期刊文献+
共找到27篇文章
< 1 2 >
每页显示 20 50 100
Secure and Reliable Routing in the Internet of Vehicles Network:AODV-RL with BHA Attack Defense
1
作者 Nadeem Ahmed Khalid Mohammadani +3 位作者 Ali Kashif Bashir Marwan Omar Angel Jones Fayaz Hassan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期633-659,共27页
Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad h... Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles(IoV).However,intricate security challenges are intertwinedwith technological progress:Vehicular ad hoc Networks(VANETs),a core component of IoV,face security issues,particularly the Black Hole Attack(BHA).This malicious attack disrupts the seamless flow of data and threatens the network’s overall reliability;also,BHA strategically disrupts communication pathways by dropping data packets from legitimate nodes altogether.Recognizing the importance of this challenge,we have introduced a new solution called ad hoc On-Demand Distance Vector-Reputation-based mechanism Local Outlier Factor(AODV-RL).The significance of AODVRL lies in its unique approach:it verifies and confirms the trustworthiness of network components,providing robust protection against BHA.An additional safety layer is established by implementing the Local Outlier Factor(LOF),which detects and addresses abnormal network behaviors.Rigorous testing of our solution has revealed its remarkable ability to enhance communication in VANETs.Specifically,Our experimental results achieve message delivery ratios of up to 94.25%andminimal packet loss ratios of just 0.297%.Based on our experimental results,the proposedmechanismsignificantly improves VANET communication reliability and security.These results promise a more secure and dependable future for IoV,capable of transforming transportation safety and efficiency. 展开更多
关键词 Black hole attack IoV vehicular ad hoc network AODV routing protocol
下载PDF
Cache in fog computing design,concepts,contributions,and security issues in machine learning prospective
2
作者 Muhammad Ali Naeem Yousaf Bin Zikria +3 位作者 Rashid Ali Usman Tariq Yahui Meng Ali Kashif Bashir 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1033-1052,共20页
The massive growth of diversified smart devices and continuous data generation poses a challenge to communication architectures.To deal with this problem,communication networks consider fog computing as one of promisi... The massive growth of diversified smart devices and continuous data generation poses a challenge to communication architectures.To deal with this problem,communication networks consider fog computing as one of promising technologies that can improve overall communication performance.It brings on-demand services proximate to the end devices and delivers the requested data in a short time.Fog computing faces several issues such as latency,bandwidth,and link utilization due to limited resources and the high processing demands of end devices.To this end,fog caching plays an imperative role in addressing data dissemination issues.This study provides a comprehensive discussion of fog computing,Internet of Things(IoTs)and the critical issues related to data security and dissemination in fog computing.Moreover,we determine the fog-based caching schemes and contribute to deal with the existing issues of fog computing.Besides,this paper presents a number of caching schemes with their contributions,benefits,and challenges to overcome the problems and limitations of fog computing.We also identify machine learning-based approaches for cache security and management in fog computing,as well as several prospective future research directions in caching,fog computing,and machine learning. 展开更多
关键词 Internet of things Cloud computing Fog computing CACHING LATENCY
下载PDF
Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology
3
作者 Nazik Alturki Raed Alharthi +5 位作者 Muhammad Umer Oumaima Saidani Amal Alshardan Reemah M.Alhebshi Shtwai Alsubai Ali Kashif Bashir 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3387-3415,共29页
The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the d... The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life. 展开更多
关键词 Blockchain Internet of Things(IoT) smart home automation CYBERSECURITY
下载PDF
Allocation and Migration of Virtual Machines Using Machine Learning
4
作者 Suruchi Talwani Khaled Alhazmi +2 位作者 Jimmy Singla Hasan JAlyamani Ali Kashif Bashir 《Computers, Materials & Continua》 SCIE EI 2022年第2期3349-3364,共16页
Cloud computing promises the advent of a new era of service boosted by means of virtualization technology.The process of virtualization means creation of virtual infrastructure,devices,servers and computing resources ... Cloud computing promises the advent of a new era of service boosted by means of virtualization technology.The process of virtualization means creation of virtual infrastructure,devices,servers and computing resources needed to deploy an application smoothly.This extensively practiced technology involves selecting an efficient Virtual Machine(VM)to complete the task by transferring applications from Physical Machines(PM)to VM or from VM to VM.The whole process is very challenging not only in terms of computation but also in terms of energy and memory.This research paper presents an energy aware VM allocation and migration approach to meet the challenges faced by the growing number of cloud data centres.Machine Learning(ML)based Artificial Bee Colony(ABC)is used to rank the VM with respect to the load while considering the energy efficiency as a crucial parameter.The most efficient virtual machines are further selected and thus depending on the dynamics of the load and energy,applications are migrated fromoneVMto another.The simulation analysis is performed inMatlab and it shows that this research work results in more reduction in energy consumption as compared to existing studies. 展开更多
关键词 Cloud computing VM allocation VM migration machine learning
下载PDF
The Impact of Satellite Communications on Environmental Hazard Control: Tool for the Realization of African Union Agenda 2063 Aspirations
5
作者 Nsikan Nkordeh Segun Popoola +4 位作者 Abigail Jefia Mba Okeoghene Aaron A. A. Atayero Morayo Awomoyi Ibinabo Bobmanuel 《International Journal of Communications, Network and System Sciences》 2023年第8期191-216,共26页
Africa is a developing economy and as such, emphasis has been placed on the achievement of revolutionary goals that will place her on a similar rank as the developed economies. Pertaining to this objective, Heads of S... Africa is a developing economy and as such, emphasis has been placed on the achievement of revolutionary goals that will place her on a similar rank as the developed economies. Pertaining to this objective, Heads of States and government all over Africa instigated the African Union (AU) Agenda 2063, which is a framework put in place to achieve a continental transformation over the next 40 years. The use of satellites has been proven to be a major influence on economic growth since it facilitates the exchange of information. Environmental hazards such as climate changes, pollution, and inefficient waste management can be classified as one of the drawbacks to achieving this economic growth we hope to accomplish. The purpose of this paper is to analyze and examine satellite communication as a tool for the attainment of an integrated, prosperous and peaceful Africa by means of combatting environmental hazards in the continent. 展开更多
关键词 AU Agenda 2063 Satellite Communications Environmental hazards Robust Satellite Techniques Remote Sensing
下载PDF
BIFURCATIONS OF TRAVELLING WAVE SOLUTIONS FOR THE GENERALIZED DODD-BULLOUGH-MIKHAILOV EQUATION 被引量:7
6
作者 Tang Shengqiang Huang Wentao 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2007年第1期21-28,共8页
在这份报纸,概括 Dodd-Bullough-Mikhailov 方程被学习。周期的波浪和无界的波浪解决方案的存在被使用动态系统的分叉理论的方法证明。在不同参量的条件下面,保证上述答案的存在的各种各样的足够的条件被给。上述旅行答案的一些准确... 在这份报纸,概括 Dodd-Bullough-Mikhailov 方程被学习。周期的波浪和无界的波浪解决方案的存在被使用动态系统的分叉理论的方法证明。在不同参量的条件下面,保证上述答案的存在的各种各样的足够的条件被给。上述旅行答案的一些准确明确的参量的代表被获得。 展开更多
关键词 广义Dodd-Bullough-Mikhailov方程 行波解 分叉 周波
下载PDF
A porous cell method for the simulation of fluid-solid interactions
7
作者 H. B. Gu D. M. Causon +2 位作者 C. G. Mingham L. Qian P. Z. Lin 《水道港口》 2010年第5期318-318,共1页
There are many ways of describing a solid,porous or fluid region of the computational domain when solving the Navier-Stokes equations(NSE)for flow motions.Amongst these the porous cell method is one of the most flexib... There are many ways of describing a solid,porous or fluid region of the computational domain when solving the Navier-Stokes equations(NSE)for flow motions.Amongst these the porous cell method is one of the most flexible approaches.In this method,a parameter is defined as a ratio of the volume open to water and air in a calculation cell to its cell volume.In the calculation,the same numerical procedure is applied to every cell and no explicit boundary conditions are needed at solid boundaries.The method is used to simulate flow through porous media,around solid bodies and over a moving seabed.The results compare well with experimental data and other numerical results.In our future work the porous cell method will be applied to more complex fluid-solid interaction situations. 展开更多
关键词 POROUS cell METHOD NAVIER-STOKES equations SEDIMENT PERMEABLE DAM level set METHOD
下载PDF
A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications
8
作者 Alaa Omran Almagrabi A.K.Bashir 《Digital Communications and Networks》 SCIE CSCD 2022年第4期436-445,共10页
The introduction of the Internet of Things(IoT)paradigm serves as pervasive resource access and sharing platform for different real-time applications.Decentralized resource availability,access,and allocation provide a... The introduction of the Internet of Things(IoT)paradigm serves as pervasive resource access and sharing platform for different real-time applications.Decentralized resource availability,access,and allocation provide a better quality of user experience regardless of the application type and scenario.However,privacy remains an open issue in this ubiquitous sharing platform due to massive and replicated data availability.In this paper,privacy-preserving decision-making for the data-sharing scheme is introduced.This scheme is responsible for improving the security in data sharing without the impact of replicated resources on communicating users.In this scheme,classification learning is used for identifying replicas and accessing granted resources independently.Based on the trust score of the available resources,this classification is recurrently performed to improve the reliability of information sharing.The user-level decisions for information sharing and access are made using the classification of the resources at the time of availability.This proposed scheme is verified using the metrics access delay,success ratio,computation complexity,and sharing loss. 展开更多
关键词 Classification learning Data mining IoT PRIVACY-PRESERVING Resource replication
下载PDF
Prediction Models for COVID-19 Integrating Age Groups, Gender, and Underlying Conditions
9
作者 Imran Ashraf Waleed SAlnumay +3 位作者 Rashid Ali Soojung Hur Ali Kashif Bashir Yousaf Bin Zikria 《Computers, Materials & Continua》 SCIE EI 2021年第6期3009-3044,共36页
The COVID-19 pandemic has caused hundreds of thousands of deaths,millions of infections worldwide,and the loss of trillions of dollars for many large economies.It poses a grave threat to the human population with an e... The COVID-19 pandemic has caused hundreds of thousands of deaths,millions of infections worldwide,and the loss of trillions of dollars for many large economies.It poses a grave threat to the human population with an excessive number of patients constituting an unprecedented challenge with which health systems have to cope.Researchers from many domains have devised diverse approaches for the timely diagnosis of COVID-19 to facilitate medical responses.In the same vein,a wide variety of research studies have investigated underlying medical conditions for indicators suggesting the severity and mortality of,and role of age groups and gender on,the probability of COVID-19 infection.This study aimed to review,analyze,and critically appraise published works that report on various factors to explain their relationship with COVID-19.Such studies span a wide range,including descriptive analyses,ratio analyses,cohort,prospective and retrospective studies.Various studies that describe indicators to determine the probability of infection among the general population,as well as the risk factors associated with severe illness and mortality,are critically analyzed and these ndings are discussed in detail.A comprehensive analysis was conducted on research studies that investigated the perceived differences in vulnerability of different age groups and genders to severe outcomes of COVID-19.Studies incorporating important demographic,health,and socioeconomic characteristics are highlighted to emphasize their importance.Predominantly,the lack of an appropriated dataset that contains demographic,personal health,and socioeconomic information implicates the efcacy and efciency of the discussed methods.Results are overstated on the part of both exclusion of quarantined and patients with mild symptoms and inclusion of the data from hospitals where the majority of the cases are potentially ill. 展开更多
关键词 COVID-19 age&gender vulnerability for COVID-19 machine learning-based prognosis COVID-19 vulnerability psychological factors prediction of COVID-19
下载PDF
Handling Class Imbalance in Online Transaction Fraud Detection
10
作者 Kanika Jimmy Singla +3 位作者 Ali Kashif Bashir Yunyoung Nam Najam UI Hasan Usman Tariq 《Computers, Materials & Continua》 SCIE EI 2022年第2期2861-2877,共17页
With the rise of internet facilities,a greater number of people have started doing online transactions at an exponential rate in recent years as the online transaction system has eliminated the need of going to the ba... With the rise of internet facilities,a greater number of people have started doing online transactions at an exponential rate in recent years as the online transaction system has eliminated the need of going to the bank physically for every transaction.However,the fraud cases have also increased causing the loss of money to the consumers.Hence,an effective fraud detection system is the need of the hour which can detect fraudulent transactions automatically in real-time.Generally,the genuine transactions are large in number than the fraudulent transactions which leads to the class imbalance problem.In this research work,an online transaction fraud detection system using deep learning has been proposed which can handle class imbalance problem by applying algorithm-level methods which modify the learning of the model to focus more on the minority class i.e.,fraud transactions.A novel loss function named Weighted Hard-Reduced Focal Loss(WH-RFL)has been proposed which has achieved maximum fraud detection rate i.e.,True PositiveRate(TPR)at the cost of misclassification of few genuine transactions as high TPR is preferred over a high True Negative Rate(TNR)in fraud detection system and same has been demonstrated using three publicly available imbalanced transactional datasets.Also,Thresholding has been applied to optimize the decision threshold using cross-validation to detect maximum number of frauds and it has been demonstrated by the experimental results that the selection of the right thresholding method with deep learning yields better results. 展开更多
关键词 Class imbalance deep learning fraud detection loss function THRESHOLDING
下载PDF
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element
11
作者 Chintan Patel Ali Kashif Bashir +1 位作者 Ahmad Ali AlZubi Rutvij Jhaveri 《Digital Communications and Networks》 SCIE CSCD 2023年第2期358-366,共9页
Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product processing.IIoT suffers from various challenges,and security is one of the key challenge among those challe... Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product processing.IIoT suffers from various challenges,and security is one of the key challenge among those challenges.Authentication and access control are two notable challenges for any IIoT based industrial deployment.Any IoT based Industry 4.0 enterprise designs networks between hundreds of tiny devices such as sensors,actuators,fog devices and gateways.Thus,articulating a secure authentication protocol between sensing devices or a sensing device and user devices is an essential step in IoT security.In this paper,first,we present cryptanalysis for the certificate-based scheme proposed for a similar environment by Das et al.and prove that their scheme is vulnerable to various traditional attacks such as device anonymity,MITM,and DoS.We then put forward an interdevice authentication scheme using an ECC(Elliptic Curve Cryptography)that is highly secure and lightweight compared to other existing schemes for a similar environment.Furthermore,we set forth a formal security analysis using the random oracle-based ROR model and informal security analysis over the Doleve-Yao channel.In this paper,we present comparison of the proposed scheme with existing schemes based on communication cost,computation cost and security index to prove that the proposed EBAKE-SE is highly efficient,reliable,and trustworthy compared to other existing schemes for an inter-device authentication.At long last,we present an implementation for the proposed EBAKE-SE using MQTT protocol. 展开更多
关键词 Internet of things AUTHENTICATION Elliptic curve cryptography Secure key exchange Message Queuing telemetry transport
下载PDF
Validation and Refinement of Two Interpretable Models for Coronavirus Disease 2019 Prognosis Prediction
12
作者 Kai Chang Ting Jia +16 位作者 Ya-Na Zhou Zi-Xin Shu Ji-Fen Liu Jing Sun Qi-Guang Zheng Hao-Yu Tian Jia-Nan Xia Kuo Yang Ning Wang Hai-Long Sun Xin-Yan Wang Deng-Ying Yan Taane G.Clark Bao-Yan Liu Xiao-Dong Li Yong-Hong Peng Xue-Zhong Zhou 《World Journal of Traditional Chinese Medicine》 CAS CSCD 2023年第2期191-200,共10页
Objective:To validate two proposed coronavirus disease 2019(COVID-19)prognosis models,analyze the characteristics of different models,consider the performance of models in predicting different outcomes,and provide new... Objective:To validate two proposed coronavirus disease 2019(COVID-19)prognosis models,analyze the characteristics of different models,consider the performance of models in predicting different outcomes,and provide new insights into the development and use of artificial intelligence(AI)predictive models in clinical decision-making for COVID-19 and other diseases.Materials and Methods:We compared two proposed prediction models for COVID-19 prognosis that use a decision tree and logistic regression modeling.We evaluated the effectiveness of different model-building strategies using laboratory tests and/or clinical record data,their sensitivity and robustness to the timings of records used and the presence of missing data,and their predictive performance and capabilities in single-site and multicenter settings.Results:The predictive accuracies of the two models after retraining were improved to 93.2% and 93.9%,compared with that of the models directly used,with accuracies of 84.3% and 87.9%,indicating that the prediction models could not be used directly and require retraining based on actual data.In addition,based on the prediction model,new features obtained by model comparison and literature evidence were transferred to integrate the new models with better performance.Conclusions:Comparing the characteristics and differences of datasets used in model training,effective model verification,and a fusion of models is necessary in improving the performance of AI models. 展开更多
关键词 Coronavirus disease 2019 decision tree interpretable models logistic regression prognosis prediction
原文传递
A survey on security analysis of machine learning-oriented hardware and software intellectual property
13
作者 Ashraful Tauhid Lei Xu +1 位作者 Mostafizur Rahman Emmett Tomai 《High-Confidence Computing》 2023年第2期93-106,共14页
Intellectual Property(IP)includes ideas,innovations,methodologies,works of authorship(viz.,literary and artistic works),emblems,brands,images,etc.This property is intangible since it is pertinent to the human intellec... Intellectual Property(IP)includes ideas,innovations,methodologies,works of authorship(viz.,literary and artistic works),emblems,brands,images,etc.This property is intangible since it is pertinent to the human intellect.Therefore,IP entities are indisputably vulnerable to infringements and modifications without the owner’s consent.IP protection regulations have been deployed and are still in practice,including patents,copyrights,contracts,trademarks,trade secrets,etc.,to address these challenges.Unfortunately,these protections are insufficient to keep IP entities from being changed or stolen without permission.As for this,some IPs require hardware IP protection mechanisms,and others require software IP protection techniques.To secure these IPs,researchers have explored the domain of Intellectual Property Protection(IPP)using different approaches.In this paper,we discuss the existing IP rights and concurrent breakthroughs in the field of IPP research;provide discussions on hardware IP and software IP attacks and defense techniques;summarize different applications of IP protection;and lastly,identify the challenges and future research prospects in hardware and software IP security. 展开更多
关键词 Intellectual property IP protection Patent Copyright TRADEMARK INFRINGEMENT Machine learning Integrated circuit
原文传递
Temporal pattern mining from user-generated content 被引量:1
14
作者 Adnan Ali Jinlong Li +1 位作者 Huanhuan Chen Ali Kashif Bashir 《Digital Communications and Networks》 SCIE CSCD 2022年第6期1027-1039,共13页
Faster internet, IoT, and social media have reformed the conventional web into a collaborative web resulting in enormous user-generated content. Several studies are focused on such content;however, they mainly focus o... Faster internet, IoT, and social media have reformed the conventional web into a collaborative web resulting in enormous user-generated content. Several studies are focused on such content;however, they mainly focus on textual data, thus undermining the importance of metadata. Considering this gap, we provide a temporal pattern mining framework to model and utilize user-generated content's metadata. First, we scrap 2.1 million tweets from Twitter between Nov-2020 to Sep-2021 about 100 hashtag keywords and present these tweets into 100 User-Tweet-Hashtag (UTH) dynamic graphs. Second, we extract and identify four time-series in three timespans (Day, Hour, and Minute) from UTH dynamic graphs. Lastly, we model these four time-series with three machine learning algorithms to mine temporal patterns with the accuracy of 95.89%, 93.17%, 90.97%, and 93.73%, respectively. We demonstrate that user-generated content's metadata contains valuable information, which helps to understand the users' collective behavior and can be beneficial for business and research. Dataset and codes are publicly available;the link is given in the dataset section. 展开更多
关键词 Social media analysis Collaborative computing Social data Twitter data Temporal patterns mining Dynamic graphs
下载PDF
Multi-Modal Data Analysis Based Game Player Experience Modeling Using LSTM-DNN 被引量:1
15
作者 Sehar Shahzad Farooq Mustansar Fiaz +4 位作者 Irfan Mehmood Ali Kashif Bashir Raheel Nawaz KyungJoong Kim Soon Ki Jung 《Computers, Materials & Continua》 SCIE EI 2021年第9期4087-4108,共22页
Game player modeling is a paradigm of computational models to exploit players’behavior and experience using game and player analytics.Player modeling refers to descriptions of players based on frameworks of data deri... Game player modeling is a paradigm of computational models to exploit players’behavior and experience using game and player analytics.Player modeling refers to descriptions of players based on frameworks of data derived from the interaction of a player’s behavior within the game as well as the player’s experience with the game.Player behavior focuses on dynamic and static information gathered at the time of gameplay.Player experience concerns the association of the human player during gameplay,which is based on cognitive and affective physiological measurements collected from sensors mounted on the player’s body or in the player’s surroundings.In this paper,player experience modeling is studied based on the board puzzle game“Candy Crush Saga”using cognitive data of players accessed by physiological and peripheral devices.Long Short-Term Memory-based Deep Neural Network(LSTM-DNN)is used to predict players’effective states in terms of valence,arousal,dominance,and liking by employing the concept of transfer learning.Transfer learning focuses on gaining knowledge while solving one problem and using the same knowledge to solve different but related problems.The homogeneous transfer learning approach has not been implemented in the game domain before,and this novel study opens a new research area for the game industry where the main challenge is predicting the significance of innovative games for entertainment and players’engagement.Relevant not only from a player’s point of view,it is also a benchmark study for game developers who have been facing problems of“cold start”for innovative games that strengthen the game industrial economy. 展开更多
关键词 Game player modeling experience modeling player analytics deep learning LSTM game play data Candy Crush Saga
下载PDF
Event Detection and Identification of Influential Spreaders in Social Media Data Streams 被引量:4
16
作者 Leilei Shi Yan Wu +2 位作者 Lu Liu Xiang Sun Liang Jiang 《Big Data Mining and Analytics》 2018年第1期34-46,共13页
Microblogging, a popular social media service platform, has become a new information channel for users to receive and exchange the most up-to-date information on current events. Consequently, it is a crucial platform ... Microblogging, a popular social media service platform, has become a new information channel for users to receive and exchange the most up-to-date information on current events. Consequently, it is a crucial platform for detecting newly emerging events and for identifying influential spreaders who have the potential to actively disseminate knowledge about events through microblogs. However, traditional event detection models require human intervention to detect the number of topics to be explored, which significantly reduces the efficiency and accuracy of event detection. In addition, most existing methods focus only on event detection and are unable to identify either influential spreaders or key event-related posts, thus making it challenging to track momentous events in a timely manner. To address these problems, we propose a Hypertext-Induced Topic Search(HITS) based Topic-Decision method(TD-HITS), and a Latent Dirichlet Allocation(LDA) based Three-Step model(TS-LDA). TDHITS can automatically detect the number of topics as well as identify associated key posts in a large number of posts. TS-LDA can identify influential spreaders of hot event topics based on both post and user information.The experimental results, using a Twitter dataset, demonstrate the effectiveness of our proposed methods for both detecting events and identifying influential spreaders. 展开更多
关键词 event detection MICROBLOGGING Hypertext-Induced Topic Search(HITS) Latent Dirichlet Allocation(LDA) IDENTIFICATION of influential SPREADER
原文传递
A Contemporary Review on Drought Modeling Using Machine Learning Approaches
17
作者 Karpagam Sundararajan Lalit Garg +5 位作者 Kathiravan Srinivasan Ali Kashif Bashir Jayakumar Kaliappan Ganapathy Pattukandan Ganapathy Senthil Kumaran Selvaraj T.Meena 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第8期447-487,共41页
Drought is the least understood natural disaster due to the complex relationship of multiple contributory factors. Itsbeginning and end are hard to gauge, and they can last for months or even for years. India has face... Drought is the least understood natural disaster due to the complex relationship of multiple contributory factors. Itsbeginning and end are hard to gauge, and they can last for months or even for years. India has faced many droughtsin the last few decades. Predicting future droughts is vital for framing drought management plans to sustainnatural resources. The data-driven modelling for forecasting the metrological time series prediction is becomingmore powerful and flexible with computational intelligence techniques. Machine learning (ML) techniques havedemonstrated success in the drought prediction process and are becoming popular to predict the weather, especiallythe minimum temperature using backpropagation algorithms. The favourite ML techniques for weather forecastinginclude support vector machines (SVM), support vector regression, random forest, decision tree, logistic regression,Naive Bayes, linear regression, gradient boosting tree, k-nearest neighbours (KNN), the adaptive neuro-fuzzyinference system, the feed-forward neural networks, Markovian chain, Bayesian network, hidden Markov models,and autoregressive moving averages, evolutionary algorithms, deep learning and many more. This paper presentsa recent review of the literature using ML in drought prediction, the drought indices, dataset, and performancemetrics. 展开更多
关键词 Drought forecasting machine learning drought indices stochastic models fuzzy logic dynamic method hybrid method
下载PDF
A Comprehensive Review on Medical Diagnosis Using Machine Learning
18
作者 Kaustubh Arun Bhavsar Ahed Abugabah +3 位作者 Jimmy Singla Ahmad Ali AlZubi Ali Kashif Bashir Nikita 《Computers, Materials & Continua》 SCIE EI 2021年第5期1997-2014,共18页
The unavailability of sufficient information for proper diagnosis,incomplete or miscommunication between patient and the clinician,or among the healthcare professionals,delay or incorrect diagnosis,the fatigue of clin... The unavailability of sufficient information for proper diagnosis,incomplete or miscommunication between patient and the clinician,or among the healthcare professionals,delay or incorrect diagnosis,the fatigue of clinician,or even the high diagnostic complexity in limited time can lead to diagnostic errors.Diagnostic errors have adverse effects on the treatment of a patient.Unnecessary treatments increase the medical bills and deteriorate the health of a patient.Such diagnostic errors that harm the patient in various ways could be minimized using machine learning.Machine learning algorithms could be used to diagnose various diseases with high accuracy.The use of machine learning could assist the doctors in making decisions on time,and could also be used as a second opinion or supporting tool.This study aims to provide a comprehensive review of research articles published from the year 2015 to mid of the year 2020 that have used machine learning for diagnosis of various diseases.We present the various machine learning algorithms used over the years to diagnose various diseases.The results of this study show the distribution of machine learning methods by medical disciplines.Based on our review,we present future research directions that could be used to conduct further research. 展开更多
关键词 Diagnostic system machine learning medical diagnosis healthcare applications
下载PDF
Fuzzy Logic-Based Health Monitoring System for COVID’19 Patients
19
作者 M.Jayalakshmi Lalit Garg +4 位作者 K.Maharajan K.Jayakumar Kathiravan Srinivasan Ali Kashif Bashir K.Ramesh 《Computers, Materials & Continua》 SCIE EI 2021年第5期2431-2447,共17页
In several countries,the ageing population contour focuses on high healthcare costs and overloaded health care environments.Pervasive health care monitoring system can be a potential alternative,especially in the COVI... In several countries,the ageing population contour focuses on high healthcare costs and overloaded health care environments.Pervasive health care monitoring system can be a potential alternative,especially in the COVID-19 pandemic situation to help mitigate such problems by encouraging healthcare to transition from hospital-centred services to self-care,mobile care and home care.In this aspect,we propose a pervasive system to monitor the COVID’19 patient’s conditions within the hospital and outside by monitoring their medical and psychological situation.It facilitates better healthcare assistance,especially for COVID’19 patients and quarantined people.It identies the patient’s medical and psychological condition based on the current context and activities using a fuzzy context-aware reasoning engine based model.Fuzzy reasoning engine makes decisions using linguistic rules based on inference mechanisms that support the patient condition identication.Linguistics rules are framed based on the fuzzy set attributes belong to different context types.The fuzzy semantic rules are used to identify the relationship among the attributes,and the reasoning engine is used to ensure precise real-time context interpretation and current evaluation of the situation.Outcomes are measured using a fuzzy logic-based context reasoning system under simulation.The results indicate the usefulness of monitoring the COVID’19 patients based on the current context. 展开更多
关键词 Pervasive healthcare COVID’19 CONTEXT-AWARE fuzzy reasoning engine fuzzy logic role-based expert system
下载PDF
Medical Diagnosis Using Machine Learning:A Statistical Review
20
作者 Kaustubh Arun Bhavsar Jimmy Singla +3 位作者 Yasser D.Al-Otaibi Oh-Young Song Yousaf Bin Zikria Ali Kashif Bashir 《Computers, Materials & Continua》 SCIE EI 2021年第4期107-125,共19页
Decision making in case of medical diagnosis is a complicated process.A large number of overlapping structures and cases,and distractions,tiredness,and limitations with the human visual system can lead to inappropriat... Decision making in case of medical diagnosis is a complicated process.A large number of overlapping structures and cases,and distractions,tiredness,and limitations with the human visual system can lead to inappropriate diagnosis.Machine learning(ML)methods have been employed to assist clinicians in overcoming these limitations and in making informed and correct decisions in disease diagnosis.Many academic papers involving the use of machine learning for disease diagnosis have been increasingly getting published.Hence,to determine the use of ML to improve the diagnosis in varied medical disciplines,a systematic review is conducted in this study.To carry out the review,six different databases are selected.Inclusion and exclusion criteria are employed to limit the research.Further,the eligible articles are classied depending on publication year,authors,type of articles,research objective,inputs and outputs,problem and research gaps,and ndings and results.Then the selected articles are analyzed to show the impact of ML methods in improving the disease diagnosis.The ndings of this study show the most used ML methods and the most common diseases that are focused on by researchers.It also shows the increase in use of machine learning for disease diagnosis over the years.These results will help in focusing on those areas which are neglected and also to determine various ways in which ML methods could be employed to achieve desirable results. 展开更多
关键词 Decision making disease diagnosis machine learning medical disciplines
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部