期刊文献+
共找到135篇文章
< 1 2 7 >
每页显示 20 50 100
Evaluating and Addressing Interoperability Constraints in Health Information Systems for Enhanced Healthcare Delivery in Zimbabwe
1
作者 Prosper Tafadzwa Denhere Nelson Matanana +2 位作者 Munyaradzi Zhou Caleb Manjeese Talent Mawere 《Journal of Computer and Communications》 2024年第7期133-154,共22页
Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and ... Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and address these constraints to enhance healthcare delivery. The study examines the current state of interoperability in health information systems, identifies the key constraints, and explores their impact on healthcare outcomes. Various approaches and strategies for addressing interoperability constraints are discussed, including the adoption of standardized data formats, implementation of interoperability frameworks, and establishment of robust data governance mechanisms. Furthermore, the study highlights the importance of stakeholder collaboration, policy development, and technical advancements in achieving enhanced interoperability. The findings emphasize the need for a comprehensive evaluation of interoperability constraints and the implementation of targeted interventions to promote seamless data exchange, improve care coordination, and enhance patient outcomes in healthcare settings. 展开更多
关键词 Health Information System INTEROPERABILITY Interoperability Constraints
在线阅读 下载PDF
Social Media-Based Surveillance Systems for Health Informatics Using Machine and Deep Learning Techniques:A Comprehensive Review and Open Challenges
2
作者 Samina Amin Muhammad Ali Zeb +3 位作者 Hani Alshahrani Mohammed Hamdi Mohammad Alsulami Asadullah Shaikh 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1167-1202,共36页
Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic outbreaks.This review discusses the current state of SM... Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic outbreaks.This review discusses the current state of SM-based surveillance methods for early epidemic outbreaks and the role of ML and DL in enhancing their performance.Since,every year,a large amount of data related to epidemic outbreaks,particularly Twitter data is generated by SM.This paper outlines the theme of SM analysis for tracking health-related issues and detecting epidemic outbreaks in SM,along with the ML and DL techniques that have been configured for the detection of epidemic outbreaks.DL has emerged as a promising ML technique that adaptsmultiple layers of representations or features of the data and yields state-of-the-art extrapolation results.In recent years,along with the success of ML and DL in many other application domains,both ML and DL are also popularly used in SM analysis.This paper aims to provide an overview of epidemic outbreaks in SM and then outlines a comprehensive analysis of ML and DL approaches and their existing applications in SM analysis.Finally,this review serves the purpose of offering suggestions,ideas,and proposals,along with highlighting the ongoing challenges in the field of early outbreak detection that still need to be addressed. 展开更多
关键词 Social media EPIDEMIC machine learning deep learning health informatics PANDEMIC
在线阅读 下载PDF
A Hybrid Wasserstein GAN and Autoencoder Model for Robust Intrusion Detection in IoT
3
作者 Mohammed S.Alshehri Oumaima Saidani +4 位作者 Wajdan Al Malwi Fatima Asiri Shahid Latif Aizaz Ahmad Khattak Jawad Ahmad 《Computer Modeling in Engineering & Sciences》 2025年第6期3899-3920,共22页
The emergence of Generative Adversarial Network(GAN)techniques has garnered significant attention from the research community for the development of Intrusion Detection Systems(IDS).However,conventional GAN-based IDS ... The emergence of Generative Adversarial Network(GAN)techniques has garnered significant attention from the research community for the development of Intrusion Detection Systems(IDS).However,conventional GAN-based IDS models face several challenges,including training instability,high computational costs,and system failures.To address these limitations,we propose a Hybrid Wasserstein GAN and Autoencoder Model(WGAN-AE)for intrusion detection.The proposed framework leverages the stability of WGAN and the feature extraction capabilities of the Autoencoder Model.The model was trained and evaluated using two recent benchmark datasets,5GNIDD and IDSIoT2024.When trained on the 5GNIDD dataset,the model achieved an average area under the precisionrecall curve is 99.8%using five-fold cross-validation and demonstrated a high detection accuracy of 97.35%when tested on independent test data.Additionally,the model is well-suited for deployment on resource-limited Internetof-Things(IoT)devices due to its ability to detect attacks within microseconds and its small memory footprint of 60.24 kB.Similarly,when trained on the IDSIoT2024 dataset,the model achieved an average PR-AUC of 94.09%and an attack detection accuracy of 97.35%on independent test data,with a memory requirement of 61.84 kB.Extensive simulation results demonstrate that the proposed hybrid model effectively addresses the shortcomings of traditional GAN-based IDS approaches in terms of detection accuracy,computational efficiency,and applicability to real-world IoT environments. 展开更多
关键词 Autoencoder CYBERSECURITY generative adversarial network Internet of Things intrusion detection system
在线阅读 下载PDF
A Computational Model for Enhanced Mammographic Image Pre-Processing and Segmentation
4
作者 Khlood M.Mehdar Toufique A.Soomro +7 位作者 Ahmed Ali Faisal Bin Ubaid Muhammad Irfan Sabah Elshafie Mohammed Elshafie Aisha M.Mashraqi Abdullah A.Asiri Nagla Hussien Mohamed Khalid Hanan T.Halawani 《Computer Modeling in Engineering & Sciences》 2025年第6期3091-3132,共42页
Breast cancer remains one of the most pressing global health concerns,and early detection plays a crucial role in improving survival rates.Integrating digital mammography with computational techniques and advanced ima... Breast cancer remains one of the most pressing global health concerns,and early detection plays a crucial role in improving survival rates.Integrating digital mammography with computational techniques and advanced image processing has significantly enhanced the ability to identify abnormalities.However,existing methodologies face persistent challenges,including low image contrast,noise interference,and inaccuracies in segmenting regions of interest.To address these limitations,this study introduces a novel computational framework for analyzing mammographic images,evaluated using the Mammographic Image Analysis Society(MIAS)dataset comprising 322 samples.The proposed methodology follows a structured three-stage approach.Initially,mammographic scans are classified using the Breast Imaging Reporting and Data System(BI-RADS),ensuring systematic and standardized image analysis.Next,the pectoral muscle,which can interfere with accurate segmentation,is effectively removed to refine the region of interest(ROI).The final stage involves an advanced image pre-processing module utilizing Independent Component Analysis(ICA)to enhance contrast,suppress noise,and improve image clarity.Following these enhancements,a robust segmentation technique is employed to delineated abnormal regions.Experimental results validate the efficiency of the proposed framework,demonstrating a significant improvement in the Effective Measure of Enhancement(EME)and a 3 dB increase in Peak Signal-to-Noise Ratio(PSNR),indicating superior image quality.The model also achieves an accuracy of approximately 97%,surpassing contemporary techniques evaluated on the MIAS dataset.Furthermore,its ability to process mammograms across all BI-RADS categories highlights its adaptability and reliability for clinical applications.This study presents an advanced and dependable computational framework for mammographic image analysis,effectively addressing critical challenges in noise reduction,contrast enhancement,and segmentation precision.The proposed approach lays the groundwork for seamless integration into computer-aided diagnostic(CAD)systems,with the potential to significantly enhance early breast cancer detection and contribute to improved patient outcomes. 展开更多
关键词 Breast cancer screening digital mammography image processing independent component analysis(ICA) computer-aided diagnosis(CAD)
暂未订购
Novel Solution Based on Face Recognition to Address Identity Theft and Cheating in Online Examination Systems 被引量:1
5
作者 Ayham Fayyoumi Anis Zarrad 《Advances in Internet of Things》 2014年第2期5-12,共8页
The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with sho... The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with short time intervals), checks for learner identity during the whole exam period to ensure that the learner who started the exam is the same one who continued until the end and prevent the possibility of cheating by looking at adjacent PC or reading from an external paper. The system will issue an early warning to the learners if suspicious behavior has been noticed by the system. The proposed system has been presented to eight e-learning instructors and experts in addition to 32 students to gather feedback and to study the impact and the benefit of such system in e-learning environment. 展开更多
关键词 Online EXAM FACE Recognition AUTHENTICATION EXAM CHEATING
暂未订购
Machine Learning Empowered Security and Privacy Architecture for IoT Networks with the Integration of Blockchain
6
作者 Sohaib Latif M.Saad Bin Ilyas +3 位作者 Azhar Imran Hamad Ali Abosaq Abdulaziz Alzubaidi Vincent Karovic Jr. 《Intelligent Automation & Soft Computing》 2024年第2期353-379,共27页
The Internet of Things(IoT)is growing rapidly and impacting almost every aspect of our lives,fromwearables and healthcare to security,traffic management,and fleet management systems.This has generated massive volumes ... The Internet of Things(IoT)is growing rapidly and impacting almost every aspect of our lives,fromwearables and healthcare to security,traffic management,and fleet management systems.This has generated massive volumes of data and security,and data privacy risks are increasing with the advancement of technology and network connections.Traditional access control solutions are inadequate for establishing access control in IoT systems to provide data protection owing to their vulnerability to single-point OF failure.Additionally,conventional privacy preservation methods have high latency costs and overhead for resource-constrained devices.Previous machine learning approaches were also unable to detect denial-of-service(DoS)attacks.This study introduced a novel decentralized and secure framework for blockchain integration.To avoid single-point OF failure,an accredited access control scheme is incorporated,combining blockchain with local peers to record each transaction and verify the signature to access.Blockchain-based attribute-based cryptography is implemented to protect data storage privacy by generating threshold parameters,managing keys,and revoking users on the blockchain.An innovative contract-based DOS attack mitigation method is also incorporated to effectively validate devices with intelligent contracts as trusted or untrusted,preventing the server from becoming overwhelmed.The proposed framework effectively controls access,safeguards data privacy,and reduces the risk of cyberattacks.The results depict that the suggested framework outperforms the results in terms of accuracy,precision,sensitivity,recall,and F-measure at 96.9%,98.43%,98.8%,98.43%,and 98.4%,respectively. 展开更多
关键词 Machine learning internet of things blockchain data privacy SECURITY Industry 4.0
在线阅读 下载PDF
Volatility contagion between cryptocurrencies,gold and stock markets pre-and-during COVID-19:evidence using DCC-GARCH and cascade-correlation network
7
作者 Bassam A.Ibrahim Ahmed A.Elamer +2 位作者 Thamir H.Alasker Marwa A.Mohamed Hussein A.Abdou 《Financial Innovation》 2024年第1期1847-1874,共28页
The rapid rise of Bitcoin and its increasing global adoption has raised concerns about its impact on traditional markets,particularly in periods of economic turmoil and uncertainty such as the COVID-19 pandemic.This s... The rapid rise of Bitcoin and its increasing global adoption has raised concerns about its impact on traditional markets,particularly in periods of economic turmoil and uncertainty such as the COVID-19 pandemic.This study examines the extent of the volatility contagion from the Bitcoin market to traditional markets,focusing on gold and six major stock markets(Japan,USA,UK,China,Germany,and France)using daily data from January 2,2011,to June 2,2022,with 2958 daily observations.We employ DCC-GARCH,wavelet coherence,and cascade-correlation network models to analyze the relationship between Bitcoin and those markets.Our results indicate long-term volatility contagion between Bitcoin and gold and short-term contagion during periods of market turmoil and uncertainty.We also find evidence of long-term contagion between Bitcoin and the six stock markets,with short-term contagion observed in Chinese and Japanese markets during COVID-19.These results suggest a risk of uncontrollable threats from Bitcoin volatility and highlight the need for measures to prevent infection transmission to local stock markets.Hedge funds,mutual funds,and individual and institutional investors can benefit from using our findings in their risk management strategies.Our research confirms the utility of the cascade-correlation network model as an innovative method to investigate intermarket contagion across diverse conditions.It holds significant implications for stock market investors and policymakers,providing evidence for potentially using cryptocurrencies for hedging,for diversification,or as a safe haven. 展开更多
关键词 Cryptocurrencies GOLD Stock markets COVID-19 Cascade-correlation network
在线阅读 下载PDF
A Robust Security Detection Strategy for Next Generation IoT Networks
8
作者 Hafida Assmi Azidine Guezzaz +4 位作者 Said Benkirane Mourade Azrour Said Jabbour Nisreen Innab Abdulatif Alabdulatif 《Computers, Materials & Continua》 SCIE EI 2025年第1期443-466,共24页
Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities f... Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities for the emergence of unprecedented knowledge.To ensure IoT securit,various approaches have been implemented,such as authentication,encoding,as well as devices to guarantee data integrity and availability.Among these approaches,Intrusion Detection Systems(IDS)is an actual security solution,whose performance can be enhanced by integrating various algorithms,including Machine Learning(ML)and Deep Learning(DL),enabling proactive and accurate detection of threats.This study proposes to optimize the performance of network IDS using an ensemble learning method based on a voting classification algorithm.By combining the strengths of three powerful algorithms,Random Forest(RF),K-Nearest Neighbors(KNN),and Support Vector Machine(SVM)to detect both normal behavior and different categories of attack.Our analysis focuses primarily on the NSL-KDD dataset,while also integrating the recent Edge-IIoT dataset,tailored to industrial IoT environments.Experimental results show significant enhancements on the Edge-IIoT and NSL-KDD datasets,reaching accuracy levels between 72%to 99%,with precision between 87%and 99%,while recall values and F1-scores are also between 72%and 99%,for both normal and attack detection.Despite the promising results of this study,it suffers from certain limitations,notably the use of specific datasets and the lack of evaluations in a variety of environments.Future work could include applying this model to various datasets and evaluating more advanced ensemble strategies,with the aim of further enhancing the effectiveness of IDS. 展开更多
关键词 IoT security intrusion detection RF KNN SVM EL NSL-KDD Edge-IIoT
在线阅读 下载PDF
Congruent Feature Selection Method to Improve the Efficacy of Machine Learning-Based Classification in Medical Image Processing
9
作者 Mohd Anjum Naoufel Kraiem +2 位作者 Hong Min Ashit Kumar Dutta Yousef Ibrahim Daradkeh 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期357-384,共28页
Machine learning(ML)is increasingly applied for medical image processing with appropriate learning paradigms.These applications include analyzing images of various organs,such as the brain,lung,eye,etc.,to identify sp... Machine learning(ML)is increasingly applied for medical image processing with appropriate learning paradigms.These applications include analyzing images of various organs,such as the brain,lung,eye,etc.,to identify specific flaws/diseases for diagnosis.The primary concern of ML applications is the precise selection of flexible image features for pattern detection and region classification.Most of the extracted image features are irrelevant and lead to an increase in computation time.Therefore,this article uses an analytical learning paradigm to design a Congruent Feature Selection Method to select the most relevant image features.This process trains the learning paradigm using similarity and correlation-based features over different textural intensities and pixel distributions.The similarity between the pixels over the various distribution patterns with high indexes is recommended for disease diagnosis.Later,the correlation based on intensity and distribution is analyzed to improve the feature selection congruency.Therefore,the more congruent pixels are sorted in the descending order of the selection,which identifies better regions than the distribution.Now,the learning paradigm is trained using intensity and region-based similarity to maximize the chances of selection.Therefore,the probability of feature selection,regardless of the textures and medical image patterns,is improved.This process enhances the performance of ML applications for different medical image processing.The proposed method improves the accuracy,precision,and training rate by 13.19%,10.69%,and 11.06%,respectively,compared to other models for the selected dataset.The mean error and selection time is also reduced by 12.56%and 13.56%,respectively,compared to the same models and dataset. 展开更多
关键词 Computer vision feature selection machine learning region detection texture analysis image classification medical images
在线阅读 下载PDF
Multi-radio fast routing recovery protocol based on spectrum situation awareness
10
作者 Chuanxin ZHOU Chao DONG +3 位作者 Xiaojun ZHU Fuhui ZHOU Qihui WU Zhengrui QIN 《Chinese Journal of Aeronautics》 2025年第3期435-446,共12页
UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect ... UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect jamming, leading to long sensing time and thus slow routing recovery. To address the issues raised by jamming attacks, we propose a new routing protocol, Electromagnetic Spectrum situation awareness Optimized Link State Routing (ESOLSR) protocol, to improve the existing OLSRv2 protocol. ESOLSR utilizes the spectrum situation awareness capability from the physical layer, and adopts joint-updating of link status, updating of interface functions, and adaptive adjustment of parameters. Our simulation results show that the improved protocol, ESOLSR, can recover routing and resume normal communication 26.6% faster compared to the existing protocols. 展开更多
关键词 UAV ad hoc network OLSR protocol Routing recovery Electromagnetic spectrum situation awareness MULTI-RADIO
原文传递
Privacy Preserving Federated Anomaly Detection in IoT Edge Computing Using Bayesian Game Reinforcement Learning
11
作者 Fatima Asiri Wajdan Al Malwi +4 位作者 Fahad Masood Mohammed S.Alshehri Tamara Zhukabayeva Syed Aziz Shah Jawad Ahmad 《Computers, Materials & Continua》 2025年第8期3943-3960,共18页
Edge computing(EC)combined with the Internet of Things(IoT)provides a scalable and efficient solution for smart homes.Therapid proliferation of IoT devices poses real-time data processing and security challenges.EC ha... Edge computing(EC)combined with the Internet of Things(IoT)provides a scalable and efficient solution for smart homes.Therapid proliferation of IoT devices poses real-time data processing and security challenges.EC has become a transformative paradigm for addressing these challenges,particularly in intrusion detection and anomaly mitigation.The widespread connectivity of IoT edge networks has exposed them to various security threats,necessitating robust strategies to detect malicious activities.This research presents a privacy-preserving federated anomaly detection framework combined with Bayesian game theory(BGT)and double deep Q-learning(DDQL).The proposed framework integrates BGT to model attacker and defender interactions for dynamic threat level adaptation and resource availability.It also models a strategic layout between attackers and defenders that takes into account uncertainty.DDQL is incorporated to optimize decision-making and aids in learning optimal defense policies at the edge,thereby ensuring policy and decision optimization.Federated learning(FL)enables decentralized and unshared anomaly detection for sensitive data between devices.Data collection has been performed from various sensors in a real-time EC-IoT network to identify irregularities that occurred due to different attacks.The results reveal that the proposed model achieves high detection accuracy of up to 98%while maintaining low resource consumption.This study demonstrates the synergy between game theory and FL to strengthen anomaly detection in EC-IoT networks. 展开更多
关键词 IOT edge computing smart homes anomaly detection Bayesian game theory reinforcement learning
在线阅读 下载PDF
Improving Fundus Detection Precision in Diabetic Retinopathy Using Derivative-Based Deep Neural Networks
12
作者 Asma Aldrees Hong Min +2 位作者 Ashit Kumar Dutta Yousef Ibrahim Daradkeh Mohd Anjum 《Computer Modeling in Engineering & Sciences》 2025年第3期2487-2511,共25页
Fundoscopic diagnosis involves assessing the proper functioning of the eye’s nerves,blood vessels,retinal health,and the impact of diabetes on the optic nerves.Fundus disorders are a major global health concern,affec... Fundoscopic diagnosis involves assessing the proper functioning of the eye’s nerves,blood vessels,retinal health,and the impact of diabetes on the optic nerves.Fundus disorders are a major global health concern,affecting millions of people worldwide due to their widespread occurrence.Fundus photography generates machine-based eye images that assist in diagnosing and treating ocular diseases such as diabetic retinopathy.As a result,accurate fundus detection is essential for early diagnosis and effective treatment,helping to prevent severe complications and improve patient outcomes.To address this need,this article introduces a Derivative Model for Fundus Detection using Deep NeuralNetworks(DMFD-DNN)to enhance diagnostic precision.Thismethod selects key features for fundus detection using the least derivative,which identifies features correlating with stored fundus images.Feature filtering relies on the minimum derivative,determined by extracting both similar and varying textures.In this research,the DNN model was integrated with the derivative model.Fundus images were segmented,features were extracted,and the DNN was iteratively trained to identify fundus regions reliably.The goal was to improve the precision of fundoscopic diagnosis by training the DNN incrementally,taking into account the least possible derivative across iterations,and using outputs from previous cycles.The hidden layer of the neural network operates on the most significant derivative,which may reduce precision across iterations.These derivatives are treated as inaccurate,and the model is subsequently trained using selective features and their corresponding extractions.The proposed model outperforms previous techniques in detecting fundus regions,achieving 94.98%accuracy and 91.57%sensitivity,with a minimal error rate of 5.43%.It significantly reduces feature extraction time to 1.462 s and minimizes computational overhead,thereby improving operational efficiency and scalability.Ultimately,the proposed model enhances diagnostic precision and reduces errors,leading to more effective fundus dysfunction diagnosis and treatment. 展开更多
关键词 Deep neural network feature extraction fundus detection medical image processing
在线阅读 下载PDF
Promoting Tailored Hotel Recommendations Based on Traveller Preferences:A Circular Intuitionistic Fuzzy Decision Support Model
13
作者 Sana Shahab Ibtehal Alazman +4 位作者 Ashit Kumar Dutta Mohd Anjum Vladimir Simic Zeljko Stevic Nouf Abdulrahman Alqahtani 《Computer Modeling in Engineering & Sciences》 2025年第5期2155-2183,共29页
With the increasing complexity of hotel selection,traditional decision-making models often struggle to account for uncertainty and interrelated criteria.Multi-criteria decision-making(MCDM)techniques,particularly thos... With the increasing complexity of hotel selection,traditional decision-making models often struggle to account for uncertainty and interrelated criteria.Multi-criteria decision-making(MCDM)techniques,particularly those based on fuzzy logic,provide a robust framework for handling such challenges.This paper presents a novel approach to MCDM within the framework of Circular Intuitionistic Fuzzy Sets(C-IFS)by combining three distinct methodologies:Weighted Aggregated Sum Product Assessment(WASPAS),an Alternative Ranking Order Method Accounting for Two-Step Normalization(AROMAN),and the CRITIC method(Criteria Importance Through Inter-criteria Correlation).To address the dynamic nature of traveler preferences in hotel selection,the study employs a comprehensive set of criteria encompassing aspects such as location proximity,amenities,pricing,customer reviews,environmental impact,safety,booking flexibility,and cultural experiences.The CRITIC method is used to determine the importance of each criterion by assessing intercriteria correlations.AROMAN is employed for the systematic evaluation of alternatives,considering their additive relationships and providing a weighted assessment.WASPAS further analyzes the results obtained from AROMAN,incorporating both positive and negative aspects for a comprehensive evaluation.The integration of C-IFS enhances the model’s ability to manage uncertainty and imprecision in the decision-making process.Through a case study,we demonstrate the effectiveness of this integrated approach,offering decision-makers valuable insights for selecting the most suitable hotel option in alignment with the diverse preferences of contemporary travelers.This research contributes to the evolving field of decision science by showcasing the practical applicability of these methodologies within a C-IFS framework for complex decision scenarios. 展开更多
关键词 Multi-criteria decision-making circular intuitionistic fuzzy sets hotel recommendations
在线阅读 下载PDF
Performance evaluation of deep neural networks for forecasting time-series with multiple structural breaks and high volatility 被引量:2
14
作者 Rohit Kaushik Shikhar Jain +1 位作者 Siddhant Jain Tirtharaj Dash 《CAAI Transactions on Intelligence Technology》 EI 2021年第3期265-280,共16页
The problem of automatic and accurate forecasting of time-series data has always been an interesting challenge for the machine learning and forecasting community.A majority of the real-world time-series problems have ... The problem of automatic and accurate forecasting of time-series data has always been an interesting challenge for the machine learning and forecasting community.A majority of the real-world time-series problems have non-stationary characteristics that make the understanding of trend and seasonality difficult.The applicability of the popular deep neural networks(DNNs)as function approximators for non-stationary TSF is studied.The following DNN models are evaluated:Multi-layer Perceptron(MLP),Convolutional Neural Network(CNN),and RNN with Long Short-Term Memory(LSTM-RNN)and RNN with Gated-Recurrent Unit(GRU-RNN).These DNN methods have been evaluated over 10 popular Indian financial stocks data.Further,the performance evaluation of these DNNs has been carried out in multiple independent runs for two settings of forecasting:(1)single-step forecasting,and(2)multi-step forecasting.These DNN methods show convincing performance for single-step forecasting(one-day ahead forecast).For the multi-step forecasting(multiple days ahead forecast),the methods for different forecast periods are evaluated.The performance of these methods demonstrates that long forecast periods have an adverse effect on performance. 展开更多
关键词 NETWORKS NEURAL forecasting
在线阅读 下载PDF
Week Ahead Electricity Power and Price Forecasting Using Improved DenseNet-121 Method 被引量:2
15
作者 Muhammad Irfan Ali Raza +10 位作者 Faisal Althobiani Nasir Ayub Muhammad Idrees Zain Ali Kashif Rizwan Abdullah Saeed Alwadie Saleh Mohammed Ghonaim Hesham Abdushkour Saifur Rahman Omar Alshorman Samar Alqhtani 《Computers, Materials & Continua》 SCIE EI 2022年第9期4249-4265,共17页
In the Smart Grid(SG)residential environment,consumers change their power consumption routine according to the price and incentives announced by the utility,which causes the prices to deviate from the initial pattern.... In the Smart Grid(SG)residential environment,consumers change their power consumption routine according to the price and incentives announced by the utility,which causes the prices to deviate from the initial pattern.Thereby,electricity demand and price forecasting play a significant role and can help in terms of reliability and sustainability.Due to the massive amount of data,big data analytics for forecasting becomes a hot topic in the SG domain.In this paper,the changing and non-linearity of consumer consumption pattern complex data is taken as input.To minimize the computational cost and complexity of the data,the average of the feature engineering approaches includes:Recursive Feature Eliminator(RFE),Extreme Gradient Boosting(XGboost),Random Forest(RF),and are upgraded to extract the most relevant and significant features.To this end,we have proposed the DensetNet-121 network and Support Vector Machine(SVM)ensemble with Aquila Optimizer(AO)to ensure adaptability and handle the complexity of data in the classification.Further,the AO method helps to tune the parameters of DensNet(121 layers)and SVM,which achieves less training loss,computational time,minimized overfitting problems and more training/test accuracy.Performance evaluation metrics and statistical analysis validate the proposed model results are better than the benchmark schemes.Our proposed method has achieved a minimal value of the Mean Average Percentage Error(MAPE)rate i.e.,8%by DenseNet-AO and 6%by SVM-AO and the maximum accurateness rate of 92%and 95%,respectively. 展开更多
关键词 Smart grid deep neural networks consumer demand big data analytics load forecasting price forecasting
在线阅读 下载PDF
A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things(IoTs) 被引量:1
16
作者 Kanwal Imran Nasreen Anjum +3 位作者 Abdullah Alghamdi Asadullah Shaikh Mohammed Hamdi Saeed Mahfooz 《Computers, Materials & Continua》 SCIE EI 2022年第1期1033-1052,共20页
IPv6 over Low PowerWireless Personal Area Network(6LoWPAN)provides IP connectivity to the highly constrained nodes in the Internet of Things(IoTs).6LoWPANallows nodeswith limited battery power and storage capacity to ... IPv6 over Low PowerWireless Personal Area Network(6LoWPAN)provides IP connectivity to the highly constrained nodes in the Internet of Things(IoTs).6LoWPANallows nodeswith limited battery power and storage capacity to carry IPv6 datagrams over the lossy and error-prone radio links offered by the IEEE 802.15.4 standard,thus acting as an adoption layer between the IPv6 protocol and IEEE 802.15.4 network.The data link layer of IEEE 802.15.4 in 6LoWPAN is based on AES(Advanced Encryption Standard),but the 6LoWPANstandard lacks and has omitted the security and privacy requirements at higher layers.The sensor nodes in 6LoWPANcan join the network without requiring the authentication procedure.Therefore,from security perspectives,6LoWPAN is vulnerable to many attacks such as replay attack,Man-in-the-Middle attack,Impersonation attack,and Modification attack.This paper proposes a secure and efficient cluster-based authentication scheme(CBAS)for highly constrained sensor nodes in 6LoWPAN.In this approach,sensor nodes are organized into a cluster and communicate with the central network through a dedicated sensor node.The main objective of CBAS is to provide efficient and authentic communication among the 6LoWPAN nodes.To ensure the low signaling overhead during the registration,authentication,and handover procedures,we also introduce lightweight and efficient registration,de-registration,initial authentication,and handover procedures,when a sensor node or group of sensor nodes join or leave a cluster.Our security analysis shows that the proposed CBAS approach protects against various security attacks,including Identity Confidentiality attack,Modification attack,Replay attack,Man-in-the-middle attack,and Impersonation attack.Our simulation experiments show that CBAS has reduced the registration delay by 11%,handoff authentication delay by 32%,and signaling cost by 37%compared to the SGMS(Secure GroupMobility Scheme)and LAMS(Light-Wight Authentication&Mobility Scheme). 展开更多
关键词 IOT cyber security security attacks authentication delay handover delay signaling cost 6LoWPAN
在线阅读 下载PDF
A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems 被引量:1
17
作者 Tejasvi Alladi Varun Kohli +1 位作者 Vinay Chamola F.Richard Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1113-1122,共10页
With the rise of the Internet of Vehicles(IoV)and the number of connected vehicles increasing on the roads,Cooperative Intelligent Transportation Systems(C-ITSs)have become an important area of research.As the number ... With the rise of the Internet of Vehicles(IoV)and the number of connected vehicles increasing on the roads,Cooperative Intelligent Transportation Systems(C-ITSs)have become an important area of research.As the number of Vehicle to Vehicle(V2V)and Vehicle to Interface(V2I)communication links increases,the amount of data received and processed in the network also increases.In addition,networking interfaces need to be made more secure for which existing cryptography-based security schemes may not be sufficient.Thus,there is a need to augment them with intelligent network intrusion detection techniques.Some machine learning-based intrusion detection and anomaly detection techniques for vehicular networks have been proposed in recent times.However,given the expected large network size,there is a necessity for extensive data processing for use in such anomaly detection methods.Deep learning solutions are lucrative options as they remove the necessity for feature selection.Therefore,with the amount of vehicular network traffic increasing at an unprecedented rate in the C-ITS scenario,the need for deep learning-based techniques is all the more heightened.This work presents three deep learning-based misbehavior classification schemes for intrusion detection in IoV networks using Long Short Term Memory(LSTM)and Convolutional Neural Networks(CNNs).The proposed Deep Learning Classification Engines(DCLE)comprise of single or multi-step classification done by deep learning models that are deployed on the vehicular edge servers.Vehicular data received by the Road Side Units(RSUs)is pre-processed and forwarded to the edge server for classifications following the three classification schemes proposed in this paper.The proposed classifiers identify 18 different vehicular behavior types,the F1-scores ranging from 95.58%to 96.75%,much higher than the existing works.By running the classifiers on testbeds emulating edge servers,the prediction performance and prediction time comparison of the proposed scheme is compared with those of the existing studies. 展开更多
关键词 Vehicular Ad-hoc Networks(VANETs) Intelligent Transportation Systems(ITS) Artificial Intelligence(AI) Deep Learning Internet of Things(IoT)
在线阅读 下载PDF
A Transmission and Transformation Fault Detection Algorithm Based on Improved YOLOv5 被引量:1
18
作者 Xinliang Tang Xiaotong Ru +1 位作者 Jingfang Su Gabriel Adonis 《Computers, Materials & Continua》 SCIE EI 2023年第9期2997-3011,共15页
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line faults.Detecting these faults is of great significa... On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line faults.Detecting these faults is of great significance for the safe operation of power systems.Therefore,a YOLOv5 target detection method based on a deep convolution neural network is proposed.In this paper,Mobilenetv2 is used to replace Cross Stage Partial(CSP)-Darknet53 as the backbone.The structure uses depth-wise separable convolution to reduce the amount of calculation and parameters;improve the detection rate.At the same time,to compensate for the detection accuracy,the Squeeze-and-Excitation Networks(SENet)attention model is fused into the algorithm framework and a new detection scale suitable for small targets is added to improve the significance of the fault target area in the image.Collect pictures of foreign matters such as kites,plastic bags,balloons,and insulator defects of transmission lines,and sort theminto a data set.The experimental results on datasets show that themean Accuracy Precision(mAP)and recall rate of the algorithm can reach 92.1%and 92.4%,respectively.At the same time,by comparison,the detection accuracy of the proposed algorithm is higher than that of other methods. 展开更多
关键词 Transmission line YOLOv5 multi-scale integration SENet
在线阅读 下载PDF
An Architecture Supporting Intelligent Mobile Healthcare Using Human-Computer Interaction HCI Principles 被引量:1
19
作者 Mesfer Alrizq Shauban Ali Solangi +3 位作者 Abdullah Alghamdi Muhammad Ali Nizamani Muhammad Ali Memon Mohammed Hamdi 《Computer Systems Science & Engineering》 SCIE EI 2022年第2期557-569,共13页
Recent advancements in the Internet of Things IoT and cloud computing have paved the way for mobile Healthcare(mHealthcare)services.A patient within the hospital is monitored by several devices.Moreover,upon leaving t... Recent advancements in the Internet of Things IoT and cloud computing have paved the way for mobile Healthcare(mHealthcare)services.A patient within the hospital is monitored by several devices.Moreover,upon leaving the hospital,the patient can be remotely monitored whether directly using body wearable sensors or using a smartphone equipped with sensors to monitor different user-health parameters.This raises potential challenges for intelligent monitoring of patient's health.In this paper,an improved architecture for smart mHealthcare is proposed that is supported by HCI design principles.The HCI also provides the support for the User-Centric Design(UCD)for smart mHealthcare models.Furthermore,the HCI along with IoT's(Internet of Things)5-layered architecture has the potential of improving User Experience(UX)in mHealthcare design and help saving lives.The intelligent mHealthcare system is supported by the IoT sensing and communication layers and health care providers are supported by the application layer for the medical,behavioral,and health-related information.Health care providers and users are further supported by an intelligent layer performing critical situation assessment and performing a multi-modal communication using an intelligent assistant.The HCI design focuses on the ease-of-use,including user experience and safety,alarms,and error-resistant displays of the end-user,and improves user's experience and user satisfaction. 展开更多
关键词 Human computer interaction mhealthcare user-centric design sensor network nternet-of-things
在线阅读 下载PDF
Detection and Classification of Hemorrhages in Retinal Images 被引量:1
20
作者 Ghassan Ahmed Ali Thamer Mitib Ahmad Al Sariera +2 位作者 Muhammad Akram Adel Sulaiman Fekry Olayah 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1601-1616,共16页
Damage of the blood vessels in retina due to diabetes is called diabetic retinopathy(DR).Hemorrhages is thefirst clinically visible symptoms of DR.This paper presents a new technique to extract and classify the hemorrh... Damage of the blood vessels in retina due to diabetes is called diabetic retinopathy(DR).Hemorrhages is thefirst clinically visible symptoms of DR.This paper presents a new technique to extract and classify the hemorrhages in fundus images.The normal objects such as blood vessels,fovea and optic disc inside retinal images are masked to distinguish them from hemorrhages.For masking blood vessels,thresholding that separates blood vessels and background intensity followed by a newfilter to extract the border of vessels based on orienta-tions of vessels are used.For masking optic disc,the image is divided into sub-images then the brightest window with maximum variance in intensity is selected.Then the candidate dark regions are extracted based on adaptive thresholding and top-hat morphological techniques.Features are extracted from each candidate region based on ophthalmologist selection such as color and size and pattern recognition techniques such as texture and wavelet features.Three different types of Support Vector Machine(SVM),Linear SVM,Quadratic SVM and Cubic SVM classifier are applied to classify the candidate dark regions as either hemor-rhages or healthy.The efficacy of the proposed method is demonstrated using the standard benchmark DIARETDB1 database and by comparing the results with methods in silico.The performance of the method is measured based on average sensitivity,specificity,F-score and accuracy.Experimental results show the Linear SVM classifier gives better results than Cubic SVM and Quadratic SVM with respect to sensitivity and accuracy and with respect to specificity Quadratic SVM gives better result as compared to other SVMs. 展开更多
关键词 Diabetic retinopathy HEMORRHAGES adaptive thresholding support vector machine
在线阅读 下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部