期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
Aspect Level Songs Rating Based Upon Reviews in English
1
作者 Muhammad Aasim Qureshi Muhammad Asif +4 位作者 Saira Anwar Umar Shaukat Atta-ur-Rahman Muhammad Adnan Khan amir mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2589-2605,共17页
With the advancements in internet facilities,people are more inclined towards the use of online services.The service providers shelve their items for e-users.These users post their feedbacks,reviews,ratings,etc.after ... With the advancements in internet facilities,people are more inclined towards the use of online services.The service providers shelve their items for e-users.These users post their feedbacks,reviews,ratings,etc.after the use of the item.The enormous increase in these reviews has raised the need for an automated system to analyze these reviews to rate these items.Sentiment Analysis(SA)is a technique that performs such decision analysis.This research targets the ranking and rating through sentiment analysis of these reviews,on different aspects.As a case study,Songs are opted to design and test the decision model.Different aspects of songs namely music,lyrics,song,voice and video are picked.For the reason,reviews of 20 songs are scraped from YouTube,pre-processed and formed a dataset.Different machine learning algorithms—Naïve Bayes(NB),Gradient Boost Tree,Logistic Regression LR,K-Nearest Neighbors(KNN)and Artificial Neural Network(ANN)are applied.ANN performed the best with 74.99%accuracy.Results are validated using K-Fold. 展开更多
关键词 Machine learning natural language processing songs reviews:sentiment analysis songs rating aspect level sentiment analysis reviews analysis text classification MUSIC
下载PDF
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
2
作者 Muhammad Nadeem Ali Arshad +3 位作者 Saman Riaz Syeda Wajiha Zahra Shahab SBand amir mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2625-2640,共16页
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud serv... Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the inside.There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks.Still,the attackers have designed even better mechanisms to break these security algorithms.Cloud cryptography is the best data protection algorithm that exchanges data between authentic users.In this article,one symmetric cryptography algorithm will be designed to secure cloud server data,used to send and receive cloud server data securely.A double encryption algorithm will be implemented to send data in a secure format.First,the XOR function will be applied to plain text,and then salt technique will be used.Finally,a reversing mechanism will be implemented on that data to provide more data security.To decrypt data,the cipher text will be reversed,salt will be removed,andXORwill be implemented.At the end of the paper,the proposed algorithm will be compared with other algorithms,and it will conclude how much better the existing algorithm is than other algorithms. 展开更多
关键词 CRYPTOGRAPHY symmetric algorithm ENCRYPTION DECRYPTION cipher text cloud security asymmetric algorithm
下载PDF
Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN
3
作者 Muhammad Nadeem Ali Arshad +4 位作者 Saman Riaz SyedaWajiha Zahra Muhammad Rashid Shahab S.Band amir mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2641-2659,共19页
Cloud computing is one of the most attractive and cost-saving models,which provides online services to end-users.Cloud computing allows the user to access data directly from any node.But nowadays,cloud security is one... Cloud computing is one of the most attractive and cost-saving models,which provides online services to end-users.Cloud computing allows the user to access data directly from any node.But nowadays,cloud security is one of the biggest issues that arise.Different types of malware are wreaking havoc on the clouds.Attacks on the cloud server are happening from both internal and external sides.This paper has developed a tool to prevent the cloud server from spamming attacks.When an attacker attempts to use different spamming techniques on a cloud server,the attacker will be intercepted through two effective techniques:Cloudflare and K-nearest neighbors(KNN)classification.Cloudflare will block those IP addresses that the attacker will use and prevent spamming attacks.However,the KNN classifiers will determine which area the spammer belongs to.At the end of the article,various prevention techniques for securing cloud servers will be discussed,a comparison will be made with different papers,a conclusion will be drawn based on different results. 展开更多
关键词 Intrusion prevention system SPAMMING KNN classification SPAM cyber security BOTNET
下载PDF
Deep Bimodal Fusion Approach for Apparent Personality Analysis
4
作者 Saman Riaz Ali Arshad +1 位作者 Shahab S.Band amir mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第4期2301-2312,共12页
Personality distinguishes individuals’ patterns of feeling, thinking,and behaving. Predicting personality from small video series is an excitingresearch area in computer vision. The majority of the existing research ... Personality distinguishes individuals’ patterns of feeling, thinking,and behaving. Predicting personality from small video series is an excitingresearch area in computer vision. The majority of the existing research concludespreliminary results to get immense knowledge from visual and Audio(sound) modality. To overcome the deficiency, we proposed the Deep BimodalFusion (DBF) approach to predict five traits of personality-agreeableness,extraversion, openness, conscientiousness and neuroticism. In the proposedframework, regarding visual modality, the modified convolution neural networks(CNN), more specifically Descriptor Aggregator Model (DAN) areused to attain significant visual modality. The proposed model extracts audiorepresentations for greater efficiency to construct the long short-termmemory(LSTM) for the audio modality. Moreover, employing modality-based neuralnetworks allows this framework to independently determine the traits beforecombining them with weighted fusion to achieve a conclusive prediction of thegiven traits. The proposed approach attains the optimal mean accuracy score,which is 0.9183. It is achieved based on the average of five personality traitsand is thus better than previously proposed frameworks. 展开更多
关键词 Apparent personality analysis deep bimodal fusion convolutional neural network long short-term memory bimodal information fusion approach
下载PDF
Automated File Labeling for Heterogeneous Files Organization Using Machine Learning
5
作者 Sagheer Abbas Syed Ali Raza +4 位作者 MAKhan Muhammad Adnan Khan Atta-ur-Rahman Kiran Sultan amir mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期3263-3278,共16页
File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most ... File labeling techniques have a long history in analyzing the anthological trends in computational linguistics.The situation becomes worse in the case of files downloaded into systems from the Internet.Currently,most users either have to change file names manually or leave a meaningless name of the files,which increases the time to search required files and results in redundancy and duplications of user files.Currently,no significant work is done on automated file labeling during the organization of heterogeneous user files.A few attempts have been made in topic modeling.However,one major drawback of current topic modeling approaches is better results.They rely on specific language types and domain similarity of the data.In this research,machine learning approaches have been employed to analyze and extract the information from heterogeneous corpus.A different file labeling technique has also been used to get the meaningful and`cohesive topic of the files.The results show that the proposed methodology can generate relevant and context-sensitive names for heterogeneous data files and provide additional insight into automated file labeling in operating systems. 展开更多
关键词 Automated file labeling file organization machine learning topic modeling
下载PDF
A Fused Machine Learning Approach for Intrusion Detection System
6
作者 Muhammad Sajid Farooq Sagheer Abbas +3 位作者 Atta-ur-Rahman Kiran Sultan Muhammad Adnan Khan amir mosavi 《Computers, Materials & Continua》 SCIE EI 2023年第2期2607-2623,共17页
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of internet.The interconnectivity of networks has brought various complexities in maintaining network... The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of internet.The interconnectivity of networks has brought various complexities in maintaining network availability,consistency,and discretion.Machine learning based intrusion detection systems have become essential to monitor network traffic for malicious and illicit activities.An intrusion detection system controls the flow of network traffic with the help of computer systems.Various deep learning algorithms in intrusion detection systems have played a prominent role in identifying and analyzing intrusions in network traffic.For this purpose,when the network traffic encounters known or unknown intrusions in the network,a machine-learning framework is needed to identify and/or verify network intrusion.The Intrusion detection scheme empowered with a fused machine learning technique(IDS-FMLT)is proposed to detect intrusion in a heterogeneous network that consists of different source networks and to protect the network from malicious attacks.The proposed IDS-FMLT system model obtained 95.18%validation accuracy and a 4.82%miss rate in intrusion detection. 展开更多
关键词 Fused machine learning heterogeneous network intrusion detection
下载PDF
Applying ANN,ANFIS and LSSVM Models for Estimation of Acid Solvent Solubility in Supercritical CO_(2) 被引量:1
7
作者 Amin Bemani Alireza Baghban +3 位作者 Shahaboddin Shamshirband amir mosavi Peter Csiba Annamaria R.Varkonyi-Koczy 《Computers, Materials & Continua》 SCIE EI 2020年第6期1175-1204,共30页
In the present work,a novel machine learning computational investigation is carried out to accurately predict the solubility of different acids in supercritical carbon dioxide.Four different machine learning algorithm... In the present work,a novel machine learning computational investigation is carried out to accurately predict the solubility of different acids in supercritical carbon dioxide.Four different machine learning algorithms of radial basis function,multi-layer perceptron(MLP),artificial neural networks(ANN),least squares support vector machine(LSSVM)and adaptive neuro-fuzzy inference system(ANFIS)are used to model the solubility of different acids in carbon dioxide based on the temperature,pressure,hydrogen number,carbon number,molecular weight,and the dissociation constant of acid.To evaluate the proposed models,different graphical and statistical analyses,along with novel sensitivity analysis,are carried out.The present study proposes an efficient tool for acid solubility estimation in supercritical carbon dioxide,which can be highly beneficial for engineers and chemists to predict operational conditions in industries. 展开更多
关键词 Supercritical carbon dioxide machine learning ACID artificial intelligence SOLUBILITY artificial neural networks(ANN) adaptive neuro-fuzzy inference system(ANFIS) least-squares support vector machine(LSSVM) multilayer perceptron(MLP)
下载PDF
Optimization Algorithm for Reduction the Size of Dixon Resultant Matrix:A Case Study on Mechanical Application 被引量:1
8
作者 Shang Zhang Seyedmehdi Karimi +1 位作者 Shahaboddin Shamshirband amir mosavi 《Computers, Materials & Continua》 SCIE EI 2019年第2期567-583,共17页
In the process of eliminating variables in a symbolic polynomial system,the extraneous factors are referred to the unwanted parameters of resulting polynomial.This paper aims at reducing the number of these factors vi... In the process of eliminating variables in a symbolic polynomial system,the extraneous factors are referred to the unwanted parameters of resulting polynomial.This paper aims at reducing the number of these factors via optimizing the size of Dixon matrix.An optimal configuration of Dixon matrix would lead to the enhancement of the process of computing the resultant which uses for solving polynomial systems.To do so,an optimization algorithm along with a number of new polynomials is introduced to replace the polynomials and implement a complexity analysis.Moreover,the monomial multipliers are optimally positioned to multiply each of the polynomials.Furthermore,through practical implementation and considering standard and mechanical examples the efficiency of the method is evaluated. 展开更多
关键词 Dixon resultant matrix symbolic polynomial system elimination theory optimization algorithm computational complexity
下载PDF
Biodegradation of Medicinal Plants Waste in an Anaerobic Digestion Reactor for Biogas Production 被引量:1
9
作者 Kabir Fardad Bahman Najafi +3 位作者 Sina Faizollahzadeh Ardabili amir mosavi Shahaboddin Shamshirband Timon Rabczuk 《Computers, Materials & Continua》 SCIE EI 2018年第6期381-392,共12页
Glycyrrhiza glabra,Mint,Cuminum cyminum,Lavender and Arctium medicinal are considered as edible plants with therapeutic properties and as medicinal plants in Iran.After extraction process of medicinal plants,residual ... Glycyrrhiza glabra,Mint,Cuminum cyminum,Lavender and Arctium medicinal are considered as edible plants with therapeutic properties and as medicinal plants in Iran.After extraction process of medicinal plants,residual wastes are not suitable for animal feed and are considered as waste and as an environmental threat.At present there is no proper management of waste of these plants and they are burned or buried.The present study discusses the possibility of biogas production from Glycyrrhiza Glabra Waste(GGW),Mentha Waste(MW),Cuminum Cyminum Waste(CCW),Lavender Waste(LW)and Arctium Waste(AW).250 g of these plants with TS of 10%were digested in the batch type reactors at the temperature of 35℃.The highest biogas production rate were observed to be 13611 mL and 13471 mL for CCW and GGW(10%TS),respectively.While the maximum methane was related to GGW with a value of 9041 mL(10%TS).The highest specific biogas and methane production were related to CCW with value of 247.4 mL.(g.VS)-1 and 65.1 mL.(g.VS)-1,respectively.As an important result,it was obvious that in lignocellulose materials,it cannot be concluded that the materials with similar ratio of C/N has the similar digestion and biogas production ability. 展开更多
关键词 BIOGAS environmental threat lignocellulose substances medicinal plants residual wastes
下载PDF
Reactive Search Optimization;Application to Multiobjective Optimization Problems 被引量:1
10
作者 amir mosavi Atieh Vaezipour 《Applied Mathematics》 2012年第10期1572-1582,共11页
During the last few years we have witnessed impressive developments in the area of stochastic local search techniques for intelligent optimization and Reactive Search Optimization. In order to handle the complexity, i... During the last few years we have witnessed impressive developments in the area of stochastic local search techniques for intelligent optimization and Reactive Search Optimization. In order to handle the complexity, in the framework of stochastic local search optimization, learning and optimization has been deeply interconnected through interaction with the decision maker via the visualization approach of the online graphs. Consequently a number of complex optimization problems, in particular multiobjective optimization problems, arising in widely different contexts have been effectively treated within the general framework of RSO. In solving real-life multiobjective optimization problems often most emphasis are spent on finding the complete Pareto-optimal set and less on decision-making. However the com-plete task of multiobjective optimization is considered as a combined task of optimization and decision-making. In this paper, we suggest an interactive procedure which will involve the decision-maker in the optimization process helping to choose a single solution at the end. Our proposed method works on the basis of Reactive Search Optimization (RSO) algorithms and available software architecture packages. The procedure is further compared with the excising novel method of Interactive Multiobjective Optimization and Decision-Making, using Evolutionary method (I-MODE). In order to evaluate the effectiveness of both methods the well-known study case of welded beam design problem is reconsidered. 展开更多
关键词 Stochastic Local Search Real-Life Application Multi Criteria Decision Making Multiobjective Optimization Reactive Search Optimization
下载PDF
Transforming Hand Drawn Wireframes into Front-End Code with Deep Learning
11
作者 Saman Riaz Ali Arshad +1 位作者 Shahab S.Band amir mosavi 《Computers, Materials & Continua》 SCIE EI 2022年第9期4303-4321,共19页
The way towards generating a website front end involves a designersettling on an idea for what kind of layout they want the website to have, thenproceeding to plan and implement each aspect one by one until they havec... The way towards generating a website front end involves a designersettling on an idea for what kind of layout they want the website to have, thenproceeding to plan and implement each aspect one by one until they haveconverted what they initially laid out into its Html front end form, this processcan take a considerable time, especially considering the first draft of the designis traditionally never the final one. This process can take up a large amountof resource real estate, and as we have laid out in this paper, by using a Modelconsisting of various Neural Networks trained on a custom dataset. It can beautomated into assisting designers, allowing them to focus on the other morecomplicated parts of the system they are designing by quickly generating whatwould rather be straightforward busywork. Over the past 20 years, the boomin how much the internet is used and the sheer volume of pages on it demands ahigh level of work and time to create them. For the efficiency of the process, weproposed a multi-model-based architecture on image captioning, consisting ofConvolutional neural network (CNN) and Long short-term memory (LSTM)models. Our proposed approach trained on our custom-made database can beautomated into assisting designers, allowing them to focus on the other morecomplicated part of the system. We trained our model in several batches overa custom-made dataset consisting of over 6300 files and were finally able toachieve a Bilingual Evaluation Understudy (BLEU) score for a batch of 50hand-drawn images at 87.86%. 展开更多
关键词 Deep learning wireframes FRONT-END low fidelity high fidelity design process HTML computer vision DSL
下载PDF
A Mobile Cloud-Based eHealth Scheme
12
作者 Yihe Liu Aaqif Afzaal Abbasi +4 位作者 Atefeh Aghaei Almas Abbasi amir mosavi Shahaboddin Shamshirband Mohammed A.A.Al-qaness 《Computers, Materials & Continua》 SCIE EI 2020年第4期31-39,共9页
Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid pace.Similarly,the field of health informatics is also considered as an extremely important field.This work observes the... Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid pace.Similarly,the field of health informatics is also considered as an extremely important field.This work observes the collaboration between these two fields to solve the traditional problem of extracting Electrocardiogram signals from trace reports and then performing analysis.The developed system has two front ends,the first dedicated for the user to perform the photographing of the trace report.Once the photographing is complete,mobile computing is used to extract the signal.Once the signal is extracted,it is uploaded into the server and further analysis is performed on the signal in the cloud.Once this is done,the second interface,intended for the use of the physician,can download and view the trace from the cloud.The data is securely held using a password-based authentication method.The system presented here is one of the first attempts at delivering the total solution,and after further upgrades,it will be possible to deploy the system in a commercial setting. 展开更多
关键词 Cloud computing ELECTROCARDIOGRAMS HEALTH-CARE signal analysis signal processing
下载PDF
Performance Evaluation of Supervised Machine Learning Techniques for Efficient Detection of Emotions from Online Content
13
作者 Muhammad Zubair Asghar Fazli Subhan +6 位作者 Muhammad Imran Fazal Masud Kundi Adil Khan Shahboddin Shamshirband amir mosavi Peter Csiba Annamaria RVarkonyi Koczy 《Computers, Materials & Continua》 SCIE EI 2020年第6期1093-1118,共26页
Emotion detection from the text is a challenging problem in the text analytics.The opinion mining experts are focusing on the development of emotion detection applications as they have received considerable attention ... Emotion detection from the text is a challenging problem in the text analytics.The opinion mining experts are focusing on the development of emotion detection applications as they have received considerable attention of online community including users and business organization for collecting and interpreting public emotions.However,most of the existing works on emotion detection used less efficient machine learning classifiers with limited datasets,resulting in performance degradation.To overcome this issue,this work aims at the evaluation of the performance of different machine learning classifiers on a benchmark emotion dataset.The experimental results show the performance of different machine learning classifiers in terms of different evaluation metrics like precision,recall ad f-measure.Finally,a classifier with the best performance is recommended for the emotion classification. 展开更多
关键词 Emotion classification machine learning classifiers ISEAR dataset performance evaluation
下载PDF
Particle swarm optimization model to predict scour depth around a bridge pier
14
作者 Shahaboddin SHAMSHIRBAND amir mosavi Timon RABCZUK 《Frontiers of Structural and Civil Engineering》 SCIE EI CSCD 2020年第4期855-866,共12页
Scour depth around bridge piers plays a vital role in the safety and stability of the bridges.The former approaches used in the prediction of scour depth are based on regression models or black box models in which the... Scour depth around bridge piers plays a vital role in the safety and stability of the bridges.The former approaches used in the prediction of scour depth are based on regression models or black box models in which the first one lacks enough accuracy while the later one does not provide a clear mathematical expression to easily employ it for other situations or cases.Therefore,this paper aims to develop new equations using particle swarm optimization as a metaheuristic approach to predict scour depth around bridge piers.To improve the efficiency of the proposed model,individual equations are derived for laboratory and field data.Moreover,sensitivity analysis is conducted to achieve the most effective parameters in the estimation of scour depth for both experimental and filed data sets.Comparing the results of the proposed model with those of existing regression-based equations reveal the superiority of the proposed method in terms of accuracy and uncertainty.Moreover,the ratio of pier width to flow depth and ratio of d50 (mean particle diameter)to flow depth for the laboratory and field data were recognized as the most effective parameters,respectively.The derived equations can be used as a suitable proxy to estimate scour depth in both experimental and prototype scales. 展开更多
关键词 scour depth bridge design and construction particle swarm optimization computational mechanics artificial intelligence bridge pier
原文传递
Shear stress distribution prediction in symmetric compound channels using data mining and machine learning models
15
作者 Zohreh SHEIKH KHOZANI Khabat KHOSRAVI +3 位作者 Mohammadamin TORABI amir mosavi Bahram REZAEI Timon RABCZUK 《Frontiers of Structural and Civil Engineering》 SCIE EI CSCD 2020年第5期1097-1109,共13页
Shear stress distribution prediction in open channels is of utmost importance in hydraulic structural engineering as it directly affects the design of stable channels.In this study,at first,a series of experimental te... Shear stress distribution prediction in open channels is of utmost importance in hydraulic structural engineering as it directly affects the design of stable channels.In this study,at first,a series of experimental tests were conducted to assess the shear stress distribution in prismatic compound channels.The shear stress values around the whole wetted perimeter were measured in the compound channel with different floodplain widths also in different flow depths in subcritical and supercritical conditions.A set of,data mining and machine learning algorithms including Random Forest(RF),M5P,Random Committee,KStar and Additive Regression implemented on attained data to predict the shear stress distribution in the compound channel.Results indicated among these five models;RF method indicated the most precise results with the highest R2 value of 0.9.Finally,the most powerful data mining method which studied in this research compared with two well-known analytical models of Shiono and Knight method(SKM)and Shannon method to acquire the proposed model functioning in predicting the shear stress distribution.The results showed that the RF model has the best prediction performance compared to SKM and Shannon models. 展开更多
关键词 compound channel machine learning SKM model shear stress distribution data mining models
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部