期刊文献+
共找到75篇文章
< 1 2 4 >
每页显示 20 50 100
An IoT-Cloud Based Intelligent Computer-Aided Diagnosis of Diabetic Retinopathy Stage Classification Using Deep Learning Approach 被引量:9
1
作者 K.Shankar Eswaran Perumal +1 位作者 Mohamed Elhoseny Phong Thanh Nguyen 《Computers, Materials & Continua》 SCIE EI 2021年第2期1665-1680,共16页
Diabetic retinopathy(DR)is a disease with an increasing prevalence and the major reason for blindness among working-age population.The possibility of severe vision loss can be extensively reduced by timely diagnosis a... Diabetic retinopathy(DR)is a disease with an increasing prevalence and the major reason for blindness among working-age population.The possibility of severe vision loss can be extensively reduced by timely diagnosis and treatment.An automated screening for DR has been identified as an effective method for early DR detection,which can decrease the workload associated to manual grading as well as save diagnosis costs and time.Several studies have been carried out to develop automated detection and classification models for DR.This paper presents a new IoT and cloud-based deep learning for healthcare diagnosis of Diabetic Retinopathy(DR).The proposed model incorporates different processes namely data collection,preprocessing,segmentation,feature extraction and classification.At first,the IoT-based data collection process takes place where the patient wears a head mounted camera to capture the retinal fundus image and send to cloud server.Then,the contrast level of the input DR image gets increased in the preprocessing stage using Contrast Limited Adaptive Histogram Equalization(CLAHE)model.Next,the preprocessed image is segmented using Adaptive Spatial Kernel distance measure-based Fuzzy C-Means clustering(ASKFCM)model.Afterwards,deep Convolution Neural Network(CNN)based Inception v4 model is applied as a feature extractor and the resulting feature vectors undergo classification in line with the Gaussian Naive Bayes(GNB)model.The proposed model was tested using a benchmark DR MESSIDOR image dataset and the obtained results showcased superior performance of the proposed model over other such models compared in the study. 展开更多
关键词 Deep learning classification GaussianNaive Bayes feature extraction diabetic retinopathy
在线阅读 下载PDF
Proactive Strategies for Open⁃Source Software Quality Management Using Dynamic Correlation Analysis
2
作者 Chennappan Rajendran Babu P 《Journal of Harbin Institute of Technology(New Series)》 2025年第6期99-106,共8页
Ensuring software quality in open⁃source environments requires adaptive mechanisms to enhance scalability,optimize service provisioning,and improve reliability.This study presents the dynamic correlation analysis tech... Ensuring software quality in open⁃source environments requires adaptive mechanisms to enhance scalability,optimize service provisioning,and improve reliability.This study presents the dynamic correlation analysis technique to enhance software quality management in open⁃source environments by addressing dynamic scalability,adaptive service provisioning,and software reliability.The proposed methodology integrates a scalability metric,an optimized service provisioning model,and a weighted entropy⁃based reliability assessment to systematically improve key performance parameters.Experimental evaluation conducted on multiple open⁃source software(OSS)versions demonstrates significant improvements:scalability increased by 27.5%,service provisioning time reduced by 18.3%,and software reliability improved by 22.1%compared to baseline methods.A comparative analysis with prior works further highlights the effectiveness of this approach in ensuring adaptability,efficiency,and resilience in dynamic software ecosystems.Future work will focus on real⁃time monitoring and AI⁃driven adaptive provisioning to further enhance software quality management. 展开更多
关键词 open⁃source software dynamic correlation analysis SCALABILITY service provisioning software reliability entropy⁃based assessment
在线阅读 下载PDF
Large Language Models for Effective Detection of Algorithmically Generated Domains:A Comprehensive Review
3
作者 Hamed Alqahtani Gulshan Kumar 《Computer Modeling in Engineering & Sciences》 2025年第8期1439-1479,共41页
Domain Generation Algorithms(DGAs)continue to pose a significant threat inmodernmalware infrastructures by enabling resilient and evasive communication with Command and Control(C&C)servers.Traditional detection me... Domain Generation Algorithms(DGAs)continue to pose a significant threat inmodernmalware infrastructures by enabling resilient and evasive communication with Command and Control(C&C)servers.Traditional detection methods-rooted in statistical heuristics,feature engineering,and shallow machine learning-struggle to adapt to the increasing sophistication,linguistic mimicry,and adversarial variability of DGA variants.The emergence of Large Language Models(LLMs)marks a transformative shift in this landscape.Leveraging deep contextual understanding,semantic generalization,and few-shot learning capabilities,LLMs such as BERT,GPT,and T5 have shown promising results in detecting both character-based and dictionary-based DGAs,including previously unseen(zeroday)variants.This paper provides a comprehensive and critical review of LLM-driven DGA detection,introducing a structured taxonomy of LLM architectures,evaluating the linguistic and behavioral properties of benchmark datasets,and comparing recent detection frameworks across accuracy,latency,robustness,and multilingual performance.We also highlight key limitations,including challenges in adversarial resilience,model interpretability,deployment scalability,and privacy risks.To address these gaps,we present a forward-looking research roadmap encompassing adversarial training,model compression,cross-lingual benchmarking,and real-time integration with SIEM/SOAR platforms.This survey aims to serve as a foundational resource for advancing the development of scalable,explainable,and operationally viable LLM-based DGA detection systems. 展开更多
关键词 Adversarial domains cyber threat detection domain generation algorithms large language models machine learning security
在线阅读 下载PDF
Elevating Software Defect Prediction Performance Through an Optimized GA⁃DT and PSO⁃ACO Hybrid Approach
4
作者 Chennappan R Mathumathi E 《Journal of Harbin Institute of Technology(New Series)》 2025年第3期66-74,共9页
In the dynamic landscape of software technologies,the demand for sophisticated applications across diverse industries is ever⁃increasing.However,predicting software defects remains a crucial challenge for ensuring the... In the dynamic landscape of software technologies,the demand for sophisticated applications across diverse industries is ever⁃increasing.However,predicting software defects remains a crucial challenge for ensuring the resilience and dependability of software systems.This study presents a novel software defect prediction technique that significantly enhances performance through a hybrid machine learning approach.The innovative methodology integrates a Genetic Algorithm(GA)for precise feature selection,a Decision Tree(DT)for robust classification,and leverages the capabilities of Particle Swarm Optimization(PSO)and Ant Colony Optimization(ACO)algorithms for precision⁃driven optimization.The utilization of datasets from varied sources enriches the predictive prowess of our model.Of particular significance in our pursuit is the unwavering focus on enhancing the prediction process through a highly refined PSO⁃ACO algorithm,thereby optimizing the efficiency and effectiveness of the GA⁃DT hybrid model.The thorough evaluation of our proposed approach unfolds across seven software projects,unveiling a paradigm shift in performance metrics.Results unequivocally demonstrate that the GA⁃DT with PSO⁃ACO algorithm surpasses its counterparts,showcasing unparalleled accuracy and reliability.Furthermore,our hybrid approach demonstrates outstanding performance in terms of F⁃measure,with an impressive increase rate of 78%. 展开更多
关键词 software quality particle swarm optimization ant colony optimization
在线阅读 下载PDF
Privacy Preserving Blockchain Technique to Achieve Secure and Reliable Sharing of IoT Data 被引量:8
5
作者 Bao Le Nguyen E.Laxmi Lydia +5 位作者 Mohamed Elhoseny Irina V.Pustokhina Denis A.Pustokhin Mahmoud Mohamed Selim Gia Nhu Nguyen K.Shankar 《Computers, Materials & Continua》 SCIE EI 2020年第10期87-107,共21页
In present digital era,an exponential increase in Internet of Things(IoT)devices poses several design issues for business concerning security and privacy.Earlier studies indicate that the blockchain technology is foun... In present digital era,an exponential increase in Internet of Things(IoT)devices poses several design issues for business concerning security and privacy.Earlier studies indicate that the blockchain technology is found to be a significant solution to resolve the challenges of data security exist in IoT.In this view,this paper presents a new privacy-preserving Secure Ant Colony optimization with Multi Kernel Support Vector Machine(ACOMKSVM)with Elliptical Curve cryptosystem(ECC)for secure and reliable IoT data sharing.This program uses blockchain to ensure protection and integrity of some data while it has the technology to create secure ACOMKSVM training algorithms in partial views of IoT data,collected from various data providers.Then,ECC is used to create effective and accurate privacy that protects ACOMKSVM secure learning process.In this study,the authors deployed blockchain technique to create a secure and reliable data exchange platform across multiple data providers,where IoT data is encrypted and recorded in a distributed ledger.The security analysis showed that the specific data ensures confidentiality of critical data from each data provider and protects the parameters of the ACOMKSVM model for data analysts.To examine the performance of the proposed method,it is tested against two benchmark dataset such as Breast Cancer Wisconsin Data Set(BCWD)and Heart Disease Data Set(HDD)from UCI AI repository.The simulation outcome indicated that the ACOMKSVM model has outperformed all the compared methods under several aspects. 展开更多
关键词 Blockchain optimization elliptical curve cryptosystem security ant colony optimization multi kernel support vector machine
在线阅读 下载PDF
A Real-Time Integrated Face Mask Detector to Curtail Spread of Coronavirus 被引量:2
6
作者 Shilpa Sethi Mamta Kathuria Trilok Kaushik 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第5期389-409,共21页
Effective strategies to control COVID-19 pandemic need high attention to mitigate negatively impacted communal health and global economy,with the brim-full horizon yet to unfold.In the absence of effective antiviral a... Effective strategies to control COVID-19 pandemic need high attention to mitigate negatively impacted communal health and global economy,with the brim-full horizon yet to unfold.In the absence of effective antiviral and limited medical resources,many measures are recommended by WHO to control the infection rate and avoid exhausting the limited medical resources.Wearing mask is among the non-pharmaceutical intervention measures that can be used as barrier to primary route of SARS-CoV2 droplets expelled by presymptomatic or asymptomatic individuals.Regardless of discourse on medical resources and diversities in masks,all countries are mandating coverings over nose and mouth in public areas.Towards contribution of public health,the aim of the paper is to devise a real-time technique that can efficiently detect non mask faces in public and thus enforce to wear mask.The proposed technique is ensemble of one stage and two stage detectors to achieve low inference time and high accuracy.We took ResNet50 as a baseline model and applied the concept of transfer learning to fuse high level semantic information in multiple feature maps.In addition,we also propose a bounding box transformation to improve localization performance during mask detection.The experiments are conducted with three popular baseline models namely ResNet50,AlexNet and MobileNet.We explored the possibility of these models to plug-in with the proposed model,so that highly accurate results can be achieved in less inference time.It is observed that the proposed technique can achieve high accuracy(98.2%)when implemented with ResNet50.Besides,the proposed model can generate 11.07%and 6.44%higher precision and recall respectively in mask detection when compared to RetinaFaceMask detector. 展开更多
关键词 Face mask detection transfer learning COVID-19 object recognition image classification
在线阅读 下载PDF
An Analysis of Integrating Machine Learning in Healthcare for Ensuring Confidentiality of the Electronic Records 被引量:2
7
作者 Adil Hussain Seh Jehad F.Al-Amri +4 位作者 Ahmad F.Subahi Alka Agrawal Nitish Pathak Rajeev Kumar Raees Ahmad Khan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第3期1387-1422,共36页
The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare services and ensured that E-health technology caters efficiently and promptly to the needs of the stakeholders associated ... The adoption of sustainable electronic healthcare infrastructure has revolutionized healthcare services and ensured that E-health technology caters efficiently and promptly to the needs of the stakeholders associated with healthcare.Despite the phenomenal advancement in the present healthcare services,the major obstacle that mars the success of E-health is the issue of ensuring the confidentiality and privacy of the patients’data.A thorough scan of several research studies reveals that healthcare data continues to be the most sought after entity by cyber invaders.Various approaches and methods have been practiced by researchers to secure healthcare digital services.However,there are very few from the Machine learning(ML)domain even though the technique has the proactive ability to detect suspicious accesses against Electronic Health Records(EHRs).The main aim of this work is to conduct a systematic analysis of the existing research studies that address healthcare data confidentiality issues through ML approaches.B.A.Kitchenham guidelines have been practiced as a manual to conduct this work.Seven well-known digital libraries namely IEEE Xplore,Science Direct,Springer Link,ACM Digital Library,Willey Online Library,PubMed(Medical and Bio-Science),and MDPI have been included to performan exhaustive search for the existing pertinent studies.Results of this study depict that machine learning provides a more robust security mechanism for sustainable management of the EHR systems in a proactive fashion,yet the specified area has not been fully explored by the researchers.K-nearest neighbor algorithm and KNIEM implementation tools are mostly used to conduct experiments on EHR systems’log data.Accuracy and performance measure of practiced techniques are not sufficiently outlined in the primary studies.This research endeavour depicts that there is a need to analyze the dynamic digital healthcare environment more comprehensively.Greater accuracy and effective implementation of ML-based models are the need of the day for ensuring the confidentiality of EHRs in a proactive fashion. 展开更多
关键词 EHRs healthcare machine learning systematic analysis
在线阅读 下载PDF
A Trailblazing Framework of Security Assessment for Traffic Data Management 被引量:1
8
作者 Abdulaziz Attaallah Khalil al-Sulbi +5 位作者 Areej Alasiry Mehrez Marzougui Neha Yadav Syed Anas Ansar Pawan Kumar Chaurasia Alka Agrawal 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1853-1875,共23页
Connected and autonomous vehicles are seeing their dawn at this moment.They provide numerous benefits to vehicle owners,manufacturers,vehicle service providers,insurance companies,etc.These vehicles generate a large a... Connected and autonomous vehicles are seeing their dawn at this moment.They provide numerous benefits to vehicle owners,manufacturers,vehicle service providers,insurance companies,etc.These vehicles generate a large amount of data,which makes privacy and security a major challenge to their success.The complicated machine-led mechanics of connected and autonomous vehicles increase the risks of privacy invasion and cyber security violations for their users by making them more susceptible to data exploitation and vulnerable to cyber-attacks than any of their predecessors.This could have a negative impact on how well-liked CAVs are with the general public,give them a poor name at this early stage of their development,put obstacles in the way of their adoption and expanded use,and complicate the economic models for their future operations.On the other hand,congestion is still a bottleneck for traffic management and planning.This research paper presents a blockchain-based framework that protects the privacy of vehicle owners and provides data security by storing vehicular data on the blockchain,which will be used further for congestion detection and mitigation.Numerous devices placed along the road are used to communicate with passing cars and collect their data.The collected data will be compiled periodically to find the average travel time of vehicles and traffic density on a particular road segment.Furthermore,this data will be stored in the memory pool,where other devices will also store their data.After a predetermined amount of time,the memory pool will be mined,and data will be uploaded to the blockchain in the form of blocks that will be used to store traffic statistics.The information is then used in two different ways.First,the blockchain’s final block will provide real-time traffic data,triggering an intelligent traffic signal system to reduce congestion.Secondly,the data stored on the blockchain will provide historical,statistical data that can facilitate the analysis of traffic conditions according to past behavior. 展开更多
关键词 Connected and autonomous vehicles(CAVs) traffic data management ethereum blockchain road side units smart cities
在线阅读 下载PDF
A Classification Algorithm to Improve the Design of Websites 被引量:1
9
作者 Hemant Kumar Singh Brijendra Singh 《Journal of Software Engineering and Applications》 2012年第7期492-499,共8页
In very short time today web has become an enormously important tool for communicating ideas, conducting business and entertainment. At the time of navigation, web users leave various records of their action. This vas... In very short time today web has become an enormously important tool for communicating ideas, conducting business and entertainment. At the time of navigation, web users leave various records of their action. This vast amount of data can be a useful source of knowledge for predicting user behavior. A refined method is required to carry out this task. Web usages mining (WUM) is the tool designed to do this task. WUM system is used to extract the knowledge based on user behavior during the web navigation. The extracted knowledge can be used for predicting the users’ future request when user is browsing the web. In this paper we advanced the online recommender system by using a Longest Common Subsequence (LCS) classification algorithm to classify users’ navigation pattern. Classification using the proposed method can improve the accuracy of recommendation and also proposed an algorithm that uses LCS method to know the user behavior for improvement of design of a website. 展开更多
关键词 WEB USAGE MINING WEB PERSONALIZATION RECOMMENDER Systems Classification Algorithms
在线阅读 下载PDF
A Study on the Explainability of Thyroid Cancer Prediction:SHAP Values and Association-Rule Based Feature Integration Framework
10
作者 Sujithra Sankar S.Sathyalakshmi 《Computers, Materials & Continua》 SCIE EI 2024年第5期3111-3138,共28页
In the era of advanced machine learning techniques,the development of accurate predictive models for complex medical conditions,such as thyroid cancer,has shown remarkable progress.Accurate predictivemodels for thyroi... In the era of advanced machine learning techniques,the development of accurate predictive models for complex medical conditions,such as thyroid cancer,has shown remarkable progress.Accurate predictivemodels for thyroid cancer enhance early detection,improve resource allocation,and reduce overtreatment.However,the widespread adoption of these models in clinical practice demands predictive performance along with interpretability and transparency.This paper proposes a novel association-rule based feature-integratedmachine learning model which shows better classification and prediction accuracy than present state-of-the-artmodels.Our study also focuses on the application of SHapley Additive exPlanations(SHAP)values as a powerful tool for explaining thyroid cancer prediction models.In the proposed method,the association-rule based feature integration framework identifies frequently occurring attribute combinations in the dataset.The original dataset is used in trainingmachine learning models,and further used in generating SHAP values fromthesemodels.In the next phase,the dataset is integrated with the dominant feature sets identified through association-rule based analysis.This new integrated dataset is used in re-training the machine learning models.The new SHAP values generated from these models help in validating the contributions of feature sets in predicting malignancy.The conventional machine learning models lack interpretability,which can hinder their integration into clinical decision-making systems.In this study,the SHAP values are introduced along with association-rule based feature integration as a comprehensive framework for understanding the contributions of feature sets inmodelling the predictions.The study discusses the importance of reliable predictive models for early diagnosis of thyroid cancer,and a validation framework of explainability.The proposed model shows an accuracy of 93.48%.Performance metrics such as precision,recall,F1-score,and the area under the receiver operating characteristic(AUROC)are also higher than the baseline models.The results of the proposed model help us identify the dominant feature sets that impact thyroid cancer classification and prediction.The features{calcification}and{shape}consistently emerged as the top-ranked features associated with thyroid malignancy,in both association-rule based interestingnessmetric values and SHAPmethods.The paper highlights the potential of the rule-based integrated models with SHAP in bridging the gap between the machine learning predictions and the interpretability of this prediction which is required for real-world medical applications. 展开更多
关键词 Explainable AI machine learning clinical decision support systems thyroid cancer association-rule based framework SHAP values classification and prediction
暂未订购
Investigation of Single and Multiple Mutations Prediction Using Binary Classification Approach
11
作者 T.Edwin Ponraj J.Charles 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期1189-1203,共15页
The mutation is a critical element in determining the proteins’stability,becoming a core element in portraying the effects of a drug in the pharmaceutical industry.Doing wet laboratory tests to provide a better persp... The mutation is a critical element in determining the proteins’stability,becoming a core element in portraying the effects of a drug in the pharmaceutical industry.Doing wet laboratory tests to provide a better perspective on protein mutations is expensive and time-intensive since there are so many potential muta-tions,computational approaches that can reliably anticipate the consequences of amino acid mutations are critical.This work presents a robust methodology to analyze and identify the effects of mutation on a single protein structure.Initially,the context in a collection of words is determined using a knowledge graph for feature selection purposes.The proposed prediction is based on an easier and sim-pler logistic regression inferred binary classification technique.This approach can able to obtain a classification accuracy(AUC)Area Under the Curve of 87%when randomly validated against experimental energy changes.Moreover,for each cross-fold validation,the precision,recall,and F-Score are presented.These results support the validity of our strategy since it performs the vast majority of prior studies in this domain. 展开更多
关键词 PROTEINS data science mutation analysis random forest neighbor proteins single and double mutations
在线阅读 下载PDF
Software Reliability Assessment Using Hybrid Neuro-Fuzzy Model
12
作者 Parul Gandhi Mohammad Zubair Khan +3 位作者 Ravi Kumar Sharma Omar H.Alhazmi Surbhi Bhatia Chinmay Chakraborty 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期891-902,共12页
Software reliability is the primary concern of software developmentorganizations, and the exponentially increasing demand for reliable softwarerequires modeling techniques to be developed in the present era. Small unn... Software reliability is the primary concern of software developmentorganizations, and the exponentially increasing demand for reliable softwarerequires modeling techniques to be developed in the present era. Small unnoticeable drifts in the software can culminate into a disaster. Early removal of theseerrors helps the organization improve and enhance the software’s reliability andsave money, time, and effort. Many soft computing techniques are available toget solutions for critical problems but selecting the appropriate technique is abig challenge. This paper proposed an efficient algorithm that can be used forthe prediction of software reliability. The proposed algorithm is implementedusing a hybrid approach named Neuro-Fuzzy Inference System and has also beenapplied to test data. In this work, a comparison among different techniques of softcomputing has been performed. After testing and training the real time data withthe reliability prediction in terms of mean relative error and mean absolute relativeerror as 0.0060 and 0.0121, respectively, the claim has been verified. The resultsclaim that the proposed algorithm predicts attractive outcomes in terms of meanabsolute relative error plus mean relative error compared to the other existingmodels that justify the reliability prediction of the proposed model. Thus, thisnovel technique intends to make this model as simple as possible to improvethe software reliability. 展开更多
关键词 Software quality RELIABILITY neural networks fuzzy logic neuro-fuzzy inference system
在线阅读 下载PDF
A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking
13
作者 Abdulaziz Alzubaidi Swarup Roy Jugal Kalita 《Digital Communications and Networks》 SCIE 2019年第4期205-213,共9页
Smartphones are vulnerable to fraudulent use despite having strong authentication mechanisms.Active authentication based on behavioral biometrics is a solution to protect the privacy of data in smart devices.Machinele... Smartphones are vulnerable to fraudulent use despite having strong authentication mechanisms.Active authentication based on behavioral biometrics is a solution to protect the privacy of data in smart devices.Machinelearning-based frameworks are effective for active authentication.However,the success of any machine-learningbased techniques depends highly on the relevancy of the data in hand for training.In addition,the training time should be very efficient.Keeping in view both issues,we’ve explored a novel fraudulent user detection method based solely on the app usage patterns of legitimate users.We hypothesized that every user has a unique pattern hidden in his/her usage of apps.Motivated by this observation,we’ve designed a way to obtain training data,which can be used by any machine learning model for effective authentication.To achieve better accuracy with reduced training time,we removed data instances related to any specific user from the training samples which did not contain any apps from the user-specific priority list.An information theoretic app ranking scheme was used to prepare a user-targeted apps priority list.Predictability of each instance related to a candidate app was calculated by using a knockout approach.Finally,a weighted rank was calculated for each app specific to every user.Instances with low ranked apps were removed to derive the reduced training set.Two datasets as well as seven classifiers for experimentation revealed that our reduced training data significantly lowered the prediction error rates in the context of classifying the legitimate user of a smartphone. 展开更多
关键词 Fraudulent user Machine learning Classification Behavioral biometric Smartphone security
在线阅读 下载PDF
Analyzing the Implications of COVID-19 Pandemic through an Intelligent-Computing Technique
14
作者 Abhishek Kumar Pandey Jehad F.Al-Amri +2 位作者 Ahmad F.Subahi Rajeev Kumar Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期959-974,共16页
The outbreak of Severe Acute Respiratory Syndrome Coronavirus 2(SARS-CoV-2 virus or COVID-19) disease was declared pandemic by the WorldHealth Organization (WHO) on March 11, 2020. COVID-19 has already affectedmore th... The outbreak of Severe Acute Respiratory Syndrome Coronavirus 2(SARS-CoV-2 virus or COVID-19) disease was declared pandemic by the WorldHealth Organization (WHO) on March 11, 2020. COVID-19 has already affectedmore than 211 nations. In such a bleak scenario, it becomes imperative to analyzeand identify those regions in Saudi Arabia that are at high risk. A preemptivestudy done in the context of predicting the possible COVID-19 hotspots wouldfacilitate in the implementation of prompt and targeted countermeasures againstSARS-CoV-2, thus saving many lives. Working towards this intent, the presentstudy adopts a decision making based methodology of simulation named Analytical Hierarchy Process (AHP), a multi criteria decision making approach, forassessing the risk of COVID-19 in different regions of Saudi Arabia. AHP givesthe ability to measure the risks numerically. Moreover, numerical assessments arealways effective and easy to understand. Hence, this research endeavour employsFuzzy based computational method of decision making for its empirical analysis.Findings in the proposed paper suggest that Riyadh and Makkah are the mostsusceptible regions, implying that if sustained and focused preventive measuresare not introduced at the right juncture, the two cities could be the worst afflictedwith the infection. The results obtained through Fuzzy based computationalmethod of decision making are highly corroborative and would be very usefulfor categorizing and assessing the current COVID-19 situation in the Kingdomof Saudi Arabia. More specifically, identifying the cities that are likely to beCOVID-19 hotspots would help the country’s health and medical fraternity toreinforce intensive containment strategies to counter the ills of the pandemic insuch regions. 展开更多
关键词 COVID-19 Saudi Arabian regions risk assessment dynamics of infection fuzzy AHP
在线阅读 下载PDF
Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique
15
作者 Fawaz Alassery Ahmed Alzahrani +3 位作者 Asif Irshad Khan Kanika Sharma Masood Ahmad Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期859-872,共14页
In recent years,it has been observed that the disclosure of information increases the risk of terrorism.Without restricting the accessibility of information,providing security is difficult.So,there is a demand for tim... In recent years,it has been observed that the disclosure of information increases the risk of terrorism.Without restricting the accessibility of information,providing security is difficult.So,there is a demand for time tofill the gap between security and accessibility of information.In fact,security tools should be usable for improving the security as well as the accessibility of information.Though security and accessibility are not directly influenced,some of their factors are indirectly influenced by each other.Attributes play an important role in bridging the gap between security and accessibility.In this paper,we identify the key attributes of accessibility and security that impact directly and indirectly on each other,such as confidentiality,integrity,availability,and severity.The significance of every attribute on the basis of obtained weight is important for its effect on security during the big data security life cycle process.To calculate the proposed work,researchers utilised the Fuzzy Analytic Hierarchy Process(Fuzzy AHP).Thefindings show that the Fuzzy AHP is a very accurate mechanism for determining the best security solution in a real-time healthcare context.The study also looks at the rapidly evolving security technologies in healthcare that could help improve healthcare services and the future prospects in this area. 展开更多
关键词 Information security big data big data security life cycle fuzzy AHP
在线阅读 下载PDF
Evaluating the Impacts of Security-Durability Characteristic:Data Science Perspective
16
作者 Abdullah Alharbi Masood Ahmad +5 位作者 Wael Alosaimi Hashem Alyami Alka Agrawal Rajeev Kumar Abdul Wahid Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期557-567,共11页
Since the beginning of web applications,security has been a critical study area.There has been a lot of research done to figure out how to define and identify security goals or issues.However,high-security web apps ha... Since the beginning of web applications,security has been a critical study area.There has been a lot of research done to figure out how to define and identify security goals or issues.However,high-security web apps have been found to be less durable in recent years;thus reducing their business continuity.High security features of a web application are worthless unless they provide effective services to the user and meet the standards of commercial viability.Hence,there is a necessity to link in the gap between durability and security of the web application.Indeed,security mechanisms must be used to enhance durability as well as the security of the web application.Although durability and security are not related directly,some of their factors influence each other indirectly.Characteristics play an important role in reducing the void between durability and security.In this respect,the present study identifies key characteristics of security and durability that affect each other indirectly and directly,including confidentiality,integrity availability,human trust and trustworthiness.The importance of all the attributes in terms of their weight is essential for their influence on the whole security during the development procedure of web application.To estimate the efficacy of present study,authors employed the Hesitant Fuzzy Analytic Hierarchy Process(H-Fuzzy AHP).The outcomes of our investigations and conclusions will be a useful reference for the web application developers in achieving a more secure and durable web application. 展开更多
关键词 Software security DURABILITY durability of security services web application development process
在线阅读 下载PDF
Implementation of Legendre Neural Network to Solve Time-Varying Singular Bilinear Systems
17
作者 V.Murugesh B.Saravana Balaji +5 位作者 Habib Sano Aliy J.Bhuvana P.Saranya Andino Maseleno K.Shankar A.Sasikala 《Computers, Materials & Continua》 SCIE EI 2021年第12期3685-3692,共8页
Bilinear singular systems can be used in the investigation of different types of engineering systems.In the past decade,considerable attention has been paid to analyzing and synthesizing singular bilinear systems.Thei... Bilinear singular systems can be used in the investigation of different types of engineering systems.In the past decade,considerable attention has been paid to analyzing and synthesizing singular bilinear systems.Their importance lies in their real world application such as economic,ecological,and socioeconomic processes.They are also applied in several biological processes,such as population dynamics of biological species,water balance,temperature regulation in the human body,carbon dioxide control in lungs,blood pressure,immune system,cardiac regulation,etc.Bilinear singular systems naturally represent different physical processes such as the fundamental law of mass action,the DC motor,the induction motor drives,the mechanical brake systems,aerial combat between two aircraft,the missile intercept problem,modeling and control of small furnaces and hydraulic rotary multimotor systems.The current research work discusses the Legendre Neural Network’s implementation to evaluate time-varying singular bilinear systems for finding the exact solution.The results were obtained from two methods namely the RK-Butcher algorithm and the Runge Kutta Arithmetic Mean(RKAM)method.Compared with the results attained from Legendre Neural Network Method for time-varying singular bilinear systems,the output proved to be accurate.As such,this research article established that the proposed Legendre Neural Network could be easily implemented in MATLAB.One can obtain the solution for any length of time from this method in time-varying singular bilinear systems. 展开更多
关键词 Time-varying singular bilinear systems RK-butcher algorithm legendre neural network method
在线阅读 下载PDF
Face Representation Using Combined Method of Gabor Filters, Wavelet Transformation and DCV and Recognition Using RBF
18
作者 Kathirvalavakumar Thangairulappan Jebakumari Beulah Vasanthi Jeyasingh 《Journal of Intelligent Learning Systems and Applications》 2012年第4期266-273,共8页
An efficient face representation is a vital step for a successful face recognition system. Gabor features are known to be effective for face recognition. The Gabor features extracted by Gabor filters have large dimens... An efficient face representation is a vital step for a successful face recognition system. Gabor features are known to be effective for face recognition. The Gabor features extracted by Gabor filters have large dimensionality. The feature of wavelet transformation is feature reduction. Hence, the large dimensional Gabor features are reduced by wavelet transformation. The discriminative common vectors are obtained using the within-class scatter matrix method to get a feature representation of face images with enhanced discrimination and are classified using radial basis function network. The proposed system is validated using three face databases such as ORL, The Japanese Female Facial Expression (JAFFE) and Essex Face database. Experimental results show that the proposed method reduces the number of features, minimizes the computational complexity and yielded the better recognition rates. 展开更多
关键词 Feature Extraction GABOR WAVELET WAVELET Transformation Discriminative Common Vector RADIAL BASIS Function Neural Network
在线阅读 下载PDF
Statistical Tests of Hypothesis Based Color Image Retrieval
19
作者 K. Seetharaman S. Selvaraj 《Journal of Data Analysis and Information Processing》 2016年第2期90-99,共10页
This paper proposes a novel method based on statistical tests of hypotheses, such as F-ratio and Welch’s t-tests. The input query image is examined whether it is a textured or structured. If it is structured, the sha... This paper proposes a novel method based on statistical tests of hypotheses, such as F-ratio and Welch’s t-tests. The input query image is examined whether it is a textured or structured. If it is structured, the shapes are segregated into various regions according to its nature;otherwise, it is treated as textured image and considered the entire image as it is for the experiment. The aforesaid tests are applied regions-wise. First, the F-ratio test is applied, if the images pass the test, then it is proceeded to test the spectrum of energy, i.e. means of the two images. If the images pass both tests, then it is concluded that the two images are the same or similar. Otherwise, they differ. Since the proposed system is distribution-based, it is invariant for rotation and scaling. Also, the system facilitates the user to fix the number of images to be retrieved, because the user can fix the level of significance according to their requirements. These are the main advantages of the proposed system. 展开更多
关键词 F-Ratio Test Welch’s Test Tests of Hypotheses Mean Average Precision Target Image Query Image
在线阅读 下载PDF
DCNN Based Finger Knuckle Print Recognition Using C-ROI Morphological Segmentation and Derivative Line Extraction
20
作者 Sathiya L Palanisamy V 《China Communications》 2025年第11期144-160,共17页
One of the evolving hand biometric features considered so far is finger knuckle printing,because of its ability towards unique identification of individuals.Despite many attempts have been made in this area of researc... One of the evolving hand biometric features considered so far is finger knuckle printing,because of its ability towards unique identification of individuals.Despite many attempts have been made in this area of research,the accuracy of the recognition model remains a major issue.To overcome this problem,a novel biometric-based method,named fingerknuckle-print(FKP),has been developed for individual verification.The proposed system carries key steps such as preprocessing,segmentation,feature extraction and classification.Initially input FKP image is fed into the preprocessing stage where colour images are converted to gray scale image for augmenting the system performance.Afterwards,segmentation process is carried out with the help of CROI(Circular Region of Interest)and Morphological operation.Then,feature extraction stage is carried out using Gabor-Derivative line approach for extracting intrinsic features.Finally,DCNN(Deep Convolutional Neural Network)is trained for the processed knuckle images to recognize imposter and genuine individuals.Extensive experiments on standard FKP database demonstrates that the proposed method attains considerable improvement compared with state-of-the-art methods.The overall accuracy attained for the proposed methodology is 95.6%which is achieved better than the existing techniques. 展开更多
关键词 ACCURACY deep convolutional neural network derivative line method gabor filter morphological segmentation sensitivity
在线阅读 下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部