This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemi...This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.展开更多
The growing usage of Android smartphones has led to a significant rise in incidents of Android malware andprivacy breaches.This escalating security concern necessitates the development of advanced technologies capable...The growing usage of Android smartphones has led to a significant rise in incidents of Android malware andprivacy breaches.This escalating security concern necessitates the development of advanced technologies capableof automatically detecting andmitigatingmalicious activities in Android applications(apps).Such technologies arecrucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world.Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitationsthey require substantial computational resources and are prone to a high frequency of false positives.This meansthat while attempting to identify security breaches,these methods often consume considerable processing powerand mistakenly flag benign activities as malicious,leading to inefficiencies and reduced reliability in malwaredetection.The proposed approach includes a data preprocessing step that removes duplicate samples,managesunbalanced datasets,corrects inconsistencies,and imputes missing values to ensure data accuracy.The Minimaxmethod is then used to normalize numerical data,followed by feature vector extraction using the Gain ratio andChi-squared test to identify and extract the most significant characteristics using an appropriate prediction model.This study focuses on extracting a subset of attributes best suited for the task and recommending a predictivemodel based on domain expert opinion.The proposed method is evaluated using Drebin and TUANDROMDdatasets containing 15,036 and 4,464 benign and malicious samples,respectively.The empirical result shows thatthe RandomForest(RF)and Support VectorMachine(SVC)classifiers achieved impressive accuracy rates of 98.9%and 98.8%,respectively,in detecting unknown Androidmalware.A sensitivity analysis experiment was also carriedout on all three ML-based classifiers based on MAE,MSE,R2,and sensitivity parameters,resulting in a flawlessperformance for both datasets.This approach has substantial potential for real-world applications and can serve asa valuable tool for preventing the spread of Androidmalware and enhancing mobile device security.展开更多
Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies.In today’s world where technology is everything...Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies.In today’s world where technology is everything,these technologies are utilized to streamline regular tasks and procedures in agriculture,one of the largest and most significant industries in every nation.This research paper stands out from existing literature on smart agriculture security by providing a comprehensive analysis and examination of security issues within smart agriculture systems.Divided into three main sections-security analysis,system architecture and design and risk assessment of Cyber-Physical Systems(CPS)applications-the study delves into various elements crucial for smart farming,such as data sources,infrastructure components,communication protocols,and the roles of different stakeholders such as farmers,agricultural scientists and researchers,technology providers,government agencies,consumers and many others.In contrast to earlier research,this work analyzes the resilience of smart agriculture systems using approaches such as threat modeling,penetration testing,and vulnerability assessments.Important discoveries highlight the concerns connected to unsecured communication protocols,possible threats from malevolent actors,and vulnerabilities in IoT devices.Furthermore,the study suggests enhancements for CPS applications,such as strong access controls,intrusion detection systems,and encryption protocols.In addition,risk assessment techniques are applied to prioritize mitigation tactics and detect potential hazards,addressing issues like data breaches,system outages,and automated farming process sabotage.The research sets itself apart even more by presenting a prototype CPS application that makes use of a digital temperature sensor.This application was first created using a Tinkercad simulator and then using actual hardware with Arduino boards.The CPS application’s defenses against potential threats and vulnerabilities are strengthened by this integrated approach,which distinguishes this research for its depth and usefulness in the field of smart agriculture security.展开更多
In 2023,pivotal advancements in artificial intelligence(AI)have significantly experienced.With that in mind,traditional methodologies,notably the p-y approach,have struggled to accurately model the complex,nonlinear s...In 2023,pivotal advancements in artificial intelligence(AI)have significantly experienced.With that in mind,traditional methodologies,notably the p-y approach,have struggled to accurately model the complex,nonlinear soil-structure interactions of laterally loaded large-diameter drilled shafts.This study undertakes a rigorous evaluation of machine learning(ML)and deep learning(DL)techniques,offering a comprehensive review of their application in addressing this geotechnical challenge.A thorough review and comparative analysis have been carried out to investigate various AI models such as artificial neural networks(ANNs),relevance vector machines(RVMs),and least squares support vector machines(LSSVMs).It was found that despite ML approaches outperforming classic methods in predicting the lateral behavior of piles,their‘black box'nature and reliance only on a data-driven approach made their results showcase statistical robustness rather than clear geotechnical insights,a fact underscored by the mathematical equations derived from these studies.Furthermore,the research identified a gap in the availability of drilled shaft datasets,limiting the extendibility of current findings to large-diameter piles.An extensive dataset,compiled from a series of lateral loading tests on free-head drilled shaft with varying properties and geometries,was introduced to bridge this gap.The paper concluded with a direction for future research,proposes the integration of physics-informed neural networks(PINNs),combining data-driven models with fundamental geotechnical principles to improve both the interpretability and predictive accuracy of AI applications in geotechnical engineering,marking a novel contribution to the field.展开更多
Breast cancer is one of the major health issues with high mortality rates and a substantial impact on patients and healthcare systems worldwide.Various Computer-Aided Diagnosis(CAD)tools,based on breast thermograms,ha...Breast cancer is one of the major health issues with high mortality rates and a substantial impact on patients and healthcare systems worldwide.Various Computer-Aided Diagnosis(CAD)tools,based on breast thermograms,have been developed for early detection of this disease.However,accurately segmenting the Region of Interest(ROI)fromthermograms remains challenging.This paper presents an approach that leverages image acquisition protocol parameters to identify the lateral breast region and estimate its bottomboundary using a second-degree polynomial.The proposed method demonstrated high efficacy,achieving an impressive Jaccard coefficient of 86%and a Dice index of 92%when evaluated against manually created ground truths.Textural features were extracted from each view’s ROI,with significant features selected via Mutual Information for training Multi-Layer Perceptron(MLP)and K-Nearest Neighbors(KNN)classifiers.Our findings revealed that the MLP classifier outperformed the KNN,achieving an accuracy of 86%,a specificity of 100%,and an Area Under the Curve(AUC)of 0.85.The consistency of the method across both sides of the breast suggests its viability as an auto-segmentation tool.Furthermore,the classification results suggests that lateral views of breast thermograms harbor valuable features that can significantly aid in the early detection of breast cancer.展开更多
This study focuses on the urgent requirement for improved accuracy in diseasemodeling by introducing a newcomputational framework called the Hybrid SIR-Fuzzy Model.By integrating the traditional Susceptible-Infectious...This study focuses on the urgent requirement for improved accuracy in diseasemodeling by introducing a newcomputational framework called the Hybrid SIR-Fuzzy Model.By integrating the traditional Susceptible-Infectious-Recovered(SIR)modelwith fuzzy logic,ourmethod effectively addresses the complex nature of epidemic dynamics by accurately accounting for uncertainties and imprecisions in both data and model parameters.The main aim of this research is to provide a model for disease transmission using fuzzy theory,which can successfully address uncertainty in mathematical modeling.Our main emphasis is on the imprecise transmission rate parameter,utilizing a three-part description of its membership level.This enhances the representation of disease processes with greater complexity and tackles the difficulties related to quantifying uncertainty in mathematical models.We investigate equilibrium points for three separate scenarios and perform a comprehensive sensitivity analysis,providing insight into the complex correlation betweenmodel parameters and epidemic results.In order to facilitate a quantitative analysis of the fuzzy model,we propose the implementation of a resilient numerical scheme.The convergence study of the scheme demonstrates its trustworthiness,providing a conditionally positive solution,which represents a significant improvement compared to current forward Euler schemes.The numerical findings demonstrate themodel’s effectiveness in accurately representing the dynamics of disease transmission.Significantly,when the mortality coefficient rises,both the susceptible and infected populations decrease,highlighting the model’s sensitivity to important epidemiological factors.Moreover,there is a direct relationship between higher Holling type rate values and a decrease in the number of individuals who are infected,as well as an increase in the number of susceptible individuals.This correlation offers a significant understanding of how many elements affect the consequences of an epidemic.Our objective is to enhance decision-making in public health by providing a thorough quantitative analysis of the Hybrid SIR-Fuzzy Model.Our approach not only tackles the existing constraints in disease modeling,but also paves the way for additional investigation,providing a vital instrument for researchers and policymakers alike.展开更多
Fractal time-dependent issues in fluid dynamics provide a distinct difficulty in numerical analysis due to their complex characteristics,necessitating specialized computing techniques for precise and economical soluti...Fractal time-dependent issues in fluid dynamics provide a distinct difficulty in numerical analysis due to their complex characteristics,necessitating specialized computing techniques for precise and economical solutions.This study presents an innovative computational approach to tackle these difficulties.The main focus is applying the Fractal Runge-Kutta Method to model the time-dependent magnetohydrodynamic(MHD)Newtonian fluid with rescaled viscosity flow on Riga plates.An efficient computational scheme is proposed for handling fractal timedependent problems in flow phenomena.The scheme is comprised of three stages and constructed using three different time levels.The stability of the scheme is shown by employing the Fourier series analysis to solve scalar problems.The scheme’s convergence is guaranteed for a time fractal partial differential equations system.The scheme is applied to the dimensionless fractal heat and mass transfer model of incompressible,unsteady,laminar,Newtonian fluid with rescaled viscosity flow over the flat and oscillatory Riga plates under the effects of spaceand temperature-dependent heat sources.The first-order back differences discretize the continuity equation.The results show that skin friction local Nusselt number declines by raising the coefficient of the temperature-dependent term of heat source and Eckert number.The numerical simulations provide valuable insights into fluid dynamics,explicitly highlighting the influence of the temperature-dependent coefficient of the heat source and the Eckert number on skin friction and local Nusselt number.展开更多
The pharmaceutical industry increasingly values medicinal plants due to their perceived safety and costeffectiveness compared to modern drugs.Throughout the extensive history of medicinal plant usage,various plant par...The pharmaceutical industry increasingly values medicinal plants due to their perceived safety and costeffectiveness compared to modern drugs.Throughout the extensive history of medicinal plant usage,various plant parts,including flowers,leaves,and roots,have been acknowledged for their healing properties and employed in plant identification.Leaf images,however,stand out as the preferred and easily accessible source of information.Manual plant identification by plant taxonomists is intricate,time-consuming,and prone to errors,relying heavily on human perception.Artificial intelligence(AI)techniques offer a solution by automating plant recognition processes.This study thoroughly examines cutting-edge AI approaches for leaf image-based plant identification,drawing insights from literature across renowned repositories.This paper critically summarizes relevant literature based on AI algorithms,extracted features,and results achieved.Additionally,it analyzes extensively used datasets in automated plant classification research.It also offers deep insights into implemented techniques and methods employed for medicinal plant recognition.Moreover,this rigorous review study discusses opportunities and challenges in employing these AI-based approaches.Furthermore,in-depth statistical findings and lessons learned from this survey are highlighted with novel research areas with the aim of offering insights to the readers and motivating new research directions.This review is expected to serve as a foundational resource for future researchers in the field of AI-based identification of medicinal plants.展开更多
Image captioning has gained increasing attention in recent years.Visual characteristics found in input images play a crucial role in generating high-quality captions.Prior studies have used visual attention mechanisms...Image captioning has gained increasing attention in recent years.Visual characteristics found in input images play a crucial role in generating high-quality captions.Prior studies have used visual attention mechanisms to dynamically focus on localized regions of the input image,improving the effectiveness of identifying relevant image regions at each step of caption generation.However,providing image captioning models with the capability of selecting the most relevant visual features from the input image and attending to them can significantly improve the utilization of these features.Consequently,this leads to enhanced captioning network performance.In light of this,we present an image captioning framework that efficiently exploits the extracted representations of the image.Our framework comprises three key components:the Visual Feature Detector module(VFD),the Visual Feature Visual Attention module(VFVA),and the language model.The VFD module is responsible for detecting a subset of the most pertinent features from the local visual features,creating an updated visual features matrix.Subsequently,the VFVA directs its attention to the visual features matrix generated by the VFD,resulting in an updated context vector employed by the language model to generate an informative description.Integrating the VFD and VFVA modules introduces an additional layer of processing for the visual features,thereby contributing to enhancing the image captioning model’s performance.Using the MS-COCO dataset,our experiments show that the proposed framework competes well with state-of-the-art methods,effectively leveraging visual representations to improve performance.The implementation code can be found here:https://github.com/althobhani/VFDICM(accessed on 30 July 2024).展开更多
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g....Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction.展开更多
Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a...Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a significant cause of cancer-related deaths globally.Early diagnosis enables healthcare providers to administer appropriate treatment measures promptly and accurately,leading to improved prognosis and higher survival rates.The significant increase in both the incidence and mortality rates of lung cancer,particularly its ranking as the second most prevalent cancer among women worldwide,underscores the need for comprehensive research into efficient screening methods.Advances in diagnostic techniques,particularly the use of computed tomography(CT)scans,have revolutionized the identification of lung cancer.CT scans are renowned for their ability to provide high-resolution images and are particularly effective in detecting small,calcified areas,crucial for identifying earlystage lung cancer.Consequently,there is growing interest in enhancing computer-aided detection(CAD)systems.These algorithms assist radiologists by reducing false-positive interpretations and improving the accuracy of early cancer diagnosis.This study aims to enhance the effectiveness of CAD systems through various methods.Initially,the Contrast Limited Adaptive Histogram Equalization(CLAHE)algorithm is employed to preprocess CT scan images,thereby improving their visual quality.Further refinement is achieved by integrating different optimization strategies with the CLAHE method.The CutMix data augmentation technique is applied to boost the performance of the proposed model.A comparative analysis is conducted using deep learning architectures such as InceptionV3,ResNet101,Xception,and EfficientNet.The study evaluates the performance of these architectures in image classification tasks,both with and without the implementation of the CLAHE algorithm.The empirical findings of the study demonstrate a significant reduction in the false positive rate(FPR)and an overall enhancement in diagnostic accuracy.This research not only contributes to the field of medical imaging but also holds significant implications for the early detection and treatment of lung cancer,ultimately aiming to reduce its mortality rates.展开更多
This paper,evaluate the effectiveness of a proposed speed loop pseudo derivative feedforward(PDFF)controller-based direct torque controller(DTC)for a PMSM drive against the performance of existing PI speed controller-...This paper,evaluate the effectiveness of a proposed speed loop pseudo derivative feedforward(PDFF)controller-based direct torque controller(DTC)for a PMSM drive against the performance of existing PI speed controller-based DTC and hysteresis current controller(HCC).The proposed PDFF-based speed regulator effectively reduces oscillation and overshoot associated with rotor angular speed,electromagnetic torque,and stator current.Two case studies,one using forward-to-reverse motoring operation and the other involving reverse-to-forward braking operation,has been validated to show the effectiveness of the proposed control strategy.The proposed controller's superior performance is demonstrated through experimental verification utilizing an FPGA controller for a 1.5 kW PMSM drive laboratory prototype.展开更多
This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intr...This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intrusion detection performance,given the vital relevance of safeguarding computer networks against harmful activity.The DNN-based IDS is trained and validated by the model using the NSL-KDD dataset,a popular benchmark for IDS research.The model performs well in both the training and validation stages,with 91.30%training accuracy and 94.38%validation accuracy.Thus,the model shows good learning and generalization capabilities with minor losses of 0.22 in training and 0.1553 in validation.Furthermore,for both macro and micro averages across class 0(normal)and class 1(anomalous)data,the study evaluates the model using a variety of assessment measures,such as accuracy scores,precision,recall,and F1 scores.The macro-average recall is 0.9422,the macro-average precision is 0.9482,and the accuracy scores are 0.942.Furthermore,macro-averaged F1 scores of 0.9245 for class 1 and 0.9434 for class 0 demonstrate the model’s ability to precisely identify anomalies precisely.The research also highlights how real-time threat monitoring and enhanced resistance against new online attacks may be achieved byDNN-based intrusion detection systems,which can significantly improve network security.The study underscores the critical function ofDNN-based IDS in contemporary cybersecurity procedures by setting the foundation for further developments in this field.Upcoming research aims to enhance intrusion detection systems by examining cooperative learning techniques and integrating up-to-date threat knowledge.展开更多
When better fuel-air mixing in the combustion chamber or a reduction in base drag are required in vehicles,rockets,and aeroplanes,the base pressure control is activated.Controlling the base pressure and drag is necess...When better fuel-air mixing in the combustion chamber or a reduction in base drag are required in vehicles,rockets,and aeroplanes,the base pressure control is activated.Controlling the base pressure and drag is necessary in both scenarios.In this work,semi-circular ribs with varying diameters(2,4,and 6 mm)positioned at six distinct positions(0.5D,1D,1.5D,2D,3D,and 4D)inside a square duct with a side of 15 mm are proposed as an efficient way to apply the passive control technique.In-depth research is done on optimising rib size for various rib sites.According to this study,the base pressure rises as rib height increases.Furthermore,the optimal location for the semi-circular ribs with a diameter of 2 mm is at 0.5D.The 1D location appears to be optimal for the 4 mm size as well.For the 6 mm size,however,the 4D position fills this function.展开更多
This study deals with base pressure management in a duct for various values of the Mach number(M),namely,Mach number corresponding to sonic and four supersonic conditions.In addition to the Mach number,the nozzle pres...This study deals with base pressure management in a duct for various values of the Mach number(M),namely,Mach number corresponding to sonic and four supersonic conditions.In addition to the Mach number,the nozzle pressure ratio(NPR),the area ratio,the rib dimension,and the duct length are influential parameters.The following specific values are examined at M=1,1.36,1.64,and 2,and NPRs between 1.5 and 10.The base pressure is determined by positioning ribs of varying heights at predetermined intervals throughout the length of the square duct.When the level of expansion is varied,it is seen that the base pressure initially drops for overexpanded flows and increases for under-expanded flows.When ribs are present,the flow field in the duct and pressure inside the duct fluctuate as the base pressure rises.Under-expanded flows can achieve a base pressure value that is suitably high without experiencing excessive changes in the duct flow in terms of static pressure if a rib height around 10%of the duct height close to the nozzle exit is considered.Rectangular rib passive control does not negatively affect the duct’s flow field.展开更多
The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability t...The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks.Further,the study suggests using an advanced approach that utilizes machine learning,specifically the Wide Residual Network(WRN),to identify hidden malware in IoT systems.The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices,using the MalMemAnalysis dataset.Moreover,thorough experimentation provides evidence for the effectiveness of the WRN-based strategy,resulting in exceptional performance measures such as accuracy,precision,F1-score,and recall.The study of the test data demonstrates highly impressive results,with a multiclass accuracy surpassing 99.97%and a binary class accuracy beyond 99.98%.The results emphasize the strength and dependability of using advanced deep learning methods such as WRN for identifying hidden malware risks in IoT environments.Furthermore,a comparison examination with the current body of literature emphasizes the originality and efficacy of the suggested methodology.This research builds upon previous studies that have investigated several machine learning methods for detecting malware on IoT devices.However,it distinguishes itself by showcasing exceptional performance metrics and validating its findings through thorough experimentation with real-world datasets.Utilizing WRN offers benefits in managing the intricacies of malware detection,emphasizing its capacity to enhance the security of IoT ecosystems.To summarize,this work proposes an effective way to address privacy concerns on IoT devices by utilizing advanced machine learning methods.The research provides useful insights into the changing landscape of IoT cybersecurity by emphasizing methodological rigor and conducting comparative performance analysis.Future research could focus on enhancing the recommended approach by adding more datasets and leveraging real-time monitoring capabilities to strengthen IoT devices’defenses against new cybersecurity threats.展开更多
Recently,there have been several uses for digital image processing.Image fusion has become a prominent application in the domain of imaging processing.To create one final image that provesmore informative and helpful ...Recently,there have been several uses for digital image processing.Image fusion has become a prominent application in the domain of imaging processing.To create one final image that provesmore informative and helpful compared to the original input images,image fusion merges two or more initial images of the same item.Image fusion aims to produce,enhance,and transform significant elements of the source images into combined images for the sake of human visual perception.Image fusion is commonly employed for feature extraction in smart robots,clinical imaging,audiovisual camera integration,manufacturing process monitoring,electronic circuit design,advanced device diagnostics,and intelligent assembly line robots,with image quality varying depending on application.The research paper presents various methods for merging images in spatial and frequency domains,including a blend of stable and curvelet transformations,everageMax-Min,weighted principal component analysis(PCA),HIS(Hue,Intensity,Saturation),wavelet transform,discrete cosine transform(DCT),dual-tree Complex Wavelet Transform(CWT),and multiple wavelet transform.Image fusion methods integrate data from several source images of an identical target,thereby enhancing information in an extremely efficient manner.More precisely,in imaging techniques,the depth of field constraint precludes images from focusing on every object,leading to the exclusion of certain characteristics.To tackle thess challanges,a very efficient multi-focus wavelet decomposition and recompositionmethod is proposed.The use of these wavelet decomposition and recomposition techniques enables this method to make use of existing optimized wavelet code and filter choice.The simulated outcomes provide evidence that the suggested approach initially extracts particular characteristics from images in order to accurately reflect the level of clarity portrayed in the original images.This study enhances the performance of the eXtreme Gradient Boosting(XGBoost)algorithm in detecting brain malignancies with greater precision through the integration of computational image analysis and feature selection.The performance of images is improved by segmenting them employing the K-Means algorithm.The segmentation method aids in identifying specific regions of interest,using Particle Swarm Optimization(PCA)for trait selection and XGBoost for data classification.Extensive trials confirm the model’s exceptional visual performance,achieving an accuracy of up to 97.067%and providing good objective indicators.展开更多
Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,hi...Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,highly-adaptable Network Intrusion Detection Systems(NIDS)that can identify anomalies.The NSL-KDD dataset is used in the study;it is a sizable collection comprising 43 variables with the label’s“attack”and“level.”It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks(CNN).Furthermore,this dataset makes it easier to conduct a thorough assessment of the suggested intrusion detection strategy.Furthermore,maintaining operating efficiency while improving detection accuracy is the primary goal of this work.Moreover,typical NIDS examines both risky and typical behavior using a variety of techniques.On the NSL-KDD dataset,our CNN-based approach achieves an astounding 99.728%accuracy rate when paired with channel attention.Compared to previous approaches such as ensemble learning,CNN,RBM(Boltzmann machine),ANN,hybrid auto-encoders with CNN,MCNN,and ANN,and adaptive algorithms,our solution significantly improves intrusion detection performance.Moreover,the results highlight the effectiveness of our suggested method in improving intrusion detection precision,signifying a noteworthy advancement in this field.Subsequent efforts will focus on strengthening and expanding our approach in order to counteract growing cyberthreats and adjust to changing network circumstances.展开更多
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online spaces.To tackle this challenge,our study introduces a ...Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online spaces.To tackle this challenge,our study introduces a new approach employing Bidirectional Encoder Representations from the Transformers(BERT)base model(cased),originally pretrained in English.This model is uniquely adapted to recognize the intricate nuances of Arabic online communication,a key aspect often overlooked in conventional cyberbullying detection methods.Our model is an end-to-end solution that has been fine-tuned on a diverse dataset of Arabic social media(SM)tweets showing a notable increase in detection accuracy and sensitivity compared to existing methods.Experimental results on a diverse Arabic dataset collected from the‘X platform’demonstrate a notable increase in detection accuracy and sensitivity compared to existing methods.E-BERT shows a substantial improvement in performance,evidenced by an accuracy of 98.45%,precision of 99.17%,recall of 99.10%,and an F1 score of 99.14%.The proposed E-BERT not only addresses a critical gap in cyberbullying detection in Arabic online forums but also sets a precedent for applying cross-lingual pretrained models in regional language applications,offering a scalable and effective framework for enhancing online safety across Arabic-speaking communities.展开更多
The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human re...The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional requirements.To address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human effort.However,existing techniques often struggle with complex instructions and large-scale projects.In our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer trees.Experimental results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT dataset.Both datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse scenarios.These findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes.展开更多
基金the support of Prince Sultan University for paying the article processing charges(APC)of this publication.
文摘This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.
基金Princess Nourah bint Abdulrahman University and Researchers Supporting Project Number(PNURSP2024R346)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘The growing usage of Android smartphones has led to a significant rise in incidents of Android malware andprivacy breaches.This escalating security concern necessitates the development of advanced technologies capableof automatically detecting andmitigatingmalicious activities in Android applications(apps).Such technologies arecrucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world.Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitationsthey require substantial computational resources and are prone to a high frequency of false positives.This meansthat while attempting to identify security breaches,these methods often consume considerable processing powerand mistakenly flag benign activities as malicious,leading to inefficiencies and reduced reliability in malwaredetection.The proposed approach includes a data preprocessing step that removes duplicate samples,managesunbalanced datasets,corrects inconsistencies,and imputes missing values to ensure data accuracy.The Minimaxmethod is then used to normalize numerical data,followed by feature vector extraction using the Gain ratio andChi-squared test to identify and extract the most significant characteristics using an appropriate prediction model.This study focuses on extracting a subset of attributes best suited for the task and recommending a predictivemodel based on domain expert opinion.The proposed method is evaluated using Drebin and TUANDROMDdatasets containing 15,036 and 4,464 benign and malicious samples,respectively.The empirical result shows thatthe RandomForest(RF)and Support VectorMachine(SVC)classifiers achieved impressive accuracy rates of 98.9%and 98.8%,respectively,in detecting unknown Androidmalware.A sensitivity analysis experiment was also carriedout on all three ML-based classifiers based on MAE,MSE,R2,and sensitivity parameters,resulting in a flawlessperformance for both datasets.This approach has substantial potential for real-world applications and can serve asa valuable tool for preventing the spread of Androidmalware and enhancing mobile device security.
文摘Smart agriculture modifies traditional farming practices,and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies.In today’s world where technology is everything,these technologies are utilized to streamline regular tasks and procedures in agriculture,one of the largest and most significant industries in every nation.This research paper stands out from existing literature on smart agriculture security by providing a comprehensive analysis and examination of security issues within smart agriculture systems.Divided into three main sections-security analysis,system architecture and design and risk assessment of Cyber-Physical Systems(CPS)applications-the study delves into various elements crucial for smart farming,such as data sources,infrastructure components,communication protocols,and the roles of different stakeholders such as farmers,agricultural scientists and researchers,technology providers,government agencies,consumers and many others.In contrast to earlier research,this work analyzes the resilience of smart agriculture systems using approaches such as threat modeling,penetration testing,and vulnerability assessments.Important discoveries highlight the concerns connected to unsecured communication protocols,possible threats from malevolent actors,and vulnerabilities in IoT devices.Furthermore,the study suggests enhancements for CPS applications,such as strong access controls,intrusion detection systems,and encryption protocols.In addition,risk assessment techniques are applied to prioritize mitigation tactics and detect potential hazards,addressing issues like data breaches,system outages,and automated farming process sabotage.The research sets itself apart even more by presenting a prototype CPS application that makes use of a digital temperature sensor.This application was first created using a Tinkercad simulator and then using actual hardware with Arduino boards.The CPS application’s defenses against potential threats and vulnerabilities are strengthened by this integrated approach,which distinguishes this research for its depth and usefulness in the field of smart agriculture security.
基金supported by Prince Sultan University(Grant No.PSU-CE-TECH-135,2023).
文摘In 2023,pivotal advancements in artificial intelligence(AI)have significantly experienced.With that in mind,traditional methodologies,notably the p-y approach,have struggled to accurately model the complex,nonlinear soil-structure interactions of laterally loaded large-diameter drilled shafts.This study undertakes a rigorous evaluation of machine learning(ML)and deep learning(DL)techniques,offering a comprehensive review of their application in addressing this geotechnical challenge.A thorough review and comparative analysis have been carried out to investigate various AI models such as artificial neural networks(ANNs),relevance vector machines(RVMs),and least squares support vector machines(LSSVMs).It was found that despite ML approaches outperforming classic methods in predicting the lateral behavior of piles,their‘black box'nature and reliance only on a data-driven approach made their results showcase statistical robustness rather than clear geotechnical insights,a fact underscored by the mathematical equations derived from these studies.Furthermore,the research identified a gap in the availability of drilled shaft datasets,limiting the extendibility of current findings to large-diameter piles.An extensive dataset,compiled from a series of lateral loading tests on free-head drilled shaft with varying properties and geometries,was introduced to bridge this gap.The paper concluded with a direction for future research,proposes the integration of physics-informed neural networks(PINNs),combining data-driven models with fundamental geotechnical principles to improve both the interpretability and predictive accuracy of AI applications in geotechnical engineering,marking a novel contribution to the field.
基金supported by the research grant(SEED-CCIS-2024-166),Prince Sultan University,Saudi Arabia。
文摘Breast cancer is one of the major health issues with high mortality rates and a substantial impact on patients and healthcare systems worldwide.Various Computer-Aided Diagnosis(CAD)tools,based on breast thermograms,have been developed for early detection of this disease.However,accurately segmenting the Region of Interest(ROI)fromthermograms remains challenging.This paper presents an approach that leverages image acquisition protocol parameters to identify the lateral breast region and estimate its bottomboundary using a second-degree polynomial.The proposed method demonstrated high efficacy,achieving an impressive Jaccard coefficient of 86%and a Dice index of 92%when evaluated against manually created ground truths.Textural features were extracted from each view’s ROI,with significant features selected via Mutual Information for training Multi-Layer Perceptron(MLP)and K-Nearest Neighbors(KNN)classifiers.Our findings revealed that the MLP classifier outperformed the KNN,achieving an accuracy of 86%,a specificity of 100%,and an Area Under the Curve(AUC)of 0.85.The consistency of the method across both sides of the breast suggests its viability as an auto-segmentation tool.Furthermore,the classification results suggests that lateral views of breast thermograms harbor valuable features that can significantly aid in the early detection of breast cancer.
文摘This study focuses on the urgent requirement for improved accuracy in diseasemodeling by introducing a newcomputational framework called the Hybrid SIR-Fuzzy Model.By integrating the traditional Susceptible-Infectious-Recovered(SIR)modelwith fuzzy logic,ourmethod effectively addresses the complex nature of epidemic dynamics by accurately accounting for uncertainties and imprecisions in both data and model parameters.The main aim of this research is to provide a model for disease transmission using fuzzy theory,which can successfully address uncertainty in mathematical modeling.Our main emphasis is on the imprecise transmission rate parameter,utilizing a three-part description of its membership level.This enhances the representation of disease processes with greater complexity and tackles the difficulties related to quantifying uncertainty in mathematical models.We investigate equilibrium points for three separate scenarios and perform a comprehensive sensitivity analysis,providing insight into the complex correlation betweenmodel parameters and epidemic results.In order to facilitate a quantitative analysis of the fuzzy model,we propose the implementation of a resilient numerical scheme.The convergence study of the scheme demonstrates its trustworthiness,providing a conditionally positive solution,which represents a significant improvement compared to current forward Euler schemes.The numerical findings demonstrate themodel’s effectiveness in accurately representing the dynamics of disease transmission.Significantly,when the mortality coefficient rises,both the susceptible and infected populations decrease,highlighting the model’s sensitivity to important epidemiological factors.Moreover,there is a direct relationship between higher Holling type rate values and a decrease in the number of individuals who are infected,as well as an increase in the number of susceptible individuals.This correlation offers a significant understanding of how many elements affect the consequences of an epidemic.Our objective is to enhance decision-making in public health by providing a thorough quantitative analysis of the Hybrid SIR-Fuzzy Model.Our approach not only tackles the existing constraints in disease modeling,but also paves the way for additional investigation,providing a vital instrument for researchers and policymakers alike.
基金support of Prince Sultan University in paying the article processing charges(APC)for this publication.
文摘Fractal time-dependent issues in fluid dynamics provide a distinct difficulty in numerical analysis due to their complex characteristics,necessitating specialized computing techniques for precise and economical solutions.This study presents an innovative computational approach to tackle these difficulties.The main focus is applying the Fractal Runge-Kutta Method to model the time-dependent magnetohydrodynamic(MHD)Newtonian fluid with rescaled viscosity flow on Riga plates.An efficient computational scheme is proposed for handling fractal timedependent problems in flow phenomena.The scheme is comprised of three stages and constructed using three different time levels.The stability of the scheme is shown by employing the Fourier series analysis to solve scalar problems.The scheme’s convergence is guaranteed for a time fractal partial differential equations system.The scheme is applied to the dimensionless fractal heat and mass transfer model of incompressible,unsteady,laminar,Newtonian fluid with rescaled viscosity flow over the flat and oscillatory Riga plates under the effects of spaceand temperature-dependent heat sources.The first-order back differences discretize the continuity equation.The results show that skin friction local Nusselt number declines by raising the coefficient of the temperature-dependent term of heat source and Eckert number.The numerical simulations provide valuable insights into fluid dynamics,explicitly highlighting the influence of the temperature-dependent coefficient of the heat source and the Eckert number on skin friction and local Nusselt number.
文摘The pharmaceutical industry increasingly values medicinal plants due to their perceived safety and costeffectiveness compared to modern drugs.Throughout the extensive history of medicinal plant usage,various plant parts,including flowers,leaves,and roots,have been acknowledged for their healing properties and employed in plant identification.Leaf images,however,stand out as the preferred and easily accessible source of information.Manual plant identification by plant taxonomists is intricate,time-consuming,and prone to errors,relying heavily on human perception.Artificial intelligence(AI)techniques offer a solution by automating plant recognition processes.This study thoroughly examines cutting-edge AI approaches for leaf image-based plant identification,drawing insights from literature across renowned repositories.This paper critically summarizes relevant literature based on AI algorithms,extracted features,and results achieved.Additionally,it analyzes extensively used datasets in automated plant classification research.It also offers deep insights into implemented techniques and methods employed for medicinal plant recognition.Moreover,this rigorous review study discusses opportunities and challenges in employing these AI-based approaches.Furthermore,in-depth statistical findings and lessons learned from this survey are highlighted with novel research areas with the aim of offering insights to the readers and motivating new research directions.This review is expected to serve as a foundational resource for future researchers in the field of AI-based identification of medicinal plants.
基金supported by the National Natural Science Foundation of China(Nos.U22A2034,62177047)High Caliber Foreign Experts Introduction Plan funded by MOST,and Central South University Research Programme of Advanced Interdisciplinary Studies(No.2023QYJC020).
文摘Image captioning has gained increasing attention in recent years.Visual characteristics found in input images play a crucial role in generating high-quality captions.Prior studies have used visual attention mechanisms to dynamically focus on localized regions of the input image,improving the effectiveness of identifying relevant image regions at each step of caption generation.However,providing image captioning models with the capability of selecting the most relevant visual features from the input image and attending to them can significantly improve the utilization of these features.Consequently,this leads to enhanced captioning network performance.In light of this,we present an image captioning framework that efficiently exploits the extracted representations of the image.Our framework comprises three key components:the Visual Feature Detector module(VFD),the Visual Feature Visual Attention module(VFVA),and the language model.The VFD module is responsible for detecting a subset of the most pertinent features from the local visual features,creating an updated visual features matrix.Subsequently,the VFVA directs its attention to the visual features matrix generated by the VFD,resulting in an updated context vector employed by the language model to generate an informative description.Integrating the VFD and VFVA modules introduces an additional layer of processing for the visual features,thereby contributing to enhancing the image captioning model’s performance.Using the MS-COCO dataset,our experiments show that the proposed framework competes well with state-of-the-art methods,effectively leveraging visual representations to improve performance.The implementation code can be found here:https://github.com/althobhani/VFDICM(accessed on 30 July 2024).
基金the support of Prince Sultan University for the Article Processing Charges(APC)of this publication。
文摘Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic,semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, andmarketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French,etc.However, the research on RomanUrdu is not up to the mark.Hence, this study focuses on detecting the author’sage and gender based on Roman Urdu text messages. The dataset used in this study is Fire’18-MaponSMS. Thisstudy proposed an ensemble model based on AdaBoostM1 and Random Forest (AMBRF) for AP using multiplelinguistic features that are stylistic, character-based, word-based, and sentence-based. The proposed model iscontrasted with several of the well-known models fromthe literature, including J48-Decision Tree (J48),Na飗e Bays(NB), K Nearest Neighbor (KNN), and Composite Hypercube on Random Projection (CHIRP), NB-Updatable,RF, and AdaboostM1. The overall outcome shows the better performance of the proposed AdaboostM1 withRandom Forest (ABMRF) with an accuracy of 54.2857% for age prediction and 71.1429% for gender predictioncalculated on stylistic features. Regarding word-based features, age and gender were considered in 50.5714% and60%, respectively. On the other hand, KNN and CHIRP show the weakest performance using all the linguisticfeatures for age and gender prediction.
基金the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University,through the Research Groups Program Grant number RGP-1444-0054.
文摘Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a significant cause of cancer-related deaths globally.Early diagnosis enables healthcare providers to administer appropriate treatment measures promptly and accurately,leading to improved prognosis and higher survival rates.The significant increase in both the incidence and mortality rates of lung cancer,particularly its ranking as the second most prevalent cancer among women worldwide,underscores the need for comprehensive research into efficient screening methods.Advances in diagnostic techniques,particularly the use of computed tomography(CT)scans,have revolutionized the identification of lung cancer.CT scans are renowned for their ability to provide high-resolution images and are particularly effective in detecting small,calcified areas,crucial for identifying earlystage lung cancer.Consequently,there is growing interest in enhancing computer-aided detection(CAD)systems.These algorithms assist radiologists by reducing false-positive interpretations and improving the accuracy of early cancer diagnosis.This study aims to enhance the effectiveness of CAD systems through various methods.Initially,the Contrast Limited Adaptive Histogram Equalization(CLAHE)algorithm is employed to preprocess CT scan images,thereby improving their visual quality.Further refinement is achieved by integrating different optimization strategies with the CLAHE method.The CutMix data augmentation technique is applied to boost the performance of the proposed model.A comparative analysis is conducted using deep learning architectures such as InceptionV3,ResNet101,Xception,and EfficientNet.The study evaluates the performance of these architectures in image classification tasks,both with and without the implementation of the CLAHE algorithm.The empirical findings of the study demonstrate a significant reduction in the false positive rate(FPR)and an overall enhancement in diagnostic accuracy.This research not only contributes to the field of medical imaging but also holds significant implications for the early detection and treatment of lung cancer,ultimately aiming to reduce its mortality rates.
基金supported by Prince Sultan University,Riyadh,Saudi Arabia,under research grant SEED-2022-CE-95。
文摘This paper,evaluate the effectiveness of a proposed speed loop pseudo derivative feedforward(PDFF)controller-based direct torque controller(DTC)for a PMSM drive against the performance of existing PI speed controller-based DTC and hysteresis current controller(HCC).The proposed PDFF-based speed regulator effectively reduces oscillation and overshoot associated with rotor angular speed,electromagnetic torque,and stator current.Two case studies,one using forward-to-reverse motoring operation and the other involving reverse-to-forward braking operation,has been validated to show the effectiveness of the proposed control strategy.The proposed controller's superior performance is demonstrated through experimental verification utilizing an FPGA controller for a 1.5 kW PMSM drive laboratory prototype.
基金Princess Nourah bint Abdulrahman University for funding this project through the Researchers Supporting Project(PNURSP2024R319)funded by the Prince Sultan University,Riyadh,Saudi Arabia.
文摘This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intrusion detection performance,given the vital relevance of safeguarding computer networks against harmful activity.The DNN-based IDS is trained and validated by the model using the NSL-KDD dataset,a popular benchmark for IDS research.The model performs well in both the training and validation stages,with 91.30%training accuracy and 94.38%validation accuracy.Thus,the model shows good learning and generalization capabilities with minor losses of 0.22 in training and 0.1553 in validation.Furthermore,for both macro and micro averages across class 0(normal)and class 1(anomalous)data,the study evaluates the model using a variety of assessment measures,such as accuracy scores,precision,recall,and F1 scores.The macro-average recall is 0.9422,the macro-average precision is 0.9482,and the accuracy scores are 0.942.Furthermore,macro-averaged F1 scores of 0.9245 for class 1 and 0.9434 for class 0 demonstrate the model’s ability to precisely identify anomalies precisely.The research also highlights how real-time threat monitoring and enhanced resistance against new online attacks may be achieved byDNN-based intrusion detection systems,which can significantly improve network security.The study underscores the critical function ofDNN-based IDS in contemporary cybersecurity procedures by setting the foundation for further developments in this field.Upcoming research aims to enhance intrusion detection systems by examining cooperative learning techniques and integrating up-to-date threat knowledge.
基金supported by the Structures and Materials(S&M)Research Lab of Prince Sultan Universitysupport of Prince Sultan University in paying the article processing charges(APC)for this publication.
文摘When better fuel-air mixing in the combustion chamber or a reduction in base drag are required in vehicles,rockets,and aeroplanes,the base pressure control is activated.Controlling the base pressure and drag is necessary in both scenarios.In this work,semi-circular ribs with varying diameters(2,4,and 6 mm)positioned at six distinct positions(0.5D,1D,1.5D,2D,3D,and 4D)inside a square duct with a side of 15 mm are proposed as an efficient way to apply the passive control technique.In-depth research is done on optimising rib size for various rib sites.According to this study,the base pressure rises as rib height increases.Furthermore,the optimal location for the semi-circular ribs with a diameter of 2 mm is at 0.5D.The 1D location appears to be optimal for the 4 mm size as well.For the 6 mm size,however,the 4D position fills this function.
文摘This study deals with base pressure management in a duct for various values of the Mach number(M),namely,Mach number corresponding to sonic and four supersonic conditions.In addition to the Mach number,the nozzle pressure ratio(NPR),the area ratio,the rib dimension,and the duct length are influential parameters.The following specific values are examined at M=1,1.36,1.64,and 2,and NPRs between 1.5 and 10.The base pressure is determined by positioning ribs of varying heights at predetermined intervals throughout the length of the square duct.When the level of expansion is varied,it is seen that the base pressure initially drops for overexpanded flows and increases for under-expanded flows.When ribs are present,the flow field in the duct and pressure inside the duct fluctuate as the base pressure rises.Under-expanded flows can achieve a base pressure value that is suitably high without experiencing excessive changes in the duct flow in terms of static pressure if a rib height around 10%of the duct height close to the nozzle exit is considered.Rectangular rib passive control does not negatively affect the duct’s flow field.
基金The authors would like to thank Princess Nourah bint Abdulrahman University for funding this project through the researchers supporting project(PNURSP2024R435)and this research was funded by the Prince Sultan University,Riyadh,Saudi Arabia.
文摘The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability to virus attacks.Further,the study suggests using an advanced approach that utilizes machine learning,specifically the Wide Residual Network(WRN),to identify hidden malware in IoT systems.The research intends to improve privacy protection by accurately identifying malicious software that undermines the security of IoT devices,using the MalMemAnalysis dataset.Moreover,thorough experimentation provides evidence for the effectiveness of the WRN-based strategy,resulting in exceptional performance measures such as accuracy,precision,F1-score,and recall.The study of the test data demonstrates highly impressive results,with a multiclass accuracy surpassing 99.97%and a binary class accuracy beyond 99.98%.The results emphasize the strength and dependability of using advanced deep learning methods such as WRN for identifying hidden malware risks in IoT environments.Furthermore,a comparison examination with the current body of literature emphasizes the originality and efficacy of the suggested methodology.This research builds upon previous studies that have investigated several machine learning methods for detecting malware on IoT devices.However,it distinguishes itself by showcasing exceptional performance metrics and validating its findings through thorough experimentation with real-world datasets.Utilizing WRN offers benefits in managing the intricacies of malware detection,emphasizing its capacity to enhance the security of IoT ecosystems.To summarize,this work proposes an effective way to address privacy concerns on IoT devices by utilizing advanced machine learning methods.The research provides useful insights into the changing landscape of IoT cybersecurity by emphasizing methodological rigor and conducting comparative performance analysis.Future research could focus on enhancing the recommended approach by adding more datasets and leveraging real-time monitoring capabilities to strengthen IoT devices’defenses against new cybersecurity threats.
基金Princess Nourah bint Abdulrahman University and Researchers Supporting Project Number(PNURSP2024R346)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Recently,there have been several uses for digital image processing.Image fusion has become a prominent application in the domain of imaging processing.To create one final image that provesmore informative and helpful compared to the original input images,image fusion merges two or more initial images of the same item.Image fusion aims to produce,enhance,and transform significant elements of the source images into combined images for the sake of human visual perception.Image fusion is commonly employed for feature extraction in smart robots,clinical imaging,audiovisual camera integration,manufacturing process monitoring,electronic circuit design,advanced device diagnostics,and intelligent assembly line robots,with image quality varying depending on application.The research paper presents various methods for merging images in spatial and frequency domains,including a blend of stable and curvelet transformations,everageMax-Min,weighted principal component analysis(PCA),HIS(Hue,Intensity,Saturation),wavelet transform,discrete cosine transform(DCT),dual-tree Complex Wavelet Transform(CWT),and multiple wavelet transform.Image fusion methods integrate data from several source images of an identical target,thereby enhancing information in an extremely efficient manner.More precisely,in imaging techniques,the depth of field constraint precludes images from focusing on every object,leading to the exclusion of certain characteristics.To tackle thess challanges,a very efficient multi-focus wavelet decomposition and recompositionmethod is proposed.The use of these wavelet decomposition and recomposition techniques enables this method to make use of existing optimized wavelet code and filter choice.The simulated outcomes provide evidence that the suggested approach initially extracts particular characteristics from images in order to accurately reflect the level of clarity portrayed in the original images.This study enhances the performance of the eXtreme Gradient Boosting(XGBoost)algorithm in detecting brain malignancies with greater precision through the integration of computational image analysis and feature selection.The performance of images is improved by segmenting them employing the K-Means algorithm.The segmentation method aids in identifying specific regions of interest,using Particle Swarm Optimization(PCA)for trait selection and XGBoost for data classification.Extensive trials confirm the model’s exceptional visual performance,achieving an accuracy of up to 97.067%and providing good objective indicators.
基金The authors would like to thank Princess Nourah bint Abdulrahman University for funding this project through the Researchers Supporting Project(PNURSP2023R319)this research was funded by the Prince Sultan University,Riyadh,Saudi Arabia.
文摘Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,highly-adaptable Network Intrusion Detection Systems(NIDS)that can identify anomalies.The NSL-KDD dataset is used in the study;it is a sizable collection comprising 43 variables with the label’s“attack”and“level.”It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks(CNN).Furthermore,this dataset makes it easier to conduct a thorough assessment of the suggested intrusion detection strategy.Furthermore,maintaining operating efficiency while improving detection accuracy is the primary goal of this work.Moreover,typical NIDS examines both risky and typical behavior using a variety of techniques.On the NSL-KDD dataset,our CNN-based approach achieves an astounding 99.728%accuracy rate when paired with channel attention.Compared to previous approaches such as ensemble learning,CNN,RBM(Boltzmann machine),ANN,hybrid auto-encoders with CNN,MCNN,and ANN,and adaptive algorithms,our solution significantly improves intrusion detection performance.Moreover,the results highlight the effectiveness of our suggested method in improving intrusion detection precision,signifying a noteworthy advancement in this field.Subsequent efforts will focus on strengthening and expanding our approach in order to counteract growing cyberthreats and adjust to changing network circumstances.
基金funded by Scientific Research Deanship at University of Ha’il-Saudi Arabia through Project Number RG-23092。
文摘Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online spaces.To tackle this challenge,our study introduces a new approach employing Bidirectional Encoder Representations from the Transformers(BERT)base model(cased),originally pretrained in English.This model is uniquely adapted to recognize the intricate nuances of Arabic online communication,a key aspect often overlooked in conventional cyberbullying detection methods.Our model is an end-to-end solution that has been fine-tuned on a diverse dataset of Arabic social media(SM)tweets showing a notable increase in detection accuracy and sensitivity compared to existing methods.Experimental results on a diverse Arabic dataset collected from the‘X platform’demonstrate a notable increase in detection accuracy and sensitivity compared to existing methods.E-BERT shows a substantial improvement in performance,evidenced by an accuracy of 98.45%,precision of 99.17%,recall of 99.10%,and an F1 score of 99.14%.The proposed E-BERT not only addresses a critical gap in cyberbullying detection in Arabic online forums but also sets a precedent for applying cross-lingual pretrained models in regional language applications,offering a scalable and effective framework for enhancing online safety across Arabic-speaking communities.
基金This work is supported by EIAS(Emerging Intelligent Autonomous Systems)Data Science Lab,Prince Sultan University,Kingdom of Saudi Arabia,by paying the APC.
文摘The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional requirements.To address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human effort.However,existing techniques often struggle with complex instructions and large-scale projects.In our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer trees.Experimental results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT dataset.Both datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse scenarios.These findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes.