期刊文献+
共找到31篇文章
< 1 2 >
每页显示 20 50 100
Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets 被引量:1
1
作者 doaa sami khafaga El-Sayed M.El-kenawy +4 位作者 Faten Khalid Karim Mostafa Abotaleb Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh 《Computers, Materials & Continua》 SCIE EI 2023年第2期4531-4545,共15页
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine learning.Each feature in a dataset has 2n possible subsets,making it challenging to select the optimum collectio... Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine learning.Each feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of features using typical methods.As a result,a new metaheuristicsbased feature selection method based on the dipper-throated and grey-wolf optimization(DTO-GW)algorithms has been developed in this research.Instability can result when the selection of features is subject to metaheuristics,which can lead to a wide range of results.Thus,we adopted hybrid optimization in our method of optimizing,which allowed us to better balance exploration and harvesting chores more equitably.We propose utilizing the binary DTO-GW search approach we previously devised for selecting the optimal subset of attributes.In the proposed method,the number of features selected is minimized,while classification accuracy is increased.To test the proposed method’s performance against eleven other state-of-theart approaches,eight datasets from the UCI repository were used,such as binary grey wolf search(bGWO),binary hybrid grey wolf,and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hysteresis optimization(bHy),and binary hysteresis optimization(bHWO).The suggested method is superior 4532 CMC,2023,vol.74,no.2 and successful in handling the problem of feature selection,according to the results of the experiments. 展开更多
关键词 Metaheuristics dipper throated optimization grey wolf optimization binary optimizer feature selection
下载PDF
Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems
2
作者 Reem Alkanhel doaa sami khafaga +5 位作者 El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Rashid Amin Mostafa Abotaleb B.M.El-den 《Computers, Materials & Continua》 SCIE EI 2023年第2期2695-2709,共15页
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices remotely.Due to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy... The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices remotely.Due to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)networks may be vulnerable to several routing attacks.That’s why a network intrusion detection system(NIDS)is needed to guard against routing assaults on RPL-based IoT networks.The imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network attacks.Therefore,we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique(LSH-SMOTE).The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization algorithms.To prove the effectiveness of the proposed approach,a set of experiments were conducted to evaluate the performance of NIDS for three cases,namely,detection without dataset balancing,detection with SMOTE balancing,and detection with the proposed optimized LSHSOMTE balancing.Experimental results showed that the proposed approach outperforms the other approaches and could boost the detection accuracy.In addition,a statistical analysis is performed to study the significance and stability of the proposed approach.The conducted experiments include seven different types of attack cases in the RPL-NIDS17 dataset.Based on the 2696 CMC,2023,vol.74,no.2 proposed approach,the achieved accuracy is(98.1%),sensitivity is(97.8%),and specificity is(98.8%). 展开更多
关键词 Metaheuristics grey wolf optimization dipper throated optimization dataset balancing locality sensitive hashing SMOTE
下载PDF
Fast and Accurate Detection of Masked Faces Using CNNs and LBPs
3
作者 Sarah M.Alhammad doaa sami khafaga +3 位作者 Aya Y.Hamed Osama El-Koumy Ehab R.Mohamed Khalid M.Hosny 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2939-2952,共14页
Face mask detection has several applications,including real-time surveillance,biometrics,etc.Identifying face masks is also helpful for crowd control and ensuring people wear them publicly.With monitoring personnel,it... Face mask detection has several applications,including real-time surveillance,biometrics,etc.Identifying face masks is also helpful for crowd control and ensuring people wear them publicly.With monitoring personnel,it is impossible to ensure that people wear face masks;automated systems are a much superior option for face mask detection and monitoring.This paper introduces a simple and efficient approach for masked face detection.The architecture of the proposed approach is very straightforward;it combines deep learning and local binary patterns to extract features and classify themasmasked or unmasked.The proposed systemrequires hardware withminimal power consumption compared to state-of-the-art deep learning algorithms.Our proposed system maintains two steps.At first,this work extracted the local features of an image by using a local binary pattern descriptor,and then we used deep learning to extract global features.The proposed approach has achieved excellent accuracy and high performance.The performance of the proposed method was tested on three benchmark datasets:the realworld masked faces dataset(RMFD),the simulated masked faces dataset(SMFD),and labeled faces in the wild(LFW).Performancemetrics for the proposed technique weremeasured in terms of accuracy,precision,recall,and F1-score.Results indicated the efficiency of the proposed technique,providing accuracies of 99.86%,99.98%,and 100%for RMFD,SMFD,and LFW,respectively.Moreover,the proposed method outperformed state-of-the-art deep learning methods in the recent bibliography for the same problem under study and on the same evaluation datasets. 展开更多
关键词 Convolutional neural networks face mask detection local binary patterns deep learning computer vision social protection Keras OpenCV TensorFlow Viola-Jones
下载PDF
Facial Expression Recognition Model Depending on Optimized Support Vector Machine
4
作者 Amel Ali Alhussan Fatma M.Talaat +4 位作者 El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim doaa sami khafaga Mona Alnaggar 《Computers, Materials & Continua》 SCIE EI 2023年第7期499-515,共17页
In computer vision,emotion recognition using facial expression images is considered an important research issue.Deep learning advances in recent years have aided in attaining improved results in this issue.According t... In computer vision,emotion recognition using facial expression images is considered an important research issue.Deep learning advances in recent years have aided in attaining improved results in this issue.According to recent studies,multiple facial expressions may be included in facial photographs representing a particular type of emotion.It is feasible and useful to convert face photos into collections of visual words and carry out global expression recognition.The main contribution of this paper is to propose a facial expression recognitionmodel(FERM)depending on an optimized Support Vector Machine(SVM).To test the performance of the proposed model(FERM),AffectNet is used.AffectNet uses 1250 emotion-related keywords in six different languages to search three major search engines and get over 1,000,000 facial photos online.The FERM is composed of three main phases:(i)the Data preparation phase,(ii)Applying grid search for optimization,and(iii)the categorization phase.Linear discriminant analysis(LDA)is used to categorize the data into eight labels(neutral,happy,sad,surprised,fear,disgust,angry,and contempt).Due to using LDA,the performance of categorization via SVM has been obviously enhanced.Grid search is used to find the optimal values for hyperparameters of SVM(C and gamma).The proposed optimized SVM algorithm has achieved an accuracy of 99%and a 98%F1 score. 展开更多
关键词 Facial expression recognition machine learning linear dis-criminant analysis(LDA) support vector machine(SVM) grid search
下载PDF
A Lightweight Deep Learning-Based Model for Tomato Leaf Disease Classification
5
作者 Naeem Ullah Javed Ali Khan +4 位作者 Sultan Almakdi Mohammed S.Alshehri Mimonah Al Qathrady Eman Abdullah Aldakheel doaa sami khafaga 《Computers, Materials & Continua》 SCIE EI 2023年第12期3969-3992,共24页
Tomato leaf diseases significantly impact crop production,necessitating early detection for sustainable farming.Deep Learning(DL)has recently shown excellent results in identifying and classifying tomato leaf diseases... Tomato leaf diseases significantly impact crop production,necessitating early detection for sustainable farming.Deep Learning(DL)has recently shown excellent results in identifying and classifying tomato leaf diseases.However,current DL methods often require substantial computational resources,hindering their application on resource-constrained devices.We propose the Deep Tomato Detection Network(DTomatoDNet),a lightweight DL-based framework comprising 19 learnable layers for efficient tomato leaf disease classification to overcome this.The Convn kernels used in the proposed(DTomatoDNet)framework is 1×1,which reduces the number of parameters and helps in more detailed and descriptive feature extraction for classification.The proposed DTomatoDNet model is trained from scratch to determine the classification success rate.10,000 tomato leaf images(1000 images per class)from the publicly accessible dataset,covering one healthy category and nine disease categories,are utilized in training the proposed DTomatoDNet approach.More specifically,we classified tomato leaf images into Target Spot(TS),Early Blight(EB),Late Blight(LB),Bacterial Spot(BS),Leaf Mold(LM),Tomato Yellow Leaf Curl Virus(YLCV),Septoria Leaf Spot(SLS),Spider Mites(SM),Tomato Mosaic Virus(MV),and Tomato Healthy(H).The proposed DTomatoDNet approach obtains a classification accuracy of 99.34%,demonstrating excellent accuracy in differentiating between tomato diseases.The model could be used on mobile platforms because it is lightweight and designed with fewer layers.Tomato farmers can utilize the proposed DTomatoDNet methodology to detect disease more quickly and easily once it has been integrated into mobile platforms by developing a mobile application. 展开更多
关键词 CNN deep learning DTomatoDNet tomato leaf disease classification smart agriculture
下载PDF
Optical Neural Networks:Analysis and Prospects for 5G Applications
6
作者 doaa sami khafaga Zongming Lv +2 位作者 Imran Khan Shebnam M.Sefat Amel Ali Alhussan 《Computers, Materials & Continua》 SCIE EI 2023年第12期3723-3740,共18页
With the capacities of self-learning,acquainted capacities,high-speed looking for ideal arrangements,solid nonlin-ear fitting,and mapping self-assertively complex nonlinear relations,neural systems have made incredibl... With the capacities of self-learning,acquainted capacities,high-speed looking for ideal arrangements,solid nonlin-ear fitting,and mapping self-assertively complex nonlinear relations,neural systems have made incredible advances and accomplished broad application over the final half-century.As one of the foremost conspicuous methods for fake insights,neural systems are growing toward high computational speed and moo control utilization.Due to the inborn impediments of electronic gadgets,it may be troublesome for electronic-implemented neural systems to make the strides these two exhibitions encourage.Optical neural systems can combine optoelectronic procedures and neural organization models to provide ways to break the bottleneck.This paper outlines optical neural networks of feedforward repetitive and spiking models to give a clearer picture of history,wildernesses,and future optical neural systems.The framework demonstrates neural systems in optic communication with the serial and parallel setup.The graphene-based laser structure for fiber optic communication is discussed.The comparison of different balance plans for photonic neural systems is made within the setting of hereditary calculation and molecule swarm optimization.In expansion,the execution comparison of routine photonic neural,time-domain with and without extending commotion is additionally expounded.The challenges and future patterns of optical neural systems on the growing scale and applications of in situ preparing nonlinear computing will hence be uncovered. 展开更多
关键词 OPTOELECTRONICS 5G networks free-space optical TRANSDUCER neural networks
下载PDF
Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection
7
作者 doaa sami khafaga Faten Khalid Karim +5 位作者 Abdelaziz A.Abdelhamid El-Sayed M.El-kenawy Hend K.Alkahtani Nima Khodadadi Mohammed Hadwan Abdelhameed Ibrahim 《Computers, Materials & Continua》 SCIE EI 2023年第2期3183-3198,共16页
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human life.Open attacks and unauthorized access are possible with these IoT devices,which exchange ... Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human life.Open attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote access.These attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are subpar.This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization.The employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA optimizer.The proposed voting classifier categorizes the network intrusions robustly and efficiently.To assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack categorization.The dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and significance.The achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection. 展开更多
关键词 Voting classifier whale optimization algorithm dipper throated optimization intrusion detection internet-of-things
下载PDF
Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
8
作者 Reem Alkanhel El-Sayed M.El-kenawy +4 位作者 Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Manal Abdullah Alohali Mostafa Abotaleb doaa sami khafaga 《Computers, Materials & Continua》 SCIE EI 2023年第2期2677-2693,共17页
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of data.Cloud computing and fog computing,two of the most common technologies use... Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of data.Cloud computing and fog computing,two of the most common technologies used in IoT applications,have led to major security concerns.Cyberattacks are on the rise as a result of the usage of these technologies since present security measures are insufficient.Several artificial intelligence(AI)based security solutions,such as intrusion detection systems(IDS),have been proposed in recent years.Intelligent technologies that require data preprocessing and machine learning algorithm-performance augmentation require the use of feature selection(FS)techniques to increase classification accuracy by minimizing the number of features selected.On the other hand,metaheuristic optimization algorithms have been widely used in feature selection in recent decades.In this paper,we proposed a hybrid optimization algorithm for feature selection in IDS.The proposed algorithm is based on grey wolf(GW),and dipper throated optimization(DTO)algorithms and is referred to as GWDTO.The proposed algorithm has a better balance between the exploration and exploitation steps of the optimization process and thus could achieve better performance.On the employed IoT-IDS dataset,the performance of the proposed GWDTO algorithm was assessed using a set of evaluation metrics and compared to other optimization approaches in 2678 CMC,2023,vol.74,no.2 the literature to validate its superiority.In addition,a statistical analysis is performed to assess the stability and effectiveness of the proposed approach.Experimental results confirmed the superiority of the proposed approach in boosting the classification accuracy of the intrusion in IoT-based networks. 展开更多
关键词 Feature selection grey wolf optimization dipper throated optimization intrusion detection internet-of-things(IoT)
下载PDF
Deep Learning for Depression Detection Using Twitter Data
9
作者 doaa sami khafaga Maheshwari Auvdaiappan +2 位作者 KDeepa Mohamed Abouhawwash Faten Khalid Karim 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1301-1313,共13页
Today social media became a communication line among people to share their happiness,sadness,and anger with their end-users.It is necessary to know people’s emotions are very important to identify depressed people fr... Today social media became a communication line among people to share their happiness,sadness,and anger with their end-users.It is necessary to know people’s emotions are very important to identify depressed people from their messages.Early depression detection helps to save people’s lives and other dangerous mental diseases.There are many intelligent algorithms for predicting depression with high accuracy,but they lack the definition of such cases.Several machine learning methods help to identify depressed people.But the accuracy of existing methods was not satisfactory.To overcome this issue,the deep learning method is used in the proposed method for depression detection.In this paper,a novel Deep Learning Multi-Aspect Depression Detection with Hierarchical Atten-tion Network(MDHAN)is used for classifying the depression data.Initially,the Twitter data was preprocessed by tokenization,punctuation mark removal,stop word removal,stemming,and lemmatization.The Adaptive Particle and grey Wolf optimization methods are used for feature selection.The MDHAN classifies the Twitter data and predicts the depressed and non-depressed users.Finally,the proposed method is compared with existing methods such as Convolutional Neur-al Network(CNN),Support Vector Machine(SVM),Minimum Description Length(MDL),and MDHAN.The suggested MDH-PWO architecture gains 99.86%accuracy,more significant than frequency-based deep learning models,with a lower false-positive rate.The experimental result shows that the proposed method achieves better accuracy,precision,recall,and F1-measure.It also mini-mizes the execution time. 展开更多
关键词 Depression detection twitter data tweets deep learning swarm intelligence multi-aspect depression detection prediction
下载PDF
Automatic Diagnosis of Polycystic Ovarian Syndrome Using Wrapper Methodology with Deep Learning Techniques
10
作者 Mohamed Abouhawwash S.Sridevi +3 位作者 Suma Christal Mary Sundararajan Rohit Pachlor Faten Khalid Karim doaa sami khafaga 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期239-253,共15页
One of the significant health issues affecting women that impacts their fertility and results in serious health concerns is Polycystic ovarian syndrome(PCOS).Consequently,timely screening of polycystic ovarian syndrom... One of the significant health issues affecting women that impacts their fertility and results in serious health concerns is Polycystic ovarian syndrome(PCOS).Consequently,timely screening of polycystic ovarian syndrome can help in the process of recovery.Finding a method to aid doctors in this procedure was crucial due to the difficulties in detecting this condition.This research aimed to determine whether it is possible to optimize the detection of PCOS utilizing Deep Learning algorithms and methodologies.Additionally,feature selection methods that produce the most important subset of features can speed up calculation and enhance the effectiveness of classifiers.In this research,the tri-stage wrapper method is used because it reduces the computation time.The proposed study for the Automatic diagnosis of PCOS contains preprocessing,data normalization,feature selection,and classification.A dataset with 39 characteristics,including metabolism,neuroimaging,hormones,and biochemical information for 541 subjects,was employed in this scenario.To start,this research pre-processed the information.Next for feature selection,a tri-stage wrapper method such as Mutual Information,ReliefF,Chi-Square,and Xvariance is used.Then,various classification methods are tested and trained.Deep learning techniques including convolutional neural network(CNN),multi-layer perceptron(MLP),Recurrent neural network(RNN),and Bi long short-term memory(Bi-LSTM)are utilized for categorization.The experimental finding demonstrates that with effective feature extraction process using tri stage wrapper method+CNN delivers the highest precision(97%),high accuracy(98.67%),and recall(89%)when compared with other machine learning algorithms. 展开更多
关键词 Deep learning automatic detection polycystic ovarian syndrome tri-stage wrapper method mutual information RELIEF CHI-SQUARE
下载PDF
An Energy-Efficient Multi-swarm Optimization in Wireless Sensor Networks
11
作者 Reem Alkanhel Kalaiselvi Chinnathambi +4 位作者 C.Thilagavathi Mohamed Abouhawwash Mona A.Al duailij Manal Abdullah Alohali doaa sami khafaga 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1571-1583,共13页
Wireless Sensor Networks are a group of sensors with inadequate power sources that are installed in a particular region to gather information from the surroundings.Designing energy-efficient data gathering methods in l... Wireless Sensor Networks are a group of sensors with inadequate power sources that are installed in a particular region to gather information from the surroundings.Designing energy-efficient data gathering methods in large-scale Wireless Sensor Networks(WSN)is one of the most difficult areas of study.As every sensor node has afinite amount of energy.Battery power is the most significant source in the WSN.Clustering is a well-known technique for enhan-cing the power feature in WSN.In the proposed method multi-Swarm optimiza-tion based on a Genetic Algorithm and Adaptive Hierarchical clustering-based routing protocol are used for enhancing the network’s lifespan and routing opti-mization.By using distributed data transmission modification,an adaptive hier-archical clustering-based routing algorithm for power consumption is presented to ensure continuous coverage of the entire area.To begin,a hierarchical cluster-ing-based routing protocol is presented in terms of balancing node energy con-sumption.The Multi-Swarm optimization(MSO)based Genetic Algorithms are proposed to select an efficient Cluster Head(CH).It also improves the network’s longevity and optimizes the routing.As a result of the study’sfindings,the pro-posed MSO-Genetic Algorithm with Hill climbing(GAHC)is effective,as it increases the number of clusters created,average energy expended,lifespan com-putation reduces average packet loss,and end-to-end delay. 展开更多
关键词 CLUSTERING energy consumption genetic algorithm multi swarm optimization adaptive hierarchical clustering ROUTING cluster head
下载PDF
Metaheuristic Optimization of Time Series Models for Predicting Networks Traffic
12
作者 Reem Alkanhel El-Sayed M.El-kenawy +3 位作者 D.L.Elsheweikh Abdelaziz A.Abdelhamid Abdelhameed Ibrahim doaa sami khafaga 《Computers, Materials & Continua》 SCIE EI 2023年第4期427-442,共16页
Traffic prediction of wireless networks attracted many researchersand practitioners during the past decades. However, wireless traffic frequentlyexhibits strong nonlinearities and complicated patterns, which makes it ... Traffic prediction of wireless networks attracted many researchersand practitioners during the past decades. However, wireless traffic frequentlyexhibits strong nonlinearities and complicated patterns, which makes it challengingto be predicted accurately. Many of the existing approaches forpredicting wireless network traffic are unable to produce accurate predictionsbecause they lack the ability to describe the dynamic spatial-temporalcorrelations of wireless network traffic data. In this paper, we proposed anovel meta-heuristic optimization approach based on fitness grey wolf anddipper throated optimization algorithms for boosting the prediction accuracyof traffic volume. The proposed algorithm is employed to optimize the hyperparametersof long short-term memory (LSTM) network as an efficient timeseries modeling approach which is widely used in sequence prediction tasks.To prove the superiority of the proposed algorithm, four other optimizationalgorithms were employed to optimize LSTM, and the results were compared.The evaluation results confirmed the effectiveness of the proposed approachin predicting the traffic of wireless networks accurately. On the other hand,a statistical analysis is performed to emphasize the stability of the proposedapproach. 展开更多
关键词 Network traffic soft computing LSTM metaheuristic optimization
下载PDF
Novel Optimized Feature Selection Using Metaheuristics Applied to Physical Benchmark Datasets
13
作者 doaa sami khafaga El-Sayed M.El-kenawy +3 位作者 Fadwa Alrowais Sunil Kumar Abdelhameed Ibrahim Abdelaziz A.Abdelhamid 《Computers, Materials & Continua》 SCIE EI 2023年第2期4027-4041,共15页
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target data.There are 2n potential feature subsets for every n features ... In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target data.There are 2n potential feature subsets for every n features in a dataset,making it difficult to pick the best set of features using standard approaches.Consequently,in this research,a new metaheuristics-based feature selection technique based on an adaptive squirrel search optimization algorithm(ASSOA)has been proposed.When using metaheuristics to pick features,it is common for the selection of features to vary across runs,which can lead to instability.Because of this,we used the adaptive squirrel search to balance exploration and exploitation duties more evenly in the optimization process.For the selection of the best subset of features,we recommend using the binary ASSOA search strategy we developed before.According to the suggested approach,the number of features picked is reduced while maximizing classification accuracy.A ten-feature dataset from the University of California,Irvine(UCI)repository was used to test the proposed method’s performance vs.eleven other state-of-the-art approaches,including binary grey wolf optimization(bGWO),binary hybrid grey wolf and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hybrid GWO and genetic algorithm 4028 CMC,2023,vol.74,no.2(bGWO-GA),binary firefly algorithm(bFA),and bGAmethods.Experimental results confirm the superiority and effectiveness of the proposed algorithm for solving the problem of feature selection. 展开更多
关键词 Metaheuristics adaptive squirrel search algorithm optimization methods binary optimizer
下载PDF
Optimization of Electrocardiogram Classification Using Dipper Throated Algorithm and Differential Evolution
14
作者 doaa sami khafaga El-Sayed M.El-kenawy +4 位作者 Faten Khalid Karim Sameer Alshetewi Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh 《Computers, Materials & Continua》 SCIE EI 2023年第2期2379-2395,共17页
Electrocardiogram(ECG)signal is a measure of the heart’s electrical activity.Recently,ECG detection and classification have benefited from the use of computer-aided systems by cardiologists.The goal of this paper is ... Electrocardiogram(ECG)signal is a measure of the heart’s electrical activity.Recently,ECG detection and classification have benefited from the use of computer-aided systems by cardiologists.The goal of this paper is to improve the accuracy of ECG classification by combining the Dipper Throated Optimization(DTO)and Differential Evolution Algorithm(DEA)into a unified algorithm to optimize the hyperparameters of neural network(NN)for boosting the ECG classification accuracy.In addition,we proposed a new feature selection method for selecting the significant feature that can improve the overall performance.To prove the superiority of the proposed approach,several experimentswere conducted to compare the results achieved by the proposed approach and other competing approaches.Moreover,statistical analysis is performed to study the significance and stability of the proposed approach using Wilcoxon and ANOVA tests.Experimental results confirmed the superiority and effectiveness of the proposed approach.The classification accuracy achieved by the proposed approach is(99.98%). 展开更多
关键词 ELECTROCARDIOGRAM differential evolution algorithm dipper throated optimization neural networks
下载PDF
Dipper Throated Optimization for Detecting Black-Hole Attacks inMANETs
15
作者 Reem Alkanhel El-Sayed M.El-kenawy +3 位作者 Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb doaa sami khafaga 《Computers, Materials & Continua》 SCIE EI 2023年第1期1905-1921,共17页
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and development.As more MANET applications become data-oriented,implementing a secure and reliable data tran... In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and development.As more MANET applications become data-oriented,implementing a secure and reliable data transfer protocol becomes a major concern in the architecture.However,MANET’s lack of infrastructure,unpredictable topology,and restricted resources,as well as the lack of a previously permitted trust relationship among connected nodes,contribute to the attack detection burden.A novel detection approach is presented in this paper to classify passive and active black-hole attacks.The proposed approach is based on the dipper throated optimization(DTO)algorithm,which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’quality of service.A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron(DTO-MLP),and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical(LEACH)clustering technique.MLP is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor features.This hybridmethod is primarily designed to combat active black-hole assaults.Using the LEACH clustering phase,however,can also detect passive black-hole attacks.The effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested approach.For diverse mobility situations,the results demonstrate up to 97%detection accuracy and faster execution time.Furthermore,the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign. 展开更多
关键词 Black-hole attack mobile ad-hoc network OPTIMIZATION dipper throated optimization
下载PDF
An Improved Deep Structure for Accurately Brain Tumor Recognition
16
作者 Mohamed Maher Ata Reem N.Yousef +1 位作者 Faten Khalid Karim doaa sami khafaga 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1597-1616,共20页
Brain neoplasms are recognized with a biopsy,which is not commonly done before decisive brain surgery.By using Convolutional Neural Networks(CNNs)and textural features,the process of diagnosing brain tumors by radiolo... Brain neoplasms are recognized with a biopsy,which is not commonly done before decisive brain surgery.By using Convolutional Neural Networks(CNNs)and textural features,the process of diagnosing brain tumors by radiologists would be a noninvasive procedure.This paper proposes a features fusion model that can distinguish between no tumor and brain tumor types via a novel deep learning structure.The proposed model extracts Gray Level Co-occurrence Matrix(GLCM)textural features from MRI brain tumor images.Moreover,a deep neural network(DNN)model has been proposed to select the most salient features from the GLCM.Moreover,it manipulates the extraction of the additional high levels of salient features from a proposed CNN model.Finally,a fusion process has been utilized between these two types of features to form the input layer of additional proposed DNN model which is responsible for the recognition process.Two common datasets have been applied and tested,Br35H and FigShare datasets.The first dataset contains binary labels,while the second one splits the brain tumor into four classes;glioma,meningioma,pituitary,and no cancer.Moreover,several performance metrics have been evaluated from both datasets,including,accuracy,sensitivity,specificity,F-score,and training time.Experimental results show that the proposed methodology has achieved superior performance compared with the current state of art studies.The proposed system has achieved about 98.22%accuracy value in the case of the Br35H dataset however,an accuracy of 98.01%has been achieved in the case of the FigShare dataset. 展开更多
关键词 Brain tumor convolutional neural network gray level co-occurrence matrix NONINVASIVE FigShare dataset Br35H dataset
下载PDF
Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security
17
作者 Amal H.Alharbi S.Karthick +2 位作者 K.Venkatachalam Mohamed Abouhawwash doaa sami khafaga 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2773-2787,共15页
Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Develop... Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end security.Despite numerous security tech-niques,face recognition is considered a high-security control.Developers fuse and carry out face identification as an access authority into these applications.Still,face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized user.In the existing spoofing detection algorithm,there was some loss in the recreation of images.This research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of frames to overcome the above-said problems.This research offers a novel Edge-Net autoencoder to select convoluted and dominant features of the input diffused structure.First,this pro-posed method is tested with the Cross-ethnicity Face Anti-spoofing(CASIA),Fetal alcohol spectrum disorders(FASD)dataset.This database has three models of attacks:distorted photographs in printed form,photographs with removed eyes portion,and video attacks.The images are taken with three different quality cameras:low,average,and high-quality real and spoofed images.An extensive experimental study was performed with CASIA-FASD,3 Diagnostic Machine Aid-Digital(DMAD)dataset that proved higher results when compared to existing algorithms. 展开更多
关键词 Image processing edge detection edge net auto-encoder face authentication digital security
下载PDF
Al-Biruni Earth Radius(BER)Metaheuristic Search Optimization Algorithm
18
作者 El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid +5 位作者 Abdelhameed Ibrahim Seyedali Mirjalili Nima Khodadad Mona A.Al duailij Amel Ali Alhussan doaa sami khafaga 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1917-1934,共18页
Metaheuristic optimization algorithms present an effective method for solving several optimization problems from various types of applications and fields.Several metaheuristics and evolutionary optimization algorithms... Metaheuristic optimization algorithms present an effective method for solving several optimization problems from various types of applications and fields.Several metaheuristics and evolutionary optimization algorithms have been emerged recently in the literature and gained widespread attention,such as particle swarm optimization(PSO),whale optimization algorithm(WOA),grey wolf optimization algorithm(GWO),genetic algorithm(GA),and gravitational search algorithm(GSA).According to the literature,no one metaheuristic optimization algorithm can handle all present optimization problems.Hence novel optimization methodologies are still needed.The Al-Biruni earth radius(BER)search optimization algorithm is proposed in this paper.The proposed algorithm was motivated by the behavior of swarm members in achieving their global goals.The search space around local solutions to be explored is determined by Al-Biruni earth radius calculation method.A comparative analysis with existing state-of-the-art optimization algorithms corroborated the findings of BER’s validation and testing against seven mathematical optimization problems.The results show that BER can both explore and avoid local optima.BER has also been tested on an engineering design optimization problem.The results reveal that,in terms of performance and capability,BER outperforms the performance of state-of-the-art metaheuristic optimization algorithms. 展开更多
关键词 Metaheuristics evolutionary optimization exploration EXPLOITATION mutation Al-biruni earth radius
下载PDF
Forecasting Energy Consumption Using a Novel Hybrid Dipper Throated Optimization and Stochastic Fractal Search Algorithm
19
作者 doaa sami khafaga El-Sayed M.El-kenawy +1 位作者 Amel Ali Alhussan Marwa M.Eid 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期2117-2132,共16页
The accurate prediction of energy consumption has effective role in decision making and risk management for individuals and governments.Meanwhile,the accurate prediction can be realized using the recent advances in ma... The accurate prediction of energy consumption has effective role in decision making and risk management for individuals and governments.Meanwhile,the accurate prediction can be realized using the recent advances in machine learning and predictive models.This research proposes a novel approach for energy consumption forecasting based on a new optimization algorithm and a new forecasting model consisting of a set of long short-term memory(LSTM)units.The proposed optimization algorithm is used to optimize the parameters of the LSTM-based model to boost its forecasting accuracy.This optimization algorithm is based on the recently emerged dipper-throated optimization(DTO)and stochastic fractal search(SFS)algo-rithm and is referred to as dynamic DTOSFS.To prove the effectiveness and superiority of the proposed approach,five standard benchmark algorithms,namely,stochastic fractal search(SFS),dipper throated optimization(DTO),whale optimization algorithm(WOA),particle swarm optimization(PSO),and grey wolf optimization(GWO),are used to optimize the parameters of the LSTM-based model,and the results are compared with that of the proposed approach.Experimental results show that the proposed DDTOSFS+LSTM can accurately forecast the energy consumption with root mean square error RMSE of 0.00013,which is the best among the recorded results of the other methods.In addition,statistical experiments are conducted to prove the statistical difference of the proposed model.The results of these tests confirmed the expected outcomes. 展开更多
关键词 Stochastic fractal search dipper throated optimization energy consumption long short-term memory prediction models
下载PDF
Wireless Network Security Using Load Balanced Mobile Sink Technique
20
作者 Reem Alkanhel Mohamed Abouhawwash +2 位作者 S.N.Sangeethaa K.Venkatachalam doaa sami khafaga 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2135-2149,共15页
Real-time applications based on Wireless Sensor Network(WSN)tech-nologies are quickly increasing due to intelligent surroundings.Among the most significant resources in the WSN are battery power and security.Clustering... Real-time applications based on Wireless Sensor Network(WSN)tech-nologies are quickly increasing due to intelligent surroundings.Among the most significant resources in the WSN are battery power and security.Clustering stra-tegies improve the power factor and secure the WSN environment.It takes more electricity to forward data in a WSN.Though numerous clustering methods have been developed to provide energy consumption,there is indeed a risk of unequal load balancing,resulting in a decrease in the network’s lifetime due to network inequalities and less security.These possibilities arise due to the cluster head’s limited life span.These cluster heads(CH)are in charge of all activities and con-trol intra-cluster and inter-cluster interactions.The proposed method uses Lifetime centric load balancing mechanisms(LCLBM)and Cluster-based energy optimiza-tion using a mobile sink algorithm(CEOMS).LCLBM emphasizes the selection of CH,system architectures,and optimal distribution of CH.In addition,the LCLBM was added with an assistant cluster head(ACH)for load balancing.Power consumption,communications latency,the frequency of failing nodes,high security,and one-way delay are essential variables to consider while evaluating LCLBM.CEOMS will choose a cluster leader based on the influence of the fol-lowing parameters on the energy balance of WSNs.According to simulatedfind-ings,the suggested LCLBM-CEOMS method increases cluster head selection self-adaptability,improves the network’s lifetime,decreases data latency,and bal-ances network capacity. 展开更多
关键词 Wireless sensor network load balancing mechanism optimization power consumption network’s lifetime
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部