期刊文献+
共找到80篇文章
< 1 2 4 >
每页显示 20 50 100
Sepsis Prediction Using CNNBDLSTM and Temporal Derivatives Feature Extraction in the IoT Medical Environment
1
作者 Sapiah Sakri Shakila Basheer +4 位作者 Zuhaira Muhammad Zain Nurul Halimatul Asmak Ismail Dua’Abdellatef Nassar Manal Abdullah Alohali Mais Ayman Alharaki 《Computers, Materials & Continua》 SCIE EI 2024年第4期1157-1185,共29页
Background:Sepsis,a potentially fatal inflammatory disease triggered by infection,carries significant healthimplications worldwide.Timely detection is crucial as sepsis can rapidly escalate if left undetected.Recentad... Background:Sepsis,a potentially fatal inflammatory disease triggered by infection,carries significant healthimplications worldwide.Timely detection is crucial as sepsis can rapidly escalate if left undetected.Recentadvancements in deep learning(DL)offer powerful tools to address this challenge.Aim:Thus,this study proposeda hybrid CNNBDLSTM,a combination of a convolutional neural network(CNN)with a bi-directional long shorttermmemory(BDLSTM)model to predict sepsis onset.Implementing the proposed model provides a robustframework that capitalizes on the complementary strengths of both architectures,resulting in more accurate andtimelier predictions.Method:The sepsis prediction method proposed here utilizes temporal feature extraction todelineate six distinct time frames before the onset of sepsis.These time frames adhere to the sepsis-3 standardrequirement,which incorporates 12-h observation windows preceding sepsis onset.All models were trained usingthe Medical Information Mart for Intensive Care III(MIMIC-III)dataset,which sourced 61,522 patients with 40clinical variables obtained from the IoT medical environment.The confusion matrix,the area under the receiveroperating characteristic curve(AUCROC)curve,the accuracy,the precision,the F1-score,and the recall weredeployed to evaluate themodels.Result:The CNNBDLSTMmodel demonstrated superior performance comparedto the benchmark and other models,achieving an AUCROC of 99.74%and an accuracy of 99.15%one hour beforesepsis onset.These results indicate that the CNNBDLSTM model is highly effective in predicting sepsis onset,particularly within a close proximity of one hour.Implication:The results could assist practitioners in increasingthe potential survival of the patient one hour before sepsis onset. 展开更多
关键词 Temporal derivatives hybrid deep learning predicting sepsis onset MIMIC III machine learning(ML) deep learning
下载PDF
Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies
2
作者 Waseem Akram Khalid Mahmood +3 位作者 Hafiz Burhan ul Haq Muhammad Asif Shehzad Ashraf Chaudhry Taeshik Shon 《Computers, Materials & Continua》 SCIE EI 2024年第7期263-280,共18页
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookie... Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookies are exploited to carry client patterns observed by a website.These client patterns facilitate the particular client’s future visit to the corresponding website.However,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the browser.Several protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource overheads.In this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP cookies.Our proposed protocol uses a secret key embedded within a cookie.The proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication costs.Moreover,the analysis presented in this paper confirms that proposed protocol resists various known attacks. 展开更多
关键词 COOKIES authentication protocol impersonation attack ECC
下载PDF
BHJO: A Novel Hybrid Metaheuristic Algorithm Combining the Beluga Whale, Honey Badger, and Jellyfish Search Optimizers for Solving Engineering Design Problems
3
作者 Farouq Zitouni Saad Harous +4 位作者 Abdulaziz S.Almazyad Ali Wagdy Mohamed Guojiang Xiong Fatima Zohra Khechiba Khadidja  Kherchouche 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期219-265,共47页
Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization problems.This approach aims to leverage the strengt... Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization problems.This approach aims to leverage the strengths of multiple algorithms,enhancing solution quality,convergence speed,and robustness,thereby offering a more versatile and efficient means of solving intricate real-world optimization tasks.In this paper,we introduce a hybrid algorithm that amalgamates three distinct metaheuristics:the Beluga Whale Optimization(BWO),the Honey Badger Algorithm(HBA),and the Jellyfish Search(JS)optimizer.The proposed hybrid algorithm will be referred to as BHJO.Through this fusion,the BHJO algorithm aims to leverage the strengths of each optimizer.Before this hybridization,we thoroughly examined the exploration and exploitation capabilities of the BWO,HBA,and JS metaheuristics,as well as their ability to strike a balance between exploration and exploitation.This meticulous analysis allowed us to identify the pros and cons of each algorithm,enabling us to combine them in a novel hybrid approach that capitalizes on their respective strengths for enhanced optimization performance.In addition,the BHJO algorithm incorporates Opposition-Based Learning(OBL)to harness the advantages offered by this technique,leveraging its diverse exploration,accelerated convergence,and improved solution quality to enhance the overall performance and effectiveness of the hybrid algorithm.Moreover,the performance of the BHJO algorithm was evaluated across a range of both unconstrained and constrained optimization problems,providing a comprehensive assessment of its efficacy and applicability in diverse problem domains.Similarly,the BHJO algorithm was subjected to a comparative analysis with several renowned algorithms,where mean and standard deviation values were utilized as evaluation metrics.This rigorous comparison aimed to assess the performance of the BHJOalgorithmabout its counterparts,shedding light on its effectiveness and reliability in solving optimization problems.Finally,the obtained numerical statistics underwent rigorous analysis using the Friedman post hoc Dunn’s test.The resulting numerical values revealed the BHJO algorithm’s competitiveness in tackling intricate optimization problems,affirming its capability to deliver favorable outcomes in challenging scenarios. 展开更多
关键词 Global optimization hybridization of metaheuristics beluga whale optimization honey badger algorithm jellyfish search optimizer chaotic maps opposition-based learning
下载PDF
Classifying Misinformation of User Credibility in Social Media Using Supervised Learning
4
作者 Muhammad Asfand-e-Yar Qadeer Hashir +1 位作者 Syed Hassan Tanvir Wajeeha Khalil 《Computers, Materials & Continua》 SCIE EI 2023年第5期2921-2938,共18页
The growth of the internet and technology has had a significant effect on social interactions.False information has become an important research topic due to the massive amount of misinformed content on social network... The growth of the internet and technology has had a significant effect on social interactions.False information has become an important research topic due to the massive amount of misinformed content on social networks.It is very easy for any user to spread misinformation through the media.Therefore,misinformation is a problem for professionals,organizers,and societies.Hence,it is essential to observe the credibility and validity of the News articles being shared on social media.The core challenge is to distinguish the difference between accurate and false information.Recent studies focus on News article content,such as News titles and descriptions,which has limited their achievements.However,there are two ordinarily agreed-upon features of misinformation:first,the title and text of an article,and second,the user engagement.In the case of the News context,we extracted different user engagements with articles,for example,tweets,i.e.,read-only,user retweets,likes,and shares.We calculate user credibility and combine it with article content with the user’s context.After combining both features,we used three Natural language processing(NLP)feature extraction techniques,i.e.,Term Frequency-Inverse Document Frequency(TF-IDF),Count-Vectorizer(CV),and Hashing-Vectorizer(HV).Then,we applied different machine learning classifiers to classify misinformation as real or fake.Therefore,we used a Support Vector Machine(SVM),Naive Byes(NB),Random Forest(RF),Decision Tree(DT),Gradient Boosting(GB),and K-Nearest Neighbors(KNN).The proposed method has been tested on a real-world dataset,i.e.,“fakenewsnet”.We refine the fakenewsnet dataset repository according to our required features.The dataset contains 23000+articles with millions of user engagements.The highest accuracy score is 93.4%.The proposed model achieves its highest accuracy using count vector features and a random forest classifier.Our discoveries confirmed that the proposed classifier would effectively classify misinformation in social networks. 展开更多
关键词 MISINFORMATION user credibility fake news machine learning
下载PDF
Dataset of Large Gathering Images for Person Identification and Tracking
5
作者 Adnan Nadeem Amir Mehmood +7 位作者 Kashif Rizwan Muhammad Ashraf Nauman Qadeer Ali Alzahrani Qammer H.Abbasi Fazal Noor Majed Alhaisoni Nadeem Mahmood 《Computers, Materials & Continua》 SCIE EI 2023年第3期6065-6080,共16页
This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi,Madinah,Saudi Arabia.This dataset consists of raw and processed ... This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi,Madinah,Saudi Arabia.This dataset consists of raw and processed images reflecting a highly challenging and unconstraint environment.The methodology for building the dataset consists of four core phases;that include acquisition of videos,extraction of frames,localization of face regions,and cropping and resizing of detected face regions.The raw images in the dataset consist of a total of 4613 frames obtained fromvideo sequences.The processed images in the dataset consist of the face regions of 250 persons extracted from raw data images to ensure the authenticity of the presented data.The dataset further consists of 8 images corresponding to each of the 250 subjects(persons)for a total of 2000 images.It portrays a highly unconstrained and challenging environment with human faces of varying sizes and pixel quality(resolution).Since the face regions in video sequences are severely degraded due to various unavoidable factors,it can be used as a benchmark to test and evaluate face detection and recognition algorithms for research purposes.We have also gathered and displayed records of the presence of subjects who appear in presented frames;in a temporal context.This can also be used as a temporal benchmark for tracking,finding persons,activity monitoring,and crowd counting in large crowd scenarios. 展开更多
关键词 Large crowd gatherings a dataset of large crowd images highly uncontrolled environment tracking missing persons face recognition activity monitoring
下载PDF
Heart-Net: AMulti-Modal Deep Learning Approach for Diagnosing Cardiovascular Diseases
6
作者 DeemaMohammed Alsekait Ahmed Younes Shdefat +5 位作者 AymanNabil Asif Nawaz Muhammad Rizwan Rashid Rana Zohair Ahmed Hanaa Fathi Diaa Salama Abd Elminaam 《Computers, Materials & Continua》 SCIE EI 2024年第9期3967-3990,共24页
Heart disease remains a leading cause of morbidity and mortality worldwide,highlighting the need for improved diagnostic methods.Traditional diagnostics face limitations such as reliance on single-modality data and vu... Heart disease remains a leading cause of morbidity and mortality worldwide,highlighting the need for improved diagnostic methods.Traditional diagnostics face limitations such as reliance on single-modality data and vulnerability to apparatus faults,which can reduce accuracy,especially with poor-quality images.Additionally,these methods often require significant time and expertise,making them less accessible in resource-limited settings.Emerging technologies like artificial intelligence and machine learning offer promising solutions by integrating multi-modality data and enhancing diagnostic precision,ultimately improving patient outcomes and reducing healthcare costs.This study introduces Heart-Net,a multi-modal deep learning framework designed to enhance heart disease diagnosis by integrating data from Cardiac Magnetic Resonance Imaging(MRI)and Electrocardiogram(ECG).Heart-Net uses a 3D U-Net for MRI analysis and a Temporal Convolutional Graph Neural Network(TCGN)for ECG feature extraction,combining these through an attention mechanism to emphasize relevant features.Classification is performed using Optimized TCGN.This approach improves early detection,reduces diagnostic errors,and supports personalized risk assessments and continuous health monitoring.The proposed approach results show that Heart-Net significantly outperforms traditional single-modality models,achieving accuracies of 92.56%forHeartnetDataset Ⅰ(HNET-DSⅠ),93.45%forHeartnetDataset Ⅱ(HNET-DSⅡ),and 91.89%for Heartnet Dataset Ⅲ(HNET-DSⅢ),mitigating the impact of apparatus faults and image quality issues.These findings underscore the potential of Heart-Net to revolutionize heart disease diagnostics and improve clinical outcomes. 展开更多
关键词 Heart diseases magnetic resonance imaging ELECTROCARDIOGRAM deep learning CLASSIFICATION
下载PDF
A Low Complexity ML-Based Methods for Malware Classification
7
作者 Mahmoud E.Farfoura Ahmad Alkhatib +4 位作者 Deema Mohammed Alsekait Mohammad Alshinwan Sahar A.El-Rahman Didi Rosiyadi Diaa Salama Abd Elminaam 《Computers, Materials & Continua》 SCIE EI 2024年第9期4833-4857,共25页
The article describes a new method for malware classification,based on a Machine Learning(ML)model architecture specifically designed for malware detection,enabling real-time and accurate malware identification.Using ... The article describes a new method for malware classification,based on a Machine Learning(ML)model architecture specifically designed for malware detection,enabling real-time and accurate malware identification.Using an innovative feature dimensionality reduction technique called the Interpolation-based Feature Dimensionality Reduction Technique(IFDRT),the authors have significantly reduced the feature space while retaining critical information necessary for malware classification.This technique optimizes the model’s performance and reduces computational requirements.The proposed method is demonstrated by applying it to the BODMAS malware dataset,which contains 57,293 malware samples and 77,142 benign samples,each with a 2381-feature vector.Through the IFDRT method,the dataset is transformed,reducing the number of features while maintaining essential data for accurate classification.The evaluation results show outstanding performance,with an F1 score of 0.984 and a high accuracy of 98.5%using only two reduced features.This demonstrates the method’s ability to classify malware samples accurately while minimizing processing time.The method allows for improving computational efficiency by reducing the feature space,which decreases the memory and time requirements for training and prediction.The new method’s effectiveness is confirmed by the calculations,which indicate significant improvements in malware classification accuracy and efficiency.The research results enhance existing malware detection techniques and can be applied in various cybersecurity applications,including real-timemalware detection on resource-constrained devices.Novelty and scientific contribution lie in the development of the IFDRT method,which provides a robust and efficient solution for feature reduction in ML-based malware classification,paving the way for more effective and scalable cybersecurity measures. 展开更多
关键词 Malware detection ML-based models dimensionality reduction feature engineering
下载PDF
Structure Design of Underwater Micro Robot
8
作者 Md Shahriar Sujan Joy Howlader +1 位作者 Md Jahangir Alam Md Al Imran Tapu 《Modern Mechanical Engineering》 2024年第1期12-24,共13页
A submergible robot model has been presented, and for 3D printing measures, their parts have been modified enough. It has been shown in our design that using printable connectors—a few engines and weight arrangements... A submergible robot model has been presented, and for 3D printing measures, their parts have been modified enough. It has been shown in our design that using printable connectors—a few engines and weight arrangements can be carried out, permitting distinctive moving prospects. After presenting our configuration and delineating a bunch of potential structures, a helpful model dependent on open-source equipment and programming arrangements has been presented conditionally. The model can be effectively tried in a few makes-a plunge streams and lakes throughout the planet. The unwavering quality of the printed models can be strained distinctly in generally shallow waters. Nonetheless, we accept that their accessibility will inspire the overall population to construct and test submerged robots, subsequently accelerating the improvement of imaginative arrangements and applications. 展开更多
关键词 Submergible Robot THRUSTER ADAPTER Raspberry Pi 3D Printer Open Source Software
下载PDF
Effective and Efficient Feature Selection for Large-scale Data Using Bayes' Theorem 被引量:7
9
作者 Subramanian Appavu Alias Balamurugan Ramasamy Rajaram 《International Journal of Automation and computing》 EI 2009年第1期62-71,共10页
This paper proposes one method of feature selection by using Bayes' theorem. The purpose of the proposed method is to reduce the computational complexity and increase the classification accuracy of the selected featu... This paper proposes one method of feature selection by using Bayes' theorem. The purpose of the proposed method is to reduce the computational complexity and increase the classification accuracy of the selected feature subsets. The dependence between two attributes (binary) is determined based on the probabilities of their joint values that contribute to positive and negative classification decisions. If opposing sets of attribute values do not lead to opposing classification decisions (zero probability), then the two attributes are considered independent of each other, otherwise dependent, and one of them can be removed and thus the number of attributes is reduced. The process must be repeated on all combinations of attributes. The paper also evaluates the approach by comparing it with existing feature selection algorithms over 8 datasets from University of California, Irvine (UCI) machine learning databases. The proposed method shows better results in terms of number of selected features, classification accuracy, and running time than most existing algorithms. 展开更多
关键词 Data mining CLASSIFICATION feature selection dimensionality reduction Bayes' theorem.
下载PDF
Land-Cover Classification and its Impact on Peshawar’s Land Surface Temperature Using Remote Sensing 被引量:4
10
作者 Shahab Ul Islam Saifullah Jan +3 位作者 Abdul Waheed Gulzar Mehmood Mahdi Zareei Faisal Alanazi 《Computers, Materials & Continua》 SCIE EI 2022年第2期4123-4145,共23页
Spatial and temporal informationon urban infrastructure is essential and requires various land-cover/land-use planning and management applications.Besides,a change in infrastructure has a direct impact on other land-c... Spatial and temporal informationon urban infrastructure is essential and requires various land-cover/land-use planning and management applications.Besides,a change in infrastructure has a direct impact on other land-cover and climatic conditions.This study assessed changes in the rate and spatial distribution of Peshawar district’s infrastructure and its effects on Land Surface Temperature(LST)during the years 1996 and 2019.For this purpose,firstly,satellite images of bands7 and 8 ETM+(Enhanced Thematic Mapper)plus and OLI(Operational Land Imager)of 30 m resolution were taken.Secondly,for classification and image processing,remote sensing(RS)applications ENVI(Environment for Visualising Images)and GIS(Geographic Information System)were used.Thirdly,for better visualization and more in-depth analysis of land sat images,pre-processing techniques were employed.For Land use and Land cover(LU/LC)four types of land cover areas were identified-vegetation area,water cover,urbanized area,and infertile land for the years under research.The composition of red,green,and near infra-red bands was used for supervised classification.Classified images were extracted for analyzing the relative infrastructure change.A comparative analysis for the classification of images is performed for SVM(Support Vector Machine)and ANN(Artificial Neural Network).Based on analyzing these images,the result shows the rise in the average temperature from 30.04℃ to 45.25℃.This only possible reason is the increase in the built-up area from 78.73 to 332.78 Area km^(2) from 1996 to 2019.It has also been witnessed that the city’s sides are hotter than the city’s center due to the barren land on the borders. 展开更多
关键词 Remote sensing temperature extraction URBANIZATION satellite image classification artificial neural network support vector machine LU/LC land surface temperature
下载PDF
Early Detection of Diabetic Retinopathy Using Machine Intelligence throughDeep Transfer and Representational Learning 被引量:2
11
作者 Fouzia Nawaz Muhammad Ramzan +3 位作者 Khalid Mehmood Hikmat Ullah Khan Saleem Hayat Khan Muhammad Raheel Bhutta 《Computers, Materials & Continua》 SCIE EI 2021年第2期1631-1645,共15页
Diabetic retinopathy (DR) is a retinal disease that causes irreversible blindness.DR occurs due to the high blood sugar level of the patient, and it is clumsy tobe detected at an early stage as no early symptoms appea... Diabetic retinopathy (DR) is a retinal disease that causes irreversible blindness.DR occurs due to the high blood sugar level of the patient, and it is clumsy tobe detected at an early stage as no early symptoms appear at the initial level. To preventblindness, early detection and regular treatment are needed. Automated detectionbased on machine intelligence may assist the ophthalmologist in examining thepatients’ condition more accurately and efficiently. The purpose of this study is toproduce an automated screening system for recognition and grading of diabetic retinopathyusing machine learning through deep transfer and representational learning.The artificial intelligence technique used is transfer learning on the deep neural network,Inception-v4. Two configuration variants of transfer learning are applied onInception-v4: Fine-tune mode and fixed feature extractor mode. Both configurationmodes have achieved decent accuracy values, but the fine-tuning method outperformsthe fixed feature extractor configuration mode. Fine-tune configuration modehas gained 96.6% accuracy in early detection of DR and 97.7% accuracy in gradingthe disease and has outperformed the state of the art methods in the relevant literature. 展开更多
关键词 Diabetic retinopathy artificial intelligence automated screening system machine learning deep neural network transfer and representational learning
下载PDF
Reliability Modelling and Analysis of Redundant Systems Connected to Supporting External Device for Operation Attended by a Repairman and Repairable Service Station 被引量:1
12
作者 Ibrahim Yusuf Rabia Salihu Said +1 位作者 Fatima Salman Koki Mansur Babagana 《Journal of Applied Mathematics and Physics》 2014年第13期1242-1256,共15页
In this paper, probabilistic models for three redundant configurations have been developed to analyze and compare some reliability characteristics. Each system is connected to a repairable supporting external device f... In this paper, probabilistic models for three redundant configurations have been developed to analyze and compare some reliability characteristics. Each system is connected to a repairable supporting external device for operation. Repairable service station is provided for immediate repair of failed unit. Explicit expressions for mean time to system failure and steady-state availability for the three configurations are developed. Furthermore, we compare the three configurations based on their reliability characteristics and found that configuration II is more reliable and efficient than the remaining configurations. 展开更多
关键词 AVAILABILITY SUPPORTING DEVICE Service STATION REDUNDANCY
下载PDF
Real-Time Violent Action Recognition Using Key Frames Extraction and Deep Learning 被引量:1
13
作者 Muzamil Ahmed Muhammad Ramzan +5 位作者 Hikmat Ullah Khan Saqib Iqbal Muhammad Attique Khan Jung-In Choi Yunyoung Nam Seifedine Kadry 《Computers, Materials & Continua》 SCIE EI 2021年第11期2217-2230,共14页
Violence recognition is crucial because of its applications in activities related to security and law enforcement.Existing semi-automated systems have issues such as tedious manual surveillances,which causes human err... Violence recognition is crucial because of its applications in activities related to security and law enforcement.Existing semi-automated systems have issues such as tedious manual surveillances,which causes human errors and makes these systems less effective.Several approaches have been proposed using trajectory-based,non-object-centric,and deep-learning-based methods.Previous studies have shown that deep learning techniques attain higher accuracy and lower error rates than those of other methods.However,the their performance must be improved.This study explores the state-of-the-art deep learning architecture of convolutional neural networks(CNNs)and inception V4 to detect and recognize violence using video data.In the proposed framework,the keyframe extraction technique eliminates duplicate consecutive frames.This keyframing phase reduces the training data size and hence decreases the computational cost by avoiding duplicate frames.For feature selection and classification tasks,the applied sequential CNN uses one kernel size,whereas the inception v4 CNN uses multiple kernels for different layers of the architecture.For empirical analysis,four widely used standard datasets are used with diverse activities.The results confirm that the proposed approach attains 98%accuracy,reduces the computational cost,and outperforms the existing techniques of violence detection and recognition. 展开更多
关键词 Violence detection violence recognition deep learning convolutional neural network inception v4 keyframe extraction
下载PDF
Mobile SMS Spam Filtering for Nepali Text Using Naive Bayesian and Support Vector Machine 被引量:2
14
作者 Tej Bahadur Shahi Abhimanu Yadav 《International Journal of Intelligence Science》 2014年第1期24-28,共5页
Spam is a universal problem with which everyone is familiar. A number of approaches are used for Spam filtering. The most common filtering technique is content-based filtering which uses the actual text of message to ... Spam is a universal problem with which everyone is familiar. A number of approaches are used for Spam filtering. The most common filtering technique is content-based filtering which uses the actual text of message to determine whether it is Spam or not. The content is very dynamic and it is very challenging to represent all information in a mathematical model of classification. For instance, in content-based Spam filtering, the characteristics used by the filter to identify Spam message are constantly changing over time. Na?ve Bayes method represents the changing nature of message using probability theory and support vector machine (SVM) represents those using different features. These two methods of classification are efficient in different domains and the case of Nepali SMS or Text classification has not yet been in consideration;these two methods do not consider the issue and it is interesting to find out the performance of both the methods in the problem of Nepali Text classification. In this paper, the Na?ve Bayes and SVM-based classification techniques are implemented to classify the Nepali SMS as Spam and non-Spam. An empirical analysis for various text cases has been done to evaluate accuracy measure of the classification methodologies used in this study. And, it is found to be 87.15% accurate in SVM and 92.74% accurate in the case of Na?ve Bayes. 展开更多
关键词 SMS Spam Filtering Classification Support Vector Machine Naive Bayes PREPROCESSING Feature Extraction Nepali SMS Datasets
下载PDF
Novel Architecture of Security Orchestration, Automation and Response in Internet of Blended Environment
15
作者 Minkyung Lee Julian Jang-Jaccard Jin Kwak 《Computers, Materials & Continua》 SCIE EI 2022年第10期199-223,共25页
New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environme... New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environments,such as smart factories,digital healthcare,and smart grids,with increased security concerns.We intend to operate Security Orchestration,Automation and Response(SOAR)in various environments through new concept definitions as the need to detect and respond automatically to rapidly increasing security incidents without the intervention of security personnel has emerged.To facilitate the understanding of the security concern involved in this newly emerging area,we offer the definition of Internet of Blended Environment(IoBE)where various convergence environments are interconnected and the data analyzed in automation.We define Blended Threat(BT)as a security threat that exploits security vulnerabilities through various attack surfaces in the IoBE.We propose a novel SOAR-CUBE architecture to respond to security incidents with minimal human intervention by automating the BT response process.The Security Orchestration,Automation,and Response(SOAR)part of our architecture is used to link heterogeneous security technologies and the threat intelligence function that collects threat data and performs a correlation analysis of the data.SOAR is operated under Collaborative Units of Blended Environment(CUBE)which facilitates dynamic exchanges of data according to the environment applied to the IoBE by distributing and deploying security technologies for each BT type and dynamically combining them according to the cyber kill chain stage to minimize the damage and respond efficiently to BT. 展开更多
关键词 Blended threat(BT) collaborative units for blended environment(CUBE) internet of blended environment(IoBE) security orchestration automation and response(SOAR)
下载PDF
ILipo-PseAAC: Identification of Lipoylation Sites Using Statistical Moments and General PseAAC
16
作者 Talha Imtiaz Baig Yaser Daanial Khan +3 位作者 Talha Mahboob Alam Bharat Biswal Hanan Aljuaid Durdana Qaiser Gillani 《Computers, Materials & Continua》 SCIE EI 2022年第4期215-230,共16页
Lysine Lipoylation is a protective and conserved Post Translational Modification(PTM)in proteomics research like prokaryotes and eukaryotes.It is connected with many biological processes and closely linked with many m... Lysine Lipoylation is a protective and conserved Post Translational Modification(PTM)in proteomics research like prokaryotes and eukaryotes.It is connected with many biological processes and closely linked with many metabolic diseases.To develop a perfect and accurate classification model for identifying lipoylation sites at the protein level,the computational methods and several other factors play a key role in this purpose.Usually,most of the techniques and different traditional experimental models have a very high cost.They are time-consuming;so,it is required to construct a predictor model to extract lysine lipoylation sites.This study proposes a model that could predict lysine lipoylation sites with the help of a classification method known as Artificial Neural Network(ANN).The ANN algorithm deals with the noise problem and imbalance classification in lipoylation sites dataset samples.As the result shows in ten-fold cross-validation,a brilliant performance is achieved through the predictor model with an accuracy of 99.88%,and also achieved 0.9976 as the highest value of MCC.So,the predictor model is a very useful and helpful tool for lipoylation sites prediction.Some of the residues around lysine lipoylation sites play a vital part in prediction,as demonstrated during feature analysis.The wonderful results reported through the evaluation and prediction of this model can provide an informative and relative explanation for lipoylation and its molecular mechanisms. 展开更多
关键词 Lipoylation lysine feature vector post translational modification amino acid Mathew’s correlation coefficient neural network
下载PDF
On REE and EER Methods for Mining Corner Points on the Images
17
作者 Muhammad Sarfraz Zarnawab N. K. Swati 《Journal of Computer and Communications》 2014年第2期91-96,共6页
This paper reviews, implements and compares two corner detection algorithms for mining corner points on the generic shapes. These corner detectors detect corners by using combination of one rectangle (R) and two ellip... This paper reviews, implements and compares two corner detection algorithms for mining corner points on the generic shapes. These corner detectors detect corners by using combination of one rectangle (R) and two ellipses (EE). These algorithms have been used with different combinations: REE and EER together with different parameter settings in their descriptions. REE and EER combinations slide along the boundary of the shape and record number of boundary points in each rectangle and ellipses. REE and EER setup represent both local and global views of the image outlines and present natural corner detection methodologies to detect and mine all true corners accurately. A comparative study demonstrates the superiority of the REE and EER over some of the existing algorithms. 展开更多
关键词 MINING CORNER Points CORNER Detector Planar CURVES IMAGES
下载PDF
Evaluating the Impacts of Security-Durability Characteristic:Data Science Perspective
18
作者 Abdullah Alharbi Masood Ahmad +5 位作者 Wael Alosaimi Hashem Alyami Alka Agrawal Rajeev Kumar Abdul Wahid Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期557-567,共11页
Since the beginning of web applications,security has been a critical study area.There has been a lot of research done to figure out how to define and identify security goals or issues.However,high-security web apps ha... Since the beginning of web applications,security has been a critical study area.There has been a lot of research done to figure out how to define and identify security goals or issues.However,high-security web apps have been found to be less durable in recent years;thus reducing their business continuity.High security features of a web application are worthless unless they provide effective services to the user and meet the standards of commercial viability.Hence,there is a necessity to link in the gap between durability and security of the web application.Indeed,security mechanisms must be used to enhance durability as well as the security of the web application.Although durability and security are not related directly,some of their factors influence each other indirectly.Characteristics play an important role in reducing the void between durability and security.In this respect,the present study identifies key characteristics of security and durability that affect each other indirectly and directly,including confidentiality,integrity availability,human trust and trustworthiness.The importance of all the attributes in terms of their weight is essential for their influence on the whole security during the development procedure of web application.To estimate the efficacy of present study,authors employed the Hesitant Fuzzy Analytic Hierarchy Process(H-Fuzzy AHP).The outcomes of our investigations and conclusions will be a useful reference for the web application developers in achieving a more secure and durable web application. 展开更多
关键词 Software security DURABILITY durability of security services web application development process
下载PDF
Real-Time Safety Helmet Detection Using Yolov5 at Construction Sites 被引量:2
19
作者 Kisaezehra Muhammad Umer Farooq +1 位作者 Muhammad Aslam Bhutto Abdul Karim Kazi 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期911-927,共17页
The construction industry has always remained the economic and social backbone of any country in the world where occupational health and safety(OHS)is of prime importance.Like in other developing countries,this indust... The construction industry has always remained the economic and social backbone of any country in the world where occupational health and safety(OHS)is of prime importance.Like in other developing countries,this industry pays very little,rather negligible attention to OHS practices in Pakistan,resulting in the occurrence of a wide variety of accidents,mishaps,and near-misses every year.One of the major causes of such mishaps is the non-wearing of safety helmets(hard hats)at construction sites where falling objects from a height are unavoid-able.In most cases,this leads to serious brain injuries in people present at the site in general and the workers in particular.It is one of the leading causes of human fatalities at construction sites.In the United States,the Occupational Safety and Health Administration(OSHA)requires construction companies through safety laws to ensure the use of well-defined personal protective equipment(PPE).It has long been a problem to ensure the use of PPE because round-the-clock human monitoring is not possible.However,such monitoring through technological aids or automated tools is very much possible.The present study describes a systema-tic strategy based on deep learning(DL)models built on the You-Only-Look-Once(YOLOV5)architecture that could be used for monitoring workers’hard hats in real-time.It can indicate whether a worker is wearing a hat or not.The proposed system usesfive different models of the YOLOV5,namely YOLOV5n,YOLOv5s,YOLOv5 m,YOLOv5l,and YOLOv5x for object detection with the support of PyTorch,involving 7063 images.The results of the study show that among the DL models,the YOLOV5x has a high performance of 95.8%in terms of the mAP,while the YOLOV5n has the fastest detection speed of 70.4 frames per second(FPS).The proposed model can be successfully used in practice to recognize the hard hat worn by a worker. 展开更多
关键词 Object detection computer-vision personal protective equipment(PPE) deep learning industry revolution(IR)4.0 safety helmet detection
下载PDF
Fake News Encoder Classifier (FNEC) for Online Published News Related to COVID-19 Vaccines 被引量:1
20
作者 Asma Qaiser Saman Hina +2 位作者 Abdul Karim Kazi Saad Ahmed Raheela Asif 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期73-90,共18页
In the past few years,social media and online news platforms have played an essential role in distributing news content rapidly.Consequently.verification of the authenticity of news has become a major challenge.During... In the past few years,social media and online news platforms have played an essential role in distributing news content rapidly.Consequently.verification of the authenticity of news has become a major challenge.During the COVID-19 outbreak,misinformation and fake news were major sources of confusion and insecurity among the general public.In the first quarter of the year 2020,around 800 people died due to fake news relevant to COVID-19.The major goal of this research was to discover the best learning model for achieving high accuracy and performance.A novel case study of the Fake News Classification using ELECTRA model,which achieved 85.11%accuracy score,is thus reported in this manuscript.In addition to that,a new novel dataset called COVAX-Reality containing COVID-19 vaccine-related news has been contributed.Using the COVAX-Reality dataset,the performance of FNEC is compared to several traditional learning models i.e.,Support Vector Machine(SVM),Naive Bayes(NB),Passive Aggressive Classifier(PAC),Long Short-Term Memory(LSTM),Bi-directional LSTM(Bi-LSTM)and Bi-directional Encoder Representations from Transformers(BERT).For the evaluation of FNEC,standard metrics(Precision,Recall,Accuracy,and F1-Score)were utilized. 展开更多
关键词 Deep learning fake news detection machine learning transformer model classification
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部