期刊文献+
共找到33篇文章
< 1 2 >
每页显示 20 50 100
Comprehensive Review and Analysis on Facial Emotion Recognition:Performance Insights into Deep and Traditional Learning with Current Updates and Challenges
1
作者 Amjad Rehman Muhammad Mujahid +2 位作者 Alex Elyassih Bayan AlGhofaily Saeed Ali Omer Bahaj 《Computers, Materials & Continua》 SCIE EI 2025年第1期41-72,共32页
In computer vision and artificial intelligence,automatic facial expression-based emotion identification of humans has become a popular research and industry problem.Recent demonstrations and applications in several fi... In computer vision and artificial intelligence,automatic facial expression-based emotion identification of humans has become a popular research and industry problem.Recent demonstrations and applications in several fields,including computer games,smart homes,expression analysis,gesture recognition,surveillance films,depression therapy,patientmonitoring,anxiety,and others,have brought attention to its significant academic and commercial importance.This study emphasizes research that has only employed facial images for face expression recognition(FER),because facial expressions are a basic way that people communicate meaning to each other.The immense achievement of deep learning has resulted in a growing use of its much architecture to enhance efficiency.This review is on machine learning,deep learning,and hybrid methods’use of preprocessing,augmentation techniques,and feature extraction for temporal properties of successive frames of data.The following section gives a brief summary of assessment criteria that are accessible to the public and then compares them with benchmark results the most trustworthy way to assess FER-related research topics statistically.In this review,a brief synopsis of the subject matter may be beneficial for novices in the field of FER as well as seasoned scholars seeking fruitful avenues for further investigation.The information conveys fundamental knowledge and provides a comprehensive understanding of the most recent state-of-the-art research. 展开更多
关键词 Face emotion recognition deep learning hybrid learning CK+ facial images machine learning technological development
在线阅读 下载PDF
SESDP:A Sentiment Analysis-Driven Approach for Enhancing Software Product Security by Identifying Defects through Social Media Reviews
2
作者 Farah Mohammad Saad Al-Ahmadi Jalal Al-Muhtadi 《Computers, Materials & Continua》 2025年第4期1327-1345,共19页
Software defect prediction is a critical component in maintaining software quality,enabling early identification and resolution of issues that could lead to system failures and significant financial losses.With the in... Software defect prediction is a critical component in maintaining software quality,enabling early identification and resolution of issues that could lead to system failures and significant financial losses.With the increasing reliance on user-generated content,social media reviews have emerged as a valuable source of real-time feedback,offering insights into potential software defects that traditional testing methods may overlook.However,existing models face challenges like handling imbalanced data,high computational complexity,and insufficient inte-gration of contextual information from these reviews.To overcome these limitations,this paper introduces the SESDP(Sentiment Analysis-Based Early Software Defect Prediction)model.SESDP employs a Transformer-Based Multi-Task Learning approach using Robustly Optimized Bidirectional Encoder Representations from Transformers Approach(RoBERTa)to simultaneously perform sentiment analysis and defect prediction.By integrating text embedding extraction,sentiment score computation,and feature fusion,the model effectively captures both the contextual nuances and sentiment expressed in user reviews.Experimental results show that SESDP achieves superior performance with an accuracy of 96.37%,precision of 94.7%,and recall of 95.4%,particularly excelling in handling imbalanced datasets compared to baseline models.This approach offers a scalable and efficient solution for early software defect detection,enhancing proactive software quality assurance. 展开更多
关键词 Software defect data balancing feature extraction RoBERTa transformer
在线阅读 下载PDF
OMD-RAS:Optimizing Malware Detection through Comprehensive Approach to Real-Time and Adaptive Security
3
作者 Farah Mohammad Saad Al-Ahmadi Jalal Al-Muhtadi 《Computers, Materials & Continua》 2025年第9期5995-6014,共20页
Malware continues to pose a significant threat to cybersecurity,with new advanced infections that go beyond traditional detection.Limitations in existing systems include high false-positive rates,slow system response ... Malware continues to pose a significant threat to cybersecurity,with new advanced infections that go beyond traditional detection.Limitations in existing systems include high false-positive rates,slow system response times,and inability to respond quickly to new malware forms.To overcome these challenges,this paper proposes OMD-RAS:Implementing Malware Detection in an Optimized Way through Real-Time and Adaptive Security as an extensive approach,hoping to get good results towards better malware threat detection and remediation.The significant steps in the model are data collection followed by comprehensive preprocessing consisting of feature engineering and normalization.Static analysis,along with dynamic analysis,is done to capture the whole spectrum of malware behavior for the feature extraction process.The extracted processed features are given with a continuous learning mechanism to the Extreme Learning Machine model of real-time detection.This OMD-RAS trains quickly and has great accuracy,providing elite,advanced real-time detection capabilities.This approach uses continuous learning to adapt to new threats—ensuring the effectiveness of detection even as strategies used by malware may change over time.The experimental results showed that OMD-RAS performs better than the traditional approaches.For instance,the OMD-RAS model has been able to achieve an accuracy of 96.23%and massively reduce the rate of false positives across all datasets while eliciting a consistently high rate of precision and recall.The model’s adaptive learning reflected enhancements on other performance measures-for example,Matthews Correlation Coefficients and Log Loss. 展开更多
关键词 MALWARE adaptive security feature engineering ELM Kafka
暂未订购
Novel Feature Extractor Framework in Conjunction with Supervised Three Class-XGBoost Algorithm for Osteosarcoma Detection from Whole Slide Medical Histopathology Images
4
作者 Tanzila Saba Muhammad Mujahid +2 位作者 Shaha Al-Otaibi Noor Ayesha Amjad Rehman Khan 《Computers, Materials & Continua》 2025年第2期3337-3353,共17页
Osteosarcomas are malignant neoplasms derived from undifferentiated osteogenic mesenchymal cells. It causes severe and permanent damage to human tissue and has a high mortality rate. The condition has the capacity to ... Osteosarcomas are malignant neoplasms derived from undifferentiated osteogenic mesenchymal cells. It causes severe and permanent damage to human tissue and has a high mortality rate. The condition has the capacity to occur in any bone;however, it often impacts long bones like the arms and legs. Prompt identification and prompt intervention are essential for augmenting patient longevity. However, the intricate composition and erratic placement of osteosarcoma provide difficulties for clinicians in accurately determining the scope of the afflicted area. There is a pressing requirement for developing an algorithm that can automatically detect bone tumors with tremendous accuracy. Therefore, in this study, we proposed a novel feature extractor framework associated with a supervised three-class XGBoost algorithm for the detection of osteosarcoma in whole slide histopathology images. This method allows for quicker and more effective data analysis. The first step involves preprocessing the imbalanced histopathology dataset, followed by augmentation and balancing utilizing two techniques: SMOTE and ADASYN. Next, a unique feature extraction framework is used to extract features, which are then inputted into the supervised three-class XGBoost algorithm for classification into three categories: non-tumor, viable tumor, and non-viable tumor. The experimental findings indicate that the proposed model exhibits superior efficiency, accuracy, and a more lightweight design in comparison to other current models for osteosarcoma detection. 展开更多
关键词 Medical image processing deep learning healthcare image classification HISTOPATHOLOGY
暂未订购
Harnessing Machine Learning for Superior Prediction of Uniaxial Compressive Strength in Reinforced Soilcrete
5
作者 Ala’a R.Al-Shamasneh Faten Khalid Karim Arsalan Mahmoodzadeh 《Computers, Materials & Continua》 2025年第7期281-303,共23页
Soilcrete is a composite material of soil and cement that is highly valued in the construction industry.Accurate measurement of its mechanical properties is essential,but laboratory testing methods are expensive,timec... Soilcrete is a composite material of soil and cement that is highly valued in the construction industry.Accurate measurement of its mechanical properties is essential,but laboratory testing methods are expensive,timeconsuming,and include inaccuracies.Machine learning(ML)algorithms provide a more efficient alternative for this purpose,so after assessment with a statistical extraction method,ML algorithms including back-propagation neural network(BPNN),K-nearest neighbor(KNN),radial basis function(RBF),feed-forward neural networks(FFNN),and support vector regression(SVR)for predicting the uniaxial compressive strength(UCS)of soilcrete,were proposed in this study.The developed models in this study were optimized using an optimization technique,gradient descent(GD),throughout the analysis(direct optimization for neural networks and indirect optimization for other models corresponding to their hyperparameters).After doing laboratory analysis,data pre-preprocessing,and data-processing analysis,a database including 600 soilcrete specimens was gathered,which includes two different soil types(clay and limestone)and metakaolin as a mineral additive.80%of the database was used for the training set and 20%for testing,considering eight input parameters,including metakaolin content,soil type,superplasticizer content,water-to-binder ratio,shrinkage,binder,density,and ultrasonic velocity.The analysis showed that most algorithms performed well in the prediction,with BPNN,KNN,and RBF having higher accuracy compared to others(R^(2)=0.95,0.95,0.92,respectively).Based on this evaluation,it was observed that all models show an acceptable accuracy rate in prediction(RMSE:BPNN=0.11,FFNN=0.24,KNN=0.05,SVR=0.06,RBF=0.05,MAD:BPNN=0.006,FFNN=0.012,KNN=0.008,SVR=0.006,RBF=0.009).The ML importance ranking-sensitivity analysis indicated that all input parameters influence theUCS of soilcrete,especially the water-to-binder ratio and density,which have themost impact. 展开更多
关键词 Soilcrete laboratory analysis uniaxial compressive strength machine learning sensitivity analysis
在线阅读 下载PDF
Intrusion Detection Model on Network Data with Deep Adaptive Multi-Layer Attention Network(DAMLAN)
6
作者 Fatma S.Alrayes Syed Umar Amin +2 位作者 Nada Ali Hakami Mohammed K.Alzaylaee Tariq Kashmeery 《Computer Modeling in Engineering & Sciences》 2025年第7期581-614,共34页
The growing incidence of cyberattacks necessitates a robust and effective Intrusion Detection Systems(IDS)for enhanced network security.While conventional IDSs can be unsuitable for detecting different and emerging at... The growing incidence of cyberattacks necessitates a robust and effective Intrusion Detection Systems(IDS)for enhanced network security.While conventional IDSs can be unsuitable for detecting different and emerging attacks,there is a demand for better techniques to improve detection reliability.This study introduces a new method,the Deep Adaptive Multi-Layer Attention Network(DAMLAN),to boost the result of intrusion detection on network data.Due to its multi-scale attention mechanisms and graph features,DAMLAN aims to address both known and unknown intrusions.The real-world NSL-KDD dataset,a popular choice among IDS researchers,is used to assess the proposed model.There are 67,343 normal samples and 58,630 intrusion attacks in the training set,12,833 normal samples,and 9711 intrusion attacks in the test set.Thus,the proposed DAMLAN method is more effective than the standard models due to the consideration of patterns by the attention layers.The experimental performance of the proposed model demonstrates that it achieves 99.26%training accuracy and 90.68%testing accuracy,with precision reaching 98.54%on the training set and 96.64%on the testing set.The recall and F1 scores again support the model with training set values of 99.90%and 99.21%and testing set values of 86.65%and 91.37%.These results provide a strong basis for the claims made regarding the model’s potential to identify intrusion attacks and affirm its relatively strong overall performance,irrespective of type.Future work would employ more attempts to extend the scalability and applicability of DAMLAN for real-time use in intrusion detection systems. 展开更多
关键词 Intrusion detection deep adaptive networks multi-layer attention DAMLAN network security anomaly detection
在线阅读 下载PDF
Mango Disease Detection Using Fused Vision Transformer with ConvNeXt Architecture
7
作者 Faten S.Alamri Tariq Sadad +2 位作者 Ahmed S.Almasoud Raja Atif Aurangzeb Amjad Khan 《Computers, Materials & Continua》 2025年第4期1023-1039,共17页
Mango farming significantly contributes to the economy,particularly in developing countries.However,mango trees are susceptible to various diseases caused by fungi,viruses,and bacteria,and diagnosing these diseases at... Mango farming significantly contributes to the economy,particularly in developing countries.However,mango trees are susceptible to various diseases caused by fungi,viruses,and bacteria,and diagnosing these diseases at an early stage is crucial to prevent their spread,which can lead to substantial losses.The development of deep learning models for detecting crop diseases is an active area of research in smart agriculture.This study focuses on mango plant diseases and employs the ConvNeXt and Vision Transformer(ViT)architectures.Two datasets were used.The first,MangoLeafBD,contains data for mango leaf diseases such as anthracnose,bacterial canker,gall midge,and powdery mildew.The second,SenMangoFruitDDS,includes data for mango fruit diseases such as Alternaria,Anthracnose,Black Mould Rot,Healthy,and Stem and Rot.Both datasets were obtained from publicly available sources.The proposed model achieved an accuracy of 99.87%on the MangoLeafBD dataset and 98.40%on the MangoFruitDDS dataset.The results demonstrate that ConvNeXt and ViT models can effectively diagnose mango diseases,enabling farmers to identify these conditions more efficiently.The system contributes to increased mango production and minimizes economic losses by reducing the time and effort needed for manual diagnostics.Additionally,the proposed system is integrated into a mobile application that utilizes the model as a backend to detect mango diseases instantly. 展开更多
关键词 ConvNeXt model FUSION mango disease smart agriculture vision transformer
在线阅读 下载PDF
An Auto Encoder-Enhanced Stacked Ensemble for Intrusion Detection in Healthcare Networks
8
作者 Fatma S.Alrayes Mohammed Zakariah +2 位作者 Mohammed K.Alzaylaee Syed Umar Amin Zafar Iqbal Khan 《Computers, Materials & Continua》 2025年第11期3457-3484,共28页
Healthcare networks prove to be an urgent issue in terms of intrusion detection due to the critical consequences of cyber threats and the extreme sensitivity of medical information.The proposed Auto-Stack ID in the st... Healthcare networks prove to be an urgent issue in terms of intrusion detection due to the critical consequences of cyber threats and the extreme sensitivity of medical information.The proposed Auto-Stack ID in the study is a stacked ensemble of encoder-enhanced auctions that can be used to improve intrusion detection in healthcare networks.TheWUSTL-EHMS 2020 dataset trains and evaluates themodel,constituting an imbalanced class distribution(87.46% normal traffic and 12.53% intrusion attacks).To address this imbalance,the study balances the effect of training Bias through Stratified K-fold cross-validation(K=5),so that each class is represented similarly on training and validation splits.Second,the Auto-Stack ID method combines many base classifiers such as TabNet,LightGBM,Gaussian Naive Bayes,Histogram-Based Gradient Boosting(HGB),and Logistic Regression.We apply a two-stage training process based on the first stage,where we have base classifiers that predict out-of-fold(OOF)predictions,which we use as inputs for the second-stage meta-learner XGBoost.The meta-learner learns to refine predictions to capture complicated interactions between base models,thus improving detection accuracy without introducing bias,overfitting,or requiring domain knowledge of the meta-data.In addition,the auto-stack ID model got 98.41% accuracy and 93.45%F1 score,better than individual classifiers.It can identify intrusions due to its 90.55% recall and 96.53% precision with minimal false positives.These findings identify its suitability in ensuring healthcare networks’security through ensemble learning.Ongoing efforts will be deployed in real time to improve response to evolving threats. 展开更多
关键词 Intrusion detection auto encoder stacked ensemble WUSTL-EHMS 2020 dataset class imbalance XGBoost
在线阅读 下载PDF
MVLA-Net:A Multi-View Lesion Attention Network for Advanced Diagnosis and Grading of Diabetic Retinopathy
9
作者 Tariq Mahmood Tanzila Saba +2 位作者 Faten S.Alamri Alishba Tahir Noor Ayesha 《Computers, Materials & Continua》 2025年第4期1173-1193,共21页
Innovation in learning algorithms has made retinal vessel segmentation and automatic grading tech-niques crucial for clinical diagnosis and prevention of diabetic retinopathy.The traditional methods struggle with accu... Innovation in learning algorithms has made retinal vessel segmentation and automatic grading tech-niques crucial for clinical diagnosis and prevention of diabetic retinopathy.The traditional methods struggle with accuracy and reliability due to multi-scale variations in retinal blood vessels and the complex pathological relationship in fundus images associated with diabetic retinopathy.While the single-modal diabetic retinopathy grading network addresses class imbalance challenges and lesion representation in fundus image data,dual-modal diabetic retinopathy grading methods offer superior performance.However,the scarcity of dual-modal data and the lack of effective feature fusion methods limit their potential due to multi-scale variations.This paper addresses these issues by focusing on multi-scale retinal vessel segmentation,dual feature fusion,data augmentation,and attention-based grading.The proposed model aims to improve comprehensive segmentation for retinal images with varying vessel thicknesses.It employs a dual-branch parallel architecture that integrates a transformer encoder with a convolutional neural network encoder to extract local and global information for synergistic saliency learning.Besides that,the model uses residual structures and attention modules to extract critical lesions,enhancing the accuracy and reliability of diabetic retinopathy grading.To evaluate the efficacy of the proposed approach,this study compared it with other pre-trained publicly open models,ResNet152V2,ConvNext,Efficient Net,DenseNet,and Swin Transform,with the same developmental parameters.All models achieved approximately 85%accuracy with the same image preparation method.However,the proposed approach outperforms and optimizes existing models by achieving an accuracy of 99.17%,99.04%,and 99.24%,on Kaggle APTOS19,IDRiD,and EyePACS datasets,respectively.These results support the model’s utility in helping ophthalmologists diagnose diabetic retinopathy more rapidly and accurately. 展开更多
关键词 Diabetic retinopathy grading retinal vessel segmentation dual-modal deep learning attention mecha-nism health risks
在线阅读 下载PDF
Big Texture Dataset Synthesized Based on Gradient and Convolution Kernels Using Pre-Trained Deep Neural Networks
10
作者 Farhan A.Alenizi Faten Khalid Karim +1 位作者 Alaa R.Al-Shamasneh Mohammad Hossein Shakoor 《Computer Modeling in Engineering & Sciences》 2025年第8期1793-1829,共37页
Deep neural networks provide accurate results for most applications.However,they need a big dataset to train properly.Providing a big dataset is a significant challenge in most applications.Image augmentation refers t... Deep neural networks provide accurate results for most applications.However,they need a big dataset to train properly.Providing a big dataset is a significant challenge in most applications.Image augmentation refers to techniques that increase the amount of image data.Common operations for image augmentation include changes in illumination,rotation,contrast,size,viewing angle,and others.Recently,Generative Adversarial Networks(GANs)have been employed for image generation.However,like image augmentation methods,GAN approaches can only generate images that are similar to the original images.Therefore,they also cannot generate new classes of data.Texture images presentmore challenges than general images,and generating textures is more complex than creating other types of images.This study proposes a gradient-based deep neural network method that generates a new class of texture.It is possible to rapidly generate new classes of textures using different kernels from pre-trained deep networks.After generating new textures for each class,the number of textures increases through image augmentation.During this process,several techniques are proposed to automatically remove incomplete and similar textures that are created.The proposed method is faster than some well-known generative networks by around 4 to 10 times.In addition,the quality of the generated textures surpasses that of these networks.The proposed method can generate textures that surpass those of someGANs and parametric models in certain image qualitymetrics.It can provide a big texture dataset to train deep networks.A new big texture dataset is created artificially using the proposed method.This dataset is approximately 2 GB in size and comprises 30,000 textures,each 150×150 pixels in size,organized into 600 classes.It is uploaded to the Kaggle site and Google Drive.This dataset is called BigTex.Compared to other texture datasets,the proposed dataset is the largest and can serve as a comprehensive texture dataset for training more powerful deep neural networks and mitigating overfitting. 展开更多
关键词 Big texture dataset data generation pre-trained deep neural network
在线阅读 下载PDF
High-Fidelity Machine Learning Framework for Fracture Energy Prediction in Fiber-Reinforced Concrete
11
作者 Ala’a R.Al-Shamasneh Faten Khalid Karim +4 位作者 Arsalan Mahmoodzadeh Abdulaziz Alghamdi Abdullah Alqahtani Shtwai Alsubai Abed Alanazi 《Computer Modeling in Engineering & Sciences》 2025年第8期1573-1606,共34页
The fracture energy of fiber-reinforced concrete(FRC)affects the durability and structural performance of concrete elements.Advancements in experimental studies have yet to overcome the challenges of estimating fractu... The fracture energy of fiber-reinforced concrete(FRC)affects the durability and structural performance of concrete elements.Advancements in experimental studies have yet to overcome the challenges of estimating fracture energy,as the process remains time-intensive and costly.Therefore,machine learning techniques have emerged as powerful alternatives.This study aims to investigate the performance of machine learning techniques to predict the fracture energy of FRC.For this purpose,500 data points,including 8 input parameters that affect the fracture energy of FRC,are collected fromthree-point bending tests and employed to train and evaluate themachine learning techniques.The findings showed that Gaussian process regression(GPR)outperforms all other models in terms of predictive accuracy,achieving the highest R2 of 0.93 and the lowest RMSE of 13.91 during holdout cross-validation.It is then followed by support vector regression(SVR)and extreme gradient boosting regression(XGBR),whereas K-nearest neighbours(KNN)and random forest regression(RFR)show the weakest predictions.The superiority of GPR is further reinforced in a 5-fold cross-validation,where it consistently delivers an average R2 above 0.96 and ranks highest in overall predictive performance.Empirical testing with additional sample sets validates GPR’s model on the key mix parameter’s impact on fracture energy,cementing its claim.The Fly-Ash cement exhibits the greatest fracture energy due to superior fiber-matrix interaction,whereas the glass fiber dominates energy absorption amongst the other types of fibers.In addition,increasing the water-to-cement(W/C)ratio from 0.30 to 0.50 yields a significant improvement in fracture energy,which aligns well with the machine learning predictions.Similarly,loading rate positively correlates with fracture energy,highlighting the strain-rate sensitivity of FRC.This work is the missing link to integrate experimental fracture mechanics and computational intelligence,optimally and reasonably predicting and refining the fracture energy of FRC. 展开更多
关键词 Fiber-reinforced concrete fracture energy three-point bending test machine learning concretemixing optimization
在线阅读 下载PDF
Evaluation of Spatiotemporal Dynamics of Simulated Land Use/Cover in China Using a Probabilistic Cellular Automata-Markov Model 被引量:2
12
作者 CHEN Xu YU Shi-Xiao ZHANG Ya-Ping 《Pedosphere》 SCIE CAS CSCD 2013年第2期243-255,共13页
Using the fuzzy rule-based classification method, normalized difference vegetation index (NDVI) images acquired from 1982 to 1998 were classified into seventeen phases. Based on these classification images, a probabil... Using the fuzzy rule-based classification method, normalized difference vegetation index (NDVI) images acquired from 1982 to 1998 were classified into seventeen phases. Based on these classification images, a probabilistic cellular automata-Markov Chain model was developed and used to simulate a land cover scenario of China for the year 2014. Spatiotemporal dynamics of land use/cover in China from 1982 to 2014 were then analyzed and evaluated. The results showed that the change trends of land cover type from 1998 to 2014 would be contrary to those from 1982 to 1998. In particular, forestland and grassland areas decreased by 1.56% and 1.46%, respectively, from 1982 to 1998, and should increase by 1.5% and 2.3% from 1998 to 2014, respectively. 展开更多
关键词 classification image fuzzy rule-based classification normalized difference vegetation index remote sensing
原文传递
Risk Prevention and Control for Agricultural Non-Point Source Pollution Based on the Process of Pressure-Transformation-Absorption in Chongqing, China 被引量:1
13
作者 ZHU Kangwen CHEN Yucheng +6 位作者 ZHANG Sheng YANG Zhimin HUANG Lei LEI Bo XIONG Hailing WU Sheng LI Xixi 《Chinese Geographical Science》 SCIE CSCD 2021年第4期735-750,共16页
According to China’s second national survey of pollution sources, the contribution of agricultural non-point sources(ANS) to water pollution is still high. Risk prevention and control are the main means to control co... According to China’s second national survey of pollution sources, the contribution of agricultural non-point sources(ANS) to water pollution is still high. Risk prevention and control are the main means to control costs and improve the efficiency of ANS, but most studies directly take pollution load as the risk standard, leading to a considerable misjudgment of the actual pollution risk. To objectively reflect the risk of agricultural non-point source pollution(ANSP) in Chongqing, China, we investigated the influences of initial source input, intermediate transformation, and terminal absorption of pollutants via literature research and the Delphi method and built a PTA(pressure kinetic energy, transformation kinetic energy, and absorption kinetic energy) model that covers 12 factors, with the support of geographical information system(GIS) technology. The terrain factor calculation results and the calculation results of other factors were optimized by Python tools to reduce human error and workload. Via centroid migration analysis and Kernel density analysis, the risk level, spatial aggregation degree, and key prevention and control regions could be accurately determined. There was a positive correlation between the water quality of the rivers in Chongqing and the risk assessment results of different periods, indirectly reflecting the reliability of the assessment results by the proposed model. There was an obvious tendency for the low-risk regions transforming into high-risk regions. The proportion of high-risk regions and extremely high-risk regions increased from 17.82% and 16.63%in 2000 to 18.10% and 16.76% in 2015, respectively. And the risk level in the main urban areas was significantly higher than that in the southeastern and northeastern areas of Chongqing. The centroids of all grades of risky areas presented a successive distribution from west to east, and the centroids of high-risk and extremely high-risk regions shifted eastward. From 2000 to 2015, the centroids of highrisk and extremely high-risk regions moved 4.63 km(1.68°) and 4.48 km(12.08°) east by north, respectively. The kernel density analysis results showed that the high-risk regions were mainly concentrated in the main urban areas and that the distribution of agglomeration areas overall displayed a transition trend from contiguous distribution to decentralized concentration. The risk levels of the regions with a high proportion of cultivated land and artificial surface were significantly increased, and the occupation of cultivated land in the process of urbanization promoted the movement of the centroids of high-risk and extremely high-risk regions. The identification of key areas for risk prevention and control provides data scientific basis for the development of prevention and control strategies. 展开更多
关键词 geographic information system(GIS) agricultural non-point source pollution(ANSP) risk assessment Kernel density CHONGQING China
在线阅读 下载PDF
Densely Convolutional BU-NET Framework for Breast Multi-Organ Cancer Nuclei Segmentation through Histopathological Slides and Classification Using Optimized Features 被引量:1
14
作者 Amjad Rehman Muhammad Mujahid +2 位作者 Robertas Damasevicius Faten S.Alamri Tanzila Saba 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第12期2375-2397,共23页
This study aims to develop a computational pathology approach that can properly detect and distinguish histology nuclei.This is crucial for histopathological image analysis,as it involves segmenting cell nuclei.Howeve... This study aims to develop a computational pathology approach that can properly detect and distinguish histology nuclei.This is crucial for histopathological image analysis,as it involves segmenting cell nuclei.However,challenges exist,such as determining the boundary region of normal and deformed nuclei and identifying small,irregular nuclei structures.Deep learning approaches are currently dominant in digital pathology for nucleus recognition and classification,but their complex features limit their practical use in clinical settings.The existing studies have limited accuracy,significant processing costs,and a lack of resilience and generalizability across diverse datasets.We proposed the densely convolutional Breast U-shaped Network(BU-NET)framework to overcome the mentioned issues.The study employs BU-NET’s spatial and channel attention methods to enhance segmentation processes.The inclusion of residual blocks and skip connections in the BU-NEt architecture enhances the process of extracting features and reconstructing the output.This enhances the robustness of training and convergence processes by reducing the occurrence of vanishing gradients.The primary objective of BU-NEt is to enhance the model’s capacity to acquire and analyze more intricate features,all the while preserving an efficient working representation.The BU-NET experiments demonstrate that the framework achieved 88.7%average accuracy,88.8%F1 score for Multi-Organ Nuclei Segmentation Challenge(MoNuSeg),and 91.2%average accuracy,91.8%average F1 for the triple-negative breast cancer(TNBC)dataset.The framework also achieved 93.92 Area under the ROC Curve(AUC)for TNBC.The results demonstrated that the technology surpasses existing techniques in terms of accuracy and effectiveness in segmentation.Furthermore,it showcases the ability to withstand and recover from different tissue types and diseases,indicating possible uses in medical treatments.The research evaluated the efficacy of the proposed method on diverse histopathological imaging datasets,including cancer cells from many organs.The densely connected U-NEt technology offers a promising approach for automating and precisely segmenting cancer cells on histopathology slides,hence assisting pathologists in improving cancer diagnosis and treatment outcomes. 展开更多
关键词 Breast cancer HISTOPATHOLOGY BU-NET deep learning
暂未订购
Analysis on conducted coupling of electrical fast transient burst in mines 被引量:1
15
作者 FENG De-wang LAN Jian-rong 《Journal of Coal Science & Engineering(China)》 2012年第2期207-212,共6页
Under the inflammable or explosive environment, the direct measurement methods by opening up the explo- sion-proof shell of electrical installations were not adopted. So, it's impossible to have a quantitative analys... Under the inflammable or explosive environment, the direct measurement methods by opening up the explo- sion-proof shell of electrical installations were not adopted. So, it's impossible to have a quantitative analysis on the limit of conducted disturbance for electrical fast transient burst (EFT/B) in such dangerous environments. Transient conducted coupling model, which using EFT/B as its excitation source, can be built based on circuit and electromagnetic field theory. Furthermore, numerical analysis was performed. The results indicate that the capacitive coupling voltage is the same polarity as EFT/B, and is the main disturbance form of conducted coupling in mines. The inductive coupling voltage is reversed polarity with the ca- pacitive coupling voltage, and both peaks appear only in the rising time of EFT/B, which increase with the rising of load resistance. Moreover, the cable coupling voltage on the side of disturbance source is higher than the one on the other side in tunnel. To reduce the common resistance can suppress the resistive coupling disturbance. 展开更多
关键词 conducted coupling electrical fast transient burst numerical analysis
在线阅读 下载PDF
RoGRUT: A Hybrid Deep Learning Model for Detecting Power Trapping in Smart Grids
16
作者 Farah Mohammad Saad Al-Ahmadi Jalal Al-Muhtadi 《Computers, Materials & Continua》 SCIE EI 2024年第5期3175-3192,共18页
Electricity theft is a widespread non-technical issue that has a negative impact on both power grids and electricity users.It hinders the economic growth of utility companies,poses electrical risks,and impacts the hig... Electricity theft is a widespread non-technical issue that has a negative impact on both power grids and electricity users.It hinders the economic growth of utility companies,poses electrical risks,and impacts the high energy costs borne by consumers.The development of smart grids is crucial for the identification of power theft since these systems create enormous amounts of data,including information on client consumption,which may be used to identify electricity theft using machine learning and deep learning techniques.Moreover,there also exist different solutions such as hardware-based solutions to detect electricity theft that may require human resources and expensive hardware.Computer-based solutions are presented in the literature to identify electricity theft but due to the dimensionality curse,class imbalance issue and improper hyper-parameter tuning of such models lead to poor performance.In this research,a hybrid deep learning model abbreviated as RoGRUT is proposed to detect electricity theft as amalicious and non-malicious activity.The key steps of the RoGRUT are data preprocessing that covers the problem of class imbalance,feature extraction and final theft detection.Different advanced-level models like RoBERTa is used to address the curse of dimensionality issue,the near miss for class imbalance,and transfer learning for classification.The effectiveness of the RoGRUTis evaluated using the dataset fromactual smartmeters.A significant number of simulations demonstrate that,when compared to its competitors,the RoGRUT achieves the best classification results.The performance evaluation of the proposed model revealed exemplary results across variousmetrics.The accuracy achieved was 88%,with precision at an impressive 86%and recall reaching 84%.The F1-Score,a measure of overall performance,stood at 85%.Furthermore,themodel exhibited a noteworthyMatthew correlation coefficient of 78%and excelled with an area under the curve of 91%. 展开更多
关键词 Electricity theft smart grid RoBERTa GRU transfer learning
在线阅读 下载PDF
Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing
17
作者 Abdul Saboor Mohd Fadzil Hassan +4 位作者 Rehan Akbar Erwin Susanto Syed Nasir Mehmood Shah Muhammad Aadil Siddiqui Saeed Ahmed Magsi 《Computers, Materials & Continua》 SCIE EI 2022年第11期2223-2239,共17页
Cloud computing has gained significant use over the last decade due to its several benefits,including cost savings associated with setup,deployments,delivery,physical resource sharing across virtual machines,and avail... Cloud computing has gained significant use over the last decade due to its several benefits,including cost savings associated with setup,deployments,delivery,physical resource sharing across virtual machines,and availability of on-demand cloud services.However,in addition to usual threats in almost every computing environment,cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm.Furthermore,since there are a growing number of attacks directed at cloud environments(including dictionary attacks,replay code attacks,denial of service attacks,rootkit attacks,code injection attacks,etc.),customers require additional assurances before adopting cloud services.Moreover,the continuous integration and continuous deployment of the code fragments have made cloud services more prone to security breaches.In this study,the model based on the root of trust for continuous integration and continuous deployment is proposed,instead of only relying on a single signon authentication method that typically uses only id and password.The underlying study opted hardware security module by utilizing the Trusted Platform Module(TPM),which is commonly available as a cryptoprocessor on the motherboards of the personal computers and data center servers.The preliminary proof of concept demonstrated that the TPM features can be utilized through RESTful services to establish the root of trust for continuous integration and continuous deployment pipeline and can additionally be integrated as a secure microservice feature in the cloud computing environment. 展开更多
关键词 Root of Trust(RoT) Trusted Platform Module(TPM) cryptoprocessor microservices Hardware Security Modules(HSM) DevOps
在线阅读 下载PDF
Latent Space Representational Learning of Deep Features for Acute Lymphoblastic Leukemia Diagnosis
18
作者 Ghada Emam Atteia 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期361-376,共16页
Acute Lymphoblastic Leukemia(ALL)is a fatal malignancy that is featured by the abnormal increase of immature lymphocytes in blood or bone marrow.Early prognosis of ALL is indispensable for the effectual remediation of... Acute Lymphoblastic Leukemia(ALL)is a fatal malignancy that is featured by the abnormal increase of immature lymphocytes in blood or bone marrow.Early prognosis of ALL is indispensable for the effectual remediation of this disease.Initial screening of ALL is conducted through manual examination of stained blood smear microscopic images,a process which is time-consuming and prone to errors.Therefore,many deep learning-based computer-aided diagnosis(CAD)systems have been established to automatically diagnose ALL.This paper proposes a novel hybrid deep learning system for ALL diagnosis in blood smear images.The introduced system integrates the proficiency of autoencoder networks in feature representational learning in latent space with the superior feature extraction capability of standard pretrained convolutional neural networks(CNNs)to identify the existence of ALL in blood smears.An augmented set of deep image features are formed from the features extracted by GoogleNet and Inception-v3 CNNs from a hybrid dataset of microscopic blood smear images.A sparse autoencoder network is designed to create an abstract set of significant latent features from the enlarged image feature set.The latent features are used to perform image classification using Support Vector Machine(SVM)classifier.The obtained results show that the latent features improve the classification performance of the proposed ALL diagnosis system over the original image features.Moreover,the classification performance of the system with various sizes of the latent feature set is evaluated.The retrieved results reveal that the introduced ALL diagnosis system superiorly compete the state of the art. 展开更多
关键词 Autoencoder deep learning CNN LEUKEMIA DIAGNOSIS computeraided diagnosis
暂未订购
Deep Learning Based Cyber Event Detection from Open-Source Re-Emerging Social Data
19
作者 Farah Mohammad Saad Al-Ahmadi Jalal Al-Muhtadi 《Computers, Materials & Continua》 SCIE EI 2023年第8期1423-1438,共16页
Social media forums have emerged as the most popular form of communication in the modern technology era,allowing people to discuss and express their opinions.This increases the amount of material being shared on socia... Social media forums have emerged as the most popular form of communication in the modern technology era,allowing people to discuss and express their opinions.This increases the amount of material being shared on social media sites.There is a wealth of information about the threat that may be found in such open data sources.The security of already-deployed software and systems relies heavily on the timely detection of newly-emerging threats to their safety that can be gleaned from such information.Despite the fact that several models for detecting cybersecurity events have been presented,it remains challenging to extract security events from the vast amounts of unstructured text present in public data sources.The majority of the currently available methods concentrate on detecting events that have a high number of dimensions.This is because the unstructured text in open data sources typically contains a large number of dimensions.However,to react to attacks quicker than they can be launched,security analysts and information technology operators need to be aware of critical security events as soon as possible,regardless of how often they are reported.This research provides a unique event detection method that can swiftly identify significant security events from open forums such as Twitter.The proposed work identified new threats and the revival of an attack or related event,independent of the volume of mentions relating to those events on Twitter.In this research work,deep learning has been used to extract predictive features from open-source text.The proposed model is composed of data collection,data transformation,feature extraction using deep learning,Latent Dirichlet Allocation(LDA)based medium-level cyber-event detection and final Google Trends-based high-level cyber-event detection.The proposed technique has been evaluated on numerous datasets.Experiment results show that the proposed method outperforms existing methods in detecting cyber events by giving 95.96% accuracy. 展开更多
关键词 Social media TWITTER CYBER EVENTS deep learning
在线阅读 下载PDF
IoT-Based Women Safety Gadgets (WSG): Vision, Architecture, and Design Trends
20
作者 Sharad Saxena Shailendra Mishra +5 位作者 Mohammed Baljon Shamiksha Mishra Sunil Kumar Sharma Prakhar Goel Shubham Gupta Vinay Kishore 《Computers, Materials & Continua》 SCIE EI 2023年第7期1027-1045,共19页
In recent years,the growth of female employees in the commercial market and industries has increased.As a result,some people think travelling to distant and isolated locations during odd hours generates new threats to... In recent years,the growth of female employees in the commercial market and industries has increased.As a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s safety.The exponential increase in assaults and attacks on women,on the other hand,is posing a threat to women’s growth,development,and security.At the time of the attack,it appears the women were immobilized and needed immediate support.Only self-defense isn’t sufficient against abuse;a new technological solution is desired and can be used as quickly as hitting a switch or button.The proposed Women Safety Gadget(WSG)aims to design a wearable safety device model based on Internet-of-Things(IoT)and Cloud Technology.It is designed in three layers,namely layer-1,having an android app;layer-2,with messaging and location tracking system;and layer-3,which updates information in the cloud database.WSG can detect an unsafe condition by the pressure sensor of the finger on the artificial nail,consequently diffuses a pepper spray,and automatically notifies the saved closest contacts and police station through messaging and location settings.WSG has a response time of 1000 ms once the nail is pressed;the average time for pulse rate measure is 0.475 s,and diffusing the pepper spray is 0.2–0.5 s.The average activation time is 2.079 s. 展开更多
关键词 PERPETRATOR SAFETY IOT women security GPS tracking GSM
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部