,and be inaccurate.Recently Deep Learning(DL)method...Breast Arterial Calcification(BAC)is a mammographic decision dissimilar to cancer and commonly observed in elderly women.Thus identifying BAC could provide an expense,and be inaccurate.Recently Deep Learning(DL)methods have been introduced for automatic BAC detection and quantification with increased accuracy.Previously,classification with deep learning had reached higher efficiency,but designing the structure of DL proved to be an extremely challenging task due to overfitting models.It also is not able to capture the patterns and irregularities presented in the images.To solve the overfitting problem,an optimal feature set has been formed by Enhanced Wolf Pack Algorithm(EWPA),and their irregularities are identified by Dense-kUNet segmentation.In this paper,Dense-kUNet for segmentation and optimal feature has been introduced for classification(severe,mild,light)that integrates DenseUNet and kU-Net.Longer bound links exist among adjacent modules,allowing relatively rough data to be sent to the following component and assisting the system in finding higher qualities.The major contribution of the work is to design the best features selected by Enhanced Wolf Pack Algorithm(EWPA),and Modified Support Vector Machine(MSVM)based learning for classification.k-Dense-UNet is introduced which combines the procedure of Dense-UNet and kU-Net for image segmentation.Longer bound associations occur among nearby sections,allowing relatively granular data to be sent to the next subsystem and benefiting the system in recognizing smaller characteristics.The proposed techniques and the performance are tested using several types of analysis techniques 826 filled digitized mammography.The proposed method achieved the highest precision,recall,F-measure,and accuracy of 84.4333%,84.5333%,84.4833%,and 86.8667%when compared to other methods on the Digital Database for Screening Mammography(DDSM).展开更多
Object tracking is one of the major tasks for mobile robots in many real-world applications.Also,artificial intelligence and automatic control techniques play an important role in enhancing the performance of mobile r...Object tracking is one of the major tasks for mobile robots in many real-world applications.Also,artificial intelligence and automatic control techniques play an important role in enhancing the performance of mobile robot navigation.In contrast to previous simulation studies,this paper presents a new intelligent mobile robot for accomplishing multi-tasks by tracking red-green-blue(RGB)colored objects in a real experimental field.Moreover,a practical smart controller is developed based on adaptive fuzzy logic and custom proportional-integral-derivative(PID)schemes to achieve accurate tracking results,considering robot command delay and tolerance errors.The design of developed controllers implies some motion rules to mimic the knowledge of experienced operators.Twelve scenarios of three colored object combinations have been successfully tested and evaluated by using the developed controlled image-based robot tracker.Classical PID control failed to handle some tracking scenarios in this study.The proposed adaptive fuzzy PID control achieved the best accurate results with the minimum average final error of 13.8 cm to reach the colored targets,while our designed custom PID control is efficient in saving both average time and traveling distance of 6.6 s and 14.3 cm,respectively.These promising results demonstrate the feasibility of applying our developed image-based robotic system in a colored object-tracking environment to reduce human workloads.展开更多
This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc...This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc On-Demand Distance Vector(AODV),Dynamic Source Routing(DSR),and Zone Routing Protocol(ZRP).In this paper,the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis,Mann-Whitney,and Friedman.It articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility patterns.The study is premised upon the Quality of Service(QoS)metrics of throughput,packet delivery ratio,and end-to-end delay to gain an adequate understanding of the operational efficiency of each protocol under different network scenarios.The findings explained significant differences in the performance of different routing protocols;as a result,decisions for the selection and optimization of routing protocols can be taken effectively according to different network requirements.This paper is a step forward in the general understanding of the routing dynamics of MANETs and contributes significantly to the strategic deployment of robust and efficient network infrastructures.展开更多
E-learning behavior data indicates several students’activities on the e-learning platform such as the number of accesses to a set of resources and number of participants in lectures.This article proposes a new analyt...E-learning behavior data indicates several students’activities on the e-learning platform such as the number of accesses to a set of resources and number of participants in lectures.This article proposes a new analytics systemto support academic evaluation for students via e-learning activities to overcome the challenges faced by traditional learning environments.The proposed e-learning analytics system includes a new deep forest model.It consists of multistage cascade random forests with minimal hyperparameters compared to traditional deep neural networks.The developed forest model can analyze each student’s activities during the use of an e-learning platform to give accurate expectations of the student’s performance before ending the semester and/or the final exam.Experiments have been conducted on the Open University Learning Analytics Dataset(OULAD)of 32,593 students.Our proposed deep model showed a competitive accuracy score of 98.0%compared to artificial intelligence-based models,such as ConvolutionalNeuralNetwork(CNN)and Long Short-TermMemory(LSTM)in previous studies.That allows academic advisors to support expected failed students significantly and improve their academic level at the right time.Consequently,the proposed analytics system can enhance the quality of educational services for students in an innovative e-learning framework.展开更多
Real-time indoor camera localization is a significant problem in indoor robot navigation and surveillance systems.The scene can change during the image sequence and plays a vital role in the localization performance o...Real-time indoor camera localization is a significant problem in indoor robot navigation and surveillance systems.The scene can change during the image sequence and plays a vital role in the localization performance of robotic applications in terms of accuracy and speed.This research proposed a real-time indoor camera localization system based on a recurrent neural network that detects scene change during the image sequence.An annotated image dataset trains the proposed system and predicts the camera pose in real-time.The system mainly improved the localization performance of indoor cameras by more accurately predicting the camera pose.It also recognizes the scene changes during the sequence and evaluates the effects of these changes.This system achieved high accuracy and real-time performance.The scene change detection process was performed using visual rhythm and the proposed recurrent deep architecture,which performed camera pose prediction and scene change impact evaluation.Overall,this study proposed a novel real-time localization system for indoor cameras that detects scene changes and shows how they affect localization performance.展开更多
The design ofmicrostrip antennas is a complex and time-consuming process,especially the step of searching for the best design parameters.Meanwhile,the performance ofmicrostrip antennas can be improved usingmetamateria...The design ofmicrostrip antennas is a complex and time-consuming process,especially the step of searching for the best design parameters.Meanwhile,the performance ofmicrostrip antennas can be improved usingmetamaterial,which results in a new class of antennas called metamaterial antenna.Several parameters affect the radiation loss and quality factor of this class of antennas,such as the antenna size.Recently,the optimal values of the design parameters of metamaterial antennas can be predicted using machine learning,which presents a better alternative to simulation tools and trialand-error processes.However,the prediction accuracy depends heavily on the quality of the machine learning model.In this paper,and benefiting from the current advances in deep learning,we propose a deep network architecture to predict the bandwidth of metamaterial antenna.Experimental results show that the proposed deep network could accurately predict the optimal values of the antenna bandwidth with a tiny value of mean-square error(MSE).In addition,the proposed model is comparedwith current competing approaches that are based on support vector machines,multi-layer perceptron,K-nearest neighbors,and ensemble models.The results show that the proposed model is better than the other approaches and can predict antenna bandwidth more accurately.展开更多
Wireless sensor networks(WSNs)and Internet of Things(IoT)have gained more popularity in recent years as an underlying infrastructure for connected devices and sensors in smart cities.The data generated from these sens...Wireless sensor networks(WSNs)and Internet of Things(IoT)have gained more popularity in recent years as an underlying infrastructure for connected devices and sensors in smart cities.The data generated from these sensors are used by smart cities to strengthen their infrastructure,utilities,and public services.WSNs are suitable for long periods of data acquisition in smart cities.To make the networks of smart cities more reliable for sensitive information,the blockchain mechanism has been proposed.The key issues and challenges of WSNs in smart cities is efficiently scheduling the resources;leading to extending the network lifetime of sensors.In this paper,a linear network coding(LNC)for WSNs with blockchain-enabled IoT devices has been proposed.The consumption of energy is reduced for each node by applying LNC.The efficiency and the reliability of the proposed model are evaluated and compared to those of the existing models.Results from the simulation demonstrate that the proposed model increases the efficiency in terms of the number of live nodes,packet delivery ratio,throughput,and the optimized residual energy compared to other current techniques.展开更多
The design of an antenna requires a careful selection of its parameters to retain the desired performance.However,this task is time-consuming when the traditional approaches are employed,which represents a significant...The design of an antenna requires a careful selection of its parameters to retain the desired performance.However,this task is time-consuming when the traditional approaches are employed,which represents a significant challenge.On the other hand,machine learning presents an effective solution to this challenge through a set of regression models that can robustly assist antenna designers to find out the best set of design parameters to achieve the intended performance.In this paper,we propose a novel approach for accurately predicting the bandwidth of metamaterial antenna.The proposed approach is based on employing the recently emerged guided whale optimization algorithm using adaptive particle swarm optimization to optimize the parameters of the long-short-term memory(LSTM)deep network.This optimized network is used to retrieve the metamaterial bandwidth given a set of features.In addition,the superiority of the proposed approach is examined in terms of a comparison with the traditional multilayer perceptron(ML),Knearest neighbors(K-NN),and the basic LSTM in terms of several evaluation criteria such as root mean square error(RMSE),mean absolute error(MAE),and mean bias error(MBE).Experimental results show that the proposed approach could achieve RMSE of(0.003018),MAE of(0.001871),and MBE of(0.000205).These values are better than those of the other competing models.展开更多
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine learning.Each feature in a dataset has 2n possible subsets,making it challenging to select the optimum collectio...Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine learning.Each feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of features using typical methods.As a result,a new metaheuristicsbased feature selection method based on the dipper-throated and grey-wolf optimization(DTO-GW)algorithms has been developed in this research.Instability can result when the selection of features is subject to metaheuristics,which can lead to a wide range of results.Thus,we adopted hybrid optimization in our method of optimizing,which allowed us to better balance exploration and harvesting chores more equitably.We propose utilizing the binary DTO-GW search approach we previously devised for selecting the optimal subset of attributes.In the proposed method,the number of features selected is minimized,while classification accuracy is increased.To test the proposed method’s performance against eleven other state-of-theart approaches,eight datasets from the UCI repository were used,such as binary grey wolf search(bGWO),binary hybrid grey wolf,and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hysteresis optimization(bHy),and binary hysteresis optimization(bHWO).The suggested method is superior 4532 CMC,2023,vol.74,no.2 and successful in handling the problem of feature selection,according to the results of the experiments.展开更多
Assemblage at public places for religious or sports events has become an integral part of our lives.These gatherings pose a challenge at places where fast crowd verification with social distancing(SD)is required,espec...Assemblage at public places for religious or sports events has become an integral part of our lives.These gatherings pose a challenge at places where fast crowd verification with social distancing(SD)is required,especially during a pandemic.Presently,verification of crowds is carried out in the form of a queue that increases waiting time resulting in congestion,stampede,and the spread of diseases.This article proposes a cluster verification model(CVM)using a wireless sensor network(WSN),single cluster approach(SCA),and split cluster approach(SpCA)to solve the aforementioned problem for pandemic cases.We show that SD,cluster approaches,and verification by WSN can overcome the management issues by optimizing the cluster size and verification time.Hence,our proposed method minimizes the chances of spreading diseases and stampedes in large events such as a pilgrimage.We consider the assembly points in the annual pilgrimage to Makkah Al-Mukarmah and Umrah for verification using Contiki/Cooja tool.We compute results such as verified cluster members(CMs)to define cluster size,success rate to determine the best success rate,and verification time to determine the optimal verification time for various scenarios.We validate ourmodel by comparing the results of each approach with the existing model.Our results showthat the SpCAwith SD is the best approach with a 96% success rate and optimization of verification time as compared to SCA with SD and the existing model.展开更多
This article introduces a new medical internet of things(IoT)framework for intelligent fall detection system of senior people based on our proposed deep forest model.The cascade multi-layer structure of deep forest cl...This article introduces a new medical internet of things(IoT)framework for intelligent fall detection system of senior people based on our proposed deep forest model.The cascade multi-layer structure of deep forest classifier allows to generate new features at each level with minimal hyperparameters compared to deep neural networks.Moreover,the optimal number of the deep forest layers is automatically estimated based on the early stopping criteria of validation accuracy value at each generated layer.The suggested forest classifier was successfully tested and evaluated using a public SmartFall dataset,which is acquired from three-axis accelerometer in a smartwatch.It includes 92781 training samples and 91025 testing samples with two labeled classes,namely non-fall and fall.Classification results of our deep forest classifier demonstrated a superior performance with the best accuracy score of 98.0%compared to three machine learning models,i.e.,K-nearest neighbors,decision trees and traditional random forest,and two deep learning models,which are dense neural networks and convolutional neural networks.By considering security and privacy aspects in the future work,our proposed medical IoT framework for fall detection of old people is valid for real-time healthcare application deployment.展开更多
Traffic prediction of wireless networks attracted many researchersand practitioners during the past decades. However, wireless traffic frequentlyexhibits strong nonlinearities and complicated patterns, which makes it ...Traffic prediction of wireless networks attracted many researchersand practitioners during the past decades. However, wireless traffic frequentlyexhibits strong nonlinearities and complicated patterns, which makes it challengingto be predicted accurately. Many of the existing approaches forpredicting wireless network traffic are unable to produce accurate predictionsbecause they lack the ability to describe the dynamic spatial-temporalcorrelations of wireless network traffic data. In this paper, we proposed anovel meta-heuristic optimization approach based on fitness grey wolf anddipper throated optimization algorithms for boosting the prediction accuracyof traffic volume. The proposed algorithm is employed to optimize the hyperparametersof long short-term memory (LSTM) network as an efficient timeseries modeling approach which is widely used in sequence prediction tasks.To prove the superiority of the proposed algorithm, four other optimizationalgorithms were employed to optimize LSTM, and the results were compared.The evaluation results confirmed the effectiveness of the proposed approachin predicting the traffic of wireless networks accurately. On the other hand,a statistical analysis is performed to emphasize the stability of the proposedapproach.展开更多
The Internet of Things (IoT) paradigm enables end users to accessnetworking services amongst diverse kinds of electronic devices. IoT securitymechanism is a technology that concentrates on safeguarding the devicesand ...The Internet of Things (IoT) paradigm enables end users to accessnetworking services amongst diverse kinds of electronic devices. IoT securitymechanism is a technology that concentrates on safeguarding the devicesand networks connected in the IoT environment. In recent years, False DataInjection Attacks (FDIAs) have gained considerable interest in the IoT environment.Cybercriminals compromise the devices connected to the networkand inject the data. Such attacks on the IoT environment can result in a considerableloss and interrupt normal activities among the IoT network devices.The FDI attacks have been effectively overcome so far by conventional threatdetection techniques. The current research article develops a Hybrid DeepLearning to Combat Sophisticated False Data Injection Attacks detection(HDL-FDIAD) for the IoT environment. The presented HDL-FDIAD modelmajorly recognizes the presence of FDI attacks in the IoT environment.The HDL-FDIAD model exploits the Equilibrium Optimizer-based FeatureSelection (EO-FS) technique to select the optimal subset of the features.Moreover, the Long Short Term Memory with Recurrent Neural Network(LSTM-RNN) model is also utilized for the purpose of classification. At last,the Bayesian Optimization (BO) algorithm is employed as a hyperparameteroptimizer in this study. To validate the enhanced performance of the HDLFDIADmodel, a wide range of simulations was conducted, and the resultswere investigated in detail. A comparative study was conducted between theproposed model and the existing models. The outcomes revealed that theproposed HDL-FDIAD model is superior to other models.展开更多
An attacker has several options for breaking through an organization’s information security protections. Human factors are determined to be the source of some of the worst cyber-attacks every day in every business. T...An attacker has several options for breaking through an organization’s information security protections. Human factors are determined to be the source of some of the worst cyber-attacks every day in every business. The human method, often known as “social engineering”, is the hardest to cope with. This paper examines many types of social engineering. The aim of this study was to ascertain the level of awareness of social engineering, provide appropriate solutions to problems to reduce those engineering risks, and avoid obstacles that could prevent increasing awareness of the dangers of social engineering—Shaqra University (Kingdom of Saudi Arabia). A questionnaire was developed and surveyed 508 employees working at different organizations. The overall Cronbach’s alpha was 0.756, which very good value, the correlation coefficient between each of the items is statistically significant at 0.01 level. The study showed that 63.4% of the surveyed sample had no idea about social engineering. 67.3% of the total samples had no idea about social engineering threats. 42.1% have a weak knowledge of social engineering and only 7.5% of the sample had a good knowledge of social engineering. 64.7% of the male did not know what social engineering is. 68.0% of the administrators did not know what social engineering is. Employees who did not take courses showed statistically significant differences.展开更多
Smartphones have now become an integral part of our everyday lives.User authentication on smartphones is often accomplished by mechanisms(like face unlock,pattern,or pin password)that authenticate the user’s identity...Smartphones have now become an integral part of our everyday lives.User authentication on smartphones is often accomplished by mechanisms(like face unlock,pattern,or pin password)that authenticate the user’s identity.These technologies are simple,inexpensive,and fast for repeated logins.However,these technologies are still subject to assaults like smudge assaults and shoulder surfing.Users’touch behavior while using their cell phones might be used to authenticate them,which would solve the problem.The performance of the authentication process may be influenced by the attributes chosen(from these behaviors).The purpose of this study is to present an effective authentication technique that implicitly offers a better authentication method for smartphone usage while avoiding the cost of a particular device and considering the constrained capabilities of smartphones.We began by concentrating on feature selection methods utilizing the grey wolf optimization strategy.The random forest classifier is used to evaluate these tactics.The testing findings demonstrated that the grey wolf-based methodology works as a better optimum feature selection for building an implicit authentication mechanism for the smartphone environment when using a public dataset.It achieved a 97.89%accuracy rate while utilizing just 16 of the 53 characteristics like utilizing minimum mobile resources mainly;processing power of the device and memory to validate individuals.Simultaneously,the findings revealed that our approach has a lower equal error rate(EER)of 0.5104,a false acceptance rate(FAR)of 1.00,and a false rejection rate(FRR)of 0.0209 compared to the methods discussed in the literature.These promising results will be used to create a mobile application that enables implicit validation of authorized users yet avoids current identification concerns and requires fewer mobile resources.展开更多
The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diver...The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational andfinancial harm to organizations.To preserve the confidentiality,integrity,and availability of IIoT networks,an anomaly-based intrusion detection system(IDS)can be used to provide secure,reliable,and efficient IIoT ecosystems.In this paper,we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively overcome several IIoT cyberattacks.The proposed anomaly-based IDS is divided into three phases:pre-processing,feature selection,and classification.In the pre-processing phase,data cleaning and nor-malization are performed.In the feature selection phase,the candidates’feature vectors are computed using two feature reduction techniques,minimum redun-dancy maximum relevance and neighborhood components analysis.For thefinal step,the modeling phase,the following classifiers are used to perform the classi-fication:support vector machine,decision tree,k-nearest neighbors,and linear discriminant analysis.The proposed work uses a new data-driven IIoT data set called X-IIoTID.The experimental evaluation demonstrates our proposed model achieved a high accuracy rate of 99.58%,a sensitivity rate of 99.59%,a specificity rate of 99.58%,and a low false positive rate of 0.4%.展开更多
Falling is among the most harmful events older adults may encounter.With the continuous growth of the aging population in many societies,developing effective fall detection mechanisms empowered by machine learning tec...Falling is among the most harmful events older adults may encounter.With the continuous growth of the aging population in many societies,developing effective fall detection mechanisms empowered by machine learning technologies and easily integrable with existing healthcare systems becomes essential.This paper presents a new healthcare Internet of Health Things(IoHT)architecture built around an ensemble machine learning-based fall detection system(FDS)for older people.Compared to deep neural networks,the ensemble multi-stage random forest model allows the extraction of an optimal subset of fall detection features with minimal hyperparameters.The number of cascaded random forest stages is automatically optimized.This study uses a public dataset of fall detection samples called SmartFall to validate the developed fall detection system.The SmartFall dataset is collected based on the acquired measurements of the three-axis accelerometer in a smartwatch.Each scenario in this dataset is classified and labeled as a fall or a non-fall.In comparison to the three machine learning models—K-nearest neighbors(KNN),decision tree(DT),and standard random forest(SRF),the proposed ensemble classifier outperformed the other models and achieved 98.4%accuracy.The developed healthcare IoHT framework can be realized for detecting fall accidents of older people by taking security and privacy concerns into account in future work.展开更多
基金supported by the National Natural Science Foundation of China (Grant No.61702291)China Henan International Joint Laboratory for Multidimensional Topology and Carcinogenic Characteristics Analysis of Atmospheric Particulate Matter PM2.5.
文摘One of the most recent developments in the field of graph theory is the analysis of networks such as Butterfly networks,Benes networks,Interconnection networks,and David-derived networks using graph theoretic parameters.The topological indices(TIs)have been widely used as graph invariants among various graph theoretic tools.Quantitative structure activity relationships(QSAR)and quantitative structure property relationships(QSPR)need the use of TIs.Different structure-based parameters,such as the degree and distance of vertices in graphs,contribute to the determination of the values of TIs.Among other recently introduced novelties,the classes of ev-degree and ve-degree dependent TIs have been extensively explored for various graph families.The current research focuses on the development of formulae for different ev-degree and ve-degree dependent TIs for s−dimensional Benes network and certain networks derived from it.In the end,a comparison between the values of the TIs for these networks has been presented through graphical tools.
文摘Data Encryption Standard(DES)is a symmetric key cryptosystem that is applied in different cryptosystems of recent times.However,researchers found defects in the main assembling of the DES and declared it insecure against linear and differential cryptanalysis.In this paper,we have studied the faults and made improvements in their internal structure and get the new algorithm for Improved DES.The improvement is being made in the substitution step,which is the only nonlinear component of the algorithm.This alteration provided us with great outcomes and increase the strength of DES.Accordingly,a novel 6×6 good quality S-box construction scheme has been hired in the substitution phase of the DES.The construction involves the Galois field method and generates robust S-boxes that are used to secure the scheme against linear and differential attacks.Then again,the key space of the improved DES has been enhanced against the brute force attack.The out-comes of different performance analyses depict the strength of our proposed substitution boxes which also guarantees the strength of the overall DES.
文摘Electrocardiogram(ECG)signal is a measure of the heart’s electrical activity.Recently,ECG detection and classification have benefited from the use of computer-aided systems by cardiologists.The goal of this paper is to improve the accuracy of ECG classification by combining the Dipper Throated Optimization(DTO)and Differential Evolution Algorithm(DEA)into a unified algorithm to optimize the hyperparameters of neural network(NN)for boosting the ECG classification accuracy.In addition,we proposed a new feature selection method for selecting the significant feature that can improve the overall performance.To prove the superiority of the proposed approach,several experimentswere conducted to compare the results achieved by the proposed approach and other competing approaches.Moreover,statistical analysis is performed to study the significance and stability of the proposed approach using Wilcoxon and ANOVA tests.Experimental results confirmed the superiority and effectiveness of the proposed approach.The classification accuracy achieved by the proposed approach is(99.98%).
文摘Breast Arterial Calcification(BAC)is a mammographic decision dissimilar to cancer and commonly observed in elderly women.Thus identifying BAC could provide an expense,and be inaccurate.Recently Deep Learning(DL)methods have been introduced for automatic BAC detection and quantification with increased accuracy.Previously,classification with deep learning had reached higher efficiency,but designing the structure of DL proved to be an extremely challenging task due to overfitting models.It also is not able to capture the patterns and irregularities presented in the images.To solve the overfitting problem,an optimal feature set has been formed by Enhanced Wolf Pack Algorithm(EWPA),and their irregularities are identified by Dense-kUNet segmentation.In this paper,Dense-kUNet for segmentation and optimal feature has been introduced for classification(severe,mild,light)that integrates DenseUNet and kU-Net.Longer bound links exist among adjacent modules,allowing relatively rough data to be sent to the following component and assisting the system in finding higher qualities.The major contribution of the work is to design the best features selected by Enhanced Wolf Pack Algorithm(EWPA),and Modified Support Vector Machine(MSVM)based learning for classification.k-Dense-UNet is introduced which combines the procedure of Dense-UNet and kU-Net for image segmentation.Longer bound associations occur among nearby sections,allowing relatively granular data to be sent to the next subsystem and benefiting the system in recognizing smaller characteristics.The proposed techniques and the performance are tested using several types of analysis techniques 826 filled digitized mammography.The proposed method achieved the highest precision,recall,F-measure,and accuracy of 84.4333%,84.5333%,84.4833%,and 86.8667%when compared to other methods on the Digital Database for Screening Mammography(DDSM).
基金The authors extend their appreciation to the Deanship of Scientific Research at Shaqra University for funding this research work through the Project Number(SU-ANN-2023016).
文摘Object tracking is one of the major tasks for mobile robots in many real-world applications.Also,artificial intelligence and automatic control techniques play an important role in enhancing the performance of mobile robot navigation.In contrast to previous simulation studies,this paper presents a new intelligent mobile robot for accomplishing multi-tasks by tracking red-green-blue(RGB)colored objects in a real experimental field.Moreover,a practical smart controller is developed based on adaptive fuzzy logic and custom proportional-integral-derivative(PID)schemes to achieve accurate tracking results,considering robot command delay and tolerance errors.The design of developed controllers implies some motion rules to mimic the knowledge of experienced operators.Twelve scenarios of three colored object combinations have been successfully tested and evaluated by using the developed controlled image-based robot tracker.Classical PID control failed to handle some tracking scenarios in this study.The proposed adaptive fuzzy PID control achieved the best accurate results with the minimum average final error of 13.8 cm to reach the colored targets,while our designed custom PID control is efficient in saving both average time and traveling distance of 6.6 s and 14.3 cm,respectively.These promising results demonstrate the feasibility of applying our developed image-based robotic system in a colored object-tracking environment to reduce human workloads.
基金supported by Northern Border University,Arar,KSA,through the Project Number“NBU-FFR-2024-2248-02”.
文摘This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network(MANET)routing protocols:Destination Sequenced Distance Vector(DSDV),Ad hoc On-Demand Distance Vector(AODV),Dynamic Source Routing(DSR),and Zone Routing Protocol(ZRP).In this paper,the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis,Mann-Whitney,and Friedman.It articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility patterns.The study is premised upon the Quality of Service(QoS)metrics of throughput,packet delivery ratio,and end-to-end delay to gain an adequate understanding of the operational efficiency of each protocol under different network scenarios.The findings explained significant differences in the performance of different routing protocols;as a result,decisions for the selection and optimization of routing protocols can be taken effectively according to different network requirements.This paper is a step forward in the general understanding of the routing dynamics of MANETs and contributes significantly to the strategic deployment of robust and efficient network infrastructures.
基金The authors thank to the deanship of scientific research at Shaqra University for funding this research work through the Project Number(SU-ANN-2023017).
文摘E-learning behavior data indicates several students’activities on the e-learning platform such as the number of accesses to a set of resources and number of participants in lectures.This article proposes a new analytics systemto support academic evaluation for students via e-learning activities to overcome the challenges faced by traditional learning environments.The proposed e-learning analytics system includes a new deep forest model.It consists of multistage cascade random forests with minimal hyperparameters compared to traditional deep neural networks.The developed forest model can analyze each student’s activities during the use of an e-learning platform to give accurate expectations of the student’s performance before ending the semester and/or the final exam.Experiments have been conducted on the Open University Learning Analytics Dataset(OULAD)of 32,593 students.Our proposed deep model showed a competitive accuracy score of 98.0%compared to artificial intelligence-based models,such as ConvolutionalNeuralNetwork(CNN)and Long Short-TermMemory(LSTM)in previous studies.That allows academic advisors to support expected failed students significantly and improve their academic level at the right time.Consequently,the proposed analytics system can enhance the quality of educational services for students in an innovative e-learning framework.
文摘Real-time indoor camera localization is a significant problem in indoor robot navigation and surveillance systems.The scene can change during the image sequence and plays a vital role in the localization performance of robotic applications in terms of accuracy and speed.This research proposed a real-time indoor camera localization system based on a recurrent neural network that detects scene change during the image sequence.An annotated image dataset trains the proposed system and predicts the camera pose in real-time.The system mainly improved the localization performance of indoor cameras by more accurately predicting the camera pose.It also recognizes the scene changes during the sequence and evaluates the effects of these changes.This system achieved high accuracy and real-time performance.The scene change detection process was performed using visual rhythm and the proposed recurrent deep architecture,which performed camera pose prediction and scene change impact evaluation.Overall,this study proposed a novel real-time localization system for indoor cameras that detects scene changes and shows how they affect localization performance.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number(IFP2021-033).
文摘The design ofmicrostrip antennas is a complex and time-consuming process,especially the step of searching for the best design parameters.Meanwhile,the performance ofmicrostrip antennas can be improved usingmetamaterial,which results in a new class of antennas called metamaterial antenna.Several parameters affect the radiation loss and quality factor of this class of antennas,such as the antenna size.Recently,the optimal values of the design parameters of metamaterial antennas can be predicted using machine learning,which presents a better alternative to simulation tools and trialand-error processes.However,the prediction accuracy depends heavily on the quality of the machine learning model.In this paper,and benefiting from the current advances in deep learning,we propose a deep network architecture to predict the bandwidth of metamaterial antenna.Experimental results show that the proposed deep network could accurately predict the optimal values of the antenna bandwidth with a tiny value of mean-square error(MSE).In addition,the proposed model is comparedwith current competing approaches that are based on support vector machines,multi-layer perceptron,K-nearest neighbors,and ensemble models.The results show that the proposed model is better than the other approaches and can predict antenna bandwidth more accurately.
基金the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fasttrack Research Funding Program.
文摘Wireless sensor networks(WSNs)and Internet of Things(IoT)have gained more popularity in recent years as an underlying infrastructure for connected devices and sensors in smart cities.The data generated from these sensors are used by smart cities to strengthen their infrastructure,utilities,and public services.WSNs are suitable for long periods of data acquisition in smart cities.To make the networks of smart cities more reliable for sensitive information,the blockchain mechanism has been proposed.The key issues and challenges of WSNs in smart cities is efficiently scheduling the resources;leading to extending the network lifetime of sensors.In this paper,a linear network coding(LNC)for WSNs with blockchain-enabled IoT devices has been proposed.The consumption of energy is reduced for each node by applying LNC.The efficiency and the reliability of the proposed model are evaluated and compared to those of the existing models.Results from the simulation demonstrate that the proposed model increases the efficiency in terms of the number of live nodes,packet delivery ratio,throughput,and the optimized residual energy compared to other current techniques.
文摘The design of an antenna requires a careful selection of its parameters to retain the desired performance.However,this task is time-consuming when the traditional approaches are employed,which represents a significant challenge.On the other hand,machine learning presents an effective solution to this challenge through a set of regression models that can robustly assist antenna designers to find out the best set of design parameters to achieve the intended performance.In this paper,we propose a novel approach for accurately predicting the bandwidth of metamaterial antenna.The proposed approach is based on employing the recently emerged guided whale optimization algorithm using adaptive particle swarm optimization to optimize the parameters of the long-short-term memory(LSTM)deep network.This optimized network is used to retrieve the metamaterial bandwidth given a set of features.In addition,the superiority of the proposed approach is examined in terms of a comparison with the traditional multilayer perceptron(ML),Knearest neighbors(K-NN),and the basic LSTM in terms of several evaluation criteria such as root mean square error(RMSE),mean absolute error(MAE),and mean bias error(MBE).Experimental results show that the proposed approach could achieve RMSE of(0.003018),MAE of(0.001871),and MBE of(0.000205).These values are better than those of the other competing models.
文摘Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine learning.Each feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of features using typical methods.As a result,a new metaheuristicsbased feature selection method based on the dipper-throated and grey-wolf optimization(DTO-GW)algorithms has been developed in this research.Instability can result when the selection of features is subject to metaheuristics,which can lead to a wide range of results.Thus,we adopted hybrid optimization in our method of optimizing,which allowed us to better balance exploration and harvesting chores more equitably.We propose utilizing the binary DTO-GW search approach we previously devised for selecting the optimal subset of attributes.In the proposed method,the number of features selected is minimized,while classification accuracy is increased.To test the proposed method’s performance against eleven other state-of-theart approaches,eight datasets from the UCI repository were used,such as binary grey wolf search(bGWO),binary hybrid grey wolf,and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hysteresis optimization(bHy),and binary hysteresis optimization(bHWO).The suggested method is superior 4532 CMC,2023,vol.74,no.2 and successful in handling the problem of feature selection,according to the results of the experiments.
基金funded by the Deanship of Scientific Research at Princess Nourah Bint Abdulrahman University,through the Research Funding Program(Grant No#.FRP-1442-20).
文摘Assemblage at public places for religious or sports events has become an integral part of our lives.These gatherings pose a challenge at places where fast crowd verification with social distancing(SD)is required,especially during a pandemic.Presently,verification of crowds is carried out in the form of a queue that increases waiting time resulting in congestion,stampede,and the spread of diseases.This article proposes a cluster verification model(CVM)using a wireless sensor network(WSN),single cluster approach(SCA),and split cluster approach(SpCA)to solve the aforementioned problem for pandemic cases.We show that SD,cluster approaches,and verification by WSN can overcome the management issues by optimizing the cluster size and verification time.Hence,our proposed method minimizes the chances of spreading diseases and stampedes in large events such as a pilgrimage.We consider the assembly points in the annual pilgrimage to Makkah Al-Mukarmah and Umrah for verification using Contiki/Cooja tool.We compute results such as verified cluster members(CMs)to define cluster size,success rate to determine the best success rate,and verification time to determine the optimal verification time for various scenarios.We validate ourmodel by comparing the results of each approach with the existing model.Our results showthat the SpCAwith SD is the best approach with a 96% success rate and optimization of verification time as compared to SCA with SD and the existing model.
基金the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number(IFP2021-043).
文摘This article introduces a new medical internet of things(IoT)framework for intelligent fall detection system of senior people based on our proposed deep forest model.The cascade multi-layer structure of deep forest classifier allows to generate new features at each level with minimal hyperparameters compared to deep neural networks.Moreover,the optimal number of the deep forest layers is automatically estimated based on the early stopping criteria of validation accuracy value at each generated layer.The suggested forest classifier was successfully tested and evaluated using a public SmartFall dataset,which is acquired from three-axis accelerometer in a smartwatch.It includes 92781 training samples and 91025 testing samples with two labeled classes,namely non-fall and fall.Classification results of our deep forest classifier demonstrated a superior performance with the best accuracy score of 98.0%compared to three machine learning models,i.e.,K-nearest neighbors,decision trees and traditional random forest,and two deep learning models,which are dense neural networks and convolutional neural networks.By considering security and privacy aspects in the future work,our proposed medical IoT framework for fall detection of old people is valid for real-time healthcare application deployment.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2022R323)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Traffic prediction of wireless networks attracted many researchersand practitioners during the past decades. However, wireless traffic frequentlyexhibits strong nonlinearities and complicated patterns, which makes it challengingto be predicted accurately. Many of the existing approaches forpredicting wireless network traffic are unable to produce accurate predictionsbecause they lack the ability to describe the dynamic spatial-temporalcorrelations of wireless network traffic data. In this paper, we proposed anovel meta-heuristic optimization approach based on fitness grey wolf anddipper throated optimization algorithms for boosting the prediction accuracyof traffic volume. The proposed algorithm is employed to optimize the hyperparametersof long short-term memory (LSTM) network as an efficient timeseries modeling approach which is widely used in sequence prediction tasks.To prove the superiority of the proposed algorithm, four other optimizationalgorithms were employed to optimize LSTM, and the results were compared.The evaluation results confirmed the effectiveness of the proposed approachin predicting the traffic of wireless networks accurately. On the other hand,a statistical analysis is performed to emphasize the stability of the proposedapproach.
文摘The Internet of Things (IoT) paradigm enables end users to accessnetworking services amongst diverse kinds of electronic devices. IoT securitymechanism is a technology that concentrates on safeguarding the devicesand networks connected in the IoT environment. In recent years, False DataInjection Attacks (FDIAs) have gained considerable interest in the IoT environment.Cybercriminals compromise the devices connected to the networkand inject the data. Such attacks on the IoT environment can result in a considerableloss and interrupt normal activities among the IoT network devices.The FDI attacks have been effectively overcome so far by conventional threatdetection techniques. The current research article develops a Hybrid DeepLearning to Combat Sophisticated False Data Injection Attacks detection(HDL-FDIAD) for the IoT environment. The presented HDL-FDIAD modelmajorly recognizes the presence of FDI attacks in the IoT environment.The HDL-FDIAD model exploits the Equilibrium Optimizer-based FeatureSelection (EO-FS) technique to select the optimal subset of the features.Moreover, the Long Short Term Memory with Recurrent Neural Network(LSTM-RNN) model is also utilized for the purpose of classification. At last,the Bayesian Optimization (BO) algorithm is employed as a hyperparameteroptimizer in this study. To validate the enhanced performance of the HDLFDIADmodel, a wide range of simulations was conducted, and the resultswere investigated in detail. A comparative study was conducted between theproposed model and the existing models. The outcomes revealed that theproposed HDL-FDIAD model is superior to other models.
文摘An attacker has several options for breaking through an organization’s information security protections. Human factors are determined to be the source of some of the worst cyber-attacks every day in every business. The human method, often known as “social engineering”, is the hardest to cope with. This paper examines many types of social engineering. The aim of this study was to ascertain the level of awareness of social engineering, provide appropriate solutions to problems to reduce those engineering risks, and avoid obstacles that could prevent increasing awareness of the dangers of social engineering—Shaqra University (Kingdom of Saudi Arabia). A questionnaire was developed and surveyed 508 employees working at different organizations. The overall Cronbach’s alpha was 0.756, which very good value, the correlation coefficient between each of the items is statistically significant at 0.01 level. The study showed that 63.4% of the surveyed sample had no idea about social engineering. 67.3% of the total samples had no idea about social engineering threats. 42.1% have a weak knowledge of social engineering and only 7.5% of the sample had a good knowledge of social engineering. 64.7% of the male did not know what social engineering is. 68.0% of the administrators did not know what social engineering is. Employees who did not take courses showed statistically significant differences.
基金This work was funded by the University of Jeddah,Jeddah,Saudi Arabia,under grant No.(UJ-21-DR-25)The authors,therefore,acknowledge with thanks the University of Jeddah technical and financial support.
文摘Smartphones have now become an integral part of our everyday lives.User authentication on smartphones is often accomplished by mechanisms(like face unlock,pattern,or pin password)that authenticate the user’s identity.These technologies are simple,inexpensive,and fast for repeated logins.However,these technologies are still subject to assaults like smudge assaults and shoulder surfing.Users’touch behavior while using their cell phones might be used to authenticate them,which would solve the problem.The performance of the authentication process may be influenced by the attributes chosen(from these behaviors).The purpose of this study is to present an effective authentication technique that implicitly offers a better authentication method for smartphone usage while avoiding the cost of a particular device and considering the constrained capabilities of smartphones.We began by concentrating on feature selection methods utilizing the grey wolf optimization strategy.The random forest classifier is used to evaluate these tactics.The testing findings demonstrated that the grey wolf-based methodology works as a better optimum feature selection for building an implicit authentication mechanism for the smartphone environment when using a public dataset.It achieved a 97.89%accuracy rate while utilizing just 16 of the 53 characteristics like utilizing minimum mobile resources mainly;processing power of the device and memory to validate individuals.Simultaneously,the findings revealed that our approach has a lower equal error rate(EER)of 0.5104,a false acceptance rate(FAR)of 1.00,and a false rejection rate(FRR)of 0.0209 compared to the methods discussed in the literature.These promising results will be used to create a mobile application that enables implicit validation of authorized users yet avoids current identification concerns and requires fewer mobile resources.
文摘The evolution of the Internet of Things(IoT)has empowered modern industries with the capability to implement large-scale IoT ecosystems,such as the Industrial Internet of Things(IIoT).The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational andfinancial harm to organizations.To preserve the confidentiality,integrity,and availability of IIoT networks,an anomaly-based intrusion detection system(IDS)can be used to provide secure,reliable,and efficient IIoT ecosystems.In this paper,we propose an anomaly-based IDS for IIoT networks as an effective security solution to efficiently and effectively overcome several IIoT cyberattacks.The proposed anomaly-based IDS is divided into three phases:pre-processing,feature selection,and classification.In the pre-processing phase,data cleaning and nor-malization are performed.In the feature selection phase,the candidates’feature vectors are computed using two feature reduction techniques,minimum redun-dancy maximum relevance and neighborhood components analysis.For thefinal step,the modeling phase,the following classifiers are used to perform the classi-fication:support vector machine,decision tree,k-nearest neighbors,and linear discriminant analysis.The proposed work uses a new data-driven IIoT data set called X-IIoTID.The experimental evaluation demonstrates our proposed model achieved a high accuracy rate of 99.58%,a sensitivity rate of 99.59%,a specificity rate of 99.58%,and a low false positive rate of 0.4%.
基金the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia through the project number(IFP2021-043).
文摘Falling is among the most harmful events older adults may encounter.With the continuous growth of the aging population in many societies,developing effective fall detection mechanisms empowered by machine learning technologies and easily integrable with existing healthcare systems becomes essential.This paper presents a new healthcare Internet of Health Things(IoHT)architecture built around an ensemble machine learning-based fall detection system(FDS)for older people.Compared to deep neural networks,the ensemble multi-stage random forest model allows the extraction of an optimal subset of fall detection features with minimal hyperparameters.The number of cascaded random forest stages is automatically optimized.This study uses a public dataset of fall detection samples called SmartFall to validate the developed fall detection system.The SmartFall dataset is collected based on the acquired measurements of the three-axis accelerometer in a smartwatch.Each scenario in this dataset is classified and labeled as a fall or a non-fall.In comparison to the three machine learning models—K-nearest neighbors(KNN),decision tree(DT),and standard random forest(SRF),the proposed ensemble classifier outperformed the other models and achieved 98.4%accuracy.The developed healthcare IoHT framework can be realized for detecting fall accidents of older people by taking security and privacy concerns into account in future work.