期刊文献+
共找到35篇文章
< 1 2 >
每页显示 20 50 100
Improved Attentive Recurrent Network for Applied Linguistics-Based Offensive Speech Detection
1
作者 Manar Ahmed Hamza Hala J.Alshahrani +5 位作者 Khaled Tarmissi Ayman Yafoz Amira Sayed A.Aziz Mohammad Mahzari Abu Sarwar Zamani Ishfaq Yaseen 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1691-1707,共17页
Applied linguistics is one of the fields in the linguistics domain and deals with the practical applications of the language studies such as speech processing,language teaching,translation and speech therapy.The ever-... Applied linguistics is one of the fields in the linguistics domain and deals with the practical applications of the language studies such as speech processing,language teaching,translation and speech therapy.The ever-growing Online Social Networks(OSNs)experience a vital issue to confront,i.e.,hate speech.Amongst the OSN-oriented security problems,the usage of offensive language is the most important threat that is prevalently found across the Internet.Based on the group targeted,the offensive language varies in terms of adult content,hate speech,racism,cyberbullying,abuse,trolling and profanity.Amongst these,hate speech is the most intimidating form of using offensive language in which the targeted groups or individuals are intimidated with the intent of creating harm,social chaos or violence.Machine Learning(ML)techniques have recently been applied to recognize hate speech-related content.The current research article introduces a Grasshopper Optimization with an Attentive Recurrent Network for Offensive Speech Detection(GOARN-OSD)model for social media.The GOARNOSD technique integrates the concepts of DL and metaheuristic algorithms for detecting hate speech.In the presented GOARN-OSD technique,the primary stage involves the data pre-processing and word embedding processes.Then,this study utilizes the Attentive Recurrent Network(ARN)model for hate speech recognition and classification.At last,the Grasshopper Optimization Algorithm(GOA)is exploited as a hyperparameter optimizer to boost the performance of the hate speech recognition process.To depict the promising performance of the proposed GOARN-OSD method,a widespread experimental analysis was conducted.The comparison study outcomes demonstrate the superior performance of the proposed GOARN-OSD model over other state-of-the-art approaches. 展开更多
关键词 Applied linguistics hate speech offensive language natural language processing deep learning grasshopper optimization algorithm
下载PDF
Learning Discriminatory Information for Object Detection on Urine Sediment Image
2
作者 Sixian Chan Binghui Wu +2 位作者 Guodao Zhang Yuan Yao Hongqiang Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期411-428,共18页
In clinical practice,the microscopic examination of urine sediment is considered an important in vitro examination with many broad applications.Measuring the amount of each type of urine sediment allows for screening,... In clinical practice,the microscopic examination of urine sediment is considered an important in vitro examination with many broad applications.Measuring the amount of each type of urine sediment allows for screening,diagnosis and evaluation of kidney and urinary tract disease,providing insight into the specific type and severity.However,manual urine sediment examination is labor-intensive,time-consuming,and subjective.Traditional machine learning based object detection methods require hand-crafted features for localization and classification,which have poor generalization capabilities and are difficult to quickly and accurately detect the number of urine sediments.Deep learning based object detection methods have the potential to address the challenges mentioned above,but these methods require access to large urine sediment image datasets.Unfortunately,only a limited number of publicly available urine sediment datasets are currently available.To alleviate the lack of urine sediment datasets in medical image analysis,we propose a new dataset named UriSed2K,which contains 2465 high-quality images annotated with expert guidance.Two main challenges are associated with our dataset:a large number of small objects and the occlusion between these small objects.Our manuscript focuses on applying deep learning object detection methods to the urine sediment dataset and addressing the challenges presented by this dataset.Specifically,our goal is to improve the accuracy and efficiency of the detection algorithm and,in doing so,provide medical professionals with an automatic detector that saves time and effort.We propose an improved lightweight one-stage object detection algorithm called Discriminatory-YOLO.The proposed algorithm comprises a local context attention module and a global background suppression module,which aid the detector in distinguishing urine sediment features in the image.The local context attention module captures context information beyond the object region,while the global background suppression module emphasizes objects in uninformative backgrounds.We comprehensively evaluate our method on the UriSed2K dataset,which includes seven categories of urine sediments,such as erythrocytes(red blood cells),leukocytes(white blood cells),epithelial cells,crystals,mycetes,broken erythrocytes,and broken leukocytes,achieving the best average precision(AP)of 95.3%while taking only 10 ms per image.The source code and dataset are available at https://github.com/binghuiwu98/discriminatoryyolov5. 展开更多
关键词 Object detection attention mechanism medical image urine sediment
下载PDF
Hyperparameter Tuned Deep Learning Enabled Intrusion Detection on Internet of Everything Environment 被引量:1
3
作者 Manar Ahmed Hamza Aisha Hassan Abdalla Hashim +4 位作者 Heba G.Mohamed Saud S.Alotaibi Hany Mahgoub Amal S.Mehanna Abdelwahed Motwakel 《Computers, Materials & Continua》 SCIE EI 2022年第12期6579-6594,共16页
Internet of Everything(IoE),the recent technological advancement,represents an interconnected network of people,processes,data,and things.In recent times,IoE gained significant attention among entrepreneurs,individual... Internet of Everything(IoE),the recent technological advancement,represents an interconnected network of people,processes,data,and things.In recent times,IoE gained significant attention among entrepreneurs,individuals,and communities owing to its realization of intense values from the connected entities.On the other hand,the massive increase in data generation from IoE applications enables the transmission of big data,from contextawaremachines,into useful data.Security and privacy pose serious challenges in designing IoE environment which can be addressed by developing effective Intrusion Detection Systems(IDS).In this background,the current study develops Intelligent Multiverse Optimization with Deep Learning Enabled Intrusion Detection System(IMVO-DLIDS)for IoT environment.The presented IMVO-DLIDS model focuses on identification and classification of intrusions in IoT environment.The proposed IMVO-DLIDS model follows a three-stage process.At first,data pre-processing is performed to convert the actual data into useful format.In addition,Chaotic Local Search Whale Optimization Algorithm-based Feature Selection(CLSWOA-FS)technique is employed to choose the optimal feature subsets.Finally,MVO algorithm is exploited with Bidirectional Gated Recurrent Unit(BiGRU)model for classification.Here,the novelty of the work is the application of MVO algorithm in fine-turning the hyperparameters involved in BiGRU model.The experimental validation was conducted for the proposed IMVO-DLIDS model on benchmark datasets and the results were assessed under distinct measures.An extensive comparative study was conducted and the results confirmed the promising outcomes of IMVO-DLIDS approach compared to other approaches. 展开更多
关键词 Internet of everything deep learning feature selection CLASSIFICATION intrusion detection CYBERSECURITY
下载PDF
Recognition of Film Type Using HSV Features on Deep-Learning Neural Networks
4
作者 Ching-Ta Lu Jia-An Lin +3 位作者 Chia-Yi Chang Chia-Hua Liu Ling-Ling Wang Kun-Fu Tseng 《Journal of Electronic Science and Technology》 CAS CSCD 2020年第1期31-41,共11页
The number of films is numerous and the film contents are complex over the Internet and multimedia sources. It is time consuming for a viewer to select a favorite film. This paper presents an automatic recognition sys... The number of films is numerous and the film contents are complex over the Internet and multimedia sources. It is time consuming for a viewer to select a favorite film. This paper presents an automatic recognition system of film types. Initially, a film is firstly sampled as frame sequences. The color space, including hue, saturation,and brightness value(HSV), is analyzed for each sampled frame by computing the deviation and mean of HSV for each film. These features are utilized as inputs to a deep-learning neural network(DNN) for the recognition of film types. One hundred films are utilized to train and validate the model parameters of DNN. In the testing phase, a film is recognized as one of the five categories, including action, comedy, horror thriller, romance, and science fiction, by the trained DNN. The experimental results reveal that the film types can be effectively recognized by the proposed approach, enabling the viewer to select an interesting film accurately and quickly. 展开更多
关键词 Deep-learning FILM TYPE RECOGNITION hue saturation and brightness value(HSV)analysis neural networks video classification
下载PDF
Intelligent Optimization-Based Clustering with Encryption Technique for Internet of Drones Environment
5
作者 Dalia H.Elkamchouchi Jaber S.Alzahrani +5 位作者 Hany Mahgoub Amal S.Mehanna Anwer Mustafa Hilal Abdelwahed Motwakel Abu Sarwar Zamani Ishfaq Yaseen 《Computers, Materials & Continua》 SCIE EI 2022年第12期6617-6634,共18页
The recent technological developments have revolutionized the functioning of Wireless Sensor Network(WSN)-based industries with the development of Internet of Things(IoT).Internet of Drones(IoD)is a division under IoT... The recent technological developments have revolutionized the functioning of Wireless Sensor Network(WSN)-based industries with the development of Internet of Things(IoT).Internet of Drones(IoD)is a division under IoT and is utilized for communication amongst drones.While drones are naturally mobile,it undergoes frequent topological changes.Such alterations in the topology cause route election,stability,and scalability problems in IoD.Encryption is considered as an effective method to transmit the images in IoD environment.The current study introduces an Atom Search Optimization basedClusteringwith Encryption Technique for Secure Internet of Drones(ASOCE-SIoD)environment.The key objective of the presented ASOCE-SIoD technique is to group the drones into clusters and encrypt the images captured by drones.The presented ASOCE-SIoD technique follows ASO-based Cluster Head(CH)and cluster construction technique.In addition,signcryption technique is also applied to effectually encrypt the images captured by drones in IoD environment.This process enables the secure transmission of images to the ground station.In order to validate the efficiency of the proposed ASOCE-SIoD technique,several experimental analyses were conducted and the outcomes were inspected under different aspects.The comprehensive comparative analysis results established the superiority of the proposed ASOCE-SIoD model over recent approaches. 展开更多
关键词 Internet of drones atom search algorithm CLUSTERING ENCRYPTION SIGNCRYPTION
下载PDF
Preliminary Exploration on the Application of Saussure Sign Concept in Bio-Inspired Design: A Case of Tiantoushui Doll-Design
6
作者 Yu-Chun Yao Shiu-Hua Wu Ai-Li Wang 《World Journal of Engineering and Technology》 2021年第3期548-554,共7页
Simply, shape bionics is to extract an image feature of natural objects, and most of the techniques for transforming and presenting are focused on metaphorical effects. In particular, the extraction process of metapho... Simply, shape bionics is to extract an image feature of natural objects, and most of the techniques for transforming and presenting are focused on metaphorical effects. In particular, the extraction process of metaphor design seems to be related to the concept of Saussure signs. Therefore, this research <span>took the doll design of the Tiantoushui community in Changhua County, Ta</span>iwan as an example and attempted to use the Saussure concept to extract and evaluate the signs of bio-inspired design. The results showed that a total of three doll works symbolized respectively rice, guava, and pomelo implied the signification of local region by integrating the Saussure code image with the sign-image of the regional nature and transforming its content into “com<span>modity design” and further transferring into “the product value of cultural an</span>d creative”. In addition, the specific extraction process included 1) Extraction of image—adjectives in creative products;2) Meaning space of image—adjec</span><span style="font-size:10.0pt;font-family:"">- </span><span style="font-size:10.0pt;font-family:"">tives in creative products;3) Extraction and determination of design elements of creative products, and 4) Combined the sensibility of creative products and <span>design elements to derive design rules. After preliminary exploration of the</span> <span>extraction steps above, a concrete and efficient bio-inspired design proces</span>s was proposed in this work. Besides, it was inferred that if further combined with the post-modern design style, it may not only simplify the design elements of creative products but also enhance the design connotations in the future. 展开更多
关键词 Bio-Inspired Design Saussure Sign Concept Doll-Design Code-Image
下载PDF
From Usability to Pleasure: A Case Study of Difference in Users’ Preference
7
作者 Wei Bi Yanru Lyu +1 位作者 Jing Cao Rungtai Lin 《Engineering(科研)》 2021年第8期448-462,共15页
<span style="font-family:Verdana;">For past deca</span><span style="font-family:Verdana;">des, research of designing </span><span style="font-family:Verdana;"&... <span style="font-family:Verdana;">For past deca</span><span style="font-family:Verdana;">des, research of designing </span><span style="font-family:Verdana;">“</span><span style="font-family:Verdana;">pleasure</span><span style="font-family:Verdana;">”</span><span style="font-family:Verdana;"> into products</span><span style="font-family:Verdana;"> in the aca</span><span style="font-family:Verdana;">demic community has produced a multitude of evaluation models and fra</span><span style="font-family:Verdana;">mework</span><span style="font-family:Verdana;">s. These models address the critical issues of plea</span><span style="font-family:Verdana;">surable product design </span><span style="font-family:Verdana;">leading to emotional design. This study is intended to explore the change fr</span><span style="font-family:Verdana;">om the need of “usability” for the product design to the need of “pleasure” for the user experience. The questionnaires were used to obtain data from 343 subjects. The four keyboard designs were adopted in the experiment to study the differ</span><span style="font-family:Verdana;">ence and the change from “usability” to</span><span style="font-family:Verdana;"> “pleasure” of users” preference. The results show that the need for pleasure is higher than usability, as well as </span><span style="font-family:Verdana;">attractive things also transmit the feel of work better. Besides, preference is re</span><span style="font-family:Verdana;">lated to gender, age, major, and educational background. Results presented her</span><span style="font-family:Verdana;">ein </span><span style="font-family:Verdana;">provide designers with a valuable reference for examining the</span><span style="font-family:Verdana;"> way how to </span><span style="font-family:Verdana;">design “pleasure” into product and the interactive experience of users in the de</span><span style="font-family:Verdana;">sign process. 展开更多
关键词 USABILITY PLEASURE Product Design Cognitive Ergonomics PREFERENCE
下载PDF
Hunter Prey Optimization with Hybrid Deep Learning for Fake News Detection on Arabic Corpus 被引量:2
8
作者 Hala J.Alshahrani Abdulkhaleq Q.A.Hassan +5 位作者 Khaled Tarmissi Amal S.Mehanna Abdelwahed Motwakel Ishfaq Yaseen Amgad Atta Abdelmageed Mohamed I.Eldesouki 《Computers, Materials & Continua》 SCIE EI 2023年第5期4255-4272,共18页
Nowadays,the usage of socialmedia platforms is rapidly increasing,and rumours or false information are also rising,especially among Arab nations.This false information is harmful to society and individuals.Blocking an... Nowadays,the usage of socialmedia platforms is rapidly increasing,and rumours or false information are also rising,especially among Arab nations.This false information is harmful to society and individuals.Blocking and detecting the spread of fake news in Arabic becomes critical.Several artificial intelligence(AI)methods,including contemporary transformer techniques,BERT,were used to detect fake news.Thus,fake news in Arabic is identified by utilizing AI approaches.This article develops a new hunterprey optimization with hybrid deep learning-based fake news detection(HPOHDL-FND)model on the Arabic corpus.The HPOHDL-FND technique undergoes extensive data pre-processing steps to transform the input data into a useful format.Besides,the HPOHDL-FND technique utilizes long-term memory with a recurrent neural network(LSTM-RNN)model for fake news detection and classification.Finally,hunter prey optimization(HPO)algorithm is exploited for optimal modification of the hyperparameters related to the LSTM-RNN model.The performance validation of the HPOHDL-FND technique is tested using two Arabic datasets.The outcomes exemplified better performance over the other existing techniques with maximum accuracy of 96.57%and 93.53%on Covid19Fakes and satirical datasets,respectively. 展开更多
关键词 Arabic corpus fake news detection deep learning hunter prey optimizer classification model
下载PDF
Sine Cosine Optimization with Deep Learning-Based Applied Linguistics for Sentiment Analysis on COVID-19 Tweets 被引量:1
9
作者 Abdelwahed Motwakel Hala J.Alshahrani +5 位作者 Abdulkhaleq Q.A.Hassan Khaled Tarmissi Amal S.Mehanna Ishfaq Yaseen Amgad Atta Abdelmageed Mohammad Mahzari 《Computers, Materials & Continua》 SCIE EI 2023年第6期4767-4783,共17页
Applied linguistics is an interdisciplinary domain which identifies,investigates,and offers solutions to language-related real-life problems.The new coronavirus disease,otherwise known as Coronavirus disease(COVID-19)... Applied linguistics is an interdisciplinary domain which identifies,investigates,and offers solutions to language-related real-life problems.The new coronavirus disease,otherwise known as Coronavirus disease(COVID-19),has severely affected the everyday life of people all over the world.Specifically,since there is insufficient access to vaccines and no straight or reliable treatment for coronavirus infection,the country has initiated the appropriate preventive measures(like lockdown,physical separation,and masking)for combating this extremely transmittable disease.So,individuals spent more time on online social media platforms(i.e.,Twitter,Facebook,Instagram,LinkedIn,and Reddit)and expressed their thoughts and feelings about coronavirus infection.Twitter has become one of the popular social media platforms and allows anyone to post tweets.This study proposes a sine cosine optimization with bidirectional gated recurrent unit-based senti-ment analysis(SCOBGRU-SA)on COVID-19 tweets.The SCOBGRU-SA technique aimed to detect and classify the various sentiments in Twitter data during the COVID-19 pandemic.The SCOBGRU-SA technique follows data pre-processing and the Fast-Text word embedding process to accomplish this.Moreover,the BGRU model is utilized to recognise and classify sen-timents present in the tweets.Furthermore,the SCO algorithm is exploited for tuning the BGRU method’s hyperparameter,which helps attain improved classification performance.The experimental validation of the SCOBGRU-SA technique takes place using a benchmark dataset,and the results signify its promising performance compared to other DL models. 展开更多
关键词 Applied linguistics deep learning sentiment analysis COVID-19 pandemic sine cosine optimization TWITTER
下载PDF
Deep Transfer Learning-Enabled Activity Identification and Fall Detection for Disabled People 被引量:1
10
作者 Majdy M.Eltahir Adil Yousif +6 位作者 Fadwa Alrowais Mohamed K.Nour Radwa Marzouk Hatim Dafaalla Asma Abbas Hassan Elnour Amira Sayed A.Aziz Manar Ahmed Hamza 《Computers, Materials & Continua》 SCIE EI 2023年第5期3239-3255,共17页
The human motion data collected using wearables like smartwatches can be used for activity recognition and emergency event detection.This is especially applicable in the case of elderly or disabled people who live sel... The human motion data collected using wearables like smartwatches can be used for activity recognition and emergency event detection.This is especially applicable in the case of elderly or disabled people who live self-reliantly in their homes.These sensors produce a huge volume of physical activity data that necessitates real-time recognition,especially during emergencies.Falling is one of the most important problems confronted by older people and people with movement disabilities.Numerous previous techniques were introduced and a few used webcam to monitor the activity of elderly or disabled people.But,the costs incurred upon installation and operation are high,whereas the technology is relevant only for indoor environments.Currently,commercial wearables use a wireless emergency transmitter that produces a number of false alarms and restricts a user’s movements.Against this background,the current study develops an Improved WhaleOptimizationwithDeep Learning-Enabled Fall Detection for Disabled People(IWODL-FDDP)model.The presented IWODL-FDDP model aims to identify the fall events to assist disabled people.The presented IWODLFDDP model applies an image filtering approach to pre-process the image.Besides,the EfficientNet-B0 model is utilized to generate valuable feature vector sets.Next,the Bidirectional Long Short Term Memory(BiLSTM)model is used for the recognition and classification of fall events.Finally,the IWO method is leveraged to fine-tune the hyperparameters related to the BiLSTM method,which shows the novelty of the work.The experimental analysis outcomes established the superior performance of the proposed IWODL-FDDP method with a maximum accuracy of 97.02%. 展开更多
关键词 Fall detection disabled people deep learning improved whale optimization assisted living
下载PDF
Energy-Efficient Routing Using Novel Optimization with Tabu Techniques for Wireless Sensor Network
11
作者 Manar Ahmed Hamza Aisha Hassan Abdalla Hashim +5 位作者 Dalia H.Elkamchouchi Nadhem Nemri Jaber S.Alzahrani Amira Sayed A.Aziz Mnahel Ahmed Ibrahim Abdelwahed Motwakel 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1711-1726,共16页
Wireless Sensor Network(WSN)consists of a group of limited energy source sensors that are installed in a particular region to collect data from the environment.Designing the energy-efficient data collection methods in... Wireless Sensor Network(WSN)consists of a group of limited energy source sensors that are installed in a particular region to collect data from the environment.Designing the energy-efficient data collection methods in largescale wireless sensor networks is considered to be a difficult area in the research.Sensor node clustering is a popular approach for WSN.Moreover,the sensor nodes are grouped to form clusters in a cluster-based WSN environment.The battery performance of the sensor nodes is likewise constrained.As a result,the energy efficiency of WSNs is critical.In specific,the energy usage is influenced by the loads on the sensor node as well as it ranges from the Base Station(BS).Therefore,energy efficiency and load balancing are very essential in WSN.In the proposed method,a novel Grey Wolf Improved Particle Swarm Optimization with Tabu Search Techniques(GW-IPSO-TS)was used.The selection of Cluster Heads(CHs)and routing path of every CH from the base station is enhanced by the proposed method.It provides the best routing path and increases the lifetime and energy efficiency of the network.End-to-end delay and packet loss rate have also been improved.The proposed GW-IPSO-TS method enhances the evaluation of alive nodes,dead nodes,network survival index,convergence rate,and standard deviation of sensor nodes.Compared to the existing algorithms,the proposed method outperforms better and improves the lifetime of the network. 展开更多
关键词 Wireless sensor networks ENERGY-EFFICIENT load balancing energy consumption network’s lifetime cluster heads grey wolf optimization tabu search particle swarm optimization
下载PDF
Optimal Quad Channel Long Short-Term Memory Based Fake News Classification on English Corpus
12
作者 Manar Ahmed Hamza Hala J.Alshahrani +5 位作者 Khaled Tarmissi Ayman Yafoz Amal S.Mehanna Ishfaq Yaseen Amgad Atta Abdelmageed Mohamed I.Eldesouki 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3303-3319,共17页
The term‘corpus’refers to a huge volume of structured datasets containing machine-readable texts.Such texts are generated in a natural communicative setting.The explosion of social media permitted individuals to spr... The term‘corpus’refers to a huge volume of structured datasets containing machine-readable texts.Such texts are generated in a natural communicative setting.The explosion of social media permitted individuals to spread data with minimal examination and filters freely.Due to this,the old problem of fake news has resurfaced.It has become an important concern due to its negative impact on the community.To manage the spread of fake news,automatic recognition approaches have been investigated earlier using Artificial Intelligence(AI)and Machine Learning(ML)techniques.To perform the medicinal text classification tasks,the ML approaches were applied,and they performed quite effectively.Still,a huge effort is required from the human side to generate the labelled training data.The recent progress of the Deep Learning(DL)methods seems to be a promising solution to tackle difficult types of Natural Language Processing(NLP)tasks,especially fake news detection.To unlock social media data,an automatic text classifier is highly helpful in the domain of NLP.The current research article focuses on the design of the Optimal Quad ChannelHybrid Long Short-Term Memory-based Fake News Classification(QCLSTM-FNC)approach.The presented QCLSTM-FNC approach aims to identify and differentiate fake news from actual news.To attain this,the proposed QCLSTM-FNC approach follows two methods such as the pre-processing data method and the Glovebased word embedding process.Besides,the QCLSTM model is utilized for classification.To boost the classification results of the QCLSTM model,a Quasi-Oppositional Sandpiper Optimization(QOSPO)algorithm is utilized to fine-tune the hyperparameters.The proposed QCLSTM-FNC approach was experimentally validated against a benchmark dataset.The QCLSTMFNC approach successfully outperformed all other existing DL models under different measures. 展开更多
关键词 English corpus fake news detection social media natural language processing artificial intelligence deep learning
下载PDF
Intelligent Aquila Optimization Algorithm-Based Node Localization Scheme for Wireless Sensor Networks
13
作者 Nidhi Agarwal M.Gokilavani +4 位作者 S.Nagarajan S.Saranya Hadeel Alsolai Sami Dhahbi Amira Sayed Abdelaziz 《Computers, Materials & Continua》 SCIE EI 2023年第1期141-152,共12页
In recent times,wireless sensor network(WSN)finds their suitability in several application areas,ranging from military to commercial ones.Since nodes in WSN are placed arbitrarily in the target field,node localization... In recent times,wireless sensor network(WSN)finds their suitability in several application areas,ranging from military to commercial ones.Since nodes in WSN are placed arbitrarily in the target field,node localization(NL)becomes essential where the positioning of the nodes can be determined by the aid of anchor nodes.The goal of any NL scheme is to improve the localization accuracy and reduce the localization error rate.With this motivation,this study focuses on the design of Intelligent Aquila Optimization Algorithm Based Node Localization Scheme(IAOAB-NLS)for WSN.The presented IAOAB-NLS model makes use of anchor nodes to determine proper positioning of the nodes.In addition,the IAOAB-NLS model is stimulated by the behaviour of Aquila.The IAOAB-NLS model has the ability to accomplish proper coordinate points of the nodes in the network.For guaranteeing the proficient NL process of the IAOAB-NLS model,widespread experimentation takes place to assure the betterment of the IAOAB-NLS model.The resultant values reported the effectual outcome of the IAOAB-NLS model irrespective of changing parameters in the network. 展开更多
关键词 Aquila optimizer node localization WSN intelligent models unknown nodes anchor nodes
下载PDF
Automated Spam Review Detection Using Hybrid Deep Learning on Arabic Opinions
14
作者 IbrahimM.Alwayle Badriyya B.Al-onazi +5 位作者 Mohamed K.Nour Khaled M.Alalayah Khadija M.Alaidarous Ibrahim Abdulrab Ahmed Amal S.Mehanna Abdelwahed Motwakel 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2947-2961,共15页
Online reviews regarding purchasing services or products offered are the main source of users’opinions.To gain fame or profit,generally,spam reviews are written to demote or promote certain targeted products or servi... Online reviews regarding purchasing services or products offered are the main source of users’opinions.To gain fame or profit,generally,spam reviews are written to demote or promote certain targeted products or services.This practice is called review spamming.During the last few years,various techniques have been recommended to solve the problem of spam reviews.Previous spam detection study focuses on English reviews,with a lesser interest in other languages.Spam review detection in Arabic online sources is an innovative topic despite the vast amount of data produced.Thus,this study develops an Automated Spam Review Detection using optimal Stacked Gated Recurrent Unit(SRD-OSGRU)on Arabic Opinion Text.The presented SRD-OSGRU model mainly intends to classify Arabic reviews into two classes:spam and truthful.Initially,the presented SRD-OSGRU model follows different levels of data preprocessing to convert the actual review data into a compatible format.Next,unigram and bigram feature extractors are utilized.The SGRU model is employed in this study to identify and classify Arabic spam reviews.Since the trial-and-error adjustment of hyperparameters is a tedious process,a white shark optimizer(WSO)is utilized,boosting the detection efficiency of the SGRU model.The experimental validation of the SRD-OSGRU model is assessed under two datasets,namely DOSC dataset.An extensive comparison study pointed out the enhanced performance of the SRD-OSGRU model over other recent approaches. 展开更多
关键词 Arabic text spam reviews machine learning deep learning white shark optimizer
下载PDF
Optimal Bottleneck-Driven Deep Belief Network Enabled Malware Classification on IoT-Cloud Environment
15
作者 Mohammed Maray Hamed Alqahtani +5 位作者 Saud S.Alotaibi Fatma S.Alrayes Nuha Alshuqayran Mrim M.Alnfiai Amal S.Mehanna Mesfer Al Duhayyim 《Computers, Materials & Continua》 SCIE EI 2023年第2期3101-3115,共15页
Cloud Computing(CC)is the most promising and advanced technology to store data and offer online services in an effective manner.When such fast evolving technologies are used in the protection of computerbased systems ... Cloud Computing(CC)is the most promising and advanced technology to store data and offer online services in an effective manner.When such fast evolving technologies are used in the protection of computerbased systems from cyberattacks,it brings several advantages compared to conventional data protection methods.Some of the computer-based systems that effectively protect the data include Cyber-Physical Systems(CPS),Internet of Things(IoT),mobile devices,desktop and laptop computer,and critical systems.Malicious software(malware)is nothing but a type of software that targets the computer-based systems so as to launch cyberattacks and threaten the integrity,secrecy,and accessibility of the information.The current study focuses on design of Optimal Bottleneck driven Deep Belief Network-enabled Cybersecurity Malware Classification(OBDDBNCMC)model.The presentedOBDDBN-CMCmodel intends to recognize and classify the malware that exists in IoT-based cloud platform.To attain this,Zscore data normalization is utilized to scale the data into a uniform format.In addition,BDDBN model is also exploited for recognition and categorization of malware.To effectually fine-tune the hyperparameters related to BDDBN model,GrasshopperOptimizationAlgorithm(GOA)is applied.This scenario enhances the classification results and also shows the novelty of current study.The experimental analysis was conducted upon OBDDBN-CMC model for validation and the results confirmed the enhanced performance ofOBDDBNCMC model over recent approaches. 展开更多
关键词 Malware detection security Internet of Things cloud computing machine learning parameter adjustment
下载PDF
Optimal Deep Hybrid Boltzmann Machine Based Arabic Corpus Classification Model
16
作者 Mesfer Al Duhayyim Badriyya B.Al-onazi +5 位作者 Mohamed K.Nour Ayman Yafoz Amal S.Mehanna Ishfaq Yaseen Amgad Atta Abdelmageed Gouse Pasha Mohammed 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期2755-2772,共18页
Natural Language Processing(NLP)for the Arabic language has gained much significance in recent years.The most commonly-utilized NLP task is the‘Text Classification’process.Its main intention is to apply the Machine ... Natural Language Processing(NLP)for the Arabic language has gained much significance in recent years.The most commonly-utilized NLP task is the‘Text Classification’process.Its main intention is to apply the Machine Learning(ML)approaches for automatically classifying the textual files into one or more pre-defined categories.In ML approaches,the first and foremost crucial step is identifying an appropriate large dataset to test and train the method.One of the trending ML techniques,i.e.,Deep Learning(DL)technique needs huge volumes of different types of datasets for training to yield the best outcomes.The current study designs a new Dice Optimization with a Deep Hybrid Boltzmann Machinebased Arabic Corpus Classification(DODHBM-ACC)model in this background.The presented DODHBM-ACC model primarily relies upon different stages of pre-processing and the word2vec word embedding process.For Arabic text classification,the DHBM technique is utilized.This technique is a hybrid version of the Deep Boltzmann Machine(DBM)and Deep Belief Network(DBN).It has the advantage of learning the decisive intention of the classification process.To adjust the hyperparameters of the DHBM technique,the Dice Optimization Algorithm(DOA)is exploited in this study.The experimental analysis was conducted to establish the superior performance of the proposed DODHBM-ACC model.The outcomes inferred the better performance of the proposed DODHBM-ACC model over other recent approaches. 展开更多
关键词 Arabic corpus text classification machine learning deep learning dice optimization
下载PDF
Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model
17
作者 Mashael M Asiri Heba G.Mohamed +5 位作者 Mohamed K Nour Mesfer Al Duhayyim Amira Sayed A.Aziz Abdelwahed Motwakel Abu Sarwar Zamani Mohamed I.Eldesouki 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1679-1694,共16页
Due to exponential increase in smart resource limited devices and high speed communication technologies,Internet of Things(IoT)have received significant attention in different application areas.However,IoT environment... Due to exponential increase in smart resource limited devices and high speed communication technologies,Internet of Things(IoT)have received significant attention in different application areas.However,IoT environment is highly susceptible to cyber-attacks because of memory,processing,and communication restrictions.Since traditional models are not adequate for accomplishing security in the IoT environment,the recent developments of deep learning(DL)models find beneficial.This study introduces novel hybrid metaheuristics feature selection with stacked deep learning enabled cyber-attack detection(HMFS-SDLCAD)model.The major intention of the HMFS-SDLCAD model is to recognize the occurrence of cyberattacks in the IoT environment.At the preliminary stage,data pre-processing is carried out to transform the input data into useful format.In addition,salp swarm optimization based on particle swarm optimization(SSOPSO)algorithm is used for feature selection process.Besides,stacked bidirectional gated recurrent unit(SBiGRU)model is utilized for the identification and classification of cyberattacks.Finally,whale optimization algorithm(WOA)is employed for optimal hyperparameter optimization process.The experimental analysis of the HMFS-SDLCAD model is validated using benchmark dataset and the results are assessed under several aspects.The simulation outcomes pointed out the improvements of the HMFS-SDLCAD model over recent approaches. 展开更多
关键词 Cyberattacks SECURITY deep learning internet of things feature selection data classification
下载PDF
Convolutional Deep Belief Network Based Short Text Classification on Arabic Corpus
18
作者 Abdelwahed Motwakel Badriyya B.Al-onazi +5 位作者 Jaber S.Alzahrani Radwa Marzouk Amira Sayed A.Aziz Abu Sarwar Zamani Ishfaq Yaseen Amgad Atta Abdelmageed1 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期3097-3113,共17页
With a population of 440 million,Arabic language users form the rapidly growing language group on the web in terms of the number of Internet users.11 million monthly Twitter users were active and posted nearly 27.4 mi... With a population of 440 million,Arabic language users form the rapidly growing language group on the web in terms of the number of Internet users.11 million monthly Twitter users were active and posted nearly 27.4 million tweets every day.In order to develop a classification system for the Arabic lan-guage there comes a need of understanding the syntactic framework of the words thereby manipulating and representing the words for making their classification effective.In this view,this article introduces a Dolphin Swarm Optimization with Convolutional Deep Belief Network for Short Text Classification(DSOCDBN-STC)model on Arabic Corpus.The presented DSOCDBN-STC model majorly aims to classify Arabic short text in social media.The presented DSOCDBN-STC model encompasses preprocessing and word2vec word embedding at the preliminary stage.Besides,the DSOCDBN-STC model involves CDBN based classification model for Arabic short text.At last,the DSO technique can be exploited for optimal modification of the hyperparameters related to the CDBN method.To establish the enhanced performance of the DSOCDBN-STC model,a wide range of simulations have been performed.The simulation results con-firmed the supremacy of the DSOCDBN-STC model over existing models with improved accuracy of 99.26%. 展开更多
关键词 Arabic text short text classification dolphin swarm optimization deep learning
下载PDF
Remote Sensing Image Encryption Using Optimal Key Generation-Based Chaotic Encryption
19
作者 Mesfer Al Duhayyim Fatma S.Alrayes +5 位作者 Saud S.Alotaibi Sana Alazwari Nasser Allheeib Ayman Yafoz Raed Alsini Amira Sayed A.Aziz 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3209-3223,共15页
The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data g... The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users.With the increasing use of multimedia in communications,the content security of remote-sensing images attracted much attention in academia and industry.Image encryption is important for securing remote sensing images in the IoT environment.Recently,researchers have introduced plenty of algorithms for encrypting images.This study introduces an Improved Sine Cosine Algorithm with Chaotic Encryption based Remote Sensing Image Encryption(ISCACE-RSI)technique in IoT Environment.The proposed model follows a three-stage process,namely pre-processing,encryption,and optimal key generation.The remote sensing images were preprocessed at the initial stage to enhance the image quality.Next,the ISCACERSI technique exploits the double-layer remote sensing image encryption(DLRSIE)algorithm for encrypting the images.The DLRSIE methodology incorporates the design of Chaotic Maps and deoxyribonucleic acid(DNA)Strand Displacement(DNASD)approach.The chaotic map is employed for generating pseudorandom sequences and implementing routine scrambling and diffusion processes on the plaintext images.Then,the study presents three DNASD-related encryption rules based on the variety of DNASD,and those rules are applied for encrypting the images at the DNA sequence level.For an optimal key generation of the DLRSIE technique,the ISCA is applied with an objective function of the maximization of peak signal to noise ratio(PSNR).To examine the performance of the ISCACE-RSI model,a detailed set of simulations were conducted.The comparative study reported the better performance of the ISCACE-RSI model over other existing approaches. 展开更多
关键词 Remote sensing internet of things image encryption SECURITY optimal key generation
下载PDF
Abstractive Arabic Text Summarization Using Hyperparameter Tuned Denoising Deep Neural Network
20
作者 Ibrahim M.Alwayle Hala J.Alshahrani +5 位作者 Saud S.Alotaibi Khaled M.Alalayah Amira Sayed A.Aziz Khadija M.Alaidarous Ibrahim Abdulrab Ahmed Manar Ahmed Hamza 《Intelligent Automation & Soft Computing》 2023年第11期153-168,共16页
ive Arabic Text Summarization using Hyperparameter Tuned Denoising Deep Neural Network(AATS-HTDDNN)technique.The presented AATS-HTDDNN technique aims to generate summaries of Arabic text.In the presented AATS-HTDDNN t... ive Arabic Text Summarization using Hyperparameter Tuned Denoising Deep Neural Network(AATS-HTDDNN)technique.The presented AATS-HTDDNN technique aims to generate summaries of Arabic text.In the presented AATS-HTDDNN technique,the DDNN model is utilized to generate the summary.This study exploits the Chameleon Swarm Optimization(CSO)algorithm to fine-tune the hyperparameters relevant to the DDNN model since it considerably affects the summarization efficiency.This phase shows the novelty of the current study.To validate the enhanced summarization performance of the proposed AATS-HTDDNN model,a comprehensive experimental analysis was conducted.The comparison study outcomes confirmed the better performance of the AATS-HTDDNN model over other approaches. 展开更多
关键词 Text summarization deep learning denoising deep neural networks hyperparameter tuning Arabic language
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部