期刊文献+
共找到203篇文章
< 1 2 11 >
每页显示 20 50 100
Construction of a Computational Scheme for the Fuzzy HIV/AIDS Epidemic Model with a Nonlinear Saturated Incidence Rate 被引量:1
1
作者 Muhammad Shoaib Arif Kamaleldin Abodayeh Yasir Nawaz 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1405-1425,共21页
This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemi... This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters. 展开更多
关键词 Epidemic model fuzzy rate parameters next generation matrix local stability proposed numerical scheme
下载PDF
Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques 被引量:1
2
作者 Ahsan Wajahat Jingsha He +4 位作者 Nafei Zhu Tariq Mahmood Tanzila Saba Amjad Rehman Khan Faten S.A.lamri 《Computers, Materials & Continua》 SCIE EI 2024年第4期651-673,共23页
The growing usage of Android smartphones has led to a significant rise in incidents of Android malware andprivacy breaches.This escalating security concern necessitates the development of advanced technologies capable... The growing usage of Android smartphones has led to a significant rise in incidents of Android malware andprivacy breaches.This escalating security concern necessitates the development of advanced technologies capableof automatically detecting andmitigatingmalicious activities in Android applications(apps).Such technologies arecrucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world.Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitationsthey require substantial computational resources and are prone to a high frequency of false positives.This meansthat while attempting to identify security breaches,these methods often consume considerable processing powerand mistakenly flag benign activities as malicious,leading to inefficiencies and reduced reliability in malwaredetection.The proposed approach includes a data preprocessing step that removes duplicate samples,managesunbalanced datasets,corrects inconsistencies,and imputes missing values to ensure data accuracy.The Minimaxmethod is then used to normalize numerical data,followed by feature vector extraction using the Gain ratio andChi-squared test to identify and extract the most significant characteristics using an appropriate prediction model.This study focuses on extracting a subset of attributes best suited for the task and recommending a predictivemodel based on domain expert opinion.The proposed method is evaluated using Drebin and TUANDROMDdatasets containing 15,036 and 4,464 benign and malicious samples,respectively.The empirical result shows thatthe RandomForest(RF)and Support VectorMachine(SVC)classifiers achieved impressive accuracy rates of 98.9%and 98.8%,respectively,in detecting unknown Androidmalware.A sensitivity analysis experiment was also carriedout on all three ML-based classifiers based on MAE,MSE,R2,and sensitivity parameters,resulting in a flawlessperformance for both datasets.This approach has substantial potential for real-world applications and can serve asa valuable tool for preventing the spread of Androidmalware and enhancing mobile device security. 展开更多
关键词 Android malware detection machine learning SVC K-Nearest Neighbors(KNN) RF
下载PDF
Security Analysis in Smart Agriculture: Insights from a Cyber-Physical System Application
3
作者 Ahmed Redha Mahlous 《Computers, Materials & Continua》 SCIE EI 2024年第6期4781-4803,共23页
Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies.In today’s world where technology is everything... Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies.In today’s world where technology is everything,these technologies are utilized to streamline regular tasks and procedures in agriculture,one of the largest and most significant industries in every nation.This research paper stands out from existing literature on smart agriculture security by providing a comprehensive analysis and examination of security issues within smart agriculture systems.Divided into three main sections-security analysis,system architecture and design and risk assessment of Cyber-Physical Systems(CPS)applications-the study delves into various elements crucial for smart farming,such as data sources,infrastructure components,communication protocols,and the roles of different stakeholders such as farmers,agricultural scientists and researchers,technology providers,government agencies,consumers and many others.In contrast to earlier research,this work analyzes the resilience of smart agriculture systems using approaches such as threat modeling,penetration testing,and vulnerability assessments.Important discoveries highlight the concerns connected to unsecured communication protocols,possible threats from malevolent actors,and vulnerabilities in IoT devices.Furthermore,the study suggests enhancements for CPS applications,such as strong access controls,intrusion detection systems,and encryption protocols.In addition,risk assessment techniques are applied to prioritize mitigation tactics and detect potential hazards,addressing issues like data breaches,system outages,and automated farming process sabotage.The research sets itself apart even more by presenting a prototype CPS application that makes use of a digital temperature sensor.This application was first created using a Tinkercad simulator and then using actual hardware with Arduino boards.The CPS application’s defenses against potential threats and vulnerabilities are strengthened by this integrated approach,which distinguishes this research for its depth and usefulness in the field of smart agriculture security. 展开更多
关键词 Smart agriculture cyber-physical system IOT security temperature sensor threats VULNERABILITIES
下载PDF
Beyond p-y method:A review of artificial intelligence approaches for predicting lateral capacity of drilled shafts in clayey soils
4
作者 M.E.Al-Atroush A.E.Aboelela Ezz El-Din Hemdan 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第9期3812-3840,共29页
In 2023,pivotal advancements in artificial intelligence(AI)have significantly experienced.With that in mind,traditional methodologies,notably the p-y approach,have struggled to accurately model the complex,nonlinear s... In 2023,pivotal advancements in artificial intelligence(AI)have significantly experienced.With that in mind,traditional methodologies,notably the p-y approach,have struggled to accurately model the complex,nonlinear soil-structure interactions of laterally loaded large-diameter drilled shafts.This study undertakes a rigorous evaluation of machine learning(ML)and deep learning(DL)techniques,offering a comprehensive review of their application in addressing this geotechnical challenge.A thorough review and comparative analysis have been carried out to investigate various AI models such as artificial neural networks(ANNs),relevance vector machines(RVMs),and least squares support vector machines(LSSVMs).It was found that despite ML approaches outperforming classic methods in predicting the lateral behavior of piles,their‘black box'nature and reliance only on a data-driven approach made their results showcase statistical robustness rather than clear geotechnical insights,a fact underscored by the mathematical equations derived from these studies.Furthermore,the research identified a gap in the availability of drilled shaft datasets,limiting the extendibility of current findings to large-diameter piles.An extensive dataset,compiled from a series of lateral loading tests on free-head drilled shaft with varying properties and geometries,was introduced to bridge this gap.The paper concluded with a direction for future research,proposes the integration of physics-informed neural networks(PINNs),combining data-driven models with fundamental geotechnical principles to improve both the interpretability and predictive accuracy of AI applications in geotechnical engineering,marking a novel contribution to the field. 展开更多
关键词 Laterally loaded drilled shaft load transfer and failure mechanisms Physics-informed neural networks(PINNs) P-y curves Artificial intelligence(AI) DATASET
下载PDF
Computational Approach for Automated Segmentation and Classification of Region of Interest in Lateral Breast Thermograms
5
作者 Dennies Tsietso Abid Yahya +2 位作者 Ravi Samikannu Basit Qureshi Muhammad Babar 《Computers, Materials & Continua》 SCIE EI 2024年第9期4749-4765,共17页
Breast cancer is one of the major health issues with high mortality rates and a substantial impact on patients and healthcare systems worldwide.Various Computer-Aided Diagnosis(CAD)tools,based on breast thermograms,ha... Breast cancer is one of the major health issues with high mortality rates and a substantial impact on patients and healthcare systems worldwide.Various Computer-Aided Diagnosis(CAD)tools,based on breast thermograms,have been developed for early detection of this disease.However,accurately segmenting the Region of Interest(ROI)fromthermograms remains challenging.This paper presents an approach that leverages image acquisition protocol parameters to identify the lateral breast region and estimate its bottomboundary using a second-degree polynomial.The proposed method demonstrated high efficacy,achieving an impressive Jaccard coefficient of 86%and a Dice index of 92%when evaluated against manually created ground truths.Textural features were extracted from each view’s ROI,with significant features selected via Mutual Information for training Multi-Layer Perceptron(MLP)and K-Nearest Neighbors(KNN)classifiers.Our findings revealed that the MLP classifier outperformed the KNN,achieving an accuracy of 86%,a specificity of 100%,and an Area Under the Curve(AUC)of 0.85.The consistency of the method across both sides of the breast suggests its viability as an auto-segmentation tool.Furthermore,the classification results suggests that lateral views of breast thermograms harbor valuable features that can significantly aid in the early detection of breast cancer. 展开更多
关键词 Breast cancer CAD machine learning ROI segmentation THERMOGRAPHY
下载PDF
A Hybrid SIR-Fuzzy Model for Epidemic Dynamics:A Numerical Study
6
作者 Muhammad Shoaib Arif Kamaleldin Abodayeh Yasir Nawaz 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3417-3434,共18页
This study focuses on the urgent requirement for improved accuracy in diseasemodeling by introducing a newcomputational framework called the Hybrid SIR-Fuzzy Model.By integrating the traditional Susceptible-Infectious... This study focuses on the urgent requirement for improved accuracy in diseasemodeling by introducing a newcomputational framework called the Hybrid SIR-Fuzzy Model.By integrating the traditional Susceptible-Infectious-Recovered(SIR)modelwith fuzzy logic,ourmethod effectively addresses the complex nature of epidemic dynamics by accurately accounting for uncertainties and imprecisions in both data and model parameters.The main aim of this research is to provide a model for disease transmission using fuzzy theory,which can successfully address uncertainty in mathematical modeling.Our main emphasis is on the imprecise transmission rate parameter,utilizing a three-part description of its membership level.This enhances the representation of disease processes with greater complexity and tackles the difficulties related to quantifying uncertainty in mathematical models.We investigate equilibrium points for three separate scenarios and perform a comprehensive sensitivity analysis,providing insight into the complex correlation betweenmodel parameters and epidemic results.In order to facilitate a quantitative analysis of the fuzzy model,we propose the implementation of a resilient numerical scheme.The convergence study of the scheme demonstrates its trustworthiness,providing a conditionally positive solution,which represents a significant improvement compared to current forward Euler schemes.The numerical findings demonstrate themodel’s effectiveness in accurately representing the dynamics of disease transmission.Significantly,when the mortality coefficient rises,both the susceptible and infected populations decrease,highlighting the model’s sensitivity to important epidemiological factors.Moreover,there is a direct relationship between higher Holling type rate values and a decrease in the number of individuals who are infected,as well as an increase in the number of susceptible individuals.This correlation offers a significant understanding of how many elements affect the consequences of an epidemic.Our objective is to enhance decision-making in public health by providing a thorough quantitative analysis of the Hybrid SIR-Fuzzy Model.Our approach not only tackles the existing constraints in disease modeling,but also paves the way for additional investigation,providing a vital instrument for researchers and policymakers alike. 展开更多
关键词 Fuzzy-based model sensitivity equilibriumpoints proposed numerical scheme convergence and stability analysis
下载PDF
Advancements in Numerical Solutions:Fractal Runge-Kutta Approach to Model Time-Dependent MHD Newtonian Fluid with Rescaled Viscosity on Riga Plate
7
作者 Muhammad Shoaib Arif Kamaleldin Abodayeh Yasir Nawaz 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1213-1241,共29页
Fractal time-dependent issues in fluid dynamics provide a distinct difficulty in numerical analysis due to their complex characteristics,necessitating specialized computing techniques for precise and economical soluti... Fractal time-dependent issues in fluid dynamics provide a distinct difficulty in numerical analysis due to their complex characteristics,necessitating specialized computing techniques for precise and economical solutions.This study presents an innovative computational approach to tackle these difficulties.The main focus is applying the Fractal Runge-Kutta Method to model the time-dependent magnetohydrodynamic(MHD)Newtonian fluid with rescaled viscosity flow on Riga plates.An efficient computational scheme is proposed for handling fractal timedependent problems in flow phenomena.The scheme is comprised of three stages and constructed using three different time levels.The stability of the scheme is shown by employing the Fourier series analysis to solve scalar problems.The scheme’s convergence is guaranteed for a time fractal partial differential equations system.The scheme is applied to the dimensionless fractal heat and mass transfer model of incompressible,unsteady,laminar,Newtonian fluid with rescaled viscosity flow over the flat and oscillatory Riga plates under the effects of spaceand temperature-dependent heat sources.The first-order back differences discretize the continuity equation.The results show that skin friction local Nusselt number declines by raising the coefficient of the temperature-dependent term of heat source and Eckert number.The numerical simulations provide valuable insights into fluid dynamics,explicitly highlighting the influence of the temperature-dependent coefficient of the heat source and the Eckert number on skin friction and local Nusselt number. 展开更多
关键词 Fractal scheme stability convergence fractal Newtonian fluid with rescaled viscosity fluid heat generation
下载PDF
AI-Driven Pattern Recognition in Medicinal Plants: A Comprehensive Review and Comparative Analysis
8
作者 Mohd Asif Hajam Tasleem Arif +2 位作者 Akib Mohi Ud Din Khanday Mudasir Ahmad Wani Muhammad Asim 《Computers, Materials & Continua》 SCIE EI 2024年第11期2077-2131,共55页
The pharmaceutical industry increasingly values medicinal plants due to their perceived safety and costeffectiveness compared to modern drugs.Throughout the extensive history of medicinal plant usage,various plant par... The pharmaceutical industry increasingly values medicinal plants due to their perceived safety and costeffectiveness compared to modern drugs.Throughout the extensive history of medicinal plant usage,various plant parts,including flowers,leaves,and roots,have been acknowledged for their healing properties and employed in plant identification.Leaf images,however,stand out as the preferred and easily accessible source of information.Manual plant identification by plant taxonomists is intricate,time-consuming,and prone to errors,relying heavily on human perception.Artificial intelligence(AI)techniques offer a solution by automating plant recognition processes.This study thoroughly examines cutting-edge AI approaches for leaf image-based plant identification,drawing insights from literature across renowned repositories.This paper critically summarizes relevant literature based on AI algorithms,extracted features,and results achieved.Additionally,it analyzes extensively used datasets in automated plant classification research.It also offers deep insights into implemented techniques and methods employed for medicinal plant recognition.Moreover,this rigorous review study discusses opportunities and challenges in employing these AI-based approaches.Furthermore,in-depth statistical findings and lessons learned from this survey are highlighted with novel research areas with the aim of offering insights to the readers and motivating new research directions.This review is expected to serve as a foundational resource for future researchers in the field of AI-based identification of medicinal plants. 展开更多
关键词 Pattern recognition artificial intelligence machine learning deep learning image processing plant leaf identification
下载PDF
A Concise and Varied Visual Features-Based Image Captioning Model with Visual Selection
9
作者 Alaa Thobhani Beiji Zou +4 位作者 Xiaoyan Kui Amr Abdussalam Muhammad Asim Naveed Ahmed Mohammed Ali Alshara 《Computers, Materials & Continua》 SCIE EI 2024年第11期2873-2894,共22页
Image captioning has gained increasing attention in recent years.Visual characteristics found in input images play a crucial role in generating high-quality captions.Prior studies have used visual attention mechanisms... Image captioning has gained increasing attention in recent years.Visual characteristics found in input images play a crucial role in generating high-quality captions.Prior studies have used visual attention mechanisms to dynamically focus on localized regions of the input image,improving the effectiveness of identifying relevant image regions at each step of caption generation.However,providing image captioning models with the capability of selecting the most relevant visual features from the input image and attending to them can significantly improve the utilization of these features.Consequently,this leads to enhanced captioning network performance.In light of this,we present an image captioning framework that efficiently exploits the extracted representations of the image.Our framework comprises three key components:the Visual Feature Detector module(VFD),the Visual Feature Visual Attention module(VFVA),and the language model.The VFD module is responsible for detecting a subset of the most pertinent features from the local visual features,creating an updated visual features matrix.Subsequently,the VFVA directs its attention to the visual features matrix generated by the VFD,resulting in an updated context vector employed by the language model to generate an informative description.Integrating the VFD and VFVA modules introduces an additional layer of processing for the visual features,thereby contributing to enhancing the image captioning model’s performance.Using the MS-COCO dataset,our experiments show that the proposed framework competes well with state-of-the-art methods,effectively leveraging visual representations to improve performance.The implementation code can be found here:https://github.com/althobhani/VFDICM(accessed on 30 July 2024). 展开更多
关键词 Visual attention image captioning visual feature detector visual feature visual attention
下载PDF
Predicting Age and Gender in Author Profiling: A Multi-Feature Exploration
10
作者 Aiman Muhammad Arshad +2 位作者 Bilal Khan Sadique Ahmad Muhammad Asim 《Computers, Materials & Continua》 SCIE EI 2024年第5期3333-3353,共21页
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g.... Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction. 展开更多
关键词 Digital forensics author profiling for security AdaBoostM1 random forest ensemble learning
下载PDF
Enhancing Early Detection of Lung Cancer through Advanced Image Processing Techniques and Deep Learning Architectures for CT Scans
11
作者 Nahed Tawfik Heba M.Emara +3 位作者 Walid El-Shafai Naglaa F.Soliman Abeer D.Algarni Fathi EAbd El-Samie 《Computers, Materials & Continua》 SCIE EI 2024年第10期271-307,共37页
Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a... Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a significant cause of cancer-related deaths globally.Early diagnosis enables healthcare providers to administer appropriate treatment measures promptly and accurately,leading to improved prognosis and higher survival rates.The significant increase in both the incidence and mortality rates of lung cancer,particularly its ranking as the second most prevalent cancer among women worldwide,underscores the need for comprehensive research into efficient screening methods.Advances in diagnostic techniques,particularly the use of computed tomography(CT)scans,have revolutionized the identification of lung cancer.CT scans are renowned for their ability to provide high-resolution images and are particularly effective in detecting small,calcified areas,crucial for identifying earlystage lung cancer.Consequently,there is growing interest in enhancing computer-aided detection(CAD)systems.These algorithms assist radiologists by reducing false-positive interpretations and improving the accuracy of early cancer diagnosis.This study aims to enhance the effectiveness of CAD systems through various methods.Initially,the Contrast Limited Adaptive Histogram Equalization(CLAHE)algorithm is employed to preprocess CT scan images,thereby improving their visual quality.Further refinement is achieved by integrating different optimization strategies with the CLAHE method.The CutMix data augmentation technique is applied to boost the performance of the proposed model.A comparative analysis is conducted using deep learning architectures such as InceptionV3,ResNet101,Xception,and EfficientNet.The study evaluates the performance of these architectures in image classification tasks,both with and without the implementation of the CLAHE algorithm.The empirical findings of the study demonstrate a significant reduction in the false positive rate(FPR)and an overall enhancement in diagnostic accuracy.This research not only contributes to the field of medical imaging but also holds significant implications for the early detection and treatment of lung cancer,ultimately aiming to reduce its mortality rates. 展开更多
关键词 Lung cancer detection CLAHE algorithm optimization deep learning CLASSIFICATION feature extraction healthcare applications
下载PDF
Laboratory Implementation of Direct Torque Controller based Speed Loop Pseudo Derivative Feedforward Controller for PMSM Drive
12
作者 Prabhakaran Koothu Kesavan Umashankar Subramaniam Dhafer J.Almakhles 《CES Transactions on Electrical Machines and Systems》 EI CSCD 2024年第1期12-21,共10页
This paper,evaluate the effectiveness of a proposed speed loop pseudo derivative feedforward(PDFF)controller-based direct torque controller(DTC)for a PMSM drive against the performance of existing PI speed controller-... This paper,evaluate the effectiveness of a proposed speed loop pseudo derivative feedforward(PDFF)controller-based direct torque controller(DTC)for a PMSM drive against the performance of existing PI speed controller-based DTC and hysteresis current controller(HCC).The proposed PDFF-based speed regulator effectively reduces oscillation and overshoot associated with rotor angular speed,electromagnetic torque,and stator current.Two case studies,one using forward-to-reverse motoring operation and the other involving reverse-to-forward braking operation,has been validated to show the effectiveness of the proposed control strategy.The proposed controller's superior performance is demonstrated through experimental verification utilizing an FPGA controller for a 1.5 kW PMSM drive laboratory prototype. 展开更多
关键词 Direct torque control Pseudo derivative feedforward controller Permanent magnet synchronous motor(PMSM)
下载PDF
Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System
13
作者 Fatma S.Alrayes Mohammed Zakariah +2 位作者 Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2024年第7期1457-1490,共34页
This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intr... This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intrusion detection performance,given the vital relevance of safeguarding computer networks against harmful activity.The DNN-based IDS is trained and validated by the model using the NSL-KDD dataset,a popular benchmark for IDS research.The model performs well in both the training and validation stages,with 91.30%training accuracy and 94.38%validation accuracy.Thus,the model shows good learning and generalization capabilities with minor losses of 0.22 in training and 0.1553 in validation.Furthermore,for both macro and micro averages across class 0(normal)and class 1(anomalous)data,the study evaluates the model using a variety of assessment measures,such as accuracy scores,precision,recall,and F1 scores.The macro-average recall is 0.9422,the macro-average precision is 0.9482,and the accuracy scores are 0.942.Furthermore,macro-averaged F1 scores of 0.9245 for class 1 and 0.9434 for class 0 demonstrate the model’s ability to precisely identify anomalies precisely.The research also highlights how real-time threat monitoring and enhanced resistance against new online attacks may be achieved byDNN-based intrusion detection systems,which can significantly improve network security.The study underscores the critical function ofDNN-based IDS in contemporary cybersecurity procedures by setting the foundation for further developments in this field.Upcoming research aims to enhance intrusion detection systems by examining cooperative learning techniques and integrating up-to-date threat knowledge. 展开更多
关键词 MACHINE-LEARNING Deep-Learning intrusion detection system security PRIVACY deep neural network NSL-KDD Dataset
下载PDF
Base Pressure Control with Semi-Circular Ribs at Critical Mach Number
14
作者 Ambareen Khan Sher Afghan Khan +2 位作者 Mohammed Nishat Akhtar Abdul Aabid Muneer Baig 《Fluid Dynamics & Materials Processing》 EI 2024年第9期2007-2028,共22页
When better fuel-air mixing in the combustion chamber or a reduction in base drag are required in vehicles,rockets,and aeroplanes,the base pressure control is activated.Controlling the base pressure and drag is necess... When better fuel-air mixing in the combustion chamber or a reduction in base drag are required in vehicles,rockets,and aeroplanes,the base pressure control is activated.Controlling the base pressure and drag is necessary in both scenarios.In this work,semi-circular ribs with varying diameters(2,4,and 6 mm)positioned at six distinct positions(0.5D,1D,1.5D,2D,3D,and 4D)inside a square duct with a side of 15 mm are proposed as an efficient way to apply the passive control technique.In-depth research is done on optimising rib size for various rib sites.According to this study,the base pressure rises as rib height increases.Furthermore,the optimal location for the semi-circular ribs with a diameter of 2 mm is at 0.5D.The 1D location appears to be optimal for the 4 mm size as well.For the 6 mm size,however,the 4D position fills this function. 展开更多
关键词 Base pressure nozzle pressure ratio base drag sonic Mach number passive control
下载PDF
Control of Nozzle Flow Using Rectangular Ribs at Sonic and Supersonic Mach Numbers
15
作者 Vigneshvaran Sethuraman Parvathy Rajendran +2 位作者 Sher Afghan Khan Abdul Aabid Muneer Baig 《Fluid Dynamics & Materials Processing》 EI 2024年第8期1847-1866,共20页
This study deals with base pressure management in a duct for various values of the Mach number(M),namely,Mach number corresponding to sonic and four supersonic conditions.In addition to the Mach number,the nozzle pres... This study deals with base pressure management in a duct for various values of the Mach number(M),namely,Mach number corresponding to sonic and four supersonic conditions.In addition to the Mach number,the nozzle pressure ratio(NPR),the area ratio,the rib dimension,and the duct length are influential parameters.The following specific values are examined at M=1,1.36,1.64,and 2,and NPRs between 1.5 and 10.The base pressure is determined by positioning ribs of varying heights at predetermined intervals throughout the length of the square duct.When the level of expansion is varied,it is seen that the base pressure initially drops for overexpanded flows and increases for under-expanded flows.When ribs are present,the flow field in the duct and pressure inside the duct fluctuate as the base pressure rises.Under-expanded flows can achieve a base pressure value that is suitably high without experiencing excessive changes in the duct flow in terms of static pressure if a rib height around 10%of the duct height close to the nozzle exit is considered.Rectangular rib passive control does not negatively affect the duct’s flow field. 展开更多
关键词 Base pressure internal flows RIBS suddenly expanded flow wall pressure
下载PDF
Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network
16
作者 Deema Alsekait Mohammed Zakariah +2 位作者 Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2024年第11期2395-2436,共42页
The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability t... The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks.Further,the study suggests using an advanced approach that utilizes machine learning,specifically the Wide Residual Network(WRN),to identify hidden malware in IoT systems.The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices,using the MalMemAnalysis dataset.Moreover,thorough experimentation provides evidence for the effectiveness of the WRN-based strategy,resulting in exceptional performance measures such as accuracy,precision,F1-score,and recall.The study of the test data demonstrates highly impressive results,with a multiclass accuracy surpassing 99.97%and a binary class accuracy beyond 99.98%.The results emphasize the strength and dependability of using advanced deep learning methods such as WRN for identifying hidden malware risks in IoT environments.Furthermore,a comparison examination with the current body of literature emphasizes the originality and efficacy of the suggested methodology.This research builds upon previous studies that have investigated several machine learning methods for detecting malware on IoT devices.However,it distinguishes itself by showcasing exceptional performance metrics and validating its findings through thorough experimentation with real-world datasets.Utilizing WRN offers benefits in managing the intricacies of malware detection,emphasizing its capacity to enhance the security of IoT ecosystems.To summarize,this work proposes an effective way to address privacy concerns on IoT devices by utilizing advanced machine learning methods.The research provides useful insights into the changing landscape of IoT cybersecurity by emphasizing methodological rigor and conducting comparative performance analysis.Future research could focus on enhancing the recommended approach by adding more datasets and leveraging real-time monitoring capabilities to strengthen IoT devices’defenses against new cybersecurity threats. 展开更多
关键词 Obfuscated malware detection IoT devices Wide Residual Network(WRN) malware detection machine learning
下载PDF
Image Fusion Using Wavelet Transformation and XGboost Algorithm
17
作者 Shahid Naseem Tariq Mahmood +4 位作者 Amjad Rehman Khan Umer Farooq Samra Nawazish Faten S.Alamri Tanzila Saba 《Computers, Materials & Continua》 SCIE EI 2024年第4期801-817,共17页
Recently,there have been several uses for digital image processing.Image fusion has become a prominent application in the domain of imaging processing.To create one final image that provesmore informative and helpful ... Recently,there have been several uses for digital image processing.Image fusion has become a prominent application in the domain of imaging processing.To create one final image that provesmore informative and helpful compared to the original input images,image fusion merges two or more initial images of the same item.Image fusion aims to produce,enhance,and transform significant elements of the source images into combined images for the sake of human visual perception.Image fusion is commonly employed for feature extraction in smart robots,clinical imaging,audiovisual camera integration,manufacturing process monitoring,electronic circuit design,advanced device diagnostics,and intelligent assembly line robots,with image quality varying depending on application.The research paper presents various methods for merging images in spatial and frequency domains,including a blend of stable and curvelet transformations,everageMax-Min,weighted principal component analysis(PCA),HIS(Hue,Intensity,Saturation),wavelet transform,discrete cosine transform(DCT),dual-tree Complex Wavelet Transform(CWT),and multiple wavelet transform.Image fusion methods integrate data from several source images of an identical target,thereby enhancing information in an extremely efficient manner.More precisely,in imaging techniques,the depth of field constraint precludes images from focusing on every object,leading to the exclusion of certain characteristics.To tackle thess challanges,a very efficient multi-focus wavelet decomposition and recompositionmethod is proposed.The use of these wavelet decomposition and recomposition techniques enables this method to make use of existing optimized wavelet code and filter choice.The simulated outcomes provide evidence that the suggested approach initially extracts particular characteristics from images in order to accurately reflect the level of clarity portrayed in the original images.This study enhances the performance of the eXtreme Gradient Boosting(XGBoost)algorithm in detecting brain malignancies with greater precision through the integration of computational image analysis and feature selection.The performance of images is improved by segmenting them employing the K-Means algorithm.The segmentation method aids in identifying specific regions of interest,using Particle Swarm Optimization(PCA)for trait selection and XGBoost for data classification.Extensive trials confirm the model’s exceptional visual performance,achieving an accuracy of up to 97.067%and providing good objective indicators. 展开更多
关键词 Image fusion max-min average CWT XGBoost DCT inclusive innovations spatial and frequency domain
下载PDF
CNN Channel Attention Intrusion Detection SystemUsing NSL-KDD Dataset
18
作者 Fatma S.Alrayes Mohammed Zakariah +2 位作者 Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2024年第6期4319-4347,共29页
Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,hi... Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,highly-adaptable Network Intrusion Detection Systems(NIDS)that can identify anomalies.The NSL-KDD dataset is used in the study;it is a sizable collection comprising 43 variables with the label’s“attack”and“level.”It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks(CNN).Furthermore,this dataset makes it easier to conduct a thorough assessment of the suggested intrusion detection strategy.Furthermore,maintaining operating efficiency while improving detection accuracy is the primary goal of this work.Moreover,typical NIDS examines both risky and typical behavior using a variety of techniques.On the NSL-KDD dataset,our CNN-based approach achieves an astounding 99.728%accuracy rate when paired with channel attention.Compared to previous approaches such as ensemble learning,CNN,RBM(Boltzmann machine),ANN,hybrid auto-encoders with CNN,MCNN,and ANN,and adaptive algorithms,our solution significantly improves intrusion detection performance.Moreover,the results highlight the effectiveness of our suggested method in improving intrusion detection precision,signifying a noteworthy advancement in this field.Subsequent efforts will focus on strengthening and expanding our approach in order to counteract growing cyberthreats and adjust to changing network circumstances. 展开更多
关键词 Intrusion detection system(IDS) NSL-KDD dataset deep-learning MACHINE-LEARNING CNN channel Attention network security
下载PDF
Enhancing Arabic Cyberbullying Detection with End-to-End Transformer Model
19
作者 Mohamed A.Mahdi Suliman Mohamed Fati +2 位作者 Mohamed A.G.Hazber Shahanawaj Ahamad Sawsan A.Saad 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1651-1671,共21页
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online spaces.To tackle this challenge,our study introduces a ... Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online spaces.To tackle this challenge,our study introduces a new approach employing Bidirectional Encoder Representations from the Transformers(BERT)base model(cased),originally pretrained in English.This model is uniquely adapted to recognize the intricate nuances of Arabic online communication,a key aspect often overlooked in conventional cyberbullying detection methods.Our model is an end-to-end solution that has been fine-tuned on a diverse dataset of Arabic social media(SM)tweets showing a notable increase in detection accuracy and sensitivity compared to existing methods.Experimental results on a diverse Arabic dataset collected from the‘X platform’demonstrate a notable increase in detection accuracy and sensitivity compared to existing methods.E-BERT shows a substantial improvement in performance,evidenced by an accuracy of 98.45%,precision of 99.17%,recall of 99.10%,and an F1 score of 99.14%.The proposed E-BERT not only addresses a critical gap in cyberbullying detection in Arabic online forums but also sets a precedent for applying cross-lingual pretrained models in regional language applications,offering a scalable and effective framework for enhancing online safety across Arabic-speaking communities. 展开更多
关键词 CYBERBULLYING offensive detection Bidirectional Encoder Representations from the Transformers(BERT) continuous bag of words Social Media natural language processing
下载PDF
Classification and Comprehension of Software Requirements Using Ensemble Learning
20
作者 Jalil Abbas Arshad Ahmad +4 位作者 Syed Muqsit Shaheed Rubia Fatima Sajid Shah Mohammad Elaffendi Gauhar Ali 《Computers, Materials & Continua》 SCIE EI 2024年第8期2839-2855,共17页
The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human re... The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional requirements.To address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human effort.However,existing techniques often struggle with complex instructions and large-scale projects.In our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer trees.Experimental results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT dataset.Both datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse scenarios.These findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes. 展开更多
关键词 Ensemble learning machine learning non-functional requirements requirement engineering accuracy sliding window
下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部