期刊文献+
共找到50篇文章
< 1 2 3 >
每页显示 20 50 100
An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment
1
作者 Tarak Dhaouadi Hichem Mrabet +1 位作者 Adeeb Alhomoud Abderrazak Jemai 《Computers, Materials & Continua》 2025年第3期4535-4554,共20页
The increasing adoption of Industrial Internet of Things(IIoT)systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems(IDS)to be effective.How... The increasing adoption of Industrial Internet of Things(IIoT)systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems(IDS)to be effective.However,existing datasets for IDS training often lack relevance to modern IIoT environments,limiting their applicability for research and development.To address the latter gap,this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems.As a consequence,that can be used by an IDS to detect imminent threats.Likewise,HiTar-2024 was generated using the AREZZO simulator,which replicates realistic smart manufacturing scenarios.The generated dataset includes five distinct classes:Normal,Probing,Remote to Local(R2L),User to Root(U2R),and Denial of Service(DoS).Furthermore,comprehensive experiments with popular Machine Learning(ML)models using various classifiers,including BayesNet,Logistic,IBK,Multiclass,PART,and J48 demonstrate high accuracy,precision,recall,and F1-scores,exceeding 0.99 across all ML metrics.The latter result is reached thanks to the rigorous applied process to achieve this quite good result,including data pre-processing,features extraction,fixing the class imbalance problem,and using a test option for model robustness.This comprehensive approach emphasizes meticulous dataset construction through a complete dataset generation process,a careful labelling algorithm,and a sophisticated evaluation method,providing valuable insights to reinforce IIoT system security.Finally,the HiTar-2024 dataset is compared with other similar datasets in the literature,considering several factors such as data format,feature extraction tools,number of features,attack categories,number of instances,and ML metrics. 展开更多
关键词 Intrusion detection system industrial IoT machine learning security cyber-attacks DATASET
在线阅读 下载PDF
Deep Fake Detection Using Computer Vision-Based Deep Neural Network with Pairwise Learning
2
作者 R.Saravana Ram M.Vinoth Kumar +3 位作者 Tareq M.Al-shami Mehedi Masud Hanan Aljuaid Mohamed Abouhawwash 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2449-2462,共14页
Deep learning-based approaches are applied successfully in manyfields such as deepFake identification,big data analysis,voice recognition,and image recognition.Deepfake is the combination of deep learning in fake creati... Deep learning-based approaches are applied successfully in manyfields such as deepFake identification,big data analysis,voice recognition,and image recognition.Deepfake is the combination of deep learning in fake creation,which states creating a fake image or video with the help of artificial intelligence for political abuse,spreading false information,and pornography.The artificial intel-ligence technique has a wide demand,increasing the problems related to privacy,security,and ethics.This paper has analyzed the features related to the computer vision of digital content to determine its integrity.This method has checked the computer vision features of the image frames using the fuzzy clustering feature extraction method.By the proposed deep belief network with loss handling,the manipulation of video/image is found by means of a pairwise learning approach.This proposed approach has improved the accuracy of the detection rate by 98%on various datasets. 展开更多
关键词 Deep fake deep belief network fuzzy clustering feature extraction pairwise learning
在线阅读 下载PDF
A novel medical image data protection scheme for smart healthcare system
3
作者 Mujeeb Ur Rehman Arslan Shafique +6 位作者 Muhammad Shahbaz Khan Maha Driss Wadii Boulila Yazeed Yasin Ghadi Suresh Babu Changalasetty Majed Alhaisoni Jawad Ahmad 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第4期821-836,共16页
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the Internet.Recently,smart healthcare has emerged as a significant application of ... The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the Internet.Recently,smart healthcare has emerged as a significant application of the IoMT,particularly in the context of knowledge‐based learning systems.Smart healthcare systems leverage knowledge‐based learning to become more context‐aware,adaptable,and auditable while maintain-ing the ability to learn from historical data.In smart healthcare systems,devices capture images,such as X‐rays,Magnetic Resonance Imaging.The security and integrity of these images are crucial for the databases used in knowledge‐based learning systems to foster structured decision‐making and enhance the learning abilities of AI.Moreover,in knowledge‐driven systems,the storage and transmission of HD medical images exert a burden on the limited bandwidth of the communication channel,leading to data trans-mission delays.To address the security and latency concerns,this paper presents a lightweight medical image encryption scheme utilising bit‐plane decomposition and chaos theory.The results of the experiment yield entropy,energy,and correlation values of 7.999,0.0156,and 0.0001,respectively.This validates the effectiveness of the encryption system proposed in this paper,which offers high‐quality encryption,a large key space,key sensitivity,and resistance to statistical attacks. 展开更多
关键词 data analysis medical image processing SECURITY
在线阅读 下载PDF
A Decision Tree Classifier for Intrusion Detection Priority Tagging 被引量:3
4
作者 Adel Ammar 《Journal of Computer and Communications》 2015年第4期52-58,共7页
Snort rule-checking is one of the most popular forms of Network Intrusion Detection Systems (NIDS). In this article, we show that Snort priorities of true positive traffic (real attacks) can be approximated in real-ti... Snort rule-checking is one of the most popular forms of Network Intrusion Detection Systems (NIDS). In this article, we show that Snort priorities of true positive traffic (real attacks) can be approximated in real-time, in the context of high speed networks, by a decision tree classifier, using the information of only three easily extracted features (protocol, source port, and destination port), with an accuracy of 99%. Snort issues alert priorities based on its own default set of attack classes (34 classes) that are used by the default set of rules it provides. But the decision tree model is able to predict the priorities without using this default classification. The obtained tagger can provide a useful complement to an anomaly detection intrusion detection system. 展开更多
关键词 INTRUSION Detection Network Security SNORT Machine Learning Classification DECISION TREE
在线阅读 下载PDF
Unmanned Aerial Vehicle Assisted Forest Fire Detection Using Deep Convolutional Neural Network 被引量:2
5
作者 A.K.Z Rasel Rahman S.M.Nabil Sakif +3 位作者 Niloy Sikder Mehedi Masud Hanan Aljuaid Anupam Kumar Bairagi 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3259-3277,共19页
Disasters may occur at any time and place without little to no presage in advance.With the development of surveillance and forecasting systems,it is now possible to forebode the most life-threatening and formidable di... Disasters may occur at any time and place without little to no presage in advance.With the development of surveillance and forecasting systems,it is now possible to forebode the most life-threatening and formidable disasters.However,forestfires are among the ones that are still hard to anticipate beforehand,and the technologies to detect and plot their possible courses are still in development.Unmanned Aerial Vehicle(UAV)image-basedfire detection systems can be a viable solution to this problem.However,these automatic systems use advanced deep learning and image processing algorithms at their core and can be tuned to provide accurate outcomes.Therefore,this article proposed a forestfire detection method based on a Convolutional Neural Network(CNN)architecture using a newfire detection dataset.Notably,our method also uses separable convolution layers(requiring less computational resources)for immediatefire detection and typical convolution layers.Thus,making it suitable for real-time applications.Consequently,after being trained on the dataset,experimental results show that the method can identify forestfires within images with a 97.63%accuracy,98.00%F1 Score,and 80%Kappa.Hence,if deployed in practical circumstances,this identification method can be used as an assistive tool to detectfire outbreaks,allowing the authorities to respond quickly and deploy preventive measures to minimize damage. 展开更多
关键词 Forestfire detection UAV CNN machine learning
在线阅读 下载PDF
Brain Tumor Detection and Classification Using PSO and Convolutional Neural Network 被引量:2
6
作者 Muhammad Ali Jamal Hussain Shah +5 位作者 Muhammad Attique Khan Majed Alhaisoni Usman Tariq Tallha Akram Ye Jin Kim Byoungchol Chang 《Computers, Materials & Continua》 SCIE EI 2022年第12期4501-4518,共18页
Tumor detection has been an active research topic in recent years due to the high mortality rate.Computer vision(CV)and image processing techniques have recently become popular for detecting tumors inMRI images.The au... Tumor detection has been an active research topic in recent years due to the high mortality rate.Computer vision(CV)and image processing techniques have recently become popular for detecting tumors inMRI images.The automated detection process is simpler and takes less time than manual processing.In addition,the difference in the expanding shape of brain tumor tissues complicates and complicates tumor detection for clinicians.We proposed a newframework for tumor detection aswell as tumor classification into relevant categories in this paper.For tumor segmentation,the proposed framework employs the Particle Swarm Optimization(PSO)algorithm,and for classification,the convolutional neural network(CNN)algorithm.Popular preprocessing techniques such as noise removal,image sharpening,and skull stripping are used at the start of the segmentation process.Then,PSO-based segmentation is applied.In the classification step,two pre-trained CNN models,alexnet and inception-V3,are used and trained using transfer learning.Using a serial approach,features are extracted from both trained models and fused features for final classification.For classification,a variety of machine learning classifiers are used.Average dice values on datasets BRATS-2018 and BRATS-2017 are 98.11 percent and 98.25 percent,respectively,whereas average jaccard values are 96.30 percent and 96.57%(Segmentation Results).The results were extended on the same datasets for classification and achieved 99.0%accuracy,sensitivity of 0.99,specificity of 0.99,and precision of 0.99.Finally,the proposed method is compared to state-of-the-art existingmethods and outperforms them. 展开更多
关键词 Magnetic resonance imaging(MRI) tumor segmentation deep learning features extraction CLASSIFICATION
在线阅读 下载PDF
Automated Patient Discomfort Detection Using Deep Learning 被引量:1
7
作者 Imran Ahmed Iqbal Khan +2 位作者 Misbah Ahmad Awais Adnan Hanan Aljuaid 《Computers, Materials & Continua》 SCIE EI 2022年第5期2559-2577,共19页
The Internet of Things(IoT)has been transformed almost all fields of life,but its impact on the healthcare sector has been notable.Various IoTbased sensors are used in the healthcare sector and offer quality and safe ... The Internet of Things(IoT)has been transformed almost all fields of life,but its impact on the healthcare sector has been notable.Various IoTbased sensors are used in the healthcare sector and offer quality and safe care to patients.This work presents a deep learning-based automated patient discomfort detection system in which patients’discomfort is non-invasively detected.To do this,the overhead view patients’data set has been recorded.For testing and evaluation purposes,we investigate the power of deep learning by choosing a Convolution Neural Network(CNN)based model.The model uses confidence maps and detects 18 different key points at various locations of the body of the patient.Applying association rules and part affinity fields,the detected key points are later converted into six main body organs.Furthermore,the distance of subsequent key points is measured using coordinates information.Finally,distance and the time-based threshold are used for the classification of movements associated with discomfort or normal conditions.The accuracy of the proposed system is assessed on various test sequences.The experimental outcomes reveal the worth of the proposed system’by obtaining a True Positive Rate of 98%with a 2%False Positive Rate. 展开更多
关键词 Artificial intelligence patient monitoring discomfort detection deep learning
在线阅读 下载PDF
Automated White Blood Cell Disease Recognition Using Lightweight Deep Learning 被引量:1
8
作者 Abdullah Alqahtani Shtwai Alsubai +3 位作者 Mohemmed Sha Muhammad Attique Khan Majed Alhaisoni Syed Rameez Naqvi 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期107-123,共17页
White blood cells(WBC)are immune system cells,which is why they are also known as immune cells.They protect the human body from a variety of dangerous diseases and outside invaders.The majority of WBCs come from red b... White blood cells(WBC)are immune system cells,which is why they are also known as immune cells.They protect the human body from a variety of dangerous diseases and outside invaders.The majority of WBCs come from red bone marrow,although some come from other important organs in the body.Because manual diagnosis of blood disorders is difficult,it is necessary to design a computerized technique.Researchers have introduced various automated strategies in recent years,but they still face several obstacles,such as imbalanced datasets,incorrect feature selection,and incorrect deep model selection.We proposed an automated deep learning approach for classifying white blood disorders in this paper.The data augmentation approach is initially used to increase the size of a dataset.Then,a Darknet-53 pre-trained deep learning model is used and finetuned according to the nature of the chosen dataset.On the fine-tuned model,transfer learning is used,and features engineering is done on the global average pooling layer.The retrieved characteristics are subsequently improved with a specified number of iterations using a hybrid reformed binary grey wolf optimization technique.Following that,machine learning classifiers are used to classify the selected best features for final classification.The experiment was carried out using a dataset of increased blood diseases imaging and resulted in an improved accuracy of over 99%. 展开更多
关键词 White blood cells augmentation deep features feature selection CLASSIFICATION
在线阅读 下载PDF
HybridHR-Net:Action Recognition in Video Sequences Using Optimal Deep Learning Fusion Assisted Framework 被引量:1
9
作者 Muhammad Naeem Akbar Seemab Khan +3 位作者 Muhammad Umar Farooq Majed Alhaisoni Usman Tariq Muhammad Usman Akram 《Computers, Materials & Continua》 SCIE EI 2023年第9期3275-3295,共21页
The combination of spatiotemporal videos and essential features can improve the performance of human action recognition(HAR);however,the individual type of features usually degrades the performance due to similar acti... The combination of spatiotemporal videos and essential features can improve the performance of human action recognition(HAR);however,the individual type of features usually degrades the performance due to similar actions and complex backgrounds.The deep convolutional neural network has improved performance in recent years for several computer vision applications due to its spatial information.This article proposes a new framework called for video surveillance human action recognition dubbed HybridHR-Net.On a few selected datasets,deep transfer learning is used to pre-trained the EfficientNet-b0 deep learning model.Bayesian optimization is employed for the tuning of hyperparameters of the fine-tuned deep model.Instead of fully connected layer features,we considered the average pooling layer features and performed two feature selection techniques-an improved artificial bee colony and an entropy-based approach.Using a serial nature technique,the features that were selected are combined into a single vector,and then the results are categorized by machine learning classifiers.Five publically accessible datasets have been utilized for the experimental approach and obtained notable accuracy of 97%,98.7%,100%,99.7%,and 96.8%,respectively.Additionally,a comparison of the proposed framework with contemporarymethods is done to demonstrate the increase in accuracy. 展开更多
关键词 Action recognition ENTROPY deep learning transfer learning artificial bee colony feature fusion
在线阅读 下载PDF
Comparison of Feature Reduction Techniques for the Binominal Classification of Network Traffic 被引量:1
10
作者 Adel Ammar 《Journal of Data Analysis and Information Processing》 2015年第2期11-19,共9页
This paper tests various scenarios of feature selection and feature reduction, with the objective of building a real-time anomaly-based intrusion detection system. These scenarios are evaluated on the realistic Kyoto ... This paper tests various scenarios of feature selection and feature reduction, with the objective of building a real-time anomaly-based intrusion detection system. These scenarios are evaluated on the realistic Kyoto 2006+ dataset. The influence of reducing the number of features on the classification performance and the execution time is measured for each scenario. The so-called HVS feature selection technique detailed in this paper reveals many advantages in terms of consistency, classification performance and execution time. 展开更多
关键词 INTRUSION Detection Network Security FEATURE Selection KYOTO DATASET Neural Networks PCA PLS
在线阅读 下载PDF
Traffic Management in Internet of Vehicles Using Improved Ant Colony Optimization 被引量:2
11
作者 Abida Sharif Imran Sharif +6 位作者 Muhammad Asim Saleem Muhammad Attique Khan Majed Alhaisoni Marriam Nawaz Abdullah Alqahtani Ye Jin Kim Byoungchol Chang 《Computers, Materials & Continua》 SCIE EI 2023年第6期5379-5393,共15页
The Internet of Vehicles(IoV)is a networking paradigm related to the intercommunication of vehicles using a network.In a dynamic network,one of the key challenges in IoV is traffic management under increasing vehicles... The Internet of Vehicles(IoV)is a networking paradigm related to the intercommunication of vehicles using a network.In a dynamic network,one of the key challenges in IoV is traffic management under increasing vehicles to avoid congestion.Therefore,optimal path selection to route traffic between the origin and destination is vital.This research proposed a realistic strategy to reduce traffic management service response time by enabling real-time content distribution in IoV systems using heterogeneous network access.Firstly,this work proposed a novel use of the Ant Colony Optimization(ACO)algorithm and formulated the path planning optimization problem as an Integer Linear Program(ILP).This integrates the future estimation metric to predict the future arrivals of the vehicles,searching the optimal routes.Considering the mobile nature of IOV,fuzzy logic is used for congestion level estimation along with the ACO to determine the optimal path.The model results indicate that the suggested scheme outperforms the existing state-of-the-art methods by identifying the shortest and most cost-effective path.Thus,this work strongly supports its use in applications having stringent Quality of Service(QoS)requirements for the vehicles. 展开更多
关键词 Internet of vehicles internet of things fuzzy logic OPTIMIZATION path planning
在线阅读 下载PDF
Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic 被引量:2
12
作者 Ammar Almomani Iman Akour +5 位作者 Ahmed M.Manasrah Omar Almomani Mohammad Alauthman Esra’a Abdullah Amaal Al Shwait Razan Al Sharaa 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期2499-2517,共19页
The exponential growth of Internet and network usage has neces-sitated heightened security measures to protect against data and network breaches.Intrusions,executed through network packets,pose a significant challenge... The exponential growth of Internet and network usage has neces-sitated heightened security measures to protect against data and network breaches.Intrusions,executed through network packets,pose a significant challenge for firewalls to detect and prevent due to the similarity between legit-imate and intrusion traffic.The vast network traffic volume also complicates most network monitoring systems and algorithms.Several intrusion detection methods have been proposed,with machine learning techniques regarded as promising for dealing with these incidents.This study presents an Intrusion Detection System Based on Stacking Ensemble Learning base(Random For-est,Decision Tree,and k-Nearest-Neighbors).The proposed system employs pre-processing techniques to enhance classification efficiency and integrates seven machine learning algorithms.The stacking ensemble technique increases performance by incorporating three base models(Random Forest,Decision Tree,and k-Nearest-Neighbors)and a meta-model represented by the Logistic Regression algorithm.Evaluated using the UNSW-NB15 dataset,the pro-posed IDS gained an accuracy of 96.16%in the training phase and 97.95%in the testing phase,with precision of 97.78%,and 98.40%for taring and testing,respectively.The obtained results demonstrate improvements in other measurement criteria. 展开更多
关键词 Intrusion detection system(IDS) machine learning techniques stacking ensemble random forest decision tree k-nearest-neighbor
在线阅读 下载PDF
Covid-19 CT Lung Image Segmentation Using Adaptive Donkey and Smuggler Optimization Algorithm 被引量:1
13
作者 P.Prabu K.Venkatachalam +3 位作者 Ala Saleh Alluhaidan Radwa Marzouk Myriam Hadjouni Sahar A.El_Rahman 《Computers, Materials & Continua》 SCIE EI 2022年第4期1133-1152,共20页
COVID’19 has caused the entire universe to be in existential healthcrisis by spreading globally in the year 2020. The lungs infection is detected inComputed Tomography (CT) images which provide the best way to increa... COVID’19 has caused the entire universe to be in existential healthcrisis by spreading globally in the year 2020. The lungs infection is detected inComputed Tomography (CT) images which provide the best way to increasethe existing healthcare schemes in preventing the deadly virus. Nevertheless,separating the infected areas in CT images faces various issues such as lowintensity difference among normal and infectious tissue and high changes inthe characteristics of the infection. To resolve these issues, a new inf-Net (LungInfection Segmentation Deep Network) is designed for detecting the affectedareas from the CT images automatically. For the worst segmentation results,the Edge-Attention Representation (EAR) is optimized using AdaptiveDonkey and Smuggler Optimization (ADSO). The edges which are identifiedby the ADSO approach is utilized for calculating dissimilarities. An IFCM(Intuitionistic Fuzzy C-Means) clustering approach is applied for computingthe similarity of the EA component among the generated edge maps andGround-Truth (GT) edge maps. Also, a Semi-Supervised Segmentation(SSS) structure is designed using the Randomly Selected Propagation (RP)technique and Inf-Net, which needs only less number of images and unlabelleddata. Semi-Supervised Multi-Class Segmentation (SSMCS) is designed usinga Bi-LSTM (Bi-Directional Long-Short-Term-memory), acquires all theadvantages of the disease segmentation done using Semi Inf-Net and enhancesthe execution of multi-class disease labelling. The newly designed SSMCSapproach is compared with existing U-Net++, MCS, and Semi-Inf-Net.factors such as MAE (Mean Absolute Error), Structure measure, Specificity(Spec), Dice Similarity coefficient, Sensitivity (Sen), and Enhance-AlignmentMeasure are considered for evaluation purpose. 展开更多
关键词 Adaptive donkey and snuggler optimization.bi-directional long short term memory coronavirus disease 2019 randomly selected propagation semi-supervised learning
在线阅读 下载PDF
Design Principles-Based Interactive Learning Tool for Solving Nonlinear Equations
14
作者 Ahad Alloqmani Omimah Alsaedi +2 位作者 Nadia Bahatheg Reem Alnanih Lamiaa Elrefaei 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期1023-1042,共20页
Interactive learning tools can facilitate the learning process and increase student engagement,especially tools such as computer programs that are designed for human-computer interaction.Thus,this paper aims to help s... Interactive learning tools can facilitate the learning process and increase student engagement,especially tools such as computer programs that are designed for human-computer interaction.Thus,this paper aims to help students learn five different methods for solving nonlinear equations using an interactive learning tool designed with common principles such as feedback,visibility,affordance,consistency,and constraints.It also compares these methods by the number of iterations and time required to display the result.This study helps students learn these methods using interactive learning tools instead of relying on traditional teaching methods.The tool is implemented using the MATLAB app and is evaluated through usability testing with two groups of users that are categorized by their level of experience with root-finding.Users with no knowledge in root-finding confirmed that they understood the root-finding concept when interacting with the designed tool.The positive results of the user evaluation showed that the tool can be recommended to other users. 展开更多
关键词 Graphical user interface(GUI) interactive learning tool design principles nonlinear equations experimental design
在线阅读 下载PDF
Integrated Approach of Brain Disorder Analysis by Using Deep Learning Based on DNA Sequence
15
作者 Ahmed Zohair Ibrahim P.Prakash +1 位作者 V.Sakthivel P.Prabu 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2447-2460,共14页
In order to research brain problems using MRI,PET,and CT neuroimaging,a correct understanding of brain function is required.This has been considered in earlier times with the support of traditional algorithms.Deep lea... In order to research brain problems using MRI,PET,and CT neuroimaging,a correct understanding of brain function is required.This has been considered in earlier times with the support of traditional algorithms.Deep learning process has also been widely considered in these genomics data processing system.In this research,brain disorder illness incliding Alzheimer’s disease,Schizophrenia and Parkinson’s diseaseis is analyzed owing to misdetection of disorders in neuroimaging data examined by means fo traditional methods.Moeover,deep learning approach is incorporated here for classification purpose of brain disorder with the aid of Deep Belief Networks(DBN).Images are stored in a secured manner by using DNA sequence based on JPEG Zig Zag Encryption algorithm(DBNJZZ)approach.The suggested approach is executed and tested by using the performance metric measure such as accuracy,root mean square error,Mean absolute error and mean absolute percentage error.Proposed DBNJZZ gives better performance than previously available methods. 展开更多
关键词 Deep belief networks zig zag deep learning mean absolute percentage error mean absolute error root mean square error DNA GENOMICS
在线阅读 下载PDF
Knee Osteoarthritis Classification Using X-Ray Images Based on Optimal Deep Neural Network
16
作者 Abdul Haseeb Muhammad Attique Khan +4 位作者 Faheem Shehzad Majed Alhaisoni Junaid Ali Khan Taerang Kim Jae-Hyuk Cha 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2397-2415,共19页
X-Ray knee imaging is widely used to detect knee osteoarthritis due to ease of availability and lesser cost.However,the manual categorization of knee joint disorders is time-consuming,requires an expert person,and is ... X-Ray knee imaging is widely used to detect knee osteoarthritis due to ease of availability and lesser cost.However,the manual categorization of knee joint disorders is time-consuming,requires an expert person,and is costly.This article proposes a new approach to classifying knee osteoarthritis using deep learning and a whale optimization algorithm.Two pre-trained deep learning models(Efficientnet-b0 and Densenet201)have been employed for the training and feature extraction.Deep transfer learning with fixed hyperparameter values has been employed to train both selected models on the knee X-Ray images.In the next step,fusion is performed using a canonical correlation approach and obtained a feature vector that has more information than the original feature vector.After that,an improved whale optimization algorithm is developed for dimensionality reduction.The selected features are finally passed to the machine learning algorithms such as Fine-Tuned support vector machine(SVM)and neural networks for classification purposes.The experiments of the proposed framework have been conducted on the publicly available dataset and obtained the maximum accuracy of 90.1%.Also,the system is explained using Explainable Artificial Intelligence(XAI)technique called occlusion,and results are compared with recent research.Based on the results compared with recent techniques,it is shown that the proposed method’s accuracy significantly improved. 展开更多
关键词 Knee joints magnetic resonance imaging(MRI) deep learning FUSION optimization neural network
在线阅读 下载PDF
Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges
17
作者 Salam Al-E’mari Mohammed Anbar +2 位作者 Yousef Sanjalawe Selvakumar Manickam Iznan Hasbullah 《Computer Systems Science & Engineering》 SCIE EI 2022年第1期87-112,共26页
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches.However,the current approaches have challenges... Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches.However,the current approaches have challenges in detecting intrusions,which may affect the performance of the overall detection system as well as network performance.For the time being,one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology.Blockchain technology moves in the direction of persistent revolution and change.It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are.Recently,blockchain was integrated into intrusion detection systems to enhance their overall performance.Blockchain has also been adopted in health-care,supply chain management,and the Internet of Things.Blockchain uses robust cryptography with private and public keys,and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party.To explore and highlight the importance of integrating blockchain with intrusion detection systems,this paper provides a comprehensive background of intrusion detection systems and blockchain technology.Furthermore,a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented.Finally,this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology. 展开更多
关键词 Blockchain intrusiondetectionsystem networksecurity maliciousattacks
在线阅读 下载PDF
Eigenstructure Assignment Method and Its Applications to the Constrained Problem
18
作者 H. Maarouf A. Baddou 《World Journal of Engineering and Technology》 2014年第2期159-170,共12页
A partial eigenstructure assignment method that keeps the open-loop stable eigenvalues and the corresponding eigenspace unchanged is presented. This method generalizes a large class of systems previous methods and can... A partial eigenstructure assignment method that keeps the open-loop stable eigenvalues and the corresponding eigenspace unchanged is presented. This method generalizes a large class of systems previous methods and can be applied to solve the constrained control problem for linear invariant continuous-time systems. Besides, it can be also applied to make a total eigenstructure assignment. Indeed, the problem of finding a stabilizing regulator matrix gain taking into account the asymmetrical control constraints is transformed to a Sylvester equation resolution. Examples are given to illustrate the obtained results. 展开更多
关键词 SYLVESTER EQUATION LINEAR CONTINUOUS-TIME Systems CONSTRAINED Control
在线阅读 下载PDF
A Healthcare System for COVID19 Classification Using Multi-Type Classical Features Selection
19
作者 Muhammad Attique Khan Majed Alhaisoni +5 位作者 Muhammad Nazir Abdullah Alqahtani Adel Binbusayyis Shtwai Alsubai Yunyoung Nam Byeong-Gwon Kang 《Computers, Materials & Continua》 SCIE EI 2023年第1期1393-1412,共20页
The coronavirus(COVID19),also known as the novel coronavirus,first appeared in December 2019 in Wuhan,China.After that,it quickly spread throughout the world and became a disease.It has significantly impacted our ever... The coronavirus(COVID19),also known as the novel coronavirus,first appeared in December 2019 in Wuhan,China.After that,it quickly spread throughout the world and became a disease.It has significantly impacted our everyday lives,the national and international economies,and public health.However,early diagnosis is critical for prompt treatment and reducing trauma in the healthcare system.Clinical radiologists primarily use chest X-rays,and computerized tomography(CT)scans to test for pneumonia infection.We used Chest CT scans to predict COVID19 pneumonia and healthy scans in this study.We proposed a joint framework for prediction based on classical feature fusion and PSO-based optimization.We begin by extracting standard features such as discrete wavelet transforms(DWT),discrete cosine transforms(DCT),and dominant rotated local binary patterns(DRLBP).In addition,we extracted Shanon Entropy and Kurtosis features.In the following step,a Max-Covariance-based maximization approach for feature fusion is proposed.The fused features are optimized in the preliminary phase using Particle Swarm Optimization(PSO)and the ELM fitness function.For final prediction,PSO is used to obtain robust features,which are then implanted in a Support Vector Data Description(SVDD)classifier.The experiment is carried out using available COVID19 Chest CT Scans and scans from healthy patients.These images are from the Radiopaedia website.For the proposed scheme,the fusion and selection process accuracy is 88.6%and 93.1%,respectively.A detailed analysis is conducted,which supports the proposed system efficiency. 展开更多
关键词 COVID19 features extraction information fusion OPTIMIZATION PREDICTION
暂未订购
Fast Semantic Duplicate Detection Techniques in Databases
20
作者 Ibrahim Moukouop Nguena Amolo-Makama Ophélie Carmen Richeline 《Journal of Software Engineering and Applications》 2017年第6期529-545,共17页
Semantic duplicates in databases represent today an important data quality challenge which leads to bad decisions. In large databases, we sometimes find ourselves with tens of thousands of duplicates, which necessitat... Semantic duplicates in databases represent today an important data quality challenge which leads to bad decisions. In large databases, we sometimes find ourselves with tens of thousands of duplicates, which necessitates an automatic deduplication. For this, it is necessary to detect duplicates, with a fairly reliable method to find as many duplicates as possible and powerful enough to run in a reasonable time. This paper proposes and compares on real data effective duplicates detection methods for automatic deduplication of files based on names, working with French texts or English texts, and the names of people or places, in Africa or in the West. After conducting a more complete classification of semantic duplicates than the usual classifications, we introduce several methods for detecting duplicates whose average complexity observed is less than O(2n). Through a simple model, we highlight a global efficacy rate, combining precision and recall. We propose a new metric distance between records, as well as rules for automatic duplicate detection. Analyses made on a database containing real data for an administration in Central Africa, and on a known standard database containing names of restaurants in the USA, have shown better results than those of known methods, with a lesser complexity. 展开更多
关键词 SEMANTIC DUPLICATE DETECTION Technique DETECTION CAPABILITY Automatic DEDUPLICATION DETECTION Rates and Error Rates
暂未订购
上一页 1 2 3 下一页 到第
使用帮助 返回顶部