期刊文献+
共找到52篇文章
< 1 2 3 >
每页显示 20 50 100
Optimization of Electrocardiogram Classification Using Dipper Throated Algorithm and Differential Evolution
1
作者 Doaa Sami Khafaga El-Sayed M.El-kenawy +4 位作者 Faten Khalid Karim Sameer Alshetewi Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh 《Computers, Materials & Continua》 SCIE EI 2023年第2期2379-2395,共17页
Electrocardiogram(ECG)signal is a measure of the heart’s electrical activity.Recently,ECG detection and classification have benefited from the use of computer-aided systems by cardiologists.The goal of this paper is ... Electrocardiogram(ECG)signal is a measure of the heart’s electrical activity.Recently,ECG detection and classification have benefited from the use of computer-aided systems by cardiologists.The goal of this paper is to improve the accuracy of ECG classification by combining the Dipper Throated Optimization(DTO)and Differential Evolution Algorithm(DEA)into a unified algorithm to optimize the hyperparameters of neural network(NN)for boosting the ECG classification accuracy.In addition,we proposed a new feature selection method for selecting the significant feature that can improve the overall performance.To prove the superiority of the proposed approach,several experimentswere conducted to compare the results achieved by the proposed approach and other competing approaches.Moreover,statistical analysis is performed to study the significance and stability of the proposed approach using Wilcoxon and ANOVA tests.Experimental results confirmed the superiority and effectiveness of the proposed approach.The classification accuracy achieved by the proposed approach is(99.98%). 展开更多
关键词 ELECTROCARDIOGRAM differential evolution algorithm dipper throated optimization neural networks
下载PDF
Robust Prediction of the Bandwidth of Metamaterial Antenna Using Deep Learning 被引量:2
2
作者 Abdelaziz A.Abdelhamid Sultan R.Alotaibi 《Computers, Materials & Continua》 SCIE EI 2022年第8期2305-2321,共17页
The design ofmicrostrip antennas is a complex and time-consuming process,especially the step of searching for the best design parameters.Meanwhile,the performance ofmicrostrip antennas can be improved usingmetamateria... The design ofmicrostrip antennas is a complex and time-consuming process,especially the step of searching for the best design parameters.Meanwhile,the performance ofmicrostrip antennas can be improved usingmetamaterial,which results in a new class of antennas called metamaterial antenna.Several parameters affect the radiation loss and quality factor of this class of antennas,such as the antenna size.Recently,the optimal values of the design parameters of metamaterial antennas can be predicted using machine learning,which presents a better alternative to simulation tools and trialand-error processes.However,the prediction accuracy depends heavily on the quality of the machine learning model.In this paper,and benefiting from the current advances in deep learning,we propose a deep network architecture to predict the bandwidth of metamaterial antenna.Experimental results show that the proposed deep network could accurately predict the optimal values of the antenna bandwidth with a tiny value of mean-square error(MSE).In addition,the proposed model is comparedwith current competing approaches that are based on support vector machines,multi-layer perceptron,K-nearest neighbors,and ensemble models.The results show that the proposed model is better than the other approaches and can predict antenna bandwidth more accurately. 展开更多
关键词 Metamaterial antenna deep learning bandwidth prediction regression models
下载PDF
Improved Prediction of Metamaterial Antenna Bandwidth Using Adaptive Optimization of LSTM 被引量:1
3
作者 Doaa Sami Khafaga Amel Ali Alhussan +4 位作者 El-Sayed M.El-kenawy Abdelhameed Ibrahim Said H.Abd Elkhalik Shady Y.El-Mashad Abdelaziz A.Abdelhamid 《Computers, Materials & Continua》 SCIE EI 2022年第10期865-881,共17页
The design of an antenna requires a careful selection of its parameters to retain the desired performance.However,this task is time-consuming when the traditional approaches are employed,which represents a significant... The design of an antenna requires a careful selection of its parameters to retain the desired performance.However,this task is time-consuming when the traditional approaches are employed,which represents a significant challenge.On the other hand,machine learning presents an effective solution to this challenge through a set of regression models that can robustly assist antenna designers to find out the best set of design parameters to achieve the intended performance.In this paper,we propose a novel approach for accurately predicting the bandwidth of metamaterial antenna.The proposed approach is based on employing the recently emerged guided whale optimization algorithm using adaptive particle swarm optimization to optimize the parameters of the long-short-term memory(LSTM)deep network.This optimized network is used to retrieve the metamaterial bandwidth given a set of features.In addition,the superiority of the proposed approach is examined in terms of a comparison with the traditional multilayer perceptron(ML),Knearest neighbors(K-NN),and the basic LSTM in terms of several evaluation criteria such as root mean square error(RMSE),mean absolute error(MAE),and mean bias error(MBE).Experimental results show that the proposed approach could achieve RMSE of(0.003018),MAE of(0.001871),and MBE of(0.000205).These values are better than those of the other competing models. 展开更多
关键词 Metamaterial antenna long short term memory(LSTM) guided whale optimization algorithm(Guided WOA) adaptive dynamic particle swarm algorithm(AD-PSO)
下载PDF
Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets 被引量:1
4
作者 Doaa Sami Khafaga El-Sayed M.El-kenawy +4 位作者 Faten Khalid Karim Mostafa Abotaleb Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh 《Computers, Materials & Continua》 SCIE EI 2023年第2期4531-4545,共15页
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine learning.Each feature in a dataset has 2n possible subsets,making it challenging to select the optimum collectio... Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine learning.Each feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of features using typical methods.As a result,a new metaheuristicsbased feature selection method based on the dipper-throated and grey-wolf optimization(DTO-GW)algorithms has been developed in this research.Instability can result when the selection of features is subject to metaheuristics,which can lead to a wide range of results.Thus,we adopted hybrid optimization in our method of optimizing,which allowed us to better balance exploration and harvesting chores more equitably.We propose utilizing the binary DTO-GW search approach we previously devised for selecting the optimal subset of attributes.In the proposed method,the number of features selected is minimized,while classification accuracy is increased.To test the proposed method’s performance against eleven other state-of-theart approaches,eight datasets from the UCI repository were used,such as binary grey wolf search(bGWO),binary hybrid grey wolf,and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hysteresis optimization(bHy),and binary hysteresis optimization(bHWO).The suggested method is superior 4532 CMC,2023,vol.74,no.2 and successful in handling the problem of feature selection,according to the results of the experiments. 展开更多
关键词 Metaheuristics dipper throated optimization grey wolf optimization binary optimizer feature selection
下载PDF
Plant Leaf Diseases Classification Using Improved K-Means Clustering and SVM Algorithm for Segmentation
5
作者 Mona Jamjoom Ahmed Elhadad +1 位作者 Hussein Abulkasim Safia Abbas 《Computers, Materials & Continua》 SCIE EI 2023年第7期367-382,共16页
Several pests feed on leaves,stems,bases,and the entire plant,causing plant illnesses.As a result,it is vital to identify and eliminate the disease before causing any damage to plants.Manually detecting plant disease ... Several pests feed on leaves,stems,bases,and the entire plant,causing plant illnesses.As a result,it is vital to identify and eliminate the disease before causing any damage to plants.Manually detecting plant disease and treating it is pretty challenging in this period.Image processing is employed to detect plant disease since it requires much effort and an extended processing period.The main goal of this study is to discover the disease that affects the plants by creating an image processing system that can recognize and classify four different forms of plant diseases,including Phytophthora infestans,Fusarium graminearum,Puccinia graminis,tomato yellow leaf curl.Therefore,this work uses the Support vector machine(SVM)classifier to detect and classify the plant disease using various steps like image acquisition,Pre-processing,Segmentation,feature extraction,and classification.The gray level co-occurrence matrix(GLCM)and the local binary pattern features(LBP)are used to identify the disease-affected portion of the plant leaf.According to experimental data,the proposed technology can correctly detect and diagnose plant sickness with a 97.2 percent accuracy. 展开更多
关键词 SVM machine learning GLCM algorithm K-means clustering LBP
下载PDF
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
6
作者 Ali Arshad Muhammad Nadeem +6 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第5期3065-3089,共25页
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog... There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm. 展开更多
关键词 CRYPTOGRAPHY symmetric cipher text ENCRYPTION matrix cipher encoding decoding hill matrix 64-bit encryption
下载PDF
Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection
7
作者 Doaa Sami Khafaga Faten Khalid Karim +5 位作者 Abdelaziz A.Abdelhamid El-Sayed M.El-kenawy Hend K.Alkahtani Nima Khodadadi Mohammed Hadwan Abdelhameed Ibrahim 《Computers, Materials & Continua》 SCIE EI 2023年第2期3183-3198,共16页
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human life.Open attacks and unauthorized access are possible with these IoT devices,which exchange ... Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human life.Open attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote access.These attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are subpar.This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization.The employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA optimizer.The proposed voting classifier categorizes the network intrusions robustly and efficiently.To assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack categorization.The dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and significance.The achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection. 展开更多
关键词 Voting classifier whale optimization algorithm dipper throated optimization intrusion detection internet-of-things
下载PDF
Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems
8
作者 Reem Alkanhel Doaa Sami Khafaga +5 位作者 El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Rashid Amin Mostafa Abotaleb B.M.El-den 《Computers, Materials & Continua》 SCIE EI 2023年第2期2695-2709,共15页
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices remotely.Due to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy... The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices remotely.Due to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)networks may be vulnerable to several routing attacks.That’s why a network intrusion detection system(NIDS)is needed to guard against routing assaults on RPL-based IoT networks.The imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network attacks.Therefore,we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique(LSH-SMOTE).The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization algorithms.To prove the effectiveness of the proposed approach,a set of experiments were conducted to evaluate the performance of NIDS for three cases,namely,detection without dataset balancing,detection with SMOTE balancing,and detection with the proposed optimized LSHSOMTE balancing.Experimental results showed that the proposed approach outperforms the other approaches and could boost the detection accuracy.In addition,a statistical analysis is performed to study the significance and stability of the proposed approach.The conducted experiments include seven different types of attack cases in the RPL-NIDS17 dataset.Based on the 2696 CMC,2023,vol.74,no.2 proposed approach,the achieved accuracy is(98.1%),sensitivity is(97.8%),and specificity is(98.8%). 展开更多
关键词 Metaheuristics grey wolf optimization dipper throated optimization dataset balancing locality sensitive hashing SMOTE
下载PDF
Enhanced Image Captioning Using Features Concatenation and Efficient Pre-Trained Word Embedding
9
作者 Samar Elbedwehy T.Medhat +1 位作者 Taher Hamza Mohammed F.Alrahmawy 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3637-3652,共16页
One of the issues in Computer Vision is the automatic development of descriptions for images,sometimes known as image captioning.Deep Learning techniques have made significant progress in this area.The typical archite... One of the issues in Computer Vision is the automatic development of descriptions for images,sometimes known as image captioning.Deep Learning techniques have made significant progress in this area.The typical architecture of image captioning systems consists mainly of an image feature extractor subsystem followed by a caption generation lingual subsystem.This paper aims to find optimized models for these two subsystems.For the image feature extraction subsystem,the research tested eight different concatenations of pairs of vision models to get among them the most expressive extracted feature vector of the image.For the caption generation lingual subsystem,this paper tested three different pre-trained language embedding models:Glove(Global Vectors for Word Representation),BERT(Bidirectional Encoder Representations from Transformers),and TaCL(Token-aware Contrastive Learning),to select from them the most accurate pre-trained language embedding model.Our experiments showed that building an image captioning system that uses a concatenation of the two Transformer based models SWIN(Shiftedwindow)and PVT(PyramidVision Transformer)as an image feature extractor,combined with the TaCL language embedding model is the best result among the other combinations. 展开更多
关键词 Image captioning word embedding CONCATENATION TRANSFORMER
下载PDF
Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
10
作者 Reem Alkanhel El-Sayed M.El-kenawy +4 位作者 Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Manal Abdullah Alohali Mostafa Abotaleb Doaa Sami Khafaga 《Computers, Materials & Continua》 SCIE EI 2023年第2期2677-2693,共17页
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of data.Cloud computing and fog computing,two of the most common technologies use... Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of data.Cloud computing and fog computing,two of the most common technologies used in IoT applications,have led to major security concerns.Cyberattacks are on the rise as a result of the usage of these technologies since present security measures are insufficient.Several artificial intelligence(AI)based security solutions,such as intrusion detection systems(IDS),have been proposed in recent years.Intelligent technologies that require data preprocessing and machine learning algorithm-performance augmentation require the use of feature selection(FS)techniques to increase classification accuracy by minimizing the number of features selected.On the other hand,metaheuristic optimization algorithms have been widely used in feature selection in recent decades.In this paper,we proposed a hybrid optimization algorithm for feature selection in IDS.The proposed algorithm is based on grey wolf(GW),and dipper throated optimization(DTO)algorithms and is referred to as GWDTO.The proposed algorithm has a better balance between the exploration and exploitation steps of the optimization process and thus could achieve better performance.On the employed IoT-IDS dataset,the performance of the proposed GWDTO algorithm was assessed using a set of evaluation metrics and compared to other optimization approaches in 2678 CMC,2023,vol.74,no.2 the literature to validate its superiority.In addition,a statistical analysis is performed to assess the stability and effectiveness of the proposed approach.Experimental results confirmed the superiority of the proposed approach in boosting the classification accuracy of the intrusion in IoT-based networks. 展开更多
关键词 Feature selection grey wolf optimization dipper throated optimization intrusion detection internet-of-things(IoT)
下载PDF
Metaheuristic Optimization of Time Series Models for Predicting Networks Traffic
11
作者 Reem Alkanhel El-Sayed M.El-kenawy +3 位作者 D.L.Elsheweikh Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Doaa Sami Khafaga 《Computers, Materials & Continua》 SCIE EI 2023年第4期427-442,共16页
Traffic prediction of wireless networks attracted many researchersand practitioners during the past decades. However, wireless traffic frequentlyexhibits strong nonlinearities and complicated patterns, which makes it ... Traffic prediction of wireless networks attracted many researchersand practitioners during the past decades. However, wireless traffic frequentlyexhibits strong nonlinearities and complicated patterns, which makes it challengingto be predicted accurately. Many of the existing approaches forpredicting wireless network traffic are unable to produce accurate predictionsbecause they lack the ability to describe the dynamic spatial-temporalcorrelations of wireless network traffic data. In this paper, we proposed anovel meta-heuristic optimization approach based on fitness grey wolf anddipper throated optimization algorithms for boosting the prediction accuracyof traffic volume. The proposed algorithm is employed to optimize the hyperparametersof long short-term memory (LSTM) network as an efficient timeseries modeling approach which is widely used in sequence prediction tasks.To prove the superiority of the proposed algorithm, four other optimizationalgorithms were employed to optimize LSTM, and the results were compared.The evaluation results confirmed the effectiveness of the proposed approachin predicting the traffic of wireless networks accurately. On the other hand,a statistical analysis is performed to emphasize the stability of the proposedapproach. 展开更多
关键词 Network traffic soft computing LSTM metaheuristic optimization
下载PDF
Dipper Throated Algorithm for Feature Selection and Classification in Electrocardiogram
12
作者 Doaa Sami Khafaga Amel Ali Alhussan +3 位作者 Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mohamed Saber El-Sayed M.El-kenawy 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1469-1482,共14页
Arrhythmia has been classified using a variety of methods.Because of the dynamic nature of electrocardiogram(ECG)data,traditional handcrafted approaches are difficult to execute,making the machine learning(ML)solution... Arrhythmia has been classified using a variety of methods.Because of the dynamic nature of electrocardiogram(ECG)data,traditional handcrafted approaches are difficult to execute,making the machine learning(ML)solutions more appealing.Patients with cardiac arrhythmias can benefit from competent monitoring to save their lives.Cardiac arrhythmia classification and prediction have greatly improved in recent years.Arrhythmias are a category of conditions in which the heart's electrical activity is abnormally rapid or sluggish.Every year,it is one of the main reasons of mortality for both men and women,worldwide.For the classification of arrhythmias,this work proposes a novel technique based on optimized feature selection and optimized K-nearest neighbors(KNN)classifier.The proposed method makes advantage of the UCI repository,which has a 279-attribute high-dimensional cardiac arrhythmia dataset.The proposed approach is based on dividing cardiac arrhythmia patients into 16 groups based on the electrocardiography dataset’s features.The purpose is to design an efficient intelligent system employing the dipper throated optimization method to categorize cardiac arrhythmia patients.This method of comprehensive arrhythmia classification outperforms earlier methods presented in the literature.The achieved classification accuracy using the proposed approach is 99.8%. 展开更多
关键词 Feature selection ELECTROCARDIOGRAM metaheuristics dipper throated algorithm
下载PDF
Wind Power Prediction Based on Machine Learning and Deep Learning Models
13
作者 Zahraa Tarek Mahmoud Y.Shams +4 位作者 Ahmed M.Elshewey El-Sayed M.El-kenawy Abdelhameed Ibrahim Abdelaziz A.Abdelhamid Mohamed A.El-dosuky 《Computers, Materials & Continua》 SCIE EI 2023年第1期715-732,共18页
Wind power is one of the sustainable ways to generate renewable energy.In recent years,some countries have set renewables to meet future energy needs,with the primary goal of reducing emissions and promoting sustainab... Wind power is one of the sustainable ways to generate renewable energy.In recent years,some countries have set renewables to meet future energy needs,with the primary goal of reducing emissions and promoting sustainable growth,primarily the use of wind and solar power.To achieve the prediction of wind power generation,several deep and machine learning models are constructed in this article as base models.These regression models are Deep neural network(DNN),k-nearest neighbor(KNN)regressor,long short-term memory(LSTM),averaging model,random forest(RF)regressor,bagging regressor,and gradient boosting(GB)regressor.In addition,data cleaning and data preprocessing were performed to the data.The dataset used in this study includes 4 features and 50530 instances.To accurately predict the wind power values,we propose in this paper a new optimization technique based on stochastic fractal search and particle swarm optimization(SFSPSO)to optimize the parameters of LSTM network.Five evaluation criteria were utilized to estimate the efficiency of the regression models,namely,mean absolute error(MAE),Nash Sutcliffe Efficiency(NSE),mean square error(MSE),coefficient of determination(R2),root mean squared error(RMSE).The experimental results illustrated that the proposed optimization of LSTM using SFS-PSO model achieved the best results with R2 equals 99.99%in predicting the wind power values. 展开更多
关键词 Prediction of wind power data preprocessing performance evaluation
下载PDF
Optimized Two-Level Ensemble Model for Predicting the Parameters of Metamaterial Antenna 被引量:2
14
作者 Abdelaziz A.Abdelhamid Sultan R.Alotaibi 《Computers, Materials & Continua》 SCIE EI 2022年第10期917-933,共17页
Employing machine learning techniques in predicting the parameters of metamaterial antennas has a significant impact on the reduction of the time needed to design an antenna with optimal parameters using simulation to... Employing machine learning techniques in predicting the parameters of metamaterial antennas has a significant impact on the reduction of the time needed to design an antenna with optimal parameters using simulation tools.In this paper,we propose a new approach for predicting the bandwidth of metamaterial antenna using a novel ensemble model.The proposed ensemble model is composed of two levels of regression models.The first level consists of three strong models namely,random forest,support vector regression,and light gradient boosting machine.Whereas the second level is based on the ElasticNet regression model,which receives the prediction results from the models in the first level for refinement and producing the final optimal result.To achieve the best performance of these regression models,the advanced squirrel search optimization algorithm(ASSOA)is utilized to search for the optimal set of hyper-parameters of each model.Experimental results show that the proposed two-level ensemble model could achieve a robust prediction of the bandwidth of metamaterial antenna when compared with the recently published ensemble models based on the same publicly available benchmark dataset.The findings indicate that the proposed approach results in root mean square error(RMSE)of(0.013),mean absolute error(MAE)of(0.004),and mean bias error(MBE)of(0.0017).These results are superior to the other competing ensemble models and can predict the antenna bandwidth more accurately. 展开更多
关键词 Ensemble model parameter prediction metamaterial antenna machine learning model optimization
下载PDF
A Transfer Learning-Enabled Optimized Extreme Deep Learning Paradigm for Diagnosis of COVID-19 被引量:1
15
作者 Ahmed Reda Sherif Barakat Amira Rezk 《Computers, Materials & Continua》 SCIE EI 2022年第1期1381-1399,共19页
Many respiratory infections around the world have been caused by coronaviruses.COVID-19 is one of the most serious coronaviruses due to its rapid spread between people and the lowest survival rate.There is a high need... Many respiratory infections around the world have been caused by coronaviruses.COVID-19 is one of the most serious coronaviruses due to its rapid spread between people and the lowest survival rate.There is a high need for computer-assisted diagnostics(CAD)in the area of artificial intelligence to help doctors and radiologists identify COVID-19 patients in cloud systems.Machine learning(ML)has been used to examine chest X-ray frames.In this paper,a new transfer learning-based optimized extreme deep learning paradigm is proposed to identify the chest X-ray picture into three classes,a pneumonia patient,a COVID-19 patient,or a normal person.First,three different pre-trainedConvolutionalNeuralNetwork(CNN)models(resnet18,resnet25,densenet201)are employed for deep feature extraction.Second,each feature vector is passed through the binary Butterfly optimization algorithm(bBOA)to reduce the redundant features and extract the most representative ones,and enhance the performance of the CNN models.These selective features are then passed to an improved Extreme learning machine(ELM)using a BOA to classify the chest X-ray images.The proposed paradigm achieves a 99.48%accuracy in detecting covid-19 cases. 展开更多
关键词 Butterfly optimization algorithm(BOA) covid-19 chest X-ray images convolutional neural network(CNN) extreme learning machine(ELM) feature selection
下载PDF
Identifying cooperative transcription factors by combining ChiP-chip data and knockout data
16
作者 Yi Yang Zili Zhang +2 位作者 Yixue Li Xin-Guang Zhu Qi Liu 《Cell Research》 SCIE CAS CSCD 2010年第11期1276-1278,共3页
关键词 转录因子 基因敲除 合作 数据资料 芯片 识别 真核基因转录 基因组序列
下载PDF
Meta-heuristics for Feature Selection and Classification in Diagnostic Breast Cancer
17
作者 Doaa Sami Khafaga Amel Ali Alhussan +6 位作者 El-Sayed M.El-kenawy Ali E.Takieldeen Tarek M.Hassan Ehab A.Hegazy Elsayed Abdel Fattah Eid Abdelhameed Ibrahim Abdelaziz A.Abdelhamid 《Computers, Materials & Continua》 SCIE EI 2022年第10期749-765,共17页
One of the most common kinds of cancer is breast cancer.The early detection of it may help lower its overall rates of mortality.In this paper,we robustly propose a novel approach for detecting and classifying breast c... One of the most common kinds of cancer is breast cancer.The early detection of it may help lower its overall rates of mortality.In this paper,we robustly propose a novel approach for detecting and classifying breast cancer regions in thermal images.The proposed approach starts with data preprocessing the input images and segmenting the significant regions of interest.In addition,to properly train the machine learning models,data augmentation is applied to increase the number of segmented regions using various scaling ratios.On the other hand,to extract the relevant features from the breast cancer cases,a set of deep neural networks(VGGNet,ResNet-50,AlexNet,and GoogLeNet)are employed.The resulting set of features is processed using the binary dipper throated algorithm to select the most effective features that can realize high classification accuracy.The selected features are used to train a neural network to finally classify the thermal images of breast cancer.To achieve accurate classification,the parameters of the employed neural network are optimized using the continuous dipper throated optimization algorithm.Experimental results show the effectiveness of the proposed approach in classifying the breast cancer cases when compared to other recent approaches in the literature.Moreover,several experiments were conducted to compare the performance of the proposed approach with the other approaches.The results of these experiments emphasized the superiority of the proposed approach. 展开更多
关键词 Breast cancer image segmentation dipper throated optimization feature selection META-HEURISTICS
下载PDF
Smart City: Key Technologies and Practices
18
作者 Jianhua Ma Weifeng Lv 《ZTE Communications》 2015年第4期1-2,共2页
Ubiquitous sensors, devices, networks, and information are paving the way to smart cities in which computation and intelligence are pervasive. This enables reliable, relevant intormation and services to he accessible ... Ubiquitous sensors, devices, networks, and information are paving the way to smart cities in which computation and intelligence are pervasive. This enables reliable, relevant intormation and services to he accessible to all people. Smart objects, homes, hospitals, manufacturing, and systerns will eventually be present in every city. 展开更多
关键词 Smart City Key Technologies and Practices HIGH
下载PDF
Metaheuristic Optimization Through Deep Learning Classification of COVID-19 in Chest X-Ray Images
19
作者 Nagwan Abdel Samee El-Sayed M.El-Kenawy +7 位作者 Ghada Atteia Mona M.Jamjoom Abdelhameed Ibrahim Abdelaziz A.Abdelhamid Noha E.El-Attar Tarek Gaber Adam Slowik Mahmoud Y.Shams 《Computers, Materials & Continua》 SCIE EI 2022年第11期4193-4210,共18页
As corona virus disease(COVID-19)is still an ongoing global outbreak,countries around the world continue to take precautions and measures to control the spread of the pandemic.Because of the excessive number of infect... As corona virus disease(COVID-19)is still an ongoing global outbreak,countries around the world continue to take precautions and measures to control the spread of the pandemic.Because of the excessive number of infected patients and the resulting deficiency of testing kits in hospitals,a rapid,reliable,and automatic detection of COVID-19 is in extreme need to curb the number of infections.By analyzing the COVID-19 chest X-ray images,a novel metaheuristic approach is proposed based on hybrid dipper throated and particle swarm optimizers.The lung region was segmented from the original chest X-ray images and augmented using various transformation operations.Furthermore,the augmented images were fed into the VGG19 deep network for feature extraction.On the other hand,a feature selection method is proposed to select the most significant features that can boost the classification results.Finally,the selected features were input into an optimized neural network for detection.The neural network is optimized using the proposed hybrid optimizer.The experimental results showed that the proposed method achieved 99.88%accuracy,outperforming the existing COVID-19 detection models.In addition,a deep statistical analysis is performed to study the performance and stability of the proposed optimizer.The results confirm the effectiveness and superiority of the proposed approach. 展开更多
关键词 Covid-19 feature selection dipper throated optimization particle swarm optimization deep learning
下载PDF
Growth Pattern of Social Media Usage in Arab Gulf States: An Analytical Study
20
作者 Sulaiman Reyaee Aquil Ahmed 《Social Networking》 2015年第2期23-32,共10页
The impact of SNSs is tremendous on every aspect of life and people irrespective of region, gender and age are using it to get connected with their families and friends around the globe. This study aims to highlight t... The impact of SNSs is tremendous on every aspect of life and people irrespective of region, gender and age are using it to get connected with their families and friends around the globe. This study aims to highlight the highly used SNSs across the Arab Gulf States comprising Iraq, Kuwait, United Arab Emirates, Oman, Qatar, and Saudi Arabia. The database of Stat Counter (http://gs.statcounter.com) was selected for tracing the use and growth of SNSs in this region. The findings show that the three most used SNSs in the Arab Gulf region are: Facebook, Twitter and YouTube. It is observed that Facebook is the leading social networking site used in the region until now, but Twitter is fast gaining market. Twitter is becoming popular among users and giving a tough competition to Facebook in almost all countries of the region except Iraq. In 2013, it has moved to 1st position in Saudi Arabia and Kuwait, replacing Facebook. However, in some countries like the UAE and Qatar, Facebook is still going strong. The paper concludes that the intensive use of social media among citizens’ of the Arab Gulf countries indicates that the internet has the potential to be a multivocal platform through which every segment of the society can have their voices heard. With limited availability of published literature in the field pertaining to the usage of social media by the people of the Arab Gulf countries, the paper aims to understand the practice, implication and importance of social media networks in this Muslim dominated region. 展开更多
关键词 SOCIAL Networks SOCIAL Media Facebook HIGHER Education SAUDI ARABIA
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部