期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
Hybrid Pythagorean Fuzzy Decision-Making Framework for Sustainable Urban Planning under Uncertainty
1
作者 Sana Shahab Vladimir Simic +2 位作者 ashit kumar dutta Mohd Anjum Dragan Pamucar 《Computer Modeling in Engineering & Sciences》 2026年第1期892-925,共34页
Environmental problems are intensifying due to the rapid growth of the population,industry,and urban infrastructure.This expansion has resulted in increased air and water pollution,intensified urban heat island effect... Environmental problems are intensifying due to the rapid growth of the population,industry,and urban infrastructure.This expansion has resulted in increased air and water pollution,intensified urban heat island effects,and greater runoff from parks and other green spaces.Addressing these challenges requires prioritizing green infrastructure and other sustainable urban development strategies.This study introduces a novel Integrated Decision Support System that combines Pythagorean Fuzzy Sets with the Advanced Alternative Ranking Order Method allowing for Two-Step Normalization(AAROM-TN),enhanced by a dual weighting strategy.The weighting approach integrates the Criteria Importance Through Intercriteria Correlation(CRITIC)method with the Criteria Importance through Means and Standard Deviation(CIMAS)technique.The originality of the proposed framework lies in its ability to objectively quantify criteria importance using CRITIC,incorporate decision-makers’preferences through CIMAS,and capture the uncertainty and hesitation inherent in human judgment via Pythagorean Fuzzy Sets.A case study evaluating green infrastructure alternatives in metropolitan regions demonstrates the applicability and effectiveness of the framework.A sensitivity analysis is conducted to examine how variations in criteria weights affect the rankings and to evaluate the robustness of the results.Furthermore,a comparative analysis highlights the practical and financial implications of each alternative by assessing their respective strengths and weaknesses. 展开更多
关键词 Sustainable urban planning criterion importance assessment two-step normalization environmental impact decision-making
在线阅读 下载PDF
Congruent Feature Selection Method to Improve the Efficacy of Machine Learning-Based Classification in Medical Image Processing
2
作者 Mohd Anjum Naoufel Kraiem +2 位作者 Hong Min ashit kumar dutta Yousef Ibrahim Daradkeh 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期357-384,共28页
Machine learning(ML)is increasingly applied for medical image processing with appropriate learning paradigms.These applications include analyzing images of various organs,such as the brain,lung,eye,etc.,to identify sp... Machine learning(ML)is increasingly applied for medical image processing with appropriate learning paradigms.These applications include analyzing images of various organs,such as the brain,lung,eye,etc.,to identify specific flaws/diseases for diagnosis.The primary concern of ML applications is the precise selection of flexible image features for pattern detection and region classification.Most of the extracted image features are irrelevant and lead to an increase in computation time.Therefore,this article uses an analytical learning paradigm to design a Congruent Feature Selection Method to select the most relevant image features.This process trains the learning paradigm using similarity and correlation-based features over different textural intensities and pixel distributions.The similarity between the pixels over the various distribution patterns with high indexes is recommended for disease diagnosis.Later,the correlation based on intensity and distribution is analyzed to improve the feature selection congruency.Therefore,the more congruent pixels are sorted in the descending order of the selection,which identifies better regions than the distribution.Now,the learning paradigm is trained using intensity and region-based similarity to maximize the chances of selection.Therefore,the probability of feature selection,regardless of the textures and medical image patterns,is improved.This process enhances the performance of ML applications for different medical image processing.The proposed method improves the accuracy,precision,and training rate by 13.19%,10.69%,and 11.06%,respectively,compared to other models for the selected dataset.The mean error and selection time is also reduced by 12.56%and 13.56%,respectively,compared to the same models and dataset. 展开更多
关键词 Computer vision feature selection machine learning region detection texture analysis image classification medical images
在线阅读 下载PDF
Improving Fundus Detection Precision in Diabetic Retinopathy Using Derivative-Based Deep Neural Networks
3
作者 Asma Aldrees Hong Min +2 位作者 ashit kumar dutta Yousef Ibrahim Daradkeh Mohd Anjum 《Computer Modeling in Engineering & Sciences》 2025年第3期2487-2511,共25页
Fundoscopic diagnosis involves assessing the proper functioning of the eye’s nerves,blood vessels,retinal health,and the impact of diabetes on the optic nerves.Fundus disorders are a major global health concern,affec... Fundoscopic diagnosis involves assessing the proper functioning of the eye’s nerves,blood vessels,retinal health,and the impact of diabetes on the optic nerves.Fundus disorders are a major global health concern,affecting millions of people worldwide due to their widespread occurrence.Fundus photography generates machine-based eye images that assist in diagnosing and treating ocular diseases such as diabetic retinopathy.As a result,accurate fundus detection is essential for early diagnosis and effective treatment,helping to prevent severe complications and improve patient outcomes.To address this need,this article introduces a Derivative Model for Fundus Detection using Deep NeuralNetworks(DMFD-DNN)to enhance diagnostic precision.Thismethod selects key features for fundus detection using the least derivative,which identifies features correlating with stored fundus images.Feature filtering relies on the minimum derivative,determined by extracting both similar and varying textures.In this research,the DNN model was integrated with the derivative model.Fundus images were segmented,features were extracted,and the DNN was iteratively trained to identify fundus regions reliably.The goal was to improve the precision of fundoscopic diagnosis by training the DNN incrementally,taking into account the least possible derivative across iterations,and using outputs from previous cycles.The hidden layer of the neural network operates on the most significant derivative,which may reduce precision across iterations.These derivatives are treated as inaccurate,and the model is subsequently trained using selective features and their corresponding extractions.The proposed model outperforms previous techniques in detecting fundus regions,achieving 94.98%accuracy and 91.57%sensitivity,with a minimal error rate of 5.43%.It significantly reduces feature extraction time to 1.462 s and minimizes computational overhead,thereby improving operational efficiency and scalability.Ultimately,the proposed model enhances diagnostic precision and reduces errors,leading to more effective fundus dysfunction diagnosis and treatment. 展开更多
关键词 Deep neural network feature extraction fundus detection medical image processing
在线阅读 下载PDF
Promoting Tailored Hotel Recommendations Based on Traveller Preferences:A Circular Intuitionistic Fuzzy Decision Support Model
4
作者 Sana Shahab Ibtehal Alazman +4 位作者 ashit kumar dutta Mohd Anjum Vladimir Simic Zeljko Stevic Nouf Abdulrahman Alqahtani 《Computer Modeling in Engineering & Sciences》 2025年第5期2155-2183,共29页
With the increasing complexity of hotel selection,traditional decision-making models often struggle to account for uncertainty and interrelated criteria.Multi-criteria decision-making(MCDM)techniques,particularly thos... With the increasing complexity of hotel selection,traditional decision-making models often struggle to account for uncertainty and interrelated criteria.Multi-criteria decision-making(MCDM)techniques,particularly those based on fuzzy logic,provide a robust framework for handling such challenges.This paper presents a novel approach to MCDM within the framework of Circular Intuitionistic Fuzzy Sets(C-IFS)by combining three distinct methodologies:Weighted Aggregated Sum Product Assessment(WASPAS),an Alternative Ranking Order Method Accounting for Two-Step Normalization(AROMAN),and the CRITIC method(Criteria Importance Through Inter-criteria Correlation).To address the dynamic nature of traveler preferences in hotel selection,the study employs a comprehensive set of criteria encompassing aspects such as location proximity,amenities,pricing,customer reviews,environmental impact,safety,booking flexibility,and cultural experiences.The CRITIC method is used to determine the importance of each criterion by assessing intercriteria correlations.AROMAN is employed for the systematic evaluation of alternatives,considering their additive relationships and providing a weighted assessment.WASPAS further analyzes the results obtained from AROMAN,incorporating both positive and negative aspects for a comprehensive evaluation.The integration of C-IFS enhances the model’s ability to manage uncertainty and imprecision in the decision-making process.Through a case study,we demonstrate the effectiveness of this integrated approach,offering decision-makers valuable insights for selecting the most suitable hotel option in alignment with the diverse preferences of contemporary travelers.This research contributes to the evolving field of decision science by showcasing the practical applicability of these methodologies within a C-IFS framework for complex decision scenarios. 展开更多
关键词 Multi-criteria decision-making circular intuitionistic fuzzy sets hotel recommendations
在线阅读 下载PDF
Design of QoS Aware Routing Protocol for IoT Assisted Clustered WSN 被引量:1
5
作者 ashit kumar dutta S.Srinivasan +4 位作者 Bobbili Prasada Rao B.Hemalatha Irina V.Pustokhina Denis A.Pustokhin Gyanendra Prasad Joshi 《Computers, Materials & Continua》 SCIE EI 2022年第5期3785-3801,共17页
In current days,the domain of Internet of Things(IoT)and Wireless Sensor Networks(WSN)are combined for enhancing the sensor related data transmission in the forthcoming networking applications.Clustering and routing t... In current days,the domain of Internet of Things(IoT)and Wireless Sensor Networks(WSN)are combined for enhancing the sensor related data transmission in the forthcoming networking applications.Clustering and routing techniques are treated as the effective methods highly used to attain reduced energy consumption and lengthen the lifetime of the WSN assisted IoT networks.In this view,this paper presents an Ensemble of Metaheuristic Optimization based QoS aware Clustering with Multihop Routing(EMOQoSCMR)Protocol for IoT assisted WSN.The proposed EMO-QoSCMR protocol aims to achieve QoS parameters such as energy,throughput,delay,and lifetime.The proposed model involves two stage processes namely clustering and routing.Firstly,the EMO-QoSCMR protocol involves crossentropy rain optimization algorithm based clustering(CEROAC)technique to select an optimal set of cluster heads(CHs)and construct clusters.Besides,oppositional chaos game optimization based routing(OCGOR)technique is employed for the optimal set of routes in the IoT assisted WSN.The proposed model derives a fitness function based on the parameters involved in the IoT nodes such as residual energy,distance to sink node,etc.The proposed EMOQoSCMR technique has resulted to an enhanced NAN of 64 nodes whereas the LEACH,PSO-ECHS,E-OEERP,and iCSHS methods have resulted in a lesser NAN of 2,10,42,and 51 rounds.The performance of the presented protocol has been evaluated interms of energy efficiency and network lifetime. 展开更多
关键词 Internet of things wireless sensor networks CLUSTERING ROUTING metaheuristics cluster head selection QoS parameters
在线阅读 下载PDF
Autonomous Unmanned Aerial Vehicles Based Decision Support System for Weed Management 被引量:1
6
作者 ashit kumar dutta Yasser Albagory +1 位作者 Abdul Rahaman Wahab Sait Ismail Mohamed Keshta 《Computers, Materials & Continua》 SCIE EI 2022年第10期899-915,共17页
Recently,autonomous systems become a hot research topic among industrialists and academicians due to their applicability in different domains such as healthcare,agriculture,industrial automation,etc.Among the interest... Recently,autonomous systems become a hot research topic among industrialists and academicians due to their applicability in different domains such as healthcare,agriculture,industrial automation,etc.Among the interesting applications of autonomous systems,their applicability in agricultural sector becomes significant.Autonomous unmanned aerial vehicles(UAVs)can be used for suitable site-specific weed management(SSWM)to improve crop productivity.In spite of substantial advancements in UAV based data collection systems,automated weed detection still remains a tedious task owing to the high resemblance of weeds to the crops.The recently developed deep learning(DL)models have exhibited effective performance in several data classification problems.In this aspect,this paper focuses on the design of autonomous UAVs with decision support system for weed management(AUAV-DSSWM)technique.The proposed AUAV-DSSWM technique intends to identify the weeds by the use of UAV images acquired from the target area.Besides,the AUAV-DSSWM technique primarily performs image acquisition and image pre-processing stages.Moreover,the Adam optimizer with You Only Look Once Object Detector-(YOLOv3)model is applied for the detection of weeds.For the effective classification of weeds and crops,the poor and rich optimization(PRO)algorithm with softmax layer is applied.The design of Adam optimizer and PRO algorithm for the parameter tuning process results in enhanced weed detection performance.A wide range of simulations take place on UAV images and the experimental results exhibit the promising performance of the AUAV-DSSWM technique over the other recent techniques with the accy of 99.23%. 展开更多
关键词 Autonomous systems object detection precision agriculture unmanned aerial vehicles deep learning parameter tuning
在线阅读 下载PDF
Intelligent Feature Selection with Deep Learning Based Financial Risk Assessment Model 被引量:1
7
作者 Thavavel Vaiyapuri K.Priyadarshini +4 位作者 A.Hemlathadhevi M.Dhamodaran ashit kumar dutta Irina V.Pustokhina Denis A.Pustokhin 《Computers, Materials & Continua》 SCIE EI 2022年第8期2429-2444,共16页
Due to global financial crisis,risk management has received significant attention to avoid loss and maximize profit in any business.Since the financial crisis prediction(FCP)process is mainly based on data driven deci... Due to global financial crisis,risk management has received significant attention to avoid loss and maximize profit in any business.Since the financial crisis prediction(FCP)process is mainly based on data driven decision making and intelligent models,artificial intelligence(AI)and machine learning(ML)models are widely utilized.This article introduces an intelligent feature selection with deep learning based financial risk assessment model(IFSDL-FRA).The proposed IFSDL-FRA technique aims to determine the financial crisis of a company or enterprise.In addition,the IFSDL-FRA technique involves the design of new water strider optimization algorithm based feature selection(WSOA-FS)manner to an optimum selection of feature subsets.Moreover,Deep Random Vector Functional Link network(DRVFLN)classification technique was applied to properly allot the class labels to the financial data.Furthermore,improved fruit fly optimization algorithm(IFFOA)based hyperparameter tuning process is carried out to optimally tune the hyperparameters of the DRVFLN model.For enhancing the better performance of the IFSDL-FRA technique,an extensive set of simulations are implemented on benchmark financial datasets and the obtained outcomes determine the betterment of IFSDL-FRA technique on the recent state of art approaches. 展开更多
关键词 Financial risks intelligent models financial crisis prediction deep learning feature selection metaheuristics
在线阅读 下载PDF
Optimal Deep Learning Enabled Statistical Analysis Model for Traffic Prediction 被引量:1
8
作者 ashit kumar dutta S.Srinivasan +4 位作者 S.N.kumar T.S.Balaji Won Il Lee Gyanendra Prasad Joshi Sung Won Kim 《Computers, Materials & Continua》 SCIE EI 2022年第9期5563-5576,共14页
Due to the advances of intelligent transportation system(ITSs),traffic forecasting has gained significant interest as robust traffic prediction acts as an important part in different ITSs namely traffic signal control... Due to the advances of intelligent transportation system(ITSs),traffic forecasting has gained significant interest as robust traffic prediction acts as an important part in different ITSs namely traffic signal control,navigation,route mapping,etc.The traffic prediction model aims to predict the traffic conditions based on the past traffic data.For more accurate traffic prediction,this study proposes an optimal deep learning-enabled statistical analysis model.This study offers the design of optimal convolutional neural network with attention long short term memory(OCNN-ALSTM)model for traffic prediction.The proposed OCNN-ALSTM technique primarily preprocesses the traffic data by the use of min-max normalization technique.Besides,OCNN-ALSTM technique was executed for classifying and predicting the traffic data in real time cases.For enhancing the predictive outcomes of the OCNN-ALSTM technique,the bird swarm algorithm(BSA)is employed to it and thereby overall efficacy of the network gets improved.The design of BSA for optimal hyperparameter tuning of the CNN-ALSTM model shows the novelty of the work.The experimental validation of the OCNNALSTM technique is performed using benchmark datasets and the results are examined under several aspects.The simulation results reported the enhanced outcomes of the OCNN-ALSTM model over the recent methods under several dimensions. 展开更多
关键词 Statistical analysis predictive models deep learning traffic prediction bird swarm algorithm
在线阅读 下载PDF
Intelligent Student Mental Health Assessment Model on Learning Management System 被引量:1
9
作者 Nasser Ali Aljarallah ashit kumar dutta +1 位作者 Majed Alsanea Abdul Rahaman Wahab Sait 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1853-1868,共16页
A learning management system(LMS)is a software or web based application,commonly utilized for planning,designing,and assessing a particular learning procedure.Generally,the LMS offers a method of creating and deliveri... A learning management system(LMS)is a software or web based application,commonly utilized for planning,designing,and assessing a particular learning procedure.Generally,the LMS offers a method of creating and delivering content to the instructor,monitoring students’involvement,and validating their outcomes.Since mental health issues become common among studies in higher education globally,it is needed to properly determine it to improve mental stabi-lity.This article develops a new seven spot lady bird feature selection with opti-mal sparse autoencoder(SSLBFS-OSAE)model to assess students’mental health on LMS.The major aim of the SSLBFS-OSAE model is to determine the proper health status of the students with respect to depression,anxiety,and stress(DAS).The SSLBFS-OSAE model involves a new SSLBFS model to elect a useful set of features.In addition,OSAE model is applied for the classification of mental health conditions and the performance can be improved by the use of cuckoo search optimization(CSO)based parameter tuning process.The design of CSO algorithm for optimally tuning the SAE parameters results in enhanced classifica-tion outcomes.For examining the improved classifier results of the SSLBFS-OSAE model,a comprehensive results analysis is done and the obtained values highlighted the supremacy of the SSLBFS model over its recent methods interms of different measures. 展开更多
关键词 Learning management system mental health assessment intelligent models machine learning feature selection performance assessment
在线阅读 下载PDF
Ensemble Deep Learning with Chimp Optimization Based Medical Data Classification 被引量:1
10
作者 ashit kumar dutta Yasser Albagory +2 位作者 Majed Alsanea Hamdan I.Almohammed Abdul Rahaman Wahab Sait 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1643-1655,共13页
Eye state classification acts as a vital part of the biomedical sector,for instance,smart home device control,drowsy driving recognition,and so on.The modifications in the cognitive levels can be reflected via transformi... Eye state classification acts as a vital part of the biomedical sector,for instance,smart home device control,drowsy driving recognition,and so on.The modifications in the cognitive levels can be reflected via transforming the electro-encephalogram(EEG)signals.The deep learning(DL)models automated extract the features and often showcased improved outcomes over the conventional clas-sification model in the recognition processes.This paper presents an Ensemble Deep Learning with Chimp Optimization Algorithm for EEG Eye State Classifi-cation(EDLCOA-ESC).The proposed EDLCOA-ESC technique involves min-max normalization approach as a pre-processing step.Besides,wavelet packet decomposition(WPD)technique is employed for the extraction of useful features from the EEG signals.In addition,an ensemble of deep sparse autoencoder(DSAE)and kernel ridge regression(KRR)models are employed for EEG Eye State classification.Finally,hyperparameters tuning of the DSAE model takes place using COA and thereby boost the classification results to a maximum extent.An extensive range of simulation analysis on the benchmark dataset is car-ried out and the results reported the promising performance of the EDLCOA-ESC technique over the recent approaches with maximum accuracy of 98.50%. 展开更多
关键词 EEG eye state data classification deep learning medical data analysis chimp optimization algorithm
在线阅读 下载PDF
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
11
作者 Ali Arshad Muhammad Nadeem +6 位作者 Saman Riaz Syeda Wajiha Zahra ashit kumar dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第5期3065-3089,共25页
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog... There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm. 展开更多
关键词 CRYPTOGRAPHY symmetric cipher text ENCRYPTION matrix cipher encoding decoding hill matrix 64-bit encryption
在线阅读 下载PDF
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
12
作者 Muhammad Nadeem Ali Arshad +4 位作者 Saman Riaz Syeda Wajiha Zahra ashit kumar dutta Moteeb Al Moteri Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第2期4059-4079,共21页
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve... Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data.This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse.If this algorithm is applied to the cloud network,the attacker will not be able to access the data.To encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been implemented.After that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this text.The capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain text.The data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been obtained.At the end of the article,the latest technique will be compared with different techniques.There will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis. 展开更多
关键词 Symmetric CRYPTOGRAPHY CIPHERTEXT encryption DECRYPTION cloud security matrix cipher
在线阅读 下载PDF
Hybrid Deep Learning Enabled Air Pollution Monitoring in ITS Environment
13
作者 ashit kumar dutta Jenyfal Sampson +4 位作者 Sultan Ahmad T.Avudaiappan Kanagaraj Narayanasamy Irina V.Pustokhina Denis A.Pustokhin 《Computers, Materials & Continua》 SCIE EI 2022年第7期1157-1172,共16页
Intelligent Transportation Systems(ITS)have become a vital part in improving human lives and modern economy.It aims at enhancing road safety and environmental quality.There is a tremendous increase observed in the num... Intelligent Transportation Systems(ITS)have become a vital part in improving human lives and modern economy.It aims at enhancing road safety and environmental quality.There is a tremendous increase observed in the number of vehicles in recent years,owing to increasing population.Each vehicle has its own individual emission rate;however,the issue arises when the emission rate crosses a standard value.Owing to the technological advances made in Artificial Intelligence(AI)techniques,it is easy to leverage it to develop prediction approaches so as to monitor and control air pollution.The current research paper presents Oppositional Shark Shell Optimization with Hybrid Deep Learning Model for Air Pollution Monitoring(OSSOHDLAPM)in ITS environment.The proposed OSSO-HDLAPM technique includes a set of sensors embedded in vehicles to measure the level of pollutants.In addition,hybridized Convolution Neural Network with Long Short-Term Memory(HCNN-LSTM)model is used to predict pollutant level based on the data attained earlier by the sensors.In HCNN-LSTM model,the hyperparameters are selected and optimized using OSSO algorithm.In order to validate the performance of the proposed OSSO-HDLAPM technique,a series of experiments was conducted and the obtained results showcase the superior performance of OSSO-HDLAPM technique under different evaluation parameters. 展开更多
关键词 Deep learning air pollution environment monitoring internet of things intelligent transportation systems oppositional learning LSTM model
在线阅读 下载PDF
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
14
作者 Syeda Wajiha Zahra Muhammad Nadeem +6 位作者 Ali Arshad Saman Riaz Muhammad Abu Bakr ashit kumar dutta Zaid Alzaid Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2024年第1期589-616,共28页
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear... Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms. 展开更多
关键词 Replay attack MALWARE message attack file encryption CRYPTOLOGY data security
在线阅读 下载PDF
Sailfish Optimizer with EfficientNet Model for Apple Leaf Disease Detection
15
作者 Mazen Mushabab Alqahtani ashit kumar dutta +4 位作者 Sultan Almotairi M.Ilayaraja Amani Abdulrahman Albraikan Fahd N.Al-Wesabi Mesfer Al Duhayyim 《Computers, Materials & Continua》 SCIE EI 2023年第1期217-233,共17页
Recent developments in digital cameras and electronic gadgets coupled with Machine Learning(ML)and Deep Learning(DL)-based automated apple leaf disease detection models are commonly employed as reasonable alternatives... Recent developments in digital cameras and electronic gadgets coupled with Machine Learning(ML)and Deep Learning(DL)-based automated apple leaf disease detection models are commonly employed as reasonable alternatives to traditional visual inspection models.In this background,the current paper devises an Effective Sailfish Optimizer with EfficientNet-based Apple Leaf disease detection(ESFO-EALD)model.The goal of the proposed ESFO-EALD technique is to identify the occurrence of plant leaf diseases automatically.In this scenario,Median Filtering(MF)approach is utilized to boost the quality of apple plant leaf images.Moreover,SFO with Kapur’s entropy-based segmentation technique is also utilized for the identification of the affected plant region from test image.Furthermore,Adam optimizer with EfficientNet-based feature extraction and Spiking Neural Network(SNN)-based classification are employed to detect and classify the apple plant leaf images.A wide range of simulations was conducted to ensure the effective outcomes of ESFO-EALD technique on benchmark dataset.The results reported the supremacy of the proposed ESFO-EALD approach than the existing approaches. 展开更多
关键词 AGRICULTURE computer vision image processing deep learning metaheuristics image segmentation
在线阅读 下载PDF
Bird Swarm Algorithm with Fuzzy Min-Max Neural Network for Financial Crisis Prediction
16
作者 K.Pradeep Mohan kumar S.Dhanasekaran +4 位作者 I.S.Hephzi Punithavathi P.Duraipandy ashit kumar dutta Irina V.Pustokhina Denis A.Pustokhin 《Computers, Materials & Continua》 SCIE EI 2022年第10期1541-1555,共15页
Financial crisis prediction(FCP)models are used for predicting or forecasting the financial status of a company or financial firm.It is considered a challenging issue in the financial sector.Statistical and machine le... Financial crisis prediction(FCP)models are used for predicting or forecasting the financial status of a company or financial firm.It is considered a challenging issue in the financial sector.Statistical and machine learning(ML)models can be employed for the design of accurate FCP models.Though numerous works have existed in the literature,it is needed to design effective FCP models adaptable to different datasets.This study designs a new bird swarm algorithm(BSA)with fuzzy min-max neural network(FMM-NN)model,named BSA-FMMNN for FCP.The major intention of the BSA-FMMNN model is to determine the financial status of a firm or company.The presented BSA-FMMNN model primarily undergoes minmax normalization to transform the data into uniformity range.Besides,k-medoid clustering approach is employed for the outlier removal process.Finally,the classification process is carried out using the FMMNN model,and the parameters involved in it are tuned by the use of BSA.The utilization of proficient parameter selection process using BSA demonstrate the novelty of the study.The experimental result analysis of the BSA-FMMNN model is validated using benchmark dataset and the comparative outcomes highlighted the supremacy of the BSA-FMMNN model over the recent approaches. 展开更多
关键词 Financial crisis predictive model machine learning outlier removal CLUSTERING metaheuristics
在线阅读 下载PDF
Deep Learning Enabled Disease Diagnosis for Secure Internet of Medical Things
17
作者 Sultan Ahmad Shakir Khan +4 位作者 Mohamed Fahad Al.Ajmi ashit kumar dutta L.Minh Dang Gyanendra Prasad Joshi Hyeonjoon Moon 《Computers, Materials & Continua》 SCIE EI 2022年第10期965-979,共15页
In recent times,Internet of Medical Things(IoMT)gained much attention in medical services and healthcare management domain.Since healthcare sector generates massive volumes of data like personal details,historical med... In recent times,Internet of Medical Things(IoMT)gained much attention in medical services and healthcare management domain.Since healthcare sector generates massive volumes of data like personal details,historical medical data,hospitalization records,and discharging records,IoMT devices too evolved with potentials to handle such high quantities of data.Privacy and security of the data,gathered by IoMT gadgets,are major issues while transmitting or saving it in cloud.The advancements made in Artificial Intelligence(AI)and encryption techniques find a way to handle massive quantities of medical data and achieve security.In this view,the current study presents a new Optimal Privacy Preserving and Deep Learning(DL)-based Disease Diagnosis(OPPDL-DD)in IoMT environment.Initially,the proposed model enables IoMT devices to collect patient data which is then preprocessed to optimize quality.In order to decrease the computational difficulty during diagnosis,Radix Tree structure is employed.In addition,ElGamal public key cryptosystem with Rat Swarm Optimizer(EIG-RSO)is applied to encrypt the data.Upon the transmission of encrypted data to cloud,respective decryption process occurs and the actual data gets reconstructed.Finally,a hybridized methodology combining Gated Recurrent Unit(GRU)with Convolution Neural Network(CNN)is exploited as a classification model to diagnose the disease.Extensive sets of simulations were conducted to highlight the performance of the proposed model on benchmark dataset.The experimental outcomes ensure that the proposed model is superior to existing methods under different measures. 展开更多
关键词 Internet of medical things PRIVACY security ENCRYPTION radix tree deep learning
在线阅读 下载PDF
Deep Learning Enabled Object Detection and Tracking Model for Big Data Environment
18
作者 K.Vijaya kumar E.Laxmi Lydia +4 位作者 ashit kumar dutta Velmurugan Subbiah Parvathy Gobi Ramasamy Irina V.Pustokhina Denis A.Pustokhin 《Computers, Materials & Continua》 SCIE EI 2022年第11期2541-2554,共14页
Recently,big data becomes evitable due to massive increase in the generation of data in real time application.Presently,object detection and tracking applications becomes popular among research communities and finds u... Recently,big data becomes evitable due to massive increase in the generation of data in real time application.Presently,object detection and tracking applications becomes popular among research communities and finds useful in different applications namely vehicle navigation,augmented reality,surveillance,etc.This paper introduces an effective deep learning based object tracker using Automated Image Annotation with Inception v2 based Faster RCNN(AIA-IFRCNN)model in big data environment.The AIA-IFRCNN model annotates the images by Discriminative Correlation Filter(DCF)with Channel and Spatial Reliability tracker(CSR),named DCF-CSRT model.The AIA-IFRCNN technique employs Faster RCNN for object detection and tracking,which comprises region proposal network(RPN)and Fast R-CNN.In addition,inception v2 model is applied as a shared convolution neural network(CNN)to generate the feature map.Lastly,softmax layer is applied to perform classification task.The effectiveness of the AIA-IFRCNN method undergoes experimentation against a benchmark dataset and the results are assessed under diverse aspects with maximum detection accuracy of 97.77%. 展开更多
关键词 Object detection TRACKING convolutional neural network inception v2 image annotation
在线阅读 下载PDF
Optimal Sparse Autoencoder Based Sleep Stage Classification Using Biomedical Signals
19
作者 ashit kumar dutta Yasser Albagory +2 位作者 Manal Al Faraj Yasir A.M.Eltahir Abdul Rahaman Wahab Sait 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1517-1529,共13页
The recently developed machine learning(ML)models have the ability to obtain high detection rate using biomedical signals.Therefore,this article develops an Optimal Sparse Autoencoder based Sleep Stage Classification M... The recently developed machine learning(ML)models have the ability to obtain high detection rate using biomedical signals.Therefore,this article develops an Optimal Sparse Autoencoder based Sleep Stage Classification Model on Electroencephalography(EEG)Biomedical Signals,named OSAE-SSCEEG technique.The major intention of the OSAE-SSCEEG technique is tofind the sleep stage disorders using the EEG biomedical signals.The OSAE-SSCEEG technique primarily undergoes preprocessing using min-max data normalization approach.Moreover,the classification of sleep stages takes place using the Sparse Autoencoder with Smoothed Regularization(SAE-SR)with softmax(SM)approach.Finally,the parameter optimization of the SAE-SR technique is carried out by the use of Coyote Optimization Algorithm(COA)and it leads to boosted classification efficiency.In order to ensure the enhanced performance of the OSAE-SSCEEG technique,a wide ranging simulation analysis is performed and the obtained results demonstrate the betterment of the OSAE-SSCEEG tech-nique over the recent methods. 展开更多
关键词 Biomedical signals EEG sleep stage classification machine learning autoencoder softmax parameter tuning
在线阅读 下载PDF
An Optimization Approach for Convolutional Neural Network Using Non-Dominated Sorted Genetic Algorithm-Ⅱ
20
作者 Afia Zafar Muhammad Aamir +6 位作者 Nazri Mohd Nawi Ali Arshad Saman Riaz Abdulrahman Alruban ashit kumar dutta Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第3期5641-5661,共21页
In computer vision,convolutional neural networks have a wide range of uses.Images representmost of today’s data,so it’s important to know how to handle these large amounts of data efficiently.Convolutional neural ne... In computer vision,convolutional neural networks have a wide range of uses.Images representmost of today’s data,so it’s important to know how to handle these large amounts of data efficiently.Convolutional neural networks have been shown to solve image processing problems effectively.However,when designing the network structure for a particular problem,you need to adjust the hyperparameters for higher accuracy.This technique is time consuming and requires a lot of work and domain knowledge.Designing a convolutional neural network architecture is a classic NP-hard optimization challenge.On the other hand,different datasets require different combinations of models or hyperparameters,which can be time consuming and inconvenient.Various approaches have been proposed to overcome this problem,such as grid search limited to low-dimensional space and queuing by random selection.To address this issue,we propose an evolutionary algorithm-based approach that dynamically enhances the structure of Convolution Neural Networks(CNNs)using optimized hyperparameters.This study proposes a method using Non-dominated sorted genetic algorithms(NSGA)to improve the hyperparameters of the CNN model.In addition,different types and parameter ranges of existing genetic algorithms are used.Acomparative study was conducted with various state-of-the-art methodologies and algorithms.Experiments have shown that our proposed approach is superior to previous methods in terms of classification accuracy,and the results are published in modern computing literature. 展开更多
关键词 Non-dominated sorted genetic algorithm convolutional neural network hyper-parameter OPTIMIZATION
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部