期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Enhancing User Experience in AI-Powered Human-Computer Communication with Vocal Emotions Identification Using a Novel Deep Learning Method
1
作者 Ahmed Alhussen arshiya sajid ansari Mohammad sajid Mohammadi 《Computers, Materials & Continua》 2025年第2期2909-2929,共21页
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de... Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing details about the speaker’s goals and desires, as well as their internal condition. Certain vocal characteristics reveal the speaker’s mood, intention, and motivation, while word study assists the speaker’s demand to be understood. Voice emotion recognition has become an essential component of modern HCC networks. Integrating findings from the various disciplines involved in identifying vocal emotions is also challenging. Many sound analysis techniques were developed in the past. Learning about the development of artificial intelligence (AI), and especially Deep Learning (DL) technology, research incorporating real data is becoming increasingly common these days. Thus, this research presents a novel selfish herd optimization-tuned long/short-term memory (SHO-LSTM) strategy to identify vocal emotions in human communication. The RAVDESS public dataset is used to train the suggested SHO-LSTM technique. Mel-frequency cepstral coefficient (MFCC) and wiener filter (WF) techniques are used, respectively, to remove noise and extract features from the data. LSTM and SHO are applied to the extracted data to optimize the LSTM network’s parameters for effective emotion recognition. Python Software was used to execute our proposed framework. In the finding assessment phase, Numerous metrics are used to evaluate the proposed model’s detection capability, Such as F1-score (95%), precision (95%), recall (96%), and accuracy (97%). The suggested approach is tested on a Python platform, and the SHO-LSTM’s outcomes are contrasted with those of other previously conducted research. Based on comparative assessments, our suggested approach outperforms the current approaches in vocal emotion recognition. 展开更多
关键词 Human-computer communication(HCC) vocal emotions live vocal artificial intelligence(AI) deep learning(DL) selfish herd optimization-tuned long/short K term memory(SHO-LSTM)
在线阅读 下载PDF
A Detailed Review of Current AI Solutions for Enhancing Security in Internet of Things Applications
2
作者 arshiya sajid ansari Ghadir Altuwaijri +3 位作者 Fahad Alodhyani Moulay Ibrahim El-Khalil Ghembaza Shahabas Manakunnath Devasam Paramb Mohammad sajid Mohammadi 《Computers, Materials & Continua》 2025年第6期3713-3752,共40页
IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse applications.Due to their heterogeneous nature and constrai... IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse applications.Due to their heterogeneous nature and constrained resources,as well as the growing trend of using smart gadgets,there are privacy and security issues that are not adequately managed by conventional securitymeasures.This review offers a thorough analysis of contemporary AI solutions designed to enhance security within IoT ecosystems.The intersection of AI technologies,including ML,and blockchain,with IoT privacy and security is systematically examined,focusing on their efficacy in addressing core security issues.The methodology involves a detailed exploration of existing literature and research on AI-driven privacy-preserving security mechanisms in IoT.The reviewed solutions are categorized based on their ability to tackle specific security challenges.The review highlights key advancements,evaluates their practical applications,and identifies prevailing research gaps and challenges.The findings indicate that AI solutions,particularly those leveraging ML and blockchain,offerpromising enhancements to IoT privacy and security by improving threat detection capabilities and ensuring data integrity.This paper highlights how AI technologies might strengthen IoT privacy and security and offer suggestions for upcoming studies intended to address enduring problems and improve the robustness of IoT networks. 展开更多
关键词 Security in IoT applications PRIVACY-PRESERVING blockchain AI-driven security mechanisms
在线阅读 下载PDF
A Review of Image Steganography Based on Multiple Hashing Algorithm 被引量:1
3
作者 Abdullah Alenizi Mohammad sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji arshiya sajid ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms Hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部