期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
Statistical Histogram Decision Based Contrast Categorization of Skin Lesion Datasets Dermoscopic Images
1
作者 Rabia Javed Mohd Shafry Mohd Rahim +3 位作者 Tanzila Saba Suliman Mohamed Fati Amjad Rehman Usman Tariq 《Computers, Materials & Continua》 SCIE EI 2021年第5期2337-2352,共16页
Most of the melanoma cases of skin cancer are the life-threatening form of cancer.It is prevalent among the Caucasian group of people due to their light skin tone.Melanoma is the second most common cancer that hits th... Most of the melanoma cases of skin cancer are the life-threatening form of cancer.It is prevalent among the Caucasian group of people due to their light skin tone.Melanoma is the second most common cancer that hits the age group of 15–29 years.The high number of cases has increased the importance of automated systems for diagnosing.The diagnosis should be fast and accurate for the early treatment of melanoma.It should remove the need for biopsies and provide stable diagnostic results.Automation requires large quantities of images.Skin lesion datasets contain various kinds of dermoscopic images for the detection of melanoma.Three publicly available benchmark skin lesion datasets,ISIC 2017,ISBI 2016,and PH2,are used for the experiments.Currently,the ISIC archive and PH2 are the most challenging and demanding dermoscopic datasets.These datasets’pre-analysis is necessary to overcome contrast variations,under or over segmented images boundary extraction,and accurate skin lesion classification.In this paper,we proposed the statistical histogram-based method for the pre-categorization of skin lesion datasets.The image histogram properties are utilized to check the image contrast variations and categorized these images into high and low contrast images.The two performance measures,processing time and efficiency,are computed for evaluation of the proposed method.Our results showed that the proposed methodology improves the pre-processing efficiency of 77%of ISIC 2017,67%of ISBI 2016,and 92.5%of PH2 datasets. 展开更多
关键词 CANCER healthcare contrast enhancement dermoscopic images skin lesion low contrast images WHO
下载PDF
Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text
2
作者 Mohammad Alamgeer Fahd N.Al-Wesabi +5 位作者 Huda G.Iskandar Imran Khan Nadhem Nemri Mohammad Medani Mohammed Abdullah Al-Hagery Ali Mohammed Al-Sharafi 《Computers, Materials & Continua》 SCIE EI 2022年第5期2497-2513,共17页
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a... Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach.The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text.Moreover,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any tampering.SFASCDW has been implemented using PHP with VS code IDE.The robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and deletion.The SFASCDW was found to be effective and could be applicable in detecting any possible tampering. 展开更多
关键词 WATERMARKING soft computing text analysis hidden Markov model content authentication
下载PDF
Deep Learning and Machine Learning for Early Detection of Stroke and Haemorrhage
3
作者 Zeyad Ghaleb Al-Mekhlafi Ebrahim Mohammed Senan +5 位作者 Taha H.Rassem Badiea Abdulkarem Mohammed Nasrin M.Makbol Adwan Alownie Alanazi Tariq S.Almurayziq Fuad A.Ghaleb 《Computers, Materials & Continua》 SCIE EI 2022年第7期775-796,共22页
Stroke and cerebral haemorrhage are the second leading causes of death in the world after ischaemic heart disease.In this work,a dataset containing medical,physiological and environmental tests for stroke was used to ... Stroke and cerebral haemorrhage are the second leading causes of death in the world after ischaemic heart disease.In this work,a dataset containing medical,physiological and environmental tests for stroke was used to evaluate the efficacy of machine learning,deep learning and a hybrid technique between deep learning and machine learning on theMagnetic Resonance Imaging(MRI)dataset for cerebral haemorrhage.In the first dataset(medical records),two features,namely,diabetes and obesity,were created on the basis of the values of the corresponding features.The t-Distributed Stochastic Neighbour Embedding algorithm was applied to represent the high-dimensional dataset in a low-dimensional data space.Meanwhile,the Recursive Feature Elimination algorithm(RFE)was applied to rank the features according to priority and their correlation to the target feature and to remove the unimportant features.The features are fed into the various classification algorithms,namely,Support Vector Machine(SVM),K Nearest Neighbours(KNN),Decision Tree,Random Forest,and Multilayer Perceptron.All algorithms achieved superior results.The Random Forest algorithm achieved the best performance amongst the algorithms;it reached an overall accuracy of 99%.This algorithm classified stroke cases with Precision,Recall and F1 score of 98%,100%and 99%,respectively.In the second dataset,the MRI image dataset was evaluated by using the AlexNet model and AlexNet+SVM hybrid technique.The hybrid model AlexNet+SVM performed is better than the AlexNet model;it reached accuracy,sensitivity,specificity and Area Under the Curve(AUC)of 99.9%,100%,99.80%and 99.86%,respectively. 展开更多
关键词 STROKE cerebral haemorrhage deep learning machine learning t-SNE and RFE algorithms
下载PDF
An Optimized Design of Antenna Arrays for the Smart Antenna Systems
4
作者 Fahd N.Al-Wesabi Murad A.A.Almekhlafi +7 位作者 Huda G.Iskandar Adnan Zain Saleh Alzahrani Mohammed Alamgeer Nadhem Nemri Sami Dhabi Mohammad Medani Ali.M.Al-Sharafi 《Computers, Materials & Continua》 SCIE EI 2021年第11期1979-1994,共16页
In recent years,there has been an increasing demand to improve cellular communication services in several aspects.The aspect that received the most attention is improving the quality of coverage through using smart an... In recent years,there has been an increasing demand to improve cellular communication services in several aspects.The aspect that received the most attention is improving the quality of coverage through using smart antennas which consist of array antennas.this paper investigates the main characteristics and design of the three types of array antennas of the base station for better coverage through simulation(MATLAB)which provides field and strength patterns measured in polar and rectangular coordinates for a variety of conditions including broadsides,ordinary End-fire,and increasing directivity End-fire which is typically used in smart antennas.The method of analysis was applied to twenty experiments of process design to each antenna type separately,so sixty results were obtained from the radiation pattern indicating the parameters for each radiation pattern.Moreover,nineteen design experiments were described in this section.It is hoped that the results obtained from this study will help engineers solve coverage problems as well as improve the quality of cellular communication networks. 展开更多
关键词 Smart antenna antenna arrays patterns construction COVERAGE
下载PDF
Efficient Power Control for UAV Based on Trajectory and Game Theory
5
作者 Fadhil Mukhlif Ashraf Osman Ibrahim +2 位作者 Norafida Ithnin Roobaea Alroobaea Majed Alsafyani 《Computers, Materials & Continua》 SCIE EI 2023年第3期5589-5606,共18页
Due to the fact that network space is becoming more limited,the implementation of ultra-dense networks(UDNs)has the potential to enhance not only network coverage but also network throughput.Unmanned Aerial Vehicle(UA... Due to the fact that network space is becoming more limited,the implementation of ultra-dense networks(UDNs)has the potential to enhance not only network coverage but also network throughput.Unmanned Aerial Vehicle(UAV)communications have recently garnered a lot of attention due to the fact that they are extremely versatile and may be applied to a wide variety of contexts and purposes.A cognitive UAV is proposed as a solution for the Internet of Things ground terminal’s wireless nodes in this article.In the IoT system,the UAV is utilised not only to determine how the resources should be distributed but also to provide power to the wireless nodes.The quality of service(QoS)offered by the cognitive node was interpreted as a price-based utility function,which was demonstrated in the form of a non-cooperative game theory in order to maximise customers’net utility functions.An energyefficient non-cooperative game theory power allocation with pricing strategy abbreviated as(EE-NGPAP)is implemented in this study with two trajectories Spiral and Sigmoidal in order to facilitate effective power management in Internet of Things(IoT)wireless nodes.It has also been demonstrated,theoretically and by the use of simulations,that the Nash equilibrium does exist and that it is one of a kind.The proposed energy harvesting approach was shown,through simulations,to significantly reduce the typical amount of power thatwas sent.This is taken into consideration to agree with the objective of 5G networks.In order to converge to Nash Equilibrium(NE),the method that is advised only needs roughly 4 iterations,which makes it easier to utilise in the real world,where things aren’t always the same. 展开更多
关键词 UAV spiral&sigmoid trajectory DRONES IoT game theory energy efficiency 6G
下载PDF
IoT data analytic algorithms on edge-cloud infrastructure:A review
6
作者 Abel E.Edje M.S.Abd Latiff Weng Howe Chan 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1486-1515,共30页
The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime services.However,it is constrained by limited data storage and processing power.It offloads its massiv... The adoption of Internet of Things(IoT)sensing devices is growing rapidly due to their ability to provide realtime services.However,it is constrained by limited data storage and processing power.It offloads its massive data stream to edge devices and the cloud for adequate storage and processing.This further leads to the challenges of data outliers,data redundancies,and cloud resource load balancing that would affect the execution and outcome of data streams.This paper presents a review of existing analytics algorithms deployed on IoT-enabled edge cloud infrastructure that resolved the challenges of data outliers,data redundancies,and cloud resource load balancing.The review highlights the problems solved,the results,the weaknesses of the existing algorithms,and the physical and virtual cloud storage servers for resource load balancing.In addition,it discusses the adoption of network protocols that govern the interaction between the three-layer architecture of IoT sensing devices enabled edge cloud and its prevailing challenges.A total of 72 algorithms covering the categories of classification,regression,clustering,deep learning,and optimization have been reviewed.The classification approach has been widely adopted to solve the problem of redundant data,while clustering and optimization approaches are more used for outlier detection and cloud resource allocation. 展开更多
关键词 Internet of things Cloud platform Edge Analytic algorithms Processes Network communication protocols
下载PDF
Crowd evacuation simulation model with soft computing optimization techniques:a systematic literature review
7
作者 Hamizan Sharbini Roselina Sallehuddin Habibollah Haron 《Journal of Management Analytics》 EI 2021年第3期443-485,共43页
Crowd evacuation simulation is an essential element when it comes to planning and preparation in evacuation management.This paper presents the survey based on systematic literature review(SLR)technique that aims to id... Crowd evacuation simulation is an essential element when it comes to planning and preparation in evacuation management.This paper presents the survey based on systematic literature review(SLR)technique that aims to identify the crowd evacuation under microscopic model integrated with soft computing technique from previous works.In the review process,renowned databases were searched to retrieve the primary articles and total 38 studies were thoroughly studied.The researcher has identified the potential optimization factors in simulating crowd evacuation and research gaps based on acquired issues,limitation and challenges in this domain.The results of this SLR will serve as a guideline for the researchers that have same interest to develop better and effective crowd evacuation simulation model.The future direction from this SLR also suggests that there is a potential to hybrid the model with softcomputing optimization focusing on latest nature-inspired algorithms in improving the crowd evacuation model. 展开更多
关键词 systematic reviews crowd evacuation model microscopic model soft computing techniques hybrid nature-inspired optimization techniques
原文传递
实验室用数字图像处理进行三维表面轮廓诊断 被引量:1
8
作者 Robert FRISCHER Ondrej KREJCAR +1 位作者 Ali SELAMAT Kamil KUCA 《Journal of Central South University》 SCIE EI CAS CSCD 2020年第3期811-823,共13页
表面质量和轮廓精度的测量难是许多工业行业中存在的主要问题,半成品的表面质量直接影响到后续的生产步骤。虽然有许多方法可以获得所需的数据,但根据问题的复杂性所需要的测量硬件,比如二维或三维扫描仪,都比较昂贵。因此,本文提出一... 表面质量和轮廓精度的测量难是许多工业行业中存在的主要问题,半成品的表面质量直接影响到后续的生产步骤。虽然有许多方法可以获得所需的数据,但根据问题的复杂性所需要的测量硬件,比如二维或三维扫描仪,都比较昂贵。因此,本文提出一种新颖的算法,并在简单的三维扫描仪模型上,以0.1 mm的分辨率的图像处理进行了验证。扫描表面轮廓的方法有很多,但图像处理是目前工业自动化中最热门的课题。最重要的是,为了获得表面图像,使用标准的高分辨率反射相机,以MatLab为软件环境实现后处理。因此,这种解决方案可以替代昂贵的扫描仪,利用单一用途设备的额外功能扩展来实现。 展开更多
关键词 剖面诊断 图像处理 三维曲面 MATLAB 测量
下载PDF
DeepIoT.IDS:Hybrid Deep Learning for Enhancing IoT Network Intrusion Detection 被引量:1
9
作者 Ziadoon K.Maseer Robiah Yusof +3 位作者 Salama A.Mostafa Nazrulazhar Bahaman Omar Musa Bander Ali Saleh Al-rimy 《Computers, Materials & Continua》 SCIE EI 2021年第12期3945-3966,共22页
With an increasing number of services connected to the internet,including cloud computing and Internet of Things(IoT)systems,the prevention of cyberattacks has become more challenging due to the high dimensionality of... With an increasing number of services connected to the internet,including cloud computing and Internet of Things(IoT)systems,the prevention of cyberattacks has become more challenging due to the high dimensionality of the network traffic data and access points.Recently,researchers have suggested deep learning(DL)algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks.However,due to the high dynamics and imbalanced nature of the data,the existing DL classifiers are not completely effective at distinguishing between abnormal and normal behavior line connections for modern networks.Therefore,it is important to design a self-adaptive model for an intrusion detection system(IDS)to improve the detection of attacks.Consequently,in this paper,a novel hybrid weighted deep belief network(HW-DBN)algorithm is proposed for building an efficient and reliable IDS(DeepIoT.IDS)model to detect existing and novel cyberattacks.The HW-DBN algorithm integrates an improved Gaussian–Bernoulli restricted Boltzmann machine(Deep GB-RBM)feature learning operator with a weighted deep neural networks(WDNN)classifier.The CICIDS2017 dataset is selected to evaluate the DeepIoT.IDS model as it contains multiple types of attacks,complex data patterns,noise values,and imbalanced classes.We have compared the performance of the DeepIoT.IDS model with three recent models.The results show the DeepIoT.IDS model outperforms the three other models by achieving a higher detection accuracy of 99.38%and 99.99%for web attack and bot attack scenarios,respectively.Furthermore,it can detect the occurrence of low-frequency attacks that are undetectable by other models. 展开更多
关键词 Cyberattacks internet of things intrusion detection system deep learning neural network supervised and unsupervised deep learning
下载PDF
Improved Test Case Selection Algorithm to Reduce Time in Regression Testing
10
作者 Israr Ghani Wan M.N.Wan-Kadir +1 位作者 Adila Firdaus Arbain Noraini Ibrahim 《Computers, Materials & Continua》 SCIE EI 2022年第7期635-650,共16页
Regression testing(RT)is an essential but an expensive activity in software development.RT confirms that new faults/errors will not have occurred in the modified program.RT efficiency can be improved through an effect... Regression testing(RT)is an essential but an expensive activity in software development.RT confirms that new faults/errors will not have occurred in the modified program.RT efficiency can be improved through an effective technique of selected only modified test cases that appropriate to the modifications within the given time frame.Earlier,several test case selection approaches have been introduced,but either these techniques were not sufficient according to the requirements of software tester experts or they are ineffective and cannot be used for available test suite specifications and architecture.To address these limitations,we recommend an improved and efficient test case selection(TCS)algorithm for RT.Our proposed technique decreases the execution time and redundancy of the duplicate test cases(TC)and detects onlymodified changes that appropriate to themodifications in test cases.To reduce execution time for TCS,evaluation results of our proposed approach are established on fault detection,redundancy and already executed test case.Results indicate that proposed technique decreases the inclusive testing time of TCS to execute modified test cases by,on average related to a method of Hybrid Whale Algorithm(HWOA),which is a progressive TCS approach in regression testing for a single product. 展开更多
关键词 Test case selection regression testing change detection TCS algorithm test suite minimization
下载PDF
COCP:Coupling Parameters Content Placement Strategy for In-Network Caching-Based Content-Centric Networking
11
作者 Salman Rashid Shukor Abd Razak +2 位作者 Fuad A.Ghaleb Faisal Saeed Eman H.Alkhammash 《Computers, Materials & Continua》 SCIE EI 2022年第6期5523-5543,共21页
On-path caching is the prominent module in Content-Centric Networking(CCN),equipped with the capability to handle the demands of future networks such as the Internet of Things(IoT)and vehicular networks.The main focus... On-path caching is the prominent module in Content-Centric Networking(CCN),equipped with the capability to handle the demands of future networks such as the Internet of Things(IoT)and vehicular networks.The main focus of the CCN caching module is data dissemination within the network.Most of the existing strategies of in-network caching in CCN store the content at the maximumnumber of routers along the downloading path.Consequently,content redundancy in the network increases significantly,whereas the cache hit ratio and network performance decrease due to the unnecessary utilization of limited cache storage.Moreover,content redundancy adversely affects the cache resources,hit ratio,latency,bandwidth utilization,and server load.We proposed an in-network caching placement strategy named Coupling Parameters to Optimize Content Placement(COCP)to address the content redundancy and associated problems.The novelty of the technique lies in its capability tominimize content redundancy by creating a balanced cache space along the routing path by considering request rate,distance,and available cache space.The proposed approach minimizes the content redundancy and content dissemination within the network by using appropriate locations while increasing the cache hit ratio and network performance.The COCP is implemented in the simulator(Icarus)to evaluate its performance in terms of the cache hit ratio,path stretch,latency,and link load.Extensive experiments have been conducted to evaluate the proposed COCP strategy.The proposed COCP technique has been compared with the existing state-of-theart techniques,namely,Leave Copy Everywhere(LCE),Leave Copy Down(LCD),ProbCache,Cache Less forMore(CL4M),and opt-Cache.The results obtained with different cache sizes and popularities show that our proposed caching strategy can achieve up to 91.46%more cache hits,19.71%reduced latency,35.43%improved path stretch and 38.14%decreased link load.These results confirm that the proposed COCP strategy has the potential capability to handle the demands of future networks such as the Internet of Things(IoT)and vehicular networks. 展开更多
关键词 Content-centric networking on-path caching content redundancy security PRIVACY data dissemination internet of things
下载PDF
An EFSM-Based Test Data Generation Approach in Model-Based Testing
12
作者 Muhammad Luqman Mohd-Shafie Wan Mohd Nasir Wan Kadir +3 位作者 Muhammad Khatibsyarbini Mohd Adham Isa Israr Ghani Husni Ruslai 《Computers, Materials & Continua》 SCIE EI 2022年第6期4337-4354,共18页
Testing is an integral part of software development.Current fastpaced system developments have rendered traditional testing techniques obsolete.Therefore,automated testing techniques are needed to adapt to such system... Testing is an integral part of software development.Current fastpaced system developments have rendered traditional testing techniques obsolete.Therefore,automated testing techniques are needed to adapt to such system developments speed.Model-based testing(MBT)is a technique that uses system models to generate and execute test cases automatically.It was identified that the test data generation(TDG)in many existing model-based test case generation(MB-TCG)approaches were still manual.An automatic and effective TDG can further reduce testing cost while detecting more faults.This study proposes an automated TDG approach in MB-TCG using the extended finite state machine model(EFSM).The proposed approach integrates MBT with combinatorial testing.The information available in an EFSM model and the boundary value analysis strategy are used to automate the domain input classifications which were done manually by the existing approach.The results showed that the proposed approach was able to detect 6.62 percent more faults than the conventionalMB-TCG but at the same time generated 43 more tests.The proposed approach effectively detects faults,but a further treatment to the generated tests such as test case prioritization should be done to increase the effectiveness and efficiency of testing. 展开更多
关键词 Model-based testing test case generation test data generation combinatorial testing extended finite state machine
下载PDF
Real-Time and Intelligent Flood Forecasting Using UAV-Assisted Wireless Sensor Network
13
作者 Shidrokh Goudarzi Seyed Ahmad Soleymani +6 位作者 Mohammad Hossein Anisi Domenico Ciuonzo Nazri Kama Salwani Abdullah Mohammad Abdollahi Azgomi Zenon Chaczko Azri Azmi 《Computers, Materials & Continua》 SCIE EI 2022年第1期715-738,共24页
The Wireless Sensor Network(WSN)is a promising technology that could be used to monitor rivers’water levels for early warning flood detection in the 5G context.However,during a flood,sensor nodes may be washed up or ... The Wireless Sensor Network(WSN)is a promising technology that could be used to monitor rivers’water levels for early warning flood detection in the 5G context.However,during a flood,sensor nodes may be washed up or become faulty,which seriously affects network connectivity.To address this issue,Unmanned Aerial Vehicles(UAVs)could be integrated with WSN as routers or data mules to provide reliable data collection and flood prediction.In light of this,we propose a fault-tolerant multi-level framework comprised of a WSN and a UAV to monitor river levels.The framework is capable to provide seamless data collection by handling the disconnections caused by the failed nodes during a flood.Besides,an algorithm hybridized with Group Method Data Handling(GMDH)and Particle Swarm Optimization(PSO)is proposed to predict forthcoming floods in an intelligent collaborative environment.The proposed water-level prediction model is trained based on the real dataset obtained fromthe Selangor River inMalaysia.The performance of the work in comparison with other models has been also evaluated and numerical results based on different metrics such as coefficient of determination(R2),correlation coefficient(R),RootMean Square Error(RMSE),Mean Absolute Percentage Error(MAPE),and BIAS are provided. 展开更多
关键词 Unmanned aerial vehicles wireless sensor networks group method data handling particle swarm optimization river flow prediction
下载PDF
IoMT Enabled Melanoma Detection Using Improved Region Growing Lesion Boundary Extraction
14
作者 Tanzila Saba Rabia Javed +2 位作者 Mohd Shafry Mohd Rahim Amjad Rehman Saeed Ali Bahaj 《Computers, Materials & Continua》 SCIE EI 2022年第6期6219-6237,共19页
The Internet ofMedical Things(IoMT)and cloud-based healthcare applications,services are beneficial for better decision-making in recent years.Melanoma is a deadly cancer with a highermortality rate than other skin can... The Internet ofMedical Things(IoMT)and cloud-based healthcare applications,services are beneficial for better decision-making in recent years.Melanoma is a deadly cancer with a highermortality rate than other skin cancer types such as basal cell,squamous cell,andMerkel cell.However,detection and treatment at an early stage can result in a higher chance of survival.The classical methods of detection are expensive and labor-intensive.Also,they rely on a trained practitioner’s level,and the availability of the needed equipment is essential for the early detection of Melanoma.The current improvement in computer-aided systems is providing very encouraging results in terms of precision and effectiveness.In this article,we propose an improved region growing technique for efficient extraction of the lesion boundary.This analysis and detection ofMelanoma are helpful for the expert dermatologist.The CNN features are extracted using the pre-trained VGG-19 deep learning model.In the end,the selected features are classified by SVM.The proposed technique is gauged on openly accessible two datasets ISIC 2017 and PH2.For the evaluation of our proposed framework,qualitative and quantitative experiments are performed.The suggested segmentation method has provided encouraging statistical results of Jaccard index 0.94,accuracy 95.7%on ISIC 2017,and Jaccard index 0.91,accuracy 93.3%on the PH2 dataset.These results are notably better than the results of prevalent methods available on the same datasets.The machine learning SVMclassifier executes significantly well on the suggested feature vector,and the comparative analysis is carried out with existing methods in terms of accuracy.The proposed method detects and classifies melanoma far better than other methods.Besides,our framework gained promising results in both segmentation and classification phases. 展开更多
关键词 Deep features extraction lesion segmentation melanoma detection SVM VGG-19 healthcare IoMT public health
下载PDF
Game Theory-Based IoT Efficient Power Control in Cognitive UAV
15
作者 Fadhil Mukhlif Norafida Ithnin +2 位作者 Omar B.Abdulghafoor Faiz Alotaibi Nourah Saad Alotaibi 《Computers, Materials & Continua》 SCIE EI 2022年第7期1561-1578,共18页
With the help of network densification,network coverage as well as the throughput can be improved via ultra-dense networks(UDNs).In tandem,Unmanned Aerial Vehicle(UAV)communications have recently garnered much attenti... With the help of network densification,network coverage as well as the throughput can be improved via ultra-dense networks(UDNs).In tandem,Unmanned Aerial Vehicle(UAV)communications have recently garnered much attention because of their high agility as well as widespread applications.In this paper,a cognitive UAV is proposed for wireless nodes power pertaining to the IoT ground terminal.Further,the UAV is included in the IoT system as the source of power for the wireless nodes as well as for resource allocation.The quality of service(QoS)related to the cognitive node was considered as a utility function based on pricing scheme that was modelled as a non-cooperative game theory in order to maximise users’net utility function.Moreover,an energy efficiency non-cooperative game theory power allocation with pricing scheme(EE-NGPAP)is proposed to obtain an efficient power control within IoT wireless nodes.Further,uniqueness and existence of the Nash equilibrium have been demonstrated mathematically and through simulation.Simulation results show that the proposed energy harvest algorithm demonstrated considerable decrease in transmitted power consumption in terms of average power reduction,which is regarded to be apt with the 5Gnetworks’vision.Finally,the proposed algorithm requires around 4 iterations only to converge to NE which makes the algorithm more suitable in practical heterogeneous scenarios. 展开更多
关键词 UAV DRONES WSN IOT game theory energy efficiency 5G&B5G networks
下载PDF
Arabic Feature-Based Text Watermarking Technique for Sensitive Detecting Tampering Attack
16
作者 Fahd N.Al-Wesabi Huda G.Iskandar +5 位作者 Saleh Alzahrani Abdelzahir Abdelmaboud Mohammed Abdul Nadhem Nemri Mohammad Medani Mohammed Y.Alghamdi 《Computers, Materials & Continua》 SCIE EI 2021年第9期3789-3806,共18页
In this article,a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet(HFDATAI)is proposed by integrating digital watermarking and hidden Markov model as a strategy for ... In this article,a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet(HFDATAI)is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing.The HFDATAI solution technically integrates and senses the watermark without modifying the original text.The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated,null-watermarking approach to enhance the proposed approach’s efficiency,accuracy,and intensity.The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of the Arabic language.In addition,the features of the interrelationship among text contexts and characteristics of watermark information extraction that is used later validated for detecting any tampering of the Arabic-text attacked.The HFDATAI strategy was introduced based on PHP with included IDE of VS code.Experiments of four separate duration datasets in random sites illustrate the fragility,efficacy,and applicability of HFDATAI by using the three common tampering attacks i.e.,insertion,reorder,and deletion.The HFDATAI was found to be effective,applicable,and very sensitive for detecting any possible tampering on Arabic text. 展开更多
关键词 WATERMARKING soft computing text analysis hidden Markov model content authentication
下载PDF
Artificial Intelligence Based Sentiment Analysis for Health Crisis Management in Smart Cities
17
作者 Anwer Mustafa Hilal Badria Sulaiman Alfurhood +3 位作者 Fahd N.Al-Wesabi Manar Ahmed Hamza Mesfer Al Duhayyim Huda G.Iskandar 《Computers, Materials & Continua》 SCIE EI 2022年第4期143-157,共15页
Smart city promotes the unification of conventional urban infrastructure and information technology (IT) to improve the quality of living andsustainable urban services in the city. To accomplish this, smart cities nec... Smart city promotes the unification of conventional urban infrastructure and information technology (IT) to improve the quality of living andsustainable urban services in the city. To accomplish this, smart cities necessitate collaboration among the public as well as private sectors to install ITplatforms to collect and examine massive quantities of data. At the same time,it is essential to design effective artificial intelligence (AI) based tools to handlehealthcare crisis situations in smart cities. To offer proficient services to peopleduring healthcare crisis time, the authorities need to look closer towardsthem. Sentiment analysis (SA) in social networking can provide valuableinformation regarding public opinion towards government actions. With thismotivation, this paper presents a new AI based SA tool for healthcare crisismanagement (AISA-HCM) in smart cities. The AISA-HCM technique aimsto determine the emotions of the people during the healthcare crisis time, suchas COVID-19. The proposed AISA-HCM technique involves distinct operations such as pre-processing, feature extraction, and classification. Besides,brain storm optimization (BSO) with deep belief network (DBN), called BSODBN model is employed for feature extraction. Moreover, beetle antennasearch with extreme learning machine (BAS-ELM) method was utilized forclassifying the sentiments as to various classes. The use of BSO and BASalgorithms helps to effectively modify the parameters involved in the DBNand ELM models respectively. The performance validation of the AISA-HCMtechnique takes place using Twitter data and the outcomes are examinedwith respect to various measures. The experimental outcomes highlighted theenhanced performance of the AISA-HCM technique over the recent state ofart SA approaches with the maximum precision of 0.89, recall of 0.88, Fmeasure of 0.89, and accuracy of 0.94. 展开更多
关键词 Smart city sentiment analysis artificial intelligence healthcare management metaheuristics deep learning parameter tuning
下载PDF
Social Media and Stock Market Prediction: A Big Data Approach
18
作者 Mazhar Javed Awan Mohd Shafry Mohd Rahim +3 位作者 Haitham Nobanee Ashna Munawar Awais Yasin Azlan Mohd Zain Azlanmz 《Computers, Materials & Continua》 SCIE EI 2021年第5期2569-2583,共15页
Big data is the collection of large datasets from traditional and digital sources to identify trends and patterns.The quantity and variety of computer data are growing exponentially for many reasons.For example,retail... Big data is the collection of large datasets from traditional and digital sources to identify trends and patterns.The quantity and variety of computer data are growing exponentially for many reasons.For example,retailers are building vast databases of customer sales activity.Organizations are working on logistics financial services,and public social media are sharing a vast quantity of sentiments related to sales price and products.Challenges of big data include volume and variety in both structured and unstructured data.In this paper,we implemented several machine learning models through Spark MLlib using PySpark,which is scalable,fast,easily integrated with other tools,and has better performance than the traditional models.We studied the stocks of 10 top companies,whose data include historical stock prices,with MLlib models such as linear regression,generalized linear regression,random forest,and decision tree.We implemented naive Bayes and logistic regression classification models.Experimental results suggest that linear regression,random forest,and generalized linear regression provide an accuracy of 80%-98%.The experimental results of the decision tree did not well predict share price movements in the stock market. 展开更多
关键词 Big data ANALYTICS artificial intelligence machine learning stock market social media business analytics
下载PDF
Two-sided regularization model based on probabilistic matrix factorization and quantum similarity for recommender systems 被引量:1
19
作者 Waleed Reafee Marwa Alhazmi Naomie Salim 《International Journal of Modeling, Simulation, and Scientific Computing》 EI 2020年第6期129-160,共32页
Nowadays,with the advent of the age of Web 2.0,several social recommendation methods that use social network information have been proposed and achieved distinct developments.However,the most critical challenges for ... Nowadays,with the advent of the age of Web 2.0,several social recommendation methods that use social network information have been proposed and achieved distinct developments.However,the most critical challenges for the existing majority of these methods are:(1)They tend to utilize only the available social relation between users and deal just with the cold-start user issue.(2)Besides,these methods are suffering from the lack of exploitation of content information such as social tagging,which can provide various sources to extract the item information to overcome the cold-start item and improve the recommendation quality.In this paper,we investigated the efficiency of data fusion by integrating multi-source of information.First,two essential factors,user-side information,and item-side information,are identified.Second,we developed a novel social recommendation model called Two-Sided Regularization(TSR),which is based on the probabilistic matrix factorization method.Finally,the effective quantum-based similarity method is adapted to measure the similarity between users and between items into the proposed model.Experimental results on the real dataset show that our proposed model TSR addresses both of cold-start user and item issues and outperforms state-ofthe-art recommendation methods.These results indicate the importance of incorporating various sources of information in the recommendation process. 展开更多
关键词 Social recommendation explicit friendship implicit friendship correlated items quantum mechanics
原文传递
Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices
20
作者 Shafi Ullah Raja Zahilah 《Cybersecurity》 EI CSCD 2021年第1期147-159,共13页
Robust encryption techniques require heavy computational capability and consume large amount of memory which are unaffordable for resource constrained IoT devices and Cyber-Physical Systems with an inclusion of genera... Robust encryption techniques require heavy computational capability and consume large amount of memory which are unaffordable for resource constrained IoT devices and Cyber-Physical Systems with an inclusion of general-purpose data manipulation tasks.Many encryption techniques have been introduced to address the inability of such devices,lacking in robust security provision at low cost.This article presents an encryption technique,implemented on a resource constrained IoT device(AVR ATmega2560)through utilizing fast execution and less memory consumption properties of curve25519 in a novel and efficient lightweight hash function.The hash function utilizes GMP library for multi-precision arithmetic calculations and pre-calculated curve points to devise a good cipher block using ECDH based key exchange protocols and large random prime number generator function. 展开更多
关键词 Cyber-physical systems IOT Resource constrained IoT devices Lightweight encryption End-to-end encryption Elliptic curve cryptography Curve25519
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部