期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems
1
作者 Hemant Kumar Narsani Ali Ranjha +2 位作者 Kapal Dev Fida Hussain Memon nawab muhammad faseeh qureshi 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1458-1464,共7页
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabil... Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)networks.However,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G networks.In this regard,UAVs have appeared as a winning candidate to mitigate security risks.In this paper,we leverage UAVs to propose two methods.The first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver devices.Moreover,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,i.e.increasing secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF relay.Additionally,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation distance.Lastly,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations. 展开更多
关键词 URLLC UAV-Assisted communications 6G systems Secrecy rate
下载PDF
MDEV Model:A Novel Ensemble-Based Transfer Learning Approach for Pneumonia Classification Using CXR Images
2
作者 Mehwish Shaikh Isma Farah Siddiqui +3 位作者 Qasim Arain Jahwan Koo Mukhtiar Ali Unar nawab muhammad faseeh qureshi 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期287-302,共16页
Pneumonia is a dangerous respiratory disease due to which breathing becomes incredibly difficult and painful;thus,catching it early is crucial.Medical physicians’time is limited in outdoor situations due to many pati... Pneumonia is a dangerous respiratory disease due to which breathing becomes incredibly difficult and painful;thus,catching it early is crucial.Medical physicians’time is limited in outdoor situations due to many patients;therefore,automated systems can be a rescue.The input images from the X-ray equipment are also highly unpredictable due to variances in radiologists’experience.Therefore,radiologists require an automated system that can swiftly and accurately detect pneumonic lungs from chest x-rays.In medical classifications,deep convolution neural networks are commonly used.This research aims to use deep pretrained transfer learning models to accurately categorize CXR images into binary classes,i.e.,Normal and Pneumonia.The MDEV is a proposed novel ensemble approach that concatenates four heterogeneous transfer learning models:Mobile-Net,DenseNet-201,EfficientNet-B0,and VGG-16,which have been finetuned and trained on 5,856 CXR images.The evaluation matrices used in this research to contrast different deep transfer learning architectures include precision,accuracy,recall,AUC-roc,and f1-score.The model effectively decreases training loss while increasing accuracy.The findings conclude that the proposed MDEV model outperformed cutting-edge deep transfer learning models and obtains an overall precision of 92.26%,an accuracy of 92.15%,a recall of 90.90%,an auc-roc score of 90.9%,and f-score of 91.49%with minimal data pre-processing,data augmentation,finetuning and hyperparameter adjustment in classifying Normal and Pneumonia chests. 展开更多
关键词 Deep transfer learning convolution neural network image processing computer vision ensemble learning pneumonia classification MDEV model
下载PDF
Pseudo NLP Joint Spam Classification Technique for Big Data Cluster 被引量:2
3
作者 WooHyun Park nawab muhammad faseeh qureshi Dong Ryeol Shin 《Computers, Materials & Continua》 SCIE EI 2022年第4期517-535,共19页
Spam mail classification considered complex and error-prone task in the distributed computing environment.There are various available spam mail classification approaches such as the naive Bayesian classifier,logistic ... Spam mail classification considered complex and error-prone task in the distributed computing environment.There are various available spam mail classification approaches such as the naive Bayesian classifier,logistic regression and support vector machine and decision tree,recursive neural network,and long short-term memory algorithms.However,they do not consider the document when analyzing spam mail content.These approaches use the bagof-words method,which analyzes a large amount of text data and classifies features with the help of term frequency-inverse document frequency.Because there are many words in a document,these approaches consume a massive amount of resources and become infeasible when performing classification on multiple associated mail documents together.Thus,spam mail is not classified fully,and these approaches remain with loopholes.Thus,we propose a term frequency topic inverse document frequency model that considers the meaning of text data in a larger semantic unit by applying weights based on the document’s topic.Moreover,the proposed approach reduces the scarcity problem through a frequency topic-inverse document frequency in singular value decomposition model.Our proposed approach also reduces the dimensionality,which ultimately increases the strength of document classification.Experimental evaluations show that the proposed approach classifies spam mail documents with higher accuracy using individual document-independent processing computation.Comparative evaluations show that the proposed approach performs better than the logistic regression model in the distributed computing environment,with higher document word frequencies of 97.05%,99.17%and 96.59%. 展开更多
关键词 NLP big data machine learning TFT-IDF spam mail
下载PDF
AI-Enabled Grouping Bridgehead to Secure Penetration Topics of Metaverse 被引量:1
4
作者 Woo Hyun Park Isma Farah Siddiqui nawab muhammad faseeh qureshi 《Computers, Materials & Continua》 SCIE EI 2022年第12期5609-5624,共16页
With the advent of the big data era,security issues in the context of artificial intelligence(AI)and data analysis are attracting research attention.In the metaverse,which will become a virtual asset in the future,us... With the advent of the big data era,security issues in the context of artificial intelligence(AI)and data analysis are attracting research attention.In the metaverse,which will become a virtual asset in the future,users’communication,movement with characters,text elements,etc.,are required to integrate the real and virtual.However,they can be exposed to threats.Particularly,various hacker threats exist.For example,users’assets are exposed through notices and mail alerts regularly sent to users by operators.In the future,hacker threats will increase mainly due to naturally anonymous texts.Therefore,it is necessary to use the natural language processing technology of artificial intelligence,especially term frequency-inverse document frequency,word2vec,gated recurrent unit,recurrent neural network,and long-short term memory.Additionally,several application versions are used.Currently,research on tasks and performance for algorithm application is underway.We propose a grouping algorithm that focuses on securing various bridgehead strategies to secure topics for security and safety within the metaverse.The algorithm comprises three modules:extracting topics from attacks,managing dimensions,and performing grouping.Consequently,we create 24 topic-based models.Assuming normal and spam mail attacks to verify our algorithm,the accuracy of the previous application version was increased by∼0.4%-1.5%. 展开更多
关键词 Metaverse security computational linguistics grouping bridgehead AI
下载PDF
NLP-Based Subject with Emotions Joint Analytics for Epidemic Articles
5
作者 Woo Hyun Park Isma Farah Siddiqui +1 位作者 Dong Ryeol Shin nawab muhammad faseeh qureshi 《Computers, Materials & Continua》 SCIE EI 2022年第11期2985-3001,共17页
have been focused on addressing the Covid-19 pandemic;for example,governments have implemented countermeasures,such as quarantining,pushing vaccine shots to minimize local spread,investigating and analyzing the virus... have been focused on addressing the Covid-19 pandemic;for example,governments have implemented countermeasures,such as quarantining,pushing vaccine shots to minimize local spread,investigating and analyzing the virus’characteristics,and conducting epidemiological investigations through patient management and tracers.Therefore,researchers worldwide require funding to achieve these goals.Furthermore,there is a need for documentation to investigate and trace disease characteristics.However,it is time consuming and resource intensive to work with documents comprising many types of unstructured data.Therefore,in this study,natural language processing technology is used to automatically classify these documents.Currently used statistical methods include data cleansing,query modification,sentiment analysis,and clustering.However,owing to limitations with respect to the data,it is necessary to understand how to perform data analysis suitable for medical documents.To solve this problem,this study proposes a robust in-depth mixed with subject and emotion model comprising three modules.The first is a subject and non-linear emotional module,which extracts topics from the data and supplements them with emotional figures.The second is a subject with singular value decomposition in the emotion model,which is a dimensional decomposition module that uses subject analysis and an emotion model.The third involves embedding with singular value decomposition using an emotion module,which is a dimensional decomposition method that uses emotion learning.The accuracy and other model measurements,such as the F1,area under the curve,and recall are evaluated based on an article on Middle East respiratory syndrome.A high F1 score of approximately 91%is achieved.The proposed joint analysis method is expected to provide a better synergistic effect in the dataset. 展开更多
关键词 Computational linguistic AI EPIDEMIC healthcare classification
下载PDF
Ambient BackCom in beyond 5G NOMA networks: A multi-cell resource allocation framework
6
作者 Wali Ullah Khan Fida Hussain Memon +3 位作者 Kapal Dev muhammad Awais Javed Dinh-Thuan Do nawab muhammad faseeh qureshi 《Digital Communications and Networks》 SCIE CSCD 2022年第6期1005-1013,共9页
The research of Non-Orthogonal Multiple Access (NOMA) is extensively used to improve the capacity of networks beyond the fifth-generation. The recent merger of NOMA with ambient Backscatter Communication (BackCom), th... The research of Non-Orthogonal Multiple Access (NOMA) is extensively used to improve the capacity of networks beyond the fifth-generation. The recent merger of NOMA with ambient Backscatter Communication (BackCom), though opening new possibilities for massive connectivity, poses several challenges in dense wireless networks. One such challenge is the performance degradation of ambient BackCom in multi-cell NOMA networks under the effect of inter-cell interference. Driven by providing an efficient solution to the issue, this article proposes a new resource allocation framework that uses a duality theory approach. Specifically, the sum rate of the multi-cell network with backscatter tags and NOMA user equipment is maximized by formulating a joint optimization problem. To find the efficient base station transmit power and backscatter reflection coefficient in each cell, the original problem is first divided into two subproblems, and then the closed form solution is derived. A comparison with the Orthogonal Multiple Access (OMA) ambient BackCom and pure NOMA transmission has been provided. Simulation results of the proposed NOMA ambient BackCom indicate a significant improvement over the OMA ambient BackCom and pure NOMA in terms of sum-rate gains. 展开更多
关键词 Beyond fifth-generation Non-orthogonal multiple access Ambient BackCom Spectrum efficiency optimization
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部