期刊文献+
共找到44篇文章
< 1 2 3 >
每页显示 20 50 100
Predicting Immunotherapy Outcomes in Colorectal Cancer Using Machine Learning and Multi-Omic Biomarkers:Development of a Real-Time Predictive Web Application
1
作者 Thomas Kidu Harini Kethar +4 位作者 Haben Gebrekidan Haleem Farman Ahmed Sedik Walid El-Shafai Jawad Khan 《Computer Modeling in Engineering & Sciences》 2026年第2期1166-1184,共19页
Colorectal cancer is the third most diagnosed cancer worldwide,and immune checkpoint inhibitors have shown promising therapeutic outcomes in selected patient groups.This study performed a comprehensive analysis of mul... Colorectal cancer is the third most diagnosed cancer worldwide,and immune checkpoint inhibitors have shown promising therapeutic outcomes in selected patient groups.This study performed a comprehensive analysis of multi-omics data from The Cancer Genome Atlas colorectal adenocarcinoma cohort(TCGA-COADREAD),accessed through cBioPortal,to develop machine learning models for predicting progression-free survival(PFS)following immunotherapy.The dataset included clinical variables,genomic alterations in Kirsten Rat Sarcoma Viral Oncogene Homolog(KRAS),B-Raf Proto-Oncogene(BRAF),and Neuroblastoma RAS Viral Oncogene Homolog(NRAS),microsatellite instability(MSI)status,tumor mutation burden(TMB),and expression of immune checkpoint genes.Kaplan–Meier analysis showed that KRAS mutations were significantly associated with reduced PFS,while BRAF and NRAS mutations had no significant impact.MSI-high tumors exhibited elevated TMB and increased immune checkpoint expression,reflecting their immunologically active phenotype.We developed both survival and classification models,with the Extra Trees classifier achieving the best performance(accuracy=0.86,precision=0.67,recall=0.70,F1-score=0.68,AUC=0.84).These findings highlight the potential of combining genomic and immune biomarkers with machine learning to improve patient stratification and guide personalized immunotherapy decisions.An interactive web application was also developed to enable clinicians to input patient-specific molecular and clinical data and visualize individualized PFS predictions,supporting timely,data-driven treatment planning. 展开更多
关键词 Colorectal cancer immunotherapy microsatellite instability tumor mutation burden immune check-point inhibitors multi-omics machine learning survival analysis progression-free survival clinical decision support
暂未订购
Genetic Based Approach for Optimal Power and Channel Allocation to Enhance D2D Underlaied Cellular Network Capacity in 5G 被引量:1
2
作者 Ahmed.A.Rosas Mona Shokair M.I.Dessouky 《Computers, Materials & Continua》 SCIE EI 2022年第8期3751-3762,共12页
With the obvious throughput shortage in traditional cellular radio networks,Device-to-Device(D2D)communications has gained a lot of attention to improve the utilization,capacity and channel performance of nextgenerati... With the obvious throughput shortage in traditional cellular radio networks,Device-to-Device(D2D)communications has gained a lot of attention to improve the utilization,capacity and channel performance of nextgeneration networks.In this paper,we study a joint consideration of power and channel allocation based on genetic algorithm as a promising direction to expand the overall network capacity for D2D underlaied cellular networks.The genetic based algorithm targets allocating more suitable channels to D2D users and finding the optimal transmit powers for all D2D links and cellular users efficiently,aiming to maximize the overall system throughput of D2D underlaied cellular network with minimum interference level,while satisfying the required quality of service QoS of each user.The simulation results show that our proposed approach has an advantage in terms of maximizing the overall system utilization than fixed,random,BAT algorithm(BA)and Particle Swarm Optimization(PSO)based power allocation schemes. 展开更多
关键词 5G D2D communication spectrum allocation power allocation genetic algorithm optimization BAT-optimization particle swarm optimization
在线阅读 下载PDF
Hybrid of Distributed Cumulative Histograms and Classification Model for Attack Detection 被引量:1
3
作者 Mostafa Nassar Anas M.Ali +5 位作者 Walid El-Shafai Adel Saleeb Fathi E.Abd El-Samie Naglaa F.Soliman Hussah Nasser AlEisa Hossam Eldin H.Ahmed 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2235-2247,共13页
Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the future.Innovative techniques have been suggested for detecting attacks using ma... Traditional security systems are exposed to many various attacks,which represents a major challenge for the spread of the Internet in the future.Innovative techniques have been suggested for detecting attacks using machine learning and deep learning.The significant advantage of deep learning is that it is highly efficient,but it needs a large training time with a lot of data.Therefore,in this paper,we present a new feature reduction strategy based on Distributed Cumulative Histograms(DCH)to distinguish between dataset features to locate the most effective features.Cumulative histograms assess the dataset instance patterns of the applied features to identify the most effective attributes that can significantly impact the classification results.Three different models for detecting attacks using Convolutional Neural Network(CNN)and Long Short-Term Memory Network(LSTM)are also proposed.The accuracy test of attack detection using the hybrid model was 98.96%on the UNSW-NP15 dataset.The proposed model is compared with wrapper-based and filter-based Feature Selection(FS)models.The proposed model reduced classification time and increased detection accuracy. 展开更多
关键词 Feature selection DCH LSTM CNN security systems
在线阅读 下载PDF
Proposed Different Signal Processing Tools for Efficient Optical Wireless Communications
4
作者 Hend Ibrahim Abeer D.Algarni +3 位作者 Mahmoud Abdalla Walid El-Shafai Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第5期3293-3318,共26页
Optical Wireless Communication(OWC)is a new trend in communication systems to achieve large bandwidth,high bit rate,high security,fast deployment,and low cost.The basic idea of the OWC is to transmit data on unguided ... Optical Wireless Communication(OWC)is a new trend in communication systems to achieve large bandwidth,high bit rate,high security,fast deployment,and low cost.The basic idea of the OWC is to transmit data on unguided media with light.This system requires multi-carrier modulation such as Orthogonal Frequency Division Multiplexing(OFDM).This paper studies optical OFDM performance based on Intensity Modulation with Direct Detection(IM/DD)system.This system requires a non-negativity constraint.The paper presents a framework for wireless optical OFDM system that comprises(IM/DD)with different forms,Direct Current biased Optical OFDM(DCO-OFDM),Asymmetrically Clipped Optical OFDM(ACO-OFDM),Asymmetrically DC-biased Optical OFDM(ADO-OFDM),and Flip-OFDM.It also considers channel coding as a tool for error control,channel equalization for reducing deterioration due to channel effects,and investigation of the turbulence effects.The evaluation results of the proposed framework reveal enhancement of performance.The performance of the IM/DD-OFDM system is investigated over different channel models such as AWGN,log-normal turbulence channel model,and ceiling bounce channel model.The simulation results show that the BER performance of the IM/DD-OFDM communication system is enhanced while the fading strength is decreased.The results reveal also that Hamming codes,BCH codes,and convolutional codes achieve better BER performance.Also,two algorithms of channel estimation and equalization are considered and compared.These algorithms include the Least Squares(LS)and the Minimum Mean Square Error(MMSE).The simulation results show that the MMSE algorithm gives better BER performance than the LS algorithm. 展开更多
关键词 Optical communication systems OWC IM/DD OFDM MMSE LS ADO-OFDM DCO-OFDM ACO-OFDM
在线阅读 下载PDF
Shadow Extraction and Elimination of Moving Vehicles for Tracking Vehicles
5
作者 Kalpesh Jadav Vishal Sorathiya +5 位作者 Walid El-Shafai Torki Altameem Moustafa HAly Vipul Vekariya Kawsar Ahmed Francis MBui 《Computers, Materials & Continua》 SCIE EI 2023年第11期2009-2030,共22页
Shadow extraction and elimination is essential for intelligent transportation systems(ITS)in vehicle tracking application.The shadow is the source of error for vehicle detection,which causes misclassification of vehic... Shadow extraction and elimination is essential for intelligent transportation systems(ITS)in vehicle tracking application.The shadow is the source of error for vehicle detection,which causes misclassification of vehicles and a high false alarm rate in the research of vehicle counting,vehicle detection,vehicle tracking,and classification.Most of the existing research is on shadow extraction of moving vehicles in high intensity and on standard datasets,but the process of extracting shadows from moving vehicles in low light of real scenes is difficult.The real scenes of vehicles dataset are generated by self on the Vadodara–Mumbai highway during periods of poor illumination for shadow extraction of moving vehicles to address the above problem.This paper offers a robust shadow extraction of moving vehicles and its elimination for vehicle tracking.The method is distributed into two phases:In the first phase,we extract foreground regions using a mixture of Gaussian model,and then in the second phase,with the help of the Gamma correction,intensity ratio,negative transformation,and a combination of Gaussian filters,we locate and remove the shadow region from the foreground areas.Compared to the outcomes proposed method with outcomes of an existing method,the suggested method achieves an average true negative rate of above 90%,a shadow detection rate SDR(η%),and a shadow discrimination rate SDR(ξ%)of 80%.Hence,the suggested method is more appropriate for moving shadow detection in real scenes. 展开更多
关键词 Change illuminations ImageJ software intelligent traffic systems mixture of Gaussian model National Institute of Health vehicle tracking
在线阅读 下载PDF
Enhancing Early Detection of Lung Cancer through Advanced Image Processing Techniques and Deep Learning Architectures for CT Scans
6
作者 Nahed Tawfik Heba M.Emara +3 位作者 Walid El-Shafai Naglaa F.Soliman Abeer D.Algarni Fathi EAbd El-Samie 《Computers, Materials & Continua》 SCIE EI 2024年第10期271-307,共37页
Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a... Lung cancer remains a major concern in modern oncology due to its high mortality rates and multifaceted origins,including hereditary factors and various clinical changes.It stands as the deadliest type of cancer and a significant cause of cancer-related deaths globally.Early diagnosis enables healthcare providers to administer appropriate treatment measures promptly and accurately,leading to improved prognosis and higher survival rates.The significant increase in both the incidence and mortality rates of lung cancer,particularly its ranking as the second most prevalent cancer among women worldwide,underscores the need for comprehensive research into efficient screening methods.Advances in diagnostic techniques,particularly the use of computed tomography(CT)scans,have revolutionized the identification of lung cancer.CT scans are renowned for their ability to provide high-resolution images and are particularly effective in detecting small,calcified areas,crucial for identifying earlystage lung cancer.Consequently,there is growing interest in enhancing computer-aided detection(CAD)systems.These algorithms assist radiologists by reducing false-positive interpretations and improving the accuracy of early cancer diagnosis.This study aims to enhance the effectiveness of CAD systems through various methods.Initially,the Contrast Limited Adaptive Histogram Equalization(CLAHE)algorithm is employed to preprocess CT scan images,thereby improving their visual quality.Further refinement is achieved by integrating different optimization strategies with the CLAHE method.The CutMix data augmentation technique is applied to boost the performance of the proposed model.A comparative analysis is conducted using deep learning architectures such as InceptionV3,ResNet101,Xception,and EfficientNet.The study evaluates the performance of these architectures in image classification tasks,both with and without the implementation of the CLAHE algorithm.The empirical findings of the study demonstrate a significant reduction in the false positive rate(FPR)and an overall enhancement in diagnostic accuracy.This research not only contributes to the field of medical imaging but also holds significant implications for the early detection and treatment of lung cancer,ultimately aiming to reduce its mortality rates. 展开更多
关键词 Lung cancer detection CLAHE algorithm optimization deep learning CLASSIFICATION feature extraction healthcare applications
在线阅读 下载PDF
Gauss Gradient and SURF Features for Landmine Detection from GPR Images
7
作者 Fatma M.El-Ghamry Walid El-Shafai +6 位作者 Mahmouad I.Abdalla Ghada M.El-Banby Abeer D.Algarni Moawad I.Dessouky Adel S.Elfishawy Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第6期4457-4486,共30页
Recently,ground-penetrating radar(GPR)has been extended as a well-known area to investigate the subsurface objects.However,its output has a low resolution,and it needs more processing for more interpretation.This pape... Recently,ground-penetrating radar(GPR)has been extended as a well-known area to investigate the subsurface objects.However,its output has a low resolution,and it needs more processing for more interpretation.This paper presents two algorithms for landmine detection from GPR images.The first algorithm depends on a multi-scale technique.A Gaussian kernel with a particular scale is convolved with the image,and after that,two gradients are estimated;horizontal and vertical gradients.Then,histogram and cumulative histogram are estimated for the overall gradient image.The bin values on the cumulative histogram are used for discrimination between images with and without landmines.Moreover,a neural classifier is used to classify images with cumulative histograms as feature vectors.The second algorithm is based on scale-space analysis with the number of speeded-up robust feature(SURF)points as the key parameter for classification.In addition,this paper presents a framework for size reduction of GPR images based on decimation for efficient storage.The further classification steps can be performed on images after interpolation.The sensitivity of classification accuracy to the interpolation process is studied in detail. 展开更多
关键词 GPR images cumulative histogram gradient image neural classifier SURF
在线阅读 下载PDF
Secure Cancelable Template Based on Double Random Phase Encoding and Entropy Segmentation
8
作者 Ahmed M.Ayoup Ashraf A.M.Khalaf +2 位作者 Fathi E.Abd El-Samie Fahad Alraddady Salwa M.Serag Eldin 《Computers, Materials & Continua》 SCIE EI 2022年第11期4067-4085,共19页
In this paper,a proposed cancellable biometric scheme is based on multiple biometric image identifiers,Arnold’s cat map and double random phase encoding(DRPE)to obtain cancellable biometric templates.The proposed seg... In this paper,a proposed cancellable biometric scheme is based on multiple biometric image identifiers,Arnold’s cat map and double random phase encoding(DRPE)to obtain cancellable biometric templates.The proposed segmentation scheme that is used to select the region of interest for generating cancelable templates is based on chaos entropy low correlation statistical metrics.The objective of segmentation is to reduce the computational cost and reliability of template creation.The left and right biometric(iris,fingerprint,palm print and face)are divided into non-overlapping blocks of the same dimensions.To define the region of interest(ROI),we select the block with the highest entropy.To shorten the registration process time and achieve a high level of security,we select 25%of the image volume of the biometric data.In addition,the low-cost security requirement lies in the use of selective encryption(SE)technology.The step of selecting the maximum entropy is executed on all biometric blocks.The maximum right and left multi-biometric blocks are arranged in descending order from the entropy perspective and select 50%of each biometric couple and store the single matrix.The obtained matrix is scrambled with a certain number of iterations using Arnold’s Cat Map(ACM).The obtained scrambled matrix is encrypted with the DRPE to generate the cancellable biometric templates,which are further concatenated.The simulation results display better performance of the suggested cancellable biometric system in noise scenarios using the area under the receiver operating characteristic(AROC).The strength of the suggested technique is examined with correlation,irregular deviation,maximum difference and maximum deviation.The recommended proposed approach shows that the ability to distinguish the authentic and imposter biometrics of user seven in different levels of the noise environment. 展开更多
关键词 Image identifier computation segmentation ACM (DRPE)
在线阅读 下载PDF
Optimization of Cooperative RelayingMolecular Communications for Nanomedical Applications
9
作者 Eman S.Attia Ashraf A.M.Khalaf +4 位作者 Fathi E.Abd El-Samie Saied M.Abd El-atty Konstantinos A.Lizos Osama Alfarraj Heba M.El-Hoseny 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1259-1275,共17页
Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,becaus... Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,because the MCvD is unreliable and there exists molecular noise and inter symbol interference(ISI),cooperative nano-relays can acquire the reliability for drug delivery to targeted diseased cells,especially if the separation distance between the nano transmitter and nano receiver is increased.In this work,we propose an approach for optimizing the performance of the nano system using cooperative molecular communications with a nano relay scheme,while accounting for blood flow effects in terms of drift velocity.The fractions of the molecular drug that should be allocated to the nano transmitter and nano relay positioning are computed using a collaborative optimization problem solved by theModified Central Force Optimization(MCFO)algorithm.Unlike the previous work,the probability of bit error is expressed in a closed-form expression.It is used as an objective function to determine the optimal velocity of the drug molecules and the detection threshold at the nano receiver.The simulation results show that the probability of bit error can be dramatically reduced by optimizing the drift velocity,detection threshold,location of the nano-relay in the proposed nano system,and molecular drug budget. 展开更多
关键词 Nanomedical system molecular communication cooperative relay OPTIMIZATION
在线阅读 下载PDF
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
10
作者 Musheer Ahmad Reem Ibrahim Alkanhel +3 位作者 Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2361-2380,共20页
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ... Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems. 展开更多
关键词 Secure communication healthcare data encryption Internet of Medical Things(IoMT) discrete chaotic map substitution box(S-box)
在线阅读 下载PDF
Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing
11
作者 Ahmed M.Ayoup Ashraf A.M.Khalaf +3 位作者 Walid El-Shafai Fathi E.Abd El-Samie Fahad Alraddady Salwa M.Serag Eldin 《Computers, Materials & Continua》 SCIE EI 2022年第8期3687-3703,共17页
The cancellable biometric transformations are designed to be computationally difficult to obtain the original biometric data.This paper presents a cancellable multi-biometric identification scheme that includes four s... The cancellable biometric transformations are designed to be computationally difficult to obtain the original biometric data.This paper presents a cancellable multi-biometric identification scheme that includes four stages:biometric data collection and processing,Arnold’s Cat Map encryption,decimation process to reduce the size,and finalmerging of the four biometrics in a single generated template.First,a 2D matrix of size 128×128 is created based on Arnold’s Cat Map(ACM).The purpose of this rearrangement is to break the correlation between pixels to hide the biometric patterns and merge these patterns together for more security.The decimation is performed to keep the dimensions of the overall cancellable template similar to those of a single template to avoid data redundancy.Moreover,some sort of aliasing occurs due to decimation,contributing to the intended distortion of biometric templates.The hybrid structure that comprises encryption,decimation,andmerging generates encrypted and distorted cancellable templates.The simulation results obtained for performance evaluation show that the system is safe,reliable,and feasible as it achieves high security in the presence of noise. 展开更多
关键词 Aliasing technique selective encryption ACM decimation process
在线阅读 下载PDF
Statistical Time Series Forecasting Models for Pandemic Prediction
12
作者 Ahmed ElShafee Walid El-Shafai +2 位作者 Abeer D.Algarni Naglaa F.Soliman Moustafa H.Aly 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期349-374,共26页
COVID-19 has significantly impacted the growth prediction of a pandemic,and it is critical in determining how to battle and track the disease progression.In this case,COVID-19 data is a time-series dataset that can be... COVID-19 has significantly impacted the growth prediction of a pandemic,and it is critical in determining how to battle and track the disease progression.In this case,COVID-19 data is a time-series dataset that can be projected using different methodologies.Thus,this work aims to gauge the spread of the outbreak severity over time.Furthermore,data analytics and Machine Learning(ML)techniques are employed to gain a broader understanding of virus infections.We have simulated,adjusted,and fitted several statistical time-series forecasting models,linearML models,and nonlinear ML models.Examples of these models are Logistic Regression,Lasso,Ridge,ElasticNet,Huber Regressor,Lasso Lars,Passive Aggressive Regressor,K-Neighbors Regressor,Decision Tree Regressor,Extra Trees Regressor,Support Vector Regressions(SVR),AdaBoost Regressor,Random Forest Regressor,Bagging Regressor,AuoRegression,MovingAverage,Gradient Boosting Regressor,Autoregressive Moving Average(ARMA),Auto-Regressive Integrated Moving Averages(ARIMA),SimpleExpSmoothing,Exponential Smoothing,Holt-Winters,Simple Moving Average,Weighted Moving Average,Croston,and naive Bayes.Furthermore,our suggested methodology includes the development and evaluation of ensemble models built on top of the best-performing statistical and ML-based prediction methods.A third stage in the proposed system is to examine three different implementations to determine which model delivers the best performance.Then,this best method is used for future forecasts,and consequently,we can collect the most accurate and dependable predictions. 展开更多
关键词 Forecasting COVID-19 predictive models medical viruses mathematical model market research DISEASES
在线阅读 下载PDF
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
13
作者 Iman Almomani Walid El-Shafai +3 位作者 Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa 《Computers, Materials & Continua》 SCIE EI 2023年第2期3515-3537,共23页
Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private s... Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors.Therefore,designing and implementing robust security algorithms for users’biometrics is still a hot research area to be investigated.This work presents a powerful biometric security system(BSS)to protect different biometric modalities such as faces,iris,and fingerprints.The proposed BSSmodel is based on hybridizing auto-encoder(AE)network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy.The employed AE network is unsupervised deep learning(DL)structure used in the proposed BSS model to extract main biometric features.These obtained features are utilized to generate two random chaos matrices.The first random chaos matrix is used to permute the pixels of biometric images.In contrast,the second random matrix is used to further cipher and confuse the resulting permuted biometric pixels using a two-dimensional(2D)chaotic logisticmap(CLM)algorithm.To assess the efficiency of the proposed BSS,(1)different standardized color and grayscale images of the examined fingerprint,faces,and iris biometrics were used(2)comprehensive security and recognition evaluation metrics were measured.The assessment results have proven the authentication and robustness superiority of the proposed BSSmodel compared to other existing BSSmodels.For example,the proposed BSS succeeds in getting a high area under the receiver operating characteristic(AROC)value that reached 99.97%and low rates of 0.00137,0.00148,and 3516 CMC,2023,vol.74,no.20.00157 for equal error rate(EER),false reject rate(FRR),and a false accept rate(FAR),respectively. 展开更多
关键词 Biometric security deep learning AE network 2D CLM cybersecurity and authentication applications feature extraction unsupervised learning
在线阅读 下载PDF
Design of a Proportional-Integral-Derivative Controller for an Automatic Generation Control of Multi-area Power Thermal Systems Using Firefly Algorithm 被引量:8
14
作者 K.Jagatheesan B.Anand +3 位作者 Sourav Samanta Nilanjan Dey Amira S.Ashour Valentina E.Balas 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2019年第2期503-515,共13页
Essentially, it is significant to supply the consumer with reliable and sufficient power. Since, power quality is measured by the consistency in frequency and power flow between control areas. Thus, in a power system ... Essentially, it is significant to supply the consumer with reliable and sufficient power. Since, power quality is measured by the consistency in frequency and power flow between control areas. Thus, in a power system operation and control,automatic generation control(AGC) plays a crucial role. In this paper, multi-area(Five areas: area 1, area 2, area 3, area 4 and area 5) reheat thermal power systems are considered with proportional-integral-derivative(PID) controller as a supplementary controller. Each area in the investigated power system is equipped with appropriate governor unit, turbine with reheater unit, generator and speed regulator unit. The PID controller parameters are optimized by considering nature bio-inspired firefly algorithm(FFA). The experimental results demonstrated the comparison of the proposed system performance(FFA-PID)with optimized PID controller based genetic algorithm(GAPID) and particle swarm optimization(PSO) technique(PSOPID) for the same investigated power system. The results proved the efficiency of employing the integral time absolute error(ITAE) cost function with one percent step load perturbation(1 % SLP) in area 1. The proposed system based FFA achieved the least settling time compared to using the GA or the PSO algorithms, while, it attained good results with respect to the peak overshoot/undershoot. In addition, the FFA performance is improved with the increased number of iterations which outperformed the other optimization algorithms based controller. 展开更多
关键词 Automatic generation control(AGC) FIREFLY ALGORITHM GENETIC algorithm(GA) particle SWARM optimization(PSO) proportional-integral-derivative(PID) controller
在线阅读 下载PDF
An Improved Convolutional Neural Network Model for DNA Classification 被引量:3
15
作者 Naglaa.F.Soliman Samia M.Abd-Alhalem +5 位作者 Walid El-Shafai Salah Eldin S.E.Abdulrahman N.Ismaiel El-Sayed M.El-Rabaie Abeer D.Algarni Fathi E.Abd El-Samie 《Computers, Materials & Continua》 SCIE EI 2022年第3期5907-5927,共21页
Recently,deep learning(DL)became one of the essential tools in bioinformatics.A modified convolutional neural network(CNN)is employed in this paper for building an integratedmodel for deoxyribonucleic acid(DNA)classif... Recently,deep learning(DL)became one of the essential tools in bioinformatics.A modified convolutional neural network(CNN)is employed in this paper for building an integratedmodel for deoxyribonucleic acid(DNA)classification.In any CNN model,convolutional layers are used to extract features followed by max-pooling layers to reduce the dimensionality of features.A novel method based on downsampling and CNNs is introduced for feature reduction.The downsampling is an improved form of the existing pooling layer to obtain better classification accuracy.The two-dimensional discrete transform(2D DT)and two-dimensional random projection(2D RP)methods are applied for downsampling.They convert the high-dimensional data to low-dimensional data and transform the data to the most significant feature vectors.However,there are parameters which directly affect how a CNN model is trained.In this paper,some issues concerned with the training of CNNs have been handled.The CNNs are examined by changing some hyperparameters such as the learning rate,size of minibatch,and the number of epochs.Training and assessment of the performance of CNNs are carried out on 16S rRNA bacterial sequences.Simulation results indicate that the utilization of a CNN based on wavelet subsampling yields the best trade-off between processing time and accuracy with a learning rate equal to 0.0001,a size of minibatch equal to 64,and a number of epochs equal to 20. 展开更多
关键词 DNA classification CNN downsampling hyperparameters DL 2D DT 2D RP
在线阅读 下载PDF
A Fractional Fourier Based Medical Image Authentication Approach 被引量:2
16
作者 Fayez Alqahtani Mohammed Amoon Walid El-Shafai 《Computers, Materials & Continua》 SCIE EI 2022年第2期3133-3150,共18页
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing th... Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure channels.Therefore,there is a bad need for protecting and securing the color medical images against impostors and invaders.In this paper,an optical medical image security approach is introduced.It is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and security.To confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security metrics.Furthermore,a comparative analysis is introduced between the suggested security approach and other conventional cryptography protocols.The simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly secure.It has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images. 展开更多
关键词 Medical image security ENCRYPTION JT FFT CRYPTOSYSTEM
在线阅读 下载PDF
Novel Ransomware Hiding Model Using HEVC Steganography Approach 被引量:1
17
作者 Iman Almomani Aala AlKhayer Walid El-Shafai 《Computers, Materials & Continua》 SCIE EI 2022年第1期1209-1228,共20页
Ransomware is considered one of the most threatening cyberattacks.Existing solutions have focused mainly on discriminating ransomware by analyzing the apps themselves,but they have overlooked possible ways of hiding r... Ransomware is considered one of the most threatening cyberattacks.Existing solutions have focused mainly on discriminating ransomware by analyzing the apps themselves,but they have overlooked possible ways of hiding ransomware apps and making them difficult to be detected and then analyzed.Therefore,this paper proposes a novel ransomware hiding model by utilizing a block-based High-Efficiency Video Coding(HEVC)steganography approach.The main idea of the proposed steganography approach is the division of the secret ransomware data and cover HEVC frames into different blocks.After that,the Least Significant Bit(LSB)based Hamming Distance(HD)calculation is performed amongst the secret data’s divided blocks and cover frames.Finally,the secret data bits are hidden into the marked bits of the cover HEVC frame-blocks based on the calculated HD value.The main advantage of the suggested steganography approach is the minor impact on the cover HEVC frames after embedding the ransomware while preserving the histogram attributes of the cover video frame with a high imperceptibility.This is due to the utilization of an adaptive steganography cost function during the embedding process.The proposed ransomware hiding approach was heavily examined using subjective and objective tests and applying different HEVC streams with diverse resolutions and different secret ransomware apps of various sizes.The obtained results prove the efficiency of the proposed steganography approach by achieving high capacity and successful embedding process while ensuring the hidden ransomware’s undetectability within the video frames.For example,in terms of embedding quality,the proposed model achieved a high peak signal-to-noise ratio that reached 59.3 dB and a low mean-square-error of 0.07 for the examined HEVC streams.Also,out of 65 antivirus engines,no engine could detect the existence of the embedded ransomware app. 展开更多
关键词 Ransomware embedding STEGANOGRAPHY HEVC LSB hamming distance applications apk stego SECURITY CONFIDENTIALITY
在线阅读 下载PDF
Real-Time Multi-Class Infection Classification for Respiratory Diseases 被引量:1
18
作者 Ahmed El.Shafee Walid El-Shafai +3 位作者 Abdulaziz Alarifi Mohammed Amoon Aman Singh Moustafa H.Aly 《Computers, Materials & Continua》 SCIE EI 2022年第11期4157-4177,共21页
Real-time disease prediction has emerged as the main focus of study in the field of computerized medicine.Intelligent disease identification framework can assist medical practitioners in diagnosing disease in a way th... Real-time disease prediction has emerged as the main focus of study in the field of computerized medicine.Intelligent disease identification framework can assist medical practitioners in diagnosing disease in a way that is reliable,consistent,and timely,successfully lowering mortality rates,particularly during endemics and pandemics.To prevent this pandemic’s rapid and widespread,it is vital to quickly identify,confine,and treat affected individuals.The need for auxiliary computer-aided diagnostic(CAD)systems has grown.Numerous recent studies have indicated that radiological pictures contained critical information regarding the COVID-19 virus.Utilizing advanced convolutional neural network(CNN)architectures in conjunction with radiological imaging makes it possible to provide rapid,accurate,and extremely useful susceptible classifications.This research work proposes a methodology for real-time detection of COVID-19 infections caused by the Corona Virus.The purpose of this study is to offer a two-way COVID-19(2WCD)diagnosis prediction deep learning system that is built on Transfer Learning Methodologies(TLM)and features customized fine-tuning on top of fully connected layered pre-trained CNN architectures.2WCD has applied modifications to pre-trained models for better performance.It is designed and implemented to improve the generalization ability of the classifier for binary and multi-class models.Along with the ability to differentiate COVID-19 and No-Patient in the binary class model and COVID-19,No-Patient,and Pneumonia in the multi-class model,our framework is augmented with a critical add-on for visually demonstrating infection in any tested radiological image by highlighting the affected region in the patient’s lung in a recognizable color pattern.The proposed system is shown to be extremely robust and reliable for real-time COVID-19 diagnostic prediction.It can also be used to forecast other lung-related disorders.As the system can assist medical practitioners in diagnosing the greatest number of patients in the shortestamount of time, radiologists can also be used or published online to assistany less-experienced individual in obtaining an accurate immediate screeningfor their radiological images. 展开更多
关键词 COVID-19 real-time computerized disease prediction intelligent disease identification framework CAD systems X-rays CT-scans CNN real-time detection of COVID-19 infections
暂未订购
A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models 被引量:1
19
作者 Naglaa F.Soliman Fatma E.Fadl-Allah +3 位作者 Walid El-Shafai Mahmoud I.Aly Maali Alabdulhafith Fathi E.Abd El-Samie 《Computers, Materials & Continua》 SCIE EI 2024年第4期201-241,共41页
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication ... The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication standards.The Single Carrier Frequency Division Multiple Access(SC-FDMA)is adopted for broadband wireless communications,because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio(PAPR).Data transmission through open-channel networks requires much concentration on security,reliability,and integrity.The data need a space away fromunauthorized access,modification,or deletion.These requirements are to be fulfilled by digital image watermarking and encryption.This paper ismainly concerned with secure image communication over the wireless SC-FDMA systemas an adopted communication standard.It introduces a robust image communication framework over SC-FDMA that comprises digital image watermarking and encryption to improve image security,while maintaining a high-quality reconstruction of images at the receiver side.The proposed framework allows image watermarking based on the Discrete Cosine Transform(DCT)merged with the Singular Value Decomposition(SVD)in the so-called DCT-SVD watermarking.In addition,image encryption is implemented based on chaos and DNA encoding.The encrypted watermarked images are then transmitted through the wireless SC-FDMA system.The linearMinimumMean Square Error(MMSE)equalizer is investigated in this paper to mitigate the effect of channel fading and noise on the transmitted images.Two subcarrier mapping schemes,namely localized and interleaved schemes,are compared in this paper.The study depends on different channelmodels,namely PedestrianAandVehicularA,with a modulation technique namedQuadratureAmplitude Modulation(QAM).Extensive simulation experiments are conducted and introduced in this paper for efficient transmission of encrypted watermarked images.In addition,different variants of SC-FDMA based on the Discrete Wavelet Transform(DWT),Discrete Cosine Transform(DCT),and Fast Fourier Transform(FFT)are considered and compared for the image communication task.The simulation results and comparison demonstrate clearly that DWT-SC-FDMAis better suited to the transmission of the digital images in the case of PedestrianAchannels,while the DCT-SC-FDMA is better suited to the transmission of the digital images in the case of Vehicular A channels. 展开更多
关键词 Cybersecurity applications image transmission channel models modulation techniques watermarking and encryption
在线阅读 下载PDF
Efficient Forgery Detection Approaches for Digital Color Images 被引量:1
20
作者 Amira Baumy Abeer D.Algarni +3 位作者 Mahmoud Abdalla Walid El-Shafai Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第5期3257-3276,共20页
This paper is concerned with a vital topic in image processing:color image forgery detection. The development of computing capabilitieshas led to a breakthrough in hacking and forgery attacks on signal, image,and data... This paper is concerned with a vital topic in image processing:color image forgery detection. The development of computing capabilitieshas led to a breakthrough in hacking and forgery attacks on signal, image,and data communicated over networks. Hence, there is an urgent need fordeveloping efficient image forgery detection algorithms. Two main types offorgery are considered in this paper: splicing and copy-move. Splicing isperformed by inserting a part of an image into another image. On the otherhand, copy-move forgery is performed by copying a part of the image intoanother position in the same image. The proposed approach for splicingdetection is based on the assumption that illumination between the originaland tampered images is different. To detect the difference between the originaland tampered images, the homomorphic transform separates the illuminationcomponent from the reflectance component. The illumination histogramderivative is used for detecting the difference in illumination, and henceforgery detection is accomplished. Prior to performing the forgery detectionprocess, some pre-processing techniques, including histogram equalization,histogram matching, high-pass filtering, homomorphic enhancement, andsingle image super-resolution, are introduced to reinforce the details andchanges between the original and embedded sections. The proposed approachfor copy-move forgery detection is performed with the Speeded Up RobustFeatures (SURF) algorithm, which extracts feature points and feature vectors. Searching for the copied partition is accomplished through matchingwith Euclidian distance and hierarchical clustering. In addition, some preprocessing methods are used with the SURF algorithm, such as histogramequalization and single-mage super-resolution. Simulation results proved thefeasibility and the robustness of the pre-processing step in homomorphicdetection and SURF detection algorithms for splicing and copy-move forgerydetection, respectively. 展开更多
关键词 Image forgery splicing algorithm copy-move algorithm histogram matching homomorphic enhancement SISR SURF
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部